CINXE.COM

David Barnett on CircleID

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <head> <title>David Barnett on CircleID</title> <meta name="description" content="Profile page of David Barnett on CircleID" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <link rel="alternate" type="application/rss+xml" title="Feed for David Barnett" href="https://circleid.com/rss/members/8564" /> <link rel="shortcut icon" type="image/ico" href="/favicon.ico" /> <link rel="stylesheet" type="text/css" media="all" href="/css/base.css" /> <link rel="stylesheet" type="text/css" media="all" href="/css/posts.css" /> <link rel="stylesheet" type="text/css" media="all" href="/css/members.css" /> <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js"></script> <link href="https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&family=Roboto+Condensed:wght@400;700&family=Roboto+Mono:wght@300;400;700&family=Roboto:ital,wght@0,400;0,500;0,700;0,900;1,400;1,700&display=swap" rel="stylesheet"> <script type="text/javascript" src="/js/jq.clickmenu/jq.clickmenu.min.js"></script> <script type="text/javascript" src="/js/jq.scrollable/scrollable.min.js"></script> <script async src="https://cse.google.com/cse.js?cx=003374819184044847448:yb5rk7pq36s"></script> <!-- font awesome --> <script defer src="/fontawesome-free-6.6.0-web/js/brands.js"></script> <script defer src="/fontawesome-free-6.6.0-web/js/solid.js"></script> <script defer src="/fontawesome-free-6.6.0-web/js/fontawesome.js"></script> <div id="fb-root"></div> <script>(function (d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.5"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));</script> <script type="text/javascript"> $(document).ready(function() { $('.showHideBox').hide(); $('a#clickToggle').click(function() { $('.showHideBox').toggle(); $(this).toggleClass("toggle-show"); $(this).toggleClass("toggle-hide"); return false; }); }); </script> <!-- GA code --> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-85374710-1', 'auto'); ga('send', 'pageview'); </script> </head> <body> <div id="header"> <a href="/"><img class="headerLogo" src="/images/circleid.svg" border="0"/></a> <div class="headerLinks"> <span> Welcome:&nbsp;&nbsp; <a href="https://circleid.com/account/login">Login</a> &nbsp;|&nbsp; <a href="https://circleid.com/account/signup">Sign Up</a> &nbsp;|&nbsp; <a href="https://circleid.com/about">About CircleID</a> </span> <span> Follow:&nbsp;&nbsp; <a href="https://x.com/circleid" class="socialIcon"><i class="fa-brands fa-square-x-twitter"></i></a> &nbsp;|&nbsp; <a href="https://www.facebook.com/circleid/" class="socialIcon"><i class="fa-brands fa-square-facebook"></i></a> &nbsp;|&nbsp; <a href="https://www.linkedin.com/company/circleid" class="socialIcon"><i class="fa-brands fa-linkedin"></i></a> &nbsp;|&nbsp; <a href="http://feeds.circleid.com/cid_master/" class="socialIcon"><i class="fas fa-rss-square"></i></a> </span> </div> <div class="clear"></div> </div> <noscript> <div id="headerAlert">&nbsp;WARNING: JavaScript is either disabled or not supported by your browser. You may encounter problems using various features on CircleID.&nbsp;</div> </noscript> <div id="headerNav"> <div id="headerNavContent"> <div id="headerNavMenu"> <ul> <li ><span class="head_menu"><a href="/">Home</a></span></li> <li> <span class="head_menu"><a href="https://circleid.com/topics">Topics</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu" style="width:480px;"> <table border="0" cellpadding="0" cellspacing="0"> <tr> <td> <a href="https://circleid.com/topics/access_providers">Access Providers</a> <a href="https://circleid.com/topics/artificial-intelligence">Artificial Intelligence</a> <a href="https://circleid.com/topics/blockchain">Blockchain</a> <a href="https://circleid.com/topics/brand_protection">Brand Protection</a> <a href="https://circleid.com/topics/broadband">Broadband</a> <a href="https://circleid.com/topics/censorship">Censorship</a> <a href="https://circleid.com/topics/cloud_computing">Cloud Computing</a> <a href="https://circleid.com/topics/cyberattack">Cyberattack</a> <a href="https://circleid.com/topics/cybercrime">Cybercrime</a> <a href="https://circleid.com/topics/cybersecurity">Cybersecurity</a> <a href="https://circleid.com/topics/data_center">Data Center</a> <a href="https://circleid.com/topics/ddos_attack">DDoS Attack</a> <a href="https://circleid.com/topics/dns">DNS</a> <a href="https://circleid.com/topics/dns-security">DNS Security</a> <a href="https://circleid.com/topics/domain-management">Domain Management</a> <a href="https://circleid.com/topics/domain_names">Domain Names</a> <a href="https://circleid.com/topics/email">Email</a> <a href="https://circleid.com/topics/enum">Enum</a> <a href="https://circleid.com/topics/gaming">Gaming</a> <a href="https://circleid.com/topics/icann">ICANN</a> <a href="https://circleid.com/topics/internet_governance">Internet Governance</a> <a href="https://circleid.com/topics/internet_of_things">Internet of Things</a> <a href="https://circleid.com/topics/internet_protocol">Internet Protocol</a> <a href="https://circleid.com/topics/ipv4-markets">IPv4 Markets</a> </td> <td style="border-left:1px solid #d5d5d5;border-right:1px solid #d5d5d5;padding:0 4px;"> <a href="https://circleid.com/topics/iptv">IPTV</a> <a href="https://circleid.com/topics/ipv6-transition">IPv6 Transition</a> <a href="https://circleid.com/topics/law">Law</a> <a href="https://circleid.com/topics/malware">Malware</a> <a href="https://circleid.com/topics/mobile_internet">Mobile Internet</a> <a href="https://circleid.com/topics/multilinguism">Multilinguism</a> <a href="https://circleid.com/topics/net_neutrality">Net Neutrality</a> <a href="https://circleid.com/topics/networks">Networks</a> <a href="https://circleid.com/topics/new_tlds">New TLDs</a> <a href="https://circleid.com/topics/p2p">P2P</a> <a href="https://circleid.com/topics/policy_regulation">Policy &amp; Regulation</a> <a href="https://circleid.com/topics/privacy">Privacy</a> <a href="https://circleid.com/topics/regional_registries">Regional Registries</a> <a href="https://circleid.com/topics/registry_services">Registry Services</a> <a href="https://circleid.com/topics/satellite-internet">Satellite Internet</a> <a href="https://circleid.com/topics/spam">Spam</a> <a href="https://circleid.com/topics/telecom">Telecom</a> <a href="https://circleid.com/topics/udrp">UDRP</a> <a href="https://circleid.com/topics/voip">VoIP</a> <a href="https://circleid.com/topics/vpn">VPN</a> <a href="https://circleid.com/topics/web">Web</a> <a href="https://circleid.com/topics/white_space">White Space</a> <a href="https://circleid.com/topics/whois">Whois</a> <a href="https://circleid.com/topics/wireless">Wireless</a> </td> <td style="padding:0 0 0 4px;"> <div class="itemTitle">Display Options:</div> <a href="https://circleid.com/topics">List by Popularity</a> <a href="https://circleid.com/topics/chart">Chart by Popularity</a> </td> </tr> </table> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/blogs">Blogs</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/blogs">Latest</a> <a href="https://circleid.com/blogs/recently_discussed">Recently Discussed</a> <a href="https://circleid.com/blogs/most_discussed">Most Discussed</a> <a href="https://circleid.com/blogs/most_viewed">Most Viewed</a> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/news">News</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/news">Latest</a> <a href="https://circleid.com/news/recently_discussed">Recently Discussed</a> <a href="https://circleid.com/news/most_discussed">Most Discussed</a> <a href="https://circleid.com/news/most_viewed">Most Viewed</a> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/community">Community</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/community">Recently Featured</a> <a href="https://circleid.com/community/most_featured">Most Featured</a> <a href="https://circleid.com/community/most_active">Most Active</a> <a href="https://circleid.com/community/most_read">Most Read</a> <a href="https://circleid.com/community/recent_members">Recent Members</a> <a href="https://circleid.com/community/top_100" class="itemLine">Top 100 Leaderboard</a> <a href="https://circleid.com/community/alphabetical" class="itemLine">Alphabetical View</a> <a href="https://circleid.com/community/random">Random View</a> <a href="https://circleid.com/comments" class="itemLine">Recent Comments</a> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/industry">Industry</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/industry">Latest Posts</a> <a href="https://circleid.com/industry/most_viewed">Most Viewed</a> <a href="https://circleid.com/industry/leaderboard">Leaderboard</a> <a href="https://circleid.com/industry/members" class="itemLine"><strong>CircleID Members:</strong></a> <a href="/members/8495">CSC</a> <a href="/members/9196">Brand Registry Group</a> <a href="/members/7855">i2Coalition</a> <a href="/members/1582">Godaddy Registry</a> <a href="/members/8076">Internet Commerce Association</a> <a href="/members/8622">IPv4.Global</a> <a href="/members/6851">Radix Registry</a> <a href="/members/8414">Threat Intelligence Platform (TIP)</a> <a href="/members/5593">Verisign</a> <a href="/members/8352">WhoisXML API</a> </div> </li> </ul> </div> <style> /* Search Box */ form.gsc-search-box { font-size: 14px; margin: 0 0 0 0; width: 100%; padding:0; } table.gsc-search-box td.gsc-input { padding:0 3px 5px 0; } /* Search input */ .gsc-input { font-size: 15px; } /* Search Button */ .gsc-search-button-v2 { font-size: 0; padding: 7px 12px; width: auto; vertical-align: middle; margin: -5px 0 0 0; } </style> <!-- search --> <div style="width:300px;float:right;margin: 0;padding: 0;"> <div class="gcse-searchbox-only"></div> </div> <!-- search --> <div class="clear"></div> </div> </div> <div id="headerSub"> <!-- MEMBER HEADER ///////////////////////////////////////////////////// --> <div id="headerProfile"> <!-- Photo or Logo --> <div class='memPhoto'> <a href="https://circleid.com/members/8564"><img src="/images/member_photos/photo_8564.jpg" width="80" border="0" alt="David Barnett" /></a> </div> <!-- Info --> <div class="memInfo"> <h3>David Barnett</h3> <p> <strong>Brand Protection Strategist at Stobbs</strong><br /> Joined on April 9, 2020<br/> Total Post Views: 405,587 </p> <table class="btn-container"><tr><td class="btl"></td><td class="btr"></td></tr><tr><td class="bbl"></td><td class="bbr"><a href="#" class="toggle-show" id="clickToggle">About</a></td></tr></table> </div> <!-- Buttons --> <div class="buttons"> <!-- Message --> <table class="btn-container"> <tr><td class="btl"></td><td class="btr"></td></tr> <tr><td class="bbl"></td><td class="bbr"><a href="https://circleid.com/account/email_console/8564/" class="email">Send Message</a></td></tr> </table> <!-- RSS --> <table class="btn-container"> <tr><td class="btl"></td><td class="btr"></td></tr> <tr><td class="bbl"></td><td class="bbr"><a href="https://circleid.com/rss/members/8564" class="rss">RSS</a></td></tr> </table> </div> <div class="clear"></div> </div> <!-- MEMBER SUB HEADER ///////////////////////////////////////////////////// --> <div id="headerSubProfile" class="showHideBox"> <div id="bio"> <p>David Barnett has worked in the online brand-protection industry as an analyst and consultant since 2004, serving a range of brand-protection customers in a variety of industries, with particular interests in analysis methodologies, threat-level determination for brand infringements, domain-name monitoring, and ROI calculation for brand protection programmes. He is also an experienced thought leader, and author of &#8216;Brand Protection in the Online World&#8217; (published December 2016) and &#8216;Patterns in Brand Monitoring&#8217; (to be published 2024/5).</p> </div> <div id="links" class="pipedLinks"> <ul> <li><a href="https://www.iamstobbs.com/" title="New window will open - https://www.iamstobbs.com/" target="_blank">Company</a></li> <li><a href="http://twitter.com/dnb20" title="New window will open - http://twitter.com/dnb20" target="_blank">Twitter</a></li> <li><a href="https://www.linkedin.com/in/dnbarnett2001/" title="New window will open - https://www.linkedin.com/in/dnbarnett2001/" target="_blank">LinkedIn</a></li> </ul> </div> <p id="cc"> Except where otherwise noted, all postings by David Barnett on CircleID are licensed under a <a rel="license" href="http://creativecommons.org/licenses/ /2.5/" class="blue">Creative Commons License</a>. </p> </div> <!-- MEMBER SUB NAV ///////////////////////////////////////////////////// --> <div id="headerSubNav"> <ul> <li id="current"><a href="https://circleid.com/members/8564">Featured Blogs (41)</a></li> <li ><a href="https://circleid.com/members/8564/comments/">Comments (4)</a></li> </ul> <div class="clear"></div> </div> </div> <!-- MEMBER POSTS ///////////////////////////////////////////////////// --> <div class="container2c"> <div class="colWrapper"> <div class="colA"> <div class="colPad"> <h2>Featured Blogs</h2> <div class="postList" style="padding-bottom:30px;"> <h3 style="padding-top:0;margin-top:0;border:none;"><a href="https://circleid.com/posts/braive-new-world-part-1-brand-protection-clustering-as-a-candidate-task-for-the-application-of-ai-capabilities">Br&#8217;AI&#8217;ve New World - Part 1: Brand Protection &#8216;Clustering&#8217; as a Candidate Task for the Application of AI Capabilities</a></h3> <div class="byLine">Related Topics: <a href="/topics/artificial-intelligence" class="red">Artificial Intelligence</a>,&nbsp; <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> As counterfeit networks grow more elusive, AI-driven clustering could revolutionize brand protection. By linking disparate findings, identifying serial infringers, and enabling bulk enforcement, AI offers a smarter approach to monitoring and takedown efforts. Yet, challenges remain - from data reliability to analyzing complex content. Companies that master AI-driven clustering may gain a significant advantage in the fight against brand abuse.&nbsp;<a href="https://circleid.com/posts/braive-new-world-part-1-brand-protection-clustering-as-a-candidate-task-for-the-application-of-ai-capabilities" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Mar 05, 2025</li> <li>Comments: 0</li> <li>Views: 5,719</li> </ul> </div> <h3><a href="https://circleid.com/posts/unregistered-gems-part-6-phonemizing-strings-to-find-brandable-domains">Unregistered Gems Part 6: Phonemizing Strings to Find Brandable Domains</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> The UnregisteredGems.com series of articles explores a range of techniques to filter and search through the universe of unregistered domain names, in order to find examples which may be compelling candidates for entities looking to select a new brand name (and its associated domain). The previous instalment of the series looked at the categorisation of candidate names according to the phonetic characteristics of its constituent consonants, using a simple one-to-one mapping between each consonant and a corresponding phonetic group.&nbsp;<a href="https://circleid.com/posts/unregistered-gems-part-6-phonemizing-strings-to-find-brandable-domains" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Jan 14, 2025</li> <li>Comments: 0</li> <li>Views: 6,760</li> </ul> </div> <h3><a href="https://circleid.com/posts/unregistered-gems-part-5-using-groupings-to-find-brandable-domains">Unregistered Gems Part 5: Using Groupings to Find Brandable Domains</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> The initial instalment of my recent series of articles on domain name discovery1 considered the use of phonotactic analysis - that is, the measure of the similarity of a string to the 'corpus' of other words in a language - to identify available unregistered candidate domains which may be of interest for potential brandability.&nbsp;<a href="https://circleid.com/posts/unregistered-gems-part-5-using-groupings-to-find-brandable-domains" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Jan 08, 2025</li> <li>Comments: 0</li> <li>Views: 7,419</li> </ul> </div> <h3><a href="https://circleid.com/posts/a-review-of-the-2024-threat-landscape-and-implications-for-domain-security">A Review of the 2024 Threat Landscape and Implications for Domain Security</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> The cybersecurity landscape in 2024 has been characterised by unprecedented complexity and rapidly evolving threats, presenting significant challenges for organisations across all sectors. As the digital attack surface expands and threat actors employ increasingly sophisticated techniques, domain security has emerged as a critical component of a robust cybersecurity strategy.&nbsp;<a href="https://circleid.com/posts/a-review-of-the-2024-threat-landscape-and-implications-for-domain-security" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Dec 10, 2024</li> <li>Comments: 0</li> <li>Views: 10,862</li> </ul> </div> <h3><a href="https://circleid.com/posts/availability-analysis-of-brandable-variant-string-domain-names">Availability Analysis of Brandable Variant-String Domain Names</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> For any entity looking to launch a new company or other initiative, a primary requirement is often the selection of an appropriate brand name and the acquisition of a relevant associated domain name. In light of the increasing shortage of short, unregistered memorable names on popular domain name extensions (TLDs), many organisations are choosing to adopt novel or invented brand names and/or consider the use of alternative TLDs.&nbsp;<a href="https://circleid.com/posts/availability-analysis-of-brandable-variant-string-domain-names" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Dec 08, 2024</li> <li>Comments: 0</li> <li>Views: 3,651</li> </ul> </div> <h3><a href="https://circleid.com/posts/further-ideas-in-mark-similarity-measurement">Further Ideas in Mark Similarity Measurement</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,</div> <p> In the final three articles in my series looking at algorithms for measuring the similarity of marks, I extend the ideas to provide a more sophisticated and adaptable framework. Article 4 introduces a similarity score based on color distance in RGB space, offering a quantitative approach to trademark similarity. Article 5 refines word mark similarity by using the International Phonetic Alphabet to improve phonetic analysis. The final article presents a method for sorting colors by dominant shade, aiding in trademark review and potential guidelines for color mark protection.&nbsp;<a href="https://circleid.com/posts/further-ideas-in-mark-similarity-measurement" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Oct 17, 2024</li> <li>Comments: 0</li> <li>Views: 5,468</li> </ul> </div> <h3><a href="https://circleid.com/posts/further-developing-a-word-mark-similarity-measurement-framework">Further Developing a Word Mark Similarity Measurement Framework</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,</div> <p> Expanding on a framework for quantifying word mark similarity by examining algorithms and proposing enhancements. This article assesses consistency with UK trademark case decisions and a search tool, explores subsequence analysis for similarity, and suggests using IPA phonetics to measure aural likeness. The objective framework could improve consistency in trademark assessments, despite the inherent subjectivity of legal tests.&nbsp;<a href="https://circleid.com/posts/further-developing-a-word-mark-similarity-measurement-framework" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Oct 09, 2024</li> <li>Comments: 0</li> <li>Views: 5,711</li> </ul> </div> <h3><a href="https://circleid.com/posts/further-developing-a-colour-mark-similarity-measurement-framework-building-a-database">Further Developing a Colour Mark Similarity Measurement Framework: Building a Database</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,</div> <p> In my recent article on mark similarity measurement, I discussed a possible framework for protecting colour marks. The framework involves the specification of each colour according to its RGB (red-green-blue) specification (in which each component is expressed as an integer value between 0 and 255), with the suggestion that the protection afforded by a colour trademark could incorporate not only this exact colour, but also all similar colours around it up to a certain 'distance'...&nbsp;<a href="https://circleid.com/posts/further-developing-a-colour-mark-similarity-measurement-framework-building-a-database" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Oct 02, 2024</li> <li>Comments: 0</li> <li>Views: 5,586</li> </ul> </div> <h3><a href="https://circleid.com/posts/towards-a-quantitative-approach-for-objectively-measuring-the-similarity-of-marks">Towards a Quantitative Approach for Objectively Measuring the Similarity of Marks</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,</div> <p> Central to many intellectual property disputes is an assessment of the degree of similarity of two contested marks. A determination of similarity is fundamentally a subjective decision involving a range of relevant tests, which include consideration of the perception of the relevant consumer and recognition of the existence of degrees of similarity within a spectrum (from high to low).&nbsp;<a href="https://circleid.com/posts/towards-a-quantitative-approach-for-objectively-measuring-the-similarity-of-marks" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Sep 30, 2024</li> <li>Comments: 0</li> <li>Views: 5,434</li> </ul> </div> <h3><a href="https://circleid.com/posts/unregistered-gems-part-4-other-brandable-domain-name-styles">Unregistered Gems Part 4: Other Brandable Domain-Name Styles</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> In the fourth in this series of articles exploring how the application of appropriate tools, algorithms and analysis techniques can identify the existence of attractive, unregistered brandable domain names, I consider the prevalence of a few additional styles of name.&nbsp;<a href="https://circleid.com/posts/unregistered-gems-part-4-other-brandable-domain-name-styles" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Sep 23, 2024</li> <li>Comments: 0</li> <li>Views: 5,163</li> </ul> </div> <h3><a href="https://circleid.com/posts/20240916-unregistered-gems-part-3-keeping-your-ize-on-the-prize">Unregistered Gems Part 3: Keeping Your -ize on the Prize</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> The previous two articles in this series have outlined techniques for 'mining' brandable domain names -- that is, domain names of potential interest to entities looking to launch a new brand name and associated website -- from the enormous dataset of unregistered names (determined via zone file analysis). The key element of the identification process is the implementation of filtering techniques to identify...&nbsp;<a href="https://circleid.com/posts/20240916-unregistered-gems-part-3-keeping-your-ize-on-the-prize" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Sep 16, 2024</li> <li>Comments: 0</li> <li>Views: 7,323</li> </ul> </div> <h3><a href="https://circleid.com/posts/20240911-further-explorations-in-brandable-domain-names-sensational-spellingz">Further Explorations in Brandable Domain Names: Sensational Spellingz</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> My previous article on brandable domain names1 -- that is, available (unregistered) domain names which may be appealing to any entity looking to identify a potential name for a new brand launch -- focused on the use of phonotactic (i.e. 'readability') analysis techniques to identify candidate names.&nbsp;<a href="https://circleid.com/posts/20240911-further-explorations-in-brandable-domain-names-sensational-spellingz" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Sep 11, 2024</li> <li>Comments: 0</li> <li>Views: 5,545</li> </ul> </div> <h3><a href="https://circleid.com/posts/20240903-unregistered-gems-identifying-brandable-domain-names-using-phonotactic-analysis">Unregistered Gems: Identifying Brandable Domain Names Using Phonotactic Analysis</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> Conventional wisdom within the domain-sales industry states that the stock of unregistered domain names is 'running out,' with limited or no availability of short, desirable domain names across popular extensions (TLDs). This presents problems for would-be brand owners looking for a brand name (and accompanying suitable website presence) to utilize for newly-launched companies...&nbsp;<a href="https://circleid.com/posts/20240903-unregistered-gems-identifying-brandable-domain-names-using-phonotactic-analysis" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Sep 03, 2024</li> <li>Comments: 0</li> <li>Views: 5,163</li> </ul> </div> <h3><a href="https://circleid.com/posts/20240723-an-unnatural-dot-bond-a-study-of-a-megacluster-of-malware-domains">An Unnatural .Bond: A Study of a &#8216;Megacluster&#8217; of Malware Domains</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/malware" class="red">Malware</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> A recent news story, following research from security provider Infoblox, highlighted the case of the 'Revolver Rabbit' cybercriminal gang, who have registered more than half-a-million domains to be used for the distribution of information-stealing malware. The gang make use of automated algorithms to register their domains, but unlike the long, pseudo-random ('high entropy') domain names frequently associated with such tools, the Revolver Rabbit domains instead tend to consist of hyphen-separated dictionary words (presumably so as to obfuscate their true purpose), with a string of digits at the end.&nbsp;<a href="https://circleid.com/posts/20240723-an-unnatural-dot-bond-a-study-of-a-megacluster-of-malware-domains" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Jul 23, 2024</li> <li>Comments: 0</li> <li>Views: 12,128</li> </ul> </div> <h3><a href="https://circleid.com/posts/20240528-exploring-the-domain-of-subdomain-discovery">Exploring the Domain of Subdomain Discovery</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> Domain name monitoring - that is, the detection of domains with names containing a brand-term (or other string) of interest - is a very well-established element of brand protection services. Branded domain names are of key importance to brand owners (as the basis for business-critical infrastructure (i.e. 'core' domain names), and as part of a 'tactical' portfolio of strategic and defensive registrations), but also to infringers, who can utilise domains as a means of impersonation, passing off, claimed affiliation, or traffic direction and monetisation.&nbsp;<a href="https://circleid.com/posts/20240528-exploring-the-domain-of-subdomain-discovery" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>May 28, 2024</li> <li>Comments: 0</li> <li>Views: 6,133</li> </ul> </div> <h3><a href="https://circleid.com/posts/20240507-a-new-analysis-of-the-newest-new-gtlds">A New Analysis of the Newest New-GTLDs</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> As the new-gTLD programme - the ICANN initiative to add a large number of new domain extensions (top-level domains, or TLDs) to the Internet - continues to see ongoing launches of new TLDs, we conduct a new retrospective of the activity landscape of the most recent extensions to have been launched. This new study focuses on all new-gTLDs to have entered their Sunrise or General Available periods since the start of 2023, following a previous overview by Stobbs of the full new-gTLD landscape.&nbsp;<a href="https://circleid.com/posts/20240507-a-new-analysis-of-the-newest-new-gtlds" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>May 07, 2024</li> <li>Comments: 0</li> <li>Views: 13,792</li> </ul> </div> <h3><a href="https://circleid.com/posts/20230703-an-overview-of-the-concept-and-use-of-domain-name-entropy">An Overview of the Concept and Use of Domain-Name Entropy</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> In this article, I present an overview of a series of 'proof-of-concept' studies looking at the application of domain-name entropy as a means of clustering together related domain registrations, and serving as an input into potential metrics to determine the likely level of threat which may be posed by a domain.&nbsp;<a href="https://circleid.com/posts/20230703-an-overview-of-the-concept-and-use-of-domain-name-entropy" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Jul 03, 2023</li> <li>Comments: 0</li> <li>Views: 23,049</li> </ul> </div> <h3><a href="https://circleid.com/posts/20230525-the-millennium-problems-in-brand-protection">The &#8216;Millennium Problems&#8217; in Brand Protection</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/web" class="red">Web</a>,</div> <p> As the brand protection industry approaches a quarter of a century in age, following the founding of pioneers Envisional and MarkMonitor in 1999, I present an overview of some of the main outstanding issues which are frequently unaddressed or are generally only partially solved by brand protection service providers. I term these the 'Millennium Problems' in reference to the set of unsolved mathematical problems published in 2000 by the Clay Mathematics Institute, and for which significant prizes were offered for solutions.&nbsp;<a href="https://circleid.com/posts/20230525-the-millennium-problems-in-brand-protection" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>May 25, 2023</li> <li>Comments: 0</li> <li>Views: 18,501</li> </ul> </div> <h3><a href="https://circleid.com/posts/20230215-patterns-and-trends-in-domain-tasting-of-the-top-10-global-brands">Patterns and Trends in Domain Tasting of the Top 10 Global Brands</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> Domain tasting is a long-established practice involving the short-lived existence of a domain, which is allowed to lapse a few days after its initial registration. The practice arose in response to an Internet Corporation for Assigned Names and Numbers (ICANN) policy allowing a domain to be cancelled -- with all fees refunded -- within a five-day grace period, intended to address the issue of accidental registrations1. However, the practice is open to abuse by infringers.&nbsp;<a href="https://circleid.com/posts/20230215-patterns-and-trends-in-domain-tasting-of-the-top-10-global-brands" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Feb 15, 2023</li> <li>Comments: 0</li> <li>Views: 7,779</li> </ul> </div> <h3><a href="https://circleid.com/posts/20230117-the-highest-threat-tlds-part-2">The Highest Threat TLDs - Part 2</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual top-level domains (TLDs) or domain extensions, using data from CSC's Fraud Protection services, powered by our DomainSecSM platform. In this second article, we analyze multiple datasets to determine the highest-threat TLDs, based on the frequency with which the domains are used egregiously for a range of cybercrimes.&nbsp;<a href="https://circleid.com/posts/20230117-the-highest-threat-tlds-part-2" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Jan 17, 2023</li> <li>Comments: 0</li> <li>Views: 19,952</li> </ul> </div> <h3><a href="https://circleid.com/posts/20230112-the-highest-threat-tlds-part-1">The Highest Threat TLDs - Part 1</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> A domain name consists of two main elements: the second-level domain name to the left of the dot - often consisting of a brand name or relevant keywords - and the domain extension or top-level domain (TLD) to the right of the dot. Domain names form the key elements of the readable web addresses allowing users to access pages on the internet and also allowing the construction of email addresses.&nbsp;<a href="https://circleid.com/posts/20230112-the-highest-threat-tlds-part-1" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Jan 12, 2023</li> <li>Comments: 9</li> <li>Views: 17,594</li> </ul> </div> <h3><a href="https://circleid.com/posts/20221010-the-continued-rise-of-phishing-and-the-case-of-the-customizable-site">The Continued Rise of Phishing and the Case of the Customizable Site</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> We’ve noted in previous CSC studies that phishing continues to be an extremely popular threat vector with bad actors and shows no signs of subsiding in part, because of the COVID–19 pandemic and the rise in popularity of remote working. Indeed, the most recent figures from the Anti-Phishing Working Group (APWG) show that the numbers of phishing attacks are higher than ever before, with the quarterly total of identified unique phishing attacks exceeding 1 million for the first time in Q1 2022, and over 600 distinct brands attacked each month.&nbsp;<a href="https://circleid.com/posts/20221010-the-continued-rise-of-phishing-and-the-case-of-the-customizable-site" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Oct 10, 2022</li> <li>Comments: 0</li> <li>Views: 11,578</li> </ul> </div> <h3><a href="https://circleid.com/posts/20221005-four-steps-to-an-effective-brand-protection-program">Four Steps to an Effective Brand Protection Program</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,</div> <p> Internet use has become ever more pervasive. With around five billion global users, it generates an economy of around 15% of global gross domestic product (GDP); that's around $15 trillion and is a figure that's growing 2.5 times faster than GDP itself. This makes the internet an attractive channel for infringers. Phishing and other fraud tactics, selling counterfeit goods online, and digital piracy are primary areas of concern.&nbsp;<a href="https://circleid.com/posts/20221005-four-steps-to-an-effective-brand-protection-program" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Oct 05, 2022</li> <li>Comments: 0</li> <li>Views: 9,495</li> </ul> </div> <h3><a href="https://circleid.com/posts/20220913-registration-patterns-of-deceptive-domains">Registration Patterns of Deceptive Domains</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> A key requirement for a bad actor wanting to launch a brand attack is the registration of a carefully chosen domain name. The most convincing infringements frequently use a domain name that's deceptively similar to that of the official site of the target brand. This allows a variety of attacks to be executed, including phishing attacks...&nbsp;<a href="https://circleid.com/posts/20220913-registration-patterns-of-deceptive-domains" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Sep 13, 2022</li> <li>Comments: 0</li> <li>Views: 12,091</li> </ul> </div> <h3><a href="https://circleid.com/posts/20220531-do-you-see-what-i-see-geotargeting-in-brand-infringements">Do You See What I See? Geotargeting in Brand Infringements</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/web" class="red">Web</a>,</div> <p> Geotargeting is a well-established online technique for delivering tailored web content based on a user's geographic location. From an internet technology point of view, this is usually based on the user's IP address, which is converted to a physical location through a standard look-up process performed by network infrastructure. Geotargeting is commonly used by websites for several legitimate reasons, including providing users with relevant advertising and other content...&nbsp;<a href="https://circleid.com/posts/20220531-do-you-see-what-i-see-geotargeting-in-brand-infringements" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>May 31, 2022</li> <li>Comments: 0</li> <li>Views: 7,020</li> </ul> </div> <h3><a href="https://circleid.com/posts/20220526-branded-domains-are-the-focal-point-of-many-phishing-attacks">Branded Domains Are the Focal Point of Many Phishing Attacks</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cyberattack" class="red">Cyberattack</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> As a long-established online attack strategy, phishing remains a popular tool for fraudsters because of its effectiveness. The Anti-Phishing Working Group reported more than 300,000 distinct phishing attacks in December 2021 -- more than three times the number reported in early 2020, and the highest monthly total ever identified.&nbsp;<a href="https://circleid.com/posts/20220526-branded-domains-are-the-focal-point-of-many-phishing-attacks" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>May 26, 2022</li> <li>Comments: 0</li> <li>Views: 13,509</li> </ul> </div> <h3><a href="https://circleid.com/posts/20220510-breaking-the-rules-on-counterfeit-sales-the-use-of-hidden-links">Breaking the Rules on Counterfeit Sales: The Use of Hidden Links</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,</div> <p> Counterfeiting is big business. A 2021 study by the Organisation for Economic Cooperation and Development (OECD) estimated that the international trade in counterfeit and pirated products was worth up to $464 billion in 2019, or around 2.5% of all world trade. A significant proportion of this trade occurs via digital channels, where global annual expenditure on eCommerce is more than $4 trillion.&nbsp;<a href="https://circleid.com/posts/20220510-breaking-the-rules-on-counterfeit-sales-the-use-of-hidden-links" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>May 10, 2022</li> <li>Comments: 0</li> <li>Views: 27,195</li> </ul> </div> <h3><a href="https://circleid.com/posts/20220504-the-world-of-the-subdomain">The World of the Subdomain</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> A web domain name is the foundational piece of internet property allowing its owner (registrant) to construct and host an associated website. On a domain, the owner is also able to construct whatever subdomains they wish -- a process that is technically achieved via the configuration of records on the authoritative domain name system (DNS) server.&nbsp;<a href="https://circleid.com/posts/20220504-the-world-of-the-subdomain" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>May 04, 2022</li> <li>Comments: 2</li> <li>Views: 8,614</li> </ul> </div> <h3><a href="https://circleid.com/posts/20220218-domain-registrations-associated-with-new-tld-launches">Domain Registrations Associated with New TLD Launches</a></h3> <div class="byLine">Related Topics: <a href="/topics/artificial-intelligence" class="red">Artificial Intelligence</a>,&nbsp; <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> One of the central goals of a brand protection program is detecting infringing third-party activity that falls outside the firewall - that is, external to a brand owner's portfolio of official core and tactical domains. Brand threats occur across a range of internet channels, but domain name abuse is one of the most significant areas for concern, both in terms of the visibility and potential for confusion of branded domain names by potential customers, and the enforcement options available. For this reason, domain monitoring is considered a core component of a brand protection service.&nbsp;<a href="https://circleid.com/posts/20220218-domain-registrations-associated-with-new-tld-launches" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Feb 18, 2022</li> <li>Comments: 0</li> <li>Views: 8,438</li> </ul> </div> <h3><a href="https://circleid.com/posts/20210816-euro-2020-part-three-domains-revisited-and-other-channels">Euro 2020 Part Three: Domains (Revisited) and Other Channels</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> In this final article in the series of studies looking at Euro 2020-related infringements, we revisit domain name infringements and consider activity across other online channels, with a focus on social media and mobile apps. Following the original study, which looked at domains registered before May 2020 with names containing "euro2020" or "euro2021," we analyzed daily activity levels in the period immediately preceding and during the competition.&nbsp;<a href="https://circleid.com/posts/20210816-euro-2020-part-three-domains-revisited-and-other-channels" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Aug 16, 2021</li> <li>Comments: 0</li> <li>Views: 4,859</li> </ul> </div> <h3><a href="https://circleid.com/posts/20210708-euro-2020-part-two-ecommerce-marketplace-activity">Euro 2020 Part Two: eCommerce Marketplace Activity</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> Following our previous article on the Euro 2020 football tournament that looked retrospectively at domain name registrations relating to the competition, this article considers activity on eCommerce marketplaces. For this study, our Discovery Engine technology was used to conduct a regular series of scans across key international online marketplaces. We monitored for listings (offers of sale) relating to Euro 2020 clothing and merchandise.&nbsp;<a href="https://circleid.com/posts/20210708-euro-2020-part-two-ecommerce-marketplace-activity" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Jul 08, 2021</li> <li>Comments: 0</li> <li>Views: 13,079</li> </ul> </div> <h3><a href="https://circleid.com/posts/2021062-euro-2020-link-between-real-world-events-and-online-infringements">Euro 2020: An Illustration of the Link Between Real-World Events and Online Infringements</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> In the run-up to the postponed Euro 2020 football championships, we've analyzed historical registration trends in domains containing the terms "euro2020" or "euro2021." A number of previous studies -- looking at events as diverse as the COVID pandemic, the annual holiday season shopping events, and the Reddit campaign relating to the manipulation of the stock price of U.S.-based retailer GameStop -- show a link between real-world events and spikes in online activity.&nbsp;<a href="https://circleid.com/posts/2021062-euro-2020-link-between-real-world-events-and-online-infringements" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Jun 22, 2021</li> <li>Comments: 0</li> <li>Views: 14,107</li> </ul> </div> <h3><a href="https://circleid.com/posts/20210615-phishing-scams-how-to-spot-them-and-stop-them">Phishing Scams: How to Spot Them and Stop Them</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> Phishing scams are nothing new in the online security world and show no signs of subsiding. The scam starts when a fraudster sends a communication purporting to originate from a trusted provider and encourages the recipient, often with a conveyed sense of urgency, to click a link. That link leads to a fake site, usually intended to collect confidential login credentials or other personal information. In similar scams, the mail may encourage the recipient to open an attachment loaded with malicious content.&nbsp;<a href="https://circleid.com/posts/20210615-phishing-scams-how-to-spot-them-and-stop-them" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Jun 15, 2021</li> <li>Comments: 1</li> <li>Views: 21,494</li> </ul> </div> <h3><a href="https://circleid.com/posts/20201112-brand-abuse-and-ip-infringements-part-2-return-on-investment">Brand Abuse and IP Infringements – Part 2: Enforcement and Return on Investment</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> In the first article in this two-part series, we looked at the impact of brand abuse and infringements against intellectual property (IP) on an organization's brand value. In this second article, we delve into how action against enforceable infringements can deliver tangible return on investment (ROI) for a brand, and demonstrate the importance of a robust brand protection program.&nbsp;<a href="https://circleid.com/posts/20201112-brand-abuse-and-ip-infringements-part-2-return-on-investment" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Nov 12, 2020</li> <li>Comments: 0</li> <li>Views: 6,304</li> </ul> </div> <h3><a href="https://circleid.com/posts/20201110-brand-abuse-and-ip-infringements-part-1-brand-impact">Brand Abuse and IP Infringements – Part 1: Brand Impact</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> In this two-part blog series, we take a closer look at brand abuse and intellectual property (IP) infringements. In this first article, we explore the components making up a company's IP and how online content can affect a brand's value, both actual and perceived... The IP held by an organization -- i.e., the portfolio of brands, trademarks, and other intangible assets that provide it with its distinctiveness, and protect it from unfair competition in the marketplace...&nbsp;<a href="https://circleid.com/posts/20201110-brand-abuse-and-ip-infringements-part-1-brand-impact" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Nov 10, 2020</li> <li>Comments: 0</li> <li>Views: 8,307</li> </ul> </div> <h3><a href="https://circleid.com/posts/20200514-reputation-damage-striking-the-right-balance-with-brand-protection">A Cautionary Tale of Reputation Damage: Striking the Right Balance With Brand Protection</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,</div> <p> In early March 2020, a well-known European fashion brand found themselves on the receiving end of a protest campaign on social media. The background to the case was the fact that, in 2019, the brand had launched a cease and desist (C&amp;D) action against a small, U.K.-based company in response to their use of similar product names and sale of associated clothing merchandise.&nbsp;<a href="https://circleid.com/posts/20200514-reputation-damage-striking-the-right-balance-with-brand-protection" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>May 15, 2020</li> <li>Comments: 0</li> <li>Views: 8,163</li> </ul> </div> <h3><a href="https://circleid.com/posts/20200427-coronavirus-online-threats-going-viral-part-5-social-media">Coronavirus Online Threats Going Viral, Part 5: Social Media</a></h3> <div class="byLine">Related Topics: <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,&nbsp; <a href="/topics/web" class="red">Web</a>,</div> <p> For our final blog in this series, looking at the online risks associated with COVID-19, we focus on social media. The popularity of social media channels means that they are extremely susceptible to exploitation by cybercriminals and other infringers, particularly during the coronavirus crisis. In an earlier post in this series, we discussed the use of social media for the distribution of phishing-related content, but CSC has also noted marked activity relating to the creation of fake accounts.&nbsp;<a href="https://circleid.com/posts/20200427-coronavirus-online-threats-going-viral-part-5-social-media" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Apr 27, 2020</li> <li>Comments: 0</li> <li>Views: 7,737</li> </ul> </div> <h3><a href="https://circleid.com/posts/20200423-coronavirus-online-threats-going-viral-part-4-phishing">Coronavirus Online Threats Going Viral, Part 4: Phishing</a></h3> <div class="byLine">Related Topics: <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/email" class="red">Email</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> In part four of this series of posts looking at emerging internet content relating to coronavirus, we explore phishing. In times of crisis, cyber criminals invariably take advantage of the growing concerns of the public. In the case of the coronavirus, they have done so by sending phishing emails that play on the fears surrounding the spread of the illness. A number of reports have emerged of emails purporting to provide advice or assistance relating to COVID-19...&nbsp;<a href="https://circleid.com/posts/20200423-coronavirus-online-threats-going-viral-part-4-phishing" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Apr 23, 2020</li> <li>Comments: 0</li> <li>Views: 7,040</li> </ul> </div> <h3><a href="https://circleid.com/posts/20200419-coronavirus-online-threats-going-viral-part-3-mobile-apps">Coronavirus Online Threats Going Viral, Part 3: Mobile Apps</a></h3> <div class="byLine">Related Topics: <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/mobile_internet" class="red">Mobile Internet</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> In part three of this series of posts looking at emerging internet content relating to coronavirus, we turn our attention to mobile apps - another digital content channel that can be used by criminals to take advantage of people's fears about the health emergency for their own gain.One of the most common attack vectors we have found in our analysis is the use of apps purporting to track global progression of COVID-19, or provide other information, but which instead incorporate malicious content.&nbsp;<a href="https://circleid.com/posts/20200419-coronavirus-online-threats-going-viral-part-3-mobile-apps" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Apr 19, 2020</li> <li>Comments: 0</li> <li>Views: 6,114</li> </ul> </div> <h3><a href="https://circleid.com/posts/20200416-coronavirus-online-threats-going-viral-part-2-marketplaces">Coronavirus Online Threats Going Viral, Part 2: Marketplaces</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,&nbsp; <a href="/topics/web" class="red">Web</a>,</div> <p> In the midst of the coronavirus crisis and the partial or total quarantines happening around the world, more people are turning to eCommerce for their purchases. This, combined with the increased demand for healthcare and healthcare-related products, is causing surges of activity on online marketplaces. Perhaps least surprising is the growth in the number of listings for cleaning and hygiene products (e.g., hand sanitizer), as well as facemasks...&nbsp;<a href="https://circleid.com/posts/20200416-coronavirus-online-threats-going-viral-part-2-marketplaces" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Apr 16, 2020</li> <li>Comments: 0</li> <li>Views: 4,430</li> </ul> </div> <h3><a href="https://circleid.com/posts/20200409-coronavirus-online-threats-going-viral-part-1-domain-names">Coronavirus Online Threats Going Viral, Part 1: Domain Names</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,&nbsp; <a href="/topics/web" class="red">Web</a>,</div> <p> As news of the spread of the coronavirus (COVID-19) continues to emerge, CSC has undertaken the first in a series of studies looking at how the development of the crisis has affected online content. This first article looks at the numbers of registered domains with names containing coronavirus-related strings - "coronavirus" or "covid(-)19" (optional hyphen) - and analyzes the types of content present on the associated websites.&nbsp;<a href="https://circleid.com/posts/20200409-coronavirus-online-threats-going-viral-part-1-domain-names" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/8564" class="blue">David Barnett</a></li> <li>Apr 10, 2020</li> <li>Comments: 0</li> <li>Views: 7,281</li> </ul> </div> </div> </div> </div> </div> <div class="colB"> <div class="colPad"> <!-- TOPIC INTERESTS --> <h2 style="margin-bottom:10px;">Topic Interests</h2> <div style="padding:0 0 30px 0;line-height:20px;"> <a href="https://circleid.com/topicsdomain_names"><strong>Domain Names</strong></a>,&nbsp; <a href="https://circleid.com/topicscybersecurity"><strong>Cybersecurity</strong></a>,&nbsp; <a href="https://circleid.com/topicsdomain-management"><strong>Domain Management</strong></a>,&nbsp; <a href="https://circleid.com/topicsweb"><strong>Web</strong></a>,&nbsp; <a href="https://circleid.com/topicscybercrime"><strong>Cybercrime</strong></a>,&nbsp; <a href="https://circleid.com/topicsbrand_protection"><strong>Brand Protection</strong></a>,&nbsp; <a href="https://circleid.com/topicscoronavirus"><strong>Coronavirus</strong></a>,&nbsp; <a href="https://circleid.com/topicsthreat-intelligence"><strong>Threat Intelligence</strong></a>,&nbsp; <a href="https://circleid.com/topicsmobile_internet"><strong>Mobile Internet</strong></a>,&nbsp; <a href="https://circleid.com/topicsemail"><strong>Email</strong></a>,&nbsp; <a href="https://circleid.com/topicsnew_tlds"><strong>New TLDs</strong></a>,&nbsp; <a href="https://circleid.com/topicsartificial-intelligence"><strong>Artificial Intelligence</strong></a>,&nbsp; <a href="https://circleid.com/topicsdns"><strong>DNS</strong></a>,&nbsp; <a href="https://circleid.com/topicscyberattack"><strong>Cyberattack</strong></a>,&nbsp; <a href="https://circleid.com/topicsmalware"><strong>Malware</strong></a>,&nbsp; <a href="https://circleid.com/topicsdns-security"><strong>DNS Security</strong></a> </div> <!-- RECENT COMMENTS --> <h2>Recent Comments</h2> <div class="postListMini" style="padding:0 0 15px 0;"> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20230112-the-highest-threat-tlds-part-1/#13253">The Highest Threat TLDs - Part 1</a></strong> <div class="byLine">Jan 19, 2023 4:01 AM PST</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20230112-the-highest-threat-tlds-part-1/#13249">The Highest Threat TLDs - Part 1</a></strong> <div class="byLine">Jan 15, 2023 4:15 AM PST</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20230112-the-highest-threat-tlds-part-1/#13247">The Highest Threat TLDs - Part 1</a></strong> <div class="byLine">Jan 13, 2023 2:43 AM PST</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20220504-the-world-of-the-subdomain/#13194">The World of the Subdomain</a></strong> <div class="byLine">May 06, 2022 2:09 AM PDT</div> </div> </div> <!-- RECENT BLOGS --> <!-- MOST POPULAR --> <h2>Popular Posts</h2> <div class="postListMini" style="padding:0 0 30px 0;"> <h3 style="padding-top:0;margin-top:0;border:none;"><a href="https://circleid.com/posts/20220510-breaking-the-rules-on-counterfeit-sales-the-use-of-hidden-links">Breaking the Rules on Counterfeit Sales: The Use of Hidden Links</a></h3> <div class="byLine pipedLinks"> <ul> <li>May 10, 2022</li> <li>Comments: 0</li> <li>Views: 27,195</li> </ul> </div> <h3><a href="https://circleid.com/posts/20230703-an-overview-of-the-concept-and-use-of-domain-name-entropy">An Overview of the Concept and Use of Domain-Name Entropy</a></h3> <div class="byLine pipedLinks"> <ul> <li>Jul 03, 2023</li> <li>Comments: 0</li> <li>Views: 23,049</li> </ul> </div> <h3><a href="https://circleid.com/posts/20210615-phishing-scams-how-to-spot-them-and-stop-them">Phishing Scams: How to Spot Them and Stop Them</a></h3> <div class="byLine pipedLinks"> <ul> <li>Jun 15, 2021</li> <li>Comments: 1</li> <li>Views: 21,494</li> </ul> </div> <h3><a href="https://circleid.com/posts/20230117-the-highest-threat-tlds-part-2">The Highest Threat TLDs - Part 2</a></h3> <div class="byLine pipedLinks"> <ul> <li>Jan 17, 2023</li> <li>Comments: 0</li> <li>Views: 19,952</li> </ul> </div> <h3><a href="https://circleid.com/posts/20230525-the-millennium-problems-in-brand-protection">The &#8216;Millennium Problems&#8217; in Brand Protection</a></h3> <div class="byLine pipedLinks"> <ul> <li>May 25, 2023</li> <li>Comments: 0</li> <li>Views: 18,501</li> </ul> </div> </div> </div> </div> <div class="clear"></div> </div> <div id="footer"> <div id="footerContent"> <div style="float:left;"> <a href="/"><img src="/images/circleid.svg" border="0" style="width:140px;opacity: 0.9;" /></a><br /> <p style="font-size:14px;padding:11px 0 15px 0;margin:0;">A World-Renowned Source for Internet Developments. Serving Since 2002.</p> </div> <div style="float:right;"> <p style="font-size:12px;padding:0 0 10px 0;margin:0;line-height:1em;text-align:right;letter-spacing:0.05em;">FOLLOW</p> <a href="https://x.com/circleid" class="socialIcon"><i class="fa-brands fa-square-x-twitter"></i></a> <a href="https://www.facebook.com/circleid/" class="socialIcon"><i class="fa-brands fa-square-facebook"></i></a> <a href="https://www.linkedin.com/company/circleid" class="socialIcon"><i class="fa-brands fa-linkedin"></i></a> <a href="http://feeds.circleid.com/cid_master/" class="socialIcon"><i class="fas fa-rss-square"></i></a> </div> <div id="links" class="clear"> CIRCLEID: &nbsp; <a href="https://circleid.com/about">About</a> &nbsp;|&nbsp; <a href="https://circleid.com/about/contact">Contact Us</a> <br /> SECTIONS: &nbsp; <a href="/">Home</a> &nbsp;|&nbsp; <a href="https://circleid.com/topics">Topics</a> &nbsp;|&nbsp; <a href="https://circleid.com/blogs">Featured Blogs</a> &nbsp;|&nbsp; <a href="https://circleid.com/news">News Briefs</a> &nbsp;|&nbsp; <a href="https://circleid.com/industry">Industry Updates</a> &nbsp;|&nbsp; <a href="https://circleid.com/community">Community</a> <br /> TERMS OF USE: &nbsp; <a href="https://circleid.com/about/codes">Codes of Conduct</a> &nbsp;|&nbsp; <a href="https://circleid.com/about/privacy">Privacy Policy</a> &nbsp;|&nbsp; <a href="https://circleid.com/about/terms">Terms of Use</a> <br /><br /> Copyright &copy; 2002-2025 CircleID. All rights reserved unless where otherwise noted. <br />Local Time: Friday, March 21, 2025 05:25 PM PDT &ndash; Page Load: 0.4006 Sec. </div> </div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10