Spam The Spammer - Will It Work?

Spam is everywhere. It's the "in-box lunch meat" nobody likes, wants or looks forward too. Unfortunately, many folks enjoy "eating" this product because if they didn't, there wouldn't be any. Read on?

The federal government's ill-conceived CAN-SPAM Act did little more than make a few legislators feel better about themselves. Did this legislation stop spam? No. Did it at least slow down the flow of spam? Nope.

You can't eliminate a problem by treating the symptoms. If you want to eradicate a problem, you must make its environment one that will not support it.

There's a new plan recently hatched by some well-intentioned folks at Blue Security that several of my clients have asked about. On the surface, it sounds like a good idea but, in my humble opinion, the model is fatally flawed. Here's the scoop?

1. You sign up for their "list" which is basically a "do not spam me list" and that gives them the authorization to act on your behalf.

2. You then have to send EACH spam message to them for inclusion on their list.

3. They then send the spammer a "stop order" (which, if they can even find the spammer, will be ignored).

4. They then flood the spammer with basically a DDoS (Distributed Denial of Service) attack hoping to bring down the spammer's server.

This all sounds great until you think about it rationally...

1. Spammers use "open relays" and hundreds of addresses to prevent you from finding their originating location.

2. The "stop order" they send is just their way of fulfilling the letter of the law under the CAN-Spam act.

3. The part I have the biggest problem with is they then effectively BECOME A SPAMMER by sending thousands of messages in a Distributed Denial of Service attack (DDoS). This is the same thing hackers do when they bring down a website by sending so much traffic to a server it basically shuts down.

4. Most spam is sent from your neighbor's PC. I spend a great amount of my time cleaning "bad guys" from client's computers. There are MILLIONS of "zombie computers" that are infected with auto-dialers and trojans that are being used without the owner's knowledge to send spam. Don't believe me? Just run Counter Spy on grandma's PC and tell me what you find!

5. How long do you really think it will be until the spammers turn the tables on Blue Security and initiate their own DDoS attack? It will be interesting to watch.

Other fight-back tactics against spammers have failed in the past. Last year, Lycos Europe rolled out a screensaver that conducted DDoS attacks against known spammers. Within days, however, Lycos buckled under pressure from security groups, which called it vigilantism, and ISPs who worried that attacks originating from their members would make them liable to legal action on the part of spammers.

Spam will NEVER go away until you attack its real source engine. If you don't order anything from a spammer and don't even click on his link to open the message, the monetary incentive for spam is removed. Spammers operate under the same economic rules as the rest of us...supply and demand.

Take away the demand and you eliminate the supply. Simple.

Allan Gunnneson is the CEO of Gunner Web Group (http://www.gunnnerweb.com), a website design and marketing company based in Kansas.

Online reprint rights granted as long as the article is published in its entirety, including links (http://www.gunnnerweb.com).

Copyright ? Gunner Web Group, 2005

Trevor chicago limos ..
In The News:

Tech guru Kurt "CyberGuy" Knutsson offers solutions to fixing a personal computer that freezes up. There are a number of reasons this might be happening.
The rollout of Apple's iOS 17 brought a subtle "Rebound" notification tone that's gotten some criticism. Kurt "CyberGuy" Knutsson explains a fix.
Fitness centers and workout studios are starting to establish policies that prohibit shooting phone videos to protect people's privacy.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Apple recently notified a small number of iPhone customers in 92 countries that their phones may be under attack by mercenary spyware.
An artificial intelligence-powered home security system can fire paintballs and tear gas at trespassers. The camera identifies human faces and animals.
Technology expert Kim Komando gives her tips and tricks on enhancing your user experience a smartphone and other devices you use everyday.
A new camera called NUCA uses artificial intelligence to create deepfake photos of subjects by stripping away clothing in close to real time.
The Kimberley Kube trail-ready camper has a compact but spacious design and combines luxury, functionality and ruggedness for a weekend getaway.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
Northrop Grumman's Manta Ray uncrewed underwater vehicle aims to revolutionize undersea missions — it glides through the ocean without human assistance.
Learn how to work Google's calendar application to streamline and organize your daily tasks from technology expert Kim Komando.
If you do not want Facebook to have automatic access to your private photos, follow our tips to protect yourself. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.
The bubble behind the clock on your iPhone can appear in different colors. Kurt "CyberGuy" Knutsson explains what each of those colors mean.
Scammers are using the power of artificial intelligence to mimic voices of people and are using the fake voices to commit crimes, like kidnappings.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech guru Kurt "CyberGuy" Knutsson explains the science behind the Invisibility Shield, a 6-foot shield that makes people become invisible.
The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.

Junk Mail Works!

Junk mail works. Why does it work? How does it... Read More

Email Chain Letters - Harmless Fun or Not?

I'm sure I'm not the only person on the planet... Read More

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

Avoid, Shun, Thwart, Prevent, and then Filter Spam

Email is rapidly becoming the standard means of communication among... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

Is There A National Do Not Spam List?

You may have already received a do not spam list... Read More

How to Fight Back BEFORE Youre Falsely Accused of Spam

A friend of mine received a chilling email message from... Read More

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

Managing Spam in 2005

In 1998, nearly 10% of all email traffic on the... Read More

BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter

Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More

20 Words That Kill - At Least When It Comes to Spam Filters

Spam, spam, spam. It's terrible not only for those of... Read More

Get Your News Releases Through the Spam Filters in 11 Easy Steps

In today's spam-filled email world, it's sometimes VERY difficult to... Read More

Spam: The Tasteless Internet Meat of Criminals

Spam. You've all heard of the crazy pink meat in... Read More

Why Your ISP Takes Bribes From Spammers

The lifeblood of the spammer is email. They need to... Read More

The War on Spam: Google Fights Back

Google is engaged in a war. It is a war... Read More

How Spammers Fool Whitelists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

What to Do to Avoid Getting Banned

How would you feel if you found a link on... Read More

Blackhole or Fail - Which One Is Better For Your Mail Server?

Very often SPAMMERS take advantage of catch-all email setup on... Read More

Wiki Reek-y Havoc

The Vandals are coming! And this time they're after your... Read More

Spam Filters Explained

What do they do? How do they work? Which one... Read More

Spam The Spammer - Will It Work?

Spam is everywhere. It's the "in-box lunch meat" nobody likes,... Read More

Stop Intrusive Pop-up Ads and Regain Control of Your Online Experience!

Stop intrusive pop-up ads and regain control of your online... Read More

Email Spam and Phishing

It seems like the volume of email spam has doubled... Read More

How to Avoid Spam Complaints in Your Emails

Spam filters are responsible for deleting a high percentage of... Read More

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

Baylis taxi from Midway ..