MARCH - APRIL 2007 CYBER CRIME NEWSLETTER

Issue 24 News Highlights in This Issue: Table of Contents

Features MySpace Not Liable for User’s Assault 7 NAAG Committee Meets on Cyber Hate 2 Spyware/Phishing Training Set for August 15

US Largest Source of Online Attacks 12 AGs Fighting Cyber Crimes 3 AG King Speaks at Training on Sex Offenders Colorado AG Releases ID Theft Repair Kit Four AGs Attend Cyber hate Program 2 AG Blumenthal Announces Social Networking Bill Delaware AG Creates Child Predator Unit AG McCollum’s Unit Arrests Child Predator New Jersey Senate OKs Dating Bill 13 Indiana AG: Refunds Made in Online Fraud Case AG Morrison Speaks About Internet Killer Kentucky AG: Arrest in Child Predator Sting Search of Cellular Phone Before Arrest OK 9 AG Cox’s Team Arrests Two Online Predators New Hampshire AG Speaks on AG Rabner Keynotes Cyber Hate Summit ICANN Nixes .xxx Domain 12 New Mexico AG: Maximum Sentence for Predator AG Cuomo Settles Data Breach Case Ohio AG Sues Search Firm for Online Fraud Washington Enacts Internet Tax Authorization 14 AG Corbett’s Agents Arrest Child Predator South Carolina AG: Arrest in Internet Sting AG Abbott Says 95 Years for Internet Predator Spyware/Phishing Training Scheduled for August 15 Utah AG: Task Force Arrest 2 Predators AG McKenna Settles Spyware Suit West Virginia AG Shuts Down Online Firm Multiple Porn Images Equals Only One Count 8 In the Courts 7 MySpace Not Liable for User’s Assault Trading in Spammed Stocks Suspended by SEC 10 Search Engines Have Right to Reject Ads Section 230 of CDA Applies to Web Messages Multiple Child Porn Images = Only One Count Mississippi Conforms Law to Adam Walsh Act 14 Computer Sabotage Statute Constitutional OK to Search Cell Phone Contents Before Arrest

Tech Guide for Information Security Released 14 News You Can Use 10 Trading in Spammed Stocks Suspended by SEC Eight Programs Certified as Safe to Download Search Engines Have Right to Reject Ads 7 FCC: Rural Carriers Must Allow Internet Access Florida Bar Approves Online Testimonials Pilot Program to Post Patent Applications Started Eight Programs Certified Safe to Download 10 Royalty Rates Per Song for Webcasts Raised Tests on International Domain Names Successful ICANN Votes Against .xxx Domain Florida Enhances Penalties 13 Report: Most Online Attacks Come From US Federal Agencies Requires to Use New Security

Section 230 Immunity Applies to Web Postings 8 Legislation Update 13 New Jersey Senate OKs Internet dating bill Florida Legislature Enhances Child Porn Penalties Federal Agencies Must Apply New Security 12 North Dakota Strengthens Sexual Predator Law Mississippi Conforms Law to Adam Walsh Act Kentucky Expands Required Data Kentucky Expands Sex Offenders Information 14 Washington Authorizes Internet Sales Tax Utah Creates Electronic Registration Mark

Computer Sabotage Statute Constitutional 9 Guide for Information Security Available 14

North Dakota Strengthens Sex Offender Law 14

The Cyber Crime Newsletter is developed under the Cyber Crime Training Partnership between the National Association of Attorneys General (NAAG) and the National Center for Justice and the Rule of Law (NCJRL) at the University of Mississippi School of Law. It is written and edited by Hedda Litwin, Cyber Crime Counsel ([email protected], 202-326-6022).

This project was supported by Grant No. 2000-DD-VX-0032 awarded by the Bureau of Justice Assistance. The Bureau of Justice Assistance is a component of the Office of Justice Programs, which includes the Bureau of Justice Statistics, the National Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, and the Office of Victims of Crime. Points of view or opinions in this document are those of the authors and do not represent the official position of the United States Department of Justice.

The views and opinions of authors expressed in this newsletter do not necessarily state or reflect those of the National Association of Attorneys General (NAAG). This newsletter does not provide any legal advice and is not a substitute for the procurement of such services from a legal professional. NAAG does not endorse or recommend any commercial products, processes, or services. Any use and/or copies of the publication in whole or part must include the customary bibliographic citation. NAAG retains copyright and all other intellectual property rights in the material presented in the publications.

In the interest of making this newsletter as useful a tool as possible for you, we ask that you keep us informed of your efforts. Additionally, we would like to feature articles written by you. Please contact us with information, proposed articles and comments about this newsletter. Thank you.

