|
Archive-name: net-abuse-faq/email/spamfighting
Posting-Frequency: bi-weekly Last-modified: 07-Jul-2001 URL: http://www.twinlobber.org.uk/antispam/faq/faq1.txt Maintainer: James Farmer <nanae-faq@usenet.twinlobber.org.uk> See reader questions & answers on this topic! - Help others by sharing your knowledge
==========================================================================
An FAQ For news.admin.net-abuse.email
Part 1: Spamfighting Overview
==========================================================================
TABLE OF CONTENTS
Recent Changes
Disclaimer
Preface
1.1 Introduction
1.1.1 Whom is this document for?
1.1.2 What is spam and why do we fight it?
1.2 Basic Spamfighting
1.2.1 I've received some spam... what can I do?
1.2.2 How can I find a spammer's ISP?
1.2.3 Can I do anything about a spammer's website?
1.2.4 What if a spam doesn't have include a website?
1.2.5 What if the spam doesn't even include an email address?
1.2.6 Who else can I complain to?
1.2.7 What email address do I complain to?
1.2.8 Can't this all be automated?
1.2.9 Should I hack into the spammer's computer?
1.3 Advanced Spamfighting
1.3.1 Spammer Tricks
1.3.1.1 What are these weird URLs?
1.3.1.2 Is the spammer's URL always the place to complain to?
1.3.1.3 Why does the spammer's website's source code look so weird?
1.3.1.4 How can I stop a spammer's website doing bad things to my
computer?
1.3.1.5 What if a spammer's website has disabled right-click?
1.3.2 What can I do about Spam-Supporting ISPs?
1.3.2.1 Research
1.3.2.1.1 news.admin.net-abuse.sightings & groups.google.com
1.3.2.1.2 Halls of Shame
1.3.2.1.3 Posting in news.admin.net-abuse.email
1.3.2.2 Education
1.3.2.2.1 What if the ISP doesn't speak English?
1.3.2.3 Contact their Upstream
1.3.2.4 Publicise their Spam-Supporting
1.3.2.5 Submit an RBL Nomination
1.3.2.6 Bitching
1.4 Spam Prevention
1.4.1 How can an individual reduce the amount of spam they get?
1.4.1.1 How do spammers get our email addresses?
1.4.1.2 Choose a non-obvious email address
1.4.1.3 Be careful with your email address
1.4.1.4 Address Munging
1.4.1.5 Whitelisting
1.4.1.6 Filtering
1.4.2 How can an ISP reduce the amount of spam their customers get?
1.4.2.1 Stop Accepting All Email
1.4.2.2 Filtering
1.4.2.3 Blackholing
1.4.2.4 Lists
1.4.2.4.1 MAPS
1.4.2.4.2 ORBS
1.4.2.4.2.1 Did ORBS die in June 2001?
1.4.3 How can an ISP reduce the amount of spam their customers send?
1.5 About anti-spammers
1.5.1 Why do anti-spammers fight spam?
1.5.2 Aren't anti-spammers just a load of anti-business communists?
1.5.3 Aren't anti-spammers just a load of anti-commerce net-nazis?
1.5.4 Don't anti-spammers just want to control email on the Internet?
1.5.5 Why don't anti-spammers spend their time stamping out porn
instead?
1.5.6 Why don't you anti-spammers just get a life?
1.5.7 Are anti-spammers all Systems Administrators?
1.5.8 If you anti-spammers are so smart, why am I still getting spam?
Credits
Use Policy
=========================================================================
--------------------------- RECENT CHANGES ------------------------------
=========================================================================
Added section 1.3.2.6, about bitch-list.net.
Linked to <http://www.elsop.com/wrc/nospam.htm> from 1.2.1
Linked to an Esperanto Anti-Spam FAQ at
<http://www.esperanto.net/veb/spam-faq.html>.
1.3.1.4 now links to <http://www.webwasher.com> as an alternative way of
eliminating JavaScript.
1.4.2.4.2.1 - the "Death of ORBS" section - has been updated with
information about the new ORBS-related lists.
=========================================================================
------------------------------- DISCLAIMER ------------------------------
=========================================================================
The following document should, where not otherwise stated, be understood
to represent the opinions and beliefs of the FAQ-maintainer only. I
endeavour to ensure that these opinions and beliefs are as correct as
possible, but take no responsibility for any problems caused by errors
herein. This document should not be considered to represent the opinions
of any individuals or organisations other than the FAQ-maintainer.
Please note that in this document, "we" is intended to collectively refer
to all regular or semi-regular posters to the news.admin.net-abuse.email
newsgroup, including those of all persuasions, and should not be read as
indicating the existence of a "clique" comprising persons of similar
viewpoints.
=========================================================================
-------------------------------- PREFACE --------------------------------
=========================================================================
This is one of three documents I have compiled to comprise an FAQ for the
news.admin.net-abuse.email newsgroup. Each document addresses points in a
given area, specifically:
The SPAMFIGHTING OVERVIEW offers a taste of the many techniques people use
to fight spam. The objective isn't to teach you how to fight spam (there
are many far superior documents that do just this), but rather to
introduce some of the techniques you can use and refer you to some more
detailed works.
THE EVILS OF SPAM covers the more ethical, moral, and legal aspects of
spam, including just what constitutes spam and the types of people who
become spammers.
UNDERSTANDING NANAE aims to introduce all of the weird, wonderful, and
sometimes impenetrable terminology that people use in
news.admin.net-abuse.email (nanae). It covers both colloquialisms (e.g.
"chickenboner") and technical terms (e.g. "direct-to-MX").
These three parts are designed to stand alone and don't have to be read in
order; feel free to pick and choose just the bits you're interested in.
These documents shouldn't be considered to be "the" FAQ, as there are
plenty of other FAQs that are superior in insight, detail, or depth of
coverage. They are just an FAQ that I hope will answer some questions
that have been troubling you.
These documents are currently maintained by James Farmer. If you have any
suggestions for additions or corrections, then feel free to send an email
to nanae-faq@twinlobber.org.uk
The latest versions of all of these documents can always be found at
<http://www.twinlobber.org.uk/antispam/faq/>
=========================================================================
--------------------------- 1.1 INTRODUCTION ----------------------------
=========================================================================
1.1.1 Whom is this document for?
This document is intended for anyone who feels confused about any of the
spamfighting techniques discussed in the news.admin.net-abuse.email
newsgroup. It aims to briefly summarise what each of the commonly used
techniques is, and provide links to sites where you can find more
detailed information.
This document is not a tutorial for spamfighters. While there is much
in here that will be of interest to a newcomer, reading this document
alone will teach you only what techniques you can employ to fight spam,
not how to use them.
1.1.2 What is spam and why do we fight it?
These are issues that are discussed in great depth in the second part of
this FAQ, "The Evils of Spam". However, to briefly summarise, spam is a
type of email that endangers the very existence of the email system by
threatening to overwhelm it with a massive and uncontrollable volume of
messages. Spam usually takes the form of advertising or promotional
material that arrives in your emailbox without you having requested it.
UBE (Unsolicited Bulk Email) and UCE (Unsolicited Commercial Email) are
terms that are often used to describe different types of spam.
RELATED LINKS
NANAE FAQ part 2: The Evils of Spam
<http://www.twinlobber.org.uk/antispam/faq/faq2.txt>
=========================================================================
------------------------ 1.2 BASIC SPAMFIGHTING -------------------------
=========================================================================
1.2.1 I've received some spam... what can I do?
Most people ignore the spam they receive. They either don't have the
time or the expertise to deal with it. Their decision is
understandable, but in the end inaction only helps the spammers because
they can point to statistics and say "I sent my spam to 7 million email
addresses and only 190 people complained so the other 6,999,810 must
have been happy to receive it".
Alternatively, spam-victims might try to use a spam's "remove address".
The concept here is that by sending a message to a given email address
you will tell the spammer to remove you from their mailing list.
However, these things almost universally fail to work. In the rare
cases where your "remove request" actually reaches the spammer, they'll
just take it as an indication that email sent to your address is
actually read by a human, and thus your address becomes _more_ valuable
to them, and they send you _more_ spam.
The best thing to do is: complain, complain, complain! Most ISPs have
Terms of Service (or Acceptable Use Policies) that forbid spamming, so
if you can tell the spammer's ISP that their customer broke these rules,
then you can get the spammer's account cancelled! As well as giving you
personal satisfaction, this will serve as a deterrent to this and other
spammers, and with any luck prevent him from profiting in any way from
his spam.
(As an aside, an ISP will sometimes try to "educate" a spammer before
terminating their account, as sometimes a company will send a spam
without considering the issues involved. This topic is explored in the
second part of this FAQ, "The Evils of Spam".)
RELATED LINKS
Elsop's How To Fight Spam Links
<http://www.elsop.com/wrc/nospam.htm>
1.2.2 How can I find a spammer's ISP?
The tricky bit is working out just who is the spammer's ISP. The
address in the "From:" field is almost certainly forged in order to
throw you off the scent (and may even belong to an innocent
third-party), so you have to learn to read the "full message headers",
which are a bit like a log of an email message's travels through the
internet. The spammer will try to forge these too, but in most cases
it's still pretty easy to work out which ISP the message came from.
Header-reading is beyond the scope of this document, but here are a few
links where you can find out more:
How do I get my email program to reveal the full headers?
<http://spamcop.net/fom-serve/cache/19.html>
Getting Full Headers
<http://www.chebucto.ns.ca/~af380/Antispam.html#fullheaders>
SPAM-L FAQ : Tracking Spam
<http://www.claws-and-paws.com/spam-l/tracking.html>
Reading Email Headers
<http://www.stopspam.org/email/headers/headers.html>
Dealing with Junk Email
<http://www.mcs.net/~jcr/junkemaildeal.html>
Tracking the Source of Email Spam
<http://www.rahul.net/falk/mailtrack.html>
EmailAbuse.org: Reporting Abuse
<http://www.emailabuse.org/report.asp>
BUT... when complaining, please remember that the people at the
spammer's ISP are not the bad guys. They didn't know their customer
would turn out to be a spammer. There is a great temptation to fire off
a few pages of verbal abuse, but remember that you are angry with the
spammer, not the abuse staff at his ISP. The spammer will have abused
them too, probably breaking their Terms of Service. And there is
nothing an ISP can do to prevent, completely, any chance of Internet
abuse emanating from their machines. So be polite. Point out what has
happened without dramatic or obscenity-clad embellishment. Hostile or
infantile behaviour will do you no good at this stage.
If the abuse staff sends you a response that is blatantly offensive,
then it may be time to revise your opinion of them (although always be
aware of the potential for a misunderstanding), but you should start out
from the assumption that these people are your friends.
Most abuse departments won't act against a spammer until a non-trivial
number of complaints have been received. This is because people
sometimes forget that they have signed up for legitimate mailing lists
or requested other types of email, and complain about it as spam. If
you are convinced that a message was spam but the spammer's ISP claims
that it wasn't, then there are further steps you can take. We will
discuss these in later sections of this document.
RELATED LINKS
Step-By-Step Spam Reporting
<http://www.whew.com/Spammers/reportspam_stepbystep.shtml>
Reporting Abuse to ISPs
<http://mail-abuse.org/rbl/notifyfaq.html>
1.2.3 Can I do anything about a spammer's website?
Assuming that the ISP agrees to take action, the spammer's account with
that ISP will often be cancelled. Unfortunately, the spammers have
caught on that their accounts rarely last long after they send their
spam, so they've taken to using cheap "throw-away" accounts, opened
solely for the purpose of sending spam which advertises ("spamvertises")
websites held on other providers. The spamming accounts will get
cancelled soon after the spam-run is complete, but the website will
remain intact and thus the spammer can safely benefit from their spam
(in terms of sales over the web, or clicks on banner advertisements, or
whatever). That's the idea, at any rate.
Largely, this doesn't work as most web-hosting companies have clauses in
their Terms of Service forbidding the use of spam to advertise the
websites they host. Sending a quick complaint to the hosting company
will often result in the spammer's website being removed.
But how to find the web-hosting company? The spammers may try to
conceal this, but there's one snag - they want potential customers to
reach their website, which means that the website's URL is probably
somewhere in the spam. Once you find it, you can use tools like
"traceroute" and "whois" to work out who's hosting the site. Here are
some useful online versions of these tools:
SamSpade
<http://www.samspade.org/>
UXN Spam Combat
<http://combat.uxn.com/>
But if you'd prefer to run them from your desktop, rather than surfing
over to a webpage every time you want to run a traceroute, then you can
download versions of the tools from these links:
SamSpade for Windows
<http://www.samspade.org/ssw/>
Net.Demon for Windows
<http://www.netdemon.net/>
"traceroute" is a tool that gives you the list of machines on the
Internet, where a message sent from the source machine to another
machine would pass through. "Whois" is a tool for looking up the owner
of a domain or IP address. A detailed look at either of these is beyond
the scope of this document, but again here are some useful links:
Whois Tutorial
<http://www.netdemon.net/tutorials/whois.txt>
Spam Tracking 103 - The Whois Tool
<http://www.rahul.net/falk/spamtrack103.html>
Traceroute Tutorial
<http://www.exit109.com/~jeremy/news/providers/traceroute.html>
Traceroute and Spam
<http://www.opus1.com/o/nospamtrace.html>
Death to Spam (includes a traceroute guide)
<http://www.mindworkshop.com/alchemy/nospam.html>
Tools to Help You
<http://www.chebucto.ns.ca/~af380/Antispam.html#astools>
NOTE: Make sure you know what you're doing before you start writing
complaints based on the results of tools like "traceroute" or "whois",
as it's very easy to make mistakes. If in doubt, ask in the newsgroup
for confirmation.
Spammers will often try to obscure the true address of their website by
spamvertising the address of an intermediate site or giving the address
in an obscure format, but in most cases it's pretty easy to work through
their tricks. We'll look at this in more detail in section 1.3.1.
1.2.4 What if the spam doesn't include a website?
Alternatively, the spam may not advertise a website and will instead be
soliciting replies by email. You can use the techniques described above
to work out who is hosting this email address and complain to the
provider, which will probably cancel the spammer's email account. Good,
eh?
1.2.5 What if the spam doesn't even include an email address?
A few spammers - particularly chain-letter spammers - don't include any
electronic ways of contacting them, giving only a postal address or a
telephone number in their spams. In these cases, there tends to be less
you can do.
Most postal addresses found in spams will actually be P.O. boxes (e.g.
Mailboxes Etc). Some of these mailbox providers may have rules against
business use or certain types of business uses (e.g. chain letters or
MLM); if so and you complain, they may take action.
In fact, chain letters soliciting money are illegal pyramid schemes in
many countries, so reporting them to the authorities may be a good idea.
For example, in the United States you can forward such chain letters to
your local postmaster or postal inspector, or the postmaster/postal
inspector local to each address on the chain letter, or present them to
the clerk at your local post office saying "I received this illegal
chain letter asking for money". You can also send them by email to
pyramid@ftc.gov or fraud@uspis.gov.
Incidentally, I do NOT recommend making personal visits to addresses
advertised in spams. Nothing good can come of such episodes. If you
desperately want to contact the spammer, send him a letter.
Many spams will include phone numbers you're supposed to call for more
information. Sometimes these will play recorded messages giving the
address of a website or an email address, in which case you can complain
to the relevent ISP as usual. In other cases, it can be worthwhile
checking the type of phone number it is - many spammers give
premium-rate numbers and don't include legally required warnings, in
which case you can complain the provider or the regulator or whatever is
relevant to the locality. (On this note, _always_ check the call
charges before calling a spamvertised phone number. If in doubt, don't
call it.)
Note that in many countries, a freephone number can still detect your
number even if you have call blocking enabled. Use a pay-phone if this
worries you.
By the way, if you call a spammer's phone number and actually reach the
spammer or his family, DON'T be abusive. It does no good and only makes
the spammer feel like the victim.
(Well that's all I know. Can anyone think of anything more for this
section?)
RELATED LINKS
U.S. Postal Inspection Service on Chain Letters
<http://www.usps.gov/websites/depart/inspect/chainlet.htm>
Mail Fraud Complaints
<http://www.usps.gov/websites/depart/inspect/fraud/MailFraudComplaint.htm>
1.2.6 Who else can I complain to?
The key with most spamfighting is summed up by this simple motto:
"Follow the Money". Have a look at the spam and the spammed website and
see how the spammer's intending to earn off it. Is he using an external
merchant to charge credit cards? If so, complain to them and often
they'll stop dealing with the spammer. Does he have banner ads? If so,
complain to the suppliers of the banner ads. If there's a form on the
spammer's website that sends information to an email address, complain
to the ISP of that email address. Most legitimate businesses on the
Internet aren't keen to sully their reputations by working with
spammers.
Remember: always be polite. The ISPs are not your enemies and a single
polite word will get you a lot farther than a screenful of abuse.
As an aside, the U.S. Federal Trade Commission has a project for
analysing and classifying spam, and have invited Internet users to
forward their spam to uce@ftc.gov. This won't help you in the
short-term but it could be of long-term benefit in the fight against
spam. They also occaisionally take action against outright scams that
are reported in this way.
1.2.7 What email address do I complain to?
At most ISPs, the address for sending complaints is
"abuse@<isp-domain>", e.g. abuse@rcn.com or abuse@yahoo.com. However, a
few ISPs have non-standard abuse department email addresses; in these
cases it can be hard to know where to send your complaint. To the
rescue comes abuse.net; a database of ISP abuse addresses. It can even
forward complaints automatically to the relevant abuse addresses if you
supply the complaint and the name of the Internet provider! Have a look
at <http://www.abuse.net/>
1.2.8 Can't this all be automated?
All this reading headers, working out webhosting providers, and so forth
is a pain. Spamcop is a service that aims to automate this process; you
give it your spam and it writes and mails the complaint for you.
Spamcop has a reputation for sending complaints to a few incorrect
places, so you have to keep an eye on what it's doing, but if you think
you might find it useful, then have a look at <http://www.spamcop.net/>.
(Note that www.spamcop.org has no relation to www.spamcop.net.)
1.2.9 Should I hack into the spammer's computer?
No; hacking is very seriously frowned upon by most of the anti-spamming
community. Apart from the fact that it's illegal, it allows the
spammers to portray themselves as honest businessmen being assaulted by
electronic terrorists. If we are to eliminate spam it is important that
we retain the moral high ground.
=========================================================================
----------------------- 1.3 ADVANCED SPAMFIGHTING -----------------------
=========================================================================
1.3.1 Spammer Tricks
1.3.1.1 What are these weird URLs?
Some spammers try to "obfuscate" the address of their website in order
to make it hard to see where to complain to. A number of common
tactics include:
* The Non-Dotted-Quad IP address
Most IP addresses have the "dotted-quad" form:
182.175.90.10
However, the IP address is also valid as one big decimal number,
e.g.:
3064945162
The spammer hopes that by giving you the address in this form,
you'll be confused. However, tools like traceroute and whois will
quite happily work on either dotted-quads or big decimal numbers.
If you're happier working with the dotted quads, there's a tool at
<http://combat.uxn.com/> that will convert back to them.
IP addresses can also be represented in Octal (prefixed '0') or
hexadecimal (prefixed '0x'), or even as a mixture of these within a
dotted quad, in which case the above IP address might become:
0266.0xaf.0x5a.012
The key thing to remember is that if it works in your web browser,
it'll work in traceroute and whois too, so all this obfuscation by
the spammer is really a wasted effort on their part. What a shame.
:)
* The Really Long Dotted-Quad IP address
The dotted-quad I.P. address is just a way of representing a 32-bit
number using four 8-bit numbers. It's a bit like the way you might
right "1153" as one thousand, one hundred, five tens and three
units. Now, in a dotted-quad only the lowest eight bits of each
number are significant - to continue the above analogy, if we had
"one thousand, twenty-one hundreds, five tens and three units",
we'd discard the "twenty" from the "hundreds" column (because that
would mean an extra two thousands and if we really wanted them we'd
have put them in the "thousands" column, so it must be an error,
right?) and still be left with the number "1153".
Some spammers make use of this by setting the high-bits of the four
numbers in the dotted quad to make the I.P. address rather long and
confusing. For example:
http://10889035741470030830827987437816582766808.41538374868278621028243970633761010.91343852333181432387730302044767688728495784090.5444517870735015415413993718908291383522/
It looks daunting, but dealing with it is quite simple. Just take
each of the four dotted quads and ignore all but the eight lowest
bits (ie divide each by 256 and take the remainder). In the example
above, you'll end up with:
http://216.242.154.226/
and from here you've got the I.P. address and can continue as
normal.
Alternatively, the URL de-obfuscator at <http://combat.uxn.com/>
will happily decode this kind of really-long-dotted-quad URL for
you.
* The Username Trick
You can specify a username and password in a URL using the @
symbol. For example:
http://jjf:fred@www.myreallysecurewebsite.com/
will log me into www.myreallysecurewebsite.com using the username
"jjf" and the password "fred". But if
www.myreallysecurewebsite.com didn't need a username & password,
the username & password are ignored. Spammers use this to conceal
their website's location. For example, is the following website
located on members.aol.com or www.twinlobber.org.uk?
http://members.aol.com@www.twinlobber.org.uk/ispammedyou/
If you know this trick, it's fairly easy to see through it, so the
spammers have now taken to trying a double-bluff. The username has
to come before the first slash after the "http://" bit, and so the
spammers try things like this:
http://members.aol.com/@www.twinlobber.org.uk/ispammedyou/
This URL references the directory
"@www.twinlobber.org.uk/ispammedyou" at members.aol.com, not a
website at www.twinlobber.org.uk itself.
Many of the URL de-obfuscation tools given below for decoding
Javascript-encoded URLs will also deal with this trick.
* JavaScript
A _really_ nasty technique is to encode the URL in JavaScript; this
can result in URLs that look to you and me like absolute
gobbledegook!
Fortunately, help is at hand. Have a look at these resources:
net.demon URL Decoder
<http://www.netdemon.net/decode.html>
SamSpade URLomatic
<http://www.samspade.org/t/url.cgi>
De-obfuscating JavaScript
<http://www.samspade.org/d/javascript.html>
URL Revealer
<http://javascript.internet.com/equivalents/url-revealer.html>
Downloadable Spam Decoder
<http://spamdecode.homestead.com/>
1.3.1.2 Is the spammer's URL always the place to complain to?
Spammers know that no matter how hard they try to mangle their URL in
the manner described above, some people will be able to decode them.
Therefore, they sometimes try to hide their websites using other
methods as well...
* Page Redirections
Another tactic favoured by some spammers is to spamvertise one URL
but have that URL "redirect" visitors to another. In this way, the
spammer hopes to confuse us, to misdirect complaints, and if the
site that's redirected to is taken down he can just change the
redirection page to point to another, identical site and still
profit from his spam run.
Fortunately, in most cases, page redirection can be followed simply
by looking in your browser's history window. Once you recognise
this, the thing to do is complain to the hosters of both the
redirecting website _and_ the website it redirects to.
* Frames
A variant on the Page Redirection trick is to have a webpage on one
site that contains a frame around a webpage on a second site; this
way "Location:" field of the browser will contain the URL of the
first site (the one containing the frame) and not the URL of the
second site (the one containing the actual content). In Netscape,
you can get the URL of the second site by selecting "Page Info"
from the "View" menu; in Internet Explorer, right-click on the
webpage and select "Properties".
1.3.1.3 Why does the spammer's website's source code look so weird?
Many spammers have learned that anti-spammers get important
information about their operations from the source code of their
website. So they've taken to encoding their webpages in JavaScript;
this is decoded into HTML by your web-browser in order to display the
page, but when you try to look at the source you just see
gobbledegook-like Javascript.
Fortunately, help is at hand. Have a look at these resources:
Encrypted-HTML Decryption Tools
<http://www.swishweb.com/dec.shtml>
De-obfuscating JavaScript
<http://www.samspade.org/d/javascript.html>
SamSpade JavaScript Browser
<http://samspade.org/t/js.cgi>
Net.Demon Haywyre Decoder
<http://www.netdemon.net/haywyre/>
Decrypt URLencoded HTML sources
<http://www.elfqrin.com/urlenchtmldecrypt.html>
Downloadable Spam Decoder
<http://spamdecode.homestead.com/>
Alternatively, users of Internet Explorer 5.x can install the
"Microsoft Web Developer Accessories" add-on from Microsoft. With this
tool you can highlight a portion or all of a webpage, right-click (or
shift+F10) and select "View Partial Source". You now see the plain
HTML that the spammer's JavaScript sent to your browser.
1.3.1.4 How can I stop a spammers' website doing bad things to my
computer?
Some spammers' websites can do some quite nasty tricks, such as
switching Internet Explorer to full-screen mode and not letting you
escape, or opening lots of pop-ups, or re-opening the site every time
you try to leave it, and so forth. If you use IE, you can put the
spammer's site in "Restricted Mode" which will disable all JavaScript,
Java, ActiveX, cookies and anything else on the site the spammer will
try to trick or trap you with. In other browsers you can disable
JavaScript and Java from the configuration window. For more
information see:
Improving Security in IE5 and OE5
<http://home.att.net/~shadow.fox/Disabling_IE_Security_Flaws.html>
You can also use the advert-removing program WebWasher to prevent
abusive JavaScript code from executing. Look for it at
<http://www.webwasher.com>.
However, beware; some spammers know that many anti-spammers surf with
JavaScript permanently disabled and have written websites that look as
if they have been killed if JavaScript is disabled yet are still fully
functional for surfers with JavaScript enabled. Some other spammers
websites will immediately redirect you elsewhere if they detect you
have disabled JavaScript.
1.3.1.5 What if a spammer's website has disabled right-click?
Spammers know that anti-spammers get a lot of information about their
revenue chains by looking at the source code of their website. So
they have taken to writing little bits of JavaScript that intercept
right-mouse-clicks on their webpage to prevent the context-sensitive
menu containing the "view source" option in Netscape and Internet
Explorer from appearing.
This can, of course, be circumvented by deactivating JavaScript in
your browser, but there is also a simpler solution, as the "view" menu
on the menu bar allows you to bring up the page source in some
versions IE and Netscape. Alternatively, Shift+F10 will simulate a
right-click in some browsers. Some Windows keyboards also have a
"context-sensitive menu key" which can be used to call up the menu
you'd normally get by right-clicking. Note that some spammer's
webpages will now intercept these keypresses as well as the
right-click, but the "view" menu on the menu bar should still work.
1.3.2 What can I do about Spam-Supporting ISPs?
Most ISPs hate spam. Sometimes, however, you'll come across an ISP that
is either utterly clueless or refuses point-blank to act against its
spamming customers. In these cases, there are a number of steps you can
undertake.
1.3.2.1 Research
The first step is to check the archives to see whether anyone else is
having a problem with this spammer or with this ISP. If you can
contact others who are having the same problems as you, you can pool
your resources to better achieve an affect.
