Here Comes The Electric Transformer Revolution


Electric Transformer Revolution

An African inventor and author of a science fiction novel titled 27th Century Fiasco has invented a new class of electric transformers which are aptly named ‘Non Solenoid Electric Transformers’.
Michael Faraday and Joseph Henry invented electromagnetic induction coil in the 1830s. This discovery led to the design of the simple types of electric transformers. But it was not until the 1870s before alternating current transformers became available.
Conventional electric transformers were invented in the 19th century after the invention of the induction coil which comprises of windings of conducting wires around a solid core. This class of induction coil transformers has been used for more than 150 years till date.
Copper has been the main metal used in windings because of its high electrical conductivity, anti-corrosive properties malleability and durability. It can also be employed as a form of foil in certain types of transformers in which foils of other metals can be used alternatively.
The core of most of these induction coil transformers is made of solid or toroidal laminated iron, steel, ferrite or silicon steel. Sometimes the core is left open for air to server as the substance at the center of the generated magnetic flux.
To generate power at the output terminals of the secondary winding, a varying electric current is passed through the input terminals of the primary winding or solenoid. This current produces an electromagnetic flux in the core which in turn induces a varying electric current in the secondary winding.
All conventional transformers function only when alternating current is passed through their input terminals but do not function with direct current unless a vibrating electric contact is included in the input circuitry.
This has made transformers a cornerstone of AC power transmission and distribution worldwide.
AC transformer can function as step-up or step-down transformers in order to increase or decrease the power input at the output terminals respectively. The device’s efficiency is reduced by energy losses such as winding joule losses, eddy current losses, hysteresis losses, transformer hum and mechanical vibration as well as other factors.
The transformer may occur as single phase, shell type or three-phase depending on the type of winding and core arrangement. Large transformers contain mineral oil and special conventional vent for cooling.
Transformers have many classification parameters but can simply be grouped as autotransformer, capacitor voltage transformer, polyphase transformer and distribution or power transformer. They are mainly used to increase voltage output in generators to transmission levels as well as reducing voltage at the consumer end where low voltage electricity is supplied to industrial or residential areas.
A non Solenoid Electric Transformer (NOSET) as the name implies does not function on the electromagnetic induction coil principle. It is made from a mixture of doped ferromagnetic materials which range from semi-conductors to conductors.
The simplest device is a cylindrical insulator casing into which the powdery mixture is contained. A pair of high voltage input terminals are fixed to the edges of the container while output terminals are tapped from any point within the body of the cylinder.
NOSET device functions as a step-down transformer only but has the advantage of function with direct or alternating current input. It is also light weight, easy to assemble and construct.
It is envisage that NOSET devices will serve as a more light weight user friendly alternative to conventional electric transformers in most modern electrical appliances.
The inventor has made details of this new class of transformers available at Amazon.com to allow electrical engineers, DIY enthusiasts, scientists and hobbyists to develop and improve the NOSET devices on a level playing field.
Join the fray by clicking on the web-link below.

Non Solenoid Electric Transformer: Metal Oxide Transformer

Non Solenoid Electric Transformer: Metal Oxide Transformer

Buy from Amazon

Here Comes The Electric Transformer Revolution


Electric Transformer Revolution

An African inventor and author of a science fiction novel titled 27th Century Fiasco has invented a new class of electric transformers which are aptly named ‘Non Solenoid Electric Transformers’.
Michael Faraday and Joseph Henry invented electromagnetic induction coil in the 1830s. This discovery led to the design of the simple types of electric transformers. But it was not until the 1870s before alternating current transformers became available.
Conventional electric transformers were invented in the 19th century after the invention of the induction coil which comprises of windings of conducting wires around a solid core. This class of induction coil transformers has been used for more than 150 years till date.
Copper has been the main metal used in windings because of its high electrical conductivity, anti-corrosive properties malleability and durability. It can also be employed as a form of foil in certain types of transformers in which foils of other metals can be used alternatively.
The core of most of these induction coil transformers is made of solid or toroidal laminated iron, steel, ferrite or silicon steel. Sometimes the core is left open for air to server as the substance at the center of the generated magnetic flux.
To generate power at the output terminals of the secondary winding, a varying electric current is passed through the input terminals of the primary winding or solenoid. This current produces an electromagnetic flux in the core which in turn induces a varying electric current in the secondary winding.
All conventional transformers function only when alternating current is passed through their input terminals but do not function with direct current unless a vibrating electric contact is included in the input circuitry.
This has made transformers a cornerstone of AC power transmission and distribution worldwide.
AC transformer can function as step-up or step-down transformers in order to increase or decrease the power input at the output terminals respectively. The device’s efficiency is reduced by energy losses such as winding joule losses, eddy current losses, hysteresis losses, transformer hum and mechanical vibration as well as other factors.
The transformer may occur as single phase, shell type or three-phase depending on the type of winding and core arrangement. Large transformers contain mineral oil and special conventional vent for cooling.
Transformers have many classification parameters but can simply be grouped as autotransformer, capacitor voltage transformer, polyphase transformer and distribution or power transformer. They are mainly used to increase voltage output in generators to transmission levels as well as reducing voltage at the consumer end where low voltage electricity is supplied to industrial or residential areas.
A non Solenoid Electric Transformer (NOSET) as the name implies does not function on the electromagnetic induction coil principle. It is made from a mixture of doped ferromagnetic materials which range from semi-conductors to conductors.
The simplest device is a cylindrical insulator casing into which the powdery mixture is contained. A pair of high voltage input terminals are fixed to the edges of the container while output terminals are tapped from any point within the body of the cylinder.
NOSET device functions as a step-down transformer only but has the advantage of function with direct or alternating current input. It is also light weight, easy to assemble and construct.
It is envisage that NOSET devices will serve as a more light weight user friendly alternative to conventional electric transformers in most modern electrical appliances.
The inventor has made details of this new class of transformers available at Amazon.com to allow electrical engineers, DIY enthusiasts, scientists and hobbyists to develop and improve the NOSET devices on a level playing field.
Join the fray by clicking on the web-link below.

Non Solenoid Electric Transformer: Metal Oxide Transformer

Non Solenoid Electric Transformer: Metal Oxide Transformer

Buy from Amazon

How America Could Reduce Fiscal Deficit And Be More Competitive


Globally, people marvel at America’s ingenuity at representing a microcosm of the ability of the human race to team-work while downplaying their diverse ethnicity and creed.

However, the stunning fact that the great Uncle Sam has amassed a whooping deficit of 14.3 trillion dollars in the dawn of the 21st Century has been a shocking revelation to admirers of ‘God’s own country’.

The tone of national political discus has been raised by several notches by rhetorical politicians who seem to be placing ideology and radically entrenched positions over sound economic policies.

But the parochial interests of a few powerful group of lobbyists, politicians and the military-industrial-political complex has now began to erode the framework of America’s economic and socio-political stability. The dope and vice addiction of the underclass has also exacerbated the problem.

Is a wholesome capitalistic system a la Adam Smith the path to choose? Or is there any wisdom in the treatise of Karl Max? Should America be a welfare state?

To be honest with all patriotic Americans who care to read this article, expect a bleak and gloomy economic prognosis if there is no balance between the hawkish ‘no tax’ stand of the Tea Party and the ‘full-speed-welfare-spending’ of the Democrats.

What can be done?

Below are suggestions on what America could do to steer herself out of the current seemingly intractable financial situation.

• Increase or reduce corporate taxes by finding a balance between basic defense spending vis-à-vis government expenditure in time of war and peace.

• Make more peace treaty and less war declaration, rely more on diplomacy than gun-boat ‘us-against-them’ foreign policy.

• Treat deficit, social security fund and other volatile economic issues under National Security, i.e. congress discus on the issue should be done in camera.

• Enforce Trade Laws and encourage CEOs and other Captains of Industry to undergo compulsory continuing education on collective responsibility to America’s economic well-being.

• Continue the march to achieve the Adam Genome Theory which states that racially homogenous societies have no future and are hotbeds for future conflicts.

• Stop the blame game.

• Revamp transportation, electricity and telecommunication systems.

• Intensify the use of the internet for healthcare transactions.

• Circumvent bureaucracy by speeding up procedures and approval of all company formation, contracts and projects on the economy.

• Make the economy more inclusive.

• Reduce dope addiction and food stamp dependency in the society.

• Make cash, equipment lease and loans available for start-ups.

• Re-orientate the Lobbyists-Military-Industrial Complex about the dangers inherent in tax evasion, unholy outsourcing, over profiteering, short selling, inside trading and scams.

• Government and Private establishments should provide free business consultancy for transactions like mergers, takeovers and start-ups.

• Streamline educational curriculum to emerging job opportunities to achieve a balance.

• Encourage the production of generic medicines and patent-expired items or devices the can. outsell US competitors globally.

• Make strong inroad into the global textile market.

• Produce more organic foodstuff and make stricter laws for the introduction of GMO foods into human food chain.

• Use America’s ethnic diversity and multiculturalism to get a larger slice of the world economy.

• Create jobs around graduates who can employ the unskilled.

• Provide easier career switching schemes for the citizenry.

• Find human chores in solely robotic factories to provide employment for people.

• Make peace and economic pacts with at least two-thirds of states worldwide.

• Undertake talent hunt and make fund available to ease the burden of translating ideas into marketable products.

• Look at economic issues from a global and not parochial perspective.

• Encourage Venture Capitalists to fund certain portfolios that could create more jobs.

• Reduce outsourcing of labor.

• Compete in all global markets, i.e. rich, middle-income and developing countries.

• Reduce redundancy, dope peddling, gambling and other unproductive vices among the citizenry by persuasive techniques.

• Ensure zero unemployment i.e. the state and federal government should provide the unemployed with menial jobs rather than giving them food stamps.

• Ensure that food stamps are only issued to poor widows, orphans, tramps and genuinely wretched people.

• Ensure that your economic think-tank forums include contributors from all schools of thought and not limited to graduates from prestigious schools, Wall Street, Politicians, rich people, lobbyists and members of the Military-Industrial Complex.

To compete with Asia, America needs to place emphasis at creating jobs for its citizenry. These effort is seriously undermined by the menace of drugs and widening gap between the haves and have nots.

When Americans put men of wisdom and integrity at the helm of affairs rather than rely on a clique of profit driven hawkish individuals and over hyped advanced technology, then the country would continue to maintain her greatness.

Kindly pass on this article to all politicians and Captains of Industry in America today.

http://27thcentury.wordpress.com

Article Source: http://EzineArticles.com/?expert=Akintunde_M_Lawal

Article Source: http://EzineArticles.com/6532679

free read 20% ebook sample of 27th Century Fiasco


You can peruse about 145pages of the blockbusting 27th Century Fiasco novel thru’ this link http://pdf-ebooks.net/sample/66191/27th-century-fiasco

Road-Map Of Human Organ Transplantation Process


Do you know much about human organ transplantation process and its attendant intricacies? Is your knowledge still rudimentary or are you in need of relevant information that is required to lift you out of the confusion that has been caused by ignorance or misinformation about the subject matter?

Well, this article is purposely written to fill you in and suck you onto the platform of ethical, moral, health, political, scientific and theological soul-searching debate concerning human organ transplantation.

Let’s get the definition straight before we go into the nitty-gritty.

The process of moving human body parts from one individual to another or from one part of an individual to another part of the same person is known as organ transplantation. This surgical procedure has been undertaken by mankind for ages. History recorded a miraculous feat by some Catholic Saints way back in the 4th Century. Modern science has moved on with lightning speed following the invention of cutting-edge electronic devices along with advances in cryonics technology and stem cell research which has turned complex organ transplant surgeries into simple medical operative procedures.

Mankind is now able to perform certain hitherto intractable transplant surgeries using stem cells, tissues and organs from living or deceased donors courtesy of better operative skills.

Presently, many countries around the world have regulatory organizations that approve and monitor harvesting, storage as well as transplantation of human organs within their areas of jurisdiction. There are also organizations that have been approved to keep organ banks or perform transplantation surgeries.

As with all human endeavors, each country on earth has its own way of drafting and interpreting the law that governs human organ transplantation. Because of shortage of suitable organs, an ever reducing official list of suitable donors and elongating official waiting list, many governments have had to bend the rules or amend the strict regulation.

In certain eastern nations, human organ transplantation process has even become a business transaction based on a willing buyer-to-seller basis while the government concerned simply charged a transplant-donor-recipient-tax. Consequently, many criminal cases of forced human organ donations have become rampant in such countries.

Although such a laissez-faire policy may shorten the waiting list of recipients, the risk of outbreak communicable diseases is considerably increased.

Should human body parts become a commodity? That is a pertinent question that every living being should answer.

Despite the highly strict regulation of human organ transplantation process in well organized western countries, the psychological pressure of the fear of death among desperate patients on the waiting list of many organ registries and the shortage of donors have driven people to seek after human organs from unofficial but sometimes fraudulent and unscrupulous human-body-parts-sourcing crime cartels.

What should be done to pacify the growing number of anxious and trickster-gullible patients on the human organs waiting list?

Should organ transplantation process be privatized and the laws liberalized?

Would amending the regulation to a position midway between too much restriction and the laissez faire system of Eastern Europe and Asia be ethically, morally and religiously justifiable?

Would such a policy be acceptable to the Public?

Should donors be allowed to put up their body parts for sale in the print or electronic media?

Should countries legally harvest the organs of executed criminals?

Should commercial trading in human body parts be in the statute books?

Should transplantation tourism be banned or allowed to flourish as long as it follows the free-market principle?

Would anyone prefer that the United Nations pass a multilateral agreement that would oblige all nations on earth to stop human body parts being traded like mutton?

Join the debate. Have your say.

http://27thcentury.wordpress.com

Article Source: http://EzineArticles.com/?expert=Akintunde_M_Lawal

Article Source: http://EzineArticles.com/6029328

E-Lab and E-Diagnostics Would Be New Innovative Methods in Cloud Computing Technology


By the time you read through this article, a new Cloud Computing protocol would be born.

Cloud computing is a complex system of data compilation, processing and storage which allows the end-user to easily access information without knowing the physical location of the service provider or configuration of the computer system. The cloud computing set-up along with online Voice and Video streaming facilities are veritable tools that make the birth of e-lab and e-diagnostics protocols the next frontier of internet development.

Here is an interesting snippet on the future of cloud computing.

Firstly, let’s define e-lab. It means an electronic laboratory that operates via the World Wide Web.

Presently, a typical laboratory consists of a room or building where scientific equipment or chemicals are kept. Within the confines of the laboratory, scientists conduct tests, teach or perform experiments and treat illnesses.

The constant use of equipment and chemicals by scientists necessitate costly purchase, transportation and maintenance in order to provide fast-track, competitive and cutting edge services to health-care professionals, scientists, end-users and beneficiaries.

Therefore, there is an urgent need to make laboratory more cost effective by developing the e-lab.

To measure soil acidity for instance, a pH meter is required. The price of this device ranges in tens of dollars. However, rather than purchasing a pH meter, a less costly e-lab biotechnology electrode would be provided to the end-user. When this device is immersed in a solution, it would measure the pH as encrypted information through a microprocessor in any portable computerized device, e.g. cell-phone or laptop. The digital information could then be uploaded onto the internet where the encrypted information would be processed by the e-lab service provider into a visually readable pH data. A disposable or re-usable bio-tech pH electrode might be provided.

The above-mentioned internet compatibility would be ideal for certain scientific tests such as screening of blood fluid components, eye defects, enzyme activity, optical, sonic and temperature measurements.

Secondly, e-diagnostics could be defined as the use of the internet as a source for processing digital diagnostic information by cloud computing.

This innovative technique could be illustrated by re-inventing cutting edge medical equipment such as the CT-Scan or X-ray computed Tomography device which requires a heavy purchase, maintenance and overhead cost.

CT-Scan is used as a veritable tool for prevention-cum-screening of cancers, heart and bone diseases. it is a necessity in any modern hospital setting.

Although the usage of the CT-Scan has increased exponentially over the last three decades in many countries, its use is still highly restricted to affluent neighborhoods and nations.

However, with the coming of e-diagnostics, this expensive machine would be separated into two parts. The first part or ‘in-house component’ would contain the X-ray Tomography reader-cum-data-collector.

An ‘e-diagnostics-cloud-computing component’ which would be controlled by the service provider would be the second part. In this device, the data uploaded from the CT-Scan would be sent through the internet to the network of the service provider where it would be processed for billing, 3-D display of various bodily structures and other user-friendly features.

Separation of the CT-Scan’s mainframe from the data processing unit would allow service providers to charge low rates for each data processed through their cloud computing networks.

Therefore, scientists who study biological and paleontological specimen at remote locations around the globe would be saved the hassle of having to purchase, maintain or move a large and expensive CT-Scan about. All they would require would be a cheaper and lighter ‘in-house component’ that coverts tomography readings of human structures into encrypted digital information. Such digitized data could be sent electronically through the internet to the service provider who in turn uses his e-diagnostics tools within seconds to send back printable pictures, videos or graphics from processed data.

Couldn’t this technology be applied to other expensive scientific techno-behemoths? Of course, it’s possible.

The advent of the e-lab’s and e-diagnostics’ protocol at a yet to be determined future date might bring succor to the countless number of people who are yet to benefit from the versatility of a much awaited but yet to be re-invented e-lab-CT-Scan or any other colossal scientific equipment.

Advantages of e-lab & e-diagnostics

• Less expensive and more light-weight equipment.
• Lesser amount of chemicals required for tests.
• Simplified and reduced maintenance cost.
• Affordable screening procedure.
• Accessibility from remote locations.
• Easy equipment mobility.
• Convenient.
• User friendly.
• Revolutionize the field of bio-informatics and laboratory technology.
• Possibility of designing portable electronic devices that could serve as analytical and diagnostic tools.

Disadvantages of the proposal

• Hosts and service providers might have control over the medical records or research data of patients and scientists respectively.

• Health-care statistics or research data of developing countries may be monitored or tinkered with by web-hosts or service providers in the developed world.

• It may cause capital flight and under-utilization of laboratory technicians in many parts of the world as many Do-It-Yourself screening and test kits become ubiquitous.

To allay the fears of governments, service providers and end-users, a new internet protocol might have to be drafted and endorsed by all member states of the United Nations.
Let the race of developing the e-lab & e-diagnostics program’s application, platform, storage and infrastructure begin. Then servers and clients can enjoy a new era of the internet.

That’s the future of cloud computing.

In conclusion, let’s hope that this article would spur the world’s cybernetics movers and shakers to action.

http://27thcentury.webs.com/elabandediagnostics.htm

Article Source: http://EzineArticles.com/?expert=Akintunde_M_Lawal

Article Source: http://EzineArticles.com/6076046

 

How To Prevent And Respond To Cyber-Crime Globally


This article provides readers with a brief overview of cyber-crime, a topic that has gripped the world of cybernetics, law enforcement agencies and Justice Departments of late in the wake of hacking of high profile websites across the globe.

A friend of mine once dubbed the internet as the ‘1st wonder of modern civilization’ and its obvious he is not far from the truth.

The internet has come to stay and as mankind evolves through his evolutionary pathway, it is going to play a crucial role in all facets of human endeavor.

Presently the internet is mainly used for issues of commerce and communication.
In future, the healthcare sector is likely to take a bigger share of internet activities as ‘e-lab and e-diagnostics protocols’ allow DIY screening of illnesses through portable communication gadgets such as the cell-phone or electronic tablets.

As the use of the internet becomes ubiquitous so would the prevalence of cyber-crime increase exponentially!

Before we get down to the nitty-gritty of the topic, let’s define cyber-crime.
Cyber-crime includes all crimes committed in any computer network infrastructures or environments.

Let’s have a roller coaster ride through types, motives, culprits and victims of cyber-crime. How would you report issues pertaining to cyber-crime, where to report cyber-crime and how to prevent cyber-crime?

Types of cyber-crime

• Computer intrusion or Hacking, Password trafficking.
• Counterfeiting of currency.
• Child Exploitation and Internet Pornography.
• Internet fraud and Spam mailing.
• Internet harassment.
• Internet bomb threats and terrorism.
• Trafficking in explosive or incendiary devices or firearms over the Internet.
• Pyramid schemes.
• Fake lotto and gambling sites.
• Fake immigration assistance sites.
• Fake foreign employment sites.
• Phony online dating partners.
• Copyright piracy.
• Trademark Counterfeiting.
• Theft of Trade Secrets.
• Hacker-maniacs, Pranksters.
• Connection disruption by uploading and sending worms, viruses and botnets.
• Extortion and International Money Laundering, Identity Theft.
• Committing fraud on security funds, inside trading via the web.
• Unauthorized hacking into computer systems, selling counterfeit computer equipment.
• Uploading, running or hosting phony domain websites.
• Phishing and identity theft.
• Online impersonation of individuals or business firms(identity theft)
• Computer programmer in unauthorized computer access.
• Creating and disseminating fake documents, selling counterfeit goods.
• Illegally accessing government computer or bringing it down.
• Domain name theft, illegal gambling offences, sending international botnet to create massive breakdown of computer systems or paralyzing computer networks
• Copyright infringement, trafficking in counterfeit goods or human beings
• Selling counterfeit software.
• Using malicious advertisement to lure people into disclosing their personal information,
• illegal access, illegal interception, data interference, system interference, misuse of devices, computer-related forgery, computer-related fraud, offences related to child pornography and offences related to copyright and neighboring rights.
• Fraud on social networking sites relating with use of false identity.

Motives for cyber-crime

• Staff disgruntled due to low remuneration, infighting within rank and file of work force because of parochial interests.
• Identity thieves and cyber-stalkers trying to make some money.
• Hacking activists or advocacy groups hoping to score political points.
• Hacker-maniacs, pranksters, erring dilettante, malicious users sending viruses, worms or botnet to infect people’s computer for the fun and adrenaline boost.
• Cybernetic expert wishing to cash in on vulnerable and lucrative computer networks.
• International cyber-spymasters engaged in espionage and cyber-wars.
• Troubleshooting cybernetic gurus or staff belonging to the Intelligence community.
• Renegade law enforcement staff wishing to cash in on a loophole or sabotage the database for capricious reasons.
• Pranksters and deranged individuals (hacker-maniacs) who love destabilizing any vulnerable computer network.
• Fraudsters who steal money from gullible individuals.
• Inquisitive and adventurous computer nerds wishing to try something new.
• Unemployed techno geek trying to make a living.

The culprits

• Cyber-hoodlums Hackers, fraudsters, cyber-bully, cyber-hypnotist, Internet Pedophiles, cyber-dissidents, disseminators of racists and xenophobic materials, cyber-gangsters and homicide criminals, internet human organ racketeers, internet dating sites scammers, unemployed youth and pranksters.

• Cybernetic insider, phishing group, cyber-extortionist, cyber-blackmailer, cyber-defamer, cyber-stalker and spammers.

• Spymasters, renegade computer experts.

The victims

• Unemployed people.
• Institutions with vulnerable computer networks.
• Lonely individuals who live reclusively.
• Internet dilettante.
• Individuals wishing to get involved in pyramid schemes.
• Public or Private firms that are engaged in eCommerce.
• Public or Private firms with a treasure trove of vital information.
• Governments running databanks with priceless sensitive information.

How to report cyber-crime

• Track, locate and identify culprits by doing a Whois.com search of the IP address
• Contact the Internet Service Provider for detailed information
• Contact your attorney, local sheriff or Police Department, Secret Service and Justice Department
• Contact cyber-detectives or Webmasters

Where to report cyber-crime

Depending on the type of cyber-crime committed, you can report the matter to any of the following agencies,
• The Federal Bureau of Investigation (FBI)
• The United States Secret Service
• The Internet Crime Complaint Center (IC3)
• The United States Immigration and Customs Enforcement (ICE)
• The United States Postal Inspection Service
• The Bureau of Alcohol, Tobacco and Firearms (ATF)
• Internet Crime Complaint Center
• The National White Collar Crime Center (NW3C)
• United States Department of Justice
• Stopfakes.gov
• DMCA agents of various firms and institutions
• Department of Homeland Security’s National Infrastructure Coordinating Center
• Attorney’s of firms and institutions
• U.S. Computer Emergency Readiness Team (U.S. CERT)
• Your individual government bureau or its appropriate law enforcement agencies and Justice Departments

How to prevent cyber-crime

Governments and citizens must be proactive in the quest to prevent the underworld from taking over the internet to create the same chaos and anarchy they have wrecked on civilization in the real world. This could be achieved by implementing the following suggestions.
• Elucidate international strategies aimed at combating computer and intellectual property crimes worldwide.
• Create a name and shame cyber-crime map website, follow UK example.
• Monitor all ISP transmitting audio-visual messages via the web.
• Remunerate your staff well but snoop on them.
• Form an alliance with national or foreign competitors to share anti-cyber-crime information.
• Conventions and Agreements should have a global outreach and not limited by the parochial interest of a few affluent nations.
• Need for a global attempt at archiving all information of the internet by ISPs so that data could easily be traced. Such services rendered by the ISPs should be paid for by the secret service of the nation under whose jurisdiction the activity took place or where the cloud computing workstation is located.
• Verify identity of internet users before they embark on any financial transaction.
• Harmonize the domestic criminal substantive law elements of offences and connected provisions in the area of cyber-crime
• Clarify code of conduct for internet users and write the penalty in the statute books without any form of ambiguity.
• Involve the United Nations on all internet Agreements and Conventions.
• Need for international co-operation pursue a common criminal policy aimed at the protection of society against cyber-crime, especially by adopting appropriate legislation and fostering international cooperation? No country can curb cyber-crime alone.
• Need to train more cyber-detectives
• Need to sensitize the public about the dangers of not reporting or conniving with cyber-criminals

Internet-related crimes, like any other crime, should be reported to appropriate law enforcement and investigative authorities at the local, state, federal, or international levels, depending on the scope and enormity of the crime. Citizens who are aware of federal crimes should be compelled to report them to local offices of federal law enforcement agencies.

It has been rightly observed that crimes committed over the Internet pose special challenges for law enforcement. Hence, there is a great need for large number of specially trained cyber-detectives and criminologists.

There is also a need to design new and fair rule of engagement for everyone; otherwise the World Wide Web might be in for a futuristic mutually assured destruction apocalypse.

We should all ensure that there is freedom on the internet in line with all democratic principles. However, we should clamor for the setting up of internet crime prevention and busting organizations to curb the activities of the few miscreants that are sabotaging the World Wide Web rather than advocating censorship.

Massive hacking of high profile website usually create furor in the media and congress. But is censorship necessary in order to curb the scams, thefts, frauds, pranks and cyber attack incidences on the internet?
Should governments censor or democratize the internet?

In conclusion, it would be disingenuous for any cybernetic expert to claim that cyber-crime has no border or the culprits are anonymous. Cyber-crime differs from real time crime because all electronic activities can be traced easily if they are decentralized, enrolled, verified, monitored and archived when any internet transaction occur. If all countries are persuaded to ratify IP Agreements and Conventions, all activities would be traceable.

Then, cyber-crime prevention and busting tactics would be workable.

I hope the internet policy moderators and formulators are listening.

http://www.smashwords.com/books/view/66191
http://www.27thcentury.webs.com

Article Source: http://EzineArticles.com/?expert=Akintunde_M_Lawal

Article Source: http://EzineArticles.com/6383754

Previous Older Entries

Follow

Get every new post delivered to your Inbox.