skip to main
|
skip to sidebar
CYB3RCRIM3
Observations on technology, law and lawlessness.
Sorry, the page you were looking for in this blog does not exist.
Sorry, the page you were looking for in this blog does not exist.
Home
Subscribe to:
Posts (Atom)
About Me
Susan Brenner
Susan Brenner is a law professor who speaks, writes and consults on cybercrime and cyberconflict.
View my complete profile
Followers
Subscribe!
Blog Archive
▼
2017
(100)
▼
September
(7)
The University Computer Lab, the Pro Se Complaint ...
Child Sex Trafficking and Bypassing Security on a ...
Forgery, Theft by Unlawful Taking and Tamper with/...
First Degree Perjury, Attempt to Influence a Publi...
The Judge, the Email and “Violating a Criminal Pro...
“Doing Something on a Laptop,” Ineffective Assista...
Murder, the Facebook Message and Self-Defense
►
August
(12)
►
July
(13)
►
June
(13)
►
May
(10)
►
April
(11)
►
March
(13)
►
February
(10)
►
January
(11)
►
2016
(141)
►
December
(11)
►
November
(12)
►
October
(13)
►
September
(12)
►
August
(14)
►
July
(12)
►
June
(13)
►
May
(11)
►
April
(13)
►
March
(12)
►
February
(5)
►
January
(13)
►
2015
(162)
►
December
(14)
►
November
(13)
►
October
(14)
►
September
(13)
►
August
(14)
►
July
(16)
►
June
(14)
►
May
(13)
►
April
(13)
►
March
(13)
►
February
(12)
►
January
(13)
►
2014
(154)
►
December
(14)
►
November
(12)
►
October
(14)
►
September
(13)
►
August
(13)
►
July
(13)
►
June
(13)
►
May
(13)
►
April
(14)
►
March
(9)
►
February
(12)
►
January
(14)
►
2013
(157)
►
December
(13)
►
November
(13)
►
October
(13)
►
September
(13)
►
August
(13)
►
July
(14)
►
June
(12)
►
May
(14)
►
April
(13)
►
March
(13)
►
February
(13)
►
January
(13)
►
2012
(159)
►
December
(13)
►
November
(13)
►
October
(13)
►
September
(13)
►
August
(14)
►
July
(13)
►
June
(13)
►
May
(13)
►
April
(13)
►
March
(14)
►
February
(14)
►
January
(13)
►
2011
(160)
►
December
(13)
►
November
(13)
►
October
(15)
►
September
(13)
►
August
(14)
►
July
(13)
►
June
(13)
►
May
(14)
►
April
(13)
►
March
(13)
►
February
(13)
►
January
(13)
►
2010
(164)
►
December
(15)
►
November
(13)
►
October
(13)
►
September
(16)
►
August
(13)
►
July
(13)
►
June
(13)
►
May
(14)
►
April
(13)
►
March
(15)
►
February
(12)
►
January
(14)
►
2009
(166)
►
December
(13)
►
November
(13)
►
October
(13)
►
September
(15)
►
August
(17)
►
July
(14)
►
June
(14)
►
May
(14)
►
April
(14)
►
March
(13)
►
February
(12)
►
January
(14)
►
2008
(117)
►
December
(16)
►
November
(12)
►
October
(15)
►
September
(9)
►
August
(13)
►
July
(14)
►
June
(16)
►
May
(20)
►
February
(2)
►
2007
(52)
►
December
(5)
►
November
(6)
►
October
(2)
►
September
(4)
►
August
(3)
►
July
(6)
►
June
(6)
►
May
(9)
►
April
(3)
►
March
(4)
►
February
(3)
►
January
(1)
►
2006
(73)
►
December
(3)
►
November
(7)
►
October
(7)
►
September
(6)
►
August
(5)
►
July
(4)
►
June
(5)
►
May
(9)
►
April
(8)
►
March
(4)
►
February
(15)
Search This Blog
Articles and Other Resources
"At Light Speed"
"Kiddie Crime"?: The Utility of Criminal Law in Controlling Cyberbullying
Complicit Publication
Computer Crime Research Center
Cyberbullying
Cybercrime (2010 book)
Cybercrime Jurisdiction
Cybercrime Metrics
Cyberthreats (2009 book)
Cyberthreats and the Limits of Bureaucratic Control
Department of Justice
Distributed Security
Fantasy Crime
Fourth Amendment & Ubiquitous Technology
Google News
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1797082
ITU Toolkit for Cybercrime Legislation
Jacksonville Criminal Defense Lawyer Blog
Law in an Era of Smart Technology (2008 book)
Nanocrime?
Online Defamation
Remote Searches and Virtual Force
State Cybercrime Laws
Virtual Crime