sp@m SPAM SPAMMING SPAMMER

Similar documents
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

Anti-SPAM Policy v

Unsolicited Electronic Messages Act 2007

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

Revised: 6-04, 8-09, 1-12 REGULATION #5420

region16.net Acceptable Use Policy ( AUP )

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Internet Acceptable Use Policy

Network Security. Demo: Web browser

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

TABLE OF CONTENTS. Creating an Account Why Use enewsletters. Setting Up an enewsletter Account. Create/Send Logging In.

Policy For Staff and Students

Acceptable Use Policy

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Page 1 of 5. How to unblock automatic picture downloads in messages you receive

LCC xdsl Usage Policy

Handling Unsolicited Commercial (UCE) or spam using Microsoft Outlook at Staffordshire University

SCORECARD MARKETING. Find Out How Much You Are Really Getting Out of Your Marketing

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Special conditions for Swisscom TV Air 1 Scope of application 1.1 Subject This service description relates to the Swisscom TV Air service

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Acceptable Use of Information Technology Policy

TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada.

Spreading the Word: Raising Awareness and Funds with . Presented by: Alec Stern, VP, Constant Contact

Acceptable Use Policy

SPAM FILTER Service Data Sheet

Top 25 Marketing Terms You Should Know. Marketing from Constant Contact

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

How to stay safe online

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.

Evaluating the Perceptions of People towards Online Security

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

Acceptable Usage Policy

Using Security Tools for Spam Control with MDaemon 6.0

Fighting spam in Australia. A consumer guide

PC Security and Maintenance

Panda Cloud Protection

Introduction: What is Spam?... 3 How to Bypass Spam Filters Common Mistakes... 7

Microsoft Outlook 2010 contains a Junk Filter designed to reduce unwanted messages in your

Acceptable Use Policy

INTERNET, USE AND

Acceptable Use Policy - NBN Services

Introduction. SonicWALL Security

Enterprise Marketing: The 8 Essential Success Factors

Spam: What Consumers Really Think

FKCC AUP/LOCAL AUTHORITY

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) , option 1. Access Methods:

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY

1. Introduction Deliverability-Benchmarks Working with Your Service Provider sent delivered...

NEVER guess an address. Your mail will nearly always go to the wrong person.

Top tips for improved network security

Malware & Botnets. Botnets

Who will win the battle - Spammers or Service Providers?

Guidance on political campaigning

What's the difference between spyware and a virus? What is Scareware?

Acceptable Use Policy ("AUP")

ARTICLE 29 Data Protection Working Party

About the Junk Filter

SPAM UNDERSTANDING & AVOIDING

Transcription:

SPAM SPAMMING SPAMMER Have dubious companies or companies unknown to you sent you SMS messages, faxes or mail for dodgy products or products which are harmful to young people? Has someone calling themselves Jenny or Suzy sent you emails containing adult offers? Do unknown persons want to send assets out of their country by using access data to your bank account? If so, you are a victim of spam! These information sheets of the Federal Office of Communications are intended to help you to detect spam and combat it effectively. sp@m As the internet has grown, so has spam. The term spam comes from the Spam brand of canned meat marketed in England and the USA. It appears in a sketch by the famous Monty Python comedy group: a waiter in a restaurant wants to sell Spam whenever he takes an order. When a visitor to the restaurant asks for a different dish, a chorus of Vikings sings the refrain Spam, Spam, Spam so loudly and for so long that the customer s protests are drowned by the noise - 1 -

What is SPAM? The word spam describes an electronic message (e-mail, fax, SMS message or instant message) which is sent to recipients unsolicited or without their consent. Spamming is the sending of such electronic messages to a large number of recipients. The sender of such advertising is termed a spammer. Nuisance value This mass mailing of messages has a serious downside: Private users inboxes or SMS storage are clogged up with unsolicited messages. Sorting out unwanted and proper messages is onerous and time-consuming. The content of messages often constitutes a major unwanted intrusion into private life and is particularly harmful to young people if it is pornographic. The network infrastructure (e.g. the providers mail servers) can become overloaded. Since a large number of recipients can be reached at (virtually) no cost, spamming is especially attractive for mass advertising. Recently, the spam element of total e-mail communications has increased dramatically. Today two out of three messages sent are spam; this threatens the usefulness and the very existence of electronic mail. 02.2006

