TidBITS#714/26-Jan-04
=====================
To commemorate this week's 20th anniversary of the Macintosh, Adam
talks with Bruce Horn, who wrote the Finder, about what he did
at Apple, where he's been since, and what Macintosh projects he's
working on now. Also, Brady Johnson rejoins us with a look at
whether the new U.S. CAN-SPAM Act will have any effect on our
increasing spam volumes. In the news, Dantz ships Retrospect 6,
and OrangeWare provides Mac OS X drivers for wireless cards using
Atheros chipsets, including 802.11a cards.
Topics:
MailBITS/26-Jan-04
Dantz Ships Panther-Compatible Retrospect 6.0
The Mac at 20: An Interview with Bruce Horn
Can CAN-SPAM Can Spam?
Hot Topics in TidBITS Talk/26-Jan-04
<http://www.tidbits.com/tb-issues/TidBITS-714.html>
<ftp://ftp.tidbits.com/issues/2004/TidBITS#714_26-Jan-04.etx>
Copyright 2004 TidBITS: Reuse governed by Creative Commons license
<http://www.tidbits.com/terms/> Contact: <[EMAIL PROTECTED]>
---------------------------------------------------------------
This issue of TidBITS sponsored in part by:
* READERS LIKE YOU! Help keep TidBITS great via our voluntary <------ NEW!
contribution program. Special thanks this week to Peter Morgan
and the ApplesBC Computer Society for their generous support!
<http://www.tidbits.com/about/support/contributors.html>
* SMALL DOG ELECTRONICS: iBooks On Sale! <--------------------------- NEW!
iBook 12-inch G3/800, Only $739! iBook G3/800 640 MB RAM, $739!
iBook G3/900 14-inch 640/60/Combo/56K/AirPort, Only $1,149!
Visit: <http://www.smalldog.com/tb/> 802-496-7171
* FETCH SOFTWORKS: Is maintaining your Web site tedious? Use <------- NEW!
Fetch, the original Macintosh FTP client, and you can record
AppleScripts that automate repetitive uploads and downloads.
Get Fetch now at <http://fetchsoftworks.com/>!
* Discover, Master, and Unleash the Music in You! <------------------ NEW!
The Big Mix from Aladdin Systems delivers nine awesome titles
in one complete audio package. Get the Big Mix for only $69.99.
<http://www.aladdinsys.com/store/tidbits/bigmix.html>
* DR. BOTT, LLC: Explore our vast assortment of iPod accessories!
NaviPod wireless remote; PocketDock for using standard FireWire
cables with your 3G iPod, and other startlingly cool gear for
enhancing your digital lifestyle. Visit <http://www.drbott.com>
* Web Crossing: now with plug-ins for blogs, wikis, RSS, and more.
Web Crossing v5.0 now sports a new plug-in architecture and
easy customization, yet it's still fast and powerful. Try our
free Web & email server! <http://www.webcrossing.com/tb-104>
---------------------------------------------------------------
MailBITS/26-Jan-04
------------------
**Mac Users Join the "A" List** -- When Apple's AirPort Extreme
(IEEE 802.11g) wireless networking system was announced in January
2003, Steve Jobs declared an older, equally fast system dead. He
said 802.11a, which uses a different range of frequency from the
AirPort (802.11b) and AirPort Extreme standards, would join the
dustbin of history, as the lack of backwards compatibility doomed
it. A year later, 802.11a has more legs because of additional
frequencies allotted to its band, and the large number of wireless
cards from non-Apple sources that can handle 802.11a, b, and g.
802.11a doesn't suffer from as much junk radio interference as
b and g. But Mac users have been excluded from this revolution
so far.
OrangeWare is now offering software drivers that they developed
for 3Com to support a set of chips from Atheros, a competitor to
Apple's wireless source Broadcom. Although the OrangeWare driver
lets Mac OS X use Atheros-based wireless cards, Mac users have
been able to use 802.11g cards made by Linksys, Buffalo, Belkin,
and others that share the Broadcom chips used in the AirPort
Extreme line-up ever since the AirPort 3.1 software update was
released. With the $15 trialware OrangeWare driver, you can use
802.11a or a/g PC or PCI cards from NetGear, Fujitsu, D-Link and
others. OrangeWare has a short list of cards they've tested. [GF]
<http://www.orangeware.com/endusers/wirelessformac.htm>
**DealBITS Drawing: Cocoatech Winner** -- Congratulations to
Gloria Harman of yahoo.com and Richard I. Levine of pobox.com,
whose entries were chosen randomly in last week's DealBITS drawing
and who will be receiving a copy of Cocoatech's Path Finder. Don't
despair if we didn't pick your entry, since Cocoatech is offering
a special price on Path Finder for all TidBITS readers, bringing
the price from $34 down to $29.95. The discount is good through
02-Feb-04 via the second link below. Thanks to the 564 people who
entered, and keep an eye out for future DealBITS drawings. [ACE]
<http://www.cocoatech.com/>
<http://www.cocoatech.com/tidbits0104/>
<http://www.tidbits.com/dealbits/cocoatech.html>
<http://db.tidbits.com/getbits.acgi?tbart=07508>
Dantz Ships Panther-Compatible Retrospect 6.0
---------------------------------------------
by Glenn Fleishman <[EMAIL PROTECTED]>
Dantz Development's venerable Retrospect backup software is now
fully Panther-compatible with an electronic download release that
shipped today. Although Retrospect 5.1 would work under Panther,
and Retrospect Client ran fine in Panther, Dantz had released a
laundry list of situations to avoid and problems in launching and
getting the application to run after restarts and system failures.