NAAG CRIMINAL LAW COMMITTEE University of Dayton School of Law. David MEETS AT UNIVERSITY OF MISSISSIPPI Barkey, Southern Area Counsel at the Anti- ON CYBER HATE Defamation League, then followed with a discussion with the Attorneys General of By Hedda Litwin1 appropriate responses from law enforcement and public officials. The NAAG Criminal Law Committee, co- chaired by Attorneys General John Suthers of The program on cyber hate was followed Colorado and Jim Hood of Mississippi, met on by the unveiling of a new Cyber Guide by Tom April 23 at the National Center for Justice and the Clancy, Director of the National Center for Justice Rule of Law to discuss “Cyber Hate: Survey of and the Rule of Law. The Guide, developed by the Problem and Attorney General Responses.” the Center, provides a blueprint for setting up Joined by Attorneys General Paul Morrison of and/or enhancing the capacity to address cyber Kansas and Douglas Gansler of Maryland, the crimes in an Attorney General office. Copies Committee heard first from Brian Marcus, were distributed to the Attorneys General present Director of Internet Monitoring at the Anti- at the meeting, and the Guide will be distributed Defamation League, who illustrated hate speech by mail to all Attorneys General during the sites on the Internet and also gave an overview of beginning of May. on the Internet. The Committee then discussed the constitutional and regulatory 1Hedda Litwin is Cyber Crime Counsel for the issues raised by hate speech on the Internet, National Association of Attorneys General. following a presentation by Susan Brenner, Associate Dean and Professor of Law at the

2

AGS FIGHTING CYBER CRIMES

ALABAMA CONNECTICUT

Attorney General Troy King spoke to 82 Attorney General Richard Blumenthal, law enforcement officers at a training session about together with bipartisan members of the state sex offenders co-sponsored by his office and the General Law Committee, announced legislation Sylacauga Police Department. The session covered requiring social networking sites to verify users’ all of the state laws relating to sexual predators, ages, obtain parental consent to post profiles of including an “A to Z look at Alabama’s Community minors under 18 years of age and allow parents Notification Act.” Attorney General King also access to their children’s pages. Under the spoke about his legislative package which includes proposal, sites that violate the legislation would face legislation to further strengthen the Community civil penalties of up to $5,000 per violation. The Notification Act, shield child victims from having legislation would also provide for a private right of to testify in the same room with the offender and action. clarifying that each consecutive sentence of an offender is counted separately for purposes of DELAWARE parole consideration. Attorney General King is also asking legislators to change the law so that a Attorney General Beau Biden announced criminal is guilty of child solicitation, even if the the creation of his new child predator unit. “child” the criminal believes he is soliciting is Originally, Governor Ruth Ann Minner had called actually an undercover officer. He also wants for $164,000, enough for a deputy attorney general legislators to provide life without parole or the and an investigator, to get the unit started in the death penalty for repeat sex offenders who prey on budget year that begins July 1, 2007, but the children. legislative Joint Finance Committee and the Governor’s office later agreed to finance the unit COLORADO three and one half months earlier. Deputy Attorney General Melanie Walters, a Department of Justice Attorney General John Suthers released veteran of 18 years who heads the felony unit in an Identity Theft Repair Kit, a 21-page, full color Sussex County, will lead the unit, with an booklet developed by his office which discusses investigator to be hired as soon as possible. how to avoid becoming a victim of identity theft Attorney General Biden said the unit would operate and what to do if you become a victim. It also Internet stings to identify and apprehend predators. contains a 10-step checklist for victims, as well as It will also target manufacturers, distributors and credit bureau phone numbers and information about possessors of child pornography and would, with filing a report with the Federal Trade Commission. other law enforcement agencies, track down Attorney General Suthers partnered with FirstBank convicted child predators who fail to register as Holding Company in the initiative, which paid the such. printing costs of the booklet. The company will also distribute 20,000 of the kits through its 118 FLORIDA branches in the state. Attorney General Bill McCollum’s Child Predator Unit arrested Daniel Lenz after discovering that he was attempting to lure a 15-year-old girl that he sexually solicited over the

