Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: January 2009
Investigation – private sector investigation and human rights
The following post is not the first on the RIAA (Record Industry Association of America) investigations about piracy. Nonetheless, it highlights more than ever the problems there is in letting private associations enforcing copyrights infringement laws.Given the amount of money … Continue reading
Posted in Offences - Piracy
Leave a comment
Interception of communications – French view on UK policy
According to JDN (journal du net), the UK policy to intercept communications is not unique in Europe. Already, France and Germany allow so. The framework in which those “hacks” are conducted is no clearer whichever side of the Channel. “La … Continue reading
Posted in Uncategorized
Leave a comment
Contentious searches…
Laptops and now mobile phones… “Mixed Decisions Concerning Police Searches Of Your Mobile Phone On Arrest” (TechDirt 13 January 2009)
De facie illegal seizure by the FBI
Unless new facts reveal the seizure was grounded, the FBI action looked very much illegal, and because it is the US, unconstitutional (violation of 4th Amendment). The question is: why did the FBI feel threatened by ACLU and EFF to … Continue reading
Analysis of cybercrime risks and trends
It’s always difficult to assess risks and trends, but fraud remains a top 5 with new developments using the social networking sites“La croissance des escroqueries” (JDN, 19 January 2009) (the increase in frauds) And for the countries at risk: “Emerging … Continue reading
The difficult adaptation of police forces
It’s about India, but frankly, the same article could probably be written in any country. The basic police officer has not been trained to detect and investigate cybercrimes. Nothing to be ashamed off, but something to act upon by various … Continue reading
Twitter’s uses and abuse!
For a description of Twitter’s use among the mighty and celebrities, see the article of the Independent, on Thursday 23 January 2009, “Why Britain is suddenly all a-twitter“. The Independent joined the club, and opened a twitter “profile” Given the … Continue reading
Posted in Social networking
Leave a comment
The good and bad sides of Facebook
Once more, Facebook can turn both ways: a helpful tool for hackers to commit fraud with a variation of the 419 scam, or for police officers to find criminals.“New Zealand Cops Credit Facebook With Arrest” (TechDirt, 15 January 2009)“Facebook’s Lack … Continue reading
Posted in Social networking
1 Comment
Offensive content: no need to filter? The (US) FCC chairman’s position
He does not believe in filtering internet content because people choose what to look at rather than are bombarded with what they do not want to look at (unlike TV packages it seems).Technically this is true. In addition, we would … Continue reading
Posted in censorship, Countries - China, Filtering
Leave a comment
Child porn and teens’ behaviours
Facts: teens post pictures of themselves nude or in pornography positions (at least, sexually explicit). Pennsylvania took the view of charging girls for distributing child porn, boys for receiving and thus possessing it.“20% Of Teens Send Sexually Explicit Photos Of … Continue reading