Law

Law / Featured Blogs

Catching Spam Email with Project Honey Pot

Since its launch in October, 2004 Project Honey Pot has made some interesting progress in their war against spam email. The project is a distributed system used to identify spammers and spambots operating across the Internet. To put it simply, Project Honey Pot lays millions of traps around the Internet (66,393,293 as of this writing) baited with specific email addresses that are configured to forward received emails to the Project Honey Pot system. Since these are not email addresses used by real individuals virtually every email received is positively identified as spam. more

End of Cybersquatting? The gTLD Advantage

On the other hand, major dot brand generic Top-Level Domains (gTLDs) are for internal and controlled sub registrations, they would not be open to first come public offerings and therefore it makes no sense for IBM to plan advance purchase of ibm.canon, as Canon, owner of their own gTLD dot canon, unless mutually agreed between two brands, would have no incentive to sell such a registration to a cyber squatter or to anyone else for that matter. more

Minding the GAC and the Heckler’s Veto

ICANN meetings sometimes congeal around a single theme. In San Francisco the theme was captured on clever t-shirts bearing the iconic symbol of the London Underground with the words, "Mind the GAC." Here was a succinct and timely plea for the ICANN Board to pay serious attention to the Governmental Advisory Committee (GAC)'s concerns about new generic Top-Level Domains (gTLDs), rather than to risk undermining the long-term viability of the multi-stakeholder model. more

Patient Care Suffers When Data Security is a Budgetary Concern

According to a recent Homeland Security News Wire article, nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches. As more hospitals and patient care providers move to store patient data electronically -- primarily as a cost savings effort -- the risk and exposure of our private medical information increases while our individual control over this information diminishes. more

Editorials Against PROTECT-IP

First the Los Angeles Times, now the New York Times have both printed editorials critical of the PROTECT-IP bill. Both the LAT and NYT support copyright - and announce as much in their opening sentences. That doesn't mean we should sacrifice Internet security and stability for legitimate DNS users, nor the transparency of the rule of law. more

World Anti Counterfeiting Day… Staggering Costs Fueled by the Web

Established in 1998 by the Global Anti-Counterfeiting Group (GACG), "World Anti Counterfeiting Day" is held annually in June to raise awareness of the international impacts of counterfeiting and piracy. According to the International Chamber of Commerce (ICC), the cost of counterfeiting is a $600 billion a year problem. MarkMonitor estimates the cost of online counterfeit trade at $200 billion annually. more

IP Addressing in the New Age of Scarcity

This is the prepared opening statement given on behalf of Depository, Inc. at the panel discussion "IP addressing in the new age of scarcity" in the context of Internet governance and public policy at the Global Internet Governance: Research and Public Policy Challenges for the Next Decade Regional Conference held at the American University School of International Service on Thursday, May 5th, 2011 between 11:00 a.m. to 12:15 p.m. with Prof. Milton Mueller moderating and on the panel as well was John Curran, President and CEO of ARIN and Michael Froomkin, Professor of Law, University of Miami School of Law. more

At the Start of the NL IGF

At the annual Dutch "delegation" dinner at the Internet Governance Forum (IGF) in Vilnius, Lithuania, I voiced that it may be a good idea to start a Dutch IGF. This followed a discussion in which we discussed the possibilities of involving more people and organisations from the Netherlands in Internet governance. The, now, Ministry of Economic Affairs, Agriculture and Innovation followed this thought and made it possible for the ECP/EPN foundation to start the NL IGF. more

University of California Identifies the Next Hard Target in a Never Ending War

This is, of course, about the recent NYT article that showcases the results of Prof Stefan Savage and his colleagues from UCSD/Berkeley. As my good friend and longtime volunteer at CAUCE, Ed Falk, points out, this is a great find, but hardly a FUSSP. The nice thing about the fight against bots and spammers is these little victories people on "our" side keep having in an endless series of skirmishes and battles... more

Debugging Legislation: PROTECT IP

There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more