Law

Law / Recently Commented

Cyber Crime: It’s All About Data (Part 2)

In this part I want to focus on the gathering of cyber crime data. Are there best practices in the world on how cyber crime data is reported to law enforcement and aggregated to show the impact of said crime? Previously the discussion focused on the fact that cyber crime = crime and on a basic cyber (crime) training for every police officer. From the reactions this received, it is clear that some people see this as a possible solution. more

Is It Time for Social Networks to Adopt Some Trademark Protection?

The headlines this week say that over 200 million domain names now exist on the internet. Pretty impressive... But consider the explosive growth of Social Networks. The top twenty social networks alone have over 2 billion user names. With User Names on social networks rapidly becoming the Internet's new brand identifiers, I wonder: is it time that we apply the same trademark rules we have for domain names to user names as well? more

Nominet/SOCA Cyber Crime Proposal: Allow Cross Border Reactions

Reading the policy proposal of Nominet, I get the feeling that something is overseen here. Putting all the jurisdictional hassle aside for a moment, cyber crime is international, cross-border. So what happens if a UK domain is used for criminal activity outside the UK only? more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

U.S. Homeland Security Launches Website Crackdowns, A Dozen Sites Already Seized

TorrentFreak reports: "Following on the heels of this week's domain seizure of a large hiphop file-sharing links forum, it's clear today that the U.S. Government has been very busy. Without any need for COICA, ICE has just seized the domain of a BitTorrent meta-search engine along with those belonging to other music linking sites and several others which appear to be connected to physical counterfeit goods. more

Outlawing Botnets

The European Commission is apparently considering the promulgation and adoption of a directive that would, at least in part, criminalize botnets. As I understand it, the premise behind adopting such a directive is that since botnets are capable of inflicting "harm" on a large scale, we need to separately criminalize them. I decided to examine the need for and utility of such legislation in this post. more

New Fear, Uncertainty and Doubt about Canada’s Anti-Spam Bill C-28

From time to time, we see unenlightened comments about the efficacy of laws in the fight against spam. "Laws won't stop spam" being the most common. No, they won't. What laws do is dissuade some people from undertaking shoddy mailing practices or even outright spam campaigns. Laws don't stop murder, rape and robbery either, but for those un-dissuaded who undertake such heinous crimes, we, as a society, have laws for punitive effect. They pay the price society exacts for their actions. C-28 will attenuate spam in Canada, and help us to fight spam internationally. more

Lawful Access Bills Proposed for ISPs in Canada

Michael Geist writes: "The bills contain a three-pronged approach focused on information disclosure, mandated surveillance technologies, and new police powers. The first prong mandates the disclosure of Internet provider customer information without court oversight. Under current privacy laws, providers may voluntarily disclose customer information but are not required to do so. The new system would require the disclosure of customer name, address, phone number, email address, Internet protocol address, and a series of device identification numbers." more

Yet Another Unfortunate CAN SPAM Case

The case Melaleuca v. Hansen has been moving slowly through Idaho federal court since 2007. On Sept 30 the court decided in favor of the defendants. Although the outcome is probably correct, the court's decision perpetuates the misreading of CAN SPAM from the infamous Gordon case that makes it in practice impossible to win a CAN SPAM case in the 9th Circuit. more

How Not to Get Your Mail Delivered

A small company in suburban Philadelphia called Holomaxx recently filed two lawsuits against large webmail providers, complaining that they weren't delivering mail from Holomaxx. The first suit is against Microsoft and Return Path, and the second suit is against Yahoo and Cisco/Ironport. Neither is going anywhere. more

Global Spam Levels Drop Following Certain Events

If you haven't noticed lately, spam levels around the world have started dropping especially in October after a couple of events occurred. The first is a Russian crackdown on alleged spam king Igor Gusev, thought to be involved in the operations of SpamIt.com. SpamIt mysteriously shut down in late September, perhaps because Gusev caught wind of law enforcement starting to take notice of him. more

Google Cracks Down on Illegal Online Pharmacies

Announced on the Google Blog last week, the search engine giant has filed a federal lawsuit against a group of rogue pharmacies in an effort to stop them from advertising on its search engine and websites. Michael Zwibelman, the company's litigation counsel, notes that the advertisers have deliberately "violated policies and circumvented technological measures" by using Adwords to promote pharmacy and prescription-drug operations without verification from the National Association of Boards of Pharmacy. more

Nothing to See Here

Three parallel events in US communications policy today, all reported on widely - but with a common thread. ... Law enforcement and national security officials want to make sure that they have the same ability to execute warrants and surveillance orders online that they had in the switched-telephone-circuit age -- which will mean substantial government design mandates for new software, hardware, and communications facilities. more

Domain Name Owner Gets Swift Relief Against Impostor Website

In rem actions over domain names are powerful tools. A trademark owner can undertake these actions when it identifies an infringing domain name but cannot locate the owner of that domain name. In a sense, the domain name itself is the defendant. The Anticybersquatting Consumer Protection Act (which is a part of the federal trademark statute dealing with the unauthorized registration of domain names) says that a court can enter ex parte orders requiring a domain name to be turned over when... more

Omnibus Cybersecurity Bill May Not Go Where Original Authors Intended

In an interview with GovInfoSecurity, Sen. Thomas Carper said that the U.S. Senate is considering attaching cybersecurity legislation to a defense authorizations bill. Though clearly a ploy to be able to say "we did something about those evil hackers" before the elections, CAUCE applauds the attempt. There can be no doubt that the United States (and many other countries) sorely needs better laws to deal with these threats. more