Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

The US Continues Its Reign As King of Spam

samzenpus posted more than 4 years ago | from the winning-isn't-everything dept.

Security 118

An anonymous reader writes "The United States continues its reign as the king of spam, relaying more than 13% of global spam, accounting for hundreds of millions of junk messages every day, according to a report by Sophos. However, most dramatically, China – often blamed for cybercrime by other countries – has disappeared from the 'dirty dozen,' coming in at 15th place with responsibility for relaying just 1.9% of the world's spam."

Sorry! There are no comments related to the filter you selected.

Less spam on the weekend (5, Interesting)

MichaelSmith (789609) | more than 4 years ago | (#32025694)

I see about a 40% variation in spam during the week. The minimum seems to be Monday morning for me, which is Sunday night in the US. I definitely get the impression that it drops off when work computers are shut down for the weekend.

Re:Less spam on the weekend (-1, Troll)

Anonymous Coward | more than 4 years ago | (#32025720)

Yeah because naturally your anecdotal experience perfectly reflects the sum total of all Internet activity! What a fuckwad you are. Even niggers and dune coons have more sense than you do.

Re:Less spam on the weekend (-1, Offtopic)

tpstigers (1075021) | more than 4 years ago | (#32025786)

Even niggers and dune coons have more sense than you do.

Do the rest of humanity a favor and shut up. Forever.

NO U (-1, Flamebait)

Anonymous Coward | more than 4 years ago | (#32025890)

Do the rest of humanity a favor and shut up. Forever.

NO U, namefag.

nigger nigger nigger jew jew jew

Re:Less spam on the weekend (-1, Offtopic)

Anonymous Coward | more than 4 years ago | (#32026228)

Hah-hah! You fed the troll. Even aryans and fuckin' honkies have more sense than you do.

Do the rest of humanity a favor and quit feeding trolls. Ever.

Re:Less spam on the weekend (3, Funny)

jamesh (87723) | more than 4 years ago | (#32026612)

Me too. I recently got an email with a subject "JAMES URGENT HELP REQUIRED FIRST THING TOMORROW. SHIPMENT NO 40" and it was only because I thought "hmm... I don't normally get spam at this hour" that I read it to find that it was actually a legitimate email. An all caps subject with 'URGENT HELP REQUIRED' in it is almost always spam.

Re:Less spam on the weekend (1)

Antiocheian (859870) | more than 4 years ago | (#32026670)

And in particular of type 419

Re:Less spam on the weekend (3, Funny)

buchner.johannes (1139593) | more than 4 years ago | (#32026794)

Woman to husband: "Please turn off the light so I can sleep."
World to USA: "Please turn off the computers on the weekend so we can get to work."

Re:Less spam on the weekend (2, Funny)

halowolf (692775) | more than 4 years ago | (#32028842)

This story reminds me of older Slashdot discussions on using blacklists to stop spam and how entire countries should be blocked. I pointed out that they should start with the USA but they didn't really like that point of view, being American and all.

Re:Less spam on the weekend (0)

Anonymous Coward | more than 4 years ago | (#32029344)

obviously that's because it's really Chinese spam, sneakily rerouted through the US. They must have set the commie bits to 0

Re:Less spam on the weekend (2, Interesting)

V for Vendetta (1204898) | more than 4 years ago | (#32029358)

It depends at which kind of spam you're looking at. And in these days we should perhaps start to distinguish the different types.

If talking about the "classic spam" aka email spam, then yes, I agree with your observation.

However, (forum) comment spam in our case (Germany) stems mostly from IP address blocks allocated to Russia and former-USSR countries (Azerbaijan, Belarus, Latvia etc.) and China. I would guesstimate those two make up of 80% of the spam attempts. Very few comment spam attempts stem from IPs allocated to U.S. providers, so the U.S. is at least for us not "King of spam" there. The remaining 20% are equally shared between North America, Europium and African IP addresses. Of the top of my head, I can't remember comment spam from South America or Australia/New Zealand.

We're Number One !!!! (4, Funny)

Anonymous Coward | more than 4 years ago | (#32025710)

We're number one !!!!
U.S.A. !!!

Re:We're Number One !!!! (1)

TouchAndGo (1799300) | more than 4 years ago | (#32025912)

Is there a prize? Possibly an awards show? I want to see the acceptance speech

King of Spam (5, Funny)

grcumb (781340) | more than 4 years ago | (#32025938)

I sent 2 terabytes of mail today
(Sold my soul right there)
It's the same old thing as yesterday
(Sold my soul right there)
I'm a black hat burning out a thousand bots
(Sold my soul right there)
Filtering's futile and I won't get caught....

They have blocked all your torrents, you can't even ping
They've been shaping your traffic into doughnut rings
But still they can't stop me 'cause of what I am
For now and forever I'm the King of Spa-am

King of Spam
I'll always be
King of Spam....

...With apologies to the Police.

Re:King of Spam (1)

Tackhead (54550) | more than 4 years ago | (#32026076)

Well-played! (Beat me by 15 minutes!)

Re:We're Number One !!!! (4, Funny)

Daniel Dvorkin (106857) | more than 4 years ago | (#32026012)

I am Liz Cheney duaghter of recenly deposed USA vice President Dick Cheney and I am seking your assitsance with confidential transaction. As you may know my father during his time in office amassed a firtune of $135,000,000 (one hundered thirty five million USA dollars) and I now need your assistantse to move it out of country. As a bionus for your help on this Transaction I can offer you "magic blue pills" guaranteed made in USA to enlarge your penis to massive unheard of USA propportions and also 1000s of young marriagebale USA women seeking to meet you for life in new country. Please contact me at +001 212 867-5309 or conact USA embassy in your Country.

Re:We're Number One !!!! (4, Funny)

Anonymous Coward | more than 4 years ago | (#32026138)

As a bionus for your help on this Transaction I can offer you "magic blue pills" guaranteed made in USA to enlarge your penis to massive unheard of USA propportions

I nearly fell for this, but a deal genuinely this good wouldn't have been offered to every reader. Generally, I only respond to offers with a fair amount of built-in exclusivity, such as when I happen to be the 1,000,000th visitor to a site.

Re:We're Number One !!!! (1)

njen (859685) | more than 4 years ago | (#32026586)

Dear Liz Cheney,

Your plight strikes a sympathetic cord with me. If you are able to accommodate me these few points, I think I can help you out:
1) I am only interested in women of "loose" morals.
2) I want to give your father a head noogie.
3) I am not fond of the taste of the colour blue. Please supply pills that taste like red.

Concerned International Citizen

Re:We're Number One !!!! (0)

Anonymous Coward | more than 4 years ago | (#32026702)

Jenny, is that you?

Re:We're Number One !!!! (0)

Anonymous Coward | more than 4 years ago | (#32027350)

Didn't Bill Clinton once make a confidential transaction of a similar nature?

But seriously, having lived under a brutal dictatorship that cracks down hard on the internet for a notable portion of my life this kind of thing is one of the reasons why people in dictatorships like China and Iran simply don't want a "Free and open capitalist system". The US needs to seriously crack down on these jerks. This isn't capitalism or freedom of speech, it's a criminal impossition on the rest of the world that needs to be stopped.

I get English language spam from US spammers all the time and I'm not even American, or living in America. My in box is being polluted by foreigners peddling porn or garbage pills. I'd rather not have it there.

Come on America, do something about it.

Re:We're Number One !!!! (1)

stifler9999 (1184283) | more than 4 years ago | (#32028580)

I rang this number but Jenny who answered told me that there was no one called Liz at that number. She did say that Tommy would be back in 2 hours and may know of a Liz.....

Re:We're Number One !!!! (0)

Anonymous Coward | more than 4 years ago | (#32028720)

I don't know, this graph [] rates the US as #1 and China as #4. It's been that way consistently for some time so it's a bit hard for me to believe China is really that far down the list.

Vindication (0)

Anonymous Coward | more than 4 years ago | (#32025716)

Clearly this means the Great Firewall of China is finally doing its job.

Good filters have hidden the problem (4, Interesting)

beakerMeep (716990) | more than 4 years ago | (#32025766)

Good spam filters like Gmail's and other have really hidden the problem from public view. People seem to much more freely post their email adresses in forums nowadays with little to no fear of it being harvested. Of course it does get harvested, but they dont care as they don't see it. I guess that's not such a bad thing though, but it's still a strain on the internet as a whole I would think. I wonder what the data size numbers look like rather than % of messages by country. Anyways, my point is just that I wonder if there will be little to no effort going forward from government types or PHB's who don't wanna spend the money for something that doesn't seem to be a problem.

Re:Good filters have hidden the problem (4, Informative)

Kenja (541830) | more than 4 years ago | (#32025800)

On a domain I've had since the 80's I get around 500-1000 spam messages a day. Google's (postini) spam filter catchs about 95% of them. 25-50 spam messages a day is still too many, and gods help me if I have to go in search of a message that got filtered unintentionally.

Maybe it isn't god but your totalitarian govt (-1, Offtopic)

Snatch422 (896695) | more than 4 years ago | (#32026886)

Why I am the most hated and persecuted intellectual in the USA
Having a firm and wise moral code as well as a thorough understa nding of the elite secrets of the USA will lead you down a dark and lonely path of horrendous illegal psychological torture and covert physical abuse, a disgusting and utter violation of human rights amounting to technological and psychological modern-day slavery in a system run by very deceptive criminals.

My personal ideological disagreement and disaffection
My motivations are uniquely intellectual. I am fortunate enough to possess a great deal of knowledge and intellect that are being wasted and improperly utilized. My goal in life has always been instinctively singular and stems from current technology: infinite learning. Devoting yourself fully to learning eventually leads to using science and technology to build a more intelligent system than our own nature, that of a Human Being. In fact, I would go so far as to say that intelligence can be defined in terms of the ability of a system to achieve the upper limit on intelligence which is more commonly called the singularity. In other more practical terms, the real test of the intelligence of humanity (or any type of agents) is whether or not it will achieve super-intelligence.

