Internet and Commun...
 
Notifications
Clear all

Internet and Communications Surveillance

1 Posts
1 Users
0 Reactions
196 Views
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
Topic starter  

Internet and Communications Surveillance

Two interesting articles defining to some extent the use of technological techniques and tools that are deployed.

http//www.nytimes.com/2011/09/02/opinion/political-repression-2-0.html?_r=2

http//opennet.net/west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011

Imagine you are asked to do a case and provide a quote where the engaging instructions state Can you identify the location of the perpetrator in this cybercrime matter? Imagine all the possibilities? Cybercrime doesn't even start to identify the real technological investigation, but it is clear for appropriate identification purposes the title "cybercrime" doesn't do anymore than create a blur as to what it is actually referring.

Moreover, a concern might be whether cybercrime actually might just be used to produce an output evidence with the reduction or removal of the technical understanding of what is behind it or a mere passing reference to where the suggested evidence came from. That being so the evidence simply may become the product of someone writing down a car number plate in the dust on the road. The later maybe evidence, but it is technology from many disciplines ( http//trewmte.blogspot.com/2011/09/cybercrime-procedures-deterrent-and.html ) that maybe used in cybercrime and not dust on the road.


   
Quote
Share: