How Lawsuits Against Spammers Can Aid Spam-Filtering Technology: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group

Slides:



Advertisements
Similar presentations
Spammers, Phishers and Other Assorted Crooks: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
Advertisements

Latest Trends in the Legal Fight Against Spammers Spam Cambridge, MA January 16, 2004 Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
A Litigators View of the Law on Message Abuse A Presentation to the Messaging Anti-Abuse Working Group Summit May 18, 2004 Jon Praed Internet Law Group.
Observations on the Jeremy Jaynes Criminal Spam Trial Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
By Andy Scott, Michael Murray and Adam Kanopa
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Ten Police Technology The Internet and Law.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
CYBERSQUATTING: PREVENTION AND REMEDIATION STRATEGIES NET2002 – Washington, DC April 18, 2002 Scott Bearby NCAA Associate General Counsel Copyright Scott.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
An Overview of the Law on Spam Anti-Spam Research Group San Francisco, CA March 20, 2003 Jon Praed Internet Law Group
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Netiquette Rules.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
 Contemporary issues: Cyberspace By Toby and Michael.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Suing Spammers for Fun and Profit Serge Egelman. Background Over 50% of all mail Less than 200 people responsible.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Business Law for the Entrepreneur and Manager
PART THREE E-commerce in Action Norton University E-commerce in Action.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
MIT Spam Conference 2006 How Spammers Deal with CAN-Spam: Costa Rica, “microbranding” & 18 USC §2257 Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Chapter 17 E-Commerce and Digital Law
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Internet Safety Internet Safety LPM
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
RECENT DEVELOPMENTS IN DIGITAL MEDIA ADVERTISING LAW : CANADIAN EDITION VALERIE WARNER DANIN, ESQ.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Chapter 9: Internet Law, Social Media, and Privacy
Chapter 15 Internet Law and E-Commerce
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
CHAPTER 33 Cyberlaw.
Information Security Session October 24, 2005
Forensic and Investigative Accounting
A Gift of Fire Third edition Sara Baase
Chapter 13 E-Commerce Contracts
Forensic and Investigative Accounting
Wireless Spoofing Attacks on Mobile Devices
A Gift of Fire Third edition Sara Baase
Presentation transcript:

How Lawsuits Against Spammers Can Aid Spam-Filtering Technology: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group

What is Spam?

Spam is Unsolicited Bulk Commercial

Spam is Unsolicited Bulk Commercial bulk – substantially similar s commercial – not inherently illegal – challenges for convergence unsolicited – KEY – Intent of Recipient

Recipients Intent Can Be Reflected in 3 Sources: Text of – difficult to distinguish spam from opt-in advertisements; impossible to prevent spammer from reacting to filters* Input from Recipient – difficult to obtain Input from Sender – compelling when you can get it (spammers rarely have any evidence of recipients intent) * Effectiveness of filters should be measured by their resistance to evasion

Laws Against Spam AUPs – Setting expectations Common Law – trespass to chattels State Statutes (i.e., Virginia Computer Crimes Act; Washington anti-spam laws) Federal Statutes (i.e., Computer Fraud & Abuse Act -- general computer crimes statute) Pending Federal Legislation – silver bullets?

Laws Objectives Injunctions Damages Bankruptcy Imprisonment General & Specific Deterrence Retribution Education

Profile of a Spammer Hackers Gone Bad or Crooks Turned Geek Never Been So Successful In Any Other Job Big Spenders But Increasingly Professional

How Spammers Mail Spam Houses – increasingly offshore Dial up accounts – compromised, free or anonymously registered Bulk Software* IP spoofing? * Look for more legal attention and research on bulk software

What Spammers Advertise Point of Sale via Online Payment Lead Generation Rarely Advertise Non-Internet Sites (phone numbers, PO boxes) Almost Never Advertise Brand Awareness

Where Spammers Advertise HyperText Links – temporary sites linked to permanent sites ( linking to Encrypted webpages/ Obfuscated URLs Redirecting webpages Temporary Connectivity is the Norm

Spam = Fraud Source and links are transient and falsified Domain name registrations – is every adult website offshore? (False info can lead to ICANN action (9/02 Verisign)) Webhosting – Spam Houses $10,000/month Third Party Advertisers – In Search of Plausible Deniability

War Stories Contempt is Real -- AOL v. CN Productions Breaking the Webmaster Model -- AOL v. Cyber Entertainment Network You Can Sue Where the Spam Lands and Notice Will Be Presumed -- Verizon Online v. Ralsky Other cases: AOL v. Forrest Dayton, AOL v. Joseph Melle

Federal Legislation Shift Legal Burden to Sender to Produce Evidence of Intent – Presumption of Spam Sunshine via custodian of records disclosures (with Criminal Enforcement for False Disclosures) (18 USC 2257) Sliding Statutory Damages (based on presence of disclosure, evidence of intent and other forms of fraud) Government & ISP Enforcement

Limits of the Law Dependence on technical information Slow and Costly Growing International Scope

How Lawsuits Against Spammers Can Aid Spam-Filtering Technology: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group