Law

Law / Most Viewed

Privacy Rules to Change in the EU, But What If ...?

In a presentation EU Commissioner Viviane Reding gave a preview of the new Privacy regulation her DG is preparing. As she states, privacy rules need to be brought up to date and harmonized. With all 27 member states having the same rules and tools to enforce, a company only will deal with one privacy commissioner... So, what if we, for the sake of this blog, take this initiative towards spam and cyber crime. What would this do to spam enforcement? more

ICANN Must Release the Single-Character .com Hostages from the IANA Impostor’s Warehouse

Most of the single-character .com labels were initially registered in 1993 by Dr. Jon Postel while performing work pursuant to a contract with, and funded by, the U.S. government and are currently assigned to a "shell registrar" created and controlled by ICANN. This shell - which is the 376th entry on ICANN's list of accredited registrars - is misleadingly identified as the IANA registrar while being engaged in the illicit warehousing of domain names for speculative purposes. more

Why the Fukushima Analogy Was Apt

A few days ago, CAUCE published a blog post entitled "Epsilon Interactive breach the Fukushima of the Email Industry" on our site, and the always-excellent CircleID. A small coterie of commenters was upset by the hyperbolic nature of the headline. Fair enough, an analogy usually has a high degree of probability that it will fail, and clearly, no one has died as a result of the release of what appears to be tens of millions of people's names and email addresses. But, the two situations are analogous in many other ways, and here's why. more

German High Court Says No to Retaining Telecom, Email Data for Tracking Criminal Networks

The highest court in Germany has ruled against telephone and email data retention used to track criminal networks. Melissa Eddy of the Global and Mail reports: "A law ordering data on calls made from mobile or landline telephones and e-mail exchanges be retained for six months for possible use by criminal authorities violated Germans' constitutional right to private correspondence, the Federal Constitutional Court ruled. In its ruling, the court said the law failed to sufficiently balance the need for personal privacy against that for providing security."
 more

New Publication on Updating the Anti-Cybersquatting Regime and Ad-Based Cybersquatting

Sealing the cracks: a proposal to update the anti-cybersquatting regime to combat advertising-based cybersquatting is the title of an article by Christopher Varas in the April issue of the Journal of Intellectual Property Law & Practice. In this article, the author labels "modern cybersquatting" the monetization of domain names through PPC advertisements, and says that brand owners lack effective tools to combat this practice... more

Report On National Online Cybercrime and Online Threats Reporting Centres

Today I released a report on 'National cyber crime and online threats reporting centres. A study into national and international cooperation'. Mitigating online threats and the subsequent enforcing of violations of laws often involves many different organisations and countries. Many countries are presently engaged in erecting national centres aimed at reporting cyber crime, spam or botnet mitigation. more

More Provocative Reasons for a Mandatory National Breach Disclosure

I read, with some small amount of discomfort, an article by Bill Brenner on CSO Online, wherein he interviewed several other CSOs and other "Security Execs" on their opinions on the firing of Pennsylvania CISO Robert Maley. For those who haven't heard about this, Mr. Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. more

Spammer Convicted on Wire Fraud Charges - United States v. Diamreyan

Earlier this year Okpako Mike Diamreyan was found guilty of wire fraud. The district court recently denied his motion for judgment of acquittal. Diamreyan "was charged with devising a scheme to defraud known as an 'advance fee.'" As the court describes it, this is a "scam . . . where a person asks an individual to pay an advance fee in order to obtain a larger sum of money, which the individual [victim] never receives." ... Two things about the case struck me... more

Omnibus Cybersecurity Bill May Not Go Where Original Authors Intended

In an interview with GovInfoSecurity, Sen. Thomas Carper said that the U.S. Senate is considering attaching cybersecurity legislation to a defense authorizations bill. Though clearly a ploy to be able to say "we did something about those evil hackers" before the elections, CAUCE applauds the attempt. There can be no doubt that the United States (and many other countries) sorely needs better laws to deal with these threats. more

Registering and Monetizing Personal Names

At the top of WIPO's list of the most cybersquatted trademarks for 2015 (issued on March 18, 2016) is "Hugo Boss" with 62 complaints. The report also reveals that the fashion industry led other commercial sectors with 10% of complainant activity. Not surprisingly, in this sector companies (couturiers extending their services to the general public) are branded with the personal names of their founders. Why any registrant would intentionally target well-known personal names in the fashion industry is a mystery because there's no future in it. In fact, complaints are never answered and always successful. more

Law as Unusual: Quantum Computing’s Five-Dimensional Challenge to the Legal Establishment

Quantum computers are coming, and the American Bar Association's SciTech section is beginning to consider the legal implications. This raises the question, will the legal profession be able to adopt emerging quantum technologies on a tech-business as a usual basis? Or will the developments flowing from quantum mechanical theory present a categorical challenge to the legal-industrial complex? more

Government Hacking: Proposed Law in the Netherlands

In 2012 I wrote a blog on CircleID called State hacking: Do's and don'ts, pros and cons. In this post I give some thoughts to the concept of a government "hacking back" at criminals. The reason for this was an announcement by the Dutch government that it contemplated law along these lines. The proposed law is now here: the Act Computer Criminality III. more

Ten Years of UDRP

In 1999, the Internet Corporation for Assigned Names and Numbers (ICANN) developed a policy to resolve disputes between trademark owners and registrants of domain names. This policy, the Uniform Domain-Name Dispute Resolution Policy (UDRP) was made available for disputes concerning an alleged abusive registration of a domain name. In the past 10 years alone, more than 16,000 disputes have been filed resulting in more than 10,000 domain name transfers. more

“Restoring” Internet Freedom for Whom?

Recently, a colleague in the Bellisario College of Communications asked me who gets a freedom boost from the FCC's upcoming dismantling of network neutrality safeguards. He noted that Chairman Pai made sure that the title of the FCC's Notice of Proposed Rulemaking is: Restoring Internet Freedom. My colleague wanted to know whose freedom the FCC previously subverted and how removing consumer safeguards promotes freedom. more

NJ Man Arrested for Domain Name Theft and Sale on eBay

A man from the northern New Jersey area was charged and arrested for stealing a domain name belonging to the owners of P2P.com. According to reports, he allegedly transferred the ownership of the domain name to himself and succeeded in reselling it on eBay to a professional basketball player Mark Madsen of the Los Angeles Clippers. more