Feeds

Onliner gamer stabbed over 'stolen' cybersword

Virtual theft, real death

  • alert
  • submit to reddit

Internet Security Threat Report 2014

A Shanghai man stabbed to death a fellow online gamer who sold a virtual sword they had jointly won while playing "Legend of Mir 3", Reuters reports.

Qiu Chengwei, 41, repeatedly stabbed Zhu Caoyuan after discovering that Zhu had sold the "dragon sabre" for 7,200 yuan (£464). Qiu had lent his friend the cybersabre last February, later reporting it as "stolen" when he learned of the transaction. Police, however, told him that - as the disputed weapon was virtual property - he had no recourse to law.

A Shanghai court heard on Tuesday that "Zhu promised to hand over the cash but an angry Qui lost patience and attacked Zhu at his home, stabbing him in the left chest with great force and killing him." Qui has admitted "intentional injury" and awaits the court's verdict.

China Daily notes that the sorry affair raises something of a legal poser regarding online "possessions". Wang Zongyu, an associate law professor at Beijing's Renmin University of China, told the paper: "The armour and swords in games should be deemed as private property as players have to spend money and time for them."

A lawyer for a Shanghai-based internet game company countered: "The 'assets' of one player could mean nothing to others as they are by nature just data created by game providers."

Indeed, a Japanese woman recently had a run-in with the authorites after deleting her ex's online gaming data - including clothes and weapons. In this case, though, she was charged with "violating a law banning illegal access" rather than offences pertaining to the wanton destruction of her former lover's virtual goods and chattels. ®

Related stories

Spurned woman deletes ex's gaming data
Greece to face Euro court over video games ban
Botnet used to boost online gaming scores

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?