Stopping Spam

 ========= Old Image Removed =========Array
(
    [_wp_attached_file] => Array
        (
            [0] => 2008/07/spam-net.jpg
        )

    [_wp_attachment_metadata] => Array
        (
            [0] => a:5:{s:5:"width";i:640;s:6:"height";i:452;s:4:"file";s:20:"2008/07/spam-net.jpg";s:5:"sizes";a:10:{s:6:"medium";a:4:{s:4:"file";s:20:"spam-net-336x237.jpg";s:5:"width";i:336;s:6:"height";i:237;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:20:"spam-net-140x140.jpg";s:5:"width";i:140;s:6:"height";i:140;s:9:"mime-type";s:10:"image/jpeg";}s:9:"wbhm-icon";a:4:{s:4:"file";s:18:"spam-net-80x80.jpg";s:5:"width";i:80;s:6:"height";i:80;s:9:"mime-type";s:10:"image/jpeg";}s:13:"wbhm-featured";a:4:{s:4:"file";s:20:"spam-net-640x450.jpg";s:5:"width";i:640;s:6:"height";i:450;s:9:"mime-type";s:10:"image/jpeg";}s:20:"wbhm-featured-square";a:4:{s:4:"file";s:20:"spam-net-600x452.jpg";s:5:"width";i:600;s:6:"height";i:452;s:9:"mime-type";s:10:"image/jpeg";}s:18:"wbhm-featured-home";a:4:{s:4:"file";s:20:"spam-net-440x311.jpg";s:5:"width";i:440;s:6:"height";i:311;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wbhm-featured-carousel";a:4:{s:4:"file";s:20:"spam-net-375x265.jpg";s:5:"width";i:375;s:6:"height";i:265;s:9:"mime-type";s:10:"image/jpeg";}s:28:"ab-block-post-grid-landscape";a:4:{s:4:"file";s:20:"spam-net-600x400.jpg";s:5:"width";i:600;s:6:"height";i:400;s:9:"mime-type";s:10:"image/jpeg";}s:25:"ab-block-post-grid-square";a:4:{s:4:"file";s:20:"spam-net-600x452.jpg";s:5:"width";i:600;s:6:"height";i:452;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:20:"spam-net-125x125.jpg";s:5:"width";i:125;s:6:"height";i:125;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}
        )

    [_imagify_optimization_level] => Array
        (
            [0] => 1
        )

    [_imagify_data] => Array
        (
            [0] => a:2:{s:5:"stats";a:3:{s:13:"original_size";i:551879;s:14:"optimized_size";i:505750;s:7:"percent";d:8.3599999999999994;}s:5:"sizes";a:9:{s:4:"full";a:5:{s:7:"success";b:1;s:8:"file_url";s:48:"https://news.wbhm.org/media/2008/07/spam-net.jpg";s:13:"original_size";i:165170;s:14:"optimized_size";i:125214;s:7:"percent";d:24.190000000000001;}s:9:"thumbnail";a:5:{s:7:"success";b:1;s:8:"file_url";s:56:"https://news.wbhm.org/media/2008/07/spam-net-140x140.jpg";s:13:"original_size";i:16304;s:14:"optimized_size";i:15631;s:7:"percent";d:4.1299999999999999;}s:6:"medium";a:5:{s:7:"success";b:1;s:8:"file_url";s:56:"https://news.wbhm.org/media/2008/07/spam-net-336x237.jpg";s:13:"original_size";i:53167;s:14:"optimized_size";i:51938;s:7:"percent";d:2.3100000000000001;}s:9:"wbhm-icon";a:5:{s:7:"success";b:1;s:8:"file_url";s:54:"https://news.wbhm.org/media/2008/07/spam-net-80x80.jpg";s:13:"original_size";i:6000;s:14:"optimized_size";i:5700;s:7:"percent";d:5;}s:13:"wbhm-featured";a:5:{s:7:"success";b:1;s:8:"file_url";s:56:"https://news.wbhm.org/media/2008/07/spam-net-600x338.jpg";s:13:"original_size";i:99832;s:14:"optimized_size";i:99292;s:7:"percent";d:0.54000000000000004;}s:20:"wbhm-featured-square";a:5:{s:7:"success";b:1;s:8:"file_url";s:56:"https://news.wbhm.org/media/2008/07/spam-net-300x300.jpg";s:13:"original_size";i:54376;s:14:"optimized_size";i:53724;s:7:"percent";d:1.2;}s:18:"wbhm-featured-home";a:5:{s:7:"success";b:1;s:8:"file_url";s:56:"https://news.wbhm.org/media/2008/07/spam-net-440x311.jpg";s:13:"original_size";i:80389;s:14:"optimized_size";i:79358;s:7:"percent";d:1.28;}s:22:"wbhm-featured-carousel";a:5:{s:7:"success";b:1;s:8:"file_url";s:56:"https://news.wbhm.org/media/2008/07/spam-net-375x265.jpg";s:13:"original_size";i:63281;s:14:"optimized_size";i:62094;s:7:"percent";d:1.8799999999999999;}s:14:"post-thumbnail";a:5:{s:7:"success";b:1;s:8:"file_url";s:56:"https://news.wbhm.org/media/2008/07/spam-net-125x125.jpg";s:13:"original_size";i:13360;s:14:"optimized_size";i:12799;s:7:"percent";d:4.2000000000000002;}}}
        )

    [_imagify_status] => Array
        (
            [0] => success
        )

)
1637692919 
1214870400

Wes Thompson is no stranger to spam.

