/ Recently Commented

An End to Spam Litigation Factories? (Gordon v. Virtumundo)

When CAN-SPAM was passed in 2003, it was fairly clear that Congress wasn't trying to enable broad private enforcement. Everyone knew that rabid anti-spammers would seize any new statutory right for a litigation frenzy... Although I personally think Congress would better served all of us by omitting all private enforcement rights in CAN-SPAM, unquestionably the private rights in CAN-SPAM are drafted narrowly to prevent their abuses. That hasn't stopped some zealous anti-spammers from testing the limits of CAN-SPAM's private enforcement remedies anyway. more

Private Cyber Investigators

This post was prompted by questions I was asked to address when I participated in a panel discussion of cybersecurity. Here are the relevant questions: "Should we reconsider the notion that companies under attack are prohibited from investigating the attackers and trying to locate them? We allow private investigators to conduct some activities that usually only the police are allowed to do; should we accredit private cyber investigators?" ...The one I found more interesting is the second question: whether we should accredit private cyber investigators. more

When It Comes to gTLDs, Follow the Money (Part 2)

In my previous article I showed that ICANN expects to recover a lot of money from the first round of applications for new generic Top-Level Domains (gTLDs) -- $92.5 million, to be exact -- and that even that dramatic figure is probably substantially underestimated. For that reason, I argued that ICANN probably will recoup a windfall from the first round of gTLD applications and pointed out that ICANN's promise to consult with the Internet community before spending such a windfall is unsatisfactory because it has failed to say beforehand what surplus revenues might be spent for. more

Some Unsolicited Advice for AT&T re Google Voice

The FCC has posed a number of provocative questions to AT&T regarding the fact that iPhone subscribers cannot download and use the Google Voice application. AT&T should stifle every motivation to play cute or clever with the FCC. Apple adopted such a strategy when it suggested to the Library of Congress and others that it would be curtains for the free world if iPhone owners could hack, jailbreak, tether, and otherwise use their handsets without fear of violating the prohibition on circumventing copyright laws contained in the Digital Millennium Copyright Act. more

When It Comes to gTLDs, Follow the Money (Part 1)

Introducing new generic Top-Level Domains represents, as ICANN says, "the biggest change in the Internet since its inception 40 years ago." Among the least understood aspects of this change is its potential to alter the economic power of ICANN as an institution. To see how that might happen, let's follow the money as it is expected to flow from the gTLD application process. ICANN expects to get a lot of money from gTLD applications: $92,500,000, to be exact. more

MAAWG Issues ISP Guidelines for End-User Bot Removal

Messaging Anti-Abuse Working Group (MAAWG) has issued the first best practices aimed at helping the global ISP industry work more closely with consumers to recognize and remove bot infections on end-users' machines. The paper outlines a three-step approach with recommendations for detecting bots, notifying users that their computers have been compromised, and guiding them in removing the malware. more

Domain Name Registry-Registrar Vertical Separation: The Economic, Anti-Trust Red Herring

ICANN has operated on the fundamental principle that there should be separation within the domain name marketplace between registries (wholesale) and registrars (retail). This fundamental principle has been a pillar upon which ICANN has provided registrants (consumers) with increased choice, innovation, and price savings. Therefore it was with great surprise when ICANN staff unilaterally undertook this initial vertical separation analysis through exclusive consultation with ICANN contracting parties (registrars and registries), while totally excluding non-contracting parties (individual, business and non-commercial registrants)... more

National Broadband Infrastructure: Global Regulatory Re-Think Required

Around the world governments, regulators and the industry are struggling with the old regulatory legacy systems. These have become a major stumbling block in the transition to a new environment. Increasingly countries are beginning to understand the social and economic benefits a national broadband infrastructure can offer, but it is impossible to bring that about while the systems are based on the present regulatory regimes. To take these broader benefits into account we will need to develop government policies to facilitate the digital economy... more

ICANN, Civil Society, and Free Speech

Gordon Crovitz's Op-ed in the Wall Street Journal about the relationship between ICANN and the future of free speech quotes me a couple of times... Crovitz emailed me last week when he was researching his column. I was somewhat more critical of ICANN's status quo in our exchange than in the quotes he ended up using. Following are my full answers, emailed to him on Thursday. more

A Framework for Selecting New TLDs

Your corporate domain names send implicit messages (signals) through their Top-Level Domains (TLDs) and their second-level words. Shape your domain names so to send the right messages and to avoid sending unintentionally confusing messages. The post focuses on a framework to help bidders determine which TLDs send messages that are potentially profit generating... Soon TLDs such as ".car," ".cars," ".green," and ".eco" will be available to any qualified body whose request is favored by the allocation system. The system being discussed is a combination of beauty contests and auctions. more

Think China Is the Highest Spamming Country? Think Again

In my department, we block about 92% of our total email (around 2.5 billion per day) at the network edge without accepting the message. When we do that, we don't see any traffic from that IP anymore and don't keep stats on it due to the overwhelming volume of mail. However, we do keep stats on mail that we block with our content filter. I decided to go and calculate how much spam we receive from each country by mapping the source IP back to its source country... more

Trademark Attorneys Warn Companies About the Upcoming .CM Cybersquatting Possibilities

In light of recent announcements regarding Cameroon's country code Top-Level Domain, .CM, being opened to public registration, Tresa Baldas reports on Law.com: "Trademark attorneys are warning companies about a new target for cybersquatters known as '.cm,' which is the country code -- or top level domain -- for the West African nation of Cameroon. The dot-cm domain is a hot target for scammers, they say, due to 'cm' being a common typographical error for 'com' in the popular dot-com domain. Attorneys say this is significant to brand owners because Internet users searching for brand owners' Web sites frequently mistype dot-com as dot-cm and wind up on a bogus site. Not only is Web traffic lost, they say, but a brand name can get diluted or tainted along the way." (Also see, Nation of Cameroon Typo-Squats the Entire .com Space from 2006) more

Content Filtering Ineffective, Harmful According to Public Knowledge Study

A report released today by Public Knowledge points out that their recent analysis indicates filtering Internet content, as advocated by media companies, will not be effective and in fact harmful to the Internet. An accompanying 60-page whitepaper contains the full report including a number of reasons why the user of copyright filters should not be allowed, encouraged or mandated on U.S. Internet Service Provider (ISP) networks. more

New Analysis Suggests Recent Cyberattacks Against US and South Korea Originated from UK Not N. Korea

Nguyen Minh Duc, senior security director at Bach Khoa Internetwork Security (Bkis), says that the source of recent cyberattack against US and South Korean government websites was not North Korea -- as widely reported -- but UK. Based on Bkis analysis, a report today by Nguyen Minh Duc says that a master server located in UK was found to control the 8 Command and Control servers responsible for the series of cyberattacks last week.
 more

Networks and Nationalization

This post isn't about -- or isn't only about -- the use of computer technology to commit crimes. It's more about the use of computer technology to commit war. A few weeks ago, I was part of a conversation about the legal issues cyberwarfare raises. We were talking about various scenarios -- e.g., a hostile nation-state uses cyberspace to attack the U.S. infrastructure by crippling or shutting down a power grid, air traffic control systems, financial system, etc. Mostly, we were focusing on issues that went to the laws of war, such as how and when a nation-state that is the target of a cyberattack can determine the attack is war, rather than cybercrime or cyberterrorism. more