Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: April 2009
Help of technologies in investigations
Police eye tech for reporting live crimes via video (ZDnet.co.uk, 27 April 2009) and use of image-recognition technology to detect crimeCriminal procedure will have to regulate the use of this technology
Botnets
Finjan finds botnet of 1.9m infected computers (ZDnet, 24 April 2009) Botnet expert: Cut cash flow to cybercriminals (ZDnet. 23 April 2009)self explanatory even though fraud can probably not apply
Spying
Cyberspies breach US fighter-jet project: Report (ZDnet.co.uk, 21 April 2009) and the hype around viruses/worms that hide more important issues for international peace: Forget Conficker — focus on the real threats US official: We are under cyberattack all the time … Continue reading
Posted in Surveillance
Leave a comment
Twitter – good and bad uses
“Police Learning To Make Good Use Of Twitter” (TechDirt, 15 April 2009) “Latest Unsubstantiated Claim: Twitter Makes You Immoral” (TechDirt, 14 April 2009) Indeed, technology is neither good or bad, but it is never neutral. On that theme, see Hildebrandt, … Continue reading
data retention, sale and fraud
“Report: Online black market for personal data thriving” (EurActiv, 16 April 2009) building on the Symantec report for 2008.as long as data is detained/retained, risks about its use exist. Hence the interesting step taken by a Swedish ISP which destroys … Continue reading
Use of courts or mediation?
Beyond cybercrime obviously, but touching on an important issue: speed. France launched an experiment, that to use mediation instead of going to trial for small issues when linked with the use of internet. There is no obligation to use mediation … Continue reading
Posted in Trial - or mediation
Leave a comment
Should we go for more powers or more effective controls?
“Congress Ponders Cybersecurity Power Grab” (TechDirt, 20 April 2009)another bill and for more powers to control people. The article touches upon a theme touched upon in a book I am currently reading, that of McGuire, Hypercrime – The new geometry … Continue reading
Posted in Uncategorized
Leave a comment
Cyber attack, reaction/action
“Estonia leads the way in countering cyber-attacks” (EurActiv.com, 9 April 2009) “Report: US electricity grid hacked by spies” (ZDnet.co.uk, 9 April 2009) “Pentagon forks out $100m for cyberattack cleanup” (ZDnet.co.uk, 8 April 2009)
Google and Obama’s team: close links, conflict of interests?
A very interesting analysis from the French JDNet, 7 April 2009 of the link between Obama’s team and Google.It’s no secret that Obama used the web extensively to promote his campaign and that donations of 10 dollars only succeeded in … Continue reading
Posted in Uncategorized
Leave a comment
Games and no crime
Self-explanatory and for those who don’t speak French: companies/firms use games, sometimes created for them, to either train employees or filter applicants. “10 jeux vidéo très sérieux pour mieux manager” (JDN, 7 April 2009)
Posted in Gaming
Leave a comment