Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Spam The Internet

Who's Trading Your E-mail Addresses? 355

Bennett Haselton is back with another piece on e-mail privacy. He starts "On April 14, 2007, I signed up for an AmeriTrade account using an e-mail address consisting of 16 random alphanumeric characters, which I never gave to anyone else. On May 15, I started receiving pump-and-dump stock spams sent to that e-mail address. I was hardly the first person to discover that this happens. Almost all of the top hits in a Google search for "ameritrade spam" are from people with the same story: they used a unique address for each service that they sign up with, so they could tell if any company ever leaked their address to a spammer, and the address they gave to AmeriTrade started getting stock spam. (I don't actually do that with most companies where I create accounts. But after hearing all the AmeriTrade stories, I created an account with them in April just for the purpose of entering a unique e-mail address and seeing if it would get leaked.)" Bennett continues on if you're willing to click the link.

What's surprising is that as far as I can tell, AmeriTrade has taken almost no heat in the media for letting this happen. Despite the abundant testimonials from bloggers who had their addresses leaked, the story never crossed over into the "mainstream" Internet press. In a recent Bloomberg News story, the FBI warned that E*Trade and AmeriTrade users were vulnerable to spyware installed by criminals in hotels and cybercafes to capture accounts and run pump-and-dump stock spams; no mention of the fact that all AmeriTrade e-mail addresses were apparently already in the hands of spammers anyway (although no one knows if usernames and passwords were leaked to the spammers as well).

This doesn't bode well for anyone who uses any type of online service and wants that service to keep their personal information secure. If AmeriTrade got skewered in the media for leaking customers' personal information to spammers, other companies would see that and learn the lesson. On the other hand, if AmeriTrade gets away with it with barely a whisper in the mainstream news, other companies are going to take note of that, too. Besides, spam and identity theft hurt everyone, not just the victims, because the costs are passed on to all of us in terms of higher ISP charges, higher payment processing fees, and more mail lost due to stringent spam filters.

AmeriTrade disclosed in April 2005 that a tape containing some customer information might have been stolen in February of that year, and many spam victims who blogged about their AmeriTrade addresses being stolen, referenced that incident as the likely cause. But after Bill Katz's blog post became a clearinghouse of sorts for complaints about stolen AmeriTrade addresses (probably as a result of being the first match on Google for "ameritrade spam"), several users posted that they had received spam at accounts that were only created with AmeriTrade in summer 2006. And then my e-mail address got leaked between April 14 and May 15, 2007. So it's pretty clear that some attacker has access to the AmeriTrade customer database on an ongoing basis, and the February 2005 tape theft probably had nothing to do with it.

AmeriTrade says that California law required them to notify their California customers of a potential security breach after the tapes were stolen, and that they went further and notified all of their customers anyway. Since there is now proof that their database is more or less perpetually open to some outside attacker, will they send out another notification letter to customers?

An accidental security breach can happen to any responsible company, especially if they are compromised from the inside. But the trail of blogosphere and UseNet posts indicates that several times AmeriTrade has concealed the full extent of the problem from customers who asked them about it, or has given out information that they already knew was wrong. In one thread in October 2005, a user reported that they wrote to AmeriTrade asking why their AmeriTrade-only e-mail address was getting spammed, and AmeriTrade replied that the spammer might have guessed the address using a dictionary attack, adding:

We have no reason to believe that any of our systems have been compromised. Ameritrade deploys state of the art firewalls, intrusion detection, anti-virus software as well as employs a full time staff of employee's dedicated strictly to Information Security and protecting Ameritrade's systems from unauthorized access.
But that was long after February 2005, when AmeriTrade said that tapes containing customer data were stolen. (Even if that turned out not to be the cause of the spam after all, by that point AmeriTrade knew that their customers' addresses had been leaked somehow.)

Then when my friend Art Medlar complained to AmeriTrade this year about the same thing happening, he got a response saying that even if he was getting spammed by an address that he only gave to AmeriTrade, that could be the result of hackers "implanting 'bots' that have the ability to extract e-mail addresses from your computer, even when you have protective spy software engaged". But of course this makes no sense -- if this were the source of the problem, it would affect everyone's e-mail addresses equally, and would not explain why a disproportionate number of complaints were coming from people who created addresses that they gave to AmeriTrade specifically.