1.3.2.1.1 news.admin.net-abuse.sightings & groups.google.com
news.admin.net-abuse.sightings is a newsgroup for reporting - not
discussing - instances of Internet abuse. The idea is that
anti-spammers post instances of the spam they see to this newsgroup,
and then other anti-spammers can look in this newsgroup to see if
other people are getting the same spam as they.
But it gets better. Google's newsgroup archiving service at
<http://groups.google.com/> archives most postings to
news.admin.net-abuse.sightings (along with most postings to most
newsgroups); you can use the advanced search feature to search these
archives for instances of a particular spam! For example, if you've
received a spam advertising the website
"www.iamareallybadassspammer.com" you could search for
"www.iamareallybadassspammer.com" in the forum (Google-speak for
"newsgroup") "news.admin.net-abuse.sightings" and find some other
people who have been spammed by that spammer.
Incidentally, the Google archives for news.admin.net-abuse.email are
also a very useful resource for priming yourself on specific issues.
There are few new ideas; most spam-related issues will have been
discussed in this newsgroup at some point or another, and many
spammers have too.
RELATED LINKS
Spamfighting 102 - The Many Uses of DejaNews
<http://samspade.org/ssw/help/d_spam102.htm>
news.admin.net-abuse.sightings Charter
<http://www.killfile.org/~tskirvin/nana/nanas-charter.html>
Google's Advanced Newsgroups Search
<http://groups.google.com/advanced_group_search>
1.3.2.1.2 Halls of Shame
news.admin.net-abuse.sightings is a very useful resource but
sometimes you need something a little more structured. Unlikely as
it may seem, there are anti-spammers who dedicate whole websites to
keeping track of the unrepentant spammers and those who run
spam-support services. These can be very useful in discovering a
spammer's M.O., or just why you're having trouble getting a
spammer's account at a certain ISP killed. Here's just a handful of
such sites...
The Spamhaus Project tracks spam support services and spam-friendly
ISPs, and displays the results in a number of easy-to-navigate
formats, with links to "whois" information, relevant abuse
addresses, and the like. As well as currently-active spamhausen it
lists deceased spamhausen, including how many times they have been
terminated and by which ISPs, and when. There's even a "league" of
leading spam-support services.
The Spamhaus Project
<http://www.spamhaus.org/>
In a similar vein is Sapient Fridge's Spamware Sites Listing; a list
of websites that are selling Spamware or supporting Spam in other
material ways, each coming with various service providers (with
cross-references), handy links to traceroute tools, and their status
with the RBL.
Sapient Fridge's Spamware Sites Listing!
<http://www.spamsites.org/>
The Spammer Quick Reference Guide has by no means as many technical
whizz-bangs, but it looks like a quite useful list of who's spamming
what.
Spammer Quick Reference
<http://www.rahul.net/falk/quickrefa.html>
ROKSO is a good reference of hard-core spam operations that get
thrown off Internet providers time after time after time.
ROKSO (Register of Known Spam Operations)
<http://www.spamhaus.org/rokso/index.lasso>
whew.com has a database of postal addresses and phone numbers
advertised in spams...
Spammer Addresses & Phone Numbers
<http://www.whew.com/spammers/spamaddresses.shtml>
In less general terms, Worldwide Online publishes a list of spammers
they've told to stop spamming them.
What is Worldwide Online doing to Stop Spam?
<http://www.wwonline.com/spammers.html>
1.3.2.1.3 Posting in news.admin.net-abuse.email
If this research turns up a blank, then don't forget that a great
way to contact other spamfighters about a suspected spam-supporting
ISP is to post in news.admin.net-abuse.email.
1.3.2.2 Education
Sometimes an ISP will support their spamming customer simply because
the ISP themselves don't realise that spam is bad. In these cases, it
may be worthwhile taking time to briefly explain (patiently and
without expletives) the problems around spam and why the ISP should
take action against their spamming customers.
If you try this, you'll soon be able to tell whether an ISP is
genuinely ignorant and confused or is purposefully supporting spam.
1.3.2.2.1 What if the ISP doesn't speak English?
There are an increasing number of ISPs, most notably those in the
Far East, but also some in Europe and other parts of the
non-English-speaking majority of this planet, where the technical
contacts don't speak English. This can obviously lead to a
communication difficulty if you yourself aren't fluent in their
native language.
One solution is to use the Babelfish automatic translation service,
but this technology can be a little flakey at times. It's probably
better to get a bilingual friend to translate for you if at all
possible.
For persistant spammers from foreign countries, you may be able to
seek help from some of the foreign-language email abuse newsgroups,
such as:
it.news.net-abuse - Italian net abuse newsgroup
fr.usenet.abus.d - French net abuse newsgroup
de.admin.net-abuse.mail - German net-abuse newsgroup
hr.news.net-abuse - Hungarian I *think*
As a last resort, there are some anti-spam documents written in
non-English languages, to which you may be able to refer
non-English-speaching providers.
RELATED LINKS
BabelFish translation service
<http://babelfish.altavista.com/>
Chinese Spam FAQ
<http://www.ofta.gov.hk/chinese/junk-email/chi_page1.htm>
Japanese Anti-Relay Links
<http://www.chebucto.ns.ca/~af380/boilerplates.html#JapanRelay>
Italian Spamfighting Tutorial
<http://collinelli.virtualave.net/antispam/>
French Anti-spam FAQ
<http://www.usenet-fr.net/fur/usenet/abus/reagir-conseils.html>
German Header-Reading Tutorial
<http://www.th-h.de/faq/headrfaq.html>
Esperanto Anti-Spam FAQ
<http://www.esperanto.net/veb/spam-faq.html>
(All suggestions for this section gratefully received!)
1.3.2.3 Contact their Upstream
An ISP's "upstream" is a bit like an ISP's ISP. Apart from a few very
large ISPs called "backbones", every ISP purchases its connectivity
with the rest of the Internet from one or more other ISPs, which are
called the "upstreams" of the first ISP. Many of these upstreams will
have clauses in their contracts about spam, and if you can show them
that their customer is allowing spam to come through their networks,
they may well cut them off or pressure them to take action.
Occasionally, you'll find that a spammer has tricked you into thinking
you're complaining to their ISP when really you're complaining to the
spammer himself. In these cases, by going upstream you'll find the
spammer's real ISP.
If an upstream provider refuses to act, you can try _their_ upstream
provider, and so forth until you reach a backbone.
1.3.2.4 Publicise their Spam-Supporting
Spam is unpopular, so if you publicise the fact that a large
organisation is supporting spam, then you may be able to force them to
change their mind. A posting about them in news.admin.net-abuse.email
is a good place to start. If the provider has their own newsgroups,
then possibly one of them might be appropriate for a posting too. And
then, if you're really determined, you can move on to online
magazines, newspapers, and so forth.
