Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: November 2007
Cybercrime is not limited to PC
An obvious statement but often forgotten: as computers invade our daily life (Fridges, washing machines, photocopiers…), we should be a bit more careful.. See the iPhone, only one week old at the time of this post.“Exploit turns iPhone into a … Continue reading
Posted in General - Cybercrime patterns
Leave a comment
Cybercrime and police investigation
An often left on the side issue is the difficulties police forces encountered when investigating crime committed with the use of internet:for an example, encryption being a nuisance (although it is supposed to create security to prevent cybercrime, rather than … Continue reading
Just for fun: reinventing sentencing one day?
The following article brought a smile: will the criminal system ever introduce a bootcamp for hackers? Never know but look at the following: “Korea’s Internet Addiction Bootcamps Mistargeted” http://www.techdirt.com/articles/20071119/003003.shtml 20 November 2007 and what about sex offenders and the use … Continue reading
Posted in Sentencing
Leave a comment
Cybercrime, copyrights law, and the post-scarcity economy
Copyrights is not always associated with crime but given the fuss about piracy by big companies controlling digital copies, it is worth looking at the issue a bit more closely. First this article on Techdirt which highlights the craziness of … Continue reading
Posted in Offences - Piracy
Leave a comment
How to use fear to steal information…
Not the first report on the practice, but the latest: how to use the fear of spyware to phish for credit card details… Very effective, thanks to people’s credulity… http://news.zdnet.co.uk/security/0,1000000189,39290658,00.htm
Posted in Offences - Fraud
Leave a comment
Cybercrime and legal response: an impossible task?
nothing new really, but it is interesting to see that the argument comes back regularly, often coinciding with a warning about the increase in cybercrimes. Can Government control the web? Here, Dr. Vinc Cerf reaffrims it can’t because of the … Continue reading
old crimes, new bottles…
To borrow the famous expression from David Wall, here is another example of how crime can be resilient and take new shapes with a new name: wi-fi piggybacking or the unauthorised use of electronic communications, just to get free access … Continue reading
Russia and China: shamed as worst offenders
Should not come as a surprise that China and Russia represent major threats for the online world; the amount of money at stake, and also the political stance, makes it to attractive to avoid spying, hacking, ‘zombying’ and the like. … Continue reading
Cybercrime and social networking: at last an awakening?
Richard Thomas, the information commissioner, spoke before the House of Lords Constitution Committee, raising concerns about the consequences of data-sharing, whether on social networks like Facebook, or with other data-sharing practices between public and private sectors. http://news.zdnet.co.uk/security/0,1000000189,39290834,00.htm http://news.zdnet.co.uk/itmanagement/0,1000000308,39290672,00.htm It’s time … Continue reading
Posted in Offences - Fraud, Privacy, Social networking
Leave a comment
Fraud: the help of non legal tools
The article below is interesting for what it reveals about fraud: is there any lesson to be learnt by law enforcement agencies in detecting and investigating fraud? And how can the software be accurate in its detection without infringing HR? … Continue reading