Feeds

Onliner gamer stabbed over 'stolen' cybersword

Virtual theft, real death

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

A Shanghai man stabbed to death a fellow online gamer who sold a virtual sword they had jointly won while playing "Legend of Mir 3", Reuters reports.

Qiu Chengwei, 41, repeatedly stabbed Zhu Caoyuan after discovering that Zhu had sold the "dragon sabre" for 7,200 yuan (£464). Qiu had lent his friend the cybersabre last February, later reporting it as "stolen" when he learned of the transaction. Police, however, told him that - as the disputed weapon was virtual property - he had no recourse to law.

A Shanghai court heard on Tuesday that "Zhu promised to hand over the cash but an angry Qui lost patience and attacked Zhu at his home, stabbing him in the left chest with great force and killing him." Qui has admitted "intentional injury" and awaits the court's verdict.

China Daily notes that the sorry affair raises something of a legal poser regarding online "possessions". Wang Zongyu, an associate law professor at Beijing's Renmin University of China, told the paper: "The armour and swords in games should be deemed as private property as players have to spend money and time for them."

A lawyer for a Shanghai-based internet game company countered: "The 'assets' of one player could mean nothing to others as they are by nature just data created by game providers."

Indeed, a Japanese woman recently had a run-in with the authorites after deleting her ex's online gaming data - including clothes and weapons. In this case, though, she was charged with "violating a law banning illegal access" rather than offences pertaining to the wanton destruction of her former lover's virtual goods and chattels. ®

Related stories

Spurned woman deletes ex's gaming data
Greece to face Euro court over video games ban
Botnet used to boost online gaming scores

Beginner's guide to SSL certificates

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.