tag:blogger.com,1999:blog-17515660081396306532024-02-20T01:26:10.691+00:00Cybercrime at EssexAudrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.comBlogger457125tag:blogger.com,1999:blog-1751566008139630653.post-37521960382977138442012-05-01T15:16:00.003+01:002012-05-01T15:16:57.472+01:00This blog continues at another addressThis blog continues on http://cybercrimelaws.wordpress.com
The posts have been transferred to the new address.Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-62468731170317809952010-06-16T18:06:00.002+01:002010-06-16T18:10:45.217+01:00AnonymityFrench Senator Proposes Outlawing Anonymous Blogging (TechDirt, 02 June 2010)Twitter Fighting Pennsylvania Subpoena Seeking Names of 2 Tweeters from the NY Times as cited on 20 May 2010 on the Business and HR Watch website http://www.business-humanrights.org/Links/Repository/1001004 some would obviously benefit from anonymity for illegal purposes...! If You're Trying To Sell Insider Info, Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com1tag:blogger.com,1999:blog-1751566008139630653.post-31009761037797143902010-06-16T17:49:00.005+01:002010-06-16T18:06:17.883+01:00Offensive behaviours - distortions<!--StartFragment--> Careful WithThat Fake Social Networking Profile; If You 'Personate' Someone, You Can Go To Jail(TechDirt, 02 June 2010) - the article is critical of the offence: it should not be criminal to impersonate somebody on Facebook in California. I tend to disagree. Using the name of somebody can be criminal whatever the motives. French law considers that the simple use of a name isAudrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-33610854191962074332010-06-16T12:20:00.005+01:002010-06-16T16:29:31.763+01:00Search and Seizures - interception of communication: USFor the US, but to which extent it applies elsewhere?Judge Says DHS Can't Hang Onto Travelers Laptops To Search Much Later Without A Warrant (TechDirt 11 June 2010)Police And Courts Regularly Abusing Wiretapping Laws To Arrest People For Filming Cops Misbehaving In Public Places (TechDirt, 04 June 2010)Court Says Border Patrol Can Take Your Laptop For Off-Site Search If They Have Reasonable Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-11035756142422475252010-06-16T12:11:00.007+01:002010-06-16T17:49:36.512+01:00offensive and harmful content: reaction or education?We may well be in a transition period where people are not fully understanding that what on the net is not necessarily reliable, accurate and representative of the truth. Therefore it may be more an educational issue than a legal issue and to modify the law or use it and distort it appears quite silly. Guy Charged With Harassment For Sending Email Complaint To Senator Jim Bunning (TechDirt, 04 Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-225591561986215062010-06-16T11:36:00.004+01:002010-06-16T17:43:09.971+01:00File sharing and piracythree articles recently, two showing the opposite approaches that can be adopted by courts and one the absurdity of trying to get rid of the file sharing via the ISPsISP Tries To Charge Users To Block File Sharing... Ends Up Installing Malware That Exposes Private Info (TechDirt 14 June 2010)Dutch Court Says Just Publishing Links To A Movie Is Illegal And Must Be Blocked (TechDirt, 04 Jun 2010)Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-17818712045388944072010-06-16T11:11:00.006+01:002010-06-16T17:48:22.263+01:00Wi-fi issues: access and useWhen travelling, if one does not have a smartphone or blackberry, it becomes really annoying not to be able to use wi-fi knowing that lots of networks are available. the silliness of it all appeared when I was in Gare du Nord Paris, compared to St Pancras - London. You would have guessed I was a Eurostar traveller. At St Pancras, free wi-fi; in 45 minutes, I checked my e-mails, sent a couple of Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-71579971324898034452010-05-20T16:17:00.001+01:002010-05-20T16:18:39.173+01:00second life ownership of itemsLawsuit Questions Whether Or Not Second Life Users Really 'Own' Their Virtual Land (TechDirt, 11 May 2010)IP belongs to Linden Lab now; but ambiguity is there about ownershipAudrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com1tag:blogger.com,1999:blog-1751566008139630653.post-82374412627298529462010-05-20T16:13:00.002+01:002010-05-20T16:16:55.589+01:00suicide and free speechAn interesting issue as a lot of countries prohibit assisting suicide but not suicide itself. Moreover, criminal actions are rarely made of speech only; complicity for example requires something else than mere talking and there is an assumption of personal contact, a one to one contact rather than general advertisement.Is It Illegal To Tell People How To Commit Suicide Online? (TechDirt, 14 May Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-12598126443147894492010-05-20T16:07:00.003+01:002010-05-20T16:13:38.906+01:00Piracy: looking at IP in other waysthree articles in a week to remind us that we have to rethink IP because of the new technologies, the same way printing forced us to rethink IP. Interestingly enough, Sage publishers are conducting a survey online about open access journals: whether people are in favour of it and on which terms (free of charge or pay to publish type of model)"EU Digital Agenda Commissioner Admits That 'Piracy' Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-1419556732919948452010-05-20T16:01:00.003+01:002010-05-20T16:07:21.380+01:00Privacy infringementThe two infringements make you wonder what non-famous companies do and how they are controlled:Google Admits It Was Accidentally Collecting Some Open WiFi DataData (TechDirt, 14 May 2010)EU watchdog slams Facebook privacy settings (Euractiv, 14 May 2010)and new challenges ahead...Does Storing Your Documents In 'The Cloud' Mean The Gov't Has Easier Access To It? (TechDirt, 5 May 2010) Obviously Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-81481574701130688302010-05-20T15:40:00.003+01:002010-05-20T16:01:01.462+01:00Digital Economy Act: after all the controversy, may well be droppedUK Politicians Looking To Repeal Digital Economy Act (TechDirt, 19 March 2010)London Wants To Offer Full WiFi Coverage... But How Will That Work With The Digital Economy Act? (TechDirt, 18 March 2010)UK Regulator Says Digital Economy Act Only Applies To Big Wireline ISPs (TechDirt, 18 March 2010)Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-1696603328273825652010-05-18T10:52:00.002+01:002010-05-18T10:54:40.727+01:00Critical Legal Studies Conference 2010With a vested interest as I am chairing stream 9 of the Critical Legal Conference 2010 @ Utrecht in September 2010 : The WWW: great expectations or great disenchantments?To see all the streams of the Conference on Modernities, click hereAudrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-53745592101093341302010-05-12T14:24:00.005+01:002010-05-18T10:52:27.478+01:00Secondary source analyses Italian's judgment on GoogleLegal Analysis Of Italian Criminal Conviction Of Google Execs Says Judge Made A Big Legal Error (TechDirt, 30 April 2010)Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-4223560879312997072010-05-07T14:56:00.002+01:002010-05-07T15:02:14.246+01:00enforcing the law: France and US updatesIn France, JDN reported on the Institut de la recherche criminelle de la gendarmerie nationale (the Institute on criminal research of the Gendarmerie nationale, the French police force) and its work in the Fort Rosny-sous-bois (the Fortress...). databases, recognition of images, techniques to recover data... - 12 February 2010More recently, news on the US Cybersecurity Act which first draft was Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-34358712360570171092010-05-07T14:30:00.002+01:002010-05-07T14:43:35.963+01:00Patterns"Cybercriminals target non-conventional appliances" (ZDnet.co.uk, 09 April 2010). not surprising, and among the devices: mobiles phones, USB flash drives and peripherals.and DDOS attacks linked with extortion/blackmail notices, "Chinese DDoS attacks hit News Limited" (ZDnet.co.uk, 14 April 2010)Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-66228724500772672412010-05-07T14:23:00.003+01:002010-05-07T14:46:40.733+01:00Criminalisation of DRM bypassing - ACTA becoming transparent?If the process was certainly not transparent, the draft is at last published. Will comments be published and listened to?"Acta copyright treaty draft gets first public airing" (ZDnet.co.uk, 21 April 2010)and earlier on, the EU Parliament's rejection of the treaty by 633 to 13! "European Parliament