(We all stuck with Jaguar on our backup servers.)
<http://www.dantz.com/>
<http://www.dantz.com/index.php3?SCREEN=kbase&ACTION=KBASE&id=28093>
Retrospect 6.0 could be seen as a maintenance release with a hefty
upgrade price tag unless you have one of four special needs:
making backup sets larger than one terabyte; backing up to an
Xserve RAID; using tape libraries over SCSI or Fibre Channel; or
spanning multiple hard drives with a single backup set, something
Adam ran into with his current hard drive-based backup strategy.
The company also notes speed improvements.
<http://www.dantz.com/index.php3?SCREEN=kbase&ACTION=KBASE&id=28121>
<http://db.tidbits.com/getbits.acgi?tbart=07295>
The software is available for download right now; the boxed
version follows in mid-February. Pricing is complicated, as is
usual with the number of versions Dantz offers for small, medium,
and large networks.
Retrospect Desktop can back up one local Mac and two networked
Windows, Mac OS, or Red Hat Linux systems with the included
Retrospect Client software. However, it cannot back up computers
running Mac OS X Server (either locally or with Retrospect
Client), and it doesn't offer the large tapeset, Xserve RAID,
or terabyte options. List price is $130 with a $60 upgrade from
previous versions.
Retrospect Workgroup and Retrospect Server include client support
for 20 and 100 machines, respectively, and all the large data
options. However, only Retrospect Server can back up Mac OS X
Server systems. Workgroup lists for $500, and an upgrade is $200;
Server is $800 with a $350 upgrade.
All versions include Retrospect 5.1 if you want to run Retrospect
on a Mac OS 9 system; Retrospect 6.0 can back up older Macs
running Retrospect Client software. Also included is a bootable
disaster recovery CD, but only with the boxed version, not as
part of the electronic-only purchase.
The Mac at 20: An Interview with Bruce Horn
-------------------------------------------
by Adam C. Engst <[EMAIL PROTECTED]>
Twenty years of Macintosh. At this year's Macworld Expo, Steve
Jobs played a version of the famous "1984" ad that launched the
Mac, and Alan Oppenheimer, who was responsible in large part for
AppleTalk, gave a fabulous talk about the history of networking on
the Mac. What I found most interesting was that although twenty
years have passed, many of the original people from those days are
not only still around, they're still producing great work. The
history of the Macintosh is not only still being written, some
of the same people are still doing the writing.
<http://www.opendoor.com/nethistory/>
Let me introduce you to another member of the original Macintosh
team, Bruce Horn, who was responsible for a number of the key
aspects of the Mac and who has continued to write innovative code.
At Apple, Bruce was responsible for the design and implementation
of the Finder (oh, that!), the type/creator metadata mechanism for
files and applications, and the Resource Manager (which handled
reading and writing of the resource fork in files; a note in
Apple's technical documentation at one point exclaimed, "The
Resource Manager is not a database!"). The Dialog Manager and the
multi-type aspect of the clipboard also appeared thanks to Bruce's
ingenuity.
So, to commemorate this 20th anniversary of the Macintosh, I
wanted to talk with Bruce about not just what he did at Apple, but
also what he's up to now, since in many ways, his current work is
both a return to his roots and a glimpse at what might be possible
with the Macintosh in the future.
* Adam: Bruce, many of the aspects of the original Mac that you
worked on revolve around accessing structured data. The Finder was
a front end to the filesystem; the Resource Manager, despite that
note in the documentation, was a bit like a flat-file database;
and type/creator codes were metadata that were just screaming to
be used by a database. To what extent was all that planned, or did
you just come to these solutions as you were working?
Bruce: Several different goals drove me to these solutions. Having
had most of my programming experience in Xerox's Smalltalk
environment, where you could change anything you wanted at runtime
(changes made while the program was running), I was looking for
a dynamic way to handle objects in the system so data such as
localizable strings, menus, images, etc. could be modified by
non-programmers without recompiling the source code. At the same
time, I was realizing that the kind of data that I needed to
manage with the Finder - icons for applications and documents,
and bindings to those icons - needed the same sort of mechanism,
and I wanted a unified solution. So the Finder's Desktop Database
was the driver for much of what the Resource Manager ended up
providing.
The file metadata also was driven by Finder needs. Early on I
realized that to provide a double-click-to-open mechanism for
documents, I'd need a simple way to link a document to a default
application that would open it. Similarly, since multiple
applications could open multiple file types, I couldn't just have
a single mapping from a type to an application that would handle
all files of that type. Thus the separation of the type code
(the actual format of the file) and the creator code (the default
application, which could be easily changed). Independent type and
creator codes stored in the filesystem also enabled us to avoid
polluting the filename with type information, which I felt was
a significant advantage of our approach over others.
The Desktop Database was a cache of the bindings between types and
creators and the icons representing them, stored as resources.
Since application bundles - groups of resources tied together
describing document type and icon information - were stored in
application resource forks, installing an application simply
involved copying the appropriate resources from the application
into the Desktop. The redundant information - type and creator
information in the directory, and bundle information in
application resource forks - made it possible to rebuild the
database at any time without losing anything. It turns out
that this was important in the early days.
Resources were, of course, heavily used in factoring out non-
program data (like menus and text strings) that could be localized
to different languages. With ResEdit, this allowed language
experts to quickly create versions of an application without
needing access to the source code.
Once I was able to convince Andy Hertzfeld of the utility of the
Resource Manager, he rewrote most of the Toolbox to take advantage
of it, which saved significant space in the ROM and gave us the
ability to easily localize applications in a general way.
* Adam: So Mac OS X's reliance on Unix-style filename extensions
for mapping documents to applications is something of a step
backward, then?
Bruce: Yes and no. The original rationalization behind this
was that Mac OS X needed to be compatible with Windows filename
conventions, and to do so we'd need to force filename extensions
to be provided. Because there are so many places that a file might
leave the sanctity of the Mac OS and go out into the cruel world
where extensions are required, it was deemed impossible to
translate names from the Mac convention (with types and creators)
to the outside world's convention. As far as compatibility is
concerned, this did the trick.
But over time it has become apparent that it is difficult to do
this right, and the original mechanism of having redundant type
information, and allowing the user to name the files whatever she
wants, was more flexible and less prone to error. It turns out
that Mac OS X still needed a creator mechanism by which individual
documents could be opened by specific applications, so this
information is stored in the resource fork of the file (of all
places, since Apple is discouraging use of the resource fork),
rather than simply in a creator code.
So the filename extension approach has worked, but with a little
less elegance than the original.
* Adam: Why didn't you go all out and create a system-level
database to handle all this data in the original Mac? Was it
a horsepower issue, or were the software problems too tricky
at the time?
Bruce: It would have been nice. I had some ideas in mind, but when
it came down to fitting it in the 64K ROM, the Resource Manager
was all we could fit. It was a real effort on everyone's part to
make code as small as possible. The Resource Manager was 3K, and
the Finder 46K - amazing considering the size of applications
these days!
* Adam: When did you leave Apple, and what caused your departure?
Bruce: I left Apple in the spring of 1984, after doing a "final"
version of the Finder. I guess I was just looking for something
new to do: having spent several years working intensively on the
Mac, I was ready for a break. Being on the Mac team, working with
absolutely tremendous people, was one of the most significant
things I've done, and it still gives me wonderful feelings when
I think about those times.
* Adam: Can you give us a quick rundown of where you worked after
Apple? Were there any common threads among the various projects?
Bruce: After Apple I went to Adobe and worked a bit on a variety
of small projects, including a LaserWriter spooler. When I was
there I met a couple of Carnegie Mellon grad students, and, to
make a long story short, they convinced me that I should go to CMU
for graduate school (Chuck Geschke, one of the founders of Adobe,
was also a CMU Ph.D.) Grad school was a great experience. I spent
some time at the University of Oslo, Norway as a research
assistant, did some consulting at Apple now and then, and had
a chance to work with some intriguing startups while I was a
student. My Ph.D. thesis described the design of a constraint-
based object-oriented programming language called Siri, which
I'd love to re-implement someday.
After graduating I went back to Apple as a consultant in the
Advanced Technology Group and worked on a project called LiveDoc
with Tom Bonura and Jim Miller, among others. LiveDoc was an
experiment in automatically structuring documents so that various
recognizers could determine that, for example, 555-1212 was a
phone number and 124 Main Street was an address, and provide
contextual actions on those items. It was a lot of fun, and I
wish I had LiveDoc today in Mac OS X. Simson Garfinkel's SBook
provides some of these features as a PIM application.
<http://www.sbook5.com/>
But none of these projects really addressed the problem I wanted
to solve, which was: how can I design an information browser that
works with all types of data, from email messages to images to
music files to documents, and provide a unified mechanism for
organizing, searching, and viewing this information?
I began the iFile project in 1997 to do this, and worked on it for
a couple of years before putting it on the back burner to start my
other company, Marketocracy, where I've been since the middle of
1999.
Marketocracy is a mutual fund company that I co-founded with my
business partner Ken Kam. Our team built a Macintosh-based Web
site running WebObjects and a FrontBase database to allow over
50,000 people worldwide to buy and sell stocks in real time (but
with fake money) to create a model stock portfolio. We provide a
wide variety of tools to help our users to become better portfolio
managers, and by watching their performance over time and ranking
them, we can find the best people in the world to run our funds.
Our Masters 100 Fund, based on the top 100 in our community, has
been running for over two years now and has surprised even us with
its impressive performance and low risk. It has returned over 39
percent since inception when the market has been essentially flat,
and with a beta of 0.47 - half as risky as the market!
<http://www.marketocracy.com/>
* Adam: What are you working on now?
Bruce: Recently I've picked up where I left off in 1999 with iFile
(just a codename for now). iFile is a unified desktop information
browser, like the Finder, but with significant architectural
improvements. It is based on an object-oriented database of my own
design that provides a general way for linking together and
organizing objects of all types. The basic unit of organization is
called a "collection," which is distinct from a folder in that an
object may exist in many collections but in only a single folder.
Collections are like iPhoto albums or iTunes playlists, but they
can contain anything: text files, images, email messages, music
files, contacts, notes, appointments, and so on. While this sounds
a bit like BFS (BeOS Filing System) and the BeOS Tracker combined,
it is much more general and can be used on any filesystem with the
appropriate drivers.
The obvious first application for the iFile technology was
in photo organization, an area in which iPhoto does quite well
already. However, iFile provides more capability in organization
by image metadata (it currently keeps track of 46 different
pieces of metadata for each image), and it should scale much
more smoothly for large collections than iPhoto. But iFile is
not simply a photo manager: it is a general purpose information
browser that can be used in a variety of ways, and can easily
integrate different information sources, such as PIM, email, and
music, among other data types. I think the version of iFile that
I will release publicly will provide much more capability in
those domains.
* Adam: Is it fair to describe iFile as the Finder you'd write
today?
Bruce: Possibly. I think it is much more ambitious than I had
originally intended. If I can eventually get it scaled down to
a level where new users can understand it quickly, it might be
a nice alternative to the Finder.
* Adam: Have you shown it to people at Apple? What did they think?
Bruce: Back in 1999 I showed it first to the Finder group, then
to Avie Tevanian, and finally to Steve Jobs. I think that Apple
was strongly focused on solving the problems of getting Mac OS X
out the door as soon as possible, and looking at an alternative
Finder was low on their priority list. I believe they were
intrigued but had already committed to a different direction,
and couldn't turn the ship in time to take advantage of the
iFile technology. Given the history of Mac OS X, I think they
made the right decision.
* Adam: Let's look at iFile more deeply. There are two aspects to
any filing system, getting data in and displaying that data to
the user. How would someone get data into iFile?
Bruce: The current version of iFile requires the user to specify
the folders that the user would like iFile to track; this is done
by dragging the folders into the iFile workspace window. Once this
is done, iFile tracks any changes to the contents of the folders
and automatically updates the database as required. For example,
the user can drag in the Pictures folder and be able to browse all
the images, create collections, etc., without actually copying any
files or moving any data. iFile respects your directory structures
and never modifies anything directly, in contrast to iPhoto, which
copies images into its own directory hierarchy.
The release version of iFile will not require the user to request
that certain folders be scanned. Instead, iFile will initially
provide a view on the user's home directory, and will scan the
files and folders in the background automatically.
* Adam: Good! The less work users must do, the better. In fact,
one of the main problems with any filing system is that few people
put enough effort into categorizing and managing their data to be
able to find things later reliably. Can iFile automatically
categorize files based on metadata and content?
Bruce: Yes, it can. Collections are a way to automatically
categorize files by their properties. Because iFile maintains
file metadata in the object database, it can search and sort
through the metadata very quickly to return the appropriate
files. Collections are also "live": specifically, if files
appear on the disk that match a collection's specification,
they will be automatically added to that collection, regardless
of whether the collection is currently being viewed. One can
imagine all sorts of interesting AppleScript scripts that could
be triggered based on these events.
Collections also collect files based on their content. Rather than
searching for individual words as Google does, collections search
for key phrases: a word or a sentence. Files that contain any of
the key phrases specified in the collection are automatically
gathered into that collection.
So, what collections do is provide a new way to slice-and-dice the
information you already have in a different way, without requiring
you to import your data or commit to a completely new
organization.
* Adam: What do you think about adding a capability along the
lines of a Bayesian classifier that would evaluate the contents
of a file statistically, much the way some spam filters or the
email classifying program POPfile work? That could reduce the
user's effort even further.
Bruce: That is a great idea and has been discussed for quite some
time. In fact, Apple had worked on a project that was based on
this idea. Piles were automatic groupings of files based on their
content:
<http://www.theregister.co.uk/content/archive/30360.html>
One of the challenges here is to determine an appropriate
similarity function: how do you decide what the collections should
be a priori, to avoid the problems of hundreds of collections,
each with one file, or a small number of collections with
thousands of files? That will take some work.
* Adam: What does iFile do on the display side? Can users create
their own "smart folders" (a bit like smart playlists in iTunes)
that automatically show files that match a specific query?
Bruce: Absolutely. A collection is essentially a smart folder,
with a query specification. For example, it is easy to create
a collection that groups together all the images taken by a
particular model camera by specifying "<Model> is '2500' and
<Make> is 'Nikon'", since that data is available in the EXIF
metadata for the image. Similarly, metadata such as ID3 tags for
music; image data such as resolution, width, and height; file data
such as filenames, creation and modification dates, and sizes; and
so on are all stored in the database for object retrieval and
organization.
So collections actually have three mechanisms for grouping:
manually via drag-and-drop; automatically via metadata query
specification; and automatically via key phrase match.
* Adam: iFile's architecture sounds tremendously appealing, but
I suspect the devil is in the details, and thus in the interface.
Does iFile stick with the current file/folder metaphor (despite
the terminology shift to collections), or does it offer a
rethinking of how we interact with our data?
Bruce: You are right that the devil is in the details. I'm
currently working on how to present all this information in an
appropriately intuitive fashion, and I think I'm getting closer,
but there is still clearly work to do.
iFile begins with the traditional, icon-based file and container
organization (containers being either folders or collections),
but goes further with a variety of different views and layouts.
Many of the layouts provide preview views of the contents of
the files, and in the case of text files, iFile automatically
creates hyperlinks to related collections from within the text.
It's difficult to explain, but once you use iFile you'll find
that some of the views do in fact provide you ways to view your
data from different perspectives.
The more you provide iFile with information regarding how you want
to see your data, via defining collections, the more it can help
you by cross-indexing and showing relationships where they were
not clear before.
* Adam: Are some of the things you're attempting in iFile beyond
what many users can understand? Lots of people just want to be
told what to do, and something with iFile's flexibility might
be lost on them unless it was able to watch their actions and
automatically build collections.
Bruce: I agree that iFile can be somewhat intimidating to new
users: there are a lot of different things that iFile can do,
and there needs to be more immediate gratification when using it.
Creating collections automatically is a good approach, and by
creating useful collections based on not only images but documents
and email, I think that the power of the technology will become
more apparent. I'm planning on implementing some of this in the
next few months, so stay tuned! For anyone interested in this
technology who would like to be contacted when there is a public
version available, sign up at the site below, and I'll keep you
up to date. I'd be happy to go into detail about the release
version in a future issue of TidBITS.
<http://www.ingenuitysoftware.com/>
* Adam: Bruce, thanks for taking the time to chat with me, and
we're all looking forward to seeing what you come up with iFile.
Who knows, perhaps now that Apple has stabilized Mac OS X, they'll
be interested in looking at what you've done again.
Can CAN-SPAM Can Spam?
----------------------
by Brady Johnson <[EMAIL PROTECTED]>
Talk about deja vu. I recall having written this introduction
for a TidBITS article about spam before, each time changing the
unhappy statistics about spam volumes in an upward direction.
I always start by looking at Brightmail and other sites that track
spam to see how the efforts have fared so far. Sad to say, the
news has never been good. Even Congress has acknowledged this in
the opening lines of the CAN-SPAM Act, enacting this sorry comment
into law: "Unsolicited commercial electronic mail is currently
estimated to account for over half of all electronic mail traffic,
up from an estimated 7 percent in 2001, and the volume continues
to rise."
<http://db.tidbits.com/getbits.acgi?tbser=1169>
In fact, according to Brightmail, spam is rising faster than
the mercury on a hot summer day. In 2002, spam accounted for 40
percent of all email, meaning that if Congress's 7 percent number
is correct, between 2001 and 2002 there was a nearly 600 percent
increase. By the end of 2003 that number had soared to 58 percent.
