| | | | | |

 

| | | | | | |

 

| | | |

Cleaning up the 'Net: full contents

In this page: full contents for this work.

Contents
Dedication 5
Caveat 6
Executive Summary 14
Introduction 14
The Problem 14
The Technology 15
The solution 15
The methods 15
Enforcement 16
The results 16
Nigel Morris-Cotterill 17
Introduction. 19
1999 - when the internet was young. 19
Apparently legitimate businesses benefit from the criminal activities of their customers. And governments help. 22
Why internet crime and real world crime should be treated as the same thing. 23
Reform must include immediate suspension of suspicious websites. 25
We've been doing it all wrong. But we know how to do it right. 26
When criminals disappear, they still leave ripples. We already know how to interpret those ripples. 29
Author's note 31
The Use and Abuse of the Internet in Fraud and Money Laundering (1999) 33
Abstract: 33
The Internet. A feat of technology - but little more revolutionary than the ball-point pen. 34
Is regulation of the Internet desirable? 36
In cyberspace, everybody knows your name but no one knows who you are 37
"It must be true, it's on the computer" 40
Internet fraud is easy 40
A vehicle for the rapid dissemination of information. 46
Encryption is one of the battlegrounds when regulation of the internet is considered. 47
Liability of ISPs for content of websites and mail 49
The internet: opportunities for money laundering 52
The internet and transfer pricing 56
Electronic cash 57
Conclusions 58
Note: 2015. 59
The Problem 61
Crime is crime is crime, regardless of the means used to commit it. 62
Codification and the Rule of Lenity 63
Laws to stop spam actively facilitate spam. That must change. 64
Drafting laws to outlaw fraud is simple. Governments don't want to do it, or they don't want to apply existing laws to the internet. 68
Some laws actively facilitate breaches of intellectual property rights. That must change. 69
US style republication laws protect blackmailers, bullies and extortionists. This must change. 70
Is republishing a libel a libel? 94
Spreading crime by stealth. 113
CASE STUDY: Ransomware 113
The Technology 123
Where in the world is my data? 124
Virtually virtual: the internet is not a thing. 132
Proxy Servers and Relays 136
Data "packets" 143
Internet Protocols 144
IPv6: fun with numbers 149
"Reverse Proxy Servers" 151
The proliferation of top level domains 165
Domicile of Domains and Registrants 170
Click Fraud 185
CASE STUDY: THE TOR PROJECT - the case for individual privacy 187
The Dark Side 191
How TOR supports the hidden web. 192
Rogues Gallery 198
The World's Worst Spam Producing Countries 198
The World's Worst ISPs 199
The World's Worst Spammers 200
The Top 50 comment spammers 200
Should we ban encryption? 202
More on copying of content. 205
The solution 209
The Method 217
What is the The Internet Action Task Force? 219
Who should be represented on the IATF? 225
Funding the IATF 228
Legal Force of IATF 229
Enforcement 233
The result 241
Action Plan - Scratchpad 247
The Internet Action Task Force 259
DRAFT 20 Recommendations April 2015 259
1. Adoption and compliance 261
2. National Domain Name Registries 262
3. Top Level Domains 264
Jurisdictional TLDs and non-Jurisdictional TLDs 264
.com and .net TLDs 265
.org TLDs 267
.mil, .edu, .gov 268
.int 269
Basic information required for purchase of a domain 270
Address for service of notices relating to hosted domains. 271
Legal Residence 272
Required Sub-subjurisdictions 273
Retention of Documents 273
4. Property in Domain Names 274
Ownership 274
Misleading or fraudulent domain names 275
6. Access to Registration Information. 276
7. Transfer of domain information including e-mail addresses 276
8. Free and anonymous e-mail services. 277
9. Commercial e-mail. 279
10. Adoption of IPv6 and implementation 281
11. Fraudulent conduct and harmful materials 282
12. Authorised access to computers and networks. 286
13. Intellectual Property 289
14. Website owners as publishers. 292
15. Providers of hosting, VPN, redirection and cloud services, etc. and approved persons. 296
16. Action against promoters of and participants in terrorism. 299
17. Communications services other than e-mail and applications for mobile devices. 301
18. Cookies and user data 304
19. Internet Service Providers and money laundering and support for terrorism. 305
20. Internet client software 307
20. Domain refusal, revocation, cancellation and suspension. 310
21. IATF Voting Procedure. 312
22 Data Protection and transfer of data between countries 314
23. Sanctions for non-compliance 315
Definitions 316
Case Study 317
SELF HELP 318
1. Disallow ALL html in e-mails. 319
2. Hide your logo. 322
3. Don't get added to spam-lists. 332
CASE STUDY: Removing an illegal copy of copyright material. 335
Some brief notes on relevant EU law and how it both helps and hinders the Action Plan 347
Afterword 367

ISBN-13: 978-1518787096
ISBN-10: 1518787096

Website: 
Click for email address