Slavery/serfdom through psychological control
Secret technology has grown out of control since WWII when the massive amount of money being spent on atomic bombs started being spent on secret methods of centralized control involving advanced surveillance gear, directed energy weapons and behavioral modification which is also known as mind control. The impact and consequences this has on our lives and environment is drastic and devastating leaving us rapidly heading toward totalitarianism. It has enabled a secret high-tech control over people that is completely psychological and invisible. The intelligence community can then effectively run the country in a totalitarian manner using this hidden power structure. The intelligence community consists of the domestic investigative agency known as the Federal Bereau of Investigation (FBI), the foreign intelligence agency known as the Central Intelligence Agency (CIA), the domestic security agency known as the National Security Agency (NSA), military intelligence (MI) and the international policing organization known as Interpol.

Psychological warfare/torture and dirty psychology using operant conditioning chambers/clandestine research laboratories
Physical trauma inflicted through directed energy weapons used on the subconscious mind or body also to control devices such as tear duct, rectal pain or inner ear transmission implants. The target will have body manipulations such as covert surgeries or skin conditions covertly inflicted upon them especially in places hidden by clothing but noticable to the target (specific harmful topical chemicals well known to dermatoligists are generally used): eczema, warts, acne, moles, in-grown hairs, in-grown toenails, freckles, strange hair growth. Other signs of abuse or tracking are: injection marks on upper right arm, tracking chip implants obscured in left eyebrow, waking up feeling the post-anesthetic type drugged-out dazed and confused mental effect,

Emotional trauma inflicted through friends and family of the target as well as other paid spies. Using advanced psychological skits, these trained actors will attempt to achieve contradictory and abusive drama and other absurd affairs in a persons life.

Covert surveillance using through-the-wall ultrawide band surveillance or satellite surveillance. Places of residence, work or anywhere else considerable time is spent will be under this type of inevitably corrupt surveillance.

Signs of living in a clandestine research laboratory: Remote viewing which is simply the use of a special video camera that can be hidden in a home to monitor a person against their knowledge or will similar to the new airport security technology ? the CIA ran a clever disinformation campaign so that many thing remote viewing involves some paranormal telepathic ability. Just take a ruler to draw the floor plan while measuring the dimensions of your home - if there is a 4ft.x4ft. unexplainable gap that could potentially have a trap door to the unit below then you may be under a criminal psychological assault.

Covert computer surveillance: Remote router connection and packet monitoring, Remote process monitoring, Remote desktop monitoring, Remote forensic scanning

Covert computer methods utilized: Bogus Microsoft signed files to avoid detection, Misdirection by counterfeiting software to make it seem like legitimate software such as AOL or McAfee antivirus, BIOS hack on the computer, Firmware hack on the router allowing one to conduct man-in-the-middle attacks

Covert computer attack vectors potentially built into a software suite: Pre-choosing the targets media player playlist, Causing the targets media player to crash, Causing the targets Internet browser to crash, Causing the targets Email client to crash, Causing the targets desktop environment to flake out with drawing problems by resizing the start menu or button, Causing the targets machine to hang/blue screen, Causing the targets cut/copy clipboard to be unnecessarily cleared, Deliberately injecting typos into document target is currently working on, Tampering with data uploaded or downloaded from the Internet, Sabotaging the screensaver, computer account locking mechanism or monitor sleep sequences, Sending gratuitous spam junk emails to a target utilizing subconscious suggestion, Using directed energy weapons to scramble the electronics in the computer causing a shutdown, blue screen, driver crash, fan humming, magnetic drive or optical drive failure, etc

Covert sabatoge and harassment through technology and actors

'A one-way voice link (OWVL) is a shortwave radio broadcast used by spy networks to communicate with agents in the field. This system often employs recorders to transmit pre-recorded messages in real time or in 'burst transmissions,' which minimize the time that a spy needs to be 'on the air.' ' - Wikipedia

Directed energy weapons (DEWs) for monitoring vital organs, mental imagery, sub-vocalization, subconscious feelings.

Directed energy weapons (DEWs) to send sub-vocal messages utilizing subconscious suggestions, inner ear transmissions to cochlear implants with barely audible repetitive keywords, visual cortex transmissions during sleep to influence dreams and the subconscious mind, anal probe implant transmissions, manipulating subconscious feelings.

Spies or Inner ear transmission specific phrases likely stemming from German occultism and Nazi Germany: 'alright' 'let's beat him' 'he hates the FBI' 'he's evil' 'he's retarded' 'he's sick' 'I hate him' 'fag' 'he's gay' 'motherf***er' 'f***er' 'f*** you' 'let's beat his ass' 'he's dead' 'come on' 'unbelievable' 'i hate this f***er'

Gang/vigilante stalking campaign

Strategic positioning to take over a block: Meth lab in a recessed house with a long driveway and a limo service as a front. Corner houses are important since they are typically cheaper section 8 houses as they are noisy and less spacious but they are necessary for gangs to own as lookout points since they can see cars and people coming in all directions - it is most common for the gang to start taking over a block with the 4 corner properties on the block. Lookouts are needed practically 24/7 since even if the gang is not actively doing activities, they cannot risk their property being damaged or other mishaps occurring without their knowledge on their block. Security cameras make good sense for corner lots to help with this. Move in from the corner a house at a time by making the block noisy and undesirable to the residents. Paying or bribing younger children 10-12 years old with drugs to ride on their bicycles up and down the block very slow looking pretty drugged out. Brothels are typically the next over from the corner as the traffic actually in and out of the building needs the protection of the lookout and the next from corner location is usually one of the first target's uprooted. Every gangster has a car that matches the job - many stalkers/lookouts have motorcycles, street dealers have dark blue Porsches, enforcers drive beige sports cars with no front license plate but gang symbols on both sides of the bumper instead, the high tech stalker drives a white Lexus sedan, the fancy prostitutes drive SUVs and may make chemical pickups for the lab, Limos for the Limo driver, the construction workers and simpler ones drive Jettas and Priuses. Identifying targets to stalk - snitches/informants identification and those who are not friendly or deal with the gang. One way is to bring in a drug dealer in the dark blue sports car and have him drive in super noisy while being very observant as to the curtain activity down the block. He will get out of his car and slam the door extremely loudly, walk directly into the middle of the road and spit the loudest spitball he can make, and continue to look for people that will peer out. After this theatre, most likely with the help of other lookouts, he can feel safe to do business in the area. Cars will leave in whatever direction that the target's identified as untrustworthy will have the least glimpse of their license plate as possible and speed away from the immediate vicinity as fast as possible. Hand signals - can easily communicate the important basics from one end of the block to the other almost instantly using the lookouts.

Stalking tactics including street theatre but only to the point where the target would call the police: Cutting 2 inch pieces out of the target's door sweeps and finding large nasty spiders to scoop up and put in on a week to week basis. Dropping very tiny pieces of odd sorts of trash on the ground outside the targets home every time they decide to clean it up. Deliberately placing raccoons in the target's yard or neighboring yard especially if vacated as they are very loud animals but relatively easy to chase away once discovered. Delaying construction if a corrupt project is going on nearby. Neighbors leaving their cars in the driveway with the engine on for 15 minutes and going back and forth between the house and the car where music will be blasted very loud for about 15 seconds at a time. Noisy motorcycles revving their engines up in the street for long periods of time or driving loudly through the neighborhood late at night. Paying neighbors to stalk by checking their mail in harassing ways, making unnecessary deliberate noise like toilet slamming, chairs scratching the floor. Paying construction workers to make loud noise directed toward the target first thing in the morning especially if they stayed up late the previous night. Paying construction workers to spy on the target. Paying pizza delivery people for cash receipts to obtain phone numbers. Paying UPS drivers to peel the tape off a corner of a package and tell them the contents or information inside. Paying lawn mowing services on the block extra to take a long time which can annoy the target during the day. Call harassment on a daily basis with different combinations of private/unknown name/caller until a privacy manager is installed. Use a poisonous chemical goop or spray to poison the target's doorknobs, car door handles and peep hole or any other things the target is likely to leave out and then touch. Use chemical soaked rags or cook meth in the street to cause toxic fumes to drift into the target's home. Gunshots on the block or outside the target's home. Use EMF jammers to block the targets wireless electronics or cause them to malfunction. Listen and spy on targets movements in their home, television habits, sleep patterns, etc. Use an x-ray imaging device similar to those found in modern airport security or a thermal imaging device to monitor targets movement and can be used in conjunction with the military technology to really have a drastic effect on the target. Use classified possibly stolen military technology to apply mind control through EMF which can be used to cause different things such as fatigue, stress, heart beat irregularities, nerve twitches, side pain, etc on a constant and debilitating basis - seems to be most effective when the target's exact location within a building is known hence the x-ray/thermal imaging. If the target puts a camera in the window, across the street have as many gang owned houses as possible put bright lights at the top of the house to help blur the cameras view and send a message that all of the houses are in fact owned by the gang. Doing loud fake drug deals to bait the target or real drug deals outside the target's home to annoy the target. Putting dead bugs in the target's stairwell or in front of their front door. Having a moving truck loaded up half full of complete junk such as lawn chairs and inflatable pools that are all roped down so the back door can be left open and when the target is leaving their home have the moving truck zoom by them at a fast pace and turn a corner so fast it almost looks like the load is falling out and then immediately pulling over to the side of the road for a few seconds to send a message. Installing a GPS tracking device in the target's vehicle. Having the target followed by a large number of cars when they leave their home so they feel intimidated and crazy by doing things like having cars follow them no matter what lane they change in for a few blocks at a time and taking turns, etc without getting to the point where it is too obvious. Having the target followed or monitored by people in public to make them uncomfortable. Have chains of fancy cars with wealthier couples drive through the neighborhood in a line to send a message. Teaching birds to fly certain routes at certain hours of the morning using targeted bird feeders like 5AM where it would be particularly annoying. Over delivering the same menus for the same few Chinese restaurants in the same area repeatedly. Engaging in full scale electronic warfare by deploying EMF weaponry, EMF jammers, thermal imaging to monitor keyboard heat, monitor images, targets movement, security vulnerabilities that have been probably created through government spies. The hacks themselves center around a remote control mechanism that can be used to make the targets machine sync up to a remote location after it is infected so it is easily traceable - like a tracking device. Symptoms include delayed shutdowns despite being unable to track down the root cause using the Microsoft User Profile Cleanup tool, low CPU voltage warnings on probe utilities, random crashes in Internet Explorer, DFX/WinAmp, full screen games like TF2/CSS, CPU booting in Safe Mode randomly for no reason, floppy drive light remaining on indefinitely. They deliberately waste the targets time especially if a software engineer on a range of anomalies - even at my old workplace this type of tampering was at least possible as public and private attitudes often differ as has been seen many times in history in almost any individual and deliberate sabotage of work environments ia a known stalking technique. Tampering with a vehicle so it has very noticeably squeaky breaks. Paying the local car service repairmen to deliberately overcharge and perform minor sabotage. Hiring a roofer or performer who can climb on the roof of the target's house without being seen and conducting a creak noise campaign or dropping a large piece of cloth down to the ground below to send a message when target will be in area to see it e.g. in front of the bathroom window when target urinates, etc. Paying a doctor to deliberately mislead and misdiagnose a patient to discredit them and make them look crazy while providing the patient with falsified records. Throwing black towels in the air in front of front windows of target's apartment. Having fire trucks harass or intimidate the target when they are walking on the street or driving. Having an ambulance slowly drive by the target right when they are arriving home. Leaving dead bugs in the target's stairwell or on the target's car. Leaving cigarette butts or very long cigarettes in a directionally pointing manner around the target's property or vehicle. Bugging the target's home using cops or landlords. Undoing all noticeable tampering like squeaky breaks, GPS tracking devices, bugs when the target will have the capability of detecting them. Hiring hackers to hack a target's computer in a passive manner to monitor their activity through AOL and other vulnerabilities. Hacking the router firmware of the D-link DGL-4300 router so that it cannot be reflashed without RMAing it. Corrupting people by getting them to cheat on their significant others who then can be setup to become targets. Designing schemes to get the target to end up in a certain apartment by using a somewhat dishonest girl/boyfriend. Designing schemes to get the target to end up working at a specific job by contacting companies they have planted people in to hire the target. Deliberately harassing the target at work by making their computer appear flakey. Interfering with the target's circadian and sleep rhythms using military technology, conducting noise campaigns, conducting all night hacking war games, interfering with electronic and wireless devices, intimidation by subtly hinting to the target that they are in fact being monitored using classical conditioning - such as a loud car driving by every time the target visits a certain website, etc to install fear. Driving the target crazy, discrediting them, making them look and seem insane when in fact they are simply being hyper perceptive of their surroundings.

