Last September MySpace sued ur-spammers Sanford "Spamford" Wallace and Walt "Pickle Jar" Rines were for egregious violations of CAN SPAM. Neither responded, so as was widely reported, earlier this week the court granted a default judgement. Since they sent a lot of spam, the statutory damages came to an enormous $235 million. Even for Spamford, that's a lot of money. more
There is a germ of truth (perhaps a prion-sized germ or maybe just an amino acid) in the idea that transmitters in "white spaces" in the TV band *might* disrupt patient monitoring equipment if designed by a lunatic who believes in sending massive pulses of energy in a whitespace in the TV band (perhaps amplified by a large parabolic dish antenna the size of a trashcan lid or larger, aimed at the patient monitor system. But that risk is completely shared with zillions of other potential radiators of energy in the entire electromagnetic spectrum... GE, of course, owns NBC. There is a MAJOR conflict of interest at the corporate level of GE... more
The new Clearwire could be game-changing, but the rules of the game may not be quite as Clearwire presents them. I have been wondering since last July whether something significant would happen in the Google/Sprint world. The deal announcement earlier this weekseems to be that key development... In a nutshell, Sprint will contribute its substantial spectrum licenses in the 2.5 GHz range and its WiMAX-related assets and intellectual property. Google, Intel, Comcast, Time Warner Cable, and Bright House Networks will invest a total of $3.2 billion. more
I see and hear a lot of confusion about next generation networks (NGN). In most cases people are using the term roughly as the ITU-T defines it: "A Next Generation Network (NGN) is a packet-based network able to provide services including Telecommunication Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies." but many people don't realize how little this has to do with the Internet... more
There are more than just blue, black and white hat hackers. There are a few more types of folks out there that don't fit into the above categories. This article is taken from Stratfor with some commentary by myself... Many of the hackers described in my previous post are also coders, or "writers," who create viruses, worms, Trojans, bot protocols and other destructive "malware" tools used by hackers... more
One of the other web sites I subscribe to is Stratfor. It's a global intelligence website and doesn't really have much to do with spam. But I like politics so I read it. They have some articles which you can get for free, but the better stuff you have to pay for. About two weeks ago, they ran a three-part series on Cyberwarfare. The first article was the title of this post, which you can access here (requires registration). In the article they described different types of cybercriminals and not-so-criminals which they referred to under the umbrella as "hackers." more
The governor of Colorado recently signed a new anti-spam law [PDF] into effect. Since CAN SPAM draws a tight line around what states can do, this law is mostly interesting for the way that it pushes as firmly against that line as it can. Other observers have already done a legal analysis of the way it's worded to avoid being tossed out as the Oklahoma law was in Mummagraphics, and to make it as easy as possible for suits to meet the falsity or deception limits in CAN SPAM. To me the most interesting part of this law is its one-way fee recovery language... more
There must be something in the air. I'm not sure exactly what it is, but there are a lot of things going on in the ccTLD world at the moment. In the UK Nominet's Annual General Meeting (AGM) is being held this week. This would normally provoke a yawn from most people -- it's an AGM -- how exciting can that be? This year's AGM looks like it could be quite entertaining, although it probably isn't going to be particularly beneficial for its membership. more
Is IPv6 a hot topic again in the wake of the increased coverage of the looming IPv4 address depletion? This was the theme of a coffee break discussion we had at the recent MENOG3 conference in Kuwait. With as many opinions as participants, I turned to "Google Trend" to help me get a better feel... Using IPv6 as search word and varying the time line indeed provided some interesting perspective and tidbits on when and where IPv6 seems to be or have been a hot topic indeed. more
The essay expands a cooperative solution to third-party use of brands in domain names. Like any approach that depends on cooperation, the solution will require both sides to change behavior but also allow both sides to take credit for the resulting benefits, i.e. a triangular solution. If not immediately addressed, the problem of third-party use can become a major threat to the industry. But we already know one thing: when it comes to this issue, legal action and bullying don't work. more
Last week there was a flurry of stories about China's 3G plans after Jonathan Dharmapalan of Ernest & Young was quoted as saying he expected it to take 12 to 24 months from the start of China's commercial TD-SCDMA trials, i.e. from now, until 3G licenses were issued. But there was little analysis or comment on what's really happening. 3G licenses are a formality. They delay the deployment of 3GSM & CDMA 2000 which could otherwise happen rapidly -- just plug new cards into existing radios and offer established handsets (already being manufactured, in China, for the world market). more
One of the major principles of the architecture of the Internet was encapsulated in a paper by Saltzer, Reed and Clark, "End-to-End Arguments in System Design". This paper, originally published in 1981, encapsulated very clearly the looming tension between the network and the application: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible." At the time this end-to-end argument was akin to networking heresy! more
About 300 people attended to the net neutrality hearing Thursday hearing which began with testimony from Larry Lessig, a Stanford Law School professor and founder of the Center for Internet and Society... The meeting was called by the FCC in reaction to the news that US net firm Comcast had been exposed as managing traffic by stopping some of its 13m customers uploading files to BitTorrent and other peer-to-peer networks. The FCC has started a formal investigation to see if Comcast merits a fine for its actions. more
Bell filed its response to the Canadian Association Of Internet Providers (CAIP) submission to the Canadian Radio-television and Telecommunications Commission (CRTC) on its throttling practices yesterday, unsurprisingly arguing that its actions are justified and that there is no need to deal with the issue on an emergency basis. Several points stand out from the submission including its non-response to the privacy concerns with deep-packet inspection... and its inference that P2P usage could be deemed using a connection as a "server" and therefore outside the boundaries of "fair and proportionate use" under typical ISP terms of use. more
Today one of the headlines in Computer Sweden was that there is a dispute between Telia and the regulator PTS in Sweden. PTS requires Telia to stop locking out competing TV-distribution companies for IP-TV in the access network (DSL) that Telia runs. Specifically, they lean towards the fact Telia is dominant provider of the copper, and require Telia to competitors give access to the larger frequency band in the copper that they claim is needed for TV distribution. more