Anti-Spam Toolkit of Recommended Policies and Measures

Total Page:16

File Type:pdf, Size:1020Kb

Anti-Spam Toolkit of Recommended Policies and Measures Unclassified DSTI/CP/ICCP/SPAM(2005)3/FINAL Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 19-Apr-2006 ___________________________________________________________________________________________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE ON CONSUMER POLICY Unclassified DSTI/CP/ICCP/SPAM(2005)3/FINAL COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Task Force on Spam REPORT OF THE OECD TASK FORCE ON SPAM: ANTI-SPAM TOOLKIT OF RECOMMENDED POLICIES AND MEASURES English - Or. English JT03207695 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/CP/ICCP/SPAM(2005)3/FINAL FOREWORD In view of the potential for economic and social harm of spam, and the potential for further problems as a result of the convergence of communication technologies, the ICCP Committee, in consultation with the Committee on Consumer Policy, endorsed in April 2004 the proposal for the creation of a horizontal ad hoc “Joint ICCP-CCP Task Force on Spam” to assist in the further conduct and co-ordination of the work on spam and obtain a more rapid consensus on a policy framework to tackle spam issues. The creation of the Task Force on Spam, as a joint subsidiary body of these Committees, was approved by the OECD Council. The OECD Anti-Spam Toolkit was developed in the framework of the OECD Task Force on spam and includes a package of recommended policies and measures addressing regulatory approaches, enforcement co-operation, industry driven activities, technical solutions, education and awareness initiatives, spam measures, and international co-operation and exchange. This document comprises an executive summary, which synthesizes the Toolkit recommended policies and measures and the Task Force Report, divided into eight main sections representing the elements listed above. It is completed by the OECD Council Recommendation of the Council on cross- border co-operation in the enforcement of laws against spam; the BIAC and MAAWG Best Practices on ISPs and Network operators; and the BIAC Best Practices for Email Marketing. In the annexes are also available the Spam Referral proforma, contributed by the CNSA/LAP, and the Mobile Spam Code of Practice, elaborated in the framework of the GSM Association. The Anti-Spam Toolkit is also available online, together with background resources and materials, updated information on countries’ spam laws and a list of national focal points for enforcement authorities. The website is online at www.oecd-antispam.org. The Toolkit was declassified on 29 March 2006 by the ICCP committee and the CCP, and the Enforcement Recommendation was adopted by the Council at its meeting on 13 April 2006. The Task Force’s mandate ends in June 2006. The work of the Task Force was supported by financial voluntary contributions from Australia, the Czech Republic, Italy, and Norway. The work of the Task Force was supported by Dimitri Ypsilanti and Claudia Sarrocco of the OECD Secretariat. © OECD / OCDE 2006. 2 DSTI/CP/ICCP/SPAM(2005)3/FINAL TABLE OF CONTENTS FOREWORD 2 ANTI-SPAM TOOLKIT OF RECOMMENDED POLICIES AND MEASURES: EXECUTIVE SUMMARY 6 Status and evolution of spam 6 A consistent and co-ordinated approach to spam 6 Element I. Regulatory approaches 8 Element II. Enforcement 11 Element III. Industry-driven initiatives 11 Element IV. Technical Measures 13 Element V. Education and Awareness initiatives 13 Individual users 13 Users’ groups 14 Large Companies and SMEs 14 Element VI. Co-operative partnerships 14 Element VII. Spam metrics 14 Element VIII. Global co-operation 15 INTRODUCTION 16 Status and evolution of spam 17 Why spam? How does it work? 19 E-mail spam 19 Mobile spam 20 Voice over IP spam (SPIT) and spam over multimedia IP applications 20 Search Engine spam 21 Blog spam and Splogs 21 Spam and phishing 21 How much does spam cost? 22 ELEMENT I - ANTI-SPAM REGULATION 24 Broad considerations for spam regulation 24 Anti-spam checklist 25 Anti-spam regulatory approach: elements 26 Services concerned 26 Nature of the message 26 Consent 27 Removing consent or “Unsubscribing” 29 Information about message origins 29 Ancillary elements 30 Cybercrime and content-related questions 31 Bulk 32 Labelling 33 Cross-border issues 34 3 DSTI/CP/ICCP/SPAM(2005)3/FINAL Identifying involved parties 34 ELEMENT II - ANTI-SPAM ENFORCEMENT 37 Introduction 37 National co-ordination 37 Enforcement authorities - investigative powers 38 Co-operation and information sharing 40 Cross-border enforcement co-operation 41 ELEMENT III - INDUSTRY DRIVEN INITIATIVE 42 Internet Service Providers 42 Technical measures and self-regulation 43 Banks and other online operators 45 Industry associations 46 The role of private stakeholders 48 ELEMENT IV - ANTI-SPAM TECHNOLOGIES 49 Introduction 49 The importance of tool/technology context 49 Combining tests 50 Types of Anti-Spam Technologies 50 Authentication of electronic mail 50 SPF and/or Sender-ID 51 DKIM /or META 51 Existence of the sender’s domain and eliciting a response 52 Existence of a Pointer Record (PTR) 52 Blacklists/Whitelists 52 Address of the sending server treated as either “dynamic” or “residential” 53 Filtering 54 Heuristic filters 54 Keyword filters 55 Summary or fingerprint filters 55 Bayesian filters 55 Behavioural filters 56 HELO/CSV 56 Greylisting 56 Tokens/passwords 57 Various techniques 57 Envelope tests (BATV, SES) 57 Certification of Bulk Mails 57 Micro payment systems 58 Does the sender’s server reply if you try to respond? 59 PGP signatures 59 System Configuration 59 Anti-Virus tools 59 Anti-spyware tools 59 How to Use This Review of Technologies and Factors to Consider 59 Rejection in the SMTP session 60 Silent rejection 60 Rejection by sending a DSN (Delivery Status Notification or “bouncing”) 61 Delivery to a spam box 61 4 DSTI/CP/ICCP/SPAM(2005)3/FINAL Marking 61 ELEMENT V – EDUCATION AND AWARENESS 62 Introduction 62 Education and awareness strategies: targeting the audience 62 Individual users 63 User groups 63 Users and Phishing 64 Companies and small medium-sized enterprises 64 Direct marketing companies 66 ELEMENT VI – CO-OPERATIVE PARTNERSHIPS AGAINST SPAM 67 ELEMENT VII - SPAM MEASUREMENT 70 Spam metrics 70 ELEMENT VIII – GLOBAL CO-OPERATION (OUTREACH) 73 Introduction 73 The role of global co-operation (Outreach) 73 OECD Outreach activities 74 CONCLUDING REMARKS 75 ANNEXES 76 ANNEX I: DRAFT RECOMMENDATION OF THE COUNCIL ON CROSS-BORDER CO- OPERATION IN THE ENFORCEMENT OF LAWS AGAINST SPAM 76 ANNEX II: BIAC AND MAAWG BEST PRACTICES FOR INTERNET SERVICE PROVIDERS AND NETWORK OPERATORS 80 ANNEX III: BIAC BEST PRACTICES FOR E-MAIL MARKETING 83 ANNEX IV: GSM ASSOCIATION MOBILE SPAM CODE OF PRACTICE 88 ANNEX V: LONDON ACTION PLAN/CONTACT NETWORK OF SPAM AUTHORITIES PRO FORMA FOR THE REFERRAL OF SPAM INVESTIGATIONS AND ACCOMPANYING GUIDANCE (WORKING DOCUMENT) 92 Figures Figure 1. Spam evolution 18 Figure 2. Percentage of spam e-mails at ISPs level (4Q2005) 72 Boxes Box 1. Spear-Phishing 22 Box 2. Acceptable Use Policy (AUP) 43 Box 3. Mobile operators 47 Box 4. Children's education 64 Box 5. Security tips and tricks: An example of a company’s internal anti-spam policy 65 5 DSTI/CP/ICCP/SPAM(2005)3/FINAL ANTI-SPAM TOOLKIT OF RECOMMENDED POLICIES AND MEASURES: EXECUTIVE SUMMARY In view of the wide impact of spam, and the potential for further problems as a result of the convergence of communication technologies and the emergence of ubiquitous communications and mobile Internet, the OECD brought together policy makers and industry experts to form the OECD Task Force on Spam (hereinafter, the “Task Force”). They were charged with developing a framework aimed at tackling spam using a broad multi-disciplinary range of solutions. The Task Force developed the Anti-Spam Toolkit (the “Toolkit”), which recommends a range of policies and measures which should be key elements of a comprehensive public policy framework for addressing the problem of spam. These policies and measures are summarised below. Status and evolution of spam In order for electronic communication platforms, applications and services to contribute to economic and social development, they must be reliable, efficient and trustworthy. Today, however, e-mail and other electronic communication tools may be threatened by unsolicited, unwanted, and harmful electronic messages, commonly known as spam. Unless these threats are curtailed, they could erode users’ trust and confidence. Spam, which began as electronic messages usually advertising commercial products or services, has evolved over the past few years, and to simple advertising messages have been added messages that are potentially dangerous, which can be deceptive, may cause network disruptions, may result in some form of fraud and which are used as a vehicle for spreading viruses and other malware. A consistent and co-ordinated approach to spam There is not a simple solution to stop spam. The openness and decentralised nature of the Internet, which are the main reasons for its success, have also created the conditions leading to a number of vulnerabilities that are increasingly