votes down Acta treaty" (ZDnet.co.uk, 11 March 2010)Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-30166861434484210222010-05-07T14:12:00.003+01:002010-05-07T15:16:32.589+01:00The gold mine: ID and other data theftsBetween the NHS desktops that were hacked and controlled as part of a botnet, and facebook accounts also hacked, it is obvious that security and privacy are at the heart of cybercrime. Accessing illegally and controlling data/computers is at the heart of a successful criminal entreprise."Over 1,000 NHS desktops part of botnet, says Symantec" (ZDnet.co.uk, 23 April 2010)"iDefense: 1.5 million Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-12274137804639232632010-05-07T13:52:00.004+01:002010-05-07T14:48:43.009+01:00Privacy of Wi-fi data: Google Street ViewA very interesting story that does not seem to make the big headlines despite its crucial importance in my view.Google Street View, already criticised for other reasons, all linked to privacy, acknowledged that it takes the Wi-Fi details of people, i.e. their MAC addresses, that will be able to any user using location-based services. In other words, your neighbour or your potential hacker can Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-90085093404103384002010-05-07T13:40:00.003+01:002010-05-20T16:21:08.160+01:00Security againSecurity seems to be the word of the week.The EU commission wants to create an agency to foster better collaboration in cyber-investigations, albeit the UK, Germany and France remain to be convinced. One concerns is also the overlap with ENISA, in addition to the fact that ENISA has not been the success story that it was hoped for when it was launched. "EU to establish cybercrime agency" Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-61680276771161375212010-05-07T13:00:00.005+01:002010-05-07T13:30:49.213+01:00Security review by Symantec and other issues of web securitySymantec published its report analysing cyber-issues in 2009. Most of the attacks continue to come from the US (19%), followed by China (8%) and a new comer, Brazil (6%). The bulk of the attacks (37%) focuses on acquiring data, then it is accessing structural tools of companies (26%) and piracy (15%). Fraud represents only 2%. It confirms that the new value or currency today is data, rather than Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-82008184819513520932010-04-23T14:09:00.000+01:002010-04-23T14:10:14.606+01:00ScamUS Convicts Nigerian 419 Email Scammer (TechDirt, 22 April 2010) - speaks for itself.Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-68143593104534676082010-04-23T13:26:00.004+01:002010-04-23T13:29:55.700+01:00Google search in courtIn the story below, I am troubled by two things:- the assumption that a diversity of items being available proves that each of them are rarer to come by (here a yellow hat). How a Google search can help assessing this baffles me. Statistics of sale would be more relevant. Education of judges in how to use Google and how Google gathers its information?- why indeed a judge can 'google' but not Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-12961911315297541002010-04-23T13:12:00.003+01:002010-04-23T13:17:26.759+01:00CopyrightsJust a few additional links about posts published earlier on:"Copyright A Priority For The DOJ; But Identity Fraud Has Fallen Off The List" (TechDirt, 8 April 2010)which contrats with the EU Parliament's perception: Parliament threatens court action on anti-piracy treaty (Euractiv, 10 March 2010)and the side effects of wanting more inforcement in non-democratic countries: "Careful What You Wish Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0tag:blogger.com,1999:blog-1751566008139630653.post-31300608400489219482010-04-23T13:07:00.003+01:002010-04-23T13:53:25.970+01:00Social networking and risksSocial networks put careers at risk, survey finds (Euractiv, 1 February 2010) with employers looking on the internet profile of applicants! Question of education about impact of the internet in people's lives.Social networks put minors at risk, EU warns (Euractiv, 10 February 2010), a campaign which echoes ENISA reports about the use of internet/virtual worlds by minors. Again, educationEU to Audrey Guinchardhttp://www.blogger.com/profile/04796806876837663741noreply@blogger.com0