Feeds

Sex.com: read it if you dare

A tale of evil from the early days of the internet

  • alert
  • submit to reddit

The essential guide to IT transformation

Book review OK, I'm going to let you in on some of the secrets of how the internet was built.

Kieren McCarthyNo? OK. So, let's see: It's about the American legal system and how it can crush innocent...still not interested? How about the growth, and theft, of the pioneering porn site, SEX.COM? Yes, web porn, the inside dope. Ah, thought that might get your attention! OK, that's what Kieren McCarthy's book is about.

And a cracking read it is. Not since Steve Levy's Hackers have I read a book which gets under the skin of some of the most astonishing characters. And as you read, you get to know them - Stephen Cohen, the man who stole the domain from archetypal Silicon Valley geek, Gary Kremen, and then you come to realise there's actually a third character in this book. And this third character is the really scary one. It's a company called Network Solutions.

Most internet nuts know the basic story. In the earliest days of domains, a bunch of geeks gave each other interesting domain names, and one of them, Gary Kremen, got sex.com and decided to make a sex site. Before he got a chance to do that, the registrar gave it to someone else - specifically, to conman Stephen Cohen.

The document Cohen used to steal the domain was an obvious forgery. Standard terms and conditions at Network Solutions, who administered the registry of domains, clearly stated that before accepting a document of this sort, it had to make obvious checks, including asking the registered owner whether this was indeed from him - and Network Solutions didn't make those checks.

Twelve years went by before the resulting lawsuits came to an end.

The book gets you into the weird, dark world of the adult internet. You find yourself staring into the jaws of the crocodile with Cohen; you discover his amazing ability to bamboozle people - even people who knew exactly what he was up to - by inventing interlinking facts. And on the other side, you meet the drug-crazed Stanford graduate, an obsessive, definitely not a "team player", Gary Kremen.

But every time another brush stroke goes to the portraits of these two, the background stands out more clearly.

Here's the bit where McCarthy pulls the curtain aside and unveils the full backdrop painting: a chapter called "Panzers and Toes" where finally, executives from Network Solutions have to answer questions, and answer them in court.

We're at the stage where we understand that Cohen hacked Network Solutions. He had very little access to its systems, but he did manage to alter the database of who owned sex.com; and then armed with that, changed the name of the owner to his own name. Then, he set about forging documents to show that he'd always owned the domain, and had a trademark on sex.com, and that in fact, he'd been given the domain by the company which Kremen set up and which, he says, Kremen was fired from.

To prove this, Cohen sends a faxed document, "the Dimmick document", one which wouldn't fool a baby. The person who is supposed to have sent it couldn't spell her own name; the letterhead looks like it was made on a John Bull home printing press by an illiterate kindergarten pupil, and there is no background that would stand up to a single phone call to check.

So, we get to February 2000. Up to this point, NetSol has simply refused to dignify any of Kremen's complaints with an answer. It's a dispute between two pornographers, is their official view; not something they have to soil their hands with. Let the two fight it out, they say.

Build a business case: developing custom apps

More from The Register

next story
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.