Unearthing and Dissecting Internet Fraud
Michael Krieger <ul><li>Michael Krieger  has practiced high technology business and intellectual property law for more tha...
“ You will  never catch up  with the new technology.”
“ I swear I wasn’t looking at smut –  I was just stealing music.”
” I loved your E-mail, but I thought you’d be older.”
We all face increasingly challenging problems, arising from . . . .
Spam ever-more-ubiquitous technology sophistication, ” Just for kicks, Leon, let’s shut down the FBI again.”
Spam to identity and privacy scams,
to overt criminality, some latent “ You know, you can do this just as easily online.”
“ Big Tony’s website – get rid of it.” …  and others well-organized.
Introductions
David J. Steele <ul><li>David J. Steele  specializes in Internet law  at Christie, Parker & Hale in Newport Beach. Mr. Ste...
Bennet Kelley <ul><li>Bennet Kelley   has been at the center of the legal and policy debates over many of today’s top inte...
Part 1 The Problems
A Growing Problem <ul><li>Internet Crime Complaint Center 2006 Internet Crime Report  </li></ul><ul><li>Referrals </li></u...
Lions and Tigers and   <ul><li>Phishing </li></ul><ul><li>Spyware </li></ul><ul><li>Malware </li></ul><ul><li>Cybersquatte...
Phishing <ul><li>What is Phishing? </li></ul><ul><ul><li>“ Phishing attacks use both social engineering and technical subt...
Common Types of Phishing <ul><li>Dragnet </li></ul><ul><ul><li>Bulk E-mails to large groups of users </li></ul></ul><ul><u...
Dragnet Example <ul><li>From: Customer Support [mailto:support@citibank.com] </li></ul><ul><li>Sent: Thursday, October 07,...
Lobstah Paht
Spyware <ul><li>A somewhat vague term generally referring to software that is secretly installed on a users computer and t...
The Wares <ul><li>Adware </li></ul><ul><li>Software bundled with ad service software </li></ul><ul><li>Notice & consent is...
Domain Name Fraud <ul><li>Cybersquattering </li></ul><ul><li>Domain Name Tasting </li></ul><ul><li>Other Domain Name Fraud...
Domain Name “Tasting” <ul><li>Register and “taste” name for 5 days </li></ul><ul><li>Return domain names for full refund <...
 
How Bad is the Problem? <ul><li>March 2005 – Nearly 43 million .com and net domain names registered. </li></ul><ul><li>Onl...
Other New Domain Name Abuses <ul><li>Domain Name Kiting   </li></ul><ul><ul><li>Registrars Taste, monetize domain names in...
Other Domain Name Abuses   (con’t) <ul><li>Domain Name Spying </li></ul><ul><ul><li>Cybersquatters obtain information that...
 
Click Fraud <ul><li>Generated manually or by automated software. </li></ul><ul><ul><li>Primarily initiated by advertising ...
Counterfeiting on the Internet <ul><li>Accounts for 10% on online commerce – approx $35BB </li></ul><ul><ul><li>Beneficiar...
Protecting Your Brand   <ul><li>25% of Porn Sites use popular brand names (search engine magnets, metatags and links)  (So...
Spam
Rogue Vendors <ul><li>Engaging in unauthorized conduct </li></ul><ul><ul><li>Spam </li></ul></ul><ul><ul><li>Changing your...
Let’s Not Forget . . .
Nigerian 419 Schemes <ul><li>Pre-dates the Internet </li></ul><ul><li>At least 15 people killed </li></ul><ul><li>Losses i...
Scam Dates Back to 1588 <ul><li>“ It's an interesting setup, Mr. Ross. It is the oldest confidence game on the books. The ...
Part 2 Prevention and Remedies
Prevention / Remedies <ul><li>Develop a Plan </li></ul><ul><ul><li>Now … not then </li></ul></ul><ul><ul><li>Consider like...
Contractual Protections <ul><li>Strong anti-fraud provisions </li></ul><ul><li>Restrict risky conduct by requiring prior a...
Protections for Consumers <ul><li>Inventory your wallet's contents </li></ul><ul><li>Consider a credit-monitoring service:...
Detection / Monitoring Tools <ul><li>Search and Web Monitoring </li></ul><ul><ul><li>RSS </li></ul></ul><ul><ul><li>Techno...
Action Plan <ul><li>Fact Gathering </li></ul><ul><ul><li>ensure you understand the problem </li></ul></ul><ul><li>Containm...
Spyware Federal Enforcement
State & Civil Enforcement
Phishing Remedies <ul><li>California Anti-Phishing Law--Cal. B&P Code Sec. 22948 </li></ul><ul><li>&quot;It shall be unlaw...
Click Fraud Enforcement <ul><li>Against Search Engines   </li></ul><ul><li>Google settles nationwide class action for $90 ...
Attacking Counterfeiting <ul><li>Tiffany & Co. </li></ul><ul><ul><li>wins $960,000 verdict and injunction against online s...
Domain Name Remedies <ul><li>Uniform Dispute Resolution Policy (UDRP) </li></ul><ul><li>Anti-cybersquatter Consumer Protec...
Jurisdictional Issues <ul><li>Foreign actors </li></ul><ul><ul><li>or US actors who fake being overseas </li></ul></ul><ul...
Legislative Response: Spyware <ul><li>15 States with Spyware Laws </li></ul><ul><li>California law is model </li></ul><ul>...
Current Spyware Legislation <ul><li>H.R. 1525 – I-SPY Act  </li></ul><ul><ul><li>754 words </li></ul></ul><ul><ul><li>Pass...
Legislative Response: Domain  Tasting <ul><li>Coalition Against Domain Name Abuse (CADNA) </li></ul><ul><li>Several Large ...
Questions?
Contact Info <ul><li>Michael Krieger [email_address] </li></ul><ul><li>Bennet Kelley [email_address] </li></ul><ul><li>Dav...
Upcoming SlideShare
Loading in …5
×

Unearthing and Dissecting Internet Fraud

687 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
687
On SlideShare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Unearthing and Dissecting Internet Fraud

  1. 1. Unearthing and Dissecting Internet Fraud
  2. 2. Michael Krieger <ul><li>Michael Krieger has practiced high technology business and intellectual property law for more than 20 years. His practice focuses on protecting and exploiting clients' patents and other key IP assets via a combination strategic counseling, litigation and preventive means as needed. With degrees in mathematics (B.S., Caltech; Ph.D., UCLA) and law (UCLA), he was on the MIT Mathematics and UCLA Computer Science faculties and also a Fulbright Scholar prior to practicing law.  This technical background led to early involvement with encryption, the domain name-trademark clash, and open source issues as well as IP litigation for content providers and patent holders.  His clients have ranged from start-ups to industry leaders, including counseling in the tech transfer arena and for the United Nations and other international technology initiatives.  He also serves as an expert in technology litigation. </li></ul>
  3. 3. “ You will never catch up with the new technology.”
  4. 4. “ I swear I wasn’t looking at smut – I was just stealing music.”
  5. 5. ” I loved your E-mail, but I thought you’d be older.”
  6. 6. We all face increasingly challenging problems, arising from . . . .
  7. 7. Spam ever-more-ubiquitous technology sophistication, ” Just for kicks, Leon, let’s shut down the FBI again.”
  8. 8. Spam to identity and privacy scams,
  9. 9. to overt criminality, some latent “ You know, you can do this just as easily online.”
  10. 10. “ Big Tony’s website – get rid of it.” … and others well-organized.
  11. 11. Introductions
  12. 12. David J. Steele <ul><li>David J. Steele specializes in Internet law at Christie, Parker & Hale in Newport Beach. Mr. Steele also teaches Trademark and Internet Law at Loyola Law School. </li></ul><ul><li>An expert on Internet law and technology, Mr. Steele has successfully handled hundreds of Internet cases, typically for famous trademark owners. </li></ul><ul><li>Mr. Steele holds a B.S., Electrical and Computer Eng., CS Polytechnic University, Pomona, and a J.D. from Loyola Law School </li></ul>
  13. 13. Bennet Kelley <ul><li>Bennet Kelley has been at the center of the legal and policy debates over many of today’s top internet issues, having provided legal advice, litigated, lobbied, testified and written commentaries on issues such as privacy, spam and spyware. </li></ul><ul><li>Mr. Kelley currently serves as Assistant General Counsel and Director of Governmental Affairs & Privacy for ValueClick, Inc. and also is Co-Chair of the Legislative Subcommittee of the California State Bar’s Cyberspace Committee. In September, he will launch the Internet Law Center with offices in Santa Monica and Washington, D.C. </li></ul><ul><li>Mr. Kelley received a B.S. in Political Science from The American University in 1984 and J.D. from Georgetown University Law Center in 1990. </li></ul>
  14. 14. Part 1 The Problems
  15. 15. A Growing Problem <ul><li>Internet Crime Complaint Center 2006 Internet Crime Report </li></ul><ul><li>Referrals </li></ul><ul><ul><li>2001 - ≤ 50,000 </li></ul></ul><ul><ul><li>2006 – 207,492 </li></ul></ul><ul><li>Dollar Loss </li></ul><ul><ul><li>2001 - $17.6MM </li></ul></ul><ul><ul><li>2006 - $198.4 MM </li></ul></ul><ul><li>Top Mechanisms </li></ul><ul><ul><li>Email - 73.9% </li></ul></ul><ul><ul><li>Websites 36.0% </li></ul></ul>
  16. 16. Lions and Tigers and <ul><li>Phishing </li></ul><ul><li>Spyware </li></ul><ul><li>Malware </li></ul><ul><li>Cybersquatters </li></ul><ul><li>Domain Tasters </li></ul><ul><li>Click Fraudsters </li></ul><ul><li>Counterfeiters </li></ul><ul><li>Rogue Vendors </li></ul><ul><li>‘ 419 Scammers </li></ul><ul><li>OH MY! </li></ul>
  17. 17. Phishing <ul><li>What is Phishing? </li></ul><ul><ul><li>“ Phishing attacks use both social engineering and technical subterfuge to steal consumers’ personal identity data and/or financial account credentials.” Anti-Phishing Working Group </li></ul></ul>
  18. 18. Common Types of Phishing <ul><li>Dragnet </li></ul><ul><ul><li>Bulk E-mails to large groups of users </li></ul></ul><ul><ul><ul><li>no specific target pre-identified </li></ul></ul></ul><ul><ul><ul><li>e.g., directing users to a falsified identification </li></ul></ul></ul><ul><li>Rod-and-Reel </li></ul><ul><ul><li>Targeted contact with pre-identified victim </li></ul></ul><ul><ul><li>e.g., lure to visit website </li></ul></ul><ul><li>Lobsterpot </li></ul><ul><ul><li>Set trap and wait for victim </li></ul></ul><ul><ul><li>e.g., confusingly similar domain name </li></ul></ul>
  19. 19. Dragnet Example <ul><li>From: Customer Support [mailto:support@citibank.com] </li></ul><ul><li>Sent: Thursday, October 07, 2004 7:53 PM </li></ul><ul><li>To: Eilts </li></ul><ul><li>Subject: NOTE! Citibank account suspend in process </li></ul><ul><li>Dear Customer: </li></ul><ul><li>Recently there have been a large number of cyber attacks pointing our database servers. In order </li></ul><ul><li>to safeguard your account, we require you to sign on immediately. This personal check is requested of you as a precautionary measure and to ensure yourselves that everything is normal with your balance and personal information. This process is mandatory, and if you did not sign on within the nearest time your account may be subject to temporary suspension. Please make sure you have your Citibank(R) debit card number and your User ID and Password at hand . Please use our secure counter server to indicate that you have signed on, please click the link bellow: http://211.158.34.249/citifi/ . Note that we have no particular indications that your details have been compromised in any way. Thank you for your prompt attention to this matter and thank you for using Citibank(R) </li></ul><ul><li>Regards, </li></ul><ul><li>Citibank(R) Card Department </li></ul><ul><li>(C)2004 Citibank. Citibank, N.A., Citibank, F.S.B., </li></ul><ul><li>Citibank (West), FSB. Member FDIC.Citibank and Arc </li></ul>
  20. 20. Lobstah Paht
  21. 21. Spyware <ul><li>A somewhat vague term generally referring to software that is secretly installed on a users computer and that monitors use of the computer in some way without the users' knowledge or consent. Most spyware tries to get the user to view advertising and/or particular web pages. Some spyware also sends information about the user to another machine over the Internet. Spyware is usually installed without a users' knowledge as part of the installation of other software, especially software such as music sharing software obtained via download. </li></ul><ul><li>- Matisse Glossary of Internet Terms </li></ul>
  22. 22. The Wares <ul><li>Adware </li></ul><ul><li>Software bundled with ad service software </li></ul><ul><li>Notice & consent issues </li></ul><ul><li>Spyware </li></ul><ul><li>Gathers information on user without knowledge </li></ul><ul><ul><li>Email addresses </li></ul></ul><ul><ul><li>Passwords </li></ul></ul><ul><ul><li>Credit Card Information </li></ul></ul><ul><li>Keystroke Logging </li></ul><ul><li>Alters default settings </li></ul><ul><li>Malware </li></ul><ul><li>Software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. </li></ul><ul><li>Rogueware and Scareware </li></ul><ul><li>Faux Anti-Spyware Programs or legitimate programs that overstate threat by labeling benign applications as Spyware </li></ul><ul><li>Warez </li></ul><ul><li>Term used by software &quot;pirates&quot; to describe software that has been stripped of its copy-protection and made available on the Internet for downloading. . </li></ul>
  23. 23. Domain Name Fraud <ul><li>Cybersquattering </li></ul><ul><li>Domain Name Tasting </li></ul><ul><li>Other Domain Name Fraud </li></ul>
  24. 24. Domain Name “Tasting” <ul><li>Register and “taste” name for 5 days </li></ul><ul><li>Return domain names for full refund </li></ul><ul><li>Measure Traffic Through Pay Per Click Ads </li></ul><ul><li>Keep domain names that earn more than $6 </li></ul><ul><li>Monetize domain names </li></ul><ul><ul><li>Misdirect customer </li></ul></ul><ul><ul><li>Get paid by advertisers (e.g., Google’ AdSense) </li></ul></ul>
  25. 26. How Bad is the Problem? <ul><li>March 2005 – Nearly 43 million .com and net domain names registered. </li></ul><ul><li>Only 2.5 million names were deleted that same month. </li></ul><ul><li>In April of 2006, 35 million names registered. </li></ul><ul><li>Of those names 32.7 million were used again and again but never registered permanently! </li></ul>
  26. 27. Other New Domain Name Abuses <ul><li>Domain Name Kiting </li></ul><ul><ul><li>Registrars Taste, monetize domain names in Bulk and delete them </li></ul></ul><ul><ul><li>then, using an automated process, they automatically re-register them... again and again. </li></ul></ul>
  27. 28. Other Domain Name Abuses (con’t) <ul><li>Domain Name Spying </li></ul><ul><ul><li>Cybersquatters obtain information that a domain name is of interest to a consumer </li></ul></ul><ul><ul><ul><li>they most often purchase this information from </li></ul></ul></ul><ul><ul><ul><ul><li>whois websites </li></ul></ul></ul></ul><ul><ul><ul><ul><li>domain name registrars </li></ul></ul></ul></ul><ul><ul><li>then register the domain name before the consumer can register them using an automated process </li></ul></ul><ul><ul><li>offer to sell the domain name </li></ul></ul>
  28. 30. Click Fraud <ul><li>Generated manually or by automated software. </li></ul><ul><ul><li>Primarily initiated by advertising competitors and CPC affiliates and traffic partners. </li></ul></ul><ul><ul><li>Other reasons - revenge (disgruntled employee) and blackmail (exploit network limitations for profit) </li></ul></ul><ul><li>Click Fraud Network </li></ul><ul><ul><li>Overall – 15.8% (Q2 -2007) </li></ul></ul><ul><ul><li>Search Engines – 25.% (Q2 -2007) </li></ul></ul><ul><li>Google </li></ul><ul><ul><li>10.0% total, but after filtering only 0.2% is actually billed </li></ul></ul><ul><ul><li>Released report in 2006 on “How Fictitious Clicks Occur in Third-Party Click Fraud Audit Reports” </li></ul></ul>
  29. 31. Counterfeiting on the Internet <ul><li>Accounts for 10% on online commerce – approx $35BB </li></ul><ul><ul><li>Beneficiaries include organized crime, terrorist groups (Source: Intl Chamber of Commerce) </li></ul></ul><ul><li>US companies lose an average of 23 percent of potential sales due to trademark infringement and counterfeiting (Source: Intl Trademark Association) </li></ul><ul><li>Tiffany’s found that 95% of its products sold on eBay were counterfeit or grey market goods </li></ul>
  30. 32. Protecting Your Brand <ul><li>25% of Porn Sites use popular brand names (search engine magnets, metatags and links) (Source: Cyveillance) </li></ul><ul><li>32 million out of 35 million registered domain names appear fraudulent (Source: GoDaddy.com) </li></ul><ul><li>92 of top 100 brands used in third party search ads (Source NameProtect) </li></ul><ul><ul><li>98% used actual brand name </li></ul></ul><ul><ul><li>45% were directly competitive </li></ul></ul>
  31. 33. Spam
  32. 34. Rogue Vendors <ul><li>Engaging in unauthorized conduct </li></ul><ul><ul><li>Spam </li></ul></ul><ul><ul><li>Changing your creative content </li></ul></ul><ul><ul><li>Using your content for other purposes </li></ul></ul><ul><ul><li>Deceptive advertising </li></ul></ul><ul><ul><ul><li>Key word search </li></ul></ul></ul><ul><ul><ul><li>Email marketing </li></ul></ul></ul><ul><ul><ul><li>Banners </li></ul></ul></ul>
  33. 35. Let’s Not Forget . . .
  34. 36. Nigerian 419 Schemes <ul><li>Pre-dates the Internet </li></ul><ul><li>At least 15 people killed </li></ul><ul><li>Losses in 2005 </li></ul><ul><ul><li>US $720 MM </li></ul></ul><ul><ul><li>Worldwide $31.8 BB </li></ul></ul><ul><li>Bankruptcies Caused By ‘419 Schemes (1996-2006) </li></ul><ul><ul><li>US – 8,350 </li></ul></ul><ul><ul><li>Worldwide 13,087 </li></ul></ul>
  35. 37. Scam Dates Back to 1588 <ul><li>“ It's an interesting setup, Mr. Ross. It is the oldest confidence game on the books. The Spanish Prisoner... Fellow says, him and his sister, wealthy refugees, left a fortune in the Home Country, he got out, girl and the money stuck in Spain. Here is her most beautiful portrait. And he needs money to get her and the fortune out. Man who supplies the money gets the fortune and the girl. Oldest con in the world .&quot; </li></ul><ul><li>From Wikipedia: The Spanish Prisoner is a confidence game dating back to 1588. </li></ul><ul><li>FYI: If a sucker is truly born every minute – there would have been over 13.2 billion suckers born during this period. </li></ul>
  36. 38. Part 2 Prevention and Remedies
  37. 39. Prevention / Remedies <ul><li>Develop a Plan </li></ul><ul><ul><li>Now … not then </li></ul></ul><ul><ul><li>Consider likely problems </li></ul></ul><ul><ul><li>Implement preventative measures </li></ul></ul><ul><ul><li>Detection / Monitoring tools </li></ul></ul><ul><ul><li>Action plan for problems </li></ul></ul><ul><ul><li>Remedies </li></ul></ul>
  38. 40. Contractual Protections <ul><li>Strong anti-fraud provisions </li></ul><ul><li>Restrict risky conduct by requiring prior approval </li></ul><ul><li>Audit rights </li></ul><ul><li>Termination </li></ul><ul><li>Liquidated damages </li></ul><ul><li>Make sure vendors’ partners have made similar warranties </li></ul>
  39. 41. Protections for Consumers <ul><li>Inventory your wallet's contents </li></ul><ul><li>Consider a credit-monitoring service: Equifax, Experian, TransUnion </li></ul><ul><li>Order a free credit report every four months ( AnnualCreditReport.com ) </li></ul><ul><li>Renew the 90-day fraud alerts placed on your credit reports. </li></ul>
  40. 42. Detection / Monitoring Tools <ul><li>Search and Web Monitoring </li></ul><ul><ul><li>RSS </li></ul></ul><ul><ul><li>Technorati </li></ul></ul><ul><ul><li>MonitorThis </li></ul></ul><ul><ul><li>WatchThatPage </li></ul></ul><ul><ul><li>Google/Yahoo Search Feeds </li></ul></ul><ul><li>Private Services (mark watch & domain names) </li></ul><ul><ul><li>MarkMonitor </li></ul></ul><ul><ul><li>Thompson & Thompson </li></ul></ul>
  41. 43. Action Plan <ul><li>Fact Gathering </li></ul><ul><ul><li>ensure you understand the problem </li></ul></ul><ul><li>Containment </li></ul><ul><li>Remediation </li></ul><ul><ul><li>disclosure requirement? </li></ul></ul><ul><li>Remedies </li></ul><ul><ul><li>Civil </li></ul></ul><ul><ul><li>Criminal </li></ul></ul><ul><ul><ul><li>N.B. Law enforcement action may preclude some/all civil options (temporarily) </li></ul></ul></ul>
  42. 44. Spyware Federal Enforcement
  43. 45. State & Civil Enforcement
  44. 46. Phishing Remedies <ul><li>California Anti-Phishing Law--Cal. B&P Code Sec. 22948 </li></ul><ul><li>&quot;It shall be unlawful for any person, by means of a Web page, electronic mail message, or otherwise through use of the Internet, to solicit, request, or take any action to induce another person to provide identifying information by representing itself to be a business without the authority or approval of the business.&quot; </li></ul>