1.3.2.5 Submit an RBL Nomination
Before we start, I have been asked to emphasize that where not
otherwise specified, everything in this section is the personal
opinion of the FAQ-maintainer and should not be considered to be
statements on behalf of MAPS, whose policies are set out at the
website <http://www.mail-abuse.org/>
We'll discuss the MAPS RBL in more detail in the "Spam Prevention"
section a little later; to quote from
<http://www.mail-abuse.org/rbl/rationale.html>, however - "The MAPS
(Mail Abuse Prevention System) RBL (Realtime Blackhole List) is a list
of networks which are known to be friendly, or at least neutral, to
spammers who use these networks either to originate or relay spam. As
we discover such networks, we deny them access to the part of the
Internet that we are paying for. Because our research into the
attitudes and policies of network owners is hard to duplicate, many
dozens of other network owners have asked for and are now receiving a
real time mirror of our MAPS RBL. "
These measures serve to exert pressure on a spam-supporting provider
to clean up their act, in addition to protecting parts of the Internet
from their spam. MAPS themselves actively work to encourage providers
whose machines are on the RBL to reform and thus escape the RBL.
Many entries on the RBL come about as a result of nominations from
members of the general public. If you can't touch a spam-supporting
provider by any other legal means, then nominating them for the RBL
may be appropriate. Preparing an RBL nomination does not require a
great deal of technical knowledge but it does require some time and
effort. For full information on how to nominate a provider for the
RBL, see the following resource:
Reporting Abuse to the MAPS RBL team
<http://mail-abuse.org/rbl/reporting.html>
There is a mailing list for discussion of potential RBL nominations.
To join, just send a message to:
rbl-nominate@NorthShoreTechnologies.net
with the command
subscribe rbl-nominate
in the body of the message. You will be required to confirm your
subscription, of course.
1.3.2.6 Bitching
A very controversial tactic is that sponsored by
<http://www.bitch-list.net>. This is a service a little like
abuse.net, except that it forwards email to _every_ known contact
address for abusive and unresponsive ISPs. The idea is that by
forwarding abuse reports to as many officials and unrelated
departments as possible, the message will get through somehow.
However, this is considered by many (including the faq-maintainer) to
be sending Unsolicited Bulk Email and thus wrong. And even if you can
get over that moral hurdle, it is extremely impolite.
=========================================================================
------------------------- 1.4 SPAM PREVENTION ---------------------------
=========================================================================
Spamfighting is very important for reducing the amount of spam we'll all
receive in the future but it doesn't do much to affect your spam intake
for today. This section looks at some popular methods that are used to
reduce the amount of spam currently ending up in mailboxes.
RELATED LINKS
Abuse Prevention
<http://www.emailabuse.org/prevent.asp>
SPAM-L FAQ: Blocking Spam
<http://www.claws-and-paws.com/spam-l/blocking.html>
Blocking Spam Relaying and Junk Mail (rather technical)
<http://www.jtap.ac.uk/reports/htm/jtap-040.html>
1.4.1 How can an individual reduce the amount of spam they get?
1.4.1.1 How do spammers get our email addresses?
The obvious way to reduce the amount of spam you receive is to make
sure that spammers don't have your email address! Before we can go
further with this, however, we must learn how spammers get hold of
email addresses in the first place. As it turns out, there are five
main ways:
* They pick them up when they're used publicly on the Internet, e.g.
in a newsgroup posting or on a webpage. This is by far the most
common way, and is known as "harvesting". Using your email address
in a newsgroup or on a webpage is generally understood to solicit
personal, topical replies from individuals, but is not a
solicitation to receive broadcast advertising.
* They buy a CD of addresses from another spammer. These addresses
were probably harvested from newsgroups or webpages in the manner
described above, and are often years out-of-date to boot. As the
saying goes, there is no honour among thieves...
* They guess them. For example, it's a fair bet that
"joe@example.com" could be a valid email address, although there's
no way of knowing to whom it leads. When spammers concentrate this
technique on one domain it is sometimes called a "dictionary
attack". (As it happens, joe@example.com isn't a valid email
address, because "example.com" is a domain reserved for testing and
examples.)
* Our ISPs sell them our email addresses. This is extremely rare.
* We give them to them. Always carefully read the privacy policy of
any website before you give your email address to it, as sometimes
email addresses are passed on or used for purposes other than those
we intended when we gave them.
For a more detailed look at how spammers find email addresses, have a
look at this document:
FAQ: How do spammers get people's email addresses?
<http://www.faqs.org/faqs/net-abuse-faq/harvest/>
1.4.1.2 Choose a non-obvious email address
Some spammers guess email addresses, so it may be a good idea to use
something that spammers can't guess easily. For example, instead of
joe@example.com, why not have joe34z@example.com?
1.4.1.3 Be careful with your email address
The only way to totally eliminate the chance of receiving spam is not
to have an emailbox. Even if you have an emailbox and never ever show
your email address to anyone else, there's still the chance that a
spammer might guess your email address. However, there are a few less
extreme steps you can take to at least reduce the amount of spam you
receive...
* Never, ever give your email address to a company you do not trust
entirely. If in doubt, open a free email account with a web-based
provider such as hotmail.com and use that address for communicating
with the company; that way, if they do spam, you can close the
account and you've only lost a free email account you weren't using
for anything else.
* Never, ever post to usenet using an unmunged email address you care
about. Use a throw-away address from a free email provider or
munge your email address as described in 1.4.1.4. (Some people
have reported that you can reduce spam without impacting upon the
ease of contacting you, by posting with a munged From: address or
an unmunged Reply-To: address, but I can't believe the spammers
won't catch on to this eventually.)
* Never, ever allow your email address to appear on a website,
including on a web-based discussion board.
Some people concerned about privacy enter made-up email addresses into
online application forms and the like. This seems like a good idea,
but it is important to make sure that the made-up domain you use
doesn't actually belong to anyone, otherwise you'll just be sending
spam to the innocent third-party who owns it. This can become a very
serious problem for the owners of some domains popularly used in such
forms.
BAD MADE-UP EMAIL ADDRESS: walt@disney.com
go@away.com
GOOD MADE-UP EMAIL ADDRESS: go@away.invalid
There are several free mail-forwarding services that can be used to
reduce your spam-level. The idea is simple; you give a different mail
forwarding email address to each company that asks for your email
address, and the mail forwarder forwards all mail to these addresses
to your usual mailbox. If a company ever starts to spam you, you just
disable the forwarding address you gave them and you won't get their
spam, without affecting your other incoming mail. Companies who
provide this service include:
SpamEx
<http://www.spamex.com>
Sneakemail
<http://www.sneakemail.com>
Spam Motel
<http://www.spammotel.com>
Despammed (filters mail using the MAPS and ORBS blackhole lists)
<http://www.despammed.com>
1.4.1.4 Address Munging
"Munging" is the act of mangling your email address so that it can
still be read by a human but cannot be automatically harvested by
spammers.
