The Northern Spy: combatting spam
TweetFollow Us on Twitter

The Northern Spy: combatting spam

By Rick Sutcliffe

Spam is used either as a noun to refer to unsolicited bulk email, or as a verb to refer to the act of sending same. There are two categories of spam -- the difference depending on whether or not the mail has a commercial or monetary aspect;that is, the sender is attempting to obtain money from the recipients for a service, product, or cause.

There may or may not also be a fraudulent aspect to the spam -- generally one should expect that those who engage in one unethical activity would challenged where the truth is concerned as well. For instance, non-commercial spam is frequently sent to argue for or against some cause, and may be abusive of the recipient, or of some identifiable group or organization to which the recipient may be supposed to belong. Sometimes it's even a one-time friend or former fellow member of some organization who is now prosecuting a vendetta in semi-public fashion.

But no matter what the motivation for sending spam, or how the sender justifies his/her actions, the practice is universally condemned by recipients, legitimate internet service providers, and the laws of most jurisdictions. Whether the spammer is sending thirty or thirty million messages at a time, you don't want to get them, the ISPs don't want to transmit them, and law enforcement agencies want to catch them and put them out of business for good.

Just as the typical new server will be attacked by hackers within seconds of joining the Internet for the first time, the typical email inbox begins to fill up with unsolicited messages soon after being opened. One of the most frequently asked questions by newcomers to the web (there still are some) is what to do about all the junk mail. Under another hat, the Spy offers web services, and noted that as much as 90% of all email presented to his servers is marked as spam. Well, the Spy obtained his first email address on Bitnet around 1972 (yes, the reader sees that date correctly) and herewith tenders a few modest suggestions.

What to do:

First, never answer an email message without checking to ensure it is from a known source. Spammers sometimes send email to many names on a domain (joe@thedomain, sally@thedomain, fred@the domain, etc.), hoping to hit a real account with one of several hundred thousand attempts. Replying will merely confirm to the sender that yours is a valid email address, and (s)he will promptly add it to many lists and sell it to other spammers.

Second, never display an email address in clear text on your web site, where it can be harvested by spammers and sold. Instead, obfuscate it. The simplest is to render it as me--AT--thisAddress.com rather than using the "@" sign. There are other ways to do this in text so it does not look like an address to a harvester (see a link at the bottom), or the address can be placed in a graphic so it can only be read by human eyes. Likewise, the Spy has now reluctantly concluded, do not allow your debating club, philatelic society, condo owners association, authors' group, or knitting circle to publish your email address. Such lists are frequently stolen.

Third, never do anything that the unsolicited email requests. Any attached file you open almost certainly contains a malware program that can take over your computer, either for the purpose of sending more spam, to find those stored credit card numbers, passwords, and other personal information, or to vandalize your files. The Spy adopts a zero-tolerance policy toward file attachments. Unless the sender has been specifically asked to send it, he deletes all such unread. Sorry, students, but you cannot submit your homework that way. The risks are too great.

Likewise, clicking on a link in the message will surely take you to a malicious web site. These fall into two categories. The first consists of fake sites pretending to be your bank, PayPal, or some other place where you have an account. The goal is to obtain your ID, your credit card or other personal information, and/or your password to an account. The second group of malicious sites are those set up to exploit bugs in browsers that may allow the site access to your computer and files. The common theme here is identity theft.

Note that no legitimate bank, Internet Services Provider, forum, or other online service will ever ask you to go to a site via a link embedded in an email message and provide your username and password or other information to "verify" your account, to deal with a "security issue" or to remove some "limitation" on your account. These are always frauds. If you have a concern about your account after receiving such a message, send an email to your contact person for that account (not using a link, but by typing in the address) or go to the service's web site (again by typing the address, not using the link.

Many email programs will warn you that a malicious link is not what it purports to be, but the absence of such a warning should not lull the reader into a false sense of security.

Fourth, most email programs have spam and abuse filters. Out of the box, these may be able to detect and mark some spam, then move it to the recipients' junk folder/box. These mailboxes should be checked weekly for "false positives", that is, messages that are marked as spam, but really are not. Commands found in the mail program's menu can then "teach" the filters that some messages are or are not spam. Over time, the filters will be better able to identify mail correctly, but the spammers themselves know of these filters and are constantly changing the wording of their messages to bypass them, so the training must be ongoing.

