Caslon Analytics elephant logo title for Spam Regulation note
home | about | site use | resources | publications | timeline   spacer graphic   Ketupa


overview

industry

offers

attention

fraud

statistics

blacklists

EU cases

US cases











related pages icon
related
Guides:

Governance

Information
Economy


Security
& Crime


Identity
Crimes







related pages icon
related

Profiles:

Spam
regulation in Australia


Email &
Messaging


Do Not Call
Registries


Wireless
access


Forgery &
Forensics


Surveillance

section heading icon     blacklists

This page considers spam blacklists. 

It covers -

  • introduction
  • statistics - how many blacklists, how many users?
  • controversies - irresponsible vigilantes or essential actors
  • cases - selected litigation in the US and elsewhere about use of blacklists
  • responses - DOS and other 'direct action' by spammers

subsection heading icon     introduction

ISPs and other entities have sought to reduce the impact of spam by excluding junk mail through black, white and grey lists. Those lists serve as filters and are analogous to lists used by schools, businesses and other entities in managing access to web sites.

  • a blacklist is an access control mechanism that excludes messages that match addresses or other information on that blacklist.
  • a whitelist restricts access to members of that list
  • a greylist serves as a temporary blacklist, used for example to exclude badly-configured email clients that may be used to send spam.

Many ISPs and individual organisations use email blacklists to exclude what is (or might be) spam. Those lists often encompass mail from one or more of the following specific -

  • IP addresses
  • email addresses
  • domain names
  • ISPs.

Notions of a public 'do not email' registry are considered here as part of discussion of Australian and overseas Do Not Call register schemes.

subsection heading icon     statistics

How many black, white and grey lists are in operation? How many users rely on them?

The answers to those questions are obscure. It is clear that many ISPs and large network operators, including Australian government agencies, rely on blacklists compiled by for-profit and not-for-profit organisations in Australia and overseas. There has been no authoritative report on the number of users of blacklists or the 'market share' of particular blacklists.

There has similarly been no comprehensive study of the number of blacklists. It is clear that a large number of blacklists have been created and that new lists continue to appear, although a handful of services appear to have gained the acceptance of major operators.

In December 2006 the Open Relay Database (ORDB) announced that it was closing ...

The general consensus within the team is that open relay RBLs [relay blocking lists] are no longer the most effective way of preventing spam from entering your network as spammers have changed tactics in recent years, as have the anti-spam community.

Closure was attributed to the shift by spammers from use of open mail relays (SMTP proxy servers) - claimed to account for 90% of spam but down to 1% in late 2006 - to botnets, ie infected personal computers. ORDB said ISPs and other chokepoints should remove its lists immediately and consider other methods of spam management.

subsection heading icon     controversies

Blacklists are contentious because they are privately operated and can directly affect the commercial interests of entities that are spamming or are merely alleged to be spamming.

They have been welcomed by many ISPs, corporate network operators and anti-spam activists. They have been tacitly endorsed by a range of agencies.

They have also been damned by spammers, with milder condemnation by some cyberlibertarians who are concerned about constraints on free speech or question the accountability of list operators.

Gadfly John Gilmore famously quipped

For Joe Blow to refuse emails is legal (though it's bad policy, akin to "shooting the messenger"). But if Joe and ten million friends all gang up to make a blacklist, they are exercising illegal monopoly power. Particularly when they add to their "gang" by threatening each outsider in turn with being blacklisted until they join the gang.

Disagreement within the 'blacklist community' is also evident, with some participants claiming that others are 'cowboys' or biased.

Blacklist operators may not be located in a particular jurisdiction (and thus not subject to that jurisdiction's law) and may not feature effective mechanisms for review of decisions or even information about how non-specialists can contact them.

The basis for inclusion of information on a particular list is not necessarily verified. Criteria for listing are often unclear. Mechanisms for removal of incorrect information may also be uncertain.

That is of concern, given criticisms that particular lists have been operated by inept vigilantes and because inappropriate inclusion on a list can damage an address owner or ISP.

