Cybersquatting: Blackmail On The Information Superhighway
Cybersquatting: Blackmail On The Information Superhighway
†
John D. Mercer
I. Introduction
II. The Problem of Cybersquatting
A. What is Cybersquatting?
B. Why is Cybersquatting Wrong?
C. Dilution is not the Solution
III. Cybersquatting is Blackmail
A. Theories of Blackmail
B. Applying Blackmail to Cybersquatting
IV. Conclusions
I. INTRODUCTION
The present-day Internet, often called the “information superhighway,” is not what its
[1]
original creators imagined. The Internet began in the 1960s as a Department of Defense
[2]
project named ARPANET. ARPANET was a computer network that allowed various
[3]
countries to stay in communication during and after a catastrophe. After the Cold War ended,
[4]
ARPANET became the Internet, as many non-military users used the network. Even after the
Internet became more civilian-friendly, it was not until recently that the Internet became a
[5]
commercial tool. With the creation of the World Wide Web and a graphical, point-and-click
interface that combines text with pictures, sounds, and easy linking, commercial users could
[6]
finally take full advantage of the Internet.
[7]
To establish themselves on the Internet, corporations must register a domain name.
[8]
Until recently, Network Solutions, Inc. (“NSI”) distributed all domain names to registrants.
NSI did so purely on a “first-come, first-serve” basis without regard for trademark, trade name,
[9]
or any other proprietary claims to the registered name. Because NSI only checked for
uniqueness, i.e., that no one else had already claimed the desired domain name, individuals were
able to register domain names corresponding to famous trademarks with an eye towards reselling
[10]
these domain names to the owners of the famous trademarks. These individuals have been
[11]
called “cybersquatters.”
Now, multiple registrars (including NSI) distribute Internet domain names. Assuming
that a corporation wants to register a domain name using “.com” or “.net” as a top-level domain
(“TLD”), a corporation must use a registrar accredited by the Internet Corporation for Assigned
[12]
Names and Numbers (“ICANN”). Although ICANN-accredited registrars will still grant
[13]
domain names on a “first-come, first-serve” basis, these registrars now follow a uniform
[14]
dispute resolution policy to decide competing claims for domain names. Although this
dispute resolution policy may prevent some cybersquatting, the policy’s only remedy is
[15]
cancellation or transfer of the domain name registration. This consequence may be
inadequate to deter cybersquatting. In addition, clever cybersquatters may still be able to
[16]
circumvent ICANN’s dispute resolution policy.
A. What is Cybersquatting?
[17]
Cybersquatting is a phenomenon only as old as the World Wide Web itself.
Cybersquatters have been characterized as “individuals [who] attempt to profit from the Internet
by reserving and later reselling or licensing domain names back to the companies that spent
[18]
millions of dollars developing the goodwill of the trademark.” Basically, cybersquatting
occurs when an individual or a corporation registers a domain name that is spelled the same as a
pre-existing trademark, and demands money from the trademark owner before the registrant will
release the domain name.
Individuals who register domain names corresponding with trademarks differ in
character. For example, of the four major players in disputes on the Internet, two are “guilty” of
[19]
cybersquatting and two are “innocent.” The guilty players are ransom grabbers and
[20]
competitor grabbers. Ransom grabbers are the paradigmatic cybersquatters; they
strategically register trademarks as domain names in order to sell it to the legitimate trademark
holders. Competitor grabbers are individuals or corporations that register a domain name
corresponding to a competitor’s trademark in order to sell their own goods on it or merely to
[21]
hinder the legitimate trademark holder’s use of the domain name. On the other hand,
innocent registrants and concurrent users of domain names are not guilty of cybersquatting.
Innocent users register the domain name based on some unrelated interest in the word itself,
[22]
without intending harm to a trademark owner. Concurrent users are those who concurrently
share the same trademark for different types of products and services and in different markets.
[23]
Although this article deals primarily with ransom grabbers, any complete solution must
address the rights and responsibilities of all four players.
By expanding the definition of “commercial use,” courts have created a bad precedent that may
[63]
severely hinder true “noncommercial” users of web sites.
Based on precedent, there is nothing limiting courts from applying “commercial use”
analysis against innocent registrants who have legitimately registered domain names that
incidentally correspond to trademarks. For example, a hypothetical Ms. Sally Kaplan in Georgia
could register and use the domain name “www.skaplan.com” to display pictures of her
grandchildren and to upload recipes. Stanley Kaplan testing service could at some point
desire this domain name, and could seek to obtain it from Ms. Kaplan. Because her friends and
family use this domain name to contact her, the domain name would be more valuable to Ms.
Kaplan than the registration fees she had paid. Thus, she might ask Stanley Kaplan for an
amount greater than what she originally paid to register the domain name. Under current
decisional law, her use and “demand” could be considered cybersquatting and a violation of the
FTDA. Clearly, the “noncommercial use” exception was meant to avoid this situation.
Courts have expanded the FTDA well beyond its tenuous borders by forcing the
cybersquatting situation into trademark dilution. First, by granting relief to many companies that
are not “famous,” courts open the door for many companies to pursue dilution actions. This will
not only overload the federal circuits, but will also create confusion concerning which marks can
and should receive protection under the FTDA. Second, by expanding the definition of dilution
to include not only tarnishment, but also to broaden the boundaries of “blurring,” courts create
incentives for companies to litigate any marginal dilution claim under the FTDA. Third, by
expanding the “commercial use” requirement, courts threaten to chill many arguably non-
commercial uses of trademarks. Thus, courts have effectively limited the communication value
of words that correspond to trademarks by giving trademark owners excessive power over what
can and cannot be said about their products and services.
IV. CONCLUSIONS
†
B.S., 1993, Environmental Engineering, Massachusetts Institute of Technology; Ph.D., 1997, Ecology, Evolution,
and Animal Behavior, University at Albany, State University of New York; J.D. (anticipated), 2000, Boston
University School of Law.
[1]
See, e.g., John Budris, One Island, One Schoolhouse, One Student, BOSTON GLOBE, Dec. 28, 1998, at B1, B2
(“Peculiarities in the phone service make Internet access seem more a potholed road than an information
superhighway.”).
[2]
See G. Peter Albert, Jr., Right on the Mark: Defining the Nexus Between Trademarks and Internet Domain
Names, 15 J. MARSHALL J. COMPUTER & INFO. L. 277, 278 (1997).
[3]
See id.
[4]
See id. Initially the Internet’s primary users were the government and universities. See id. This transformation
from a military function to a primarily civilian function upon cessation of a military threat (i.e., the end of the Cold
War) is similar to manufacturing companies’ shift after World War I from primarily arms and munitions to
peacetime products. See Frank I. Schecter, The Rational Basis of Trademark Protection, 40 HARV. L. REV. 813,
823 (1927) (citing Remington Arms and DuPont as examples of companies that shifted their focus).
[5]
See Albert, supra note 2, at 278 (“The diversification of Internet users, along with Web development, has caused
a significant change of attitude regarding advertising and commercialization.”).
[6]
See id. at 278-79 (discussing the Web’s contribution to e-commerce); see also Danielle W. Swartz, The
Limitations of Trademark Law in Addressing Domain Name Disputes, 45 UCLA L. REV. 1487, 1489 (1998) (“[T]
he easy accessibility and convenience of the Internet for consumers make cyberspace an invaluable environment for
promoting and selling goods and services.”).
[7]
See Swartz, supra note 6, at 1488. A domain name is the user-friendly, alphanumeric equivalent of a unique
numerical Internet Protocol address. See id. at 1490; Panavision Int’l, L.P. v. Toeppen, 945 F. Supp. 1296, 1299
(C.D. Cal. 1996) (explaining that every computer linked to the Internet is assigned a numeric address consisting of
four sets of digits separated by periods (e.g., 171.26.4.28)).
[8]
See Albert, supra note 2, at 280 (“NSI is responsible for the registration of domain names that have any one of
six possible top levels . . . include[ing] ‘.com’.”).
[9]
See Gregg Duffey, Comment, Trademark Dilution Under the Federal Trademark Dilution Act of 1995: You’ve
Come a Long Way Baby – Too Far, Maybe?, 39 S. TEX. L. REV. 133, 147 (1997) (noting that NSI issues domain
names without considering trademark ownership).
[10]
NSI stated that performing a trademark check for each domain name registration would cost thousands of
dollars and unnecessarily delay the time it takes to successfully register a domain name. See Martin B. Schwimmer,
Domain Names and Everything Else: Trademark Issues in Cyberspace, in UNDERSTANDING BASIC
TRADEMARK LAW 1998, at 263, 269 (PLI Pat., Copyrights, Trademarks & Literary Prop. Course Handbook
Series No. G0-0015, 1998). A standard trademark registration check costs only $245, including the filing fee. See
id. Thus, it hard to see why NSI, an automated operation, would not be able to perform a trademark check for less
money or time. See id. InterNIC, the agency responsible for overseeing NSI, has said that it would take twenty
people to do trademark checks for domain names and that the responsibility should be on the registrant. See Neal J.
Friedman & Kevin Siebert, The Name Is Not Always the Same, 20 SEATTLE U. L. REV. 631, 635-36 (1997) (citing
InterNIC manager Scott Williamson).
[11]
See Swartz, supra note 6, at 1494 (noting that ransom grabbers “strategically register trademarks as domain
names . . . to sell to . . . trademark holders . . . .”). Other grabbers are competitors who register domain names either
to offer their competing goods or just to hinder the trademark holder’s use of the domain name. See id. at 1494-95.
For purposes of this paper, cybersquatters will only include individuals who act as ransom grabbers.
[12]
ICANN was formed in November 1998 as a non-profit, private sector corporation “to take over responsibility
for the IP address space allocation, protocol parameter assignment, domain name system management, and root
server system management functions . . . .” About ICANN (last modified Mar. 26, 2000)
<http://www.icann.org/general/>. Before November 1998, the U.S. government contracted its domain name
allocation services to NSI. See Albert, supra note 2, at 280.
[13]
See Michael R. Gottfried & Anthony J. Fitzpatrick, The Internet Domain Name Landscape in the Wake of the
Government’s “White Paper,” BOSTON B.J., Nov.-Dec. 1998, at 8, 9.
[14]
See ICANN, Uniform Domain Name Dispute Resolution Policy (last modified Jan. 3, 2000)
<http://www.icann.org/udrp/udrp-policy-24oct99.htm> [hereinafter ICANN, Policy]. The Dispute Resolution
Policy was adopted on August 26, 1999, and the implementing rules were approved on October 24, 1999. See id.;
ICANN, Rules for Uniform Domain Name Dispute Resolution Policy (last modified Jan. 3, 2000)
<http://www.icann.org/udrp/udrp-rule-24oct99.htm> [hereinafter ICANN, Rules]. These rules provide detail on
how and to whom a complaint should be filed, the format of the complaint, and the contents of the complaint. See
id. ¶¶ 2-3. The rules also discuss, in detail, the review procedure and the interaction of the complaining and
responding parties with the review panel. See id. ¶¶ 6-18.
[15]
See ICANN, Policy, supra note 14, ¶ 4(i) (“The remedies available to a complainant pursuant to any proceeding
before an Administrative Panel shall be limited to requiring the cancellation of your domain name or the transfer of
your domain name registration to the complainant.”).
