Photos 

STOP SPAM FAQ

Remember! Only YOU Can Prevent Spammage Fires!
Original: 1996 Update: July 2004


One of the first FAQs on spam


RESOURCES

FAQ
Right Way
E-Postage
www.CAUCE.org
AboutSPAM.com
SpamLaws.com
History
Father of MAIL

Permission granted to copy text only. (Photos are copyright.) Original at http://www.mall-net.com Send improvements and suggestions to ops@mall-net.com

Please DO NOT contact us about spam you have received! You have to do it yourself, we can't do it for you. Here's how YOU can take action:

(This is for recipients -- Victims! If you are planning, or even just thinking about sending advertising over the internet, this article is about how and why you will be kicked off the net, and maybe fined thousands upon thousands of dollars. If you want to do it right, if you want user gratitude instead of a swift kick in the rear, see Advertising, Spamming, and The Media. The answers are as old as the hills.)

What is Spam?

Spam is unsolicited e-mail (or news postings) pushing a point. Be it an ad for a used PC, or an urge to vote on a proposition; if you didn't ask for it, didn't sign up on a mailing list related to it, and didn't leave your e-mail address on a web form asking for more information on it, it's spam! And if it's in your mailbox, the sender might be liable for a $500 fine per instance. Some of those laws have been up held in court. See the resources at the end of this article.

The Threat

What is the real threat to the internet? Is it censorship, which would kill some classes of messages? Or would it more likely be those who would dilute our content till we find it not worth logging in?

When do YOU call it quits? 25% spam? 50 advertising messages? A hundred advertising message? Two hundred? Where do YOU draw the line? When do you say it isn't worth logging it?

I wrote this in 1996.

We didn't object loudly enough in 1997, 1998...

In 2004, I get 1 - 2 megabytes spam/hour.

in 2004, the UN and ITU are stepping up to the plate

The real war is just beginning.

A lifespan of 80 years is about 2.5 million seconds.

If a spammer kills one second of 2.5 million people's lives, has he murdered a virtual person?

In 1996, a friend advocated the death penalty for spammers.

In 2004, even the commissoner of the FTC said we need a few good public hangings!

Trespass Analogy

If we do not police our back yard, yelling at those who would camp there and the dogs who would leave their deposits where we may soil ourselves, then how can we expect to call the yard ours? Indeed, there is adequate law of trespass vs right of way case law defining just that. You have to exercise your right of control, or you will lose it. You, yes you, have to object, and object often so as to establish your rights to control your domain.

Current court cases against spammers are refering to spam as refuse and using the dumping analogy.

Theft of Service

So too it is with our internet. We, not the senders, are paying for our connection, our disk space, our computers. These spammers are thus stealing services from US! Why do you think the courts awarded AOL over Sitxy Thousand dollars in damages for the spam Cyberpromo kept sending them?

Other court cases have also awarded users and service providers substantial sums of money for trespass and conversion.

We must object, each and every one of us, to form a legitimate tide of opinion, to form a legitimate tide of complaint mail flooding the service providers each and every time they allow these spammers to foul our private information footpaths and despoil our data back yards.

And with some of the larger service providers, selling accounts to spammer after spammer seemed to be good business to their management. A far better advertising deal for them and their (ab)users, than all those bundled post card decks put together. If it were not, a trivial mail filter placed in these service providers' mail gateways would have stopped all that outgoing spam mail long ago. Clearly with them, is is only the volume of our complaints that make a difference.

So it rests with you. Will you do your part? Remember, Only YOU can prevent spammage fires!

Read our article on Proposal on Controlling Spam and learn how you might be able to set limits, and even profit from receiving spam(!) Meanwhile, your only recourse is vigorous protest to those who dump their trash on our disk drives!

