Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: February 2008
the law and cybercrime: an illusory pursuit?
Not a new debate I am afraid. Yes the law is behind technology, but has not law always been behind innovation? The question is more likely: can the law adapt to innovations or can it not requiring then new legislation … Continue reading
Terrorism: imaginative detection or illusory means?
Apparently, the IARA in the US reviews Second Life for potential terrorists. The information seems weird, for how can they know who is behind a character in Second Life; second, what about the other offences committed on Second Life, like … Continue reading
Posted in Offences - Terrorism
Leave a comment
Hacking: preventive manoeuver
An example of hacking, within formal or official circumstances, in order to prove that a system does not work. How does the behaviour comply with criminal law? Motive, whether good or bad, is not intent… “Researchers hack ‘tamper-proof’ PIN terminals” … Continue reading
Fraud: which offence to go for?
The adventures (?) of a hacker/insider trader in the US: would be funny if at stake were not so much money and many a lack of thinking from authorities “Hacker May Get To Keep Insider Trading Windfall — Because He … Continue reading
Tackling cybercrime in the UK and in the US
Need of ressources The House of Lords tries to put pressure on UK Government, with limited success though. Nothing serious has been done since August 2007, and to wait until next August, knowing the timing of legislation, just means more … Continue reading
Censorship and control of the internet by many
The article is clear enougthand echoes Goldsmith’s and Wu’s book on Who controls the internet?“China To Disable Great Firewall For The Olympics?” (21 February 2008)http://www.techdirt.com/articles/20080221/094928313.shtml And see Pakistan’s attitude “Pakistan Joins The Axis Of NoTube; Screws Up The Internet” (25 … Continue reading
Posted in censorship, Countries - China, Filtering
Leave a comment
Cybercrime: what is free information?
we’ve seen it with the theory of post-scarcity economy; but what about academic research? I always maintained research should be available for free but with acknowledgement of authors. It is thus interesting that Harvard takes that path. “Harvard Faculty Agrees … Continue reading
Posted in Data retention, Offences - Theft
Leave a comment
Investigation: police forces and the internet
The negative (and recurrent) view about the need for special forces and more money to tackle cybercrime: (15 February 2008)http://news.zdnet.co.uk/security/0,1000000189,39292863,00.htm?r=1 and more specific problems of investigations: “German Government Struggles To Tap Encrypted Skype Calls” (28 January 2008)http://www.techdirt.com/articles/20080127/10382079.shtml with a US … Continue reading
Social networking – privacy and crime
“Deleting Your Facebook Profile Isn’t So Easy”: if you can only deactivate, but details still seen by others, how can ID theft be avoided? TechDirt (11 February 2008)http://www.techdirt.com/articles/20080211/024809220.shtml “Cop Gets Investigated Because MySpace Friend Links To Porn” TechDirt (29 January … Continue reading
Posted in Offences - Fraud, Social networking
Leave a comment
ISPs/hosting liability – noticing – Comparative law
A translated decision from a French law court on December 12, 2007 (Court of appeal from Paris, i.e. an important court because of its location, it gets interesting cases to deal with). Google’s liability is at stake as it did … Continue reading
Posted in Uncategorized
1 Comment