Feeds

Sex.com: read it if you dare

A tale of evil from the early days of the internet

  • alert
  • submit to reddit

Build a business case: developing custom apps

Book review OK, I'm going to let you in on some of the secrets of how the internet was built.

Kieren McCarthyNo? OK. So, let's see: It's about the American legal system and how it can crush innocent...still not interested? How about the growth, and theft, of the pioneering porn site, SEX.COM? Yes, web porn, the inside dope. Ah, thought that might get your attention! OK, that's what Kieren McCarthy's book is about.

And a cracking read it is. Not since Steve Levy's Hackers have I read a book which gets under the skin of some of the most astonishing characters. And as you read, you get to know them - Stephen Cohen, the man who stole the domain from archetypal Silicon Valley geek, Gary Kremen, and then you come to realise there's actually a third character in this book. And this third character is the really scary one. It's a company called Network Solutions.

Most internet nuts know the basic story. In the earliest days of domains, a bunch of geeks gave each other interesting domain names, and one of them, Gary Kremen, got sex.com and decided to make a sex site. Before he got a chance to do that, the registrar gave it to someone else - specifically, to conman Stephen Cohen.

The document Cohen used to steal the domain was an obvious forgery. Standard terms and conditions at Network Solutions, who administered the registry of domains, clearly stated that before accepting a document of this sort, it had to make obvious checks, including asking the registered owner whether this was indeed from him - and Network Solutions didn't make those checks.

Twelve years went by before the resulting lawsuits came to an end.

The book gets you into the weird, dark world of the adult internet. You find yourself staring into the jaws of the crocodile with Cohen; you discover his amazing ability to bamboozle people - even people who knew exactly what he was up to - by inventing interlinking facts. And on the other side, you meet the drug-crazed Stanford graduate, an obsessive, definitely not a "team player", Gary Kremen.

But every time another brush stroke goes to the portraits of these two, the background stands out more clearly.

Here's the bit where McCarthy pulls the curtain aside and unveils the full backdrop painting: a chapter called "Panzers and Toes" where finally, executives from Network Solutions have to answer questions, and answer them in court.

We're at the stage where we understand that Cohen hacked Network Solutions. He had very little access to its systems, but he did manage to alter the database of who owned sex.com; and then armed with that, changed the name of the owner to his own name. Then, he set about forging documents to show that he'd always owned the domain, and had a trademark on sex.com, and that in fact, he'd been given the domain by the company which Kremen set up and which, he says, Kremen was fired from.

To prove this, Cohen sends a faxed document, "the Dimmick document", one which wouldn't fool a baby. The person who is supposed to have sent it couldn't spell her own name; the letterhead looks like it was made on a John Bull home printing press by an illiterate kindergarten pupil, and there is no background that would stand up to a single phone call to check.

So, we get to February 2000. Up to this point, NetSol has simply refused to dignify any of Kremen's complaints with an answer. It's a dispute between two pornographers, is their official view; not something they have to soil their hands with. Let the two fight it out, they say.

Boost IT visibility and business value

More from The Register

next story
Thirteen Astonishing True Facts You Never Knew About SCREWS
Threaderick the Great! And YES, we asked the Arapaho
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Indian techies-in-training face down MAN-EATING LEOPARD - and WIN
Big cat causes big trouble at Mumbai college
Too rich for an iPhone 6? How about a gold-plated Brikk?
Not lobbed at your head, silly – a bling phone
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.