Saturday, February 23, 2008

Should spoofing be part of the cyber crime?

SPOOFING:-

Definition:
There are many definitions of spoofing.

Faking the sending address of a transmission in order to gain illegal entry into a secure system.

To capture, alter, and retransmit a communication stream in a way that misleads the recipient. As used by hackers, refers especially to altering TCP/IP packet source addresses or other packet-header data in order to masquerade as a trusted machine. This term has become very widespread and is borderline techs peak. Interestingly, it was already in use in its modern sense more than a century ago among Victorian telegraphers; it shows up in Kipling.

TYPES OF SPOOFING:-

There are different types of spoofing.

Email Spoofing:-
Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.

Web page Spoofing (phishing):-
Another kind of spoofing is "webpage spoofing," also known as phishing. In this attack, a legitimate web page such as a bank's site is reproduced in "look and feel" on another server under control of the attacker. The intent is to fool the users into thinking that they are connected to a trusted site, for instance to harvest user names and passwords.

Caller ID Spoofing:-
In public telephone networks, it has for a long while been possible to find out who is calling you by looking at the Caller ID information that is transmitted with the call.

Login Spoofing:-
The user is presented with an ordinary looking login prompt for username and password, which is actually a malicious program under the control of the attacker.

Spoofing Of File Sharing:-
"Spoofing" also refers to polluting the illegal file-sharing networks where record labels share files that are mislabeled, distorted or empty to discourage downloading from these sources.

SHOULD SPOOFING BE A PART OF THE CYBER CRIME??

As far as this question is concerned there may be different views of different people based upon their own views. For me I think that spoofing should be a part of the cyber crime. Seeing at the different definitions and types of the spoofing above it is very much clear that spoofing is widely used by the hackers in different forms. To avoid hacking and illegal acts it should be banned as cyber crime.

One disadvantage of being banned spoofing is that there will be no anonymity. Although this is a big loss but seeing at the disadvantages of the spoofing I will say that this should be banned.

CRIME:-
An act committed or omitted in violation of a law forbidding or commanding it and for which punishment is imposed upon conviction.
Unlawful activity: statistics relating to violent crime.
A serious offense, especially one in violation of morality.
An unjust, senseless, or disgraceful act or condition: It's a crime to squander our country's natural resources


BUDAPEST CONVENTION:-

Article 7 – Computer-related forgery

Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the input, alteration, deletion, or suppression of computer data, resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible. A Party may require an intent to defraud, or similar dishonest intent, before criminal liability attaches.
Article 8 – Computer-related fraud
Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the causing of a loss of property to another person by:
a any input, alteration, deletion or suppression of computer data,
b any interference with the functioning of a computer system,
with fraudulent or dishonest intent of procuring, without right, an economic benefit for oneself or for another person.
References:-
1) http://en.wikipedia.org/wiki/Spoofing_attack
2) http://www.lse.ac.uk/itservices/help/spamming&spoofing.htm
3) http://en.wikipedia.org/wiki/E-mail_spoofing
4) http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci840262,00.html

No comments: