Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: January 2008
Investigations and privacy: possible issues?
Here is the Statewatch newsletter of 22 January 2008 (01/08)Home page: http://www.statewatch.org – Enlightening if applied to cybercrime… Note also the old partnership bewteen UK and USA “6. UK-USA: 1948 UKUSA agreement and ECHELON states behind “Server inthe Sky” project: … Continue reading
Spamming: money, money, money..
Like hacking and the like, spamming is very profitable an activity, especially when linked with stock trading. According to this article, £1.5m in one summer, more than the salary in one’s life time for most of us; and guess where … Continue reading
Posted in Spamming
Leave a comment
Hacking, extorsion, espionage…: money and political motives
Nothing new; most hacks aim at money. Extorsion (or blackmail) is very profitable. see Tom Espiner, “Schneier: Cyber-extersion on the increase” ZDNet (23 january 2008) http://news.zdnet.co.uk/security/0,1000000189,39292357,00.htm as well as corporate espionage, ZDNet (7 january 2008) http://resources.zdnet.co.uk/articles/0,1000001991,39291900,00.htmand ZDNet (28 January 2008) … Continue reading
Hacking: anatomy of an attack
Several comments sprung to mind when I read the article:1) the liability of the hacker, what if he was employed by security firm?2) why goverment as a target? government is not the only institution to have information. Tesco has probably … Continue reading
Preventing crime: internet, a help to police forces
Often, internet is viewed as a threat by police forces because of its elusive character and the challenges it creates in relation to criminal procedure. But sometimes new technologies can be for the better: see the FBI thinking of using … Continue reading
Criminal procedure: intercepting and posting
Intercepting communications is not new (remember the old days where post mail was opened and retained…) and the requirement to do it openly or at least within a framework where effective control exists has never been well accepted by investigatory … Continue reading
Cybercrime, copyrights: what is free information?
Identity theft presupposes that the information is confidential because it is private or because of its commercial value or its intellectual value. But what about data that informs readers of the news of the world?Newspapers struggle between two avenues: asking … Continue reading
Posted in Uncategorized
Leave a comment