Spam Sting
from the get-'em dept
DSLReports set up a little sting operation to catch a spammer, and the results were fairly interesting. They had a hidden page set to generate a random email address, and they recorded the IP address of everyone who hit that page – so they could match the IP address with the specific random email address. They very quickly (8 hours) started receiving spam from someone who accessed the page. Though, they have the evidence of where the person came from (on the @Home network, now run by Cox), @Home and now Cox haven’t cared enough to do anything. However, they point out that setting up a similar “sting” operation could be done pretty easily. Perhaps someone should tell the FTC about this – and see if they’re really serious about going after spammers.