All courses numbered 500 or above must be submitted to the Graduate Council for final approval after approval by the sponsoring College, School or Institute.
Graduate Council requires submission of this form for a new course or any change to existing courses. For a new course, please attach a copy of the syllabus and catalog description ( with catalog credit format, e.g. 3:2:1 ). The designated representative of the College, School or Institute should forward the form along with the syllabus and catalog description, if required, as an email attachment (in one file) to the secretary of the Graduate Council. A printed copy of the form with signatures and the attachments should be brought to the Graduate Council meeting. Please complete the Graduate Course
Coordinator Form if the proposed changes will affect other units.
Note : Colleges, Schools or Institutes are responsible for submitting new or modified catalog descriptions (35 words or less, using catalog format) to Creative Services by deadlines outlined in the yearly Catalog production calendar.
Please indicate : New ____X___ Modify _______ Delete _______
Department/Unit : _ Electrical and Computer Engineering_____ Course Subject/Number : CFRS 760 _____
Submitted by : ____ Jeremy Allnutt _______ Ext : _3969__________ Email : _ jallnutt@gmu.edu_________
Course Title : ____ Legal and Ethical Issues in IT ____________________________________________________
Effective Term
(New/Modified Courses only)
: _Spring 2009___ Final Term
( deleted courses only )
:____________
Credit Hours :
(Fixed)
_3__
(Var.) ______ to ______ Grade Type
(check one)
:
__
X
__ Regular graduate (A, B, C, etc.)
_____ Satisfactory/No Credit only
_____ Special graduate (A, B, C, etc. + IP)
Repeat Status*
(check one)
: X__ NRNot repeatable ____ RDRepeatable within degree ____ RTRepeatable within term
*Note: Used only for special topics, independent study, or internships courses
Total Number of Hours Allowed : _______
Schedule Type Code(s): 1.__X_
LEC =Lecture SEM =Seminar STU =Studio INT =Internship IND =Independent Study
2.____ LAB =Lab RCT =Recitation (second code used only for courses with Lab or Rct component)
Prereq _X__ Coreq ___
(Check one)
:_______CFRS 500________________________________________
__________________________________________________________________________________________
Note: Modified courses - review prereq or coreq for necessary changes; Deleted courses - review other courses to correct prereqs that list the deleted course.
Description of Modification
(for modified courses):____________________________________________________________________
Special Instructions
(major/college/class code restrictions, if needed)
:__________________________________________
Department/Unit Approval Signature : _________________________________________ Date: ___________
College/School Committee Approval Signature : __________________________________ Date: ___________
Graduate Council Approval Date : ____________ Provost Office Signature : ________________________________
Unit:
Unit:
Unit:
Approval from other units:
Please list those units outside of your own who may be affected by this new, modified, or deleted course. Each of these units must approve this change prior to its being submitted to the Graduate Council for approval.
Unit:
Head of Unit’s Signature:
Date:
Head of Unit’s Signature:
Head of Unit’s Signature:
Head of Unit’s Signature:
Date:
Date:
Date:
Unit: Head of Units Signature: Date:
Graduate Council approval: ______________________________________________ Date: ____________
Graduate Council representative: __________________________________________ Date: ____________
Provost Office representative: ____________________________________________ Date: ____________
1. COURSE NUMBER AND TITLE:
CFRS 760 Legal and Ethical Issues in IT (3:3:0)
Course Prerequisites:
CFRS 500
Catalog Description:
Presents legal and ethics topics in the context of computer forensics. It will include legal principles, types of crimes, witness testimony, and forensics report writing.
2. COURSE JUSTIFICATION:
Course Objectives:
At the conclusion of this course, the student will have learned and reflected upon the legal principles and ethical standards underpinning the field of computer forensics. The student will understand such concepts as: probable cause, the “silver platter doctrine,” chain of custody, scienter
, and Locard’s exchange principle. Students will have examined the relationship of computer to other disciplines. The student will also appreciate the role of professional organizations, certifications and codes of ethics as they apply to professional practice.
Course Necessity:
As with any program in the fields of IT security or justice, a course in law and ethics is necessary to ensure professional standards of conduct. The integration of witness testimony and report writing will give students context in which to apply legal principles and ethics.
Course Relationship to Existing Programs:
Many undergraduate and graduate programs include courses on, or elements of, ethics. In this computer forensics course, the emphasis is on those parts of computer forensics that will require a full understanding of ethics issues.
Course Relationship to Existing Courses:
This is a new course in the MS in Computer Forensics program. While it may be taken at any point in the program to allow scheduling flexibility, students will be advised to take it during their first year. While report writing is also covered in CFRS 660, note that reporting practices differ in different types of investigations and that additional practice writing reports will be beneficial.
3. APPROVAL HISTORY:
ECE Department Date:
IT&E Graduate Committee Date:
IT&E Dean Date:
4. SCHEDULING AND PROPOSED INSTRUCTORS:
Semester of Initial Offering: Fall 2009
Proposed Instructors: Proposed Instructors: Dr. Anne Marchant, Dr. Jeremy Allnutt, Mr. Robert Osgood,
Dr. Aleksander Lazarevich, Dr. Thomas Shackelford, and other suitably qualified
faculty.
5. TENTATIVE SYLLABUS: See below.
(a) Syllabus
Week 1
Course overview : Introduction to the course. Overview of types of legal systems. Review of federal and state laws as they relate to computer crime (CFAA, ECPA, USAPA, NET Act, DMCA, FISA,
The Omnibus Crime and Control Act of 1968, etc.), search and seizure, trap and trace, intellectual property, and computer forensics.
Week 2
Types of crimes and criminals. The rise of international crime and the role of grid computing.
Week 3
Overview of local, state, federal, and international law enforcement agencies and court systems.
Student seminar presentations.
Week 4
Jurisdiction and evidence. Determination of jurisdiction, types of evidence, rules of evidence, chain of custody, evidence integrity. Student seminar presentations.
Week 5
Formal discussion of ethics I. Ethical standards, codes of ethics, ethical decision making. Student seminar presentations.
Week 6
Formal examinations of landmark cases. Student seminar presentations.
Week 7
Course review; Mid-term exam
Week 8
Formal discussion of ethics II: Ethics training, whistle blowing, balancing privacy and the needs of law enforcement in a free society, cultural and ethical considerations in the context of international investigations. Student seminar presentations.
Week 9
Guest speaker (lawyer, prosecutor, or law enforcement). Student seminar presentations.
Week 10
Report writing. Establishing facts, style and use of language. Verification and use of accredited tools. Student seminar presentations.
Week 11
Legal instruments and courtroom procedures.
Subpoenas, warrants, and affidavits.
Discovery, presentation of evidence, cross examination. Student seminar presentations.
Week 12
Expert witness testimony. Student seminar presentations.
Week 13
Mock courtroom trial. Student seminar presentations.
Week 14
The computer forensics professional. Professional organizations, certifications and computer
Forensics as it relates to other disciplines. Professional preparation and lifelong learning . Review and Synthesis.
Week 15
Final exam
(b) Required Reading and Reference Material
Orin S. Kerr (2006). Kerr's Computer Crime Law: (American Casebook Series) (American
Casebook Series). West Group.
Philip J. Candilis, Robert Weinstock, Richard Martinez, Andrew Szanton (Editor). (2007) Forensic
Ethics and the Expert Witness. Springer.
Suggested supplementary material includes:
Codes of ethics:
IACIS.com
ISFCE
Cybersecurity Institute
(c) Student Evaluation Criteria
Mid-term: 25%
Presentations:
Mock forensic report:
Final:
20%
20%
35%
Examples of Seminar Presentation Topics:
FRED (Federal Rules of Evidence)
Kyollo v. US
Katz v. US
California v. Greenwood
Attend and report on a current trial
Pretexting
USAPA (Patriot Act)
Hewlett-Packard employee surveillance case
DOJ HTIU (High Tech Investigative Crime Unit)
DOJ CCIP (Computer Crime and Intellectual Property)
FBI RCFLs (Regional Computer Forensics Laboratory)
IC3 (Internet Crime Complaint Center)
Interpol and Europol
Counter forensics: U.S. v. Robert Johnson, 2005, State of Missouri v. Zacheriah Tripp, Kucala
Enterprises v Auto Wax Co
Vigilantism: Titan Rain case
Data profiling and “anonymizer” investigative tools (Jeffrey Jonas)
Panopticon and expectations of privacy in a free society
Hacker culture, networks, publications, and DEFCON
Online child exploitation (child pornography, stalking)
Internet Fraud, botnets and spam
NIST standards