Japan Arrests Woman for ‘Killing’ Her Virtual Spouse

Last week, Japanese authorities arrested a woman for killing the digital avatar of her online husband—no, we didn’t make this up. Arrested in her home in southern Miyazaki, she was taken to Sapporo in Northern Japan. The woman became angry on learning her online husband divorced her. She used his ID and password to log onto the “Maple Story” interactive game to execute the virtual murder. Although not yet formally charged, she was arrested for suspicion of illegally accessing a computer and manipulating electronic data. Although the police thus far have no reason to believe she was contemplating any real world criminal act, she still could face five years in prison or a fine of as much as $5,000 if she is ultimately charged and convicted of the computer access and manipulation charges. Maple Story, like many interactive, online virtual world games, allow real world participants to create digital characters called “avatars.” While many virtual experiences are essentially sophisticated online interactive games themselves, even non-game based virtual worlds enable avatars to engage in social networking, relationships with other avatars, transactions involving the exchange of value, and the creation or deployment of intellectual property—content ranging from video programs to musical concerts to creating wardrobes for their avatars. Because avatars exist in a virtual, digitally created world, their owners often engage in activities they would never consider in the real world.

Continue reading “Japan Arrests Woman for ‘Killing’ Her Virtual Spouse”

Cyber Attacks? It’s Not Just War Games Anymore

Is a cyber attack an act of war? Analysts reported that while the Russian military was acting against the Georgian republic, Georgian websites were also under attack. Cyber warfare can exploit security gaps to take control of civilian infrastructure, such as power grids, as well as government websites and military command and control operations. It has long been known that cyber-weaponry could supplement (and sometimes replace) traditional military activities. But when does a cyber-attack itself constitute an act of war? (We all appreciate the notion of “war” as a historical concept is and continues to change.) Tactics such as urban warfare, bioterrorism and suicide bombers have caused grave concern, not only over government’s ability to deter violent and damaging non-traditional acts of war, but also how to respond when they occur. A big challenge in the cyber warfare world is identifying who did it. In 2007, Estonia asked NATO to come to its defense when a cyber attack disabled government and bank websites. Apparently in 2008 we didn’t need a cyber attack to bring down some of our financial institutions (sorry, couldn’t resist). Question—how does one respond to a cyber attack—with bullets or chips?