3

Internet from New Hampshire to his Florida home. KENTUCKY Lenz met the girl through a computer game and used “grooming” techniques to gain her trust. The Attorney General Greg Stumbo girl was intercepted in South Carolina and returned announced the arrest of Matthew Barlow of Ohio, to her home in New Hampshire through the the 12th arrest in his Child Predator Sting. Barlow, coordinated efforts of Attorney General who had been communicating online with a decoy, McCollum’s office, the FBI Cybercrime Task arrived at a restaurant to meet who he thought was a Forces in Jacksonville, Florida and New Hampshire, 13-year-old girl, but was instead met by the Chief of the U.S. Attorney’s Office for the Middle District of the Highland Heights Police Department. He is Florida, the New Hampshire Police Department, the charged with unlawful transaction with a minor, a Clarendon County, South Carolina Sheriff’s Office class B felony punishable by 10-20 years in prison. and U.S. Immigration and Customs Enforcement. A search warrant executed at Lenz’s house led to MICHIGAN the seizure of several computers, which will undergo forensic analysis for evidence of the crime. Attorney General Mike Cox announced Lenz is charged with one count of computer the arrests of Kevin Wolfers, a youth soccer coach, solicitation and, if convicted, would face up to five and Lee Vanbeek, a youth wrestling coach, for years in prison. Attorney General McCollum’s using the Internet to solicit a minor for sexual acts CyberCrime Unit acted as a member of the FBI and to disseminate sexually explicit material to a CyberTask Force in Jacksonville. minor. Wolfers was arrested by the Michigan Internet Crimes Against Children Task Force, INDIANA operated by the State Police, and arraigned on two counts of using the Internet to solicit or accost a Attorney General Steve Carter said that minor for immoral purposes, a 10-year felony. Internet seller Kumara Jayasuriya, aka Jay Smith, Vanbeek was arrested by Attorney General Cox’s issued 10 consumer refunds totaling $3,649 and is investigators for engaging in graphic sexual required to comply with state law in all future conversation with and propositioning someone he transactions. A circuit court approved an agreement thought was a 14-year-old girl that he met in a chat requiring the refunds after Attorney General Carter room but was actually an undercover agent. investigated complaints that consumers paid for auto parts advertised online and did not receive their NEW HAMPSHIRE items in a timely fashion or received incorrect or defective auto parts. Some of the complaints were Attorney General Kelly Ayotte joined resolved through refunds, chargebacks or shipment local police at the Rochester Middle school for an of the items prior to the court’s order. educational discussion with parents about the dangers their children face while using the Internet. KANSAS Much of the discussion centered on social networking sites and predators trying to lure Attorney General Paul Morrison was the children into face-to-face meetings. Both Attorney featured speaker at the 18th Annual Regional General Ayotte and Detective James Bonneau Criminal Justice Conference at the University of outlined Internet chat rooms, and Nebraska. He discussed the prosecution of a serial MySpace.com as online activities that put children killer who murdered at least nine women in the at risk, not only for online solicitation but also for Kansas City area and who lured his victims using cyberbullying. Everyone in attendance received a the Internet. Both University and high school copy of Attorney General Ayotte’s new Internet students attended the conference. Safety Guide for Parents and Teens, a 56-page booklet that addresses the dangers of online predators and offers advice to parents on how to

4

protect their children and to teens on how to protect General’s office, the Consumer Protection Board themselves. and the state office on Cyber Security. Without admitting any violation but cooperating fully with NEW JERSEY the investigation, CS STARS agreed to comply with the law and implement more extensive security Attorney General Stuart Rabner was the practices. They must also pay Attorney General keynote speaker at the first “New Jersey Unites Cuomo’s office $60,000 to cover the costs of the Against Hate” summit, a program co-hosted by his investigation. The case was handled by Special office. The program brought together about 40 Assistant Attorney General Stephen Mendel and groups to discuss and participate in workshops, Assistant Attorney General Herbert Israel in the including “Hate on the Internet” and “Facilitating Consumer Frauds and Protection Bureau. Community Dialogue.” Other speakers included State Senator Diane Allen; Etzion Neuer, New OHIO Jersey Regional Director of the Anti-Defamation League; and Paul Winkler of the New Jersey Attorney General Mark Dann filed suit Holocaust Commission. against Courts Online, an Internet-based company offering unlimited searches of public and private NEW MEXICO databases, including criminal background checks, for a one-time fee ranging from $24 to $36. His Attorney General Gary King said that office had received more than 50 complaints from convicted sex offender Jeramie Dante was consumers across the country, including allegations sentenced to a maximum penalty of 18 months in that the company failed to deliver purchased prison for one count of fourth degree child services, misrepresented services offered in solicitation by computer. Dante had been arrested advertising and failed to properly advise consumers by Attorney General King’s Internet Crimes about refund policies. The investigation also Against Children (ICAC) Unit. During an online revealed that Courts Online was not properly chat using Yahoo! Instant Messaging, an ICAC registered as a business in the state. Complaints agent posing as a 12-year-old girl received sexually were also lodged with the Better Business Bureau explicit messages from Dante, who then sent and the Federal Trade Commission. Attorney pictures of himself and his body parts. Although General Dann is asking the court to prevent Courts Dante never showed for meetings with the “girl,” Online from entering into any further transactions agents were able to identify him through the until they have paid restitution to previous pictures he sent. customers, pay a penalty of $25,000 per violation and allow his office the right to see the company’s NEW YORK business records for five years to ensure they are in compliance with state law. Attorney General Andrew Cuomo obtained the first settlement under the state’s PENNSYLVANIA Information Security Breach and Notification Law. CS STARS LLC, a Chicago-based claims Attorney General Tom Corbett’s Child management company, failed to notify the owner of Predator Unit agents arrested David Wimer, who is computerized data and approximately 540,000 state accused of using an Internet chat room to sexually consumers that their personal information was at proposition and send sexually explicit videos to risk for five weeks. Under New York’s law, any what he believed to be a 13-year-old girl. Instead, business which maintains private data must notify the “girl” was actually an undercover Unit agent. the owner of the data immediately after discovery of Using a screen name, Wimer told the “girl” that he any breach as well as affected consumers. was a 34-year-old male named Dave and then he Notification must also be given to the Attorney began to ask her personal questions, commenting

5

that they could do “some cool stuff” if they got actually an undercover Unit investigator who had together. He repeatedly proposed meeting for the posed as an underage girl. Note: The Editor thanks purpose of having sex. Wimer is charged with two Grant Sparks, Assistant Attorney General, Office of counts of unlawful contact with a minor and one the Attorney General of Texas, for information count of criminal use of a computer, all third degree about this case. felonies carrying maximum penalties of seven years in prison and a $15,000 fine. He will be prosecuted UTAH by Deputy Attorney General William Caye of the Unit. Attorney General Mark Shurtleff announced that the Internet Crimes Against SOUTH CAROLINA Children Task Force, which his office oversees, arrested Henry Howk on five counts of sexual Attorney General Henry McMaster exploitation for possessing child pornography and announced that Richard Holbrook of Michigan was John Keane for enticement of a minor over the arrested in an undercover Internet sting by the City Internet. Howk applied for a job as a law of Charleston Police Department, a member of enforcement officer and then admitted to viewing Attorney General McMaster’s Internet Crimes child pornography while being questioned during a Against Children (ICAC) Task Force. Holbrook routine employee selection process. Realizing his was arrested on one count of Criminal Solicitation admission would trigger an investigation, he of a Minor, a felony punishable by up to 10 years destroyed his computer, but ICAC investigators imprisonment. Arrest warrants allege that Holbrook from Attorney General Shurtleff’s office and Adult solicited sex on the Internet with an individual he Probation and Parole located the computer hard believed to be a 12-year-old girl, but in reality was drive with the cooperation of Howk’s wife. an undercover police officer. When police learned Investigators sent the hard drive to the Regional that Holbrook was on a flight to Boston from Computer Forensics Lab where it was reconstructed Charleston International Airport, they arranged to and found to contain child pormography. Keane arrest him upon landing, with the assistance of the was arrested after a three month investigation Charleston Airport Authority. Holbrook was conducted by a Department of Public Safety carrying a laptop computer, which was seized upon investigator who is assigned to the Task Force. his arrest. The case will be prosecuted by Attorney General McMaster’s office. WASHINGTON

TEXAS Attorney General Rob McKenna reached a settlement with three California-based businesses Attorney General Greg Abbott announced – Digital Enterprises d/b/a Movieland.com, that Joe Cook, a convicted felon arrested by AccessMedia Networks and Innovative Networks, Attorney General Abbott’s Cyber Crimes Unit, was resolving allegations that they installed software sentenced to 95 years in prison, the longest prison that took control of a consumer’s computer by sentence ever handed down to an online predator launching persistent pop-ups that demanded arrested by the Unit. A jury had returned a guilty payment for a movie download service, in violation verdict on one count of attempted aggravated sexual of the state’s Computer Spyware and Consumer assault on a child. The sentence was enhanced Protection Acts. According to the complaint, the because of Cook’s two prior felony convictions in defendants offered a free three-day trial period for Illinois for burglary and home invasion. Unit the movie service, then remotely activated billing investigators and Longview Police Department software on the personal computers of those who officers arrested Cook after he rode his bicycle to accepted the offer. After the trial period, a 40- meet someone he believed to be a 13-year-old child second video recurred hourly telling consumers they he had solicited over the Internet for sex, but was were legally obligated to purchase a subscription.

6

Under the settlement, the defendants must not offer channels via the Internet for viewing on consumers’ anonymous free trials in the state for movie personal computers for $12.95 per month, was shut downloads. If they use a software-based collection down for failure to respond to and resolve customer method, they must not try to collect payments from complaints. Although Sataline.com offered a one- state residents unless they have a valid contract and month trial subscription, consumers were actually they must not install any software on the computer required to sign up for a six-month subscription. In of a Washington resident without the express addition, consumers complaining to Attorney consent or the owner of an authorized user. General McGraw’s Consumer Protection Division Defendants must also pay $50,000 to resolve claimed that the television channels received from allegations. Sataline.com were undesirable and not the channels the company offered on its web site. Some WEST VIRGINIA consumers complained that they were not able to access the service at all. Attorney General Darrell McGraw announced that Sataline.com, an Internet business that offered to deliver premium cable television

