Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: May 2010
second life ownership of items
Lawsuit Questions Whether Or Not Second Life Users Really ‘Own’ Their Virtual Land (TechDirt, 11 May 2010) IP belongs to Linden Lab now; but ambiguity is there about ownership
Posted in Virtual Worlds
1 Comment
suicide and free speech
An interesting issue as a lot of countries prohibit assisting suicide but not suicide itself. Moreover, criminal actions are rarely made of speech only; complicity for example requires something else than mere talking and there is an assumption of personal … Continue reading
Piracy: looking at IP in other ways
three articles in a week to remind us that we have to rethink IP because of the new technologies, the same way printing forced us to rethink IP. Interestingly enough, Sage publishers are conducting a survey online about open access … Continue reading
Privacy infringement
The two infringements make you wonder what non-famous companies do and how they are controlled: Google Admits It Was Accidentally Collecting Some Open WiFi DataData (TechDirt, 14 May 2010)EU watchdog slams Facebook privacy settings (Euractiv, 14 May 2010) and new … Continue reading
Digital Economy Act: after all the controversy, may well be dropped
UK Politicians Looking To Repeal Digital Economy Act (TechDirt, 19 March 2010) London Wants To Offer Full WiFi Coverage… But How Will That Work With The Digital Economy Act? (TechDirt, 18 March 2010) UK Regulator Says Digital Economy Act Only … Continue reading
Posted in Countries - UK
Leave a comment
Critical Legal Studies Conference 2010
With a vested interest as I am chairing stream 9 of the Critical Legal Conference 2010 @ Utrecht in September 2010 : The WWW: great expectations or great disenchantments? To see all the streams of the Conference on Modernities, click … Continue reading
Secondary source analyses Italian’s judgment on Google
Legal Analysis Of Italian Criminal Conviction Of Google Execs Says Judge Made A Big Legal Error (TechDirt, 30 April 2010)
Posted in Providers' liability
Leave a comment
enforcing the law: France and US updates
In France, JDN reported on the Institut de la recherche criminelle de la gendarmerie nationale (the Institute on criminal research of the Gendarmerie nationale, the French police force) and its work in the Fort Rosny-sous-bois (the Fortress…). databases, recognition of … Continue reading
Posted in Uncategorized
Leave a comment
Patterns
“Cybercriminals target non-conventional appliances” (ZDnet.co.uk, 09 April 2010). not surprising, and among the devices: mobiles phones, USB flash drives and peripherals. and DDOS attacks linked with extortion/blackmail notices, “Chinese DDoS attacks hit News Limited” (ZDnet.co.uk, 14 April 2010)
Criminalisation of DRM bypassing – ACTA becoming transparent?
If the process was certainly not transparent, the draft is at last published. Will comments be published and listened to? “Acta copyright treaty draft gets first public airing” (ZDnet.co.uk, 21 April 2010) and earlier on, the EU Parliament’s rejection of … Continue reading
Posted in EU policy, Offences - Piracy
Leave a comment