Lecture on Internet Issues and Laws Topics What is Open source ? What are the Copyright Issues? What are Cyber Crimes? Laws dealing with Cyber Crimes What is Hacking? Commercial Software Most software that you buy or download only comes in the compiled ready-to-run version. It is extremely difficult to modify the compiled version of most applications and nearly impossible to see exactly how the developer created different parts of the program. Most commercial software manufacturers see this as an advantage that keeps other companies from copying their code and using it in a competing product. What does Open source mean? Open source software is at the opposite end of the spectrum. The source code is included with the compiled version and modification or customization is actually encouraged The software developers who support the open source concept believe that by allowing anyone who's interested to modify the source code, the application will be more useful and error-free Criteria for Open source The program must be freely distributed (It can be part of a package that is sold though, such as Red Hat has done with Linux) Source code must be included. Anyone must be allowed to modify the source code. Modified versions can be redistributed. The license must not require the exclusion of other software or interfere with the operation of other software. Example Let's take a look at a real world example of open source software. In 1991, Linus Torvalds, a student at the University of Helsinki in Finland, developed a new operating system based on Minix, a derivative of Unix, which he dubbed Linux. Torvalds released version 0.02 of Linux under the GNU General Public License, which provides a good legal definition of open source software. A lot of people around the world downloaded Linux and began working with it. Many of these users were programmers in their own right and made modifications to the source code that Torvalds had included. Over the next three years, Torvalds received these modified versions from the other programmers and incorporated many of the changes into the baseline version and released Linux version 1.0 in 1994. What is Copyright? Copyright is a type of property that is founded on a person's creative skill and labour. It is designed to prevent the unauthorised use by others of a work, that is, the original form in which an idea or information has been expressed by the creator. Copyright for Computer Programs in Pakistan Under the provisions of the Copyright Ordinance, 1962 ("the Ordinance") copyright protection is only available for `works' which fit within one of the categories of works or subject matters specified in the Ordinance. Section 10 of the Ordinance provides that copyright in original, literary, dramatic, musical and artistic works. As regard to the computer programmes, the definition of `literary work' is amended by the Copyright (Amendment) Act, 1992 to include computer programs. Programs recorded on any disc, tape, perforated media or other information storage devices, which, if fed into or located in a computer or computer based equipment is capable of reproducing any information. Even the purchasers of computer programs may not copy, adapt or make copies of adaption of the programs in connection with their use by themselves or their employees. The unauthorized use is infringement of the copyright. Accordingly, if a duplicate of a computer program is acquired by someone who has no license to use it, the copyright owner has the right to prevent him using it. Remedies for Copyright Violations Civil Proceedings Criminal Proceedings Accordingly, a person whose copyright has been violated is able to sue for damages If a person is convicted then imprisonment which may extend to 3 years, or with fine which may extent to one hundred thousand rupees (one US dollars nearly equals twenty five rupees), or with both are possible Cyber Crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Laws yet have to be passed by the parliament What is Hacking? It is defined as the unauthorized use of a computer - especially when it involves attempting to circumvent the security measures of that computer, or of a network. There are two basic types of hacking. Some only hack because they want to see if they can do it it is a challenge to them. For others, however, it becomes an attack, and they use their unauthorized access for destructive purposes History Term invented by students of MIT Getting their laughs and skills from hacking and cracking into primitive computers and exploiting the Arpanet (predecessor to the internet), they created a novelty that would become the target of federal crackdown in years to come. Hacking is an artistic criminal offense of breaking into another remote system without the owner's consent for the purpose of stealing information However, the act of hacking started out innocently, and was basically a method of trying to figure out how computer systems worked. The 1970s saw the rise in "phreaking," or phone hacking, headed by John Draper. He devised a method of making free long distance calls In 1984 American Congress launched Computer Fraud and Abuse Act Over the years, there was a series of noticeable occurrences as the worst consequential effect of computer hacking on more high profile cases, such as the Morris Worm, responsible for infecting government and university systems, and the Mitnick case in 1995, which captured Kevin Mitnick, steeling as many as 20000 credit card numbers. In 1999, security software became widely known by the public Detecting Hackers Lights showing hard drive activity being busier than what your own activities call for Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix Obvious tampering - destroyed files, missing files, etc. Your firewall keeps receives multiple packets from a single web address and notifies you. Case Study Harvard Business School Yahoo hacked