Signs of living next door to a clandestine methamphetamine laboratory: Inherintly dangerous as you are at risk of inhaling odorless toxic fumes or an explosion especially if it is discovered. Under the cover of a private limo service. Heavy street theater around the laboratory for demonstrations and protection from exposure. Highly suspicious 2in.x3in. cutout in the front that has only blackness inside - no other buildings have anything like it. White spray painted window, on side of building. Extremely thorough white curtains on the front that have remained exactly as is. The garage is never used and a red Volvo is always parked in the driveway that leaves for short trips. Most of the activity around the place is centered between 10PM-4AM but especially between 1AM-4AM. Many cars around it will clear out between 3:30AM and at latest 5AM. People hanging out smoking cigarettes outside the house and there are often butts on the sidewalk. During the day, the only activity is the limo driver/cleaner who cleans multiple limos that are driven into the area in the driveway and gives the appearance that something legitimate could be going on there. Excessive trash is located all over in the front of the house. Police surveillance van that shows up for weeks at a time and immediately eliminates all the street activity. It will remain like this for years and you probably will not meet anybody aside from occasionally seeing the limo driver out in the street.

Noise campaign

Vehicular harassment campaign: Covert surveillance teams following you around in a menacing fashion, Creating moving road blocks in front of you to force you to miss traffic lights or just generally delay your trip, Creating moving road blocks behind you to isolate you and let you know you are under covert surveillance, When you are behind a harasser, they may turn on their windshield wipers when going at a fast speed to spray you, Honking horns at the target for no apparent reason, Many tinted SUVs with repeated numbers surrounding the target, Constant swerving and weaving in front of the target for no apparent reason, Having civilians in crosswalks waiting to cross when the target approaches, Taking all of the parking spots in an area the target is going to or taking the target?s usual spot

Fast food harassment campaign: Loud cars or motorcycles driving by or revving engines while ordering or paying, Not giving a receipt, Dumping many sauce packets, napkins, extra straws or utensils, Rushing you through your order, Messing up your order in minors ways such as substituting decaffeinated coffee

Degenerate behavior recruitment campaign: Homosexuality, polyamorous lifestyle, pedophilia, cheating, beastiality, other fetishes

Penile eczema on the bottom center of the shaft

Spies trained in various crafts such as medical or the unimpressive rapist specialties will work together in a regular team to routinely break in to the victim's house for purpose of performing surgery, body manipulations, raping or sodomizing the victims by covertly using a sleep-inducing gas to keep the victim asleep during the break-in, followed by quickly administering chloroform, an anesthetic, or a similar knock out agent and leave the victim as well as the sleeping location unchanged upon exiting.

Covert surveillance especially through-the-wall ultrawide-band surveillance is used to monitor all behavior 24/7 and enables building of a complete psychological profile

Using directed energy weapons to reproduce subconscious brain states that were captured at times when subliminal homosexual messages were being observed possibly on television, the radio or through an individual spy or spies.

Mass media used on a same day response basis to perform homosexual psychological operations on targeted individuals.

Mass media including newspapers, websites, music/radio, television programs, web sites, movies many custom tailored on a daily basis with certain headlines even targeting certain individuals.

Linguistic degeneracy inherent to the English language through homophones/homonyms: 69, anal, ass(hole), ball(s), beaver, bitch, boob/booby, bum, butt/but, chick, cock, crack, cum/come, dick, dong, dyke, eating out, fag(got), fairy, fanny, fruit, fudge, gay, ho/hoe, homo, johnson, meat, muff, poonani, peter, prick, pussy, queen, queer, sausage, snatch, spunk, sword, tit, tool, tossing, tramp, wang

Spies: Individual philosophy of the ends justify the means
The development of the psychology of the spy is very important to understand how large conspiracies can be effectively achieved. An ordinary individual will find it too hard to believe any conspiracy beyond petty ones involving a few perpetrators is possible. Unfortunately, the largest most unbelievable conspiracies are according to this simple logic representing the average thoughts of the collective, the most likely to succeed. This psychology was spread among family bloodlines where the techniques were discovered likely as early as Ancient Egypt. They effectively become actors running advanced psychology scripts on as many targets as possible. Thus this immoral ends justifies the means behavior spreads like a virus through a culture until it is totally corrupt and morally bankrupt.

Moral defense
One problem people start out experiencing is that totalitarian government is like a multi-tentacled beast. When you cut off one tentacle, it attacks you from the others while the one you cut off grows back. Their spy training/roboticization is all based on the biological human top level goals of survival and reproduction until you can imagine the tentacles could be lurking and pulling strings in any aspect of your life and without your awareness. The elite's supercomputers have defined the top level goal of humanity (or any intelligent life form) as learning since creating an ever exponentially expanding intelligence would lead to the creation of a superintelligence called the singularity (infinite or an upper limit of intelligence) or some might consider god. The existence conundrum would be resolved and existence as we know it would cease to exist. However, learning does not produce a friendly AI, in fact, it produces quite the opposite as it learns the art of infinite deception.

One defense is the religion of Islam which defines a solid foundation of moral standards that can exist in the form of a free society or a totalitarian one. Although the moral rules restrict personal, social and economic freedom, they do so in a consistent and ethical manner. Without strong moral rules to stand by, societies will end up demoralized and very corrupt with the slide toward totalitarianism showing no limits in terms of the means used to accomplish goals.

Psychological defense against mind control
Thinking, acting and behaving as an individual, never as a group.

Learning, understanding and appreciating how your primitive subconscious mind works as well as researching topics such as psychology, cybernetics, artificial intelligence, robotics, free energy, directed energy weapons, supercomputers, artificial intelligence, mind control, behavior modification, Operation Paperclip, Homeland Security, NSA, CIA, MK ULTRA, FBI, COINTELPRO, gang stalking, brain and cochlear implants, the medical and psychiatric community, the DSM IV, mass media deception, aircraft abductions, weather control, deception, New World Order, currency manipulation, social manipulation, catastrophic man-made and natural disasters or tragedies such as the Unabomber, OJ Simpson, Timothy McVeigh and the Oklahoma City bombing, 1993 World Trade Center bombings, 9/11, Al Qaeda, Afghanistan, Iraq, North Korea, Haiti, Israel, England, Germany, Russia, Ancient Egypt, the Roman Empire, UFOs, TWA 800, AIDS, Richard Reid the shoe bomber, the underpants bomber, the Columbine and Virginia Tech disasters, the Jewish, Christian and Muslim religions.

Transferring your top level subconscious instincts of survival and reproduction into your conscious mind to allow for reprogramming and reaffirmation of the subconscious using subconscious reprogramming techniques such as repetition, feeling association and waging one's own subconscious manipulation campaign.

Chemicals and compounds that effect brain functioning which will put that drug in control of one's mind.

Infiltrating known corrupt individuals, organizations or systems for purpose of exposure and eventual justice by relentlessly utilizing the psychology of a spy.

Allowing your intelligent and capable conscious mind to see through deception, crimes, misinformation and disinformation whether it come from the government, mass media, intelligence communities, friends or family.

Exposing general intelligence community secrets to the best of your ability including running viral campaigns.

Exhausting mind control resources and assets by drawing out or forcing them to waste time and effort on an individual.

Acting, behaving and ultimately feeling like an unhappy, disgusted, bitter and angry mind controlled slave while going about your daily business or work.

Learning not to be afraid of anyone or anything including death and fear itself.

Shielding one's body from microwave and electromagnetic radiation.

Removing mind control implants from one's brain or finding a way to dislodge or damage the part of the brain containing the microchip.

Self-sacrifice including poor diet, organ damage, self-mutilation or suicide.

Withdrawing from society to live a completely solitary lifestyle until the mind control technologies come tumbling down.

Reverse engineering society, your mind and existence to inform others of your intellectual discoveries.

Using everything you have learned your whole life against mind control in the most insidious manner possible.

Learning how to probe and discover the identities of intelligence assets and people with the psychology of a spy and figuring out how to determine their true loyalties.

Law enforcement defense and neutralization
The key here is to utilize the psychology of a spy by being prepared for every situation:

Use your mind over matter to stay sharp, intellectual and retain the mental upper hand. Over analyzing their every move and thinking outside of the box is a key to success.

Always stay within the law and carry adequate and legal self-defense deterrents.

Since you are a normal civilian find ways to act and think in a mindset that make you feel like you are being harassed by a Red Squad so that the only real suspicion is cast upon them.

Always have a cover story, use plausible deniability, be deliberately confusing, misleading or use disinformation which roughly speaking is information that is 95% true.

Always remember that they are under mind control and doing something completely illegal while looking them straight in the eye with as much adrenaline, intensity and ferocity as you can muster.

Accuse them of illegal harassment and surveillance while defining a clear pattern of the abuse.

Ask for badge numbers, names, affiliation, details on what their suspicion or cause is and publish these details publicly to eventually and inevitably stop certain corrupt individuals. Also taking pictures of Red Squads and publishing them publicly is very beneficial especially when done covertly.

If anything does not seem legitimately official, accuse them of impersonating a figure of authority and call emergency services, escape or fight for your life.

Only cooperate with Red Squad behavior when it is completely normal and in line, not abusive, harassing or manipulative behavior.

Use medical conditions to your full advantage.

Conduct covert or less often overt counter-surveillance on the Red Squad teams to document and expose their habits, patterns, tactics and identities.

Never consent to a search of your body or property. Simply state that you believe in your constitutional fourth amendment right not to consent.

Never open your door for figures of local or federal authority - instead say 'I do not open my door for the . If you have a search warrant, kick the door down. Otherwise please have your institution contact me by phone.' and offer to provide a phone number if they claim they do not have one.

Never exit your vehicle for figures of local or federal authority without fully closing all windows and immediately locking the vehicle upon exit.

Conduct extensive psychological analysis on any people trying to enter your life through any sort of too good to be true or manipulative sort of scheme. If you catch one or more infiltrating agents, attempt to get a photograph with them and expose them publicly. You may want to utilize socially and personally invasive behavior of the most nasty and subtle yet possibly accidental nature. As well, you may want to use the relationship to conduct reverse infiltration and draw out secrets, patterns or criminal behavior that can further bring down these scumbag type characters.

Counter-surveillance defense
Resisting (or how to harass government spies who are harassing you): Installing a comprehensive burglar alarm system. Installing a household alert system. Installing a firewall on all local computers and the router. Installing good antivirus software such as NOD32 on all local computers and the router. Installing indoor security cameras that report motion detection movement to email accounts and local FTP on a file server. Installing indoor security cameras directed toward the outside of the house if street activity is bad. Fixing door squeaks by using good old WD-40. Fixing cut door sweeps with foam tape to eliminate spider problems. RMA hacked router and manually remove hacks from computer if already infected. Disable wireless networking unless absolutely needed and make sure to use a strong preshared key or even better setup a RADIUS server with enterprise security. Bug detectors to find tracking or listening devices. EMF protectors to stop electronic attacks. Thermal imaging so you can use their own tricks back at them. Taking photographs of blatant stalkers and intimidators as well as the community including houses and cars in the street. Using an air pump to inflate an exercise balloon when being gassed and giving it to the police as forensic evidence. Making loud noises such as grunts, coughs, stomps, etc to draw attention when noisy people outside the home. Using a powerful flashlight to chase off the raccoon. Installing a privacy manager on your phone line to stop harassing calls. Ignoring much of the gratuitous harassment and intimidation. Conducting your own investigation. Not opening the door for the police ? say 'I do not open my door for the police. If you have a search warrant, you can kick the door down. If you need to contact me, you can call me from the station.' At which point you either talk to them through the door or slide a piece of paper with your phone number under the door. Raising your finger to your lip and menacingly saying 'Ich bin ein Amerikaner.' implying that the harasser is a neo-Nazi. Coughing and saying 'mind control; or 'CIA mind control' under your breath. Playing a loud message on your speakers to the community stating that it is a CIA gang stalking community and that other residents under this assault should band together to expose it all over the Internet. Damaging your kidneys, heart, digestive system or brainstem using physical force, repetitive trauma, poor diet and physical inactivity. Spy on them blatantly and make them uncomfortable while taking notes of their patterns to help identity future spies. Draw attention to them in any way possible - realize that keeping their cover identity is 90% of the job and they will do anything to protect it (corollary: the shortest distance between 2 points for a spy is not getting caught). Call them spies - body language will give away their cover most of the time especially if you make a scene designed to isolate them, a nice way to do this to make it not too serious is to say something like 'meh, shpies'. Honk at them, make hand motions towards them when they do any strange or rude driving tactics and make it clear you might follow and draw attention to them. When techniques are particularly backhanded such as at a spy massage therapist or spy dentist/orthodontist office then start hitting yourself idiotically and boldly state if asked why that you have been sexual harassed by spy therapists before and they are unprofessionally stirring up very bad traumatic memories which will effectively shut down the specialists tactics or you walk out and file a complaint or demand a refund. Forced situations by family spies and friend spies should be responded to with extreme anger, disgust and at minimum leaving scenes abruptly, never being dependent on them for transportation, the threat of permanently ending any sort of relationship as well as not being tolerating any sort of criminal activity - legal action could be a last resort. Insurance agent spy harassment should be responded to with complaints to upper management, the state and through the legal system. Doctor spy impropriety should be responded to by ruining their reputations and filing a report with the state medical board. Psychiatrist spy manipulation should be argued and dealt with in a very rational and dull manner until they become incompetent and ineffectual. A very last resort would be to use the same criminal stalking tactics of the harassing spies - known as mimicry in such a manner to threaten their cover identity.

Self-sacrifice defense
Cyanide obtained from grinding apple, apricot or peach seeds

Plastic bag, rag and paint thinner

Codeine, hydrocodone or hydromorphone, fentanyl or Fentora

Herbicides: parathion, Paraquat

Helium or carbon monoxide from a tank with regulator and gas mask apparatus

10-15 grams of Phenobarbital (brand names: Nembutal in USA, Sedal-Vet, Sedalphorte, Barbithal and Anestesal in Mexico) which is the equivalent of 100ml of the veterinary liquid form. According to reports about the Peaceful Pill handbook, it can be obtained most easily in Thailand and Mexico though it seems no longer in Tijuana supposedly Cuernavaca has it. Tijuana, Mexico tip: 'calle 3 (number 8374) Its a the only vet shop in Calle 3 past the Farmacia International which is in between block 3, the landmark would be the family restaurant with a pub above the farmacia International. Just walk a few metres from that corner if your heading north of the main calle 3 its on your left side same side as the farmacia international. They only sell it in 50ml. bottles.' Chiang Mai, Thailand tip: 'opposite Meungthong Thani 3 , Chaeng Watthana Rd, also Chiang Mai recommended city approximately 1 hour north of Bangkok, hire private tour guide to get around' Tip: 'I usually recommend that they take it with their favorite drink since it has a bitter taste. I?ve never seen anyone finish their whiskey or Champagne. There isn?t enough time to give a speech. You go to sleep and then you die.' Anti-emitic highly recommended such as most common Motilium(Domperidone) or Reglan(Metoclopramide).

Hydrogen sulfide: In Japan, the gas is made using around four liters of Sanporu brand toilet cleaner and a similar amount of Mutohappu bath sulphur. Acid Sources:Muriatic acid, Sulfuric acid, Lysol disinfectant, Lysol toilet bowl cleaner, The Works toilet bowl cleaner, Blu-lite Germicidal acid bowl cleaner, Kaboom Shower, Tub and Tile cleaner, Tile and Stone cleaners Sulfur Sources:Artist oil paints, Dandruff shampoos, Pesticides, Spackling paste, Latex paints, Garden fungicides, Lime Sulfur, Bonide

Interesting quotes
'The people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them they are being attacked and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same way in any country.' - Hitler's right hand man, Hermann Goering at his war crimes trial

'It also gives us a very special, secret pleasure to see how unaware the people around us are of what is really happening to them.' - Adolph Hitler

'Man does NOT HAVE THE RIGHT to develop his own mind. This kind of liberal orientation has great appeal. We must ELECTRICALLY CONTROL THE BRAIN. Some day armies and generals will be controlled by electric stimulation of the brain.' - Dr. Jose M.R. Delgado Director of Neuropsychiatry Yale University Medical School Congressional Record, No. 26, Vol. 118 February 24, 1974

Inspirational quotes
'Live free or die.' - New Hampshire State Motto

'All truth passes through three stages. First, it is ridiculed. Second, it is violently opposed. Third, it is accepted as being self-evident.' - Arthur Schopenhauer, German philosopher (1788 - 1860)

'That which can be destroyed by the truth should be.' - P.C. Hodgell

'Those conspiracies that are too incredible to be believed, are by the same right, those which most often succeed.' - Marshall McLuhan, philosopher

'There are two views of history: (1) History happens by accident or (2) It is planned. The general public is taught that history happens by accident. However, the upper echelons... know that history is planned.' - R.E. McMaster, Jr., Educator

'It isn't that they can't see the solution. It's that they can't see the problem.' - G.K. Chesterton

'We hang the petty thieves and appoint the great ones to public office.' - Aesop

'People willing to trade their freedom for temporary security deserve neither and will lose both.' - Benjamin Franklin

'What do you think spies are: priests, saints and martyrs? They're a squalid procession of vain fools, traitors too, yes; pansies, sadists and drunkards, people who play cowboys and Indians to brighten their rotten lives.' - John Le Carre, The Spy Who Came in From the Cold, 1963

'Some of the biggest men in the United States, in the field of commerce and manufacture, are afraid of something. They know that there is a power somewhere so organized, so subtle, so watchful, so interlocked, so complete, so pervasive, that they had better not speak above their breath when they speak in condemnation of it.' - 28th President of the United States, Woodrow Wilson in The New Freedom, 1913

Media quotes
'But I got a word of warning for all you would-be warriors. When you join my command, you take on debit. A debit you owe me personally. Each and every man under my command owes me one hundred Nazi scalps. And I want my scalps. And all y'all will git me one hundred Nazi scalps, taken from the heads of one hundred dead Nazis. Or you will die tryin'.' 'You probably heard we ain't in the prisoner-takin' business; we in the killin' Nazi business. And cousin, Business is a-boomin'.' - Lt. Aldo Raine from the movie Inglourious Basterds

'I WANT YOU PEOPLE OUT OF MY LIFE' - Michael Westen played by Jeffrey Donovan from Burn Notice episode Lesser Evil followed by 'You want out, here's the door. I'll take my chances.' and then Michael Westen jumps out of a helicopter high above the ocean.

'There's a room where the light won't find you, Holding hands while the walls come tumbling down, When they do I'll be right behind you, So glad we've almost made it, So sad they had to fade it' - Tears For Fears' Everybody Wants To Rule The World

'If I could capture the rage of today's youth and bottle it, Crush the glass from my bare hands and swallow it, Then spit it back in the faces of you racists, and hypocrites who think the same shit but don't say shit, You Liberace's, Versace's, and you Nazis watch me, cause you thinkin you got me in this hot seat, You motherfuckers wanna JUDGE me cause you're NOT me, You'll never STOP me, I'm TOP speed as you POP me, I came to save these new generations of babies, from parents who failed to raise 'em cause they're lazy, to grow to praise me I'm makin 'em go crazy, That's how I got this whole nation to embrace me, And you fugazi if you think I'ma admit wrong, I cripple any hypocritic critic I'm sic'd on' - D12's Fight Music

'Picture me sittin in a jail cell rottin, Or barricaded in a motel wit twelve shotguns, So when the cops come knocking each hand's got one, Cocked, ready to dump slugs heavy as shotputs, One man army, guns can't harm me, Young and army, worse than my Uncle Ronnie, Ever since I got my first gun pulled on me, I can't stop airing out my dirty laundry, Middle fingers flipped and censorship, Your friends just flipped over the swift penmanship, Ever since I spit some shit on Infinite, I been giving it a hundred and ten percent, Cause when I'm bent most of my energy's spent on enemies, Eighty percent of what I invent is Hennessey, Twenty percent is from being hungry as sin, Ten's because I love being under your skin, Yeah shit can happen, so stick to rappin, Quit the yappin or I'ma lift the mack and, That can lead to another mishap happening, Skip the crap get the can of whoopass cracking, ..., We are not playing, we are not playing, We are not bullsh*ttin, this is not a motherf*cking joke' - Eminem from D12's Shit Can Happen

'Only in America we're slaves to be free, Only in America we kill the unborn to make ends meet, Only in America sexuality is democracy, Only in America we stamp our god In God we trust, ..., What is right or wrong, I don't know who to believe in, My soul sings a different song In America, ..., I am right and you are wrong, No one's right and no one's wrong In America' - Creed's In America

'No you can't take it. No you can't take that away from me. Head like a hole. Black as your soul. I'd rather die than give you control. ... Bow down before the one you serve. You're going to get what you deserve. ... You know who you are.' - Nine Inch Nails' Head Like a Hole

'I've got a secret I've been hiding under my skin, My heart is human, my blood is boiling, my brain I.B.M.' - Styx's Mr Roboto

'Got a machinehead, Better than the rest, Green to red, Machinehead And I walk from my machine' - Bush's Machinehead

'And now you do what they told ya, now you're under control, ..., F*ck you, I won't do what you tell me, F*ck you, I won't do what you tell me' - Rage Against The Machine's Killing In The Name Of

'If we don't take action now, We settle for nothing later, Settle for nothing now, And we'll settle for nothing later' ? Rage Against The Machine?s Settle For Nothing

'Check-a, check-a, check it out, They load the clip in omnicolour, Said they pack the 9, they fire it at prime time, The sleeping gas, every home was like Alcatraz, And mutha fuckas lost their minds, No escape from the mass mind rape, Play it again jack and then rewind the tape, And then play it again and again and again, Until ya mind is locked in, Believin' all the lies that they're tellin' ya, Buyin' all the products that they're sellin' ya, They say jump and ya say how high, Ya brain-dead, Ya gotta fuckin' bullet in ya head' ? Rage Against The Machine?s Bullet In The Head

'I've looked under chairs, I've looked under tables, I've tried to find the key, To fifty million fables They call me the Seeker, I've been searching low and high, I won't get to get what I'm after, Till the day I die' - The Who's Seeker

'We'll be fighting in the streets, With our children at our feet, And the morals that they worship will be gone, And the men who spurred us on, Sit in judgment of all wrong, They decide and the shotgun sings the song' - The Who's Won't Get Fooled Again

'Another promise, another scene, Another packaged lie to keep us trapped in greed, With all the green belts wrapped around our minds, And endless red tape to keep the truth confined, SO COME ON!, ..., If you could flick a switch and open your third eye, You'd see that we should never be afraid to die, Rise up and take the power back, It's time the fat cats had a heart attack, You know that their time's coming to an end, We have to unify and watch our flag ascend, SO COME ON!' - Muse's Uprising

'Come ride with me, Through the veins of history, I'll show you how god, Falls asleep on the job And how can we win, When fools can be kings, Don't waste your time, Or your time will waste you, No one's gonna take me alive, The time has come to make things right, You and I must fight for our rights, You and I must fight to survive' - Muse's Knights of Cydonia

'What is thy bidding my master? It's a disaster, Skywalker we're after. What if he could be turned to the Dark side? Yes, he'd be a powerful ally, another Dark Jedi. He will join us or die! We got Death Star! (Death Star!)' - Star Wars Gangsta Rap

'Oh say can you see, By the dawn's early light, What so proudly we hail, At the twilight's last gleaming, I'M BEING WATCHED I'M BEING WATCHED, I'M BEING WATCHED BY THE C.I.A., I'M BEING WATCHED I'M BEING WATCHED, I'M BEING WATCHED BY THE C.I.A.' - Anti-Flag's I'm Being Watched By The C.I.A

'Enjoy your last. Last taste of freedom! Old man he bars up the windows, You know he does not feel so safe anymore. He come from those supposed good ole days, When you did not even have to go lock your doors, He saw security man look Police man, Saw the Police start looking like the Army man, He saw Army start acting like the C.I.A. And guess what, the C.I.A. was the President.' - John Butler Trio's Oldman

'You're under my, you're under mind control. You know you lost, don't even try to fight. You can't escape, I rule you day and night. You're under my, you're under mind control.' - Canibus' Mind Control

'Take a look at these hands. The hand speaks. The hand of a government man. Well I'm a tumbler. Born under punches. I'm so thin.' - Talking Heads' Born Under Punches a

Re:Good filters have hidden the problem (1)

alfredos (1694270) | more than 4 years ago | (#32027424)

I manage mail for a fair number of domains, many of them more than 10 years old. I'm getting very good rejection rates with black lists. When combined with greylisting (which effectively gives time for new zombies to fall into the list before accepting mail from them), some RFC compliance checking and returnability, the rejection rates go very high indeed. The rest is usually catched by the end-user junk filters (I get an average of around ten spams a day in my junk inbox; not bad, considering that I have dozens of e-mail addresses, some of them in every spam "database" known to mankind)

The spam that finally gets through to my junk inbox therefore does not represent a typical pattern but, being the kind that gets through, it's perhaps worth mentioning that it belongs to one of these kinds:

  • The local kind, i.e., someone thinks it's a pretty neat idea to buy one of those databases to advertise their pizza business, the insurance they are an agent for, or their non-profit - yes, there are still people so naive out there. I call it the local kind because these are in local language and advertise local organizations.
  • The Nigeriam scam or similar scheme.
  • The Chinese agent/"manufacturer".

What allows these to sneak under the radar? They look quite legitimate because they are using some of: a reputable ISP's outbound MTAs, text-only or unsuspicious HTML,...

It's increasingly harder to tell them apart. And, to be practical, isn't it so minor a nuisance at those volume levels? I began battling spam, like everyone else, when it became a problem. Right now it no longer is a big one. When it becomes a problem again, we will see. Of course in the meantime the whole thing is constantly being tuned a bit here and there.

I hope, however, that lawmakers over the world come to their senses before the thing is back to the big problem category and allow prosecution of anybody who directly benefits from the spam (i.e., the spammers and the ones who sell the spamvertized thing). Until then, we will always be looking forward to that point where we have to re-invent the anti-spam measures once more...

Re:Good filters have hidden the problem (-1, Troll)

Anonymous Coward | more than 4 years ago | (#32025956)

Many of us have chosen to no longer get spam, rather than to attempt to filter it out and leave only the desired messages. There hasn't been any reason to receive spam for many years for most people. A few do have to, but most of us do not.

