Spammers, Phishers and Other Assorted Crooks: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.

Slides:



Advertisements
Similar presentations
How Lawsuits Against Spammers Can Aid Spam-Filtering Technology: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group
Advertisements

Latest Trends in the Legal Fight Against Spammers Spam Cambridge, MA January 16, 2004 Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
A Litigators View of the Law on Message Abuse A Presentation to the Messaging Anti-Abuse Working Group Summit May 18, 2004 Jon Praed Internet Law Group.
Observations on the Jeremy Jaynes Criminal Spam Trial Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Trespass to Chattels: eBay and Intel Richard Warner.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
An Overview of the Law on Spam Anti-Spam Research Group San Francisco, CA March 20, 2003 Jon Praed Internet Law Group
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Anonymity and SPAM The Good, the Bad and the Ugly!
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
How To Read A US Court Decision ….or not. U.S. v. Kilbride, (9th Cir. Oct. 28, 2009)
Using “Account-free” Services to Combat Phishing, Brand Infringement, and Other Online Threats Qi-fense LLC © 2009 Sebastian Holst
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Business Law for the Entrepreneur and Manager
Trademark II Infringement. Article 57 Infringement Article 57 Any of the following conduct shall be an infringement upon the right to exclusively use.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Computer Ethics.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
MIT Spam Conference 2006 How Spammers Deal with CAN-Spam: Costa Rica, “microbranding” & 18 USC §2257 Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
MLA FOR ASSET TRACING & RECOVERY INVESTIGATIONS: INTELLIGENCE & EVIDENCE.
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
X-ASVP Executive Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 25, 2007.
Freedom of Speech Computers in the World.
The Future of Anti-Spam: A Blueprint for New Internet Abuse Tools Garth Bruen CEO, KnujOn.com LLC MIT Spam Conference.
InternetInternet ISYS 1050 K. Steere. What is the Internet? A collection of local, regional, national, and international computer networks that are linked.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Trespass in the Spam Cases. CompuServe v. Cyber Promotion User complaints  “CompuServe has received many complaints from subscribers threatening.
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Anti-spam activities in Korea Billy MH Cheon / Korea Network Information Center.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
"You Have Mail" And Other Terms Are Generic Produced by: Asia Green.
Fraud: Does it really only happen to others? Amanda Francis.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Chapter 9: Internet Law, Social Media, and Privacy
Chapter 15 Internet Law and E-Commerce
GCSE ICT SECURITY THREATS.
Trespass in the Spam Cases
Chapter 17: E-Contracts and Licensing
Legal & Ethical Issues in News
E-Contracts and Internet Law
Preventing Information Technology Crimes
Chapter 13 E-Commerce Contracts
Security in mobile technologies
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

Spammers, Phishers and Other Assorted Crooks: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com

What is Spam? Unsolicited –Intent of recipient is the key, but difficult to determine –Well-written spam is facially indistinguishable from solicited commercial & non-commercial Bulk –Substantially similar messages Commercial –Regulations are subject to fewer free speech objections Electronic messages –Convergence is here

Spam Fighting Tools Shield -- Internet Architecture & Filters –Absent fraudulent transmission, filters are generally able to block spam –ISPs are already highly motivated to deliver their subscribers want, and to block they do not want Sword -- Legal Enforcement

To Succeed, Spammers Must Engage in Fraud False or Anonymous Access –Technical header information, WhoIs registrations, obfuscated URLs, encrypted webpages –Gift cards, cash in the mail, third party facilitators –Phished accounts, stolen (zombie) IP space, relay raping, trojan machines Dispersed & Transient Fingerprints –Limitless from lines, URLs, 1,000 points of spam –Hit and run tactics

Legal Weapons Against Spam Discovery & Fact Finding Impose Costs of Defense on Spammers Injunctions –Ban specific conduct or limit access to Internet resources Money Judgments –Disgorge profits from spammers –Fund anti-spam fight –Non-dischargeable in bankruptcy –Can be satisfied from spammers general assets Imprisonment

A Hierarchy of Anti-Spam Rules Acceptable Use Policies –Owners must set expectations to protect private property Plaintiffs Need One Civil and One Criminal Arrow –United States paradigm ( Common law tort of trespass to chattels 36 State Statutes (& counting) U.S. Computer Fraud & Abuse Act, 18 USC 1030 U.S. CAN Spam Act – helpful clarity or enhanced criminal penalties? Arrows Need Only Limited Extra-Jurisdictional Reach –Third party discovery –Service of process –Post-judgment civil enforcement –Extradition Is a Comprehensive International Anti-Spam Law Necessary?

What the Law Needs From Internet Architecture Capture IDENTITY –Accurate records reflecting status of Internet structure (domain names, IP addresses) –details of transaction –intelligent record preservation Recognize GEOGRAPHY –empower Netizens to avoid lawless parts of the Internet –discipline rogue jurisdictions; reward responsible ones –provide notice to spammers of applicable laws

Profile of a Spammer Crooks gone high tech, or geeks gone bad Never been so successful in life Early 20s to 30s Almost always male Profits in 6 figures per year (USD) Profits spent on fast living Surprisingly emotional

How Many Spammers Are There? Far fewer than you might expect Dispersion inflates perception of numerosity Degrees of Separation –Typical spammer has a large spam rolodex –ROKSO Top 200 are separated by no more than one degree

Significant Civil Cases AOL v. Cyber Entertainment Network –Breaking the webmaster affiliate model Verizon Online v. Ralsky –Suing spammers where the spam lands AOL v. CN Productions –Contempt of court has teeth

Why We Will Defeat Spam Victory Doesnt Require a Spam-Free InBox –Banks survive bank robberies Spammers Struggle on Small Margins is Incredibly Resilient –Thrives despite 20%, 40%, 60%, 99% spam rate Spam is a Parasite on the Killer App –Natural state of equilibrium Weve Not Yet Begun to Fight –Criminal enforcement is just beginning

Spammers, Phishers and Other Assorted Crooks: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com