For example, my email address:
jjf@mungedeg.twinlobber.org.uk
Could be munged into any of the following:
jjf<at>mungedeg<dot>twinlobber<dot>org<dot>uk
jjf@mungedeg.twinlobber.org.uk.REMOVETHISTOSENDEMAIL
jjf@NOSPAM.mungedeg.twinlobber.org.uk.NOSPAM
fjj@ku.gro.rebbolniwt.gedegnum.REVERSE-TO-SEND-EMAIL
When munging, you have to be careful not to accidentally munge your
own email address so that it's identical to someone else's, and should
always munge the bits to the RIGHT of the @-sign and not just the bits
to the LEFT (otherwise your ISP will still get your spam even if you
don't yourself). Also, you should ensure that your munged domain name
is NOT an existing domain (else the poor sod who owns it could get
your spam).
Recent drafts of the Usenet message format RFC specifies that the
From: line of a newsgroup posting must contain either a valid email
address or an email address ending in ".invalid". Your munged email
address should really comply with this forthcoming standard, e.g.:
jjf@REMOVE-CAPS-AND-INVALID.mungedeg.twinlobber.org.uk.invalid
Note that some spammers now have harvesting software that can remove
widely-used munges like "NOSPAM".
RELATED LINKS
Address Munging FAQ
<http://members.aol.com/emailfaq/mungfaq.html>
1.4.1.5 Whitelisting
Some ISPs forbid their customers from using a munged email address.
In these cases, whitelisting can be an alternative. In this, you set
up your mail account such that some given word or string of characters
must be in the subject line for any mail to be accepted, and then you
explain this in any newsgroup postings and webpages containing your
address. This way people can respond to you, but spam will be deleted
from the server without you having to spend time downloading and
reading it. This works especially well with webpages, e.g. use:
<A HREF="mailto:unmunged@example.com?Subject=FRIENDLYMAIL: Comments
about my webpage">Send me email!</A>
Then kill any mail that doesn't have FRIENDLYMAIL: in the subject line
and have the rest forwarded to your real email address.
1.4.1.6 Filtering
You can filter your personal email if you wish, deleting messages
based upon the appearance of certain strings of characters or based
upon the sender. For example, depending upon your tastes, it may be a
fair bet that any message with "FREE LIVE SEX" in the subject line is
spam. The risk of filtering, of course, is that some non-spam mail
will accidentally trigger these filters (perhaps by someone trying to
discuss a piece of spam with you?) and this legitimate email will get
deleted too. In order to prevent this, some people just filter
suspected spam into a separate folder, which they clean out by hand
from time to time.
RELATED LINKS
The Spam Bouncer
<http://www.spambouncer.org/>
1.4.2 How can an ISP reduce the amount of spam their customers get?
1.4.2.1 Stop Accepting All Email
This will immediately reduce the spam intake of their customers to
zero. Unfortunately, it also destroys email as a usable communication
medium. In order to prevent this becoming necessary whilst still
taking action to reduce their customers' spam levels, many ISPs adopt
policies that are midway between blocking everything and doing
nothing...
1.4.2.2 Filtering
One tactic used by some ISPs to cut down on spam is filtering. The
ISP scans incoming mail and any messages that match the pattern of a
known piece of spam are discarded. The big danger with filtering is
that of false positives; users are unlikely to be very pleased if some
non-spam mails are mistaken for spam by the filter and never arrive.
1.4.2.3 Blackholing
Blackholing (or Blacklisting) is a variation on filtering whereby an
ISP refuses to accept any email from machines that have a reputation
for producing a disproportionate amount of spam. Many administrators
have had some success with this tactic, although there are two main
problems with it: firstly, someone will have to add more spam-sending
machines to their list as more emerge if the effectiveness of the list
is to be maintained, and secondly it is hard for the ISP to know when
a machine on the list has reformed and is no longer emitting spam.
Of course, with any type of blackholing, any legitimate email from
machines on the blackhole list will be lost along with the spam
emails.
1.4.2.4 Lists
There are several publically available lists of machines that many
ISPs use for blackholing as described above. Having a reliable third
party manage such a list neatly avoids the ISP having to take
responsibility for maintaining a blackholing list, although it does
raise censorship concerns for some people. The oft-repeated mantra in
such discussions is that the list maintainers are not actually
blocking email at third-party ISPs; rather, the ISPs themselves are
blocking the email.
However, the influence of these lists can itself be a powerful weapon
in the war on spam; many organisations will reform or fix their
problems rather than risk remaining on one of these lists.
1.4.2.4.1 MAPS
I have been asked to emphasize that where not otherwise specified,
everything in this section is the personal opinion of the
FAQ-maintainer and should not be considered to be statements on
behalf of MAPS, whose policies are set out at the website
<http://www.mail-abuse.org/>
MAPS (Mail Abuse Prevention Systems) LLC is a not-for-profit
organisation which has in recent years become an important combatant
in the battle against email abuse. Amongst other things, MAPS
publishes non-definitive lists of IP addresses classified according
to various criteria. It is commonly believed that many Internet
Providers and others use some or all of these lists, in a variety of
ways, in order to reduce the amount of spam received by them or
their customers.
Among the lists maintained by MAPS are:
* MAPS RBL - To quote from
<http://www.mail-abuse.org/rbl/rationale.html> - "The MAPS (Mail
Abuse Prevention System) RBL (Realtime Blackhole List) is a list
of networks which are known to be friendly, or at least neutral,
to spammers who use these networks either to originate or relay
spam. As we discover such networks, we deny them access to the
part,of the Internet that we are paying for. Because our research
into the attitudes and policies of network owners is hard to
duplicate, many dozens of other network owners have asked for and
are now receiving a real time mirror of our MAPS RBL."
* MAPS RSS - "Relay Spam Stopper", an initiative aimed at the
problem of spam sent through open mailservers (see 3.4.1 in the
Understanding NANAE chapter of this FAQ for information on open
mailservers). To quote from <http://mail-abuse.org/rss/> - "The
MAPS Relay Spam Stopper (RSS) is a freely queryable DNS-based
database of spam-relaying mail servers. If you run your own mail
server, you can configure it to utilize our list, if you'd like
to refuse mail from these types of servers."
* MAPS DUL - "Dial-up User List". Quoting from
<http://mail-abuse.org/dul/> - "The MAPS DUL lists dial-up and
other dynamically assigned IP addresses for the convenience of
mail administrators wishing to stop this trespassing, and for
Internet providers to help prevent trespassing from their
networks by volunteering their dial-up information to us.".
Because most legitimate (non-spam) email is sent via an ISP's
mailserver, rather than directly from a dynamically-assigned IP
address, blocking email from machines on the DUL can reduce the
amount of spam received. Note that machines on the DUL have not
necessarily ever been used for abusive purposes.
1.4.2.4.2 ORBS
ORBS was a validated list of open mail relays (see section 3.4.1 in
the "Understanding NANAE" part of this FAQ) and other types of
system. Many Internet Providers and others choose to refuse to
receive email from machines on this list, on the grounds that such
email may be spam. By doing this they:
1) Reduce the amount of spam they and their customers receive.
2) Apply pressure to those running open relays to close them.
Other Internet providers choose simply to flag or statistically
count mail coming from machines on the list.
ORBS could be a rather controversial entity, and long and robust
discussions of it often broke out in news.admin.net-abuse.email.
Rather than go into the details here, this FAQ maintainer recommends
that you use Google.com to sample the opinions on both sides of the
argument and form your own views if you're interested.
1.4.2.4.2.1 Did ORBS die in June 2001?
Probably. There's been a great deal of conjecture but the facts
seem to be as follows:
* In early June 2001, two New Zealand ISPs went to court to force
ORBS to remove (allegedly erroneous) entries for their
mailservers from their list. The court upheld their complaint.
* Thereafter Alan Brown of ORBS posted a public apology to these
ISPs which also included the announcement that for unrelated
reasons ORBS was closing immediately.
There has been a great deal of conjecture about whether the timing
of the closure of ORBS was entirely coincidental with this court
case, but I haven't seen any evidence to suggest otherwise. And I
have seen it suggested that Mr Brown was having problems with his
own ISP anyway.
There has been no indication that ORBS will be returning. Several
other organisations have stepped up to fill the breach left by
ORBS:
ORBL
<http://www.orbl.org/>
ORBZ/ORB UK
<http://www.gst-group.co.uk/orbs/>
ORDB
<http://www.ordb.org/>
More information will be forthcoming once the situation has
stabilised.
RELATED LINKS
ORBS now split into three!
<http://www.theregister.co.uk/content/6/19802.html>
1.4.3 How can an ISP reduce the amount of spam their customers send?
With difficulty. However, experience has shown that there are a few
things that can make a difference...
* If an ISP has a reputation for dealing with spammers quickly and
decisively, many spammers will avoid them. If spammers are dealt
with very rapidly indeed, the ISP may be able to shut down a spam-run
before it has completed.
* An ISP can have a clause in their terms of service that allows them
to charge "clean-up fees" to any customers that send spam.
Unfortunately, many spammers sign up using stolen credit-card
numbers, and in these cases clean-up fees aren't much of a deterrent.
It can be messy to collect clean-up fees, too.
* An ISP can implement "port 25 filtering" (see 3.4.2 in "Understanding
NANAE") to prevent their customers from spamming via open relays.
Note that this, however, will prevent their customers from using
external mailservers for legitimate reasons too.
=========================================================================
------------------------ 1.5 ABOUT ANTISPAMMERS -------------------------
=========================================================================
1.5.1 Why do anti-spammers fight spam?
There's no collective answer to this - different people will have
different motivations. However, three of the most common ones are:
1) Fear. We've calculated our email boxes will become useless if spam
becomes a widespread marketing method, and we don't like the idea.
2) Anger. We don't like people stealing our computer resources and so
we're going to defend ourselves.
3) Altruism. We want to make the Internet a better place.
1.5.2 Aren't anti-spammers just a load of anti-business communists?
No. Some anti-spammers own businesses, and most of the rest work for
businesses. Anti-spammers are generally NOT anti-business. In fact,
many anti-spammers happen to believe that businesses that cannot survive
without stealing the computing resources of others (i.e. spamming)
should go the way of the dodo. It's called "capitalism".
1.5.3 Aren't anti-spammers just a load of anti-commerce net-nazis?
See 1.5.2 above.
;
1.5.4 Don't anti-spammers just want to control email on the Internet?
No. Controlling all email on the Internet, apart from being a practical
impossibility due to the distributed nature of the system, would be an
extremely big job to undertake purely to satiate a few egos.
1.5.5 Why don't anti-spammers spend their time stamping out porn instead?
Porn isn't what gets anti-spammers hot-under-the-collar; spam is.
Anti-spammers are drawn from a surprising cross-section of society and
you'll find that they hold wildly divergent views about the contentious
issues of the day, pornography included. However, they are drawn
together by the simple opinion that spam endangers the email system,
which they really rather like.
1.5.6 Why don't you anti-spammers just get a life?
We have lives. Part of our lives involve sending and receiving email
and so we want to protect this when it is endangered.
1.5.7 Are anti-spammers all Systems Administrators?
Sometimes, when reading news.admin.net-abuse.email, you can get the
impression that in order to be an anti-spammer you have to be a
technical wizard and run your own mailserver. This isn't the case at
all, and the point to remember here is that the only people who
contribute to highly-technical discussions will be those with
highly-technical knowledge, but this doesn't mean that there's not
less-technically-minded people reading.
Anti-spammers tend to be drawn from many sectors of life with many
different types of knowledge. Some do run their own networks and their
own mailservers, but many do not. This FAQ-maintainer, for example, is
a Java programmer. Many anti-spammers don't even work in the computer
industry; they can be florists or brick-layers, brain surgeons or
secretaries. It doesn't matter. The skills needed for most
spamfighting are fairly easy to learn and the more voices that are heard
on this issue, the better.
1.5.8 If you anti-spammers are so smart, why am I still getting spam?
So who said we were smart? ;-)
As a problem, spam has not been solved. We will probably never be able
to completely eliminate spam from this world, any more than we can
expect to eliminate robbery, assault, or bad music. Realistically, our
aim must be to reduce the spam levels as much as possible, to a level
where it doesn't greatly impinge on the usability of electronic mail.
That's an achievable goal. We aren't there yet, and we have a long way
to go, but we've come a long way too. Someday, someway, we _will_ get
there.
=========================================================================
------------------------------- CREDITS ---------------------------------
=========================================================================
No document of this magnitude can be the work of only one man. I would
like to thank everyone who offered ideas and suggestions, everyone who
pointed out grammatical errors and gaps in my logic, and places where I
was just plain getting things wrong. This wouldn't have been possible
without you, people.
Thanks also to Paul Anderson for giving the document an official
proof-read.
=========================================================================
----------------------------- USE POLICY --------------------------------
=========================================================================
You may copy and redistribute this FAQ in unmodified form by any means or
media you see fit.
You may modify the presentation of this FAQ as you see fit, so long as the
content remains unaltered.
You may modify the content of this FAQ so long as you appropriately credit
both your changes and the original authors of this FAQ. At a minimum, the
link to the FAQ's website _must_ remain in place.
User Contributions:
[ Usenet FAQs | Web FAQs | Documents | RFC Index ]
Send corrections/additions to the FAQ Maintainer: nanae-faq@usenet.twinlobber.org.uk (James Farmer, FAQ maintainer)
Last Update March 27 2014 @ 02:11 PM
|

Comment about this article, ask questions, or add new information about this topic: