CMU Usable Privacy and Security Laboratory Suing Spammers for Fun and Profit Serge Egelman.

Slides:



Advertisements
Similar presentations
How Lawsuits Against Spammers Can Aid Spam-Filtering Technology: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group
Advertisements

Basic Communication on the Internet:
Virginia State Bar Annual Meeting Corporate Counsel Section Update on Do Not Call & Spam Michael Goodman Federal Trade Commission
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Consumer Powers and Protections
Spam Edward W. Felten Dept. of Computer Science Princeton University.
Spyware: Legislative Responses Jody Blanke Mercer University ALSB, Ottawa August 20, 2004.
Confidentiality and Privacy Controls
The Federal Court System
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Anonymity and SPAM The Good, the Bad and the Ugly!
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
CMU Usable Privacy and Security Laboratory Suing Spammers for Fun and Profit Serge Egelman.
Fighting Spam Randy Appleton Northern Michigan University
How To Make Marketing Work for Your Small Business or Non-Profit Presented by Milton Zlotnick SCORE Counselors to America’s Small Business Chapter.
1 Unsolicited Electronic Messages Ordinance An Overview of Implementation and Enforcement 28 May 2007.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
Thurs. Sept. 13. constitutional restrictions on service.
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
Suing Spammers for Fun and Profit Serge Egelman. Background Over 50% of all mail Less than 200 people responsible for 80%
Suing Spammers for Fun and Profit Serge Egelman. Background Over 50% of all mail Less than 200 people responsible.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
CAN-SPAM Act of 2003 International Association of Privacy Professionals June 2004 Kenneth Hirschman Vice President & General Counsel, Digital Impact, Inc.
How to Get Permission and Avoid Being Spam Jill Bastian Training and Education Manager.
ASIC Australian Securities & Investments Commission Electronic Enforcement Keith Inman October 2000.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
MIT Spam Conference 2006 How Spammers Deal with CAN-Spam: Costa Rica, “microbranding” & 18 USC §2257 Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
Chapter 17 E-Commerce and Digital Law
Ethical Issues in Computer Science (slides modified by Erin Chambers)
SCAMS and SPAM John Corker Senior Associate. Oz NetLaw  National Internet legal practice of the Communications Law Centre.  Website at oznetlaw.net.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Deliverability Making it to the inbox
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Government of Brazil Ministry of Justice Department of Consumer Protection and Defense Consumer Protection and Defense in Electronic Commerce Eliane Moreira.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
Presentation will begin shortly. (Please Stand By)
RECENT DEVELOPMENTS IN DIGITAL MEDIA ADVERTISING LAW : CANADIAN EDITION VALERIE WARNER DANIN, ESQ.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
Spam What is spam? What is spam? CAN-SPAM Act CAN-SPAM Act Costs of spam Costs of spam Innovative ways to combat spam Innovative ways to combat spam Preview.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
"You Have Mail" And Other Terms Are Generic Produced by: Asia Green.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Organization of federal and state courts
Mon., Sept. 16.
ALL ABOUT THE FTC By: Brandon Baldwin.
Wiretapping and Encryption
Tues., Sept. 10.
The United States Court System
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
U.S. Circuit Court of Appeals
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Using Technology to change the world
Presentation transcript:

CMU Usable Privacy and Security Laboratory Suing Spammers for Fun and Profit Serge Egelman

CMU Usable Privacy and Security Laboratory Serge Egelman “Two years from now, spam will be solved” -Bill Gates, February 24th, 2004

CMU Usable Privacy and Security Laboratory Serge Egelman Background Over 80% of all mail 2006 MAAWG report Less than 200 people responsible for 80% According to Spamhaus.org

CMU Usable Privacy and Security Laboratory Serge Egelman Statistics

CMU Usable Privacy and Security Laboratory Serge Egelman Statistics

CMU Usable Privacy and Security Laboratory Serge Egelman Background It’s cheap! Wider audience Profit guaranteed Little work involved

CMU Usable Privacy and Security Laboratory Serge Egelman Background Address harvesting Web pages Forums USENET Dictionary attacks Purchased lists No way out

CMU Usable Privacy and Security Laboratory Serge Egelman Profile of a Spammer Alan Ralsky 20 Computers at home  190 Servers around the world  650,000 messages/hour  250 millions addresses  $500 for every million messages  Do the math! Convicted Felon  1992 Securities fraud  1994 Insurance fraud 2008 stock fraud indictment

CMU Usable Privacy and Security Laboratory Serge Egelman Technical Means Text recognition Keywords Statistical modeling Black hole lists Greylisting Cryptography Digital signatures Payment schemes

CMU Usable Privacy and Security Laboratory Serge Egelman Asymmetric Cryptography Example

CMU Usable Privacy and Security Laboratory Serge Egelman Digital Signature Example

CMU Usable Privacy and Security Laboratory Serge Egelman DomainKeys Asymmetric cryptography Verified sender Modified SMTP server Additional DNS records

CMU Usable Privacy and Security Laboratory Serge Egelman SpamAssassin Multiple tests Around 300 Statistical modeling Scoring

CMU Usable Privacy and Security Laboratory Serge Egelman Example DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com;h=received:message-id:date:from:reply- to:to:subject:mime-version:content-type:content-transfer- encoding;b=ARByWZ8/yk5cm8Ew/tJZ5UykezQZkm/fZUV6Wkd0RAb46slxGg 8TRQ91Dc2yi8ZIhbVz1TOc94QeRGgHOfvALEtjqeIA1L1z3yVtTa+4BJG4+oqi TsTicz+bI2hPdGlGFRixbSshslvoyc3FaISIICMx7HlcqCN/wmiG4Q0uub4= From: Matthew Eaton Reply-To: Matthew Eaton To: Subject: test from gmail X-Spam-Status: No, hits=-4.9 required=5.0 tests=BAYES_00 autolearn=no version=2.63 X-Spam-Checker-Version: SpamAssassin 2.63 ( ) on jabba.geek.haus

CMU Usable Privacy and Security Laboratory Serge Egelman Sender Policy Framework Prevents forgery Requires DNS record Recipient confirms sender Open standard

CMU Usable Privacy and Security Laboratory Serge Egelman Greylisting Whitelist maintained Other mail temporarily rejected Spammers might give up Mail delivery delayed Spammers will adapt

CMU Usable Privacy and Security Laboratory Serge Egelman The Hunt Contact Info URLs Addresses WHOIS/DNS USENET news.admin.net-abuse. Databases: Spews.org Spamhaus.org OpenRBL.org

CMU Usable Privacy and Security Laboratory Serge Egelman Legal Means Foreign spam, local companies One weak federal law 38 State laws (as of 2006) A few heuristics: Forged headers “ADV” subject line Misleading subject

CMU Usable Privacy and Security Laboratory Serge Egelman Telecommunications Consumer Protection Act The TCPA (U.S.C 47 §227): "equipment which has the capacity to transcribe text or images (or both) from an electronic signal received over a regular telephone line onto paper.“ $500 or $1500 fine per message Mark Reinertson v. Sears Roebuck Michigan small claims

CMU Usable Privacy and Security Laboratory Serge Egelman Telecommunications Consumer Protection Act ErieNet, Inc. v. VelocityNet, Inc. US Court of Appeals, 3 rd Circuit, No September 25, 1998 “it is my hope that the States will make it as easy as possible for consumers to bring such actions, preferably in small claims court.” –Senator Hollings “The question, therefore, is whether Congress has provided for federal court jurisdiction over consumer suits under the TCPA.” U.S.C. 28 §1331: The district courts shall have original jurisdiction of all civil actions arising under the Constitution, laws, or treaties of the United States

CMU Usable Privacy and Security Laboratory Serge Egelman The CAN-SPAM Act 15 U.S.C. § 7702 Requirements: Deceptive Subjects Falsified Headers Valid Return Address Opt-Out Enforcement: FTC States ISPs Do-Not- List Bounty Hunters Sender: “a person who initiates such a message and whose product, service, or Internet web site is advertised or promoted by the message.” Preemption

CMU Usable Privacy and Security Laboratory Serge Egelman Virginia Laws The VA Computer Crimes Act (18.2-§152) Forged headers $10/message or $25,000/day AOL and Verizon Verizon v. Ralsky: $37M AOL v. Moore: $10M U.S.C. 28 §1332: The district courts shall have original jurisdiction of all civil actions where the matter in controversy exceeds the sum or value of $75,000, exclusive of interest and costs, and is between citizens of different States.

CMU Usable Privacy and Security Laboratory Serge Egelman Pennsylvania Laws The Unsolicited Telecommunications Advertisement Act (73 §2250) Illegal activities: Forged addresses Misleading information Lack of opt-out Only enforced by AG and ISPs $10/message for ISPs 10% from AG

CMU Usable Privacy and Security Laboratory Serge Egelman Small Claims Court Court summons: $30-80 Maximum claim: $8000 Winning by default because the spammer didn’t bother to show up: Priceless

CMU Usable Privacy and Security Laboratory Serge Egelman So you’ve won a judgment… Domesticate the judgment Summons to Answer Interrogatories Writ of Fieri Facias Garnishment Summons

CMU Usable Privacy and Security Laboratory Serge Egelman Criminal Penalties You’ve got jail! 1 year 3 years:  $5,000 profit  >2,500 in 24 hours  >25,000 in a month  >250,000 in a year 5 years for second offense

CMU Usable Privacy and Security Laboratory Serge Egelman Questions?