When I sent AmeriTrade my own inquiry, I got a response that was identical to a forwarded message that someone else posted to news.admin.net-abuse.email in April. (To their credit, in this version of the message, AmeriTrade is acknowledging responsibility for the problem instead of attributing it to dictionary attacks or botnets. But the e-mail contains the curious piece of advice: "Please be sure to delete any spam you might receive, then empty your e-mail's trash so that it's no longer kept there, either." Huh? As one reader replied to the UseNet thread: "Cynical Translation: Please don't retain any independent evidence.") At first I didn't realize this was a boilerplate response, so I sent back some more questions, asking, for example, whether they would notify their California customers of the data security breach as required by that state's laws. The second response I got was a copy of the old boilerplate that they were sending out two years ago, blaming "dictionary attacks".

Now, compared to the 1,000 spams I already get every day (pre-filtering), the AmeriTrade spams were just a drop in the bucket, and many of their customers are probably in the same boat. And unlike most AmeriTrade customers, at least I can stop all AmeriTrade spam just by de-activating those addresses, since they aren't used for anything else. (Right now I'm keeping them open just to see what else comes in.) But AmeriTrade's database also contains much more valuable information such as names, PIN numbers (do you use the same PIN number everywhere that you sign up?), and Social Security Numbers. When I signed up for my account, informed by dire warnings that federal law required accurate information "to help the government fight the funding of terrorism and money laundering activities", I gave AmeriTrade my real SSN, address, and other personal data, figuring that if I gave them false information, I might get in more trouble than the experiment was worth. But now that the attacker has my e-mail, they might have all of my other information as well. In the coming months I'll probably start checking my credit report more often than I used to.

Probably someone inside AmeriTrade is selling customer data to an outside spammer. (It seems less likely that an attacker would keep breaking into AmeriTrade repeatedly to get updated copies of the customer list. Once you've broken in and gotten the customer database from 2006, why bother breaking in a year later, taking the risk all over again of getting caught and going to jail, just to get the updated 2007 database? Surely the 2006 list would be enough to run any pump-and-dump stock scam that you want!) Two suggestions to AmeriTrade to tighten their security: First, the number of people within the company who can access the customer database, is probably a lot larger than the number who actually need to access the customer database. Limit access to the e-mail database to people who actually need it. Second, in any cases where different employees really need to have access to the list, try giving them different versions of it, where each version is "seeded" with spamtrap addresses at Hotmail and Yahoo Mail. If the spamtrap addresses that start receiving spam are all ones that were used to seed one particular employee's copy of the list, then you've found the source of the leak. That won't stop the spam being sent to addresses that have already been stolen, but it could prevent further leaks from happening.

The SEC recently announced that they would suspend trading of companies whose stocks had been the target of spam campaigns to manipulate the price. Perhaps AmeriTrade could do something similar -- once a stock is identified as being promoted in spams sent to AmeriTrade customers, any customer attempting to buy that stock would be presented with a message saying that AmeriTrade was blocking the transaction for security reasons. (If this runs afoul of some SEC regulation that a brokerage has to let you buy any stock you want any time you want, then at least display a big warning when AmeriTrade users try to buy it through their system, saying that the stock has been the subject of a fraudulent promotion scheme and is an extremely high-risk buy.) However, while this would remove the incentive for stock spammers to target AmeriTrade customers, it's also really just covering up a symptom of the problem, rather than addressing the problem itself, which is that a spammer was able to steal the customer information from AmeriTrade's database in the first place.

But whatever they do, AmeriTrade should stop blowing off the people who complain about the spam, with messages about "dictionary attacks" and "botnets". When customers create specialized spamtrap addresses to detect if their e-mails ever get leaked, those are the tech-savvy customers who (a) know what they're doing, and (b) hate spam more than most people, and giving them misleading information is just poking a stick in their eye. Not a smart move when AmeriTrade has been leaking private customer information and is based, as their name indicates, in the most litigious country in the history of the world.

This discussion has been archived. No new comments can be posted.

Who's Trading Your E-mail Addresses?

Comments Filter:
  • Hrm. (Score:2, Interesting)

    by grub ( 11606 )

    I use TDWaterhouse for trading (I'm in .ca) and have never had a problem.

    From what I can tell the only sites where unique addresses seem to get out are from BitTorrent trackers. Not a complete surprise I guess.

    Protip: if you run your own mail server generate a whack of aliases (ie: bogus000 through bogus999) so you always have a disposable address available.

