Law

Law / Most Viewed

No Free Lunch in Internet Peering or Transit

Like many of you, I am keenly following the Comcast-Level 3 dispute and am trying to make sense of it all. The dispute confirms several universal principles about Internet traffic routing that have passed the test of time. ... Consumers pay Internet Service Providers ("ISPs") a monthly subscription with the expectation that the fee covers access to available content, i.e., the conduit. As the World Wide Web evolves and content options diversify to include full motion video, consumers simply expect their ISPs to make sure the download distribution pipes are sufficiently robust to handle high bandwidth requirements and commensurately large monthly download volume. more

UDRP: The Liabilities for the Corporations and/or their Lawyers

This post is based on the scenario that a trademark.tld domain name is registered with a UK ICANN accredited registrar, (they have an exclusive UK jurisdiction clause in their contracts), the trademark.tld criticism website located at that domain name is strictly non-commercial, the servers are located in the UK, and the registrant is a British citizen. In the above circumstances, the corporations and/or their lawyers are taking a big risk when they use the Domain Name Dispute Resolution Policies (UDRP) in order to silence criticism at trademark.tld. more

The Trembling Trademark Owners

Why is so much fear being created in the name of protecting trademark owners? Say, if ICANN allowed some third party a generic Top-Level Domain (gTLD) called .panasonic will the sky fall? No, not at all, as Panasonic, the true and rightful TM holder will hit the unauthorized gTLD with a 2x4 and no judge would oppose issuing a cease-and-desist order. Now the other question is... more

Susan Crawford to the White House on Ada Lovelace Day

Just in time for Ada Lovelace Day comes the news that Susan Crawford (Wikipedia, CircleID) is headed to the White House as special assistant to the president for science, technology, and innovation policy... more

Understanding ‘Reverse Domain Name Hijacking’ Under the UDRP

"Reverse Domain Name Hijacking" (RDNH) is a finding that a panel can make against a trademark owner in a case under the Uniform Domain Name Dispute Resolution Policy (UDRP)... While neither the UDRP nor the Rules provide any further details or guidance, the WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Second Edition, provides some insight into the circumstances in which panels have found RDNH. more

Challenging UDRP Awards in Courts of Competent Jurisdiction

The Uniform Domain Name Dispute Resolution Policy (UDRP) is not an exclusive forum for the resolution of domain names accused of cybersquatting even though registration agreements use the word "mandatory" in the event of third-party claims. The UDRP is mandatory only in the sense that respondents are "obliged by virtue of the [registration] agreement to recognize the validity of a proceeding initiated by a third-party claimant." more

Prediction Methods for Crime

There's a new sheriff in town and he's riding the horse of "predictive policing". Back in July the Santa Cruz Police Department began deploying police officers to places where crime is likely to occur in the future -- making use of new predictive modeling programs that are designed to provide daily forecasts of crime hotspots -- thereby allowing the Department to preempt more serious crimes before they occurred. In essence, this is another physical-world application of machine learning and clustering technologies -- applied to preempting a criminal problem. In the cyber-world we've been applying these techniques for a number of years with great success. more

Typosquatting as Per Se Cybersquatting Unless Proved Otherwise

The quintessence of typosquatting is syntactical variation: adding, omitting, replacing, substituting, and transposing words and letters. Since these minor variations are mostly indefensible, respondents rarely respond to complaints, although as I will explain in a moment there can also be innocent and good faith syntactical variations which are not typosquatting. It follows that if there are defenses, respondents should prudently respond and explain their choices because default generally favors complainants. more

Comcast Sneaks in Another Billing Line Item and “Earns” an Additional $1 Billion

My Comcast bill arrived today with a sneaky new $2.68 charge, $2.50 for leasing one (and only one) set-top box and $0.18 for the remote. This new billing line item, like the many others Comcast has introduced, adds to its bottom line with no additional capital expenditure. It shows how resisting the obligation to return to accepting set-top box free, "cable ready" sets was a smart strategy. more

Loopholes and Ambiguities in Contracts that ICANN Oversees

ICANN oversees the creation of many contracts. Its highest paid contractor has historically been the law firm of Jones Day, and of course ICANN has many lawyers on staff. In the past I've identified loopholes in proposed contracts, and those were corrected before they were exploited. However, are there other loopholes sitting in existing contracts waiting to be exploited, or ambiguities with major financial consequences depending on their interpretation? more

Internet Regulation in the Age of Hyper-Giants

As we enter the seventh round of the net neutrality fight, advocates continue to make the same argument they've offered since 2002: infrastructure companies will do massive harm to little guys unless restrained by strict regulation. This idea once made intuitive sense, but it has been bypassed by reality. ... When Tim Wu wrote his first net neutrality paper, the largest telecoms were Verizon, AT&T, and SBC; they stood at numbers 11, 15, and 27 respectively in the Fortune 500 list. more

Google and Verizon Offer a Gift to Spammers

Earlier today, Google and Verizon offered a widely publicized "Proposal for an Open Internet." There's been extensive comment with lots of reasons not to like it, but one I haven't seen is that the proposal would make it much harder to filter so-called "mainsleaze" spam. ... The problem is that under the pitifully weak CAN-SPAM law, a lot of spam is entirely legal. more

Public Private Cooperation: The Zeus Take Down Example

Microsoft took down a Zeus botnet recently. Within days it was publicly accosted by Fox-IT's director Ronald Prins for obstructing ongoing investigations and having used Fox-IT's data. This was followed by the accusation that Microsoft obstructs criminal proceedings... On top of all this EU Commissioner Cecilia Malmström announced that cooperation between law enforcement and industry will be forged in the European Cyber Crime Centre as of 2013. Coincidences do not exist. Why? more

CallService.biz Shut Down by the FBI

Gary Warner over at Cyber Crime and Doing Time has a good post up this week about the CallService.biz website being shut down. I have posted a few good excerpts and added my comments to the end. ... Warner's take on the world of spam, malware, hacking and phishing is that unless people actually go to jail because they are spamming, the problem of spamming will never get better. That's because when the security industry fixes the latest hole or comes up with a new technology to stop the newest threat, spammers simply move onto another. more

ICANN Drifting Toward Online Content Regulation, Says Law Professor

In a paper for the Washington & Lee Law Review, University of Idaho College of Law Professor Annemarie Bridy, depicts ICANN's ambivalent drift into online content regulation through its contractual facilitation of a "trusted notifier" copyright enforcement program between the Motion Picture Association of America (MPAA) and two registry operators for new gTLDs, Seattle-based Donuts and Abu Dhabi-based Radix. more