STOP JUNK E-MAIL

Spam fighter attacked, threatened.
Reward offered

Updated 5/15/97

$1,000 US REWARD OFFERED
for information leading to the arrest and conviction of those responsible.

My domain, newmediagroup.com, is under attack by someone who doesn't like my FIRM, PUBLIC, ANTI-SPAM stance. To date their actions have included sending apparently several thousand e-mail messages, forged showing my name as the sender. In addition, this same party or someone working with them conducted a denial-of-service attack on our system last night, 5/14. Details and logs have been posted to this site (link to logs file appears below). The terrorists used third-party unsecured SMTP servers as relays (which you will also see by looking at the headers of the messages that were sent).

Their attack has also included threats of harm against me.

Please let people know this did not originate at newmediagroup.com. It is a complete forgery. We are trying to investigate and at the moment have a number of backbone carriers, and MCI security, involved. I am doing all I can. Ask people not to write us to complain. This did not come from us. We don't spam. I am FIGHTING spam and that is why I was targeted in this manner. When you see their mail-bomb messages to me (examine the sample messages and logs of the incident), you will understand.

I am seeking cooperation from the sites which were used as relays. Sheila, apparently an adminstrator at freenet.carleton.ca (office@ is their e-mail address; if you have received junk that bounced off their mailer, I strongly suggest you contact them and demand the holes be closed). Carleton Freenet has notified me (5/15/97, 1600 EDT by e-mail) that they will not release their SMTP logs, which would show the origin of the message injected into their mailer. A man reached at nevwest.com said he had "one technician working on it" but really didn't understand the specifics, and was not very excited about helping. This is all very exciting for electronic terrorists, I am sure.

New Media Group (and I in particular!) do not send or generate commercial e-mail. Ever. We are a small Internet presence provider working closely and on-site with clients in the Midwestern US. Only. We do not seek, service, or advertise to anyone outside that area, and we do not use e-mail for advertising.

Copies of all logs and the threatening messages which came here have been forwarded to security officers at all ISPs we could identify, and at the security offices of backbone providers involved in this. We're trying, but it will be difficult to identify who did this. We're trying. I fully intend to press criminal and civil charges at the very moment an indictment becomes feasible.

The reason we have been targeted is that I (personally, not this company) have been leading a campaign AGAINST junk e-mail. Please help me find out who did this.

If you look at the headers, you will see that the messages did not come from here. The incoming messages threatened more attacks unless I stop my campaign to free people from unwanted junk e-mail. This is terrorism, plain and simple and I call on the entire Internet community to help track down the responsible parties. I will appreciate any assistance you can provide.

I am offering a reward of $1,000 for information leading to the arrest and conviction of the perpetrators of this crime.

System Log and Notes - showing the denial of service and e-mail bomb in progress

Back to home page



Copyright 1997 Jim Youll, all rights reserved
This document may be freely distributed provided any such redistribution presents the document in its original unmodified form including the copyright notice and this message.