STEP ONE: Finding Where the Junk Came From

This was written for UNIX users. Back in 1995, most of us used UNIX to build our web pages and get out e-mail. Windoze didn't have good tools. It still doesn't! At least compared to UNIX and LINUX. Mac OS/X is Unix underneath, so there's some hope for those who don't run Linux.
We need to do a little simple detective work to see where the spam came from. It is not as simple as sending the spam back to the sender himself, for in most cases, the sender not only does not care, but has shielded him or herself with fraudulent message headers, and/or has used a disposable account to commit his offense against our time and disk quotas.

The first step, is to examine the internet sendmail headers to see where the message was routed through. in the ELM/PINE mail system, it suffices to tap the H key to see the headers. In other cases, one may need to save the message to disk and edit it to examine these headers. You will likely want to save it to disk anyway so as to return it with all these headers intact, so the service providers can examine a representative sample of the messages in order to ascertain the true source. It also results in a larger _legitimate_ message in their mail box. After writing your polite complaint, read in the original file to the bottom of your e-mail complaint. In ELM or PINE, use the control-R command, followed by the name you saved it under. The FROM and RECEIVED FROM lines give the path and times a message traveled through the net. Forgeries often show substantial time gaps in this record, as the forged sections are usually prepared ahead of time. (However, sometimes e-mail does pool here or there as machines are down or busy. Also, not all machines have their clocks set correctly.) Here, we see a typical routing list, destination on top, and source at the bottom. (Lines truncated in length) This one appears not to be forged.

From immune-request@weber.ucsd.edu Sat Apr 27 15:38:05 1996 Received: from mail1.best.com (mail1.best.com [206.86.8.14])... Received: from weber.ucsd.edu (weber.ucsd.edu [132.239.147.2]) .... Received: (from daemon@localhost) by weber.ucsd.edu (8.7.5/8.7.3) ... Received: (emout12.mx.aol.com [198.81.11.38]) by weber.ucsd.edu
Note the numbers in brackets -- these are the internet computer numbers which you can look up with a WHOIS command, and even get the e-mail address of the system administrator in most cases. Usually, you won't need this, but wherever there is a time gap, or no name, it might be worth checking on. Start with the full number, then if you do not get an answer, repeat the WHOIS command, dropping the last number in the set till you do get an answer:
whois 132.239.147.2 ...nothing.. whois 132.239.147 ...nothing... whois 132.239 ...Bingo! UCSD.EDU
Now, we do know that UCSD, a good educational institution with a responsible and curtious computer staff, was victimized along with us. The spammer stole services from them, and since UCSD does receive some funds from the Federal Government, this is something the FBI can investigate, and could be tried in Federal Court, should there be enough complaints. (But perhaps we ought to try complaining to the source often enough, before we encourage Federal Intervention.)
From: SElli97635@aol.com Received: by emout12.mail.aol.com (8.6.12/8.6.12) id OAA04404; Date: Sat, 27 Apr 1996 14:07:55 -0400
The rest looks OK. And here is the payoff -- the message ID. Each message on the net has a message number, and the source is part of it. If a net detective gets this message number, he or she has a much better chance of deciphering the true source and actual time of entry into the net. (Perhaps someone could add to that?)
Message-ID: <960427140754_282092949@emout12.mail.aol.com>

The next step is to do a Traceroute to see what is legitimate, and whom else to complain to. With the above forged headers, this is unlikely to work. However, for less sophisticated spammers, all one need do is:

traceroute

Say our idiot spammer was advertising a mythical web site like www.hotbabes4u.com. We do a whois on www.hotbabes4u.com, then a traceroute on www.hotbabes4u.com. this gives us a list of all the machines each packet has to travel between us, and them. The line just before hotbabes4u.com, "unluckyme.com" is their link to the internet.

... netmach22.bigboys.net ...
... abc.unluckyme.com ...
...hotbabes4u.com
So "unluckyme.com" should be CC'd on our complaints. I run these into another file, and include the whois and tracerout information on my complaints, so they all understand why I am complaining. And if unluckyme.com has their postmaster ID turned off, as many of them to, then I send the bounced mail to the guys above, in this case the mythical "postmaster@bigboys.net".

