Feeds

Sex.com: read it if you dare

A tale of evil from the early days of the internet

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Book review OK, I'm going to let you in on some of the secrets of how the internet was built.

Kieren McCarthyNo? OK. So, let's see: It's about the American legal system and how it can crush innocent...still not interested? How about the growth, and theft, of the pioneering porn site, SEX.COM? Yes, web porn, the inside dope. Ah, thought that might get your attention! OK, that's what Kieren McCarthy's book is about.

And a cracking read it is. Not since Steve Levy's Hackers have I read a book which gets under the skin of some of the most astonishing characters. And as you read, you get to know them - Stephen Cohen, the man who stole the domain from archetypal Silicon Valley geek, Gary Kremen, and then you come to realise there's actually a third character in this book. And this third character is the really scary one. It's a company called Network Solutions.

Most internet nuts know the basic story. In the earliest days of domains, a bunch of geeks gave each other interesting domain names, and one of them, Gary Kremen, got sex.com and decided to make a sex site. Before he got a chance to do that, the registrar gave it to someone else - specifically, to conman Stephen Cohen.

The document Cohen used to steal the domain was an obvious forgery. Standard terms and conditions at Network Solutions, who administered the registry of domains, clearly stated that before accepting a document of this sort, it had to make obvious checks, including asking the registered owner whether this was indeed from him - and Network Solutions didn't make those checks.

Twelve years went by before the resulting lawsuits came to an end.

The book gets you into the weird, dark world of the adult internet. You find yourself staring into the jaws of the crocodile with Cohen; you discover his amazing ability to bamboozle people - even people who knew exactly what he was up to - by inventing interlinking facts. And on the other side, you meet the drug-crazed Stanford graduate, an obsessive, definitely not a "team player", Gary Kremen.

But every time another brush stroke goes to the portraits of these two, the background stands out more clearly.

Here's the bit where McCarthy pulls the curtain aside and unveils the full backdrop painting: a chapter called "Panzers and Toes" where finally, executives from Network Solutions have to answer questions, and answer them in court.

We're at the stage where we understand that Cohen hacked Network Solutions. He had very little access to its systems, but he did manage to alter the database of who owned sex.com; and then armed with that, changed the name of the owner to his own name. Then, he set about forging documents to show that he'd always owned the domain, and had a trademark on sex.com, and that in fact, he'd been given the domain by the company which Kremen set up and which, he says, Kremen was fired from.

To prove this, Cohen sends a faxed document, "the Dimmick document", one which wouldn't fool a baby. The person who is supposed to have sent it couldn't spell her own name; the letterhead looks like it was made on a John Bull home printing press by an illiterate kindergarten pupil, and there is no background that would stand up to a single phone call to check.

So, we get to February 2000. Up to this point, NetSol has simply refused to dignify any of Kremen's complaints with an answer. It's a dispute between two pornographers, is their official view; not something they have to soil their hands with. Let the two fight it out, they say.

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
It's OK, stupid: EVERYONE on the INTERNET experiments on you – OKCupid
Plus: Tests show 'myth of compatibilty as good as truth'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.