Eric Goldman, Do We Need a New Federal Trade Secret Law?, Santa Clara Univ. Legal Studies Research Paper No. 35-14 (September 2014).
Orin Kerr, Does the federal computer hacking law apply to a laptop not connected to the Internet?, The Volokh Conspiracy (Aug. 25, 2014).
Timothy P. O'Toole, Digital Defense: Meeting the Challenges That the Computer Fraud and Abuse Act Poses, The Champion (September/October 2013).
James Juo, Unauthorized Excess - After the death of Aaron Swartz, lawmakers have proposed reforms to the Computer Fraud and Abuse Act, Los Angeles Lawyer (July/August 2013).
Danielle E. Sunberg, Reining in the Rogue Employee: The Fourth Circuit Limits Employee Liability Under the CFAA, 62 Am. Univ. L. Rev. 1417 (2013).
Lothar Determann, Internet Freedom and Computer Abuse, 35 Hastings Comm. & Ent. L.J. 429 (March 2013).
Internet Law Treatise, Computer Fraud and Abuse Act (CFAA), Electronic Frontier Foundation (2013).
David Thaw, Criminalizing Hacking, Not Dating: Reconstructing the CFAA Intent Requirement, 103 J. Crim. L. & Criminology 907 (2013).
Andrew T. Hernacki, A Vague Law in a Smartphone World: Limiting the Scope of Unauthorized Access under the Computer Fraud and Abuse Act, 61 Am. U. L. Rev. 1543 (2012).
Warren Thomas, Lenity on Me: LVRC v. BrekkaPoints the Way toward Defining Authorization and Solving the Split Over the Computer Fraud and Abuse Act, 27 Ga. St. U. L. Rev. 379 (2011).
Garrett D. Urban, Causing Damage without Authorization: The Limitations of Current Judicial Interpretations of Employee Authorization under the Computer Fraud and Abuse Act, 52 Wm. & Mary L. Rev. 1369 (2011).
"EFF, NACDL Ask Appeals Court to Block Attempt to Turn Misdemeanors into Felonies," NACDL News Release (August 6, 2010).
Orin Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, GWU Legal Research Paper No. 482 (Dec. 22 2009).
Nicholas R. Johnson, “I Agree” to Criminal Liability: Lori Drew’s Prosecution under §1030(A)(2)(C) of the Computer Fraud and Abuse Act, and Why Every Internet User Should Care, 2009 U. Ill. J.L. Tech. & Pol’y 561 (2009).
Kyle Wesley Brenton, Trade Secret Law and the Computer Fraud and Abuse Act: Two Problems and Two Solutions, U. Ill. J.L. Tech. (Sept. 1, 2009).
Reid Skibell, Cybercrimes & Misdemeanors: A Reevaluation of the Computer Fraud and Abuse Act, 18 Berkley Tech. L.J. 909 (2003).
Continue reading below
A Defender’s Guide to Federal Evidence: A Trial Practice Handbook for Criminal Defense Attorneys
This Guide to Federal Evidence is the only federal evidence handbook written exclusively for criminal defense lawyers. The Guide analyzes each Federal Rule of Evidence and outlines the main evidentiary issues that confront criminal defense lawyers. It also summarizes countless defense favorable cases and provides tips on how to avoid common evidentiary pitfalls. The Guide contains multiple user-friendly flowcharts aimed at helping the criminal defense lawyer tackle evidence problems. A Defender’s Guide to Federal Evidence is an indispensable tool in preparing a case for trial.
Modern Digital Evidence & Technologies in Criminal Cases
Modern cases need modern defenses, and modern lawyers can't practice with an outdated playbook. This program is a contemporary training that identifies emerging technologies and digital evidence encountered in today's criminal cases and arms you with the tools necessary to combat expert witnesses, prosecutorial overreach, and an uneducated judge and jury. This comprehensive CLE program covers both general aspects of new technologies as well as practical courtroom application and legal challenges to the use of these new technologies.
Top Shelf DUI Defenses: The Law, The Science, The Techniques (2021)
If you are serious about being an effective DUI defense advocate, or if you’re considering adding DUI defenses to your portfolio, you need to know the latest scientific and legal strategies to optimize your success at trial. Learn from the best-of-the-best in the field in this unique CLE Program, updated for 2021.
Defending Modern Drug Cases (2021)
From challenging the arrest and seizure to picking a jury and cross-examining police officers, defense attorneys handling drug cases must be able to construct a defense that will increase the chances of the client getting a positive result for your client.
Effective motion practice, juror selection, and storytelling have never been more important. This seminar will introduce defense counsel to techniques that have been used at recent drug trials to rebut specific claims and overcome the emotion created in today’s criminal legal system.
Orin Kerr, Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes, 78 NYU L. Rev. 1596 (2003).