{"guid":"444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","title":"Computer crime and criminal law 101","subtitle":null,"slug":"SHA2017-288-computer_crime_and_criminal_law_101","link":"https://c3voc.de","description":"Legal lecture on Cybercrime for non-legal-experts\n\n#Society #Politics","original_language":"eng","persons":["Noud van Gemert"],"tags":["SHA2017","288"],"view_count":216,"promoted":false,"date":"2017-08-07T00:00:00.000+02:00","release_date":"2017-08-07T02:00:00.000+02:00","updated_at":"2025-01-13T07:15:04.148+01:00","length":3817,"duration":3817,"thumb_url":"https://static.media.ccc.de/media/events/SHA2017/288-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/SHA2017/288-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/SHA2017/444f2c42-36c5-4cc2-9a1f-2d9894eedd6d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/SHA2017/444f2c42-36c5-4cc2-9a1f-2d9894eedd6d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SHA2017-288-computer_crime_and_criminal_law_101","url":"https://api.media.ccc.de/public/events/444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","conference_title":"SHA2017: Still Hacking Anyway","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017","related":[{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":15},{"event_id":4247,"event_guid":"2dd16bb3-657b-41b6-bdec-987ada3f285c","weight":10},{"event_id":4259,"event_guid":"b5a645a9-bbdc-433e-a77c-b416074a92ea","weight":10},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":10},{"event_id":4290,"event_guid":"d3c6e873-4426-4c4e-a89d-49c9573f61d1","weight":9},{"event_id":4300,"event_guid":"d48d1713-333b-4515-b56d-bc12fa2d3c44","weight":11},{"event_id":4303,"event_guid":"384839be-beef-4ae4-939f-3c2046199c2b","weight":12},{"event_id":4323,"event_guid":"df804417-58b7-42fa-a626-83ed1663677f","weight":10},{"event_id":4329,"event_guid":"3e23993c-d4e3-410d-98d3-213e01931876","weight":11},{"event_id":4343,"event_guid":"57920452-ce5b-4194-a768-fed44de6d779","weight":15},{"event_id":4351,"event_guid":"06f3958c-0e2c-4dfc-804c-9493fae7fe9b","weight":13},{"event_id":4352,"event_guid":"05007c06-fc8b-468a-b1e9-b4ff9ec8149e","weight":12},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":10},{"event_id":4362,"event_guid":"67b3b3d4-6098-4694-896c-3e6f76b400d7","weight":10},{"event_id":4374,"event_guid":"22c3d7ca-e490-40d1-b0e4-d321392d53ad","weight":9}],"recordings":[{"size":771,"length":3817,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-288-eng-Computer_crime_and_criminal_law_101_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-07T21:41:15.201+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-hd/SHA2017-288-eng-Computer_crime_and_criminal_law_101_hd.mp4","url":"https://api.media.ccc.de/public/recordings/18124","event_url":"https://api.media.ccc.de/public/events/444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":168,"length":3817,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-288-eng-Computer_crime_and_criminal_law_101_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-07T21:59:54.599+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-sd/SHA2017-288-eng-Computer_crime_and_criminal_law_101_sd.mp4","url":"https://api.media.ccc.de/public/recordings/18125","event_url":"https://api.media.ccc.de/public/events/444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":58,"length":3802,"mime_type":"audio/mpeg","language":"eng","filename":"SHA2017-288-eng-Computer_crime_and_criminal_law_101.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-07T22:00:42.753+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/mp3/SHA2017-288-eng-Computer_crime_and_criminal_law_101.mp3","url":"https://api.media.ccc.de/public/recordings/18128","event_url":"https://api.media.ccc.de/public/events/444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":43,"length":3802,"mime_type":"audio/opus","language":"eng","filename":"SHA2017-288-eng-Computer_crime_and_criminal_law_101.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-07T22:00:57.038+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/opus/SHA2017-288-eng-Computer_crime_and_criminal_law_101.opus","url":"https://api.media.ccc.de/public/recordings/18129","event_url":"https://api.media.ccc.de/public/events/444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":217,"length":3817,"mime_type":"video/webm","language":"eng","filename":"SHA2017-288-eng-Computer_crime_and_criminal_law_101_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-07T22:26:23.462+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-sd/SHA2017-288-eng-Computer_crime_and_criminal_law_101_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/18130","event_url":"https://api.media.ccc.de/public/events/444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":732,"length":3817,"mime_type":"video/webm","language":"eng","filename":"SHA2017-288-eng-Computer_crime_and_criminal_law_101_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-08T04:38:39.814+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-288-eng-Computer_crime_and_criminal_law_101_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/18232","event_url":"https://api.media.ccc.de/public/events/444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"}]}