Monday, January 25, 2010

New Media, New Crime

New technology can never substitute human values" said Neil Postman an American author , theorist ,cultural critic and most importantly a humanist.What is new media? NEW MEDIA encompass the idea digital or computerized world .Gone are the days where the media heavily relied on analog broadcast models for news In the present changing times the volume of communication has increased my a trillion times also with the increasing speed where there are possibilities of overlap and Although there are several ways that New Media may be described, The New Media Reader edited by Wardrip-Fruin and Montfort defines New Media by using eight simple and concise propositions:

1.New Media versus Cyberculture - Cyberculture is the study of various social phenomena that are associated with the internet and network communications, whereas New Media is concerned more with cultural objects and paradigms.

2.New Media as Computer Technology Used as a Distribution Platform - New Media are the cultural objects which use digital computer technology for distribution and exhibition. e.g. (at least for now) Internet, Web sites, computer multimedia, Blu-ray disks etc. The problem with this is that the definition must be revised every few years. The term "new media" will not be "new" anymore, as most forms of culture will be distributed through computers.

3. New Media as Digital Data Controlled by Software - The language of New Media is based on the assumption that, in fact, all cultural objects that rely on digital representation and computer-based delivery do share a number of common qualities. New media is reduced to digital data that can be manipulated by software as any other data. Now media operations can create several versions of the same object.

4.New Media as the Mix Between Existing Cultural Conventions and the Conventions of Software - "New Media today can be understood as the mix between older cultural conventions for data representation, access, and manipulation and newer conventions of data representation, access, and manipulation." e.g. In film, software is used in some areas of production, in others are created using computer animation.

5.New Media as the Aesthetics that Accompanies the Early Stage of Every New Modern Media and Communication Technology - "While ideological tropes indeed seem to be reappearing rather regularly, many aesthetic strategies may reappear two or three times...In order for this approach to be truly useful it would be insufficient to simple name the strategies and tropes and to record the moments of their appearance; instead, we would have to develop a much more comprehensive analysis which would correlate the history of technology with social, political, and economical histories or the modern period."

6.New Media as Faster Execution of Algorithms Previously Executed Manually or through Other Technologies - Computers are a huge speed-up of what were previously manual techniques. e.g. calculators. "Dramtically speeding up the execution makes possible previously non-existent representational technique." This also makes possible of many new forms of media art such as interactive multimedia and computer games. "On one level, a modern digital computer is just a faster calculator, we should not ignore it's other identity: that of a cybernetic control device."

7.New Media as the Encoding of Modernist Avant-Garde; New Media as Metamedia - Manovich declares that the 1920's are more relevant to New Media than any other time period. Meta-media coincides with postmodernism in that they both rework old work rather than control the cybernetic control device.

8.New Media as Parallel Articulation of Similar Ideas in Post-WWII Art and Modern Computing - Post WWII Art or "combinatorics" involves creating images by systematically changing a single parameter. This leads to the creation or remarkably similar images and spatial structures. "This illustrates that algorithms, this essential part of new media, do not depend on technology, but can be executed by humans."

Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal concept and has the sanction of the law. Crime or an offence is “a legal wrong that can be followed by criminal proceedings which may result into punishment.”(1) The hallmark of criminality is that, it is breach of the criminal law. Per Lord Atkin “the criminal quality of an act cannot be discovered by reference to any standard but one: is the act prohibited with penal consequences”. (2)

A crime may be said to be any conduct accompanied by act or omission prohibited by law and consequential breach of which is visited by penal consequences.

CYBER CRIME

Cyber crime is the latest and perhaps the most complicated problem in the cyber world. “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime” (13). “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”(12)

A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”(3) The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.

DISTINCTION BETWEEN CONVENTIONAL AND CYBER CRIME-

There is apparently no distinction between cyber and conventional crime. However on a deep introspection we may say that there exists a fine line of demarcation between the conventional and cyber crime, which is appreciable. The demarcation lies in the involvement of the medium in cases of cyber crime. The sine qua non for cyber crime is that there should be an involvement, at any stage, of the virtual cyber medium.

REASONS FOR CYBER CRIME:
Hart in his work “ The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’. Applying this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the vulnerability of computers may be said to be:

Capacity to store data in comparatively small space-

The computer has unique characteristic of storing data in a very small space. This affords to remove or derive information either through physical or virtual medium makes it much more easier.

Easy to access-
The problem encountered in guarding a computer system from unauthorised access is that there is every possibility of breach not due to human error but due to the complex technology. By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system.

3.Complex-

The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.

4.Negligence-

Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.

5. Loss of evidence-

Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. A common example is when a person starts to steal information from sites, or cause damage to, a computer or computer network. This can be entirely virtual in that the information only exists in digital form, and the damage, while real, has no physical consequence other than the machine ceases to function. In some legal systems, intangible property cannot be stolen and the damage must be visible, e.g. as resulting from a blow from a hammer. Where human-centric terminology is used for crimes relying on natural language skills and innate gullibility, definitions have to be modified to ensure that fraudulent behavior remains criminal no matter how it is committed.
A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.
A number of key factors have been identified:
False accusationsas one of the many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms or other sites that allow public contributions, such as Wikipedia or Amazon.com.[4]
Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective. They often will monitor the victim's online activities and attempt to trace their IP address in an effort to gather more information about their victims. [5]
Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
False victimization. The cyberstalker will claim that the victim is harassing him/her. Bocij writes that this phenomenon has been noted in a number of well-known cases.
Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.
Ordering goods and services. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.
Arranging to meet. Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.[6]
BehaviorsCommunications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users,[2] and exploits the poor usability of current web security technologies.[3] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.The term ‘cyber crime’ is a misnomer. This term has nowhere been defined in any statute /Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state.

Before evaluating the concept of cyber crime it is obvious that the concept of conventional crime be discussed and the points of similarity and deviance between both these forms may be discussed.

CONVENTIONAL CRIME-
Further collection of data outside the territorial extent also paralyses this system of crime investigation.
With various hacking methods on a rise illegal online activity such as pornography,identity thefts and various other anti social elements are creeping into the society.Due to the fast bridging gaps between virtual reality and reality in general there is a kind of a social change that is occurring at a very fast pace of which the psychological impacts are huge .Implications of these cyber crime may just be the beginning of the cyber warfare which is near possible future.the fast evaporating lines between virtual and reality is scary.As the latin saying goes quis custodiet ipos custodes meaning When the guardians turn enemies then whom do we turn to is the question we need to ask ourselves before its to late.....

No comments:

Post a Comment