IN THE COURTS

SOCIAL NETWORKING SITES: provided by third parties. The “Does” LIABILITY argued that Section 230 was only meant to preempt defamation claims and suits Doe v. MySpace Inc., 2007 WL 471156 based on the content of materials, and (W.D. Tex. February 13, 2007). A the instant case had nothing to do with district court found that the social the content of messages. The court, networking site MySpace.com cannot be however, rejected that narrow held liable for the sexual assault of a interpretation and found MySpace teen-aged girl who met her attacker on immune because it is merely an the site. “Jane Doe,” a 14-year-old girl intermediary that provides a forum for from Texas, met a 19-year-old man on third-party users to exchange messages. MySpace. They met in person, and the The suit was dismissed. man sexually assaulted her. She reported the incident to police, who SEARCH ENGINES: FIRST subsequently arrested and indicted the AMENDMENT man. “Jane Doe” and her mother sued MySpace and its parent company, News Langdon v. Google, 2007 WL 530156 Corp., which is based in New York, in a (D. Del. February 20, 2007). A district New York court, alleging negligence, court ruled that search engines have a fraud and misrepresentation. MySpace First Amendment right to reject ads as removed the case to the U.S. District part of their protected right to speak or Court for the Western District of Texas, not. Christopher Langdon, who runs two then filed a motion to dismiss under web sites, www.NCJusticeFraud.com Section 230 of the Communications and www.ChinaIsEvil.com, sought to Decency Act, which immunizes online buy ads on Google, MSN and Yahoo to service providers from tort claims air his many gripes. All three search stemming from information or content engines declined his ad requests, and 7

Langdon sued them for violation of his Lycos moved to dismiss based on First and Fourteenth Amendment rights, Section 230 immunity afforded as well as fraud, breach of contract, computer service providers from deceptive business practices and the defamation claims. The U.S. District doctrine of public calling, requesting that Court for the District of Massachusetts they be enjoined to carry his ads. All granted the motion, and UCS appealed. three companies filed a motion to The appeals court agreed, finding no dismiss all claims, which the U.S. evidence that Lycos actively induced the District Court for the District of posted information and therefore was not Delaware granted, finding that Langdon responsible for the alleged defamatory had not shown that he had sustained an content. The court also included that injury-in-fact. The court also made the Section 230 immunity extends to any following key rulings: 1) search engines claim based on the host as a publisher of have a First Amendment right to reject information. ads; 2) search engine decisions to reject ads is protected under 47 U.S.C. POSSESSION OF CHILD §230©(2) as a legitimate decision to PORNOGRAPHY: MULTIPLE filter objectionable content, and 3) COUNTS search engines are not state actors and thus are not bound by the First State v. Muhlenbruch, No. 05-2038 Amendment so they cannot deprive (Iowa, February 23, 2007). The Iowa potential advertisers of their First Supreme Court found that a man who Amendment Rights if they reject their had hundreds of child pornography advertisements. images on his computer can only be charged with one count of possession of COMMUNICATIONS DECENCY child pornography. Randall ACT: WEB-BASED MESSAGE Muhlenbruch’s wife discovered pictures BOARDS of child pornography on her husband’s computer, copied them onto a disc and Universal Communications Systems, Inc. gave them to police. Muhlenbruch was v. Lycos, Inc., 2007 WL 549111 (1st Cir. then charged with 10 counts of sexual February 23, 2007. In a unanimous exploitation of a minor, with prosecutors ruling, the First Circuit Court of Appeals claiming that each count was based on joined other courts in finding that a downloading different images on host’s limited influence on the content of different days. Muhlenbruch challenged the postings on a web-based message the 10 charges, arguing that he had only board does not impact the applicability one computer and therefore only one of the Section 230 immunity under the charge was proper. The trial court Communications Decency Act. Lycos, agreed and dismissed nine of the counts. Inc. hosts a web site, RagingBull.com, On appeal, the Iowa Supreme Court which includes a message board that upheld the lower court decision, finding allows viewers to post comments about that under the statute which publicly traded companies. Universal Muhlenbruch was charged, Iowa Code Communications, Inc. (“UCS”) sued 728.12(3), the number of images is not Lycos, alleging that web postings about relevant and cannot result in multiple the company’s financial condition and charges. integrity were false and defamatory.