    • Re:Hrm. (Score:5, Interesting)

      by rherbert ( 565206 ) <slashdot DOT org AT ryan DOT xar DOT us> on Wednesday May 30, 2007 @11:04AM (#19322847) Homepage
      If you run your own mail server, set up a subdomain where every address goes to your inbox.... That way, it's fairly obvious when you get spam to ameritrade.com@bills.mydomain.com. I caught EmigrantDirect that way, although I was simply shocked when they never responded to my e-mail about it.
      • Re: (Score:3, Interesting)

        by grub ( 11606 )
        I just use aliases :) That way if the spam starts to flow I just comment out that alias and that address no longer works.
      • Re:Hrm. (Score:4, Insightful)

        by CastrTroy ( 595695 ) on Wednesday May 30, 2007 @11:13AM (#19322993)
        I used to do that, but found that I got a lot of extra spam from people just sending email to random addresses at my domain. It was too much trouble so, I went back to configuring my addresses individually. That way it's easier to block certain addresses when they get too much spam, and you know who is sending you the spam.
        • Re: (Score:3, Informative)

          by greed ( 112493 )

          I had the same problem as the parent with the same config the grandparent was using. Two things helped immensely.

          First, a few rules in my Postfix helo_access file:

          /\.mydomain\.mytld$/ 550 You are not me.
          /^mydomain\.mytld$/ 550 You are not me.
          /^[\d.]+$/ 550 See RFC 2821.
          /^\[my.dot.ted.quad\]$/ 550 You are not me.
          /^\[10\.[\d.]+\]$/ 550 Your network is unreachable.
          /^\[192\.168\.[\d.]+\]$/ 550 Your network is unreachable.

          (Yes, that doesn't trap all ways of writing IP address, and leaves o

        • Re:Hrm. (Score:4, Insightful)

          by bill_mcgonigle ( 4333 ) * on Wednesday May 30, 2007 @02:39PM (#19326161) Homepage Journal
          I used to do that, but found that I got a lot of extra spam from people just sending email to random addresses at my domain.

          Did you use a subdomain like the GP suggested? I've had plenty of dictionary attacks of the form foo@example.com, but there's no way, other than a harvester, to know about foo@bar.example.com.
        • by 6Yankee ( 597075 )
          One thing I'm thinking of trying on my next change of email address: Prefixing with my initials, and shitcanning anything that doesn't start with those characters. Bye-bye vladimir.rodriguez and all the other unlikely names!

          They might guess ebay@mydomain.com, slashdot@mydomain.com - but what are their chances of getting 6.y.slashdot? (Not my real initials :P )

          Anyone out there who's used this approach, and can say whether it's worthwhile?
    • Re:Hrm. (Score:4, Insightful)

      by spyrochaete ( 707033 ) on Wednesday May 30, 2007 @11:25AM (#19323187) Homepage Journal
      If you create throwaway addresses, don't forget to disable any catchall address so you don't get bombarded with 50 addresses worth of spam!
      • Re: (Score:2, Insightful)

        by grub ( 11606 )
        yeah. I think catchalls are over-rated. I see so much spam that's aimed at random user names a catchall would be driving me nuts.
    • Re:Hrm. (Score:5, Interesting)

      by It doesn't come easy ( 695416 ) * on Wednesday May 30, 2007 @12:11PM (#19323899) Journal
      On the other hand, I also use TDWaterhouse and I also always use a unique email address for every system where I have an account, including for TDWaterhouse. And at the same time TDWaterhouse combined with Ameritrade, I started getting pump & dump stock scams sent to my TDWaterhouse email address (which was the same email address I was using before TDWaterhhouse and Ameritrade combined). It seems to me that pretty much confirms that Ameritrade has some kind of ONGOING security problem. And since access to my TDWaterhouse (now TDAmeritrade) account means access to my money, I will be moving my accounts ASAP.
      • Re:Hrm. (Score:5, Interesting)

        by LoadStar ( 532607 ) on Wednesday May 30, 2007 @12:37PM (#19324317)
        I opened a TD Ameritrade account a couple of months ago, and I too started getting slammed with pump-and-dump spam. The problem for me is that I went IN PERSON to a TD Ameritrade branch and opened the account, so it's not like a "man in the middle" attack, unless this hypothetical man in the middle is actually opening up brick-and-mortar branches.