  45. 47. Click Fraud Enforcement <ul><li>Against Search Engines </li></ul><ul><li>Google settles nationwide class action for $90 million Lane's Gifts & Collectibles LLC et al. v. Yahoo! Inc . et al . (Ark. Cir. Ct) </li></ul><ul><li>Yahoo settles class action for $4.5 million in attorneys fees plus refund of fraudulent charges. Checkmate Strategic Group v. Yahoo (C.D. Cal.) </li></ul><ul><li>By Search Engines </li></ul><ul><li>Google v. Auction Experts International (Cal. Superior Ct. 2005) ($75,000 default judgment) </li></ul>
  46. 48. Attacking Counterfeiting <ul><li>Tiffany & Co. </li></ul><ul><ul><li>wins $960,000 verdict and injunction against online seller of counterfeit goods </li></ul></ul><ul><li>eBay Litigation </li></ul><ul><ul><li>Rolex </li></ul></ul><ul><ul><ul><li>German court rules eBay must take measures to prevent recurrence of counterfeit Rolex postings </li></ul></ul></ul><ul><ul><li>Pending </li></ul></ul><ul><li>Civil Remedies Lanham Act/ Copyright Act </li></ul><ul><ul><li>Injunctive relief </li></ul></ul><ul><ul><li>Damages </li></ul></ul><ul><ul><li>Forfeiture </li></ul></ul><ul><li>Criminal Remedies Trademark Counterfeiting Act </li></ul><ul><ul><li>Criminal penalties </li></ul></ul><ul><ul><li>Forfeiture </li></ul></ul><ul><li>Administrative Remedies </li></ul><ul><ul><li>Intl Trade Commission Section 337 - Exclusion Order for infringing items </li></ul></ul><ul><ul><li>U.S. Customs – border seizure </li></ul></ul>
  47. 49. Domain Name Remedies <ul><li>Uniform Dispute Resolution Policy (UDRP) </li></ul><ul><li>Anti-cybersquatter Consumer Protection Act (ACPA) – 15 USC 1125(d) </li></ul><ul><ul><li>in personam </li></ul></ul><ul><ul><li>in rem </li></ul></ul>
  48. 50. Jurisdictional Issues <ul><li>Foreign actors </li></ul><ul><ul><li>or US actors who fake being overseas </li></ul></ul><ul><ul><li>hard to track down the real bad guy </li></ul></ul><ul><li>Amounts not worth pursuing (just fix it and move on) </li></ul><ul><li>No jurisdiction over defendant? </li></ul>Jurisdictional Issues
  49. 51. Legislative Response: Spyware <ul><li>15 States with Spyware Laws </li></ul><ul><li>California law is model </li></ul><ul><ul><li>Prohibits deceptive downloading and/or collection of information </li></ul></ul><ul><ul><li>Prohibits taking over third party computer or altering default settings </li></ul></ul><ul><li>No Federal Law </li></ul><ul><li>FTC Position - a lready have sufficient authority </li></ul><ul><li>Spy Act/I-Spy Act </li></ul><ul><li>The Spy Act </li></ul><ul><ul><li>proscribes conduct associated with spyware </li></ul></ul><ul><ul><li>notice requirements for adware and other downloadable applications </li></ul></ul><ul><li>I-Spy Act - criminal penalties for spyware </li></ul><ul><li>Both passed House in 2004 and 2005 </li></ul>
  50. 52. Current Spyware Legislation <ul><li>H.R. 1525 – I-SPY Act </li></ul><ul><ul><li>754 words </li></ul></ul><ul><ul><li>Passed House by Voice Vote </li></ul></ul><ul><li>H.R. 964 - SPY Act </li></ul><ul><ul><li>5,421 words </li></ul></ul><ul><ul><li>Expands reach to include Websites and regulate “unfair” as well as deceptive </li></ul></ul><ul><ul><li>Managers amendment morphed into online privacy bill. </li></ul></ul><ul><ul><li>Passed House 368-48 </li></ul></ul><ul><ul><ul><li>Opposed by principal sponsors of I-SPY Act </li></ul></ul></ul><ul><li>S. 1625 – Counter Spy Act </li></ul>
  51. 53. Legislative Response: Domain Tasting <ul><li>Coalition Against Domain Name Abuse (CADNA) </li></ul><ul><li>Several Large TM owners </li></ul><ul><li>ICANN working group(s) </li></ul>
  52. 54. Questions?
  53. 55. Contact Info <ul><li>Michael Krieger [email_address] </li></ul><ul><li>Bennet Kelley [email_address] </li></ul><ul><li>David Steele [email_address] </li></ul>

×