[16]
For example, the time to go through the ICANN arbitration procedure may cost the corporation more money in
lost profits than the cybersquatter is asking for immediate transfer. Therefore, for pure business reasons,
corporations may choose to pay a cybersquatter rather than enter into the ICANN arbitration procedure. Thus, a
clever cybersquatter could find the right amount for a given corporation that they would choose to pay the
cybersquatter rather than taking legal action.
For this reason, and possibly other less noble reasons, businesses pushed Congress to pass the
Anticybersquatting Consumer Protection Act (“ACPA”), 15 U.S.C.A. § 1125 (d) (West Supp. 2000). The ACPA
provides trademark holders a cause of action against bad faith registrants of their trademarked names. See id. § 1125
(d)(1)(A)(i). The ACPA further provides a successful plaintiff either actual damages and profits or statutory
damages as high as $1,000,000. See id. §§ 1125(c)(2), 1117(c), 1118.
[17]
The commercial aspects of the World Wide Web changed how businesses viewed the Internet and the Web’s
advertising potential greatly attracted commerce. See G. Gervaise Davis III, Internet Domain Names and
Trademarks: A Growing Area of Dispute, in PLI’S THIRD ANNUAL INSTITUTE FOR INTELLECTUAL
PROPERTY LAW, at 649, 656 (PLI Pat., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No.
G4-4008, 1997). Because cybersquatters target companies who can afford to pay a ransom for the domain name,
cybersquatting was not a real problem until commercial businesses wanted to get on the Internet. See id. at 656,
659.
[18]
Intermatic Inc. v. Toeppen, 947 F. Supp. 1227, 1233 (N.D. Ill. 1996).
[19]
See Swartz, supra note 6, at 1494-95.
[20]
See id.
[21]
See id.
[22]
Innocent users “innocently register a name that has particular meaning to them—such as their last name or the
name of a loved one—that also happens to be someone else’s registered trademark.” Id. at 1495.
[23]
See id.
[24]
See, e.g., Panavision Int’l, L.P. v. Toeppen, 945 F. Supp. 1296, 1303 (C.D. Cal. 1996) (stating that Toeppen’s
cybersquatting “conduct injured Panavision by preventing Panavision from exploiting its marks”).
[25]
See Swartz, supra note 6, at 1493 (stating that domain names “must be unique”); Schwimmer, supra note 10, at
266 (“[W]hile identical trademarks can co-exist in the marketplace, identical domain names cannot coexist on the
Internet.”).
[26]
Panavision, 945 F. Supp. at 1300. Toeppen had applied and received registration from NSI for the domain
name “www.panavision.com” in December of 1995, and Panavision brought suit in May of 1996. See id.
[27]
See id. at 1303. Panavision chose to litigate against Toeppen even though it probably would have been cheaper
to pay the $13,000. See id. Toeppen had been counting on the fact that it would be cheaper for Panavision to pay
the fee, as that is how Toeppen ran his domain-name “business.” See id.
[28]
As long as the desired domain name is different from one already registered, NSI would grant the registration.
See Albert, supra note 2, at 281; see also supra notes 14-15 and accompanying text (discussing that the new
ICANN-accredited registrars still distribute names without checking if a trademark holder might have a claim to the
domain name).
[29]
See generally Swartz, supra note 6, at 1491-92 (“Many businesses choose to use their trademarks as domain
names because consumers are already familiar with those marks . . . . Internet users often guess that a product’s
trademark also serves as the domain name that accesses a website with information about the product.”). Because of
this preference, cybersquatters generally register a domain name that corresponds to the actual trademark. See id. at
1499-1500.
[30]
See id. at 1492. Search engines search the Internet using key words. See Panavision, 945 F. Supp. at 1299. A
typical search will often bring up thousands of webpages that use that key word, so that a customer seeking only a
specific name must wade though this list to find the one site that has the information he is seeking. See id.
[31]
A typical search engine will retrieve all domain names that contain the requested term, including any
competitors’ domain names, if the competitors compare or otherwise mention the trademark owner’s products. In
addition, because search engines generally retrieve any domain that uses the requested term, disclaimers may be
ineffective for these searches. See Schwimmer, supra note 10, at 286-87 (discussing Playboy Enter., Inc. v. Terri
Welles, 7 F. Supp. 2d 1098 (S.D. Cal. 1998)). In Welles, a former Playboy Playmate of the Year set up a webpage
and disclaimed any association with PLAYBOY. See id. A search looking for ‘playboy’ would nonetheless retrieve
this site. See id.
[32]
See supra notes 29-30 and accompanying text.
[33]
See supra note 31 and accompanying text.
[34]
Some have questioned whether ordinary trademark infringement claims might prevail against cybersquatters.
See, e.g., Swartz, supra note 6, at 1496-1505. Traditional infringement tests may be ineffective because they are
either over- or under-inclusive. This shortcoming is inherent in three critical factors: 1) similarity of the marks—
innocent registrants and concurrent trademark holders could also have similar marks; 2) proximity of the goods—
many cybersquatters do not advertise any goods on the desired domain name; and 3) marketing channels—many
cybersquatters only warehouse the domain name and therefore do not use any marketing channels. Courts could
also apply the same standards to the domain name problem as courts do to cases involving telephone mnemonics.
See Albert, supra note 2, at 289-94, 307-08. Domain names are similar to telephone mnemonics in that they have to
be unique, and case-law has already been established for deciding who infringes by using a similar or desired
telephone mnemonic. See id. at 307-08. Therefore, courts could apply this caselaw to domain name disputes. See
id. Unfortunately, there is a split in authority concerning telephone mnemonic cases. See id. Also, the telephone
mnemonic cases rely on a likelihood of consumer confusion, an element that is usually lacking, or very hard to
prove, in the cybersquatting situation. See id. at 292-93.
[35]
This trend is probably due to the fact that all courts deciding cybersquatting cases have applied dilution theory.
See, e.g., Intermatic Inc. v. Toeppen, 947 F. Supp. 1227, 1239-41 (N.D. Ill. 1996); Panavision, 945 F. Supp. at 1301.
[36]
Schechter, supra note 4.
[37]
See id. at 819 (“The mark actually sells the goods. And, self-evidently, the more distinctive the mark, the more
effective is its selling power.”).
[38]
See id. at 822 (“[T]he preservation of the uniqueness or individuality of the trademark is of paramount
importance to its owner.”); see also Rudolf Callmann, Trade-mark Infringement and Unfair Competition, LAW &
CONTEMP. PROBS., Spring 1949, at 185, 189 (1949) (agreeing with Schechter that the property right inherent in
trademark ownership should allow protection beyond merely protecting consumers from confusion). But see Ralph
S. Brown, Jr., Advertising and the Public Interest: Legal Protection of Trade Symbols, 57 YALE L.J. 1165, 1205
(1948) (arguing that protection of a mark’s intrinsic symbol value from dilution is not a desirable interest because it
would grant the trademark owner a limited monopoly that he does not deserve; only the informational, reputational,
and goodwill aspects of a trademark should be protected).
[39]
See Malla Pollack, Time to Dilute the Dilution Statute and What Not to Do When Opposing Legislation, 78 J.
PAT. & TRADEMARK OFF. SOC’Y 519, 520 (1996) (arguing that dilution is concerned not with protecting
consumers, but with protecting the property interests of trademark owners).
[40]
See Federal Trademark Dilution Act of 1995, 15 U.S.C. §§ 1125, 1127 (1994 & Supp. IV 1999).
[41]
State statutes generally required plaintiffs to establish “(1) a distinctive mark and (2) a likelihood of dilution.”
Duffey, supra note 9, at 140. The federal dilution statute arguably eliminated some of the major problems that faced
plaintiffs seeking dilution protection from the various states. See id. at 141. One problem was the uncertain ability
of state courts to grant extraterritorial injunctions (i.e., injunctions that involved uses of similar marks beyond the
state boundaries). See id. Another problem was the lack of uniformity of state courts in handling dilution questions,
which encouraged forum shopping. See id.
[42]
See 15 U.S.C. § 1125(c)(1) (“The owner of a famous mark shall be entitled [to relief under this section] . . . .”)
(emphasis added).
[43]
The FTDA provides:
In determining whether a mark is distinctive and famous, a court may consider factors such as,
but not limited to–
(A) the degree of inherent or acquired distinctiveness of the mark;
(B) the duration and extent of use of the mark in connection with the goods or services with
which the mark is used;
(C) the duration and extent of advertising and publicity of the mark;
(D) the geographical extent of the trading area in which the mark is used;
(E) the channels of trade for the goods or services with which the mark is used;
(F) the degree of recognition of the mark in the trading areas and channels of trade used by the
marks’ owner and the person against whom the injunction is sought;
(G) the nature and extent of use of the same or similar marks by third parties; and
(H) whether the mark was registered under the Act of March 3, 1881, or the Act of February 20,
1905, or on the principal register.
Id.
[44]
See id. § 1125(c)(1)-(4).
[45]
See, e.g., Mead Data Cent., Inc. v. Toyota Motor Sales, U.S.A., Inc., 875 F.2d 1026, 1028 (2d Cir. 1989)
(holding that LEXIS is a strong mark, not because it is arbitrary, but because Mead had extensive sales and
advertising of the LEXIS mark; no dilution relief because its fame is limited to one percent of the population); Kraft
General Foods, Inc. v. Allied Old English, Inc. 831 F. Supp. 123, 134 (S.D.N.Y. 1993) (citing Judge Sweet’s
concurrence in Mead Data and holding that to warrant dilution relief, Bulls-Eye barbecue sauce did not need to be
“famous” or “celebrated,” it must merely be an extremely strong mark either through inherent distinction or through
acquiring secondary meaning).
[46]
See, e.g., Panavision Int’l, L.P. v. Toeppen, 945 F. Supp. 1296, 1298 (C.D. Cal. 1996) (involving claims
brought by Panavision for federal (FTDA) and state (California) trademark dilution, federal trademark infringement,
and federal unfair competition); Intermatic Inc. v. Toeppen, 947 F. Supp. 1227, 1229 (N.D. Ill. 1996) (involving
claims brought by Intermatic for federal (FTDA) and state (Illinois) trademark dilution, federal trademark
infringement, federal unfair competition, common law unfair competition, and state deceptive trade practices).
[47]
See, e.g., Panavision, 945 F. Supp. at 1304 (stating that since Panavision prevailed on federal and state dilution
claims, “it is unnecessary . . . to reach the issues of federal and state trademark infringement and federal unfair
competition.”). Of course, courts may also feel justified in applying the FTDA aggressively against cybersquatters.
See 141 CONG. REC. S19312 (daily ed. Dec. 29, 1995) (statement of Sen. Leahy) (hoping that passing the FTDA
would “help stem the use of deceptive Internet addresses taken by those who are choosing marks that are associated
with the products and reputations of others.”).
[48]
See supra notes 42-44 and accompanying text.
[49]
See Panavision, 945 F. Supp. at 1302-03 (holding that Panavision is a famous mark because of federal
registration, extensive advertising, and development of strong secondary meaning).
[50]
See Intermatic, 947 F. Supp. at 1239 (holding that Intermatic is “famous” as a matter of law because it “is a
strong fanciful federally registered mark, which has been exclusively used by Intermatic for over 50 years.”).
[51]
See TeleTech Customer Care Mgmt., Inc. v. Tele-Tech Co., Inc., 977 F. Supp. 1407, 1411 (C.D. Cal. 1997)
(finding that the plaintiff could probably prove it held a “famous” mark).
[52]
See Schwimmer, supra note 10, at 276-77 (noting that decisions granting “famous” marks protection beg the
question, “[i]s it possible that in the rush to prevent domain name piracy, dilution law has been diluted?”).
[53]
See Teletech, 977 F. Supp. at 1412 (granting preliminary injunction because the mark was likely to succeed on
the merits of its dilution claim); Intermatic, 947 F. Supp. at 1240 (finding it likely that Toeppen’s use of the domain
name would cause dilution of Intermatic’s famous mark).
[54]
15 U.S.C. § 1125(c) (Supp. IV 1999).
[55]
See Robert C. Denicola, Some Thoughts on the Dynamics of Federal Trademark Legislation and the Trademark
Dilution Act of 1995, LAW & CONTEMP. PROBS., Spring 1996, at 75, 88-89. Although the dilution proposal for
the 1988 amendments contained a provision to protect trademark owners from tarnishment, the 1995 Act purposely
does not. See id. The Trademark Review Commission report states that the injury from tarnishment is “less dilution
than injury to reputation[]” and does not fit conceptually with dilution. U.S. Trademark Ass’n, Trademark, Review
Comm’n, Report and Recommendations to USTA President and Board of Directors, 77 TRADEMARK REP. 375,
434 (1987). Nonetheless, courts have used the FTDA to protect trademark holders from tarnishment by others on
the Internet. See, e.g., Toys “R” Us, Inc. v. Akkaoui, No. C96-3381CW, 1996 WL 772709, at *4 (N.D. Cal. Oct. 26,
1996) (enjoining adult site owner from using site “www.adultsrus.com”); Hasbro, Inc. v. Internet Entertainment
Group, Ltd., No. C96-130WD, 1996 WL 84853, at *1 (W.D. Wash. Feb. 9, 1996) (enjoining adult site user from
using domain name “www.candyland.com”). The problematic use of the FTDA to claim tarnishment is not limited
to Internet cases. See Hormel Foods Corp. v. Jim Henson Prod., Inc., 73 F.3d 497 (2d Cir. 1996) (holding that
although there was no tarnishment in the instant case, tarnishment was a valid cause under dilution statutes).
Although Hormel Foods was not decided under the FTDA, it was decided only two weeks before the FTDA was
signed into law, and demonstrates concurrent judicial interpretation.
[56]
Intermatic, 947 F. Supp. at 1240; see also Daniel R. Pote, A Domain by Any Other Name: The Federal
Trademark Dilution Act of 1995 Applied to Internet Domain Names, 37 JURIMETRICS J. 301, 314-15 (1997)
(citing Panavision Int’l, L.P. v. Toeppen, 945 F. Supp. 1296, 1303 (C.D. Cal. 1996)).
[57]
See, e.g., Pollack, supra note 39, at 526-27 (“The dilution statute will probably fuel more cases barring counter-
cultural or political protest use of well-known communication symbols.”). Many such symbols may legitimately
belong in the public domain; their restriction raises First Amendment concerns. See id. at 527.
[58]
See 947 F. Supp. 1296, 1232 (C.D. Cal. 1996).
[59]
See id. at 1239. But see Cardservice Int’l, Inc. v. McGee, 950 F. Supp. 737, 741 (E.D. Va. 1997) (“[A] domain
name is more than a mere Internet address. It also identifies the Internet site to those who reach it, much like . . . a
company’s name identifies a specific company.”).
[60]
Intermatic, 947 F. Supp. at 1239; see also Panavision, 945 F. Supp. at 1303 (holding that Toeppen’s use of the
domain name was commercial).
[61]
See 15 U.S.C. § 1125(c)(4) (Supp. IV 1999) (“The following shall not be actionable under this section: (A) Fair
use . . . in comparative commercial advertising . . . (B) Noncommercial use of a mark. (C) All forms of news
reporting and news commentary.”); see also Avery Dennison Corp. v. Sumpton, 999 F. Supp. 1337, 1340-41 (C.D.
Cal. 1998) (noting that cybersquatters who registered many domain names corresponding to popular surnames in
order to resell to individuals who would want to use one of these domain names as an email address violated the
FTDA). But see Albert, supra note 2, at 303-04 (arguing that cybersquatters that only used domain names as e-mail
addresses would be abusing the noncommercial use exception and thus their conduct should be actionable and
prevented by the FTDA).
[62]
4 J. THOMAS MCCARTHY, MCCARTHY ON TRADEMARKS § 25:77, at 25-153 n.9 (1999) (internal
citations omitted).
[63]
See Denicola, supra note 55, at 91 (arguing that Congress intended courts to broadly interpret the
“noncommercial use” exception of the FTDA).
[64]
See e.g., Davis, supra note 17, at 660 (stating that cybersquatting behavior “dangerously border[s] on
extortion . . . .”); Friedman & Siebert, supra note 10, at 644-45 (calling cybersquatting a form of domain name
blackmail).
[65]
Blackmail is succinctly defined as a special case of extortion where the threat is to disclose information rather
than to inflict physical harm. See James Lindgren, Unraveling the Paradox of Blackmail, 84 COLUM. L. REV.
670, 674 (1984).
[66]
See id. at 670-71 (“In blackmail, the heart of the problem is that two separate acts, each of which is a moral and
legal right, can combine to make a moral and legal wrong.”); Richard A. Epstein, Blackmail Inc., 50 U. CHI. L.
REV. 553, 557 (1983) (arguing that blackmail is an anomalous exception to the general rule that “where a person
has the right to do a certain act . . . he has the right to threaten to do that act.”).
[67]
See George P. Fletcher, Blackmail: The Paradigmatic Crime, 141 U. PA. L. REV. 1617, 1617 (1993).
[68]
Id. Fletcher goes on to say that this “paradox” is not unique to blackmail, but is also relevant for crimes such as
bribery and prostitution. See id. But see Wendy J. Gordon, Truth and Consequences: The Force of Blackmail’s
Central Case, 141 U. PA. L. REV. 1741, 1743-45 (1993). Because a person might not have a right to threaten to do
an act, even if he has the right to actually do the act, there is no paradox. See id.
[69]
See Mitchell N. Berman, The Evidentiary Theory of Blackmail: Taking Motives Into Account, 65 U. CHI. L.
REV. 795, 803 (citing MICHAEL HEPWORTH, BLACKMAIL: PUBLICITY AND SECRECY IN EVERYDAY
LIFE 73-77 (1975)).
[70]
An example of participant blackmail is when a woman in an adulterous affair with a married man threatens to
disclose this affair to the man’s wife unless he financially provides for her. See Berman, supra note 69, at 803.
[71]
An example of opportunistic blackmail is when a person sitting in his apartment overhears a loud conversation
between a married man and his mistress, and he then demands money from the married man not to disclose this
information to the man’s wife. See id.
[72]
An example of commercial research blackmail is when a person suspects that an accused tax-evader bribed a
judge, researches the situation to determine if it is true or not, and then demands money from the judge not to
disclose his findings to the press. See id.
[73]
For example, when a gossip magazine paid a woman to seduce Gifford and bring him to a hotel room, the
magazine had wired the room in order to take pictures of the affair, the magazine would have engaged in
entrepreneurial blackmail if it had threatened to publish the pictures unless Gifford paid the magazine a sum of
money. See id.
[74]
Of course, the cybersquatter may have to perform very little research since many trademark owners (through
advertising or goodwill) have made their trademarks part of the common vocabulary. For instance, it is unlikely that
Toeppen had to do much (if any) research to discover that Panavision would want to own the domain name
“www.panavision.com.” See Panavision Int’l, L.P. v. Toeppen, 945 F. Supp. 1296 (C.D. Cal. 1996).
[75]
See William M. Landes & Richard A. Posner, The Private Enforcement of Law, 4 J. LEGAL STUD. 1, 42-43
(1975) (arguing that private enforcement of moral standards by blackmailers is forbidden because it is economically
wasteful); but see Fletcher, supra note 67, at 1618 (arguing that criminalizing blackmail solely because of its
inefficiency is unpersuasive, since many other inefficient activities are legal); see also ROBERT NOZICK,
ANARCHY, STATE, AND UTOPIA 84-86 (1974) (arguing that market-price blackmail may at times be a
productive exchange and as such should not be prohibited in some situations). But see Lindgren, supra note 65, at
707 (arguing that if the blackmailer uses someone else’s leverage, it should be illegal even if the exchange is
productive).
[76]
Usually the blackmailer must spend time or money to collect enough information to pose a threat to the
blackmail victim. Of course, the blackmailer may have been merely a bystander to a private conversation or act that
the blackmail victim would not want disclosed. See supra note 71 and accompanying text (defining “opportunistic
blackmail”). Still, the blackmail itself is merely a transfer of resources that does not improve the allocation of
economic resources. Thus, even “bystander blackmail” is economically inefficient.
[77]
The “market price” for blackmail is established if there is more than one buyer (e.g., the person who wants the
information kept secret and a newspaper that wants to publish the information). Multiple buyers create a market
where a “fair” economic price may be established. See Nozick, supra note 75, at 85-86 (arguing that market-price
blackmail should be allowed for use against public individuals); Jeffrie G. Murphy, Blackmail: A Preliminary
Inquiry, 63 MONIST 156, 164-65 (1980) (arguing that market-price blackmail should be allowed for blackmail of
public individuals but not for blackmail of private individuals).
[78]
Epstein, supra note 66, at 557; see also Landry v. Daley, 280 F. Supp. 938, 961 (N.D. Ill. 1968) rev’d on other
grounds sub nom. Boyle v. Landry, 401 U.S. 77 (1971) (refusing to apply an Illinois blackmail statute where the
defendant threatened to commit the act which he had a legitimate right to commit). But see Gordon, Truth and
Consequences, supra note 70, at 1744 (arguing that even if a person has the right to act in a certain way, he may not
have a right to threaten to do so since threats and acts may cause significantly different harms).
[79]
See Epstein, supra note 68, at 561-62 (“[I]ndividuals are less likely to engage in illegal practices if they know
that wholly apart from criminal sanctions they face the risk of monetary payments as well.”); see also Landes &
Posner, supra note 75, at 42 (arguing that private “moral” enforcement in some situations does not lead to over-
enforcement; consequently, such private enforcement should not be considered blackmail). But see Gordon, supra
note 68, at 1766 (“Since the blackmailer’s end is harm, the act is not redeemable by the possibility that some
component of the means he uses might be lawful or beneficial.”).
[80]
For example, a blackmailer could instruct the blackmail victim on how to maintain the secret for their mutual
benefit in order to best guarantee an income stream for the blackmailer and best guarantee secrecy for the blackmail
victim. See Epstein, supra note 66, at 564.
[81]
“Blackmail should be a criminal offense . . . because it is the hand-maiden to corruption and deceit.” Id. at 566.
[82]
See Lindgren, supra note 65, at 672.
[83]
See generally id. at 680-89. Theories that attempt to distinguish between moral and immoral liberties fail to
show why the threat to take some types of moral liberties, but not others, is considered blackmail. See id. at 680-82.
Theories that would sanction any conduct that promotes a lawful business fail to show why it is blackmail to
threaten to publish true stories about an individual unless the individual purchases advertisements in the newspaper,
even though such a threat serves to promote a lawful business. See id. at 682-83. Theories that attempt to make
concealment wrongful are over-inclusive, since many of the lawful activities of private detectives, security firms,
and lawyers would be prohibited. See id. at 684-87. Theories that would criminalize the sale of private information
are also over-inclusive because sometimes there are legitimate transactions in private information. See id. at 687-89.
[84]
See generally id. at 689-700. Theories that focus on blackmail’s invasion of privacy “cannot explain participant
or opportunistic blackmail.” Id. at 690. Theories that would criminalize blackmail because it provides incentives to
uncover information fail because they do not “explain participant or opportunistic blackmail,” and they would
criminalize many legitimate bargaining situations. See id. at 694-97. Theories that focus on blackmail’s creation of
private enforcement fail because they cannot explain why blackmail should be illegal when it enforces moral
customs while more conventional private enforcement (e.g., firing, never hiring, refusing to negotiate) should be
legal. See id. at 697-99. Theories that would criminalize blackmail because it is an unproductive exchange fail
because it cannot explain why other instances of unproductive exchanges are not illegal. See id. at 699-700.
[85]
Id. at 702. The blackmailer parasitizes an actual or potential dispute between two parties “in which he lacks a
sufficiently direct interest.” Id.
[86]
See Fletcher, supra note 67, at 1618-21.
[87]
See id. at 1620 (explaining that no principled distinction exists explaining blackmail by mode of behavior (i.e.,
threatening to disclose information)).
[88]
See id. (arguing that to focus on the differences between property and non-property results in placing too much
attention on the ends sought, and not on the “criminal” means used).
[89]
See id. at 1621-24 (requiring an unknowable “baseline of normalcy” to characterize any particular situation as a
threat or an offer); cf. Wendy J. Gordon, Of Harms and Benefits: Torts, Restitution, and Intellectual Property, 21 J.
LEGAL STUD. 449, 451 (1992) (arguing that to distinguish between harms and benefits requires determination of
the “proper” baseline).
[90]
See Fletcher, supra note 67, at 1624-25 (stating that under Lindgren’s view, any windfall profits made from
bargaining with another’s chip should be criminal; thus, shrewd business persons would be committing blackmail
for taking advantage of excess consumer surplus).
[91]
See id. at 1626 (“The proper test . . . is whether the transaction with the suspected blackmailer generates a
relationship of dominance and subordination.”).
[92]
For example, since payment of a demand for the settlement of a tort dispute ends the transaction, there is no
blackmail because there is no possibility for repeated demands. See id.
[93]
See id. at 1628. Building the wall is within the homeowner’s domain of freedom, so there is no domination of
the neighbor. See id. at 1628. If the homeowner gains nothing from a higher fence, however, the threat is merely
gratuitous. Accordingly, the threat would be blackmail in jurisdictions that follow the Model Penal Code. See
MODEL PENAL CODE § 223.4 (1980) (prohibiting threats “to inflict any harm that would not benefit the actor”).
But see Lindgren, supra note 65, at 679, 711-12 (arguing that this provision could possibly prohibit many legitimate
bargaining tactics).
[94]
See Gordon, supra note 68, at 1742 (noting that a synthesis of “consequentialist” and “nonconsequentialist”
theories is required to explain the most complex situations).
[95]
See id.
[96]
Id. at 1746 (emphasis in original). This definition is similar to the notion of “commercial research blackmail.”
See supra note 72.
[97]
See Gordon, supra note 68, at 1746 (“‘[C]entral case’ [blackmail] . . . should inspire the most agreement.”).
[98]
See generally id. at 1748-57.
[99]
Id. at 1749.
[100]
The proposition realistically assumes that there are positive transaction costs. See id. at 1749-50. Although
blackmail may not improve resource allocation, nonallocativity is insufficient to criminalize blackmail. See id. But
see Nozick, supra note 75, at 84-86 (arguing that because blackmail is an unproductive exchange, blackmail should
be illegal).
[101]
Nonconformists may be induced to change their behavior if they are forced to make blackmail payments. See
Gordon, supra note 68, at 1753 n.64; Landes & Posner, supra note 75, at 42-43.
[102]
The increased transaction costs from “silence-yielding (nonallocative) transactions” might outweigh any
potential benefits from inducing more acceptable behavior. Gordon, supra note 68, at 1752.
[103]
“[S]ociety already makes harmless and nonconforming behavior too expensive.” Id. at 1753 n.64.
[104]
If reputation is a fundamental resource (i.e., one associated with strong wealth effects) then the final owner
may vary with the law’s original assignment of entitlements. See id. at 1755-56. “Where the highest valued use is
known, usual economic wisdom suggests the resource should be initially assigned to that use.” Id. at 1756 n.73.
[105]
Id. at 1758. Because the blackmailer intends to harm his victim, the blackmailer should be subject to the full
force of the nonconsequential view. See id. at 1762.
[106]
“[I]t is wrong to treat another as a means rather than as an end in himself[.]” Id. at 1760. Some have argued
that because the blackmail victim has done something of which society disapproves, the blackmail victim deserves
little protection. See Murphy, supra note 77, at 162. This argument is weakened by the fact that the blackmailer
actively assists the blackmail victim in deceiving society, and profits by using society’s chip. See Lindgren, supra
note 65, at 702. In addition, Gordon suggests that the blackmail victim’s rights should be defined as “a right to be
free from the harm that the [blackmailer] intended and imposed. The harm intended and imposed . . . is not to [the
victim’s] reputation; it is harm to the victim’s pocketbook or to her liberty.” Gordon, supra note 68, at 1769.
[107]
Harm need not be limited to property rights; thus, harm to someone’s reputation may be actionable. See id. at
1766-67. Also, the harm intended by the blackmailer may be viewed as harm to the blackmail victim’s “property
rights.” See supra note 104 and accompanying text.
[108]
In a blackmail situation both participants desire to keep the information secret (i.e., maintain the status quo)
since they both benefit from its secrecy and would lose at least this benefit (and possibly more) if the information
were disclosed). See Epstein, supra note 66, at 565.
[109]
A seller can threaten not to sell to the purchaser unless a certain price is paid, and can legitimately remove the
offer if the price is not paid. See id. at 557. If the cybersquatter has no right to the domain name in the first place,
however, the threat may not occur in the context of a legitimate commercial transaction.
[110]
“The dominance consists in the knowledge that the victim is now fair game for repeated demands.” Fletcher,
supra note 67, at 1638.
[111]
Of course, a cybersquatter could conceivably register multiple domain names that one trademark holder
desires and could legitimately claim. For example, the cybersquatter might register both
“www.ringlingbrothers.com” and “www.the.greatest.show.on.earth.com”. Ringling Brothers may desire these
domain names because the corporation has trademarks corresponding to both. Thus, even if the registrant received
payment for and released one domain name, the registrant could still make a demand for the other domain name.
Under Fletcher’s definition, however, this would be considered two separate transactions even though the parties
and the subject matter are the same.
[112]
Fletcher, supra note 67, at 1637. Fletcher distinguishes between non-punishable threats and punishable
blackmail by the repeatability of the threats. See id. (“Conversely, all the cases of punishable blackmail generate a
situation that invites repeated threats and exploitation.”).
[113]
See Lindgren, supra note 65, at 702.
[114]
“Good will is a business value that reflects the basic human propensity to continue doing business with a seller
who has offered goods and services that the customer likes and has found adequate to fulfill his needs.” 1
MCCARTHY, supra note 62, § 2:17 at 2-37. As such, both the consumer and trademark owner benefit from the
goodwill associated with a mark.
[115]
Gordon, supra note 68, at 1746.
[116]
Cybersquatters have “no intention of ever using [domain names] for any purpose other than to seek payment
from the legitimate owners of the rights in the marks and names.” Gottfried & Fitzpatrick, supra note 13, at 9.
[117]
See Gordon, supra note 68, at 1752 n.62.
[118]
See supra notes 42-45, 48-53 and accompanying text.
[119]
This exchange could be productive in a number of ways. First, the trademark owner could negotiate to
purchase the domain name. The innocent registrant or concurrent user could then ask the trademark owner what
value she places on the domain name. Through successful negotiation, the party that places a higher value on the
domain name should end up with the domain name. As there is no blackmail involved, this negotiation should not
be hampered. Second, the trademark owner could offer to purchase advertising on the innocent registrant’s or
concurrent user’s site. This would benefit both parties to the transaction—the trademark owner would channel
Internet users who guessed at the domain name while searching for her website, and the registrant would receive
money to help defray the cost of operating a website.
[120]
See, e.g., Intermatic Inc. v. Toeppen, 947 F. Supp. 1227, 1234-36 (N.D. Ill. 1996) (holding that there are
questions of fact relevant to Intermatic’s unfair competition claim).
[121]
For instance, nearly half the states have adopted the Model Penal Code’s definition of extortion. See MODEL
PENAL CODE § 223.4 cmt. 2(k) (1980) “A person is guilty of theft if he purposely obtains property of another by
threatening to: . . . (7) inflict any other harm which would not benefit the actor." Id. § 223.4(7). This definition of
blackmail is central case blackmail.
[122]
See generally Kevin M. Clermont & Theodore Eisenberg, Exorcising the Evil of Forum-Shopping, 80
CORNELL L. REV. 1507, 1507-08 (1995) (discussing that all litigation entails forum-shopping and that this may be
the determinative factor to the outcome of many trials).
[123]
See, e.g., Weber v. Jolly, 977 F. Supp. 327, 333 (D.N.J. 1997). Internet personal jurisdiction decisions
generally take one of the following three positions: (1) a state may exercise personal jurisdiction over a defendant
who “‘enters[s] into contracts with residents of a foreign jurisdiction that involve the knowing and repeated
transmission of computer files over the Internet,’”; (2) a state may exercise personal jurisdiction over a defendant
where there is significant commercial interactivity and exchanges of information between the website and a host
computer in the state; and 3) a state may not exercise personal jurisdiction over a defendant who maintains a
“passive” website in that state (i.e., the site “merely provides information or advertisements to users”). Id. at 333
(quoting Zippo Mfg. Co. v. Zippo Dot Com, Inc. 952 F. Supp. 1119, 1124 (W.D. Pa. 1996)).
[124]
Most commentators agree that criminalizing blackmail is proper. See, e.g., Murphy, supra note 77, at 163
(arguing that blackmail may provide “a reasonable basis for criminalization” because it is immoral and economically
wasteful).
[125]
Deterrence is characterized as prospective justice while retribution is characterized as retrospective justice.
See Fletcher, supra note 67, at 1629. A detailed explanation of the theories underlying criminal punishment is
beyond the scope of this article.
[126]
Generally, criminal punishment of an action will deter others from pursuing that action, especially where the
action can be effectively policed.
[127]
Because cybersquatters can cause consumer confusion and increase consumer search costs, cybersquatting
may be viewed as more of a crime against society than against any individual trademark owner.
[128]
See Lanham Act, 15 U.S.C. § 1125(a)(1) (1994) (limiting trademark infringement suits to civil remedies).
[129]
See, e.g., Intermatic Inc. v. Toeppen, 947 F. Supp. 1227, 1233 (N.D. Ill. 1996) (“Toeppen is what is
commonly referred to as a cyber-squatter.”).
[130]
See, e.g., Henry H. Perritt, Jr., Tort Liability, the First Amendment, and Equal Access to Electronic Networks,
5 HARV. J.L. & TECH. 65, 119-21 (1992) (“[B]oth senders and receivers of digital electronic communication enjoy
First Amendment protections, although not all regulation of persons handling information violates the First
Amendment.”).
[131]
The Supreme Court has addressed some First Amendment issues concerning obscenity and the Internet. See
generally Reno v. ACLU, 521 U.S. 844, 864-85 (1997) (challenging provisions of the Communications Decency
Act are facially overbroad and thus violate the First Amendment).