Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Category Archives: Countries – UK
A threat on Facebook: a crime?
Should Making A Threat On Facebook Be A Crime? | Techdirt. 22 August 2012 the answer is yes as long as the circumstances fit within the legal definition of the crime. it is a question as much of common sense … Continue reading
Pussy Riots and Wikileaks: infamous comparisons?
The Same Day Russia Sentences Pussy Riot, It Condemns The UK Over Julian Assange | Techdirt. 20th August 2012 I will come back on the Pussy Riots case (I have a few words to say on Putin’s comments that the … Continue reading
The Declaration Of Internet Freedom: launch of
Announcing The Declaration Of Internet Freedom | Techdirt.2nd July 2012 A title that is self-explanatory, but given the last Russian and Chinese attempts to control the internet (plus the UK with the new Data COmmunication Bill), it is pertinent to … Continue reading
La citadelle du crime: Citadel or crime makes money
La citadelle du crime « Criminalités numériques. 11 February 2012 the post is in French, but a few fundamental facts confirm what I have been writing many times: crime makes money and particularly cybercrime. A botnet named Citadel (came out … Continue reading
Joke or menace? context is all
BBC News – Paul Chambers airport bomb tweet appeal to be heard again. 28 May 2012 Interesting to see that the High Court judges could not agree on whether Paul Chambers’ tweet should be taken seriously or not, hence would … Continue reading
Don’t preach what you don’t do
China Gleefully Uses UK Desire For Censorship To Validate Its Own Censorship | Techdirt. 12 August 2011 About the riots in England, but the same can be said about Europe having sold surveillance technologies over the years to most Middle … Continue reading
Overreaction = overcriminalisation
From Lori Drew To Dharun Ravi, Punishing People Based On Others’ Suicides Is A Mistake | Techdirt.19 March 2012 The post is quite a long one and cites Paul Butler a former US prosecutor who argues for jury nullification (systemic … Continue reading
Surveillance policies: shall we play gods?
Tim Berners-Lee urges government to stop the snooping bill | Technology | The Guardian. 17 April 2012 The ability to know everything about everybody has been a constant theme of humanity. Literature, religion are full of those stories where people … Continue reading
Posted in Countries - UK, Data retention, Human Rights, Privacy
Leave a comment
Copyrights and censorship
UK High Court Expands Censorship Regime: Orders The Pirate Bay To Be Blocked | Techdirt. 30 April 2012 I pass on the comment made because I would like to put the post in perspective with others: – one of the … Continue reading
Posted in censorship, Countries - UK, Offences - Piracy
Leave a comment
Detica, SOCA and paedophiles
How BAE Systems fights paedophiles and cyber criminals | This is Money. post by Ruth Sunderland, 26 December 2011 An interesting post one year after the controversial report published by Detica on the cost of cybercrime and commissioned by the … Continue reading