        I was simply using the account to hold the relatively small stock portfolio I have, so I have no problem moving my account elsewhere.
      • Re:Hrm. (Score:5, Interesting)

        by NatasRevol ( 731260 ) on Wednesday May 30, 2007 @02:57PM (#19326481) Journal
        Why does everyone assume it's a security problem?

        Why can't it be a revenue stream problem? ie they're selling the addresses?
    • by Kadin2048 ( 468275 ) * <slashdot@kadin.xoxy@net> on Wednesday May 30, 2007 @01:17PM (#19324909) Homepage Journal
      Protip: if you run your own mail server generate a whack of aliases (ie: bogus000 through bogus999) so you always have a disposable address available.

      Even easier: just go to Spamgourmet.com [spamgourmet.com] and set up an account there (takes about 15 seconds, seriously), and then you can use all the addresses you want of the form [someword].youremail@spamgourmet.com.

      E.g., if you're signing up for Ameritrade, you could use the address "ameritradesucks.kadin@spamgourmet.com" (or any other of about 10 different domains, it's not just limited to spamgourmet).

      After each address has forwarded a set number of emails through to your real, hidden address, it will shut off and all further messages will be "eaten." (You can re-activate emails if you want, or set up whitelists so that all email from ameritrade.com gets through.)

      It's a pretty brilliant system, and it's completely free. If you set up an account and use Spamgourmet dummy addresses everywhere, you can almost totally prevent spam arriving directly to your inbox. Also, you can go in later and see which addresses have been flooded with spam (some of mine have received thousands of messages) and see exactly what services are selling out out. Very cool.
      • Re: (Score:3, Interesting)

        by vic-traill ( 1038742 )

        Even easier: just go to Spamgourmet.com and set up an account there (takes about 15 seconds, seriously), and then you can use all the addresses you want of the form [someword].youremail@spamgourmet.com.

        Sounds cool. Gmail gives you a similar mechanism; myaddress@gmail.com can be amended to any form of myaddress+somesignupstring@gmail.com.

        The downside is that I've run into numerous forms that evaluate the '+' character as invalid in form checking on entered e-mail addresses. My read of RFC [2]822 is that the '+' char is explictly included as atext, so these forms are either written by boneheads or by pricks who don't want to be tracked back to. Either way, it's a Bad Sign of Things to Come from whatev

  • Phew! (Score:5, Funny)

    by CrazyTalk ( 662055 ) on Wednesday May 30, 2007 @10:54AM (#19322687)
    I'm as guilty as the next person for not always RTFA, but his is the first time I couldn't even make it through the posting
    • Re: (Score:2, Insightful)

      I'm as guilty as the next person for not always RTFA, but his is the first time I couldn't even make it through the posting

      Years of television with shorter and shorter times between cut scenes has destroyed your attention span. Why don't you go watch some TV now? Maybe there will be a 30 second blurb on the subject ala "Ameritrade implicated in SPAM delivery... incompetent or criminal... you decide!!!"

  • Solution? (Score:5, Insightful)

    by daeg ( 828071 ) on Wednesday May 30, 2007 @10:55AM (#19322691)
    Drop AmeriTrade. I did and couldn't be happier. I couldn't trust my stock (and thus, some of my savings and part of my future financial well-being) to a company that can't even keep an e-mail address secure.
    • Re: (Score:3, Interesting)

      by Anonymous Coward
      I caught Ameritrade the same way, approximately 6 months ago. I used the domain name ameritrade@(mydomain).com and the address became a spam magnet approx. 1 month after I canceled my account with Ameritrade. Given the timing, my feeling was that they sold my email address after quitting the service.

      Regardless of the cause for my email address being leaked by Ameritrade, I have steered several people away from their service with my story. My hope is that others avoid their service as well, especially sin
    • I've had exactly the same problem with Ameritrade. I signed up for a new account last fall, and have been getting pump and dump spams ever since. Ameritrade has had this problem for years, as I quickly verified with a google search; it's been discussed on several of the major anti-spam boards. No, it is not a dictionary attack; my address has 13 characters before the @ sign, consisting of a mixture of letters and digits, and has no dictionary words in it; the domain is not a common one either. Yes, it is de

  • Abusable fix? (Score:4, Insightful)

    by Ruprecht the Monkeyb ( 680597 ) on Wednesday May 30, 2007 @10:55AM (#19322715)

    Perhaps AