Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Category Archives: Investigation-5- Use of technology(ies)
Police Using Skype To Get Warrants While At A Crime Scene | Techdirt
Police Using Skype To Get Warrants While At A Crime Scene | Techdirt. 30 March 2011 an interesting development…
Privacy: about secrets or about democracy?
Everyone Has Something To Hide: Why Privacy Is Important Even If ‘You’ve Done Nothing Wrong’ | Techdirt. 4th August 2010 An old post stuck my mailbox but which has not lost its relevance in the slightest. Privacy is not about … Continue reading
Surveillance technology: which regulation?
La cyberarme de la police | LeMatin.ch. 23 August 2010 An old post I kept in my mail box until I could process it. It is about softwares (CRUSH standing for Criminal Reduction Utilising Statistical History) that allows mapping of … Continue reading
Google, China and Co: where do we draw the line between the acceptable and the not-so-acceptable?
A long silence, partly because I was busy scrolling down the shelves at Cambridge (UK) library for books before my fellowship at CRASSH ended. I still have a few books to read, but today I am trying to go through … Continue reading
Surveillance
“Rather Than Blaming Twitter, NY Police Using It To Track Gang Activity” (TechDirt, 01 December 2009)
Facebook again: bad and good uses
Yes, Bad People Use Facebook Too (TechDirt, 17 november 2009)
Identity, prosecution and Facebook
A strange story, the type that always makes me think of the novel The Count of Monte-Christo.Emprisonment for a theft he has not committed, a man managed to be freed and charges dropped after his lawyer tracked down a message … Continue reading
Forensics tools
Until it withdrew it, Microsoft allowed its COFFEE auditing tools to be shared, allowing whoever uses it to access Windows. It also provided it to law enforcement agencies.According to comments, the tools are not very good and ‘bad guys’ use … Continue reading
Social networks: world and power
With always/often talk of Facebook, but this is not the only one on the web. Others in non English languages are actually attracting more customers, in China obviously, but also Brazil, Russia, Netherlands etc…“Ces réseaux sociaux qui résistent à Facebook … Continue reading
Data collection and use by police
Quite a bit of irony here when thinking about the debate on whether ISPs should collect data and keep it available to police. The ACPO (Association of Chief Police Officers) considers that the sheer number of CCTV data makes it … Continue reading