Friday, February 15, 2008

Should spoofing be a part of Pakistan cyber crime law? Why or why not?

Before discussing that weather spoofing should be a part of Pakistan cyber crime let us first what is spoofing?

Spoofing refers to various forms of falsification of data. There are many types of spoofing such as
1.) IP address spoofing
2.) Email spoofing
3.) Website spoofing
4.) SMS spoofing
5.) Caller id spoofing

1.) IP address spoofing is the creation of TCP/IP packets using somebody else's IP addresses. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source.

2.) Email spoofing sometimes also referred to header forgery, the insertion of false or misleading information in an email Falsified headers are used to mislead the recipient, or network applications, as to the origin of a message. This is a common technique of spammers who wish to conceal the origin of their messages to avoid being tracked down.

3.) Website spoofing is the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a different person or organization. Normally, the website will adopt the design of the target website and sometimes has a similar URL.

4.) SMS spoofing is a relatively new technology which uses the SMS, available on most mobile phones and personal digital assistants, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. It has both legitimate uses (setting the company name from which the message is being sent, setting your own mobile number, or a product name) and illegitimate uses (such as impersonating another person, company, and product).

5.) Caller ID spoofing is the practice of causing the telephone network to display a number on the recipient's caller ID display which is not that of the actual originating station.


Now according to Pakistan cyber crime bill one who establishes a website, or sends an electronic message with a counterfeit source intended to be believed by the recipient
Or visitor or its electronic system to be an authentic source with intend to gain an unauthorized access to commit further offence or obtain their valuable information which later can be used for any unlawful purposes commits the offence of spoofing.
Well in my opinion spoofing is very harmful thing there are many ways in which it can be dangerous for example scam artists use a variety of methods to try to trick you into divulging your passwords, credit card numbers, social security number, bank account information and more. If they're successful, they can use your information to open new accounts in your name, drain your bank accounts, or sell your personal information to others for a profit. All of their fraudulent tactics involve "spoofing." Spoofs often contain links to counterfeit Web sites that appear to be authentic business sites, but are actually fakes intended to scam you. These phony sites may include the name and logo of a well-known bank, e-retailer, or credit card company. They can look very convincing! The use of such fraudulent Web sites is called "phishing."

So from all the above discussion I think that spoofing should be the part of Pakistan cyber crime law it is a very harmful cyber crime.

Friday, February 8, 2008

Review

The Future of Ideas: the fate of the commons in a connected world (2001) is a book by Lawrence Lessig, a professor of law at Stanford Law School, who is well known as a critic of the extension of the copyright term in US. It is a continuation of his previous book Code and Other laws of Cyberspace, which is about how computer programs can restrict freedom of ideas in cyberspace.
While copyright helps artists get rewarded for their work, Lessig warns that a copyright regime that is too strict and grants copyright for too long a period of time (i.e. the current US legal climate) can destroy innovation, as the future always builds on the past. Lessig also discusses recent movements by corporate interests to promote longer and tighter protection of intellectual property in three layers: the code layer, the content layer, and the physical layer.
The code layer is that which is controlled by computer programs. One instance is Internet censorship in mainland China by sorting out geographical IP addresses. The content layer is notoriously illustrated by Napster, a file sharing service. Lessig criticizes the reaction of music companies and Hollywood. The physical layer is the one that actually conveys information from one point to another, and can be either wired or wireless. He discusses particularly the regulation of the radio spectrum in the USA.
In the end, he stresses the importance of existing works entering the public domain in a reasonably short period of time, as the founding fathers intended.