Original: 1996
Update: July 2004
One of the first FAQs on spam
RESOURCES
FAQ
Right Way
E-Postage
www.CAUCE.org
AboutSPAM.com
SpamLaws.com
History
Father of MAIL
|
Permission granted to copy text only. (Photos are copyright.)
Original at http://www.mall-net.com
Send improvements and suggestions to ops@mall-net.com
Please DO NOT contact us about spam you have received!
You have to do it yourself, we can't do it for you.
Here's how YOU can take action:
(This is for recipients -- Victims! If you are planning, or even just
thinking about sending advertising over the internet, this article is
about how and why you will be kicked off the net, and maybe fined
thousands upon thousands of dollars. If you want to do it right, if you
want user gratitude instead of a swift kick in the rear, see Advertising, Spamming, and The
Media. The answers are as old as the hills.)
What is Spam?-
Spam is unsolicited e-mail (or news postings) pushing a point. Be it
an ad for a used PC, or an urge to vote on a proposition; if you didn't
ask for it, didn't sign up on a mailing list related to it, and didn't
leave your e-mail address on a web form asking for more information on it,
it's spam! And if it's in your mailbox, the sender might be liable for a
$500 fine per instance. Some of those laws have been up held in court.
See the resources at the end of this article.
The Threat-
What is the real threat to the internet? Is it censorship, which would
kill some classes of messages? Or would it more likely be those who would
dilute our content till we find it not worth logging in?
When do YOU call it quits? 25% spam? 50 advertising messages? A
hundred advertising message? Two hundred? Where do YOU draw the line?
When do you say it isn't worth logging it?
I wrote this in 1996.
We didn't object loudly enough in 1997, 1998...
In 2004, I get 1 - 2 megabytes spam/hour.
in 2004, the UN and ITU are stepping up to the plate
The real war is just beginning.
A lifespan of 80 years is about 2.5 million seconds.
If a spammer kills one
second of 2.5 million people's
lives, has he murdered a virtual person?
In 1996, a friend advocated the death penalty for spammers.
In 2004, even the commissoner of the FTC said we need a few good public hangings!
|
Trespass Analogy-
If we do not police our back yard, yelling at those who would camp there
and the dogs who would leave their deposits where we may soil ourselves,
then how can we expect to call the yard ours? Indeed, there is adequate
law of trespass vs right of way case law defining just that. You have to
exercise your right of control, or you will lose it. You, yes you,
have to
object, and object often so as to establish your rights to control your
domain.
Current court cases against spammers are refering to spam as refuse and
using the dumping analogy.
Theft of Service-
So too it is with our internet. We, not the senders, are paying for
our connection, our disk space, our computers. These spammers are thus
stealing services from US! Why do you think the courts awarded AOL over
Sitxy Thousand dollars in damages for the spam Cyberpromo kept sending
them?
Other court cases have also awarded users and service providers
substantial sums of money for trespass and conversion.
We must object, each and every one of us, to form a legitimate tide of
opinion, to form a legitimate tide of complaint mail flooding the service
providers each and every time they allow these spammers to foul our
private information footpaths and despoil our data back yards.
And with some of the larger service providers, selling accounts to
spammer after spammer seemed to be good business to their management. A
far better advertising deal for them and their (ab)users, than all those
bundled post card decks put together. If it were not, a trivial mail
filter placed in these service providers' mail gateways
would have stopped all that outgoing spam mail long ago. Clearly with
them, is is only the volume of our complaints that make a
difference.
So it rests with you. Will you do your part? Remember, Only YOU can
prevent spammage fires!
Read our article on
Proposal on Controlling Spam
and learn how you might be able to set limits, and even profit from
receiving spam(!) Meanwhile, your only recourse is vigorous protest to
those who dump their trash on our disk drives!
STEP ONE: Finding Where the Junk Came From
-
This was written for UNIX users. Back in 1995, most of us used UNIX to build our web
pages and get out e-mail. Windoze didn't have good tools. It still doesn't! At least
compared to UNIX and LINUX. Mac OS/X is Unix underneath, so there's some hope for those who
don't run Linux.
We need to do a little simple detective work to see where the spam came
from. It is not as simple as sending the spam back to the sender himself,
for in most cases, the sender not only does not care, but has shielded him
or herself with fraudulent message headers, and/or has used a disposable
account to commit his offense against our time and disk quotas.
The first step, is to examine the internet sendmail headers to see
where the message was routed through. in the ELM/PINE mail system, it
suffices to tap the H key to see the headers. In other cases, one may
need to save the message to disk and edit it to examine these headers. You
will likely want to save it to disk anyway so as to return it with all
these headers intact, so the service providers can examine a
representative sample of the messages in order to ascertain the true
source. It also results in a larger _legitimate_ message in their mail
box. After writing your polite complaint, read in the original file to the
bottom of your e-mail complaint. In ELM or PINE, use the control-R
command, followed by the name you saved it under.
The FROM and RECEIVED FROM lines give the path and times a message
traveled through
the net. Forgeries often show substantial time gaps in this record, as the
forged sections are usually prepared ahead of time. (However,
sometimes e-mail does pool here or there as machines are down or
busy. Also, not all machines have their clocks set correctly.) Here, we
see a typical routing list, destination on top, and source at the bottom.
(Lines truncated in length) This one appears not to be forged.
From immune-request@weber.ucsd.edu Sat Apr 27 15:38:05 1996
Received: from mail1.best.com (mail1.best.com [206.86.8.14])...
Received: from weber.ucsd.edu (weber.ucsd.edu [132.239.147.2]) ....
Received: (from daemon@localhost) by weber.ucsd.edu (8.7.5/8.7.3) ...
Received: (emout12.mx.aol.com [198.81.11.38]) by weber.ucsd.edu
Note the numbers in brackets -- these are the internet computer numbers
which you can look up with a WHOIS command, and even get the e-mail
address of the system administrator in most cases. Usually, you won't need
this, but wherever there is a time gap, or no name, it might be worth
checking on. Start with the
full number, then if you do not get an answer, repeat the WHOIS command,
dropping the last number in the set till you do get an answer:
whois 132.239.147.2 ...nothing..
whois 132.239.147 ...nothing...
whois 132.239 ...Bingo! UCSD.EDU
Now, we do know that UCSD, a good educational institution with a
responsible and curtious computer staff, was victimized along with us.
The spammer
stole services from them, and since UCSD does receive some funds from the
Federal Government, this is something the FBI can investigate, and could
be tried in Federal Court, should there be enough complaints. (But perhaps
we ought to try complaining to the source often enough, before we
encourage Federal Intervention.)
From: SElli97635@aol.com
Received: by emout12.mail.aol.com (8.6.12/8.6.12) id OAA04404;
Date: Sat, 27 Apr 1996 14:07:55 -0400
The rest looks OK. And here is the payoff -- the message ID. Each
message on the net has a message number, and the source is part of it. If
a net detective gets this message number, he or she has a much better
chance of deciphering the true source and actual time of entry into the
net. (Perhaps someone could add to that?)
Message-ID: <960427140754_282092949@emout12.mail.aol.com>
The next step is to do a Traceroute to see what is legitimate, and whom
else to complain to. With the above forged headers, this is unlikely to
work. However, for less sophisticated spammers, all one need do is:
traceroute
Say our idiot spammer was advertising a mythical web site like
www.hotbabes4u.com. We do a whois on www.hotbabes4u.com, then a
traceroute on www.hotbabes4u.com. this gives us a list of all the
machines each packet has to travel between us, and them. The line just
before hotbabes4u.com, "unluckyme.com" is their link to the internet.
... netmach22.bigboys.net ...
... abc.unluckyme.com ...
...hotbabes4u.com
So "unluckyme.com" should be CC'd on our complaints. I run these into
another file, and include the whois and tracerout information on my
complaints, so they all understand why I am complaining. And if
unluckyme.com has their postmaster ID turned off, as many of them to, then
I send the bounced mail to the guys above, in this case the
mythical "postmaster@bigboys.net".
To make things easier, I use a UNIX shell script similar to the one below
to start my form letter, which I then edit to make it more specific. This
lets me string several levels of ISP's and any dependent web sites onto
one letter with a minimum of effort, as well as keep a log of incidents.
Often, I include a list of prior incidents involving that ID or even that
ISP when complaining.
#! /bin/sh
date >spam.memo
date >>spam.log
cat formletter >>spam.memo
#Loop through a bunch of ID's
for i in $1 $2 $3 $4 $5 $6 $7 $8 $9
do
echo "------- $i ---------------" >>spamfile
whois $i >>spam.memo
traceroute $i >>spam.memo
echo $i >>spam.log
done
Additional Resources:
STEP TWO: Legitimate Response-
Fine and dandy, now what do we do? We complain to the postmaster at
the site of origin. If there is ANY possibility of forgery in the
headers, take the last three or four
sites the message passed through, and send a letter to the postmaster at
that site. In this case, it would be:
postmaster@aol.com, postmaster@ucsd.com, postmaster@best.com
Except that a few service providers now have abuse ID's to deal with
abusers like this. So we add
abuse@aol.com, and abuse@netcom.com
to this list giving us five
addresses to copy the source of the message back to.
Why so many? The last few may be forged, and the sender may have
done that from his own computer, so he may be the postmaster at his own
domain name. If the abuse does not stop with one message, I escalate by
adding more and more up-line service provider's postmasters to the list.
Even with the worst frauds, one eventually hits a legitimate postmaster
who can tell where it all came from, and is getting enough complaints to
try to DO something about it!
How many messages does it take for them to get the hint? For AOL,
apparently quite a few! That is why we have to keep at it, sending every
single spam back with a complaint.
We are not talking mail-bombing, as that would be a denial of service
attack, which is illegal under United States Federal law.
But... Each of us has a legitimate complaint! And it is certainly
legitimate for us to include ALL the pertinent information needed for them
to investigate this matter, and to send that to all parties involved in
the abuse wreaked upon us! If every one of us sends a single clear, calm,
and respectable complaint message to each of the service providers
involved, it's a lot of mail, legitimate mail, that the service providers
and their up-line connections have to deal with. Sooner or later, they will
get the hint that it is easier to prevent the spam, than deal with so much
complaint mail.
Here's my standard reply:
The following COMMERCIAL UNSOLICITED E-MAIL was received by myself.
Please educate your users that this spam and can clog people's mailboxes
and subject them to criminal prosecution.
In some states, it falls under the definition of illegal faxing
without the recipient's permission. (Device having a computer, modem, and
printer and capable of printing images. USC 47.5.II.227. Fine: $500 per
recipient.)
In some countries, notably England, it falls under the Criminal
Statutes regarding unauthorized alteration of computer data or theft of
computer resources. (Theft of access time and disk space.)
YOU, Mr. Service Provider, can be held as an ACCESSORY to these
CRIMINAL ACTIONS!
EDUCATE your Users or cut them off at the phone line!
Additional Resources:
Does This Work?-
The results are a bit mixed in 2004. Many mail systems automated abuse, so each complaint is
a vote against the original sender. Enough votes, and the spammer is... forced to find an ISP
who charges spammers more, but lets them keep spamming.
|
A resounding YES!
Remember the immigration lawyers, C. and S., who spammed newsgroups a
few years
back? A vast tide of e-mailed opinion forced the up-line connections to
threaten to disconnect the service providers of those immigration lawyers
it they did not drop them. Those lawyers were hounded off three service
providers, one after the other! In addition, there are indications at
least one of them was disbarred for related activities.
The same happened for another particularly vicious spam which we called
"The Suicide Cannibal Cult", for their advocacy of cannibalism and suicide
as means of saving the ecology. They spammed thousands of people, some of
whom later posted that they needed psychiatric support after being shaken
by the psychologically twisted trash received in that spam.
After complaining about many spams, (I was by no means the
only one,) I have been notified by
AOL and several universities that the spammers I complained about have
lost their internet access because it was not their first offense.
And more and more on the net, people are being removed on a first incident
basis.
Some internet service providers (ISP's) now block cross-posts to more
than five news lists. Others have instituted limits on how many addresses
can be placed on a TO or CC line, and there are some proposals for fines,
noted elsewhere, as well as the use of existing FAX and recorded
solicitation laws.
Why does it work?
The net is, after all, a series of individual and independent companies
cooperating in the transmission of information. The net is not owned by
any one company; even the National Science Foundation funding for the
internet backbone is long gone. If one service provider ceases to be
polite, those next to it can cancel the connection for non-cooperation.
So if enough of us complain, things will be done and HAVE been done!
Complaining Clearly Works! At least, it does if enough
of us complain.
Remember!
Only YOU Can Prevent Spammage Fires!
(Steal this FAQ, post it at your site.)
Follow the Money-
Why is there spam? Who benefits by this spam? There has got to be a
payoff someplace.
And to collect that payoff, someone has to put out an address. Otherwise,
what is the point? Even the occasional hate spam has some kind of
tie-back to an organization of some sort, for they usually want to
increase their membership.
What is there beyond complaints?
One would suspect that the receiver of these ill gotten gains might
have some LEGAL responsibility for encouraging this, either through sales
commissions, bonuses, or contests. One would suspect that if they receive
enough complaints, or are named in enough suits in small claims court,
even the richest organization would soon get the hint. After all, $500
times 1,000 recipients is $500,000 -- half a million dollars. All we have
to do, it to make them realize this by Taking Action!
It is up to YOU to sue the SOB's! That's right YOU! Don't you want
to make $500 to $1,500? And how many spams did you get last month???
Gee, that's real money! So stop griping about spam, and DO something
about it! Unless you are making a ton of money at work, take a spammer to
court. (Most small claims courts do limit the actions to parties within
the state, so the spammer you sue will have to be from the state you live
in.)
One is reminded that a recent TV show interviewing the neighbors of a
particularly bad apartment complex from which gangs had been running
drugs. Each nearby home owner or otherwise offended party sued the owners
of the apartment building in small claims court for some modest amount of
depreciation of their property and/or incidental damage. Although a few
thousand dollar judgment here and a few hundred dollar judgment there
there was not much, there were enough affected parties that it added up to
an appreciable amount of money! The owners cleaned it up. (Or was it the
people who bought the complex after the original owners declared
bankruptcy? I forget.)
Similar approaches have been used successfully to stop
unsolicited advertising phone calls.
Even fleas and mosquitos have been known to bleed people dry when there
are enough of them. And people become wise enough to avoid such
places.
Further down, is the address of the recent magazine spams I have
received. Those with local access or with Sprint's Friday Free service
may want to fax their thoughts and legitimate complaints directly to the
company. We have the duty to complain to the source of the offense
against us!(Though we do need to be Polite, and reasonably to the point.)
If we all fax them our complaints, I would expect their four gigabyte
drive would soon overflow with Legitimate Complaints from Legitimately
Offended parties. Perhaps then, they would see that encouraging the
fouling of our information superhighways with spam, superhighways WE are
paying for, does not help them make any money.
Repeat Offenders-
The Black List
It is up to each of us to police our own back yards. If we let the
neighbors throw their trash in our yards, it is as much our fault as
theirs.
Additional Information-
- Cancel Moose and related references.
- Advertising, Spamming,
and The Media
Read our article on
Proposal on Controlling Spam
and learn how you might be able to set limits, and even profit from
receiving spam(!) Meanwhile, your only recourse is vigorous protest to
those who dump their trash on our disk drives! And to those who let them!
Remember!
Only YOU Can Prevent Spammage Fires!
(Steal this FAQ, post it at your site.)
www.Mall-Net.com
More resources in the top left margin.
-JVV-
Copyright (C) 1996 - 2004, JVV
|