To make things easier, I use a UNIX shell script similar to the one below to start my form letter, which I then edit to make it more specific. This lets me string several levels of ISP's and any dependent web sites onto one letter with a minimum of effort, as well as keep a log of incidents. Often, I include a list of prior incidents involving that ID or even that ISP when complaining.

#! /bin/sh
date               >spam.memo
date              >>spam.log
cat formletter    >>spam.memo

#Loop through a bunch of ID's
for i in $1 $2 $3 $4 $5 $6 $7 $8 $9
do
   echo "------- $i ---------------" >>spamfile
   whois $i       >>spam.memo 
   traceroute $i  >>spam.memo
   echo $i        >>spam.log
done

Additional Resources:

STEP TWO: Legitimate Response

Fine and dandy, now what do we do? We complain to the postmaster at the site of origin. If there is ANY possibility of forgery in the headers, take the last three or four sites the message passed through, and send a letter to the postmaster at that site. In this case, it would be:

postmaster@aol.com, postmaster@ucsd.com, postmaster@best.com
Except that a few service providers now have abuse ID's to deal with abusers like this. So we add abuse@aol.com, and abuse@netcom.com to this list giving us five addresses to copy the source of the message back to.

Why so many? The last few may be forged, and the sender may have done that from his own computer, so he may be the postmaster at his own domain name. If the abuse does not stop with one message, I escalate by adding more and more up-line service provider's postmasters to the list. Even with the worst frauds, one eventually hits a legitimate postmaster who can tell where it all came from, and is getting enough complaints to try to DO something about it! How many messages does it take for them to get the hint? For AOL, apparently quite a few! That is why we have to keep at it, sending every single spam back with a complaint.

We are not talking mail-bombing, as that would be a denial of service attack, which is illegal under United States Federal law.

But... Each of us has a legitimate complaint! And it is certainly legitimate for us to include ALL the pertinent information needed for them to investigate this matter, and to send that to all parties involved in the abuse wreaked upon us! If every one of us sends a single clear, calm, and respectable complaint message to each of the service providers involved, it's a lot of mail, legitimate mail, that the service providers and their up-line connections have to deal with. Sooner or later, they will get the hint that it is easier to prevent the spam, than deal with so much complaint mail.

Here's my standard reply:

The following COMMERCIAL UNSOLICITED E-MAIL was received by myself. Please educate your users that this spam and can clog people's mailboxes and subject them to criminal prosecution.

In some states, it falls under the definition of illegal faxing without the recipient's permission. (Device having a computer, modem, and printer and capable of printing images. USC 47.5.II.227. Fine: $500 per recipient.)

In some countries, notably England, it falls under the Criminal Statutes regarding unauthorized alteration of computer data or theft of computer resources. (Theft of access time and disk space.)

YOU, Mr. Service Provider, can be held as an ACCESSORY to these CRIMINAL ACTIONS!

EDUCATE your Users or cut them off at the phone line!

Additional Resources:

Does This Work?

The results are a bit mixed in 2004. Many mail systems automated abuse, so each complaint is a vote against the original sender. Enough votes, and the spammer is... forced to find an ISP who charges spammers more, but lets them keep spamming.
A resounding YES!

Remember the immigration lawyers, C. and S., who spammed newsgroups a few years back? A vast tide of e-mailed opinion forced the up-line connections to threaten to disconnect the service providers of those immigration lawyers it they did not drop them. Those lawyers were hounded off three service providers, one after the other! In addition, there are indications at least one of them was disbarred for related activities.

The same happened for another particularly vicious spam which we called "The Suicide Cannibal Cult", for their advocacy of cannibalism and suicide as means of saving the ecology. They spammed thousands of people, some of whom later posted that they needed psychiatric support after being shaken by the psychologically twisted trash received in that spam.

After complaining about many spams, (I was by no means the only one,) I have been notified by AOL and several universities that the spammers I complained about have lost their internet access because it was not their first offense. And more and more on the net, people are being removed on a first incident basis.