Fifth, if your email is part of a hosting package and you have a control panel for that hosting package (such as cPanel) you may have additional options for stopping spam at the server. These include:

(i) The server's own mail filtering programs, such as the very common Mailscanner, attach a number to all mail scanned, indicating the likelihood of its being spam or abusive. You can set the mail software at the server level to regard anything over a particular score as "high spam, then refuse delivery of high spam. You may fail to get a few false positives, but your mailbox will slim down considerably.

(ii) The server's control panel may also offer user-defined filters that you can set to discard or reject any mail with a particular phrase in its headers, including a specific "From:" (a blacklist). Again, the action is taken at the server level, and the message will not reach you.

(ii)Along the same lines, when you control your own domain, you can create as many email addresses or forwarders as you want. Give these out when you order on line, and as long as the company you dealt with doesn't sell it to a spammer, continue to use it when corresponding with them. When it does show up sold to a spammer, delete it.

(iii) If you are uncomfortable with changing these settings yourself, you can complain to your own web host or email service provider, who should be more than happy to set server wide or account level blacklisting on a troublesome spammer, preventing acceptance of the message by the server. The system operator also has access to a suite of server-wide filters, blacklists, and spam markings that can be taught to the mail scanner.

(iv) Server level spam filters rely on spammer lists maintained by third parties such as Spamhaus. You may be able to report spam directly to such an organization and have the offender blacklisted worldwide. However, despite defining spam as "unsolicited bulk email" Spamhaus has a more restrictive operational definition than envisioned here, and will only take action on commercial spam, not on other bulk unsolicited email, and not on abusive mail.

(v) Yet another spam prevention service worth cooperating with if you have your own site is Project Honeypot. This involves putting code and an "email address" on your website that when harvested and used in a spam email list immediately identifies the mail as spam, for only an illegitimate automatic harvester would detect the alleged address.

Sixth, ISPs (Internet Service Providers), even if only offering mail services, all have explicit clauses in their terms of reference that ban hate mail, abusive mail, and spam of all kinds. Here is an excerpt from a gmail TOS document:

In addition to (and/or as some examples of) the violations described in the terms of service, users may not:

Generate or facilitate unsolicited commercial email ("spam"). Such activity includes, but is not limited to

o sending email in violation of the CAN-SPAM Act or any other applicable anti-spam law;

° imitating or impersonating another person or his, her or its email address, or creating false accounts for the purpose of sending spam;

° data mining any web property (including Google) to find email addresses;

° sending unauthorized mail via open, third-party servers;

° sending emails to users who have requested to be removed from a mailing list;

° selling, exchanging or distributing to a third party the email addresses of any person without such person's knowing and continued consent to such disclosure;

° sending unsolicited emails to significant numbers of email addresses belonging to individuals and/or entities with whom you have no preexisting relationship.

Here is another from Hotmail:

Terms of Service. The Hotmail Terms of Service (TOS) strictly forbids sending unsolicited e-mail -- and the TOS is enforced with zero-tolerance zeal. All reported accounts in violation of the TOS are terminated immediately and permanently. Hotmail publicly posts its closures of those accounts from which unsolicited commercial e-mail has been sent to anti-spam Usenet newsgroups on a regular basis.

In addition, Hotmail recently instituted a "liquidated damages" clause in the TOS. This clause requires members who misuse Hotmail in connection with spam to pay $5 per spam message to Hotmail. This clause serves as a deterrent to keep Hotmail spam-free and will make it easier to pursue spammers.

Nearly all other such email providers, whether large or small, have similar clauses in their TOS, and enforce them. If you receive spam from a domain whose provider you can recognize, you can complain to the "abuse" department of that provider about the mail, and may be able to get the account cancelled, if the provider is reputable. Of course, the spammer is likely to start up again elsewhere, but you do get a temporary respite. If the amount of spam is large enough or the spammer is using a stolen address list, the provider may be willing to take legal action for the fines, or to put the offender in prison. One can always hope.

Seventh (modification of the very first point above for the brave) If you already know the spammer, or know that (s)he has your real address list anyway, you could consider sending a message to the person requiring that your name be removed from the mailing list being used. Keep this message and any reply. If the person refuses, even if implicitly by continuing to send the spam, complain to their services provider as in the previous section. It is a violation of nearly every provider's TOS to refuse to remove an address from a mailing list on request, so if the service they use is a legitimate one (such as gmail or hotmail) this complaint should result in cancellation of their account there. However, it is the Spy's experience that many companies are not as diligent about this as they ought to be.

If your service happens to be the same as the spammer's (say, gmail) you may be able to complain simply by clicking a box next to the email to tell the system operator that the mail is spam or abusive as far as you are concerned.

Eighth, even where no commercial or fraudulent aspect is present, and the mail contains no abuse, the sending of bulk unsolicited email is illegal in many jurisdictions, and may attract heavy fines and/or jail sentences. In celebrated recent cases spam kings Sanford Wallace and Adam Guerbuez, both of whom spammed Facebook accounts with commercial ads were fined $711M and $873M respectively. The latter judgement, made in California, has now, with exchange, amounted to nearly $1B CDN, and has been upheld by the Quebec Supreme Court. There have been other cases where the fines reached into the hundreds of millions, so these are not unique.

The gold standard now appears to have become a fine of $100 per address per message, and the larger ISPs and social networking sites seem to believe that at some point it is very much worth spending the legal money to pursue spammers, even if little or nothing can ever be recovered by way of paid fines (the offender declares bankruptcy). The hope seems to be that the publicity will deter others.

The Spy suspects that little short of jail will make much difference, for in most cases criminal prosecution is indeed a viable option. This is especially so in cases involving fraud, such as that of Alan Ralsky, the self-proclaimed "Godfather of Spam," who was sentenced to 51 months in prison for a pump-and-dump fraud run through spam.

It is worth noting that abusive mail, even if not explicitly threatening, is not only implicitly so, but its repetition is generally deemed harassment. Since uttering threats and harassment are criminal offences in almost all Western jurisdictions, this type of email can also result in slammer time. The recipient must decide whether the threats and/or harassment are sufficiently grave to file a police report.

Moreover, as in the last section, refusal to remove a name from an email list is a serious offence in many jurisdictions, and this may also be an avenue that either you, your provider, or the offender's provider can pursue.

Finally, an oddity of law in some countries, including the United States, prescribes particular penalties for sending unsolicited mail to a wireless device, offering a further legal option where applicable.

How much action is worth it?
In the case of commercial advertising, it is probably sufficient to stop the spam from getting to you, especially if this can be done at the mail server level before you download your mail to your own computer. In the case of abusive mail, particularly if a stolen database is involved, recipients may wish to give serious consideration to complaining up the line, first to their own ISP, then to the offenders' (if this is not just a server under his own control) and then to the police.

Now, wouldn't it be nice if a column like this never needed to be written? The Spy would be happy to see all spammers busted with heavy fines, all thieves of databases and senders of abusive email locked up. Perhaps the rest of us could then get on with our lives.

Rick Sutcliffe, (a.k.a. The Northern Spy) is professor and chair of Computing Science and Mathematics as well as Senate Chair at Trinity Western University. He is also on the board of CIRA, operator of .ca. He's written two textbooks and several novels, one named best ePublished SF novel for 2003. His columns have appeared in numerous magazines and newspapers (paper and online), and he's a regular speaker at churches, schools, academic meetings, and conferences. He and his wife Joyce have lived in the Aldergrove/Bradner area of BC since 1972.

Want to discuss this and other Northern Spy columns? Surf on over to ArjayBB.com. Participate and you could win free web hosting from the WebNameHost.net subsidiary of Arjay Web Services. Rick Sutcliffe's fiction can be purchased in various eBook formats from Fictionwise, and in dead tree form from Amazon's Booksurge.

URLs


The Northern Spy Home Page: http://www.TheNorthernSpy.com


The Spy's Laws collected: http://www.thenorthernspy.com/spyslaws.htm


The Spy's Shareware download site: http://downloads.thenorthernspy.com/

 

Community Search:
MacTech Search:

Software Updates via MacUpdate

Microsoft Remote Desktop 8.0.19 - Connec...
With Microsoft Remote Desktop, you can connect to a remote PC and your work resources from almost anywhere. Experience the power of Windows with RemoteFX in a Remote Desktop client designed to help... Read more
OmniGraffle 6.3 - Create diagrams, flow...
OmniGraffle helps you draw beautiful diagrams, family trees, flow charts, org charts, layouts, and (mathematically speaking) any other directed or non-directed graphs. We've had people use Graffle to... Read more
PDFKey Pro 4.3.2 - Edit and print passwo...
PDFKey Pro can unlock PDF documents protected for printing and copying when you've forgotten your password. It can now also protect your PDF files with a password to prevent unauthorized access and/... Read more
Ableton Live 9.2.2 - Record music using...
Ableton Live lets you create and record music on your Mac. Use digital instruments, pre-recorded sounds, and sampled loops to arrange, produce, and perform your music like never before. Ableton Live... Read more
Macs Fan Control 1.3.1.0 - Monitor and c...
Macs Fan Control allows you to monitor and control almost any aspect of your computer's fans, with support for controlling fan speed, temperature sensors pane, menu-bar icon, and autostart with... Read more
NetShade 6.3.1 - Browse privately using...
NetShade is an anonymous proxy and VPN app+service for Mac. Unblock your Internet through NetShade's high-speed proxy and VPN servers spanning seven countries. NetShade masks your IP address as you... Read more
Dragon Dictate 4.0.7 - Premium voice-rec...
With Dragon Dictate speech recognition software, you can use your voice to create and edit text or interact with your favorite Mac applications. Far more than just speech-to-text, Dragon Dictate lets... Read more
Persecond 1.0.2 - Timelapse video made e...
Persecond is the easy, fun way to create a beautiful timelapse video. Import an image sequence from any camera, trim the length of your video, adjust the speed and playback direction, and you’re done... Read more
GIMP 2.8.14p2 - Powerful, free image edi...
GIMP is a multi-platform photo manipulation tool. GIMP is an acronym for GNU Image Manipulation Program. The GIMP is suitable for a variety of image manipulation tasks, including photo retouching,... Read more
Sandvox 2.10.2 - Easily build eye-catchi...
Sandvox is for Mac users who want to create a professional looking website quickly and easily. With Sandvox, you don't need to be a Web genius to build a stylish, feature-rich, standards-compliant... Read more

ReBoard: Revolutionary Keyboard (Utilit...
ReBoard: Revolutionary Keyboard 1.0 Device: iOS Universal Category: Utilities Price: $1.99, Version: 1.0 (iTunes) Description: Do everything within the keyboard without switching apps! If you are in WhatsApp, how do you schedule a... | Read more »
Tiny Empire (Games)
Tiny Empire 1.1.3 Device: iOS Universal Category: Games Price: $2.99, Version: 1.1.3 (iTunes) Description: Launch cannonballs and blow tiny orcs into thousands of pieces in this intuitive fantasy-themed puzzle shooter! Embark on an... | Read more »
Astropad Mini (Productivity)
Astropad Mini 1.0 Device: iOS iPhone Category: Productivity Price: $4.99, Version: 1.0 (iTunes) Description: *** 50% off introductory price! ​*** Get the high-end experience of a Wacom tablet at a fraction of the price with Astropad... | Read more »
Emo Chorus (Music)
Emo Chorus 1.0.0 Device: iOS Universal Category: Music Price: $1.99, Version: 1.0.0 (iTunes) Description: Realistic Choir simulator ranging from simple Chorus emulation to full ensemble Choir with 128 members. ### introductory offer... | Read more »
Forest Spirit (Games)
Forest Spirit 1.0.5 Device: iOS Universal Category: Games Price: $2.99, Version: 1.0.5 (iTunes) Description: | Read more »
Ski Safari 2 (Games)
Ski Safari 2 1.0 Device: iOS Universal Category: Games Price: $1.99, Version: 1.0 (iTunes) Description: The world's most fantastical, fun, family-friendly skiing game is back and better than ever! Play as Sven's sister Evana, share... | Read more »
Lara Croft GO (Games)
Lara Croft GO 1.0.47768 Device: iOS Universal Category: Games Price: $4.99, Version: 1.0.47768 (iTunes) Description: Lara Croft GO is a turn based puzzle-adventure set in a long-forgotten world. Explore the ruins of an ancient... | Read more »
Whispering Willows (Games)
Whispering Willows 1.23 Device: iOS Universal Category: Games Price: $4.99, Version: 1.23 (iTunes) Description: **LAUNCH SALE 50% OFF** - Whispering Willows is on sale for 50% off ($4.99) until September 9th. | Read more »
Calvino Noir (Games)
Calvino Noir 1.1 Device: iOS iPhone Category: Games Price: $3.99, Version: 1.1 (iTunes) Description: The film noir stealth game. Calvino Noir is the exploratory, sneaking adventure through the 1930s European criminal underworld.... | Read more »
Angel Sword (Games)
Angel Sword 1.0 Device: iOS Universal Category: Games Price: $6.99, Version: 1.0 (iTunes) Description: Prepare to adventure in the most epic full scale multiplayer 3D RPG for mobile! Experience amazing detailed graphics in full HD.... | Read more »

Price Scanner via MacPrices.net

Apple and Cisco Partner to Deliver Fast-Lane...
Apple and Cisco have announced a partnership to create a “fast lane” for iOS business users by optimizing Cisco networks for iOS devices and apps. The alliance integrates iPhone with Cisco enterprise... Read more
Apple offering refurbished 2015 13-inch Retin...
The Apple Store is offering Apple Certified Refurbished 2015 13″ Retina MacBook Pros for up to $270 (15%) off the cost of new models. An Apple one-year warranty is included with each model, and... Read more
Apple refurbished 2015 MacBook Airs available...
The Apple Store has Apple Certified Refurbished 2015 11″ and 13″ MacBook Airs (the latest models), available for up to $180 off the cost of new models. An Apple one-year warranty is included with... Read more
21-inch iMacs on sale for up to $120 off MSRP
B&H Photo has 21″ iMacs on sale for up to $120 off MSRP including free shipping plus NY sales tax only: - 21″ 1.4GHz iMac: $999.99 $100 off - 21″ 2.7GHz iMac: $1199.99 $100 off - 21″ 2.9GHz iMac... Read more
5K iMacs on sale for up to $150 off MSRP, fre...
B&H Photo has the 27″ 3.3GHz 5K iMac on sale for $1899.99 including free shipping plus NY tax only. Their price is $100 off MSRP. They have the 27″ 3.5GHz 5K iMac on sale for $2149.99 $2199.99, $... Read more
1.4GHz Mac mini, refurbished, available for $...
The Apple Store has Apple Certified Refurbished 1.4GHz Mac minis available for $419. Apple’s one-year warranty is included, and shipping is free. Their price is $80 off MSRP, and it’s the lowest... Read more
iPad Air 2 on sale for up to $100 off MSRP
Best Buy has iPad Air 2s on sale for up to $100 off MSRP on their online store for a limited time. Choose free shipping or free local store pickup (if available). Sale prices available for online... Read more
MacBook Airs on sale for $100 off MSRP
Best Buy has MacBook Airs on sale for $100 off MSRP on their online store. Choose free shipping or free local store pickup (if available). Sale prices for online orders only, in-store prices may vary... Read more
Big Grips Lift Handle For iPad Air and iPad A...
KEM Ventures, Inc. which pioneered the extra-large, super-protective iPad case market with the introduction of Big Grips Frame and Stand in 2011, is launching Big Grips Lift featuring a new super-... Read more
Samsung Launches Galaxy Tab S2, Its Most Powe...
Samsung Electronics America, Inc. has announced the U.S. release of the Galaxy Tab S2, its thinnest, lightest, ultra-fast tablet. Blending form and function, elegant design and multitasking power,... Read more

Jobs Board

*Apple* Evangelist - JAMF Software (United S...
The Apple Evangelist is responsible for building and cultivating strategic relationships with Apple 's small and mid-market business development field teams. This Read more
*Apple* Retail - Multiple Positions (US) - A...
Sales Specialist - Retail Customer Service and Sales Transform Apple Store visitors into loyal Apple customers. When customers enter the store, you're also the Read more
*Apple* Desktop Analyst - KDS Staffing (Unit...
…field and consistent professional recruiting achievement. Job Description: Title: Apple Desktop AnalystPosition Type: Full-time PermanentLocation: White Plains, NYHot Read more
*Apple* Systems Engineer (Mclean, VA and NYC...
Title: Apple Systems Engineer (Mclean, VA and NYC) Location: United States-New York-New York-200 Park Ave (22005) Other Locations: United States-Virginia-Vienna-Towers Read more
*Apple* Systems Engineer (Mclean, VA and NYC...
…Assist in providing strategic direction and technical leadership within the Apple portfolio, including desktops, laptops, and printing environment. This person will Read more
All contents are Copyright 1984-2011 by Xplain Corporation. All rights reserved. Theme designed by Icreon.