All Articles

Where should cyberlaw enforcement be centered?

I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this research, policies should be devised to regulate ISPs not to provide services for hosting such websites. Enforcing this policy cannot be done from a centralized location. Why don’t we share…

All Articles

How Pervasive is Phishing?

Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing and crime-ware map, which shows world-wide distribution. 2. GAIN technology from InternetPerils which claims highly effective ways to monitor internet traffic using efficient data pattern analysis. Good tool that can…

All Articles

Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?

Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and regulations which will enable easy coordinated crime-fighting between nations. Its not about questioning who is accusing who, rather the grave situation here to find am amicable solution for international peace…

All Articles

USA Patriot Act and Data mining

I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as – Wiretap Statute (Title III): Electronic Communications Privacy Act Computer Fraud and Abuse Act Foreign Intelligence Surveillance Act Family Education Rights and Privacy Act Pen Register and…