Feeds

Mozilla refuses US request to ban Firefox add-on

Stiff-arms feds over seized domains

Maximizing your infrastructure through virtualization

Mozilla officials have refused a US government request to ban a Firefox add-on that helps people to access sites that use internet domain names confiscated in an unprecedented seizure earlier this year.

The request came from officials at the Immigration and Customs Enforcement, the agency under the Department of Homeland Security that in February took the unprecedented step of seizing domain names accused of streaming live pay-per-view sporting events. Without giving the owners an opportunity to defend themselves, ICE officials obtained a court order that gave them control of the addresses, which ended in .com, .net, and .org.

That's where MafiaaFire came in. The Firefox add-on, available on Mozilla.org, made it easy for users to access sites that used some of the confiscated addresses. It did this by redirecting them to substitute domain names that were out of the reach of US courts, such as those with a .de top level domain.

“You simply type Demoniod.com into your browser as usual,” the add-on's authors wrote in an FAQ explaining how it works. “The browser sends the address to the add-on, the add-on checks if Demoniod.com is on the list of sites to be redirected and immediately redirects you to the mirror site.

According to a blog post published on Thursday by Mozilla General Counsel Harvey Anderson, ICE officials alleged MafiaaFire circumvented their seizure order and asked Mozilla to remove it.

The open-source group, in not so many words, said no.

“Our approach is to comply with valid court orders, warrants, and legal mandates, but in this case there was no such court order,” Anderson explained.

He continued: “The problem stems from the use of these government powers in service of private content holders when it can have unintended and harmful consequences. Longterm, the challenge is to find better mechanisms that provide both real due process and transparency without infringing upon developer and user freedoms traditionally associated with the internet.”

Indeed, a vocal chorus of lawmakers and policy wonks have decried the domain seizures, arguing that the ex parte actions are a serious power grab that threaten the stability of the internet. If the US government can confiscate addresses it doesn't agree with, what's to stop China or any other country from doing the same thing?

So far, at least 92 domain names have been seized under the program, which ICE officials have dubbed Operation in our Sites. Two of the affected domain names are rojadirecta.org and rojadirecta.com, which belong to a site that was recently ruled to be operating legally in Spain, where it is headquartered.

Anderson said he responded to the ICE request by sending officials a set of detailed questions that among other things asked: “What protections are in place for MAFIAAfire.com or the seized domain owners if eventually a court decides they were not unlawful?”

So far, he's received no response. ®

Seven Steps to Software Security

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.