Saturday, February 23, 2008

MODERATE DEFINATIONS OF CYBER CRIMES

Cyber crimes are so much obvious that they are checked by law. But the question is: who is going to check that i.e. what is the crime or what is the intended. Unfortunately there is no proper way to check the extents of these so called cyber crimes. Mostly cyber crimes include spamming, spoofing, cyber stocking, fishing, virus propagation and malicious code. As it is described earlier that are these are declared crimes, so it should be precisely defined the proper definitions. It also should be decided as if these are crimes or not. Spoofing generally means to hide the identification. critically speaking the spoofing includes sms spoofing, ip spoofing, Mac spoofing, email spoofing, websites spoofing etc. in sms spoofing one hides his cellular no. or may provide a wrong no. in ip spoofing while surfing the internet one hides or provides the wrong ip address for whatever he or she intended to. Similar is the case with Mac address. The email spamming and spoofing is very extensively practiced. It is done by wrong or hidden email address. Web site spoofing is another Claus of spoofing. To provide the seemingly similar name instead of the original name is called web spoofing. Now let us see what are the intentions of these cyber crimes (so called) specifically spoofing. There could be many reasons may be it is intentionally or un-intentionally. One thing is wrong for one person at the same time it is not as wrong as for another person. There are always been different aspects of a same thing. One may use spoofing in order to hide his\her identity to do some destructing activities like fishing, spamming, wrong URL, junk mailing, and other kind op cyber crimes. This is the intention to not to be traced. But on the other side one may use spoofing in order to use a single ip address for many users i.e. sharing of one ip address for more than one user. It seems to be a positive use of the spoofing. Every wireless device that is WiFi compatible has its own unique code or Mac address; they cover them so people don't steal their code. There is a chat application in Perl that used fake ARP requests as the transport called ARPArp (ARP Anonymous Relay Protocol). It's cool for interoffice chatting without any possibility of remote detection (since you're necessarily limited to the local network).
Now let us see that is it more useful or more harmful at all. It is use full in the sense that it provides the facility to use one ip for more users. But this use is also a root cause of many cyber crimes as one can not be traced in this case. If every one is assigned with a unique ip then every one committing a cyber crime could be checked.
concluding all this i recommend that spoofing is not as big issue that it should be declared as a crime.because all hackers,spammers,virus propogator did not necesserly use spoofing.there are hundured more ways to do so.moreover if we manage to provide a unique id to alll users(which is very difficult ),even then spoofing is possible.so what for punising the wrong person who did not even know about spoofing at all. i tink this is injustice to declare it a crime and to punish for it.because most of the time the innocent people get caught.which is ,in every law,WRONG. And laws are for protection but not for disturbing innnocent people. So consequently spoofing is more useful than it is harmful.

Thank you.

Review Of Chapter 1

  • How does copyright impede creativity?

copy rights impede the creativity in the sense that it bounds the production of mind capabilities in positive and innovative way.it repels the individuals to rely on their individual capabilities.

  • What 'blindness' is Lessig talking about on page 6?
it is about the striving for property.
  • Two types of constraints - technical and legal - hamper innovation . What actual constraints does Lessig mention in the text?

He is talking about "technical and legal".

  • Why are costs of production falling?

The cost of production is falling because of new innovations in technology.for example it happens sometimes that newly innovated things tend the consumer to leave the "OLD "thing behind.

  • What, according to Lessig, does the word 'consumer' signify? Do you think that blog writers, digital artists and music mixers are strictly consumers of Internet services? Why or why not?

The consumers are the people who uses the technology, in fact creativity and in other words become a part of creative process.

  • How does 'socialism' differ with 'capitalism' in the regulation of resources [p12]

Socialism is the power which is guided by the community,the control is ensured by the community itself.On the other hand socialism mean the manging power for different tasks are some individuals not the whole community.

  • What defines 'free resource' in a society?

A resource is said to be free when one can use it without the anyone's permission.

  • How is resource production different from resource access?


Resource production means to create or produce anything which is required by people where resource access is to utilize that things.

  • What might be the disadvantage of forcing all resources to be free?

Control produces more and more creativity and inovative power,without that one may not rely on its mental power.