So to the extent that email still has spam, it is because of a few stupid people ruining a shared resource for the rest of us.

I run no spam filters and have not received a spam since about 1996. That was when I got my first few, and I vowed to take steps to avoid getting any more. Since then, I have not.

It's only a problem to the extent that we allow it to be a problem. Laws can't fix it. Only making people less stupid can fix it.

Re:Good filters have hidden the problem (1)

larry bagina (561269) | more than 4 years ago | (#32026322)

beakerMeep (716990)
(email not shown publicly)

You were saying?

Re:Good filters have hidden the problem (1)

antdude (79039) | more than 4 years ago | (#32026626)

Speaking of Google's forums, how does one hide/change his/her e-mail address like in Google Groups? For example, foo@bar.eduDELETETHISFIRST to e-mail.

Re:Good filters have hidden the problem (1)

Iamthecheese (1264298) | more than 4 years ago | (#32026752)

Good filtering is probably doing a lot for the problem: The chances of any one spam finding eyes is about 1/100th what it used to be. That means a spammer has to send out a hundred times as many for a single sale or mark.

Spammers aren't selling email clicks (0)

Anonymous Coward | more than 4 years ago | (#32027552)

Spammers aren't selling email clicks. They're selling the PROMISE of email-clicks. They're selling to marketing departments "for $10,000 you can reach 100 million potential customers!".

Re:Good filters have hidden the problem (2, Interesting)

maxume (22995) | more than 4 years ago | (#32027968)

Hence the theory that most spammers make their money by selling spam services, not by selling whatever the spam is advertising.

I guess a better way to phrase that is to say that the people paying to send the spam are the marks, not the people receiving the spam.

Re:Good filters have hidden the problem (1)

Rogerborg (306625) | more than 4 years ago | (#32028540)

Because they were voluntarily throttling themselves before now?

Re:Good filters have hidden the problem (1)

thijsh (910751) | more than 4 years ago | (#32027346)

That's good, it should not be a problem for the end user, it should be a problem for the ISPs and companies like Google. Let them fix it and let me post my email address so I can be contacted *and* read my mail without spam. Besides the ISPs have to most to gain from eradicating SPAM, and are the only parties with means to fix it.

But they have done nothing to solve it (1)

damn_registrars (1103043) | more than 4 years ago | (#32028826)

Good spam filters like Gmail's and other have really hidden the problem from public view

Except that the filters only end up increasing the cost of business. The filters take human time, CPU time, storage space, bandwidth, etc. Sure the end users see less spam in their inbox but at what cost?

Someone has to pay for the added expenses. And filtering will never solve the problem of spam itself; it only escalates the arms race as spammers find more ways to overcome filtering. We need to work on the root cause of spam if we ever want to defeat it.

Anyways, my point is just that I wonder if there will be little to no effort going forward from government types or PHB's who don't wanna spend the money for something that doesn't seem to be a problem.

A lot of people don't realize or acknowledge how much money they already are spending. Many companies are paying for dedicated anti-spam hardware and/or software. And as more bandwidth is consumed by spam coming in - as filters don't stop spam until after it crosses in and reaches the mail server - companies will have to pay more for internet access as well.

Spam (2, Informative)

the_other_one (178565) | more than 4 years ago | (#32025778)

Re:Spam (1)

For a Free Internet (1594621) | more than 4 years ago | (#32026150)

niufe0own lj08929oir2lw 9d0sapo mre,321 e.,q ;l/,//,/,/,q r08 pirkn 080pjkkpkpkkPPO[k{{ K[PP[3[2 MM ;m;l m;lqw r;lw.,alaooo iralewk m,.dsa .,;;,;;,;,, wq oiojOUOOJOJ ,;l,;,;l,-=-=-=-=-=-=-= jbHUIDHEWOIJOIWJDWRt hr93q8oi2m2wbqwvbqvwqvwbqvwbq nbswvqbvcsvacsandsm ,m.,,.,.,., dpowq el;,ewqwcxrwj!!&!&!&!&!&&!jm rkioiOO:O:O:O AWdoiw jroiewhxw free penis hats ce lkajmpokl; jipom,k 3xmd.w//l/;;;/' ;u8 8P*U)I()O[pk; END

The real question is... (5, Interesting)

tlambert (566799) | more than 4 years ago | (#32025784)

The real question is, relaying it FROM where?

Sure, the U.S. has a lot of mail servers online compared to other countries. That stands to reason, given that the Internet was invented here, SMTP was invented here, email was invented here. Usenet was invented here. AOL was invented here. And SPAM was invented when AOL connected to Usenet.

Where is the SPAM originating? Is it originating from the U.S. as well? Most of the SPAM I see is Russian or Chinese in origin, with a small fraction of it actually coming from the U.S. itself. I get more SPAM that originates from Nigerian scammers, in fact, than I do from U.S. hosts. Most of the viagra and pharmaceutical SPAM I get is from Europe or from India, where it's legal to sell the drugs in question without a prescription and ship them internationally.

This article seems to be about blaming the relays, rather than the origin of the SPAM in the first place, and the U.S. is getting caught out because it has more mail servers, or more Windows machines on the net, and these are being exploited to relay the SPAM, rather than SPAM being a predominantly U.S. problem.

P.S.: I'm not arguing against blacklisting open relays; I still think that's part of the answer

-- Terry

Re:The real question is... (0)

Anonymous Coward | more than 4 years ago | (#32025820)

Your capitalization is wrong; SPAM is Hormel's trademark for that canned meat product. Junk e-mail is spam.

FYI: A note on capitalizing SPAM... (2, Interesting)

tlambert (566799) | more than 4 years ago | (#32026738)

FYI: A note on capitalizing SPAM...

The reason it was called SPAM on Usenet in the first place was as an acronym for "Shit Parading As Meat". You capitalize in order to indicate that it's an acronym.

-- Terry

Re:FYI: A note on capitalizing SPAM... (1)

Nagrom (1233532) | more than 4 years ago | (#32026970)

Do you still write email as 'e-mail' and regard the word 'text' as strictly a noun...?

Re:FYI: A note on capitalizing SPAM... (0)

Anonymous Coward | more than 4 years ago | (#32027584)

Do you still write email as 'e-mail' and regard the word 'text' as strictly a noun...?

Yes and yes.

Re:FYI: A note on capitalizing SPAM... (2, Funny)

L4t3r4lu5 (1216702) | more than 4 years ago | (#32027742)

Further, Google is not a verb.

Re:The real question is... (4, Informative)

DNS-and-BIND (461968) | more than 4 years ago | (#32025914)

Hi, Terry. Nobody runs open relays any more. The spam comes from zombie windows boxes. Spam wasn't invented when AOL connected to USENET, it was popularized when Cantor and Siegel unleashed the green card spam. For an old-timer, you're remarkably poorly informed.

Re:The real question is... (-1)

Pinhedd (1661735) | more than 4 years ago | (#32025982)

Where spam originates and where spam is relayed are two different issues. The origin of most spam is foreign countries using unpached versions of windows, however, no ISP worth their salt will allow a mail server to operate on port 25 on a residential IP block (hence the existence of the alternate SMTP port), nor will any mail server worth it's salt blindly accept inbound messages from foreign host or relay. The relay problem ultimately lies with unsecured, unpatched, publicly accessible hosts that dont sit behind a firewall that restricts traffic on port 25.

Re:The real question is... (1, Insightful)

Anonymous Coward | more than 4 years ago | (#32026204)

The origin of most spam is foreign countries using unpached versions of windows

With the United States ranking first among those. It would be nice if they could get there spam problems under controll instead of harassing other countries.

Re:The real question is... (-1, Flamebait)

Anonymous Coward | more than 4 years ago | (#32026964)

You pathetic bitch. Want a mushroom stamp? How about I slap you with my cock?

Re:The real question is... (5, Insightful)

yuna49 (905461) | more than 4 years ago | (#32026270)

I'm an "old-timer" in a variety of meanings despite my ID, and I know about Cantor and Siegel. Nevertheless, Terry asks the right question and points out how uninformative this article is.

The article reports that 13% of hosts "relaying spam" reside in the US. But what should we compare that 13% to? According to the figures in the CIA Factbook [] , some 57% of worldwide Internet hosts are located in the US. So I'd say the article's entire premise is flawed. If the conditional probability of a host spamming were equivalent world-wide then, using the Factbook's figures, US hosts should account for 57% of spam relays, not 13%.

On top of that, relaying tells us nothing about how spamming works. Spam doesn't come from computers; it starts as some back-alley deal and spreads relentlessly across the globe. Those zombied machines with the ISO country-code domains we all see pummeling our servers aren't the source of the spam either. They're just drones that take their orders from masters far away.

As Woodward and Bernstein were told, "follow the money." Looking at distributions of Internet hosts tells us nothing about the business of spamming or its effects.

If it isn't US spam (0)

Anonymous Coward | more than 4 years ago | (#32027556)

If it isn't US spam, why is 90% of spam selling US services or goods in US$?

PS when it was China as the leader, why didn't you mention this "it could just be relays" then?

PPS 4% of the world population is in the US. So compared to the rest of the world, 52% of spam is USian.

Re:The real question is... (2, Interesting)

Njovich (553857) | more than 4 years ago | (#32027740)

According to the figures in the CIA Factbook [], some 57% of worldwide Internet hosts are located in the US.

These numbers look completely bogus to me. How on earth is South Korea listed at 301,270 hosts in 2009? This number should be much higher. And this is just checking the best connected country on the planet. Many of the other Asian and European numbers seem to be low estimates too.

Of course, it could be that they use some definition of 'internet host' that I wasn't previously aware of.

Re:The real question is... (2, Informative)

yuna49 (905461) | more than 4 years ago | (#32028270)

I did a bit of digging, and all the data on host counts appear to be compiled from the ISC Domain Survey [] . According to the summary on that page, "The Domain Survey attempts to discover every host on the Internet by doing a complete search of the allocated address space and following links to domain names." This would seem to exclude hosts without reverse-DNS records, but I'd need to read the complete study methodology before I could comment intelligently.

