Monthly Archives: January 2008

Investigations and privacy: possible issues?

Here is the Statewatch newsletter of 22 January 2008 (01/08)Home page: http://www.statewatch.org – Enlightening if applied to cybercrime… Note also the old partnership bewteen UK and USA “6. UK-USA: 1948 UKUSA agreement and ECHELON states behind “Server inthe Sky” project: … Continue reading

Posted in Investigation-2- Interception of communication, Offences - Terrorism, Privacy | Leave a comment

Spamming: money, money, money..

Like hacking and the like, spamming is very profitable an activity, especially when linked with stock trading. According to this article, £1.5m in one summer, more than the salary in one’s life time for most of us; and guess where … Continue reading

Posted in Spamming | Leave a comment

Hacking, extorsion, espionage…: money and political motives

Nothing new; most hacks aim at money. Extorsion (or blackmail) is very profitable. see Tom Espiner, “Schneier: Cyber-extersion on the increase” ZDNet (23 january 2008) http://news.zdnet.co.uk/security/0,1000000189,39292357,00.htm as well as corporate espionage, ZDNet (7 january 2008) http://resources.zdnet.co.uk/articles/0,1000001991,39291900,00.htmand ZDNet (28 January 2008) … Continue reading

Posted in Offences - Hacking (unauthorised access) | Leave a comment

Hacking: anatomy of an attack

Several comments sprung to mind when I read the article:1) the liability of the hacker, what if he was employed by security firm?2) why goverment as a target? government is not the only institution to have information. Tesco has probably … Continue reading

Posted in Offences - Hacking (unauthorised access) | Leave a comment

Preventing crime: internet, a help to police forces

Often, internet is viewed as a threat by police forces because of its elusive character and the challenges it creates in relation to criminal procedure. But sometimes new technologies can be for the better: see the FBI thinking of using … Continue reading

Posted in Investigation-5- Use of technology(ies), Technology - neither good or bad but never neutral | Leave a comment

Criminal procedure: intercepting and posting

Intercepting communications is not new (remember the old days where post mail was opened and retained…) and the requirement to do it openly or at least within a framework where effective control exists has never been well accepted by investigatory … Continue reading

Posted in Investigation-2- Interception of communication | Leave a comment

Cybercrime, copyrights: what is free information?

Identity theft presupposes that the information is confidential because it is private or because of its commercial value or its intellectual value. But what about data that informs readers of the news of the world?Newspapers struggle between two avenues: asking … Continue reading

Posted in Uncategorized | Leave a comment