Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: April 2008
Tangible/intangible? digital goods’ nature at stake
Given that the debate in criminal law always turns towards the tangible/intangible nature of what is stolen, deceived…, this proposal from a Californian politician is quite interesting, although at first sight it does not concern criminal law, but simply tax … Continue reading
Posted in Offences - Theft
Leave a comment
Fraud and crime – statistics
As noted in David Wall’s new book on Cybercrime – The transformation of crime in the information age -, statistics about e-crime are scarce; so it is interesting to have those of the joint research of the FBI and the … Continue reading
Posted in Offences - Fraud
1 Comment
Cyberattacks – prevention by Governments
Four interesting articles about preventing cyberattacks. The first is about creating a real-scale cyberattack to see how the different targets would react and their level of vulnerability.“International cyberattack drill tests nations’ responses ” (10 April 2008) http://news.zdnet.co.uk/security/0,1000000189,39383325,00.htm The second is … Continue reading
Posted in Offences - Terrorism
1 Comment
ISPs’ criminal liability – YouTube and MySpace
Facts: an internet version of “happy slapping” which has nothing of happy but the name, for it is simply to beat someone up and diffuse the filming by phone or by the internet, here it was via YouTube. Can’t see … Continue reading
Posted in Providers' liability, Social networking
Leave a comment
Sentencing/ preventive measures
Rare are the decisions on sentencing and preventive measures. Yet for cybercrime, knowing which sanction is most appropriate is crucial. Ban of computer use may seem obvious, but apart from the question of being feasible, lies the issue of the … Continue reading
Posted in Sentencing
Leave a comment
ISPs as enforcers of the law
Nothing new really, but more obvious now. Section 230 (c)(2) CDA (the other part of section 230 is the infamous “child porn provision”) allows for ISPs to filter contentious contents. Spam being illegal, ISPs are allowed to filter content, i.e. … Continue reading
Sexual assault and ISPs’ liability
Would be funny if not sad and serious. MySpace was sued by daughter and mum as being liable for sexual assault. Hard to see how in this case, for the daughter actually lied about her age and engage into correspondence … Continue reading
Censorship and China (once more)
Again a week with China and the Olympics. Can’t avoid the subject.This one is interesting: the Olympic Committee has asked China to lift its Firewall. Put aside (momentarily) the cynism of the request, I love what the request stands for: … Continue reading
Posted in censorship, Countries - China, Filtering
2 Comments
ID fraud under the flashlights
It seems to be the week of ID fraud. A documentary on the BBC yesterday 3 April 2008 pointing out the work of the City of London’s Economic Crime Unit and of the anti-virus firm Sophos demonstrating how easy it … Continue reading
Posted in Offences - Fraud
Leave a comment
Danger of terrorism…
The US Defense is publicly annoucing it takes cybercrime seriously whether as a direct consequence of cyberterrorism or just simple cyberattacks. Nothing new, but ironically the internet was created by the US military… who now needs to train its own … Continue reading
Posted in Offences - Terrorism
Leave a comment