Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Category Archives: Spamming
Scam
US Convicts Nigerian 419 Email Scammer (TechDirt, 22 April 2010) – speaks for itself.
Posted in Offences - Fraud, Spamming
Leave a comment
Fraud, spam and co
An old article I retrieved today from my pile. The author, Charles Arthur, wonder whether convicting spammers in the US will put an end to spam. A rather pessimist response, understandably. What interested me was the fact that spam can … Continue reading
Posted in Offences - Fraud, Prevention - Security, Privacy, Spamming
Leave a comment
The end of the road…
“‘Godfather of Spam’ sentenced to four years” (ZDnet.co.uk, 25 November 2009) and £ 150,000 to forfeit, if Alan Ralsky has them….
Posted in Spamming
Leave a comment
Virtual worlds and money makers
well, anybody ready this blog would have guessed that the title of the post attracted me. It’s about scams in virtual worlds to get people to sign/buy things they don’t really need. It’s a technique which builds up on what … Continue reading
Posted in Offences - Fraud, Spamming, Virtual Worlds
Leave a comment
Twitter issues
A judge banned the use of Twitter in the courtroom; it is a form of broadcast in the sense that put all together the threads form a good picture of what happened; on the other hand, one does not need … Continue reading
Funny side of sentencing
I found it really funny: a spammer realising that the fine cannot be paid by his insurance!Spammer Discovers His Insurance Policy Doesn’t Cover $6 Million Spam Fines (TechDirt, 3 August 2009)
Posted in Sentencing, Spamming
Leave a comment
Diversity of access to computers/information
URL website based to distribute malware:Trojan swipes money from your banking site (ZDNet.co.uk, 30 september 2009) with a similar method:Facebook closes fake profiles spreading malware (ZDnet.co.uk, 2 oct 2009)Fake Outlook Web Access update sets malware trap (ZDnet.co.uk, 16 October 2009) … Continue reading
Spam and scam: trends confirmed
why spam continues to fill up our boxes? because some of us continue to fall for it, enough obviously to make spam a viable option.12% of Americans do open spam messages and fall in the trap according to the Messaging … Continue reading
Posted in Spamming
Leave a comment
DDOS practice by security firms
In order to shut down those sending spam and scams (particularly phishing), security firms can identify the original server and then send e-mails to shut down the site Sébastien Darnault (MarkMonitor)”Nous bombardons les serveurs de mails frauduleux jusqu’à les faire … Continue reading
Damages by spamming
Harm is a key concept, although elusive concept, to justify crimininalisation of behaviours. Here the case seems to justify the policy to criminalise spamming “Spammers Ordered To Pay $236 Million” (8 October 2008)
Posted in Spamming
Leave a comment