Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Category Archives: Social networking – Twitter
Joke or menace? context is all
BBC News – Paul Chambers airport bomb tweet appeal to be heard again. 28 May 2012 Interesting to see that the High Court judges could not agree on whether Paul Chambers’ tweet should be taken seriously or not, hence would … Continue reading
The use of social networking: crime and no crime
Court Finds Law Blocking Teachers From Friending Students ‘Staggering’; Blocks Implementation | Techdirt. 29 August 2011 Even though Facebook must be used with precaution by teachers, if they link with their pupils/students, to ban it outright becomes silly. It is … Continue reading
Twitter’s policy to censor
Twitter Decides To Censor Locally, Rather Than Block Globally, In Response To Government Demands | Techdirt. 26 January 2012 “Misguided Twitter Protests… And Why Twitter Could Have Explained Itself Better“, TechDirt, 30 January 2012 and for a list of comments … Continue reading
FP Tech Desk: Twitter CEO to China: Leave our users alone! | FP Posted | Financial Post
FP Tech Desk: Twitter CEO to China: Leave our users alone! | FP Posted | Financial Post. 19 November 2010 Cheng Jianping was arrested October 27, 2010, after retweeting her boyfriend’s tweet. Given that Twitter is banned, as the article’s … Continue reading
Anonymity
French Senator Proposes Outlawing Anonymous Blogging (TechDirt, 02 June 2010) Twitter Fighting Pennsylvania Subpoena Seeking Names of 2 Tweeters from the NY Times as cited on 20 May 2010 on the Business and HR Watch website http://www.business-humanrights.org/Links/Repository/1001004 some would obviously … Continue reading
The power of words
After the Robin Hood airport closed (Doncaster, Sheffield) due to heavy snowfall, Mr. Chamber wrote a twitter post that was meant as a joke to friends and ended to be taken seriously by police officers. I quote the terms as … Continue reading
Use of social networking
The tweet was silly, but the reaction to it is no better. Everything is out of proportion on both sides. Maybe we should set a course for both on how to use Twitter and social networking? “UK Man Arrested And … Continue reading
Surveillance
“Rather Than Blaming Twitter, NY Police Using It To Track Gang Activity” (TechDirt, 01 December 2009)
Failure to act as crime?
Wonder why indeed it is considered as a crime. Criminal law rarely accepts omissions or failure to act as constituing the offence. Plus which offence? Label Exec Arrested For Not Using Twitter To Disperse Crowd At Mall To See Singer … Continue reading
Posted in Social networking - Twitter
Leave a comment
Due process and Twitter
Due process…. Twitter Banning Satirical ‘Fake’ Versions Of Politicians? (TechDirt, 28 October 2009)