“I probably get you know, 200 or 300 spam e-mail a day.”

He and two co-workers are powering down a laptop as they wrap up a lunch meeting at a Homewood cafe. Thompson says he usually just deletes the annoying messages if the sender is unfamiliar. But he works in internet marketing and spam means extra challenges for his business’ legitimate messages.

“You’ve got to just really tip toe around so you don’t put the wrong words in the subject line. You know you don’t use the wrong words in the body of the e-mail…you’ve just got to be really accurate with how you manage your e-mail campaign or you’ll get dumped in a spam box.”

The problems don’t just affect internet marketers. Spam eats up bandwidth, slowing down computer systems. It’s a gateway for viruses and identity theft. The technology firm Ferris Research estimated last year spam had a global economic impact of 100 billion dollars. The way we’ve fought spam, as alluded to a moment ago, is to use software to redirect it to a separate folder or erect thick walls so it doesn’t touch our inboxes. But that doesn’t change the fact those e-mails still clog networks and some messages do get past filters. So Gary Warner says we have to aggressively go after the spammers themselves.

“We would like to see prosecutions on a monthly or even weekly basis on spam.”

Warner is UAB’s Director of Research in Computer Forensics. And the tool he hopes will help in that effort is the university’s Spam Data Mining for Law Enforcement Applications project. Big name, but what’s it do? Well, it starts with bringing down those filters and collecting thousands of pieces of spam. Then examining them closely.

“In an e-mail message there are lots of attributes that we’re storing in our database. So for instance attributes might be who is it from, what IP address, internet protocol address sent the e-mail”

By looking at eleven attributes, Warner and his researchers can group spam with similar qualities or connections. That’s important because of how most spam is sent. It doesn’t come from humans, at least not directly. Meet the botnet. A botnet is a collection of computers, could be your regular desktop model or the large networks of business, government or universities computers. They are broken into remotely and secretly, allowing a criminal to control masses of zombie computers like a master puppeteer.

“One spammer will say, ‘Alright, I’d like these three-thousand computers to all begin sending this message now to everyone in their address books.’ ”

So back to those e-mails UAB researchers are grouping. If they can establish a given cluster of messages is connected, they may be from one source…one botnet. All of the sudden, thousands, even millions of leads become one case. So it’s like having a rash of bank robberies, but the man behind the mask is the same.

The Data Mining project is the kind of tool Warner says can help law enforcement better investigate e-mail forensically. Although actually nabbing spammers still presents major challenges, says FBI special agent Dale Miskell.

“We have to get legal process of subpoenas to get the information. And as you well know, cyber speed is a lot faster than legal speed.”

Spammers also work hard to hide their identity and cover their tracks. Miskell says as researchers develop new investigation methods, the bad guys seem one step ahead. And then there’s one big complicating factor…e-mail zips effortlessly across international borders. Laws don’t.

“Some countries cooperate. Some don’t. And in some countries it’s not even against the law so they don’t even work the case.”

The UAB Data Mining project did have a notable victory last fall. They helped trace e-mail supporting the Ron Paul presidential campaign to a Ukrainian spammer. Three thousand botnets sent 162 million unwanted messages. With numbers that large, it’s easy to see how few people it takes to inflict damage. In fact, research suggests 80% of all spam comes from just 200 sources. But catching those responsible doesn’t happen regularly enough for spam laws to deter. It’s is still profitable with little chance of prosecution. So Gary Warner, can we win this war against spam?

“I think we can win the war against domestic spammers. And I think we can do a much better job of cleaning up the American portion of the internet. Unfortunately the result may be that we just push the problem overseas in a way that is stronger than it is currently.”

Perhaps not the resounding affirmation internet users would hope for. But a step which could mean we hear from that Nigeria prince a little less often.

 

 

Infant dies and 10 others sick in latest listeria outbreak tied to ready-to-eat meat

The cases appeared in California, Illinois, New Jersey and New York between July 31 and Oct. 24, the CDC said. Nine out of the 11 infected individuals were hospitalized.

NATO head and Trump meet in Florida for talks on global security

U.S. President-elect Donald Trump and the head of NATO, Mark Rutte, met on Friday in Palm Beach for talks on global security, the military alliance said Saturday.

Climate change plays a role in global rise of dengue fever

Over 12 million cases of dengue fever were reported in 2024, the most ever. A study suggests climate change has likely played a significant role in the disease's expansion.

What a mollusc shell and fiber optic cables have in common

A heart cockle shell has been found to let in light through a design that resembles fiber optic cables. This could inspire everything from helping coral survive to designing new camera lenses.

Bringing Thanksgiving food on a plane? Here is what you should know

Thanksgiving favorites such as mac and cheese, turkey and casseroles can be brought through TSA checkpoints. But cranberry sauce, maple syrup and gravy must go in checked baggage, the agency says.

South Africa’s illegal gold miners are locked in an underground standoff with police

Surviving on a diet of toothpaste and toilet paper, South Africa's notorious "zama-zama" illegal miners continue a weeks-long standoff with police in the darkness of a disused gold mine.

More News Coverage