8

COMPUTER SABOTAGE: SEARCH AND SEIZURE: CELL COMMERCE CLAUSE PHONE CONTENTS

United States v. Trotter, No. 05-4202 United States v. Finley, 2007 U.S. App. (8th Cir. February 23, 2007). The 8th LEXIS 1806 (5th Cir. 2007). The 5th Circuit Court of Appeals found that a Circuit has ruled that an officer may computer sabotage statute was lawfully examine the stored numbers constitutional as applied to an attack on and text messages of a cellular phone as the Salvation Army’s computer network. a search incident prior to arrest. Jacob A law enforcement investigation of Finley was arrested after the passenger intrusions into the Salvation Army’s in his company vehicle delivered computer network led to John Trotter, a methamphetamine to undercover law former information technology enforcement agents. A search warrant supervisor who was fired by the was executed on his passenger’s (and co- Salvation Army. Trotter was charged defendant’s) home, during which agents with intentionally causing damage to a examined Finley’s company cellular protected computer without phone for telephone numbers to which authorization, in violation of 18 U.S.C. calls were placed and text messages sent §1030(a)(5)(A)(i). After unsuccessfully and received. At trial, Finley moved to trying to dismiss the charges, Trotter suppress the evidence gathered from his pleaded guilty to one count of computer cell phone, arguing it was the fruit of an sabotage, reserving the right to challenge unlawful search. The U.S. District Court the constitutionality of the statute. The for the Western District of Texas denied U.S. District Court for the Eastern the motion. Finley was convicted and District of Missouri sentenced Trotter to appealed. On appeal, the 5th Circuit 18 months in prison and ordered him to found that Finley had an expectation of pay approximately $19,000 in privacy in the contents of the cell phone restitution. On appeal, Trotter and thus did have standing to challenge contended that the statute was the search. However, the court reasoned unconstitutional as applied to his that the scope of a search incident to conduct because the Salvation Army’s arrest includes a search for evidence of network was not a “protected computer” the crime for the purpose of within the meaning of the statute and the preservation, as well as for weapons and statute could not possibly be so broad as instruments of escape, and including to cover the network of a non-profit searching closed containers on the organization like the Salvation Army. defendant’s person and those within his The 8th Circuit disagreed, finding that reach. The fact that the search of the cell the Salvation Army’s computers were phone did not occur immediately after protected by the statute because they the custodial arrest did not affect the were engaged in interstate validity of the search, the court added. communication connected to the The court held that as long as the search Internet, and were part of a “system that is substantially contemporaneous with is inexorably intertwined with interstate the arrest, the exception to the warrant commerce” and thus within the realm of requirement still applies. Congress’ Commerce Clause powers.

9

NEWS YOU CAN USE

TRADING IN STOCKS LINKED TO and Coupon Printer 5.0 from Coupons SPAM SUSPENDED Inc., Crawler Toolbar 4.2 from Crawler LLC, Illumio 1.2.73 from Tacit Software The Securities and Exchange Inc, MostFun 1.0 from NeoEdge and Commission (SEC) suspended trading in Vomba 1.2.0.0 from Vomba Network the stocks of 35 small companies linked Inc. TRUSTe said that all applicants had to spam e-mail campaigns urging made changes to their software to investors to buy shares. The potentially receive certification. fraudulent spam e-mail promotes small company stock with phrases like “Ready FCC ALLOWS INTERNET PHONE to Explode,” “Ride the Bull” and “Fast ACCESS Money.” The SEC said that an estimated 100 million of these spam Rural telephone companies must messages are sent every week, triggering allow carriers to use local lines to dramatic spikes in share price and connect Internet-based calls, according trading volume before the spamming to a ruling by the Federal stops and investors lose their money. Communications Commission. The The SEC estimates that investor losses ruling granted a petition filed by Time related to the 35 companies are in the Warner Cable and supported by AT&T tens of millions of dollars. and Verizon. The order overrides rulings by state regulators in Nebraska EIGHT PROGRAMS CERTIFIED and South Carolina that barred certain AS SAFE TO DOWNLOAD carriers from connecting calls using Voice over Internet Protocol (VoIP) to The TRUSTe group, an traditional phone lines. In its decision, organization that monitors web site the FCC said that the state rulings would privacy and email practices for have impeded phone competition and businesses, certified eight programs as hindered the deployment of high speed consumer-friendly and non-invasive. Internet access. The group’s Trusted Download Program is designed to help companies make FLORIDA BAR OKS decisions about where to advertise and TESTIMONIALS ON WEB SITES with whom to partner. Independent technicians hired by TRUSTe review The Florida Board of Governors software used for advertising or tracking tentatively approved a proposed rule on user behavior. To be certified, adware law firm web sites that would let lawyers and other software must obtain consent publish client testimonials and claims before downloading, be easy to uninstall about their past successes. Under the and be unable to modify computer proposed rule, the inside pages of law settings to cause damage. The certified firm web sites (not the home page) could programs are Save 4.0 from include testimonials, references to past WhenU.com, CamFrog Video Chat 3.81 results and statements characterizing the from Camshare LLC, Coupon Bar 5.0 quality of the services, as long as the

