A Charitable Research Foundation Devoted to Education, Consumer Protection, Scientific Advancement and Freedom...

  document Index | first magazine Section | main Archives

                                 about donations join H home media i about ( contact   


0:T  -  The  ACSA Zero Tolerance for SPAM+ Initiative
is also the
0:T  -  The ACSA Zero Tolerance for Ad/Spyware Initiative

It is the year 2005: 80% of your eMail could be SPAM... we have a radical solution for a disastrous problem: the SPAM/VIRUS/MALICIOUS SOFTWARE PLAGUE -  the 0:T Project.  We empathize with everyone's desire for a cheap, abundant way to advertise.  But SPAM and Ad/Spyware are not the way.

Today, according to SPAM monitors and blocking agents such as Appriver.com, Spam Assassin, Clean Mail, Qurb and others, nearly 80% of all email sent throughout the world is SPAM email.  Here is a recent readout of the most common sources of SPAM and of the composition of SPAM found by Appriver.com, a leading provider of SPAM/VIRUS filtering services: 

We at the ACSA's Network Security Analysis Group, believe that the solution to SPAM  and SPYWARE/MALWARE/ADWARE requires a twofold approach.

1) Management or Blockage (MoB). 

As SPAM is prevented by various software solution firms, like APPRIVER, they report statistics including the top SPAM source / VIRUS source IP Addresses, the top ISPs whose networks originate SPAM and the top viruses, as well as the most common forms of SPAM.  By organizing the Network Providers and Hosting Companies, ACSA has developed a series of tools that providers and hosting firms can use to bottle the source of SPAM and VIRUSes, and by careful action, insure that the original sources themselves are BLOCKED at the point of origin.

To participate in the 0:T Project, companies can assign a Role individual and email 0Tjoin@acsa.net

Some of the steps used by the 0:T Project include-

  - Contacting ISPs to police the highest volume sources of SPAM and VIRUSes by Email and intruder and providing information that can help them blockade same.

  -  Publishing Statistics for the Public hoping to encourage ISPs who are common sources of SPAM and Viruses to adapt tools designed to filter out SPAM and VIRUS plagues.

  -  Continuing to develop tools to filter and block SPAM and VIRUSes and continuing support for the 0:T RAMP Protocol and eMTrust system to block and eliminate SPAM.

  -    Working with the Criminal Authorities to prosecute offenders who FLOOD target mail servers for illicit reasons.

  -    Working with the anti-Virus and anti-Spam software companies to keep ahead of the crest of the SPAM and VIRUS PLAGUE.

  -    Working with the Criminal Authorities to prosecute offenders who create and distribute VIRUS and MALICIOUS software.

2) Bid/Join eMail Trust Database (eMTrust)

Every user of eMail has knowledge regarding who he or she would want to receive email from.  Over the years at ACSA, we've evolved a method that foolproofs the ability to prevent reception of SPAM. It involves the use of an electronically automated protocol that is used by eMail Agents, and Administrative Management Domains, to maintain an eMail Trust Database for each eMail account they manage.

An eMail Trust Database is a list of accepted subscriptions granted to senders by someone who possesses a Mailbox.  Any eMail received when not found in the eMTrust is placed into either the "1st Timer" category, "Repeat Requestor" category, or "Denied" category.

1st Timers are presented to the recipient whenever they log in, whereupon they approve those they recognize, request more information from those they don't but might be interested in, or deny any who they simply don't want.

Repeat Requestors are similar to 1st Timers, but after some number of attempts, are automatically placed into the "Denied" category, whereupon their further requests are treated as Junk eMail and placed into the Junk eMail box, rather than the inbox.

"Denied" email and Requesters is placed into the Junk eMail box (headers in a short form) and are sorted into a subcategory of "previously denied".

The 0:T Protocol would be used to establish background dialogs between Requestors and Inbox owners, which would provide each approved 1st timer or Repeat Requestor their own unique encrypted one-way key for use with each person's approved Inbox.  By implementation of eMTrust at the Mail Server level for Pop3 and SMTP, a crucial authentication/verification Trust approval method can be maintained automatically by the sending mailer and the receiving mailer.  This 0:T Protocol is called "Reliable Approved Mail Protocol" (RAMP) and a copy of its specification for use by Developers is available by emailing "RAMP@ACSA.net".  Of course, infection by proxy can take place where an accepted sender themselves send out infected eMail bearing a virus or malicious software downloader.  Filtering systems such as AVG, SPYSWEEPER, MICROSOFT ANTISPYWARE and ZONE ALARM Personal Firewall are recommended. 


We strongly invite membership in the initiative, and contribution to the overall 0:T Project.  The consequences of our efforts to simply contact the top sources of SPAM and VIRUS / MALICIOUS SOFTWARE on the web has, in only a month, resulted in a nearly 5% decline in SPAM and VIRUS propagation, as these companies move quickly to stem the tide.

As more sophisticated methods evolve to try and penetrate protocols such as eMTrust, ACSA will continue to evolve its robustness and measures for halting the invasion of SPAM, VIRUSes and MALICIOUS Software. And, simultaneously, the initiative for convincing companies whose networks allow sources of these infestations to emerge on their IP addresses, will be expanded, along with publicity intended to encourage them to take steps to bring about the elimination of the offending sources and where appropriate: to prosecute the offenders creating Viruses and Malicious software.

For more information about joining, mail us at 0Tjoin@acsa.net.  All spam sent to this email address may result in criminal prosecution.



Search our website or the internet:    

web     ACSA

Copyright 2005  American Computer Science Association Inc., ("ACSA") Please review our usage and legal pages listed above. In addition to traditional web presence role, this website also contains published content in a news and research format obtained from third parties, for which ACSA disclaims responsibility. ACSA is a charitable public interest research group and tax exempt private foundation under U.S. I.R.C. 501(c)3. Your donations may be exempt from federal or other taxation, however: please consult with your CPA or other Tax Counsel for further information.   General Contact: email us, or:

ATN: Andrew Vanoceur, Chairman,
General Delivery Box ACSA,
Los Alamos, New Mexico 87544-9999 USA

a l w a y s   u n d e r   c o n s t r u c t i o n