Why am I receiving SPAM? Spamming works because advertising messages are received and the advertised products are purchased. Mailings would stop overnight if it was no longer possible to make money by spamming. Valid addresses of active users are valuable to spammers and they have several means of obtaining them: sp@m Spammers buy address lists from companies which have made it their business to collect addresses or which sell on their customer data or data from other spammers. They search the internet using special software programs, known as harvesters, which filter out e-mail addresses from member directories of various services from online providers, such as forums, newsgroups and chat rooms. They generate addresses by randomly combining common forenames and surnames - 3 -

How can I protect myself from SPAM e-mails? There is no absolute protection from spam e-mails. If you follow the following basic rules consistently, you can reduce the number of unwanted messages received to a minimum: Only give your personal data (e-mail address, mobile phone number) to trustworthy persons and organisations. In online forms on the internet, enter alternative e-mail addresses to protect your main address. For example, you could use free e-mail addresses. Activate the spam and virus filters which your internet service provider runs on its mail server. If you still receive spam messages, leave them unopened and delete them. De-activate the automatic preview function in your e-mail client (e.g. Microsoft Outlook). If you send one message to many recipients at the same time, enter their addresses in the blind carbon copy (Bcc: field). Urge your acquaintances to do the same there is no extra effort required. However, you will prevent your e-mail addresses being disseminated around the world. In order to prevent further dissemination of e-mail addresses and false messages, you should never forward electronic chain messages. Virus warnings and free mobile phone campaigns are usually bad jokes or hoax mail. If possible, ensure that your e-mail address is not published on websites. If it is necessary to publish an address, make it impossible for it to be harvested, e.g. by displaying the address as an image file or by writing the @ character as at. Give your computer additional protection by installing firewalls and virus scanners. Keep them updated along with your operating system by installing regular updates. This is essential as spam messages are frequently used to spread viruses, worms and trojans. 02.2006

How can I protect myself from SPAM SMS messages? Mobile telephone users are increasing being targeted by spam SMS messages. Dubious or unwanted advertising is often sent out randomly in massive quantities to entire blocks of numbers (079, 078, 076). Spam SMS messages and added-value service numbers Generally, the SMS message invites the mobile user to call an unknown added-value service number (an 090x number or a comparable high-price premium-rate number). In this case, the rate for calls to this added-value service number must be clearly indicated. You can find about this in our information booklet Numbers that cost, which is available on our website (www. bakom.admin.ch/0900), or which can be ordered (032 327 56 40). sp@m Spam SMS messages and short numbers Some spam SMS messages invite you to send a word (e.g. CHAT) to a three- to five-digit short number, to subscribe to a service. In most cases you will then pay for all SMS messages which are received via this subscription. You can find further details on our website: http://www.bakom.admin.ch/dienstleistungen/ faq/00732/00877/00879/index.html?lang=en - 5 -

Measures to combat spam SMS messages and their consequences: Call your service provider s hotline and bar access to all 090x numbers, or only 0906 numbers, from your fixed network and mobile telephone. Providers provide these call bars free of charge. Do not call any numbers which are sent to you in spam SMS messages, simply delete the SMS message, unless you want to submit it as proof if you lodge a complaint. Only subscribe to a service if you are aware of the applicable tariff and the code to de-activate the service. If you repeatedly receive spam SMS messages, report this to your mobile phone operator s hotline and inform them of the precise content of the SMS as well as the sender s number or name. Never answer spam SMS messages to express your indignation. Make a note of the important information and report the incident to your mobile phone operator. From October 2005, providers must provide, free of charge, an option to bar MMS or SMS messages which are sent from short numbers. Consult our section entitled Practical info on our website (www.bakom.ch) to obtain further information on added-value services and SMS messages. 02.2006

Can any action be taken against SPAMMERS? The best protection from spamming is, or course, prevention (cf. information sheets 3 and 4). This is mainly because legal action is not likely to be very successful: sp@m Explicit legal regulation of spamming, such as that contained in various EU directives, does not yet exist in Switzerland, but is to be introduced with the current revision of the Law on Telecommunications (LTC). Some expert opinions consider that spamming might already violate existing provisions of civil or criminal law or the law on fair trading. Such violations would have to be established by the competent cantonal courts. Legal proceedings are frequently very onerous and are associated with financial risks, and their outcome is not always predictable. It is very difficult to enforce any judgement abroad. In most cases spammers are based abroad, in which case legal action in Switzerland makes little sense. It is often very difficult to clearly identify the sender. In individual cases, you should weigh the risks of action against the damage which has been suffered. - 7 -

Why is it difficult to identify SPAMMERS? Spammers generally send their e-mails via unprotected mail servers, specifying a false sender to avoid receiving error messages or complaints. Frequently, so-called open proxies are used. In these cases, the spammer uses the computers of people who are uninvolved, and totally without their knowledge. For the spammer this has the major advantage that he himself is not revealed, only an unsuspecting third party or a fictitious, nonexistent sender s address. The cost to the spammer is extremely low. This is attributable to a feature of the SMTP protocol used to send e-mails: the text of an e-mail can be sent with hundreds of e-mail addresses. The list of these addresses is processed by the server. Thus the spammer only pays the cost of the time for which he himself is online. Also, the effort required of the spammer can be reduced as there are programs which automatically send millions of e-mails throughout the entire world. 02.2006

Planned measures to combat SPAMMING In Switzerland: A ban on spam is envisaged in the draft of the revised Law on Telecommunications (LTC) and the Law against Unfair Competition (LUC). At the same time, telecommunication services providers (TSPs) will be obliged to combat spam. The intention is to provide better consumer protection from unwanted advertising. In principle, the mass mailing of e-mails will not be prohibited. In future, however, in the case of electronic advertising mailings, it will be necessary to provide proof of the explicit consent of all recipients (the opt-in system). The only exception: if a customer has given his address to the seller on the occasion of a purchase, the seller may send him advertising for similar goods. sp@m The bill is currently under consultation with the two houses of parliament. The new text could enter into force in the course of 2006. Internationally: At present, there is no secure mechanism to check whether the sender of a message is actually who he claims to be. The global introduction of mandatory sender authentication systems is currently being intensively debated. A technical solution is conceivable in principle, but will still require some time; experts are talking of two to seven years. - 9 -

Useful Links Special information on spamming Information pages of the CYCOS (Swiss Coordination Unit for Cybercrime Control, Federal Office of Police) http://www.cybercrime.admin.ch/e/fragen-spam.htm MELANI, the Reporting and Analysis Centre for Information Assurance http://www.melani.admin.ch/index.html?lang=en Practical assistance Spamhaus http://www.spamhaus.org/ Spam Abuse Net http://spam.abuse.net/ Security test, news and information pages Cyber Security (in English only) http://www.cert.org/ In addition, almost all telecommunication services providers provide information on spamming and protection from spamming on their websites. Antivirus programmes and firewalls can be obtained in specialist shops or downloaded from the internet. Some of these programmes are provided free of charge. 02.2006

Sheets What is Spam?... 2 Why am I receiving Spam?... 3 How can I protect myself from Spam e-mails?... 4 How can I protect myself from Spam SMS messages?... 5 Can any action be taken against Spammers?... 7 Why is it difficult to identify Spammers?... 8 Planned measures to combat Spamming... 9 Useful Links... 10 sp@m - 11 -

This booklet is is available on the OFCOM website (Services -> Practical info -> Telecommunication or http://www. bakom.admin.ch/dienstleistungen/info/00542/00886/index. html?lang=en). You can also order the printed version from the following address: OFCOM / BAKOM Spam Zukunftstrasse 44 2501 Biel 032 327 56 70 E-Mail: dir@bakom.admin.ch 02.2006