[dba-Tech] A new tool In the spam war?

Jon Tydda Jon.Tydda at alcontrol.co.uk
Mon Jan 17 03:31:25 CST 2005


http://www.theregister.co.uk/2005/01/14/arbitration_new_tool_in_spam_war/
<http://www.theregister.co.uk/2005/01/14/arbitration_new_tool_in_spam_war/> 
 

A new tool In the spam war

By Ethan
<http://forms.theregister.co.uk/mail_author/?story_url=/2005/01/14/arbitrati
on_new_tool_in_spam_war/> Preston, SecurityFocs
Published Friday 14th January 2005 05:29 GMT

Arbitration is part of the next wave of security measures, and can be
effective against spammers who illegally harvest email addresses from a
honeypot on your website, writes Ethan Preston.

Anti-spammers have a new weapon in their arms race with the spammers. A
robot recently rummaged through Mike Wendland's  <http://mikesejournal.com/>
website, harvesting email addresses to spam. But, as a participant of
Project Honeypot <http://www.projecthoneypot.org/> , Wendland was prepared
with an  <http://mikesejournal.com/archives/003057.php> anti-spam honeypot.
(Project Honeypot is coordinated by Matthew Prince, CEO of unspam
<http://www.unspam.com/> .)

The script automatically generates bogus web pages (like this
<http://www.projecthoneypot.org/honey_pot_example.php> ) that contain a
control email address for the robot to collect. Project Honeypot both
records the robot's IP address, the date and time the bogus web page is
downloaded, and also receives any email sent to the control email address.
The control email addresses are unique, so the Project can positively
correlate a robot's IP address and time-stamp with any spam sent to the
control email addresses. The end result: Wendland was able to identify the
illicit  <http://mikesejournal.com/archives/003071.php> harvester, an
ostensibly legitimate marketing company.

By identifying illicit harvesters, Project Honeypot opens up a new front in
the war on spam. Webmasters can now identify and block robots that harvest
email addresses from their websites. Indeed, because the Project collects
participants' data and publishes a list of IP addresses
<http://www.projecthoneypot.org/bots_and_servers.php> associated with spam
harvesters, webmasters and ISPs can block all the harvesting robots
identified through Project Honeypot.

Moreover, once harvesters have been identified, they can be prosecuted and
<http://www.projecthoneypot.org/law_of_harvesting.php> sued under the CAN
SPAM Act of 2004. And the states have their own anti-spam statutes, whose
penalties as seen recently can be quite severe.
<http://www.securityfocus.com/columnists/287> 

Given these new advances, the model license
<http://www.projecthoneypot.org/honey_pot_example.php>  used in Project
Honeypot's bogus web pages is one aspect of Project Honeypot that might get
overlooked. Even though a harvester's use of a website might be illicit, the
bogus web pages' license is nonetheless legally binding. This model license
contains a number of interesting provisions:

*	The model license states that the harvester, as the owner of the
robot, agrees to the license's terms when the harvester collects, stores,
transfers to the third party, or sends email to, a control email address. 

*	The model license also prohibits robots from using more system
resources than a human visitor would, or from collecting or storing any
email address from the participant's website. The harvester also agrees each
email address on the participant's website has a $50 value. 

*	Finally, when a harvester agrees to the web page's license, it also
consents to litigate in the courts where the participant resides. 

The model license is meant to provide Project Honeypot's participants with
effective legal remedies against harvesters. The last provision lets the
Project's participants haul harvesters from anywhere in the country into the
participant's local courts. This is both convenient and more economical for
the Project's participants, and may put a harvesting company at a
considerable disadvantage by forcing it to litigate in a distant court.

But is litigation an adequate remedy against harvesters? To indulge in
stereotypes for a moment, the anti-spam movement (like the computer security
discipline generally) has two sides: the geeks and the lawyers. The geeks
are often skeptical about the lawyers and the legal system - compared with
technical solutions, the legal system is slow, expensive, uncertain and
limited by national boundaries. And although geeks will applaud Project
Honeypot's technical innovation, they could be skeptical about whether the
Project's participants can actually collect money from harvesters that might
be half way around the  <http://mikesejournal.com/archives/003074.php>
world. Even if a network operator obtains a judgment from a local court,
enforcing a domestic judgment ( especially if
<http://travel.state.gov/law/enforcement_of_judgments.html> the domestic
court is American) in a foreign jurisdiction can be difficult and uncertain.


Is arbitration the next step for computer security?


What else can the lawyers add to Project Honeypot? Keep in mind that Project
Honeypot has already shown a good deal of legal acumen (PDF)
<http://www.ceas.cc/papers-2004/163.pdf> : once again, even though a robot's
access to a Project participant's website is illicit, the robot nonetheless
contractually binds its owner to the terms of the Project's model license.
In turn, harvesters are liable for breaching the license, and may have to
defend themselves in the Project participant's local court. But the
Project's model license actually can do more: virtually every document that
contains a contract can also incorporate an arbitration agreement as well.

Arbitration is a dispute resolution process similar to litigation, except
that the arbitrating parties privately agree to the rules of arbitration and
select private individuals (called arbitrators) to administer and decide the
arbitration (rather than public officials, like judges). The parties in
arbitration can (within limits) use their own procedural rules to make the
proceeding shorter, simpler and less expensive than litigation. Parties can
also use IT professionals with training in computer security as arbitrators,
rather than judges with no computer science background. Finally, arbitration
agreements can provide penalties for unauthorized disclosure of information
about the arbitration proceedings, while litigation is open to the public.

Arbitration also has another significant advantage over litigation: most
<http://www.uncitral.org/english/status/status-e.htm#Convention%20on%20the%2
0Recognition%20and%20Enforcement%20of%20Foreign%20Arbitral%20Awards%20(New%2
0York,%201958)> of the countries around the world have signed the New York
<http://www.uncitral.org/english/texts/arbitration/NY-conv.htm> Convention
on the Recognition and Enforcement of Foreign Arbitral Awards, which
requires the signatory countries to recognize and enforce foreign
arbitration awards except in very limited circumstances. Thus, arbitration
awards can be enforced more readily than domestic court judgments.

The international enforcement of arbitration awards has implications well
beyond Project Honeypot. Today, most networks have some kind of contractual
language in their login banners, or otherwise require users accessing the
network to agree to the terms of a network license. For instance, more
traditional <http://www.securityfocus.com/infocus/1757>  honeypot operators
use "consent banners" to insulate themselves from
<http://www.securityfocus.com/infocus/1703> liability under wiretapping
laws. Anywhere network operators use licenses or contracts, they can include
arbitration provisions. The ability to enforce arbitration awards against
foreign spammers, harvesters, and other network intruders could mean a more
prominent role for the legal system in modern computer security practice.


Flies in the ointment


Although any contract can contain an arbitration agreement, there's a
wrinkle. To be enforceable, network licenses (like Project Honeypot's model
license) must be recognized as valid arbitration agreements in both the
network operator's jurisdiction and the network intruder's jurisdiction. The
New York Convention only requires signatory countries to recognize written
arbitration agreements. Unfortunately, the New York Convention was written
in 1958, and its definition of a written agreement includes contracts or
arbitration agreements "signed by the parties or contained in an exchange of
letters or telegrams."

Fortunately, many
<http://www.uncitral.org/english/status/status-e.htm#UNCITRAL%20Model%20Law%
20on%20International%20Commercial%20Arbitration%20(1985)> countries have
updated their arbitration laws to include
<http://www.uncitral.org/english/texts/arbitration/ml-arb.htm> electronic
agreements like Project Honeypot's model license. Other
<http://www.uncitral.org/english/status/status-e.htm#UNCITRAL%20Model%20Law%
20on%20Electronic%20Commerce%20(1996)> countries have generally updated
their contract laws, so that electronic agreements must be treated like
<http://www.uncitral.org/english/texts/electcom/ml-ecomm.htm> any other
written contract. Nevertheless, making sure an arbitration agreement is
enforceable against a particular network intruder involves more than
checking to see whether the intruder's home jurisdiction is a New York
Convention signatory.

Used properly, arbitration could be an important refinement of modern
computer security practices - but it is not a silver bullet. Network
intruders still have to be identified, and electronic arbitration agreements
must be enforceable in both the network operator's jurisdiction and the
network intruder's jurisdiction. Moreover, once an arbitration award is
made, it still has to be enforced in network intruder's jurisdiction, where
the intruder may attempt to challenge the award. Nevertheless, arbitration
against network intruders can still be cheaper and more convenient than
litigation, and valid arbitration awards are much easier to enforce abroad
than domestic court judgments. And the options to make arbitration
confidential or to use technically experienced arbitrators may also drive
network operators to arbitration. At the very least, arbitration is another
legal option that savvy computer security professionals need to know about.

Copyright © 2005,  <http://www.securityfocus.com/> SecurityFocus logo

Ethan Preston is an attorney in Chicago, Illinois, whose practice includes
information technology, intellectual property, and privacy law. His
publication credits include The Global Rise of a Duty to Disclose
Information Security Breaches and Computer Security Publications:
Information Economics, Shifting Liability and the First Amendment.



The information in this e-mail is confidential and may also be legally
privileged. The contents are intended for recipient only and are subject
to the legal notice available on request from : webmaster at alcontrol.co.uk
ALcontrol Laboratories is a trading division of ALcontrol UK Limited.
Registered Office: Templeborough House, Mill Close, Rotherham, S60 1BZ.
Registered in England and Wales No 4057291



More information about the dba-Tech mailing list