Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: July 2009
Twitter hacked
Twitter has been hacked again (previously it was Barack Obama’s account). This time it seems that the hacker obtained the passwords from an employee (probably involuntarily given by the employee) allowing him/her to access many internal documents, some confidential. So … Continue reading
Cybercrime trends and security issues
Quite obvious: “US prosecutor: Cybercrime will follow the cloud” (ZDnet.co.uk, 13 july 2009) More surprising: “Cisco reports rise in text-message scams” (ZDnet.co.uk, 15 July 2009) And quite welcome: France now has its Agence nationale de la sécurité des systèmes d’information, … Continue reading
Spam and scam: trends confirmed
why spam continues to fill up our boxes? because some of us continue to fall for it, enough obviously to make spam a viable option.12% of Americans do open spam messages and fall in the trap according to the Messaging … Continue reading
Posted in Spamming
Leave a comment
Update on Mr. McKinnon’s case
“Tories champion Nasa hacker in parliament” (ZDnet.co.uk, 15 July 2009): in this one, it is interesting to note that Home Secretary Johnson does not see the point of a reform or discussion of reform of the Extradition Act 2003 Nasa … Continue reading
Views on regulation on the net
Axel Pawlik, managing director of the Ripe NCC, writes about regulation on the net. He considers that ISPs should not take an active role in regulation, notably in relation to piracy. THey should be treated like telecom companies which list … Continue reading
Update on Hadopi 2
lots of daily changes on the bill related to piracy. The amendment about e-mail surveillance has been withdrawn and the whole discussion postpones to early september. It’s true the bill ‘raised’ 800 amendments! Will France’s Three Strikes Law Also Allow … Continue reading
Posted in Countries - France, Offences - Piracy
Leave a comment
“Soca’s cybercops convict 21 in three years” (ZDnet.co.uk, 16 July 2009)
Posted in Uncategorized
Leave a comment
Boston Review — Evgeny Morozov: Cyber-Scare
Boston Review — Evgeny Morozov: Cyber-Scare
Posted in Uncategorized
Leave a comment
Does The US Government Really Need ‘Wider Latitude’ To Monitor Private Networks? | Techdirt
Does The US Government Really Need ‘Wider Latitude’ To Monitor Private Networks? | Techdirt (9 July 2009) Surprising that Prof Goldsmith would accept more monitoring of the net by Government, because education and information sharing are not proven methods to … Continue reading
Posted in Uncategorized
Leave a comment
Update on Hadopi 2 (Senate)
Juriscom.net – droit des technologies de l’informationSandrine Rouja, Une deuxième loi “création et internet” pour juillet, versant pénal (25 June 2009)Le Sénat adopte le projet de loi HADOPI 2 (Juriscom. 9 July 2009)for the details (in French) on the French … Continue reading