ISPA’s Antispam Activities Bretton Vine, Future Foundation /

Slides:



Advertisements
Similar presentations
IPv6 Prefix Discovery Murray S. Kucherawy. Today IPv4-based abuse prevention relies heavily on a database of IP addresses with bad reputations A.
Advertisements

IP Warming Overview and Implementation Using Eloqua.
© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
Enterprise Project Portfolio Management Solution RAF/2014/00012 Compulsory Briefing Session 31 March 2014 Centurion.
© 2003 Public Interest Registry Whois Workshop Introduction to Registry/Registrar Issues Presented by Bruce W. Beckwith VP, Operations June 23, 2003 Serving.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Deliverability How We Get You to the Inbox. +98 % Our Deliverability routinely ranks in the high 90s. There’s another way of saying this: We Get Your.
1 S.Tronchon Legal Considerations when drafting a standard.
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
Methods for Stopping Spam James Lick
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Blue Security: Challenges With CAN-SPAM Automation Eran Reshef Blue Security, Inc. Sep 2005 Note: This Presentation Describes Blue Security’s Phase II.
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
October 16, Community Conference Broadcast tool Marta Fornal de Seixas: Engaging Networks.
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
Implementation Recommendation Team (IRT) Proposal Comments Sue Todd, Director, Product Management Monday 11 May 2009, San Francisco.
Taiwan Network Information Center Spam Status & Anti-Spam Schemes in Taiwan Taiwan Network Information Center David Chen Sep 5, 2002.
TSpam Traps 101 Spam Traps 101 Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
Copyright © 2000, ZipLink Inc. Patent Pending 1 Mail Message Metering or, how to block outbound spam Robert D. Haskins.
© 2007 Convio, Inc. Implementation of Yahoo DomainKeys Bill Pease, Chief Scientist Convio.
Qualifications Portal Guide Personal Development and Employability Qualification.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
1 The Business Case for DomainKeys Identified Mail.
1 CMPT 471 Networking II DHCP Failover and multiple servers © Janice Regan,
How to Get Permission and Avoid Being Spam Jill Bastian Training and Education Manager.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
An Anti-Spam Method with SMTP Session Abort Nariyoshi YAMAI 1 Kiyohiko OKAYAMA 1 Takumi SEIKE 1 Keita KAWANO 1 Motonori NAKAMURA 2 Shin MARUYAMA 3 1 Okayama.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
A Technical Approach to Minimizing Spam Mallory J. Paine.
Anti-Spam update Unsolicited Electronic Messages Bill and ISP Spam Code of Practice 2 February 2006 Keith Davidson Executive Director.
What Happens at IHE Connectathon…. December 3, 2014 IHE Connectathon Overview Session for IHE SDC Testing Partners.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
1.  Bail provides for the release of a person charged with an offence from custody until the time of the trial.  The person charged makes an undertaking.
Qualifications Portal Guide Personal Development and Employability Qualification.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Arrest and Detention. Questioning the Accused Police can not force a suspect to answer questions Police can not force a suspect to answer questions Section.
Anti-spam activities in Korea Billy MH Cheon / Korea Network Information Center.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
NQT Induction Information for Short Term Supply Teachers.
NQT Induction Edward Pryce, System Leader, (Induction) Lorraine Hunter, WG Professional Programme Coordinator Information for Short Term Supply.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
A competition to encourage Young Professionals across the globe to address a real world engineering challenge Organized by the IET Young Professionals.
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
28th March 2003 SPAM Presenter: Matthew Sullivan.
Understand Protection LESSON Security Fundamentals.
Deliverability and IP Warming
CASL Agenda CASL 101 Complaints Enforcement Actions: CRTC
Fix yahoo mail error code 475 Call Toll-free number
Enterprise Project Portfolio Management Solution RAF/2014/00012 Compulsory Briefing Session Centurion 31 March 2014.
Fix AOL Mail Error Code 554 Call for Help
Cross-Site Request Forgeries: Exploitation and Prevention
Fix Yahoo Mail Box Error 550 Call for Help
Copyright and Higher Degree Students
How to Fix Gmail Error Code 76997?. Call us Fix Gmail Error Code Gmail considers as the best platform for services across the.
Lacey day – 1st April 2019.
How to manage your s Tips and tricks.
Examinations, Dissertation and Rotations
How to manage your s Tips and tricks.
Nebraska Supreme Court rules on interpreters Additions & Amendments
How to Send an Encrypted in Gmail on Android? | Hotmail Customer Service Number
Presentation transcript:

ISPA’s Antispam Activities Bretton Vine, Future Foundation /

Background ISPA launches SpamJam meetups in 2009 –BoF session for spam, abuse desks, IP reputation etc –And free beer! First Hall of Shame spammer report also released in 2009 –1. Database Development –2. Dynamic Seminars –3. James Munro –4. The Peer Group –With a 5 th party having signed an undertaking for removal just after public release of the report

How it works ISPA members and trusted 3 rd parties submit samples of South African spam to a reporting address Then at timed intervals, a set of listing criteria applied –Must have received from X different sources –Must all be within 30 days of each other –Clear indication of spam Producing a list of spammers with addresses, domain names, IP addresses for the period under examination ISPA’s Antispam WG signs off on the report after checking it Hall of Shame report published on ISPA website with addresses and domain names Note: ISPA does not advise using the information to block senders but this is the common practice, including use in a commercial product

Removals Listed spammers can be removed by signing an undertaking to observe best practice in the sending of commercial –Opt-in only –No purchased addresses lists –Commitment to remove complainants –Failure to adhere to undertaking (repeat submissions as evidence) lead to a listing for 3 years Roughly 1 in 15 listed spammers sign undertaking and get removed With at least half of those becoming repeat offenders –One party signed undertaking and resumed their mail shots 20mins later!!

Objections One party (an ISP and bulk provider, but not an ISPA member) turned to the Competition Commission –“ISPA was being anticompetitive as ISPA members also send bulk ” –Case dismissed Another party, Ketler, took ISPA to the high court citing defamation –Ketler failed to pitch up in court, continued spamming till March 2014 –Case dismissed with costs, marked reportable as well –But Judge rapped ISPA over knuckles for process (lack of notifying spammers of listing) –Ketler Paid a settlement of ~R65,000 earlier in 2014 against costs order of ~R75,000 –Signed a 2 nd undertaking to become a model bulk mail sender –But will not be removed from report till 2017

Consequences Spam reporting system is mostly automated but still requires human review of every submitted spam sample As a result of the court case changes are underway to automatically notify –The parties accused of spamming –The abuse addresses for the sending host –ISPs, in particular ISPA members, even if submissions don’t meet listing criteria –But this is fraught with problems as spammers often change their details and many spam-friendly providers ignore abuse notices –Will rely heavily on providers wanting to protect their network reputation Public submissions are also in the works provided ‘antispam activists’ register with ISPA beforehand

Questions Any questions?