If the trend continues, 65 percent of our email will be spam by
the end of 2004.
<http://www.brightmail.com/spamstats.html>
To stem this tide, Congress has enacted the "Controlling the
Assault of Non-Solicited Pornography and Marketing Act," or
CAN-SPAM. On 16-Dec-03 President Bush signed the bill into
law and it became effective on 01-Jan-04.
<http://www.spamlaws.com/federal/108s877.html>
CAN-SPAM has generated much discussion and debate, with much of
the wired community angrily dismissing it as a deal with the devil
and the marketing community hailing it as a significant step
forward in the battle to combat spam.
Reading the various commentaries on CAN-SPAM, it quickly becomes
clear that a key disagreement turns on the definition of "spam."
To many regular Internet users, "spam" includes any unsolicited
bulk email from any source. To these users, CAN-SPAM addresses
only a small subset of spam while legitimizing the rest of it. The
marketing community and others maintain that bulk email that is
not misleading or deceptive is fair exercise of their commercial
free speech rights and is no more objectionable than junk snail
mail. Thus, they claim that it should not be included in the
definition of "spam." To these users, CAN-SPAM represents a
major step forward.
**What Is "Spam" Anyway?** I feel obligated to point out that spam
is actually a pinkish processed meat product made by Hormel.
Hormel has belatedly taken issue with using their product's name
for noxious email and is attempting to block trademarks that
include "spam" such as SpamArrest.
<http://abcnews.go.com/sections/scitech/Business/techtv_spam030801.html>
But to many folks, "spam" simply refers to any unwanted email from
a stranger trying to sell a product, tout a position, advertise a
commercial Web site, or sway the reader's opinion in some way. As
anti-spam legislation has been enacted in the various states, the
definition has morphed and narrowed to "unwanted commercial email"
or "UCE," exempting non-commercial email such as political or
charitable solicitations. CAN-SPAM narrows this definition even
further.
CAN-SPAM uses the term "spam" only in the title acronym and in one
of the initial recitations. (Recitations in a statute have no
legally binding effect and are merely statements of policy reasons
to aid courts in interpreting it.) CAN-SPAM defines "commercial
electronic mail" as email, "the primary purpose of which is the
commercial advertisement or promotion of a commercial product
or service." Political and charitable solicitations are still
excluded from this definition, as are "transactional or
relationship messages," which are email messages from a party
with whom you have an existing connection of some kind.
CAN-SPAM gives the Federal Trade Commission (FTC) the authority
to change the definition of "transactional or relationship
messages... to the extent that such modification is necessary
to accommodate changes in electronic mail technology or
practices and accomplish the purposes of this Act." However,
the FTC does not have authority to alter the definition of
"commercial electronic mail."
**Key CAN-SPAM Provisions** -- CAN-SPAM's most severe prohibitions
focus on certain types of deceptive and fraudulent email. These
can subject the spammer to substantial criminal penalties of
three years in prison for a first offense and five years for a
subsequent offense, or for deceptive commercial email that is
sent in furtherance of another felony. This would include, for
example, the many messages claiming to be from exiled political
leaders seeking help to launder and share their hoards of untold
wealth if only the recipient would provide a valid bank account
number to them first. Those messages - already the subject of
prosecutions under existing criminal statutes - are subject
to further criminalization under CAN-SPAM.
Other criminal acts include using a computer, server, or domain
to send or relay commercial email without the lawful owner's
permission, and using false headers or misleading subject lines.
These activities are also subject to civil actions and penalties
in addition to criminal prosecution.
CAN-SPAM uses an opt-out model, requiring that all commercial
email include a method of opting out of future mailings from the
sender and must include the sender's real email address and snail
mail contact information. The statute specifies that spam must
contain a mailto, Web link, or other online mechanism that the
recipient can use to opt out. All commercial email subject to
CAN-SPAM is required to identify itself as an advertisement.
The statute does not specify how spammers should identify their
email, leaving that to the FTC, which has until April Fools Day
(01-Apr-04) to publish the identifying marks that spammers must
use. Like other provisions of CAN-SPAM, this identification
requirement does not apply to mail sent to anyone who has
affirmatively consented to receiving the messages.
CAN-SPAM considers certain actions to be "aggravated violations"
potentially subject to more severe penalties. These include
the common practice of harvesting email addresses from various
Internet sources and of using "dictionary attacks." Hijacking
someone else's server is also an aggravated violation.
One heavily criticized component of the Act is the provision
preempting all state laws addressing spam with certain very
limited exceptions. The only state laws that survive this
evisceration are those that prohibit falsity or deception in
commercial email such as the Washington state statute and large
parts of the California statute, and those that only incidentally
affect email. Examples of statutes with incidental effects on
email would include general computer trespass laws, consumer
protection statutes, and other laws that apply generally to
conduct that may sometimes include email. That means that much
existing state law has fallen by the wayside and that the
California opt-in statute which was to take effect this year
has been essentially nullified in most material respects.
As far as enforcement goes, CAN-SPAM allows no private right of
action, meaning that individual victims of spammers cannot go to
court and sue for violation of the statute. Authorized enforcers
are the FTC and other federal government agencies, state Attorneys
General, and Internet service providers. It's worth noting that
Internet service providers often have their own acceptable use
policies relating to email and spam. The new federal statute does
not disturb these private rules, meaning that an ISP retains
authority under those policies to cancel or suspend a user and
often to claim damages, etc. for violation. Leaving ISP authority
in place provides an independent, if seldom-used, basis of
liability against spammers.
**Will CAN-SPAM Work?** I don't think so. CAN-SPAM is a decent
enough starting point, but in my opinion it has too many flaws
to make it effective to stop or even slow spam.
CAN-SPAM's good points are that it is a federal statute and thus
applies uniformly throughout the United States. This eliminates
the sometimes confusing patchwork of different laws in the states
that have enacted anti-spam statutes. It also goes a long way
toward resolving jurisdictional issues involving whether a state
has authority to control a business operating outside its
boundaries. These jurisdictional disputes were quite common
under state spam enforcement.
It's also good to see the various "aggravated violations" called
out and codified, since having them more clearly made illegal will
simplify the job of prosecutors.
Also, anything that increases the potential liability for spammers
may sway the economic balance of spam. If sending spam could
result in prison, spammers will have to determine if the rewards
are worth the potential risk. While added liability may not
impact the scofflaws who will ignore any legal mandate or
prohibition unless they are arrested, increasing the risk of
prison or significant monetary penalties will probably scare off
businesses that might been considering skirting the law before.
But despite those good points, CAN-SPAM's flaws abound. Let's
examine them.
**International Problems** -- Unfortunately, CAN-SPAM applies only
in the United States. True, U.S. law and international treaties
do confer jurisdiction on U.S. courts to address issues arising
internationally if they impact the U.S. But while that may sound
nice on paper, it suffers from two major problems.
First, there is the problem of actual enforcement. Spammers
operating outside the U.S. are often not subject to U.S. courts,
and even where they are, any judgment or court order is worthless
unless it can be enforced. This fact means that the only way an
enforcement agency can compel a foreign spammer to comply with the
law is via diplomatic pressure from the U.S. Show of hands: how
many people think that enforcing U.S. spam law is likely to become
a high priority for U.S. diplomatic efforts any time soon? Now,
if we could show that spammers were actually fronts for terrorist
organizations...
Second, CAN-SPAM's opt-out approach is directly at odds with the
approach taken by much - perhaps most of the rest of - the first
world. The European Union has adopted a Directive (a policy
document) that establishes an opt-in approach. Each individual
member nation must then enact specific laws implementing the
Directive. (The first URL below goes to the English language
version of the Directive; the second URL leads to versions in
other languages.)
<http://europa.eu.int/eur-lex/pri/en/oj/dat/2002/l_201/
l_20120020731en00370047.pdf>
<http://europa.eu.int/information_society/topics/ecomm/useful_information/
library/legislation/text_en.htm#dir_2002_58_ec>
Australia has also adopted an opt-in law broadly prohibiting
commercial email being sent to Australians. In short, while it
seems likely that most spam comes from the U.S. or is touting
products and services of U.S.-based companies, opt-in appears to
be the model of choice in most of the technologically developed
world, with the U.S. falling out of step with the rest of the
global community.
These conflicting approaches are likely to cause problems similar
to, and perhaps worse than, those that existed within the U.S.
before the federal law was passed, and when there were various
state statutes with differing mandates and standards. In the U.S.,
at least all of those states were subject to the same federal
government and general rules of legal analysis and interpretation.
On the international scene, the problems caused by such wildly
conflicting anti-spam models are likely to be worse. Since the
U.S. law is less restrictive, it appears to me that the E.U.
nations and Australia may continue to be flooded with spam that
is legal in the U.S., but illegal in their countries.
**Opt-Out Problems** -- The unfortunate choice of an opt-out model
requires that recipients contact the sender to opt out of future
messages. While this may work for legitimate marketers who
actually include a working unsubscribe mailto or Web link in the
message, most spam is not legitimate, and use such links merely
as unscrupulous means of confirming or harvesting email addresses.
By encouraging people to use these opt-out links, CAN-SPAM may
actually increase the amount of illegal spam. It also potentially
increases the risk of identity theft and other crimes targeting
the unsophisticated Internet user.