10

statements are truthful, not misleading award a patent. Examiners will award and come with disclaimers. The “gold stars” to people who previously disclaimers must say that past results do submitted the most useful information. not guarantee a future success. Currently, Florida Supreme Court rules ROYALTY RATES FOR do not allow law firms to provide such WEBCASTS RAISED information to potential clients unless the clients specifically request it. That The U.S. Copyright Royalty Board restriction would remain in effect for released new royalty rates for webcasters lawyer advertising in other media. to pay for each song streamed to each However, unlike other forms of media, user, effective from 2007 to 2010. The web sites would not have to be 2006 rate is $.0008 to stream one song to submitted for the Bar’s approval. The each user, and the rates increase each proposal still must be passed by the year as follows: 2007: $.0011, 2008: Board of Governors in a second reading $.0014, 2009: $.0018 and 2010: $.0019. and approved by the Supreme Court. The Radio and Internet Newsletter (RAIN) calculates that, assuming the USPTO PILOT TO POST PATENT average station plays 16 songs per hour, APPLICATIONS sites would have to pay about 1.28 cents per listener per hour using the 2006 rate, The U.S. Patent and Trademark and would owe this retroactively, in Office (USPTO) is starting a pilot addition to licensing fees going forward. project that will post patent applications Even small sites would owe the on the Internet and invite comments. minimum of $500 per channel per year. The project would also use a community rating system designed to raise the most INTERNATIONAL DOMAIN respected comments to the top of the file NAMES PASS TESTING for serious consideration by patent examiners. Currently, patent examiners The Internet Corporation of rarely seek outside opinions, instead Assigned Names and Numbers (ICANN) relying on scientific writings and announced that it had successfully archived records of previous patents. completed testing of international The number of patent filings, however, domain names (IDNs). ICANN had has made the current procedures commissioned a laboratory test of IDNs unwieldy. Last year, USPTO’s 4,000 that was designed to establish whether examiners completed a record 332,000 the use of encoded internationalized applications. Under the pilot project, characters would have any impact on the some companies submitting patent operations of the root name servers. The applications will agree to have them results of the testing showed no impact, reviewed on the Internet. The list of with all involved systems behaving as volunteer reviewers includes IBM, expected. However, the test did not Microsoft, Intel, Hewlett-Packard and include the “end-user perspective” of a Oracle. Ultimately, those registered to live root test. It instead concentrated on participate will vote on all the nominated replicating the root server environment, information, and the top 10 items will be suggesting that further testing is passed on to the examiner, who will required. Details of the test setup and serve as the final arbiter on whether to

11

design are available on ICANN’s web cards, with accompanying verification site, www.icann.org. numbers, were reported to be selling for $1 to $6 each on these servers. ICANN VOTES AGAINST .XXX However, other personal identification DOMAIN data, such as a person’s birthdate and banking and government-issued ICANN rejected another identification numbers, was selling for proposal by ICM Registry LLC for an $14 to $18. Trojan-horse software, .xxx domain for pornographic web sites which can load keylogging software for the third time. ICANN had revived onto computers, accounted for 45 the proposal in January of this year after percent of the top 50 malicious code ICM agreed to hire independent samples collected by Symantec, up from organizations to monitor pornographic 23 percent for the first half of 2006. The sites’ compliance with rules that would report also noted that a daily average of be developed by a separate body called 961 phishing e-mails were sent to people the International Foundation for Online on weekdays, compared with 27 percent Responsibility. Nearly all of the fewer phishing messages on weekends. ICANN board members who voted against approving the domain said they FEDERAL AGENCIES MUST USE were concerned about the possibility that NEW SECURITY STANDARDS ICANN could find itself in the content regulation business if the domain name The White House Office of was approved. ComScore Media Matrix, Management and Budget issued a memo a web site measurement firm, finds that requiring all federal agencies using four percent of all web traffic and two Microsoft Windows software to percent of all time spent web surfing implement new security standards involves adult sites. developed in tandem with the National Security Agency (NSA). The new rules REPORT: US MOST PROLIFIC mandate that agencies use preconfigured SOURCE OF ONLINE ATTACKS security settings on all existing PCs. They also require agencies seeking to U.S. networks were responsible purchase Windows Vista, the latest for the highest percentage of attacks version of Microsoft’s operating system, during the second half of 2006, with to order systems specially configured to China at a distant second, according to meet the government’s new security the Internet Security Threat Report requirements. Agencies must also produced by security firm Symantec. include tactics such as disabling The report said that the U.S. accounted unneeded software and services that for 31 percent of malicious activity expose systems to cyber attacks, as well originating from computer networks, as configuring machines to run under while 10 percent came from China and user accounts that cannot install new seven percent from Germany. Symantec programs or alter existing software. The also found that 51 percent of all known standards are based on configurations servers used by attackers to buy or sell developed by the NSA, U.S. Air Force, stolen personal information, such as the National Institute of Standards and credit card or bank account numbers, are Technology and the Defense Information located in the U.S. U.S.-based credit Systems Agency. They have been

12

implemented in more than 420,000 Air overall workload of Air Force Force Windows PCs during the past information technology personnel by 30 year, and are directly responsible for percent. Full compliance by federal decreasing the security incidents and the agencies is required by February 2008.

LEGISLATION UPDATE

INTERNET DATING SERVICES such legislation; Florida, Michigan and Texas have enacted similar bills. On March 13, the New Jersey Senate unanimously approved S.1977, a bill that AGAINST CHILDREN would require Internet dating services doing business in the state to advise whether their The Florida Legislature (Senate on users have undergone criminal background March 7, House on March 8) passed S. 1004, checks. If the service does not conduct a bill which would enhance the penalties for criminal background screenings, it must so possession of child pornography when the advise its New Jersey members, clearly and offender possesses 10 or more images and at conspicuously, in bold, 12-point capital least one of those images is of a child under letters. The disclosure must be made by e- five years of age. It also would expand the mails sent or received by a New Jersey scope of the investigative and prosecutorial member, on the profile describing a member authority of the Attorney General’s Office of to a New Jersey member and on the web page Statewide Prosecution to include violations of used when a New Jersey member signs up. ch. 827, F.S. (concerning abuse of children) If, however, the service does conduct when the crime is facilitated by use of the background screenings, it must disclose Internet or an electronic data storage or prominently whether it has a policy of transmission device. The bill would also allowing members identified as having create a new felony offense of traveling to criminal convictions to have access to its meet a minor for the purpose of committing service to communicate with a New Jersey unlawful sexual conduct with a child. In member. It must also state that criminal addition, it would require sex offenders to background screenings are not foolproof, that register any e-mail address and instant criminals may circumvent even the most message (IM) names with the Florida sophisticated search technology and that only Department of Law Enforcement (FDLE) publicly available convictions are included in prior to using it, and authorizes FDLE to the screening. The bill includes a safe harbor provide those e-mail addresses and IM names for Internet service providers who serve as to social networking sites so they can screen intermediaries for the transmission of for them. The bill expressly states that it does electronic messages among members of an not impose civil liability on the social Internet dating service. Violations of the bill networking sites. would be a violation of the state Consumer Fraud Act, N.J.S.A. 56:8-1 et seq. The bill SEXUAL PREDATORS has been sent to the Assembly for consideration. If enacted, the bill would North Dakota Governor John Hoeven make New Jersey the fourth state to enact signed HB 1216 and 1217 and SB 2029 into law on April 3, strengthening the state’s

13

penalties, probation and commitment for On March 23, Kentucky Governor sexual predators. HB 1216 imposes a Ernie Fletcher signed SB 65 into law, a bill minimum 20-year sentence and lifetime that expands the information a sex offender supervised probation, including first-time must provide during registration. The new offenses, for violent sex offenders. The bill law requires sex offenders in the state to also also increases the penalty, and allows state register their e-mail addresses and any instant attorneys more opportunity to prosecute, messaging, chat or other Internet individuals who commit sexual offenses communication identities with the State Police against minors. HB 1217 allows for a more Sex Offender Registry. flexible determination of a sexual disorder or tendency to commit sexual crimes in civil INTERNET SALES TAX commitment cases. SB 2029 increases the penalties for violating restrictions set by a Washington Governor Christine court, parole board or law enforcement for Gregoire signed S. 5089 into law on March Global Positioning System (GPS) 29, legislation which would authorize the state monitoring. to join the project with 21 other states advocating having Internet and catalog SEX OFFENDER REGISTRATION companies collect and distribute sales taxes. The project was started in 2000 by national On March 15, Mississippi Governor tax and government associations, including Haley Barbour signed HB 1015 into law, a the National Governors Association and the bill that amends the state’s sex offender National Conference of State Legislatures. registration law to conform to the Adam Walsh Act. Among its provisions is that it TRADEMARKED KEYWORDS requires the submission of palm prints in addition to fingerprints, in addition to Utah Governor Jon Huntsman, Jr. requiring a current photograph on every signed SB 236 into law, a bill which reregistration. The bill makes kidnapping of effectively prohibits the competitive use of a child under 18 years of age a registrable trademarked terms as keyword advertising offense. In addition, sex offenders are triggers. The new law establishes “an required to obtain a new driver’s license, electronic registration mark that may not be permit or identification card that identifies used to trigger advertising for a competitor the individual as a sex offender. and creates a database for us in administering marks.” TOOLS YOU CAN USE

Information Technology Security developing security policies. The COPS Guidance publication will help to identify and assess risks and provide ideas for “Law Enforcement Tech Guide for mitigating these risks. It can be accessed Information Technology Security,” at: provides strategies, best practices, http://www.cops.usdoj.gov/mime/open.p recommendations and ideas for df?Item=1969.

14

HOLD THE DATE

ADVANCED TRAINING ON SPYWARE/PHISHING SET FOR AUGUST

An Advanced Training on “What Prosecutors Need to Know About Spyware and Phishing: Approaches to Prosecution and Pitfalls to Avoid” will be held on August 28-30 at the University of Mississippi School of Law under the partnership between the National Association of Attorneys General (NAAG) and the National Center for Justice and the Rule of Law (NCJRL) at the University. The course will be offered at no cost to prosecutors from Attorney General offices.

The training will include sessions on state legislative approaches to spyware and phishing, privacy issues and tools and techniques for investigating these crimes. Attendees will also hear from state prosecutors across the country who have “been there and done that” in handling these crimes.

Registration materials will be available in June. For additional information, please contact Hedda Litwin, Cyber Crime Counsel at NAAG, at [email protected] or (202) 326-6022.

15