Michigan Enforces Do-Not-Email Registry Law 133
elanghe writes "The Michigan Attorney General filed suit against two companies sending adult-oriented email messages to the state's children, in violation of the Michigan Children's Protection Registry. A similar law in Utah is being challenged by the porn industry. While the FTC, influenced by the Direct Marketing Association, rejected the idea of a do-not-email registry, have these two states proven anti-spam laws like these — unlike CAN-SPAM — really have teeth?"
How does it work? (Score:3, Interesting)
Re:The Love of Money (Score:4, Interesting)
The problem is that a lot of the real spam companies are outside the US. It is sort of hard to enforce US laws outside the US. If a spam company has no office, no location and no connection to the US, it will be hard to enforce. Also $10k per violation will be hard to uphold. If you charge that by millions of e-mails, companies will claim you are asking for unreasonable damages and the truth is you would. The damage caused per spam e-mail is minimal, and certainly not a $10k violation. This idea that the children are being hurt (the articles own words almost) is nothing more then a red herring.
This only hurts ISPs. Watch the way an e-mail hops from router to router, point to point, on the "information super highway". Your statement almost screams, "I do not understand networks or the internet." This is unreasonable and puts blame on providers because of the actions of their users.
we should be thanking them... (Score:3, Interesting)
Use Michigan as an example for your own politicians....
The feds cannot do it, they are too corrupt with big industry hanging dollar bills in their faces.
On the state level, its a little bit less corrupt and you actually have SOME chance of getting a
law against spam thru.
I just don't understand... (Score:2, Interesting)
Re:How does it work? (Score:2, Interesting)
Re:The Love of Money (Score:3, Interesting)
I'm in Michigan (Score:1, Interesting)
But then I went and looked at the website
And whose definition of obscene do we use?
And what child has a fax machine?
Re:The Love of Money (Score:3, Interesting)
I think the only way enforcing a law like that would be to go after anybody in the US that is caught hiring offshore work for spam purposes. It would be hard to go after the pornographers unless they are the ones actually sending the spam because most of the time it's legal to create it where they are located. I seriously doubt that most porn mail originates in someplace like China or my spam box would be filled with Hot, Horny Asians just waiting for you - I'm pretty sure it's mostly outsourced from somebody in the US. I do get a few Russian, Asian, and Black e-mails like that, but 95% of them point to US sites tauting caucasian girls. Rarely do these get into my in-box (and if the filter catches them it blocks all links back to the site unless I release it to my inbox), but I sometimes lose legitimate mails like my Am-Ex bill (though I'm still messing with sensitivity settings)
Re:The Love of Money (Score:2, Interesting)
Do you know where spammers get their CPU time?
Indeed, the future of the internet seems to be a war over computing cycles, in the same way that the snail world was (is) a war over energy. Well, the world mostly fights over real estate, but that is at heart a fight over two things: ease of access to energy, and living areas with low energy requirements.
In any case, they are fighting to pilfer CPU cycles, which are then directed towards the most profitable endeavor that spare distributed CPU cycles can be applied to: sending spam, blackmail DDOSing, etc. But that will change as more we'll-buy-your-CPU-cycles projects come online, SETI@home and BOINC being the pioneer of course. At that time, the owners of zombie networks may switch over from spamming to something more socially and fiscally constructive.
Sorry, I'm rambling. What were we talking about again? :)
Oh yeah, hashing the do-not-email list. How long could that thing take to get brute-forced? The entropy value of a typical email address is low: maybe 15 characters from a ~30-character charset? That doesn't seem like too hard of a thing to brute-force, if you're the owner of a big zombie network.
In fact I remember when somebody brute-forced the entire AOL userlist just by sending test pings to the AOL email server: AAAAAAA@AOL.COM, nope. AAAAAAB@AOL.com, nope. AAAAAAC@AOL.COM, nope.....