Spelling Test

UPDATE: Yahoo! had filed a lawsuit over the domain name, and in early June, the dispute was settled and flicker.com was transferred to Yahoo!.  Flicker.com now points to the Flickr homepage.

Most people are familiar with Flickr, the photo sharing Web site owned by Yahoo!  But given its pronunciation, I would be willing to bet that most people’s first instinct if they are not familiar with the brand’s creative spelling would be to type in “Flicker,” following the standard spelling of a fairly common English word.  So I decided to visit flicker.com, curious to see what content it held.

As it turns out, Yahoo! does not own the domain name flicker.com.  The owner keeps the site very austere – the only content is a simple graphic and a sidebar of statistics.  These statistics reveal that the site receives 3.6 million unique visitors per year, and that over 95% of those come from direct navigation.

The overwhelming traffic that flicker.com receives is direct proof that direct navigation is a very real practice.  When the term “flicker” is searched in Google, Yahoo! and Bing, the very first result is the official Flickr page, so there is no reason to think that search engines are driving visitors to flicker.com.  And “flicker” as a generic term is not really used commonly enough to attract such high levels of unique visitors a year.  It is clear that flicker.com receives a vast portion of its traffic from Internet users who are trying to access Flickr and simply misspelling the term in the address bar of their browsers.

For those who are convinced that direct navigation is irrelevant and that Internet users always turn to search engines to access content online, flicker.com should serve as irrefutable evidence to the contrary.

False Sense of Security

The Ninth Circuit Court of Appeals, in US v. Kilbride, No. 07-10528 (9th Cir. 2009), upheld fraud and conspiracy charges arising from the defendant’s sending of spam emails containing advertisements for pornographic materials. Key to this ruling was the fact that the spam emails contained false and non-functioning email addresses in the “From” field.

More interesting, however, is the fact that the defendant’s use of a privacy service to block access to the Whois information for the domain names they used for such emails constituted “materially falsified” information as defined under the CAN SPAM Act. Specifically, the Court stated “It should have been clear to Defendants that intentionally falsifying the identity of the contact person and phone number for the actual registrant constitutes intentionally decreasing the ability of a recipient to locate and contact the actual registrant, regardless of whether a recipient may still be left some avenue to do so. We therefore conclude Defendants had notice that their conduct violated.”

You may remember that the New York Federal District Court recently sentenced Alan Ralsky, the self-proclaimed “King Of Spam”, and others to prison terms of several years for their participation in a pump-and-dump stock-trading scheme in which the defendants would artificially and temporarily inflate the price of a given stock by the use of spam emails touting that stock.

These cases raise the questions of whether the Federal government is taking a more aggressive approach in its prosecution of spam purveyors within its jurisdictional reach and also what, if anything, this could mean for civil domain enforcement actions.  Even if not subject to the criminal terms of CAN SPAM, cybersquatters on the defensive side of UDRP and ACPA actions could find themselves subject to this more aggressive approach to enforcement.

This could be good news for brand owners since a high percentage of spammers, cybersquatters and others rely on private or false Whois information in their attempts to avoid being held accountable for their illegal actions.