exploited by spammers and other online offenders. The lack of centralised control enables users to hide their identity. In addition, the low cost of accessing Internet and e- mail services allows spammers to send out millions of spam messages every day at an extremely low marginal cost so that only a small response rate is required to attain high profits. However, in combating spam and other online threats it is viewed as important to maintain the openness, flexibility and innovation underlying the Internet. In this context, the Task Force, at the beginning of its mandate, had to decide on the appropriate action to take and the roles of the different stake-holders in fighting spam. There was consensus that Governments should work to establish clear national anti-spam policies in concert with other players, collaborate with the private sector, and promote co-operation across borders.
Recommended publications
  • Trusting Spam Reporters: a Reporter-Based Reputation System for Email Filtering
    Trusting Spam Reporters: A Reporter-based Reputation System for Email Filtering ELENA ZHELEVA University of Maryland, College Park ALEKSANDER KOLCZ Microsoft Live Labs LISE GETOOR University of Maryland, College Park Spam is a growing problem; it interferes with valid email and burdens both email users and service providers. In this work, we propose a reactive spam-filtering system based on reporter reputation for use in conjunction with existing spam-filtering techniques. The system has a trust- maintenance component for users, based on their spam-reporting behavior. The challenge that we consider is that of maintaining a reliable system, not vulnerable to malicious users, that will provide early spam-campaign detection to reduce the costs incurred by users and systems. We report on the utility of a reputation system for spam filtering that makes use of the feedback of trustworthy users. We evaluate our proposed framework, using actual complaint feedback from a large population of users, and validate its spam-filtering performance on a collection of real email traffic over several weeks. To test the broader implication of the system, we create a model of the behavior of malicious reporters, and we simulate the system under various assumptions using a synthetic dataset. Categories and Subject Descriptors: H.1 [Information Systems]: Models and Principles General Terms: Algorithms Additional Key Words and Phrases: spam filtering; reputation systems; trust. Author’s address: E. Zheleva, Computer Science Department, AV Williams Bldg., University of Maryland, College Park, MD, 20742. c ACM, 2009. This is the author’s version of the work. It is posted here by permission of ACM for your personal use.
    [Show full text]
  • Antivirus Software Before It Can Detect Them
    Computer virus A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[1][2] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious.
    [Show full text]
  • Keep Receiving Scam Calls
    Keep Receiving Scam Calls Osseous Fritz lauds endways while Buddy always dishonors his hamlets incardinate everywhen, he invading so shoddily. Kurtis receding bearably as evangelistic Jefferson sniff her canfield confesses gratingly. Lynn still nurture privatively while monachal Barnard outjockey that dandlers. You from still receive calls from entities you also given permission to contact you. If the scammers call you hop UP Do you talk too them whom are very plain at keeping people went the terrible and isolating the victim will not engage them shed a. Commission can give Americans a way of avoid getting telemarketing calls at home Adding. Protecting against fraudulent calls Google My objective Help. How rank I Stop Fake and Spam Calls at My CallSource. Social Security Administration scams There's a blatant way to. Or any email address and others like a wide range of keeping your knees give way in the federal rules for misuse of the app. Do receive several extensions, keep your phone. Don't Call Back FCC Warns of West African 'One satellite' Phone Scam North Texans report receiving a snort of one-ring calls from 232 country. Not Call Registry to both getting spam calls from reputable marketers. Scam phone calls are not cite new crusade but scammers are getting bolder and more. Malicious calls The caller makes threats or talks maliciously and calls repeatedly Scam calls Scams often sound like walking're getting her special offer before the screw is. Does * 67 still work? With scammers getting smarter you pet to fix how is stop these invasive annoying calls There are these few steps you hardly take leave your own.
    [Show full text]
  • Synology Mailplus Server Administrator's Guide Based on Mailplus Server 1.4.0 Table of Contents
    Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet 5 Set up DNS 5 Set up MailPlus Server 7 Set up MailPlus Email Client 10 Third Party Email Clients 13 Troubleshoot 16 Chapter 3: Mail Migration Create a mail migration task on MailPlus Server 18 How to import system configurations from Microsoft Exchange to MailPlus Server 25 Chapter 4: User Licenses Purchase Licenses 27 Install Licenses 27 How to Use Licenses 30 Chapter 5: Account Settings Account System 31 Activate Accounts 32 Manage Privileges 34 Chapter 6: Protocol Settings SMTP 35 IMAP/POP3 36 Network Interface 37 Chapter 7: SMTP Settings Service Settings 38 SMTP Secure Connection 41 Mail Relay 47 Mail Management 48 Personal Settings 61 Chapter 8: Security Settings Spam 64 Antivirus Scan 73 Authentication 77 Content Protection 79 2 Chapter 9: Monitor Settings Monitor Server Status 84 Monitor Mail Queue 88 Monitor Mail Log 89 Chapter 10: Disaster Recovery High-availability Cluster 97 Backup and Restore Mail 103 Syno_UsersGuide_MailPlus_Server_20171114 3 Chapter Introduction 1 The Synology MailPlus suite is an advanced, secured email service with high usability. This suite includes two packages: MailPlus Server and MailPlus. MailPlus Server provides many management details and settings, while MailPlus provides client management and email services. This administrator's guide will guide you through setting up MailPlus Server and provide more detailed configuration instructions including DNS settings, mail service migration, and other security adjustments. MailPlus High-availability will help you achieve continuous email services, the mail queue feature provides management options for deferred messages, and the status monitoring feature provides you an overview of MailPlus health status.
    [Show full text]
  • Image Spam Detection: Problem and Existing Solution
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 Image Spam Detection: Problem and Existing Solution Anis Ismail1, Shadi Khawandi2, Firas Abdallah3 1,2,3Faculty of Technology, Lebanese University, Lebanon ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Today very important means of communication messaging spam, Internet forum spam, junk fax is the e-mail that allows people all over the world to transmissions, and file sharing network spam [1]. People communicate, share data, and perform business. Yet there is who create electronic spam are called spammers [2]. nothing worse than an inbox full of spam; i.e., information The generally accepted version for source of spam is that it crafted to be delivered to a large number of recipients against their wishes. In this paper, we present a numerous anti-spam comes from the Monty Python song, "Spam spam spam spam, methods and solutions that have been proposed and deployed, spam spam spam spam, lovely spam, wonderful spam…" Like but they are not effective because most mail servers rely on the song, spam is an endless repetition of worthless text. blacklists and rules engine leaving a big part on the user to Another thought maintains that it comes from the computer identify the spam, while others rely on filters that might carry group lab at the University of Southern California who gave high false positive rate. it the name because it has many of the same characteristics as the lunchmeat Spam that is nobody wants it or ever asks Key Words: E-mail, Spam, anti-spam, mail server, filter.
    [Show full text]
  • Trustwave SEG Evaluation Guide
    EVALUATION GUIDE Trustwave MailMarshal Secure Email Gateway March 2020 Trustwave Secure Email Gateway Evaluation Guide - March 25, 2020 Legal Notice Copyright © 2020 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior written consent of Trustwave. No part of this document may be reproduced in any form or by any means without the prior written authorization of Trustwave. While every precaution has been taken in the preparation of this document, Trustwave assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. While the authors have used their best efforts in preparing this document, they make no representation or warranties with respect to the accuracy or completeness of the contents of this document and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the author nor Trustwave shall be liable for any loss of profit or any commercial damages, including but not limited to direct, indirect, special, incidental, consequential, or other damages. The most current version of this document may be obtained from: www.trustwave.com/support/ Trademarks Trustwave and the Trustwave logo are trademarks of Trustwave. Such trademarks shall not be used, copied, or disseminated in any manner without the prior written permission of Trustwave. Legal Notice Copyright © 2020 Trustwave Holdings, Inc.
    [Show full text]
  • Administrator's Guide for Synology Mailplus Server
    Administrator's Guide for Synology MailPlus Server Based on Synology MailPlus Server 2.2 1 Table of Contents Introduction 01 Chapter 1: Deployment Guidelines 02 Select a Synology NAS Estimate RAM and Storage Requirements Running Multiple I/O Intensive Packages on the Same NAS Chapter 2: Getting Started with MailPlus Server 06 Connect Synology NAS to the Internet Set up DNS Set up MailPlus Server Set up MailPlus Client Run MailPlus Third-Party Email Clients Troubleshoot Chapter 3: Mail Migration 19 Create a Mail Migration Task in MailPlus Server Import System Configurations from Microsoft Exchange to MailPlus Server Chapter 4: User Licenses 27 Purchase Licenses Install Licenses Use Licenses Chapter 5: Account Settings 31 Account System Activate Accounts Manage Privileges Chapter 6: Protocol Settings 46 SMTPI MAP/POP3 Network Interface Chapter 7: SMTP Settings 50 Service Settings SMTP Secure Connection Mail Relay Chapter 8: Domain Settings 66 Domain Domain Management Chapter 9: Security Settings 83 Spam Antivirus Scan Authentication Content Protection Chapter 10: Monitor Settings 107 Monitor Server Status Monitor Mail Queue Monitor Mail Log Chapter 11: Disaster Recovery 127 High-Availability Cluster Back up and Restore Email Chapter 12: MailPlus Navigation 140 Basic Operations Advanced Settings Introduction Introduction The Synology MailPlus suite provides advanced and secure mail service with high usability. This suite consists of two packages: MailPlus Server and MailPlus. MailPlus Server is an administration console that offers diverse settings, while MailPlus is an email platform for client users. This administrator's guide will guide you through the MailPlus Server setup and give detailed configuration instructions including DNS settings, mail service migration, and other security adjustments.
    [Show full text]
  • Email Security and Anti-Spam Tutorial
    Email Security And Anti-Spam Tutorial NLANR/Internet2 Joint Techs Columbus, Ohio July 18, 2004 Joe St Sauver, Ph.D. University of Oregon Computing Center [email protected] http://darkwing.uoregon.edu/~joe/jt-email-security/ Introduction A Little About This Talk • Paul Love was good enough to invite me to do this tutorial today • I’m not sure there’s much to be said about spam and email security that hasn’t already been said, but I’ll see if I can’t find at least a few new things to share with you this afternoon. • Some of the information we’re going to cover may be “old news” for some of you, and for that, I apologize; folks attending may have radically different levels of expertise. 3 Sticking To The Script • Because we have a lot to cover, and because many spam fighting folks from your institutions who may not be attending today, I've prepared this tutorial in some detail and will try to "stick to the script." • This is a good news/bad news thing: if you're looking at this presentation after the fact, you'll be able to follow what was covered; the bad news is that if you're in the audience today, there won't be a lot of "surprises" mentioned during the tutorial that aren’t in this handout. 4 Format of Today’s Tutorial • We’re going to begin by talking about email security • We’ll take a little break • After the break we’ll talk about anti-spam measures • At the end we can talk about email security issues or spam issues you may be confronting, either here or over beers later in the bar.
    [Show full text]
  • Anti-Spam Methods
    INTRODUCTION Spamming is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi- legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender. There are two main types of spam, and they have different effects on Internet users. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them.) Usenet spam is aimed at "lurkers", people who read newsgroups but rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam subverts the ability of system administrators and owners to manage the topics they accept on their systems. Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email spams typically cost users money out-of-pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.
    [Show full text]
  • Fast and Accurate Detection of SMS Spam Numbers in Large
    Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks using Grey Phone Space Nan Jiang, University of Minnesota; Yu Jin and Ann Skudlark, AT&T Labs; Zhi-Li Zhang, University of Minnesota This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks using Grey Phone Space Nan Jiang Yu Jin Ann Skudlark Zhi-Li Zhang University of Minnesota AT&T Labs AT&T Labs University of Minnesota Abstract combined with wide adoption of mobile phones, makes SMS a medium of choice among spammers. Further- In this paper, we present the design of Greystar, an inno- more, the increasingly rich functionality provided by vative defense system for combating the growing SMS smart mobile devices also enables spammers to carry out spam traffic in cellular networks. By exploiting the fact more sophisticated attacks through both voice and data that most SMS spammers select targets randomly from channels, for example, using SMS spam to entice users to the finite phone number space, Greystar monitors phone visit certain websites for product advertisement or other numbers from the grey phone space (which are associ- illicit activities. ated with data only devices like laptop data cards and Because SMS spam inflicts financial loss to mobile machine-to-machine communication devices like elec- users and adverse impact to cellular network perfor- tricity meters) and employs a novel statistical model to mance, the objective of defense techniques is to restrict detect spam numbers based on their footprints on the spam numbers quickly before they reach too many vic- grey phone space.
    [Show full text]
  • Spam Issues in Developing Countries”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2005), “Spam Issues in Developing Countries”, OECD Digital Economy Papers, No. 99, OECD Publishing. http://dx.doi.org/10.1787/232156241342 OECD Digital Economy Papers No. 99 Spam Issues in Developing Countries OECD Unclassified DSTI/CP/ICCP/SPAM(2005)6/FINAL Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 26-May-2005 ___________________________________________________________________________________________ _____________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE ON CONSUMER POLICY Unclassified DSTI/CP/ICCP/SPAM(2005)6/FINAL COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Task Force on Spam SPAM ISSUES IN DEVELOPING COUNTRIES English - Or. English JT00185109 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/CP/ICCP/SPAM(2005)6/FINAL FOREWORD The OECD Task force on Spam discussed this document during its meeting in March 2005, and recommended it for declassification to the CCP and ICCP Committees through a written procedure, which was completed on 6 May 2005. The report was prepared by Mr. Suresh Ramasubramanian, Consultant to the OECD. It is published under the responsibility of the Secretary-General of the OECD. Copyright OECD, 2005. Applications for permission to reproduce or translate all or part of this material should be made to: Head of publications Service, OECD, 2 rue André-Pascal, 75775 Paris Cedex 16,
    [Show full text]
  • The Commercial Malware Industry (An Introductory Note)
    The Commercial Malware Industry Peter Gutmann University of Auckland (An Introductory Note) For those reading the slides rather than going to the talk: The information was gathered over time and prices and offerings of malware authors change rapidly; all figures and information is/are representative only… Since this is an ongoing work, information is taken from different eras to illustrate changes in the industry and technology; this isn’t how everything works at the current time Malware as a Service Standard commercial vendors are embracing software-as-a- service, SaaS • Malware vendors have MaaS MaaS is advertised and distributed just like standard commercial software Iframe, pop under, накрутка счетчиков, постинг, спам Также я советую если у вас нет сплоита и трафа, вы можете взять в аренду у здесь Iframe exploits, pop-unders, click fraud, posting, spam If you don’t have it, you can rent it here • Online video tutorials of the malware in action Malware as a Service Try-before-you-buy offers for malware Трафик на сплоиты. Для пробы всем Бесплатно 100 посетителей!!! Цена 4 $ за 1000 посетителей - При заказе от 1000 до 5.000 3.8 $ за 1000 посетителей - При заказе от 5.000 до 10.000 3.5 $ за 1000 посетителей - При заказе от 10.000 Traffic for sploits Free trial, 100 visitors!!! Price $4 per 1000 if buying 1000 – 5000 $3.80 per 1000 if buying 5000 – 10,000 $3.50 per 1000 if buying over 10,000 Malware asaService(ctd) Companies producing malware are standard commercial IT commercial arestandard producing malware Companies Malware asaService(ctd)
    [Show full text]