Members of the Global Internet Liberty Campaign (GILC) and the Internet Free Expression Alliance (IFEA) warned of 'stealth blocking' as

not in keeping with the principle that end users should decide what to view and with whom to communicate, object to the practice of Internet Service Provider "stealth blocking." This concerns ISPs that do not bill themselves as filtered service providers but intentionally block their customers from accessing certain Web sites or sending mail to users at certain other ISPs. "Stealth" blocking is done undetectably, so users only see a browser error saying that a Web site is down or an email error saying that the destination mail server could not be reached. Over 99% of end users never discover that any intentional blocking is being done.

One observer commented in 2005 that many Australian 'mum & dad' users are more concerned that the ISP filter all spam, with unrealistic expectations that the intermediary can fully exclude all junk mail.

In 2006 the OECD Task Force on Spam noted substantial variation in the quality of antispam blacklists, partly attributable to the absence of a general code for their evaluation. It commented that many lists

are poorly managed, abandoned or of dubious integrity: names can be added quickly, the applied criteria may be unclear, and the removal from the list may be virtually impossible.

That comment was endorsed by Jonathan Ezor's 2006 paper Busting Blocks: Appropriate Legal Remedies For Wrongful Inclusion In Spam Filters Under U.S. Law.

Other critics have endorsed problematical proposals such as national/provincial Do Not Email (DNE) registers that would supposedly complement Do Not Call registers.

subsection heading icon     cases

Disagreement is reflected in a range of court cases.

In 2006 for example a US federal court issued a default ruling against British antispam organisation Spamhaus, ordering it to pay US$11.7 million to e360insight. The plaintiff complained that it had been improperly included on Spamhaus's blacklist. Spamhaus did not offer a defense, thus incurring a default judgment. The court ordered Spamhaus to remove e360insight from the blacklist and publish an apology.

Spamhaus feistily commented that e360insight was indeed a spammer and would accordingly not receive such apology, with the ruling showing that US courts "can be bamboozled by spammers with ease". Spamhaus moreover advised that the US court judgment was meaningless, as the blacklist operator is based in the UK. e360insight claimed that Spamhaus is "a fanatical, vigilante organization that operates in the United States with blatant disregard for U.S. law". The case was sent back to the court on appeal in 2007.

The controversial New Zealand Open Relay Behavioural Modification System (ORBS), under the auspices of Alan Brown, blacklisted local ISPs Xtra and Actrix in 2001. That provoked action in the New Zealand courts, amid assertions that the list featured organisations with which the list operator had commercial disputes.

The ISPs received a High Court injunction for ORBS to stop blacklisting them; ORBS responded by circulating their IP addresses via newsgroups. That was treated by the lawyers as a violation of the injunction; they petitioned the court for an arrest warrant. Brown subsequently acknowledged that he had inappropriately blacklisted the ISPs.

Anti-spam group CAUCE commented

ORBS is an organization that tried to do something which I think is entirely appropriate, which is identifying and targeting for blocking known spam sources. But the way they went about it was very arbitrary and in some cases came down to personal disputes between the operator and those targeted. It was so harmful to the anti-spam movement it's good they've been knocked out of the field.

subsection heading icon     responses

Many spammers appear to have eschewed litigation, recognising that courts in many nations will be unsympathetic to their breaches of anti-spam law or other offences, and have instead resorted to 'direct action'.

That direct action has typically taken two forms -

  • denial of service attacks (aka DOS)
  • 'joe jobs'.

DOS - sometimes involving distributed denial of service (DDOS) - attacks involve use of one or more machines to flood a server and thereby put it offline.

DDOS has been a particular feature of action by spammers from the former Soviet Union and its satellites since 2003, relying on virus or trojan-infected personal computers ('bots') to create large networks ('botnets') that attack anti-spam services and blacklist providers such as Spamhaus.

Joe jobs, a form of 'identity pollution' discussed in more detail elsewhere on this site in considering identity crime, seek to erode the credibility of a blacklister or merely tie up its staff.

They involve sending email that purports to be from the anti-spam organisation or that is supposedly endorsed by such an organisation. That email may feature the usual spam offers, a link to an adult content site or virus site, or an attached nasty such as a virus or adult graphic. Some of the more ingenious feature threats to network administrators or individual users that a particular blacklister "will shut them down" if the recipient fails to comply with instructions in the message.

Spammers have taken similar action against critics: we for example suffer from a spammer sending mail that purports to come from this address.




icon for link to next page    next page  (EU spam cases)




this site
the web

Google
version of September 2007
© Bruce Arnold
caslon.com.au | caslon analytics