Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: February 2009
Sex offenders and the use of Facebook
Chris Kelly, Facebook’s chief privacy officer explained how sex offenders are banned from Facebook. “We have been working productively with General Blumenthal and other attorneys general to keep sex offenders off Facebook, and to assure that those who attempt use … Continue reading
Posted in Filtering, Offences - Obscenity, Sentencing
1 Comment
Fraud, the banks and firms
Well, one would have thought that the banks were at the top of the security game to avoid unnecessary losses. It seems that the last scam targeted banks quite successfully. Arguably, citybank did not lose the money because at the … Continue reading
Posted in Offences - Fraud, Prevention - Security
Leave a comment
Skype and interception of communication (update)
A very interesting article (because of the details provided) has been written in French. The reason why Skype’s communications are difficult to intercept is that they are using encryption keys that Skype, so far, has refused to communicate.A software is … Continue reading
ISPs not effective cops?
When I have the time, I’ll read it more carefully, but the research is interesting. If it is proven that ISPs are not effective cops, then there is a practical for forbidding them to act as cops, independently of human … Continue reading
Posted in Providers' liability
Leave a comment
sentencing and corruption
Corruption not where you would imagine: judges seem to have sent children to detention centers more than necessary because of financial interests in doing so. How come the system was set up in such a way that corruption was that … Continue reading
Posted in Sentencing
Leave a comment
Skype and interception of communications
Skype does not allow for easy wiretapping of conversations. Anyone can imagine the potential for criminals, but also, on the good side, for dissidents. However, I don’t think the loophole will remain for long; somebody somewhere will invent a good … Continue reading
Paying people to filter the internet
China seems to now pay people per porn website discovered and reported. Being cynical, I wonder to which extent this solution might be cheaper than hiring them as full-time employees for the Great Firewall. A future law and economics study?In … Continue reading
Need for special courts for cybercrime?
In India, Justice V.S. Sirpurkar of the Supreme Court explains that specialised courts would be better suited to tackle cybercrime and e-commerce issues. I am not sure I would agree on the conclusion. I would certainly agree that judges, as … Continue reading
Posted in Uncategorized
Leave a comment
Localisation of e-mail senders via Google mail
Quite a scary feature for Google mail users: according to the French JDN (web journal), Google will make available to other users the geographical localisation of users when they send e-mails with city/village, region and country.In terms of privacy, it … Continue reading
Posted in Investigation-3- Miscelleanous
1 Comment
Disappeared posts – hidden filtering
As creepy as the previous one, although the persons involve do not suffer like this woman and her children did and do. Apparently, posts from bloggers disappear when related to music and copyrights.How on earth can Google accaparate the right … Continue reading
Posted in censorship, Filtering
Leave a comment