Some internet service providers (ISP's) now block cross-posts to more than five news lists. Others have instituted limits on how many addresses can be placed on a TO or CC line, and there are some proposals for fines, noted elsewhere, as well as the use of existing FAX and recorded solicitation laws.

Why does it work? The net is, after all, a series of individual and independent companies cooperating in the transmission of information. The net is not owned by any one company; even the National Science Foundation funding for the internet backbone is long gone. If one service provider ceases to be polite, those next to it can cancel the connection for non-cooperation. So if enough of us complain, things will be done and HAVE been done!

Complaining Clearly Works! At least, it does if enough of us complain.

Remember!

Only YOU Can Prevent Spammage Fires!

(Steal this FAQ, post it at your site.)

Follow the Money

Why is there spam? Who benefits by this spam? There has got to be a payoff someplace. And to collect that payoff, someone has to put out an address. Otherwise, what is the point? Even the occasional hate spam has some kind of tie-back to an organization of some sort, for they usually want to increase their membership.

What is there beyond complaints?

One would suspect that the receiver of these ill gotten gains might have some LEGAL responsibility for encouraging this, either through sales commissions, bonuses, or contests. One would suspect that if they receive enough complaints, or are named in enough suits in small claims court, even the richest organization would soon get the hint. After all, $500 times 1,000 recipients is $500,000 -- half a million dollars. All we have to do, it to make them realize this by Taking Action!

It is up to YOU to sue the SOB's! That's right YOU! Don't you want to make $500 to $1,500? And how many spams did you get last month??? Gee, that's real money! So stop griping about spam, and DO something about it! Unless you are making a ton of money at work, take a spammer to court. (Most small claims courts do limit the actions to parties within the state, so the spammer you sue will have to be from the state you live in.) One is reminded that a recent TV show interviewing the neighbors of a particularly bad apartment complex from which gangs had been running drugs. Each nearby home owner or otherwise offended party sued the owners of the apartment building in small claims court for some modest amount of depreciation of their property and/or incidental damage. Although a few thousand dollar judgment here and a few hundred dollar judgment there there was not much, there were enough affected parties that it added up to an appreciable amount of money! The owners cleaned it up. (Or was it the people who bought the complex after the original owners declared bankruptcy? I forget.)

Similar approaches have been used successfully to stop unsolicited advertising phone calls.

Even fleas and mosquitos have been known to bleed people dry when there are enough of them. And people become wise enough to avoid such places.

Further down, is the address of the recent magazine spams I have received. Those with local access or with Sprint's Friday Free service may want to fax their thoughts and legitimate complaints directly to the company. We have the duty to complain to the source of the offense against us!(Though we do need to be Polite, and reasonably to the point.) If we all fax them our complaints, I would expect their four gigabyte drive would soon overflow with Legitimate Complaints from Legitimately Offended parties. Perhaps then, they would see that encouraging the fouling of our information superhighways with spam, superhighways WE are paying for, does not help them make any money.

Repeat Offenders

The Black List

It is up to each of us to police our own back yards. If we let the neighbors throw their trash in our yards, it is as much our fault as theirs.

Additional Information

  • Cancel Moose and related references.
  • Advertising, Spamming, and The Media
  • Read our article on Proposal on Controlling Spam and learn how you might be able to set limits, and even profit from receiving spam(!) Meanwhile, your only recourse is vigorous protest to those who dump their trash on our disk drives! And to those who let them!

    Remember!

    Only YOU Can Prevent Spammage Fires!

    (Steal this FAQ, post it at your site.)
    www.Mall-Net.com

    More resources in the top left margin.

    -JVV-

    Copyright (C) 1996 - 2004, JVV


    LEGAL NOTICE:

    Sending of unsolicited advertising materials (e.g. spam, UCE, etc.) to or through the proprietary servers owned and/or rented by Mall-Net and affiliates constitutes an actionable trespass to personal property, theft of private resources, and may be construed as wilful harassment.

    What are people looking for on the web? Find out!