Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Category Archives: Surveillance
Cybersecurity: human failure, data leaking and knowledge of it all
Hackers Get Personal Info On 12-Million Apple Users… From An FBI Laptop | Techdirt. 4 September 2012 I like the story in that the FBI spies (illegally probably, and if legally it raises questions of human rights) and the hackers … Continue reading
Private “prosecution” in France triggers investigation
Business & Human Rights : Links.25 July 2012 The post is in English, but the orignal text is in French. The Fédération internationale des droits de l’Homme (FIDH) (the International Human Rights Federation) and the Ligue des droits de l’Homme … Continue reading
Delegating power: constitutional interpretation
Wyden Traps Feds In Their Own Words: ACTA Explanation Opens Up Big Hole In Cybersecurity Bill | Techdirt. 26 July 2012 I am always puzzled how the US State Department can defend such interpretation of legislative texts. Delegation of power … Continue reading
Posted in Countries - France, Countries - US, Surveillance
Leave a comment
Surveillance and (un)democratic societies: blurred borders…
Feds Wait Until Late Friday To Admit That, Yeah, They Ignored The 4th Amendment | Techdirt. 23 July 2012 and the original article from the Wired to which the post refers: http://www.wired.com/dangerroom/2012/07/surveillance-spirit-law/ “U.S. Admits Surveillance Violated Constitution At Least Once”, … Continue reading
Drones: from the military to the civil society
Drone Attack: How We Might Willingly Embrace The Surveillance Society | Techdirt. 15 March 2012, I have been following the use of drones, with notably the fact that the weapon when killing civilians creates questions of international (criminal) law. But … Continue reading
Posted in Anonymity, Data retention, Education, Human Rights, Surveillance
Leave a comment
Detica, SOCA and paedophiles
How BAE Systems fights paedophiles and cyber criminals | This is Money. post by Ruth Sunderland, 26 December 2011 An interesting post one year after the controversial report published by Detica on the cost of cybercrime and commissioned by the … Continue reading
Google, street view and privacy: an update
Google gets qualified praise for privacy changes | Compliance | ZDNet UK. 16 August 2011 From the Information Commissioner’s audit in July, it seems that to complain at least leads to some changes of behaviours, even though Google (and other … Continue reading
Posted in Corporate Responsibility, Privacy, Surveillance
Leave a comment
The biggest threat to privacy: Government or Corporations?
Replay Six Months Of A German Politician’s Life Thanks To His Mobile Phone Data | Techdirt. 29 March 2011 Malte Spitz asked for his location and phone data and put it to the Zeit (one of the biggest German newspaper). … Continue reading
Surveillance technology: which regulation?
La cyberarme de la police | LeMatin.ch. 23 August 2010 An old post I kept in my mail box until I could process it. It is about softwares (CRUSH standing for Criminal Reduction Utilising Statistical History) that allows mapping of … Continue reading
Focusing On Google Getting Emails & Passwords Via Data Collection Misses The Point: Anyone Could Have Done It | Techdirt
Focusing On Google Getting Emails & Passwords Via Data Collection Misses The Point: Anyone Could Have Done It | Techdirt. 22 October 2010