Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Category Archives: Investigation-1- Police forces (training)
IT expertise for law enforcement
Police hunt down IT forensics expertise (ZDnet.co.uk, 02 october 2009) the Metropolitan police puts £32 millions aside to buy IT equipments… And the US Governement is looking for 10000 IT experts US on hunt for 1,000 cybersecurity experts (ZDnet.co.uk, 05 … Continue reading
A centre for training, research and education in cybercrime
See teh website of the 2CENTRE http://www.2centre.eu/node/1 and the University of Troyes (France) being a partner to the project “L’Université de technologie de Troyes gonfle ses formations en cybercriminalité” (JDN, 12 March 2009)
Fraud – clickjacking increase; and police training
The American firm Clic Forensics registers a sharp increase in clickjacking, fraudulent modification of HTML code underlying a weblink on a website.“Recrudescence de la fraude au clic fin 2008” (JDN, 30 January 2009) – the article shows graphs that are … Continue reading
The difficult adaptation of police forces
It’s about India, but frankly, the same article could probably be written in any country. The basic police officer has not been trained to detect and investigate cybercrimes. Nothing to be ashamed off, but something to act upon by various … Continue reading
Investigation – Police forces (need of and training)
The difficult adaptation of police forces Police e-crime unit calls for industry aid Inadequate training of police forces – collateral damages Tuesday, 25 November 2008 New e-crime police – a welcomed addition? New UK e-crime police training Response to cybercrime: … Continue reading
Inadequate training of police forces – collateral damages
A bit ironic but not enough when thinking about Julie Amero’s life. If the information is really true, and there is no reason to doubt, this is a scandal both in terms of training of law enforcement officials, and in … Continue reading
New e-crime police – a welcomed addition?
Fraud being one of the most common crimes in cyberspace, it’s good to see the National Fraud squad welcoming the creation of the e-crime police in the UK “National anti-fraud centre ready for action” (3 October 2008) Meanwhile the City … Continue reading
New UK e-crime police training
They want to recruit from the technology industry. Providing they have enough money to pay the persons! See “Fears over funding for police e-crime unit ” (2 October 2008)No problem with that, but training in law and criminal law should … Continue reading
Response to cybercrime: specialised investigation forces?
Recurrent debate of the UK, since the Government went against the trend to establish specialised forces for investigation of cybercrime. Whether the original decision was money-driven or not, what appears clearly now is that even businesses see they cannot afford … Continue reading