**Enforcement Problems** -- CAN-SPAM puts the entire burden of
enforcement on the shoulders of already overworked federal and
state enforcement agencies, which show no signs of rushing to
prioritize spam enforcement. It seems likely that ISPs will take
action, but most ISPs lack the resources to mount intensive
investigations to track down spammers in other countries, or
to support the sort of litigation that may be required to bring
them down.
To be fair, prior to CAN-SPAM, most enforcement had to take place
at the individual level, much of it in states without strong
anti-spam statutes. Most individuals can't afford the expense of
a full-fledged spam investigation any more than many ISPs can. But
CAN-SPAM does not permit individual victims to file private suits
for violating its terms. It seems counterproductive not to allow
individual enforcement since it would both aid in the overall
effort to combat spam, and would result in remedies to the actual
spam victims - the end users - in cases where the spammer could
be found and held accountable.
Lastly, even once spammers are dragged into court, CAN-SPAM may
suffer from loopholes. For instance, the "primary purpose" prong
of the spam definition means that spammers can include personal
notes in their messages that incidentally offer something for
sale, then argue that the solicitation was not the "primary
purpose" of the email. I suspect that most people reading this
have received spam along the lines of: "Hi there! How are you
doing? I am having a great time. By the way, I ran across this
item <insert product here> and thought you might be interested."
While this ambiguity may not pass the laugh test in court, it is
the sort of thing that will almost certainly have to be tested in
court before it has any appreciable impact, thus further delaying
any potential benefit until one of the authorized enforcers
chooses to put the question to a judge. This is another reason
that individual enforcement would have been a good thing - it
seems more likely that an individual or consumer group would take
up this issue sooner than I expect one of the authorized enforcers
to do it.
**Summing Up** -- In previous articles, I have concluded that if
spam is outlawed, only outlaws will spam. An increasing amount
of spam is already in violation of our current state laws and
has not been eliminated or even reduced as the result of having
been outlawed. Legitimate companies have attempted to comply,
but the less-than-legitimate scum will freely violate the new
law unless and until they are physically caught.
In the final analysis, CAN-SPAM is a good start, but is far too
flawed to be an effective tool against spam. Like the state laws,
it will successfully prevent legitimate companies from resorting
to spam (not that most legitimate companies were spamming before),
but it will have no impact on spammers outside of U.S.
jurisdiction and thus not subject to the U.S. law, or on
unscrupulous spammers who will ignore the law unless they are
arrested. The inconsistency with anti-spam laws used in other
parts of the world may harm those nations' efforts to control
spam by allowing spam from the U.S. to circumvent their laws.
Put bluntly, CAN-SPAM tells spammers that they can spam, so long
as they are careful to drive their truckloads of spam through
the truck-sized loopholes in the statute. What's perhaps most
disappointing is that we've waited for years for a federal anti-
spam law, and the one we ended up with isn't nearly as good as
it could have been, or even as good as some of the now-preempted
existing state laws are. That's a shame, and it's one we'll
undoubtedly have to live with for some time.
[Brady Johnson is a grouchy attorney in Seattle who really, really
hates spam.]
Hot Topics in TidBITS Talk/26-Jan-04
------------------------------------
by TidBITS Staff <[EMAIL PROTECTED]>
**AppleWorks international versions** -- It wasn't clear when
Apple released the latest AppleWorks update, but an international
version was also updated at the same time (though French is still
not updated) (2 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2145>
**Habeas under attack** -- Habeas is facing its first serious
test in the war against spam. Can they successfully sue spammers
who infringe their copyrighted and trademarked haiku headers?
(5 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2144>
**Apple creating a full audio product line** -- How will Apple's
recent audio applications (including announced, but not released
programs) affect how the company is received by consumers and the
audio community? (2 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2143>
**iPhoto 4 initial impressions** -- If nothing else, readers think
the speed improvements in iPhoto 4 are some of the best things
about iLife '04. (2 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2142>
$$
Non-profit, non-commercial publications may reprint articles if
full credit is given. Others please contact us. We don't guarantee
accuracy of articles. Caveat lector. Publication, product, and
company names may be registered trademarks of their companies.
This file is formatted as setext. For more information send email
to <[EMAIL PROTECTED]>. A file will be returned shortly.
For information: how to subscribe, where to find back issues,
and more, email <[EMAIL PROTECTED]>. TidBITS ISSN 1090-7017.
Send comments and editorial submissions to: <[EMAIL PROTECTED]>
Back issues available at: <http://www.tidbits.com/tb-issues/>
And: <ftp://ftp.tidbits.com/issues/>
Full text searching available at: <http://www.tidbits.com/search/>
-------------------------------------------------------------------