| 0:T  
							-  The  ACSA Zero Tolerance for SPAM+ Initiativeis also the
 0:T  -  The ACSA Zero 
							Tolerance for Ad/Spyware Initiative
 
							It is the year 2005: 
							80% of your eMail could be SPAM... we have a radical solution 
							for a disastrous problem: the SPAM/VIRUS/MALICIOUS 
							SOFTWARE PLAGUE -  the 0:T Project.  We 
							empathize with everyone's desire for a cheap, 
							abundant way to advertise.  But SPAM and Ad/Spyware 
							are not the way.
 Today, according to SPAM monitors and blocking 
							agents such as Appriver.com, Spam Assassin, Clean 
							Mail, Qurb and others, nearly 80% of all email sent 
							throughout the world is SPAM email.  Here is a 
							recent readout of the most common sources of SPAM 
							and of the composition of SPAM found by Appriver.com, 
							a leading provider of SPAM/VIRUS filtering services:
 We 
							at the ACSA's Network Security Analysis 
							Group, believe that the solution to SPAM  and 
							SPYWARE/MALWARE/ADWARE requires a twofold approach. 
							1) Management or Blockage (MoB).  
 As SPAM is prevented by various software solution 
							firms, like APPRIVER, they report statistics 
							including the top SPAM source / VIRUS source IP 
							Addresses, the top ISPs whose networks originate 
							SPAM and the top viruses, as well as the most common 
							forms of SPAM.  By organizing the Network 
							Providers and Hosting Companies, ACSA has developed 
							a series of tools that providers and hosting firms 
							can use to bottle the source of SPAM and VIRUSes, 
							and by careful action, insure that the original 
							sources themselves are BLOCKED at the point of 
							origin.
 To 
							participate in the 0:T Project, companies can assign 
							a Role individual and email
							0Tjoin@acsa.net. 
							
 Some of the steps used by the 0:T Project include-
 
 - Contacting ISPs to police the highest volume sources of SPAM and 
							VIRUSes by Email and intruder and providing 
							information that can help them blockade same.
 
 -  Publishing Statistics for the Public hoping to encourage ISPs who 
							are common sources of SPAM and Viruses to adapt 
							tools designed to filter out SPAM and VIRUS plagues.
 
 -  Continuing to develop tools to filter and block SPAM and VIRUSes 
							and continuing support for the 0:T RAMP Protocol and 
							eMTrust system to block and eliminate SPAM.
 
 -    Working with the Criminal Authorities to prosecute 
							offenders who FLOOD target mail servers for illicit 
							reasons.
 
 -    Working with the anti-Virus and anti-Spam software 
							companies to keep ahead of the crest of the SPAM and 
							VIRUS PLAGUE.
 
 -    Working with the Criminal Authorities to prosecute 
							offenders who create and distribute VIRUS and 
							MALICIOUS software.
 
							2) Bid/Join eMail Trust Database (eMTrust)
 Every user of eMail has knowledge regarding who he 
							or she would want to receive email from.  Over 
							the years at ACSA, we've evolved a method that 
							foolproofs the ability to prevent reception of SPAM. 
							It involves the use of an electronically automated 
							protocol that is used by eMail Agents, and 
							Administrative Management Domains, to maintain an 
							eMail Trust Database for each eMail account they 
							manage.
 
 An eMail Trust Database is a list of accepted 
							subscriptions granted to senders by someone who 
							possesses a Mailbox.  Any eMail received when 
							not found in the eMTrust is placed into either the 
							"1st Timer" category, "Repeat Requestor" category, 
							or "Denied" category.
 1st 
							Timers are presented to the recipient whenever they 
							log in, whereupon they approve those they recognize, 
							request more information from those they don't but 
							might be interested in, or deny any who they simply 
							don't want.
 Repeat Requestors are similar to 1st Timers, but 
							after some number of attempts, are automatically 
							placed into the "Denied" category, whereupon their 
							further requests are treated as Junk eMail and 
							placed into the Junk eMail box, rather than the 
							inbox.
 
							"Denied" email and Requesters is placed into the 
							Junk eMail box (headers in a short form) and are 
							sorted into a subcategory of "previously denied".
 The 0:T Protocol would be used to establish 
							background dialogs between Requestors and Inbox 
							owners, which would provide each approved 1st timer 
							or Repeat Requestor their own unique encrypted 
							one-way key for use with each person's approved 
							Inbox.  By implementation of eMTrust at the 
							Mail Server level for Pop3 and SMTP, a crucial 
							authentication/verification Trust approval method 
							can be maintained automatically by the sending 
							mailer and the receiving mailer.  This 0:T 
							Protocol is called "Reliable Approved Mail Protocol" 
							(RAMP) and a copy of its specification for use by 
							Developers is available by emailing "RAMP@ACSA.net".  
							Of course, infection by proxy can take place where 
							an accepted sender themselves send out infected 
							eMail bearing a virus or malicious software 
							downloader.  Filtering systems such as AVG, 
							SPYSWEEPER, MICROSOFT ANTISPYWARE and ZONE ALARM 
							Personal Firewall are recommended.
 
 CONCLUSION
 
 We strongly invite membership in the initiative, and 
							contribution to the overall 0:T Project.  The 
							consequences of our efforts to simply contact the 
							top sources of SPAM and VIRUS / MALICIOUS SOFTWARE 
							on the web has, in only a month, resulted in a 
							nearly 5% decline in SPAM and VIRUS propagation, as 
							these companies move quickly to stem the tide.
 
 As more sophisticated methods evolve to try and 
							penetrate protocols such as eMTrust, ACSA will 
							continue to evolve its robustness and measures for 
							halting the invasion of SPAM, VIRUSes and MALICIOUS 
							Software. And, simultaneously, the initiative for 
							convincing companies whose networks allow sources of 
							these infestations to emerge on their IP addresses, 
							will be expanded, along with publicity intended to 
							encourage them to take steps to bring about the 
							elimination of the offending sources and where 
							appropriate: to prosecute the offenders creating 
							Viruses and Malicious software.
 
 For more information about joining, mail us at
							0Tjoin@acsa.net.  
							All spam sent to this email address may result in 
							criminal prosecution.
   |  |