Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: March 2008
ownership – ISPs
I do not know to which extent the following article could influence cybercrime, but at least the thought is there. The title on TechDirt is intriguing: “Ownership Doesn’t Always Mean Control” (21st March 2008) because common assumption is to associate … Continue reading
Wi-Fi and piggybacking
In the State of Maryland in the US, an MP proposed a Bill to criminalise piggybacking with Wi-Fi. See PDF document: http://mlis.state.md.us/2008rs/bills/hb/hb1377f.pdf “FOR the purpose of prohibiting a person from intentionally, willfully, and withoutauthorization accessing, attempting to access, causing to … Continue reading
Posted in Uncategorized
1 Comment
Second life and copyrights virtual claims
Yes, it happened! A lawsuit launched, now dropped, about copyrights in Second Life. Apparently a company specialised in writing scripts for virtual sex toys and M. Leatherwood a year ago did copy the items to sell them on Second Life. … Continue reading
Posted in Offences - Piracy, Virtual Worlds
Leave a comment
Facebook and harassment claim
An odd case, which facts are not yet very clear, at least for me. It seems that M. Hurst did a search on the internet about his ex-girlfriend and was added on the list of requests to be her friend … Continue reading
Posted in Offences - Harassment, Social networking
1 Comment
Investigations: clicking=guilty
Please read the following article carefully. It is about US law, but the practice could be more widespread and whether UK law on interception could protect people is questionable. The facts are the following: honeypot (= fake website or similar … Continue reading
Social networking and identity theft
I though I wrote about it but can’t find the post (please tell me if you do). So the issue is about a fake profile created on Facebook involving a Morrocan prince. Apparently, the person has been discovered and since … Continue reading
Posted in Offences - Fraud, Social networking
1 Comment
Investigations of files and documents
Nothing new: we all know that documents keep track of their multiple modifications. Not to difficult to find out. Hence the French Government could have been a bit more careful when releasing its first Bill reforming liability of hosting providers … Continue reading
Second life: Second crime?
Rare are the articles or comments about Second Life and cybercrime. Here is an article in French (yes I know, there is no translation so far), which in substance says the following:1) although a virtual world in theory, its impact … Continue reading
Posted in Offences - Fraud, Virtual Worlds
2 Comments
Fraud and spamming: the US
I have not looked at it in details, but spamming in the US is tacled through fraud. Would the new offence in the UK cover the same ground? Suggestions welcome… “Top Spammer Pleads Guilty, But Spam Still Going Strong” (17 … Continue reading
Posted in Offences - Fraud, Spamming
1 Comment
hacking – hacktivism?
Rumours and more tangible proofs have started to emerge from the past two years about the 2004 American elections of George Bush. If they ever are right, not only it raises serious questions of legitimacy of the current president, but … Continue reading