Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Category Archives: Offences – Hacking (unauthorised access)
Cybersecurity: human failure, data leaking and knowledge of it all
Hackers Get Personal Info On 12-Million Apple Users… From An FBI Laptop | Techdirt. 4 September 2012 I like the story in that the FBI spies (illegally probably, and if legally it raises questions of human rights) and the hackers … Continue reading
LulzSec
Lulzera bien qui lulzera le dernier | Chaire de recherche du Canada en sécurité, identité et technologie. Benoit Dupont, 6 march 2012 In French, but with links to documents in English about LulzSec arrests and co. The title of the … Continue reading
Workplace behaviours are not all crimes
Is Destroying A Hard Drive On A Work Issued Computer The Equivalent Of Hacking Or Fraud? | Techdirt. 6 Septmber 2011 To equate replacing a hard drive (after having destroyed the old one to wipe out information) with fraud or … Continue reading
Stuxnet malware and Siemens: cyberwar, security and other issues
Are We Talking About ‘Cyberwar’ Or Massive Incompetence? | Techdirt. 11 August 2011 An old post but given the current context of “Flame”, the new malware running around in the Middle East, still of relevance. Stuxnet, like today Flame, was … Continue reading
Filtering issues
How Even Highly-Targeted Censorship Can Lead To Overblocking | Techdirt. 23 December 2011 “Former DHS Assistant Secretary Stewart Baker On SOPA 2.0: Still A Disaster For Cybersecurity“, TechDirt, 15 December 2011, where the person explains that a device created to … Continue reading
Bradley Manning Formally Charged
Bradley Manning Formally Charged; Defers Plea | Techdirt. 23 February 2012 nothing to add: why so long after arrest and imprisonment? where are the basic human rights we ask others to comply with? how foolish are we to renegate what … Continue reading
The Pirate Bay: offshore?
The Pirate Bay Claims It’s Going To Host The Site Via Drones Flying Over International Waters | Techdirt. 19 March 2012 Reading the post, I thought of Radio Caroline in the sixties: some people set up the radio to hear … Continue reading
Myths and hypes
Hollywood Hackers Vs. Reality | Techdirt. 8 March 2012 Have not seen the movie, but if this post is accurate (and probably is), then Hollywood really had not a clue about how most unauthorised access to data is gained: human … Continue reading
Money, money, money: better to be a hacker than a traditional bank robber
Cybercrime: is it out of control? | Technology | The Guardian. Posted by Misha Glenny, 21 September 2011 Not out of control, well as long as law enforcement wake up to reality, but certainly out of scale with more … Continue reading
Private lives, jobs, surveillance and voyeurism
Court: If You Use Your Computer For Anything Your Employer Doesn’t Like, You May Have Committed A Crime | Techdirt. 29 April 2011 I have not had the time to check the judgment itself, but the interpretation does not seem … Continue reading