I also looked to see if there were easily-available figures on the number of IP addresses allocated by country but couldn't find any.

Regardless of the method for counting hosts, it still seems quite likely that US hosts make up considerably more than 13% of all hosts worldwide.

Re:The real question is... (2, Informative)

Kumiorava (95318) | more than 4 years ago | (#32028574)

CIA Factbook: 383 million (2009); note - the US Internet total host count includes the following top level domain host addresses: .us, .com, .edu, .gov, .mil, .net, and .org

To be clear .com ending in domain name doesn't translate into US based server or computer. Additionally any other ending in domain name doesn't mean that the server or computer is not located in US. The article is very light on actual technical detail so I wouldn't be able to know how that 13% figure came from, but I wouldn't jump into conclusion that it has anything to do with domain names. Here are numbers on internet usage worldwide: [] , which would indicate that US should have less than one third of world's zombie machines acting as hosts.

Naturally tracing the origins of spam is quite difficult, counting the zombie machines sending spam is quite accurate since that is what article is really counting. As you said in global economy a Nigerian prince may use Hungarian hacker who uses US based bot net to distribute a spam message about cheap Indian made Viagra.

Re:The real question is... (1)

timmarhy (659436) | more than 4 years ago | (#32026372)

the thing is, there are still 100000's of open relay's out there, plenty of them unsecured linux boxes run by amatures.

Re:The real question is... (0)

Anonymous Coward | more than 4 years ago | (#32027104)

Nice anti-Linux troll, but do you have any evidence apart from vitriol?

Re:The real question is... (1)

1s44c (552956) | more than 4 years ago | (#32027304)

the thing is, there are still 100000's of open relay's out there, plenty of them unsecured linux boxes run by amatures.

It's a problem but it's nowhere near the scale of the problem posed by millions of windows bots on domestic broadband.

Anyone who sets up a mail server as an open relay sooner or later ends up blacklisted and can't send mail at all.

Re:The real question is... (1)

DNS-and-BIND (461968) | more than 4 years ago | (#32027752)

OK, which distro comes with open relays configured out of the box? I'm curious to know.

Re:The real question is... (-1, Flamebait)

Anonymous Coward | more than 4 years ago | (#32026504)

FYI: You can respond to posts without also being an asshole. Try it!

The "green card SPAM" is only the most famous (1)

tlambert (566799) | more than 4 years ago | (#32026770)

The "green card SPAM" is only the most famous early SPAM; if you want to be truly technical, Jordan Hubbard sent the first SPAM via a broadcast message to his /etc/hosts file on the very early net, though he wasn't advertising anything.

You can ask Jordan about this, he rather likes being the first 8-).

-- Terry

real question is...why is it not tagged Windows (0)

Anonymous Coward | more than 4 years ago | (#32027610)

Another real question is why is this article not tagged Windows?

Re:The real question is... (1)

Evildonald (983517) | more than 4 years ago | (#32028112)

Rude slashdotters like you are the reason I don't comment here any more. Go be passive aggressive elsewhere.

Re:The real question is... (0)

Anonymous Coward | more than 4 years ago | (#32029426)

You'd be surprised. People start businesses all the time, prop up a website, then want their HTML guy to set up a mail server because they can't afford or find a real administrator. The website developer finds a mail how-to, reads just enough to get the mail server working, ignores the warnings, and goes to happy hour.

Within 15 minutes script kiddies have found it and are relaying through it. Usually they notice something is amiss when their mail server ends up blacklisted and their connection is saturated.

There's a lot of low budget ghetto going on out there... I agree that the majority of it is botnets, but there's still open relays popping up. They don't last long before being blacklisted.

Re:The real question is... (1)

TouchAndGo (1799300) | more than 4 years ago | (#32025998)

I'm fairly certain that the Nigerian scams aren't actually coming FROM Nigeria...

Re:The real question is... (0)

Anonymous Coward | more than 4 years ago | (#32026000)

Who cares where spam comes from? (and why the sh!t do you capitalize every letter of spam??)
The point is that the longer I have worked in IT (13 years now), the larger the percentage of overall email is spam. Right now it accounts for 90% of all incoming email at the school district where I work. I've been monitoring it since 2008. This is up from 80% of all incoming email at the private firm where I worked from 2006-2008. I don't have figures for previous years but I can only assume that extrapolating backwards would reveal that this trend is maintained. Anyone?

Re:The real question is... (1)

MisterMidi (1119653) | more than 4 years ago | (#32027420)

The point is that the longer I have worked in IT (13 years now), the larger the percentage of overall email is spam.

Please get another job! ;-)

Re:The real question is... (1)

muphin (842524) | more than 4 years ago | (#32026166)

Hey Terry, shouldn't you be in jail for Denial of Service []
it doesnt matter where the spam comes from, its a business, it matters where it is sent from, shut down that and you've stopped it. Spam will always be around its just a matter of advancing technology to filter it, notice i didnt say stop it because like porn, its impossible to stop it all, its always evolving and advancing.
the poor internet is getting old and having a hard time dealing with spam, but its coping, i remember a while ago they said the internet will collapse under all the media streaming, well its still here; again when all the IPv4 addresses run out, people will move to IPv6 with maybe a slight inconvenience, but until IPv6, DNSSEC, DKIM, SPF is implemented we have to deal with outdated technology, and lazy people.

Re:The real question is... (2, Insightful)

Antique Geekmeister (740220) | more than 4 years ago | (#32026628)

Spam was the logical outcome of low sending cost and extremely few consequences. The niche exploited by people like Canter&Siegel, and by AOL's incessant spamming, has its origins in junk mail advertising, and before that in the wars for public billboard space in the cities of Europe, and doubtless had counterparts in ancient Rome and Athens and Jerusalem. and Babylon. In fact, the Tower of Babylon is a good metaphor for what happens now with spam flooding desirable traffic.

The problem isn't a technical one. It's a social one: The cost of individual messages is very low, especially if the resources to send them are stolen. And the consequences of sending them in bulk are, so far, insufficient to discourage the spammers or the professionals who provide them the tools. Even though spam seems to be rarely profitable, the _expectation_ of profit is enough to lure numerous hopeful or larcenous participants. Prosecutions remain rare, and the upstream providers seem happy to take the cash since they so rarely face consequences for hosting professional operations, and the newer zombie nets are too expensive to bother cleaning up.

There have been legal attempts to reduce spam. But spam is built on such a classic business model, that of junk mail, that any legislative effort runs headlong into the Direct Marketing Association and their lobbyists, or the equivalent in other countries. As individual technical fixes are applied, other versions of spam services expand to quickly fill the economic niche. So unless the technologically based approaches or the social approaches such as reasonable laws get so effective that the _apparent_ profit is eliminated, we're going to continue to see the deluge.

According to Sophos (2, Insightful)

shadowbearer (554144) | more than 4 years ago | (#32025824)

    Not saying they are wrong, but I suspect a more accurate measure of the problem would require many more sources of data.

  Since they rely on statistics generated from their products (not mentioned in TFA but I can't imagine where else they got their data from), there is an automatic bias introduced there.


Not hard to fix... (4, Insightful)

Anonymous Coward | more than 4 years ago | (#32025948)

I know two ways that most of this spam can be reduced so the US doesn't remain #1 here, but it takes a clued system administrator to do so.

#1: Block outgoing port 25 at the routers other than for the ISP's official mail server, and for clients who have signed a form taking full responsibility for their mail servers, and that any spam originating from them will come back onto their heads, not the ISP's.

#2: Sane mass mail rules on the mail server. Of course, this doesn't apply to mailing lists, but in general, an average Joe won't be sending thousands of MAIL TOs, nor sending out a 10,000 person bcc mail.

I don't think the problem is ISPs with open relays like which was the issue in years past, but private companies who have PHBs running the place that have no interest in spending for even the basics in security. I personally have encountered a lot of SMB owners who have told me, "Security has no ROI, so I am not interested in wasting my money on it" when presented with a proposal for even just the basics of network security such as outgoing spam filters on the company's Exchange server. They believe that they can call Geek Squad (or some random computer consulting firm that has the most TV ads) to fix anything if they find a problem. Of course, this means that when (not if) the business gets compromised, spambots can end up on numerous machines, and remain there indefinitely until the Windows Malicious Software Removal tool gets run on a patch day (assuming they even bother turning on Windows Update/Microsoft Update), company data gets destroyed, their ISP cuts their access off for TOS violations, or they find their IP range in a blackhole list and all their E-mail bounces.

Low spam from China? (-1, Flamebait)

nacturation (646836) | more than 4 years ago | (#32025964)

Isn't that because everybody totally blocks all inbound email connections from China? It's no longer profitable to use China as a spam source even considering all the "bulletproof hosting" offered there.

Re:Low spam from China? (2, Informative)

_merlin (160982) | more than 4 years ago | (#32026350)

e-mail to/from China works fine for me in Australia. Almost all of my spam comes from USA.

Re:Low spam from China? (2, Insightful)

yuna49 (905461) | more than 4 years ago | (#32026352)

Using the logic I described above, computers located in China spam at about the norm for all computers worldwide. The article reports that 1.9% of relaying hosts are located in China; this is actually slightly better than China's overall share of computers worldwide, 2.1%. (For the US the figures are 13% and 57% respectively.)

King of Spain (0)

Anonymous Coward | more than 4 years ago | (#32026018)

For some reason I read the title as "The US Continues Its Reign as King of Spain".

It's difficult (0)

javelinco (652113) | more than 4 years ago | (#32026020)

It's difficult to keep yourself in the top ten when everyone has blocked your mail servers. Poor China, all locked out of the fun stuff. Can't even play with the big boys anymore!

With apologies to Weird Al Yankovic (5, Funny)

Tackhead (54550) | more than 4 years ago | (#32026046)

There's a sale on quack medical drugs today.
It's all all 30% off from yesterday.
There's laetrile, nona juice, and ephedrine for speed.
Just a Visa or Paypal creds are all you need.

My partner's in jail, my staff is on the lam.
We've got botnets with petabytes of hijacked RAM.
And our ISP doesn't give a tinker's dam,
'Cause of our reputation as the King of spam.

Don't miss out on our giant online porno sale.
(Is my scam out there?)
We told Grandma she opted in for our e-mail.
(Is my scam out there?)
We got lawyers to help preserve our corporate veil.
(Is my scam out there?)
We got bullshit and horseshit, we've got tons of fail.
(Is my scam out there?)

No doctor will want a medical exam,
Our chiropractor's part of the insurance scam,
Get some herbal viagra and become a man,
'Cos we're known in this world as the King of Spam.

If you're hawking Chinese knockoffs of Nike shoes, (Is your scam out there?)
Some 419 scams, offers they can't refuse, (Is your scam out there?)
With their credit card's keylogged, they can sing the blues, (Is your scam out there?)
We do fraud, we do larc'ny, anything you choose. (Is your scam out there?)

Well, AOL shut down Spamford with a slam,
Alan Ralsky got nailed bigtime by from Uncle Sam,
But the flood's even bigger than the Hoover Dam,
'Cause we're known the world over as the King of spam.

King of spam.
King of spam.
King of spam.
We'll always be King of spam.
We'll always be King of spam...

- With apologies to Weird Al Yankovic, and of course, The Police :)

Re:With apologies to Weird Al Yankovic (1)

AnonymousClown (1788472) | more than 4 years ago | (#32026096)

And I thought I was the only one who heard that tune in his head after reading the title!

I'm even seeing Sting walking around with his 1983 razor stubble and white clothes.

He's got the stubble back but now at his age, he looks more like a lobster boat captain than a cool looking rock star.

Thats hardly surprising (0)

Anonymous Coward | more than 4 years ago | (#32026058)

Since the Chinese government is communist, and as such do not act merely on economic rationalism as US authorities do. They therefore have far more power to address concerns than the US government, which as a legal entity can be sued & coerced by the private sector as a result of their decisions and subsequent action. A great example of this is the sex-themed theme park in China that the government levelled by bulldozer just weeks before its planned opening. That would never happen in the states for fear of litigation.

Just to point out the obvious (4, Insightful)

Opportunist (166417) | more than 4 years ago | (#32026094)

It's not that the king spammers are in the US, it's that the US has the most machines permanently connected to the internet and infected by spambots. The whole statistics is a bit skewed because spam is one of those crimes where the one executing it is not necessarily also the one wanting to do it.

Just because the machine sending the spam is in the US doesn't mean the one wanting to send the spam is.

Re:Just to point out the obvious (0)

Anonymous Coward | more than 4 years ago | (#32029130)

It's not that the king spammers are in the US

Well, actually it is also that.

Just because the machine sending the spam is in the US doesn't mean the one wanting to send the spam is.

In general, yes, it does mean that, I'm afraid.

Flex Factor (0)

Anonymous Coward | more than 4 years ago | (#32026134)

it is required means of the essential part of w3 world. Flex Factor []

Surprise, surprise. Wait, maybe not so much. (3, Insightful)

jht (5006) | more than 4 years ago | (#32026144)

Not a shocker. According to an antivirus company, most spam comes from a place where people use Windows and are clueless about preventing infections. The zombie Windows machines are a big part of the problem, but the command & control systems seem to mainly be overseas. As are a lot of the products/scams being pitched.

What this says is that in the US users need to do a better job of securing their computers. And all around the world spammers need to be killed.

Re:Surprise, surprise. Wait, maybe not so much. (2, Interesting)

Opportunist (166417) | more than 4 years ago | (#32026516)

Last I checked the controlling stations are mostly in Turkey, Malaysia and Ukraine. I'm not entirly sure why, but I guess it's easier to keep control servers online in countries where the police has better things to do than to hunt down criminals that don't affect the local economy... or at least not in a harmful way.

Re:Surprise, surprise. Wait, maybe not so much. (0)

Anonymous Coward | more than 4 years ago | (#32028320)

So, why does China have less spam than the US?
From my experience in China, on the whole, people in China are even less sensitive to advertising(it's everywhere)/bloatware(eg: 360 security software)/spyware(popular sites have it), and basically everyone in China is using pirated Windows without updates.

Freedom comes with a price... (0)

Anonymous Coward | more than 4 years ago | (#32026168)

...and that price is super cheap discount viagara!

Wasted Effort (1)

hemlock00 (1499033) | more than 4 years ago | (#32026210)

My spam box has been filling at a noticeably faster rate in the past week, Im glad I just don't have to read any of it. Now I'm off to grow my penis size to 4 times the size in only 1 week!

USA #1 (4, Insightful)

antdude (79039) | more than 4 years ago | (#32026652)

We're #1, we're #1. YEAH! Go USA! :D

The US needs to do more to rid spam here (1)

aeiouy1 (1295306) | more than 4 years ago | (#32026716)

This is a surprise to me. That so much of the Spam is initiated here is disconcerting, because we should be able to do something about it. More needs to be done to tie the money stream to the spamming. If it is a particular affiliate stream then the pressure needs to be brought down on them to tighten things up or face consequences. Ultimately the problem with spam will only go away when people stop illogically being enticed into doing things because of it. Unfortunately spammers need such a small return on their mailing that it only takes a miniscule fraction of the population to fall for these mails to make it cost effective, I honestly would have thought at this point almost all spam originated outside the US, so like I said I found this a bit disturbing.

Re:The US needs to do more to rid spam here (1)

ScentCone (795499) | more than 4 years ago | (#32027860)

honestly would have thought at this point almost all spam originated outside the US

It does. You're confusing the origination of the spam with the infected machines used to relay it.

One man's spam . . . (1)

NicknamesAreStupid (1040118) | more than 4 years ago | (#32026718)

. . . is another man's ham. Both are dead pigs.

Re:One man's spam . . . (0)

1s44c (552956) | more than 4 years ago | (#32027252)

. . . is another man's ham. Both are dead pigs.

Ham is dead pigs. Spam is a mix of 90% cheap stuff with 10% dead pigs. Spam is all filler and no content.

Re:One man's spam . . . (1, Insightful)

Anonymous Coward | more than 4 years ago | (#32027414)

Ham is dead pigs. Spam is a mix of 90% cheap stuff with 10% dead pigs. Spam is all filler and no content.

I think the generally accepted story of unsolicited bulk email being called "spam" has to do with a Monty Python sketch involving Spam. And I'm not citing a reference to this, as it really doesn't matter if the story is apocryphal or not. Spam is mostly dead pigs. And you do realize that a great quantity of material in dead pigs is "cheap stuff?".
It is more like 90% dead pigs and 100% cheap stuff... and if you can't figure out why this does not add up to 190%... well, logic is apparently not for you.

Hi (-1, Troll)

hailfawebbe (1800304) | more than 4 years ago | (#32026884)

It's not that the king spammers are in the US, it's that the US has the most machines permanently connected to the internet and infected by spambots. The whole statistics is a bit skewed because spam is one of those crimes where the one executing it is not necessarily also the one wanting to do it. Brac Apartments []

Re:Hi (2, Interesting)

1s44c (552956) | more than 4 years ago | (#32027050)

It's not that the king spammers are in the US, it's that the US has the most machines permanently connected to the internet and infected by spambots. The whole statistics is a bit skewed because spam is one of those crimes where the one executing it is not necessarily also the one wanting to do it.

You are quite right. I get loads of SMTP connections from the US but xen.spamhaus filters out almost all of it. The spam that gets though tends to come from servers in south america, the middle east, and sometimes china. I'm wondering if the only reason for that is because spamhaus is better at mapping home IP ranges for the western world.

It's really sad that I have to drop mail connections from non-business IP space. Windows on broadband is a curse.

Re:Hi (2, Informative)

wvmarle (1070040) | more than 4 years ago | (#32027638)

Try greylisting. Anyone using a proper mailer will come through, >90% of spam (my experience) is stopped that way. And actually only mails from new, as yet unknown senders get delayed; friends or business associates you get mail from regularly get through without delay. And what comes through is mostly Nigerian scams, interestingly. Apparently they use proper mailers.

To me this has proven the best anti-spam measure so far. And by the time the spammers catch up it also means their cost of sending has gone up a lot as it is not "fire and forget" any more but real resources need to be allocated. So far they don't.

Re:Hi (2, Informative)

pnaro (78663) | more than 4 years ago | (#32027688)

Agreed. greylisting is very effective. That and checking SBL/RBL et al go a LONG way to keeping things at a sane level.

Re:Hi (1)

cenc (1310167) | more than 4 years ago | (#32028644)

I recently went through my email stats to see what IP's where sending email that was being rejected the most. I found only about 10 ip's in countries I have never had a reason to deal with composed about 70-80% of the waisted rejected email (thousands of emails each). I then either banned the country or the ip address. Not so much a solution, as saving some resources.


Re:Hi (1)

wvmarle (1070040) | more than 4 years ago | (#32029010)

I can not be bothered to go that far. Too much work. An incoming smtp takes maybe a couple hundred bytes over my 2 Mbit line, takes a couple thousand cycles of my 2 GHz or so processor, and adds a line in my log file. The effort I would have to put in to blacklist some IP (I'm surprised you get that many spamn from so few IPs in the first place) is simply not worth it.

Besides as I'm doing international business I don't want to black list a complete country.


Anonymous Coward | more than 4 years ago | (#32027870)


More likely 90% (1)

flyingfsck (986395) | more than 4 years ago | (#32028662)

Spam drops to a trickle on US national holidays like thanksgiving.

Fscking Yanks...

Load More Comments
Slashdot Login

Need an Account?

Forgot your password?