Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: March 2010
Interpretation of traditional offences
Three scenari demonstrating how the internet affects the interpretation of criminal law Sexting: no child porn for the US courts“Court Rejects PA DAs Attempt To Charge Teens For Sexting Themselves“, TechDirt, 18 March 2010 – The court is right in … Continue reading
Meaning of "without authorisation"
Quite interesting facts and legal issue of defining what is “without authorisation”. In the US, an employee used his employer’s computer to access personal information that he then deleted. The seventh circuit court found it was hacking but the ninth … Continue reading
Google, China, HK
“Google Approach In China: Redirect To Hong Kong“, TechDirt, 22 March 2010with the original post from Google also from 22 March 2010.What I was intringued by in Google’s statement was the following sentence: “We believe this new approach of providing … Continue reading
Posted in censorship, Countries - China, Offences - Piracy
Leave a comment
Copyrights: our level of acceptance in surveillance and prosecution techniques
Self-explanatory and completely in line to my point of view about the level and type of surveillance we accept online being disproportionate to what we would tolerate offline; it is like the spirit of the Enlightenment being swallowed by the … Continue reading
Discipline and surveillance: school’s attitude
Pretty silly attitude for a school: education should be about transparency of thinking.And of course completely illegal, thus scary: “School Accused Of Spying On Kids In Their Homes With Spyware That Secretly Activated Webcams” TechDirt 18 February 2010
Posted in Discipline, Prevention - Security, Surveillance
Leave a comment
Passport control: awaking the dead
“Is Elvis Dead? Who Knows, But His Passport Made It Through Airport Security In Amsterdam“, TechDirt 01 March 2010 I like the irony of it all. Trying to secure identities of people, and yet failing badly…
Posted in Anonymity, Prevention - Security, Privacy
Leave a comment
Copyrights
The bug in HADOPI 2 (French version of three strikes law for piracy) was “patched” by governmental decree or statutory instrument, with the possibility to ask for damages in the criminal proceedings. But some more difficulties have been highlighted, mainly … Continue reading
Plagiarism
Although I would agree that there is a difference between a print mindset and an internet mindset, I disagree strongly with somebody who argues that the internet is about linking and that not to acknowledge sources is OK. Of course, … Continue reading
Posted in Offences - Piracy
Leave a comment
Google’s liability in Italy
A few other articles on the three Google’s executives declared responsible in Italy because of a YouTube video. Columnist Claims Italy’s Google Verdict Makes Sense, TechDirt, 9 March 2010 (with M. Masnick obviously disagreeing) and a speech by Lessign at … Continue reading
Posted in Freedom of speech, Providers' liability, Scarcity
Leave a comment
The power of images and data
Three articles, all connected around several themes. The first one is about Chatroulette’s site which works on the basis of logging in for random chats with people all over the world (well, at least that is what they tell you). … Continue reading