Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: April 2010
Scam
US Convicts Nigerian 419 Email Scammer (TechDirt, 22 April 2010) – speaks for itself.
Posted in Offences - Fraud, Spamming
Leave a comment
Google search in court
In the story below, I am troubled by two things: – the assumption that a diversity of items being available proves that each of them are rarer to come by (here a yellow hat). How a Google search can help … Continue reading
Copyrights
Just a few additional links about posts published earlier on: “Copyright A Priority For The DOJ; But Identity Fraud Has Fallen Off The List” (TechDirt, 8 April 2010) which contrats with the EU Parliament’s perception: Parliament threatens court action on … Continue reading
Posted in Countries - US, EU policy, Offences - Piracy
Leave a comment
Social networking and risks
Social networks put careers at risk, survey finds (Euractiv, 1 February 2010) with employers looking on the internet profile of applicants! Question of education about impact of the internet in people’s lives. Social networks put minors at risk, EU warns … Continue reading
Hyping issues up: distortions when it comes to internet
1 – “The Real Problem With Internet Comments Isn’t Anonymity” (TechDirt, 12 April 2010). That I would agree; people before internet could be anonymous for the better or for the worse (blackmail…). They could also be discovered and were accepting … Continue reading
Circulation of information and saving of
The Economist On Why Copyright Needs To Return To Its Roots (TechDirt, 20 April 2010). The argument is that the Statute of Queen Anne granted copyrights for only 14 or 21 or 28 years maximum. It was not during the … Continue reading
Posted in Offences - Piracy, Offences - Theft
Leave a comment
Google and China
Rob Hanlon and Stephen Frost, CSR Asia, on 31 Mar 2010, criticised Google’s HR motives to withdraw from Mainland China. The core of their arguments is nothing new: Google was not making any profit, to stay would have been counterproductive … Continue reading
Beware The Seductive Power Of Surveillance
TechDirt – 5 AprilRefers to an article by Jesse Hirsh http://jessehirsh.ca/the-seductive-power-of-surveillance same as previous post: common sense means that surveillance will exist and that we need to assess the risks and stop treating the internet as something different than the … Continue reading
Once Again, A Court Overturns Internet Ban For Convicted Criminal
TechDirt, 5 April 2010 – technology seems to make people lose their common sense. Would we agree to a ban on using the telephone because the offender committed the offence with it?
Are Computers in Africa Really Weapons of Mass Destruction?
I am as skeptic as Kevin Donovan about the correctness of the analysis made in Foreign Policy. Yes, it is true that Africa does not use the latest softwares, but nor does Europe and a lot of other countries. And … Continue reading
Posted in Uncategorized
Leave a comment