Cybercrime

JURI 5584 / 7584  ·  Fall 2025

Tue/Thu 3–4:15 pm  ·  Room I

One-on-One Learning Hours: Thu 10:30–11:30am  ·  Room 304

Group Learning Hours: Fri 11am–12pm  ·  Room 304

Technological innovation can alter the commission, definition, and conception of crime. Computers, social media, and the internet have sometimes made existing criminal activity harder to detect or easier to commit. Digital technologies have also created new phenomena that challenge longstanding views about the permissibility and punishment of human behavior. This course will address topics such as digital privacy, free speech, terrorism, cybersecurity, image-based sexual abuse, stalking, harassment, doxing, and identity theft. It will examine questions of constitutional law, federal and state laws regulating online activity, and proposed legislation that would criminalize different forms of digital abuse.

____________________

Your legal education should be as affordable as possible. To accompany this course, I’ve written a free digital book, Cybercrime Scenarios, with Samuel Won. The remaining readings are from James Grimmelmann’s Internet Law: Cases & Problems (15th ed.) or are linked for free in the syllabus. Although Professor Grimmelmann’s digital casebook is accessible for free, he and the publisher suggest that students pay $30 to download the PDF, based on the idea that it’s fair to ask you to pay about $1 per class session for which the materials are used. The money also helps to keep these materials affordable for other students in the future. We’ll be using content from these materials for roughly 25 class hours, so please consider paying at least $25.

Readings from Professor Grimmelmann’s casebook are marked by the acronym “GIL” and the page range. The scenarios in the syllabus are all found in Cybercrime Scenarios. For online materials (i.e., materials on the internet, not in the casebook), please review the entire piece unless I parenthetically note a specific page range. I’ve offered optional materials on certain class days. They’re truly optional, but they provide some perspective or background that I find interesting or helpful.

Given that this course focuses extensively on abuse and violence, I caution that some of these materials might disturb at least some of you. Professor Grimmelmann includes warnings before some distressing readings, but this course will constantly challenge us to confront painful topics in ways that I can’t always predict in advance. I want you to be in the right headspace when engaging with them. I’d encourage you to take breaks and walks during and after your class prep, and some of you might also wish to take advantage of UGA’s Health & Wellness resources occasionally throughout the semester. Please take care of yourselves and let me know if there’s anything I can ever do to help.

This syllabus is a general plan for our course, but we might have to deviate from it. If so, I will announce those changes as we go, giving you as much notice as possible.

____________________

1. The Internet’s Own Boy

To replace a canceled class later in the semester, please watch the documentary and review the materials before class on August 19.

2. Situating Cybercrime

August 19

3. Cyberspace as a “Place”

August 21

  • John Perry Barlow, A Declaration of the Independence of Cyberspace (1996) (GIL 57–59)

  • Orin S. Kerr, The Problem of Perspective in Internet Law, Georgetown Law Journal (2003) (GIL 60–62)

  • David R. Johnson & David Post, Law and Borders: The Rise of Law in Cyberspace, Stanford Law Review (1996) (GIL 62–64)

  • Mary Anne Franks, Unwilling Avatars: Idealism and Discrimination in Cyberspace, Columbia Journal of Gender & Law (2011) (GIL 65–68)

  • State v. Decker (Minn. 2018) (GIL 68–70)

  • Robles v. Domino’s Pizza (9th Cir. 2019) (GIL 71–73)

Optional

4. Jurisdiction

August 26

  • U.S. Department of Justice, Prosecuting Computer Crimes (2010) (113–20)

  • United States v. Auernheimer (3rd Cir. 2014) (GIL 108–13)

  • GA Code § 16-11-39.1

  • United States v. Yücel (S.D.N.Y. 2015) (GIL 113–15)

  • In re Facebook Biometric Information Privacy Litigation (N.D. Cal. 2016 & 2018) (GIL 115–17) (skim)

5. Cybercrime Scenarios #1

August 28

  • WhatsUp Scenario

  • Peachy Scenario

6. Digital “Speech”

September 2

  • U.S. Constitution, First Amendment (GIL 123–24)

  • Texas v. Johnson (1989) (GIL 127)

  • Bland v. Roberts (E.D. Va. 2012) (GIL 127–29)

  • Bland v. Roberts (4th Cir. 2013) (GIL 129–30)

  • 303 Creative LLC v. Elenis (2023) (GIL 137–39) 

  • Elizabeth Kirley & Marilyn McMahon, How the Law Responds When Emoji Are the Weapon of Choice, The Conversation (2017)

  • Sarah Jeong, The Internet of Garbage (2015) (32–34)

Optional

7. Threats & Extortion

September 4

Optional

No class on September 9

8. Incitement & Lies

September 11

9. Voyeurism & Impersonation

September 16

Optional

10. Harassment & Stalking

September 18

Optional

11. Minors & Bullying

September 23

  • Free Speech Coalition, Inc. v. Paxton (2025) (GIL 165–74)

  • State v. Bishop (N.C. 2016) (GIL 174–76)

  • Mahanoy Area School District v. B.L. (2021) (GIL 176–78)

12. Sex & Nudity

September 25

Optional

13. Cybercrime Scenarios #2

September 30

  • Noodle Scenario (question (b) only)

  • BayRan Scenario (question (b) only)

  • MySpice Scenario (question (b) only)

  • Nudes Scenario (question (b) only)

14. The Cleaners

Watch the documentary and do the PBS quiz before class on October 7.

You may rent the documentary for $2.99 and watch it whenever suits you best, or you may attend a screening of the documentary during our regular class session on October 2. The documentary is ~1:25 long, so we will end at 4:25pm.

Optional

15. Platform Liability

October 7

  • Twitter, Inc. v. Taamneh (2023) (GIL 207–14)

  • United States v. Keith (D. Mass. 2013) (GIL 219–21)

16. Platform Immunity

October 9

  • Communications Decency Act, 47 U.S.C. § 230 (GIL 221–22)

  • Zeran v. America Online (4th Cir. 1997) (GIL 223–29)

  • Jones v. Dirty World Entertainment Recordings (6th Cir. 2014) (GIL 229–39)

  • Doe v. MySpace (W.D. Tex. 2007) (GIL 239–42)

Optional

17. Reforming Platforms

October 14

  • Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) (GIL 242–43)

  • TAKE IT DOWN Act (GIL 243-45)

  • Gonzalez v. Google (9th Cir. 2021) (GIL 245–54)

  • Gonzalez v. Google (2023) (GIL 254–56)

  • Song Fi v. Google (N.D. Cal. 2015) (GIL 256–260)

  • Digital Services Act (GIL 260–63) (skim)

  • Section 230 Reform Problem (GIL 263)

Optional

18. Platform Rights

October 16

  • PETA v. Tabak (D.C. Cir. 2024) (GIL 264–70)

  • Cyber Promotions v. American Online (E.D. Pa. 1996) (GIL 271–75)

  • Moody v. Netchoice (2024) (GIL 282–94)

Optional

19. Can’t Look Away

Watch the documentary before class on October 23.

You may rent the documentary for $7 and watch it whenever suits you best, or you may attend a screening of the documentary in Room J at 2:40–3:55pm on October 21.

20. Cybercrime Scenarios #3

October 23

  • Chatsnap Scenario

  • Modela Scenario

  • TukTuk Scenario

  • Z Scenario

21. Hacking

October 28

  • Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (GIL 488–90)

  • Orin S. Kerr, Cybercrime’s Scope: Interpreting “Access” and “Authorization” in Computer Misuse Statutes, NYU Law Review (2003) (GIL 490–91)

  • United States v. Morris (2d Cir. 1991) (GIL 491–93)

  • United States v. Van Buren (2021) (GIL 493–98)

  • hiQ Labs v. LinkedIn (9th Cir. 2019) (GIL 498–503)

  • Dumbnet Scenario

  • Sarah Jeong, The Curious Case of the Fortnite Cheater, The Verge (2018) (pdf)

Optional

22. Corporate Espionage

October 30

23. Device Searches

November 4

Optional

24. Remote Searches

November 6

Optional

25. Electronic Communications

November 11

  • Wiretap Act, 18 U.S.C. §§ 2510 et seq. (GIL 325–29)

  • O’Brien v. O’Brien (Fla. Dist. Ct. App. 5th 2005) (GIL 330–32)

  • Stored Communications Act, 18 U.S.C. §§ 2701 et seq. (GIL 232–36)

  • Ehling v. Monmouth-Ocean Hospital Service Corp. (D.N.J. 2012) (GIL 236–40)

Optional

26. Anonymity & Encryption

November 13

Optional

27. Cybercrime Scenarios #4

November 18

Optional

28. Cybercrime & AI?

November 20

  • We can use this final session to discuss topics that interest you related to cybercrime and AI. More details to follow.

  • This class will also serve as our review session for the rest of the course, so please bring your questions!

December 4, 9am: Final Exam

For syllabus inspiration, I’d like to thank Kendra Albert, Hannah Bloch-Wehba, Evelyn Douek, Mary Anne Franks, James Grimmelmann, Orin Kerr, Ido Kilovaty, Martha Minow, and Natalia Pires de Vasconcelos, all of whose curricula helped me when shaping my own.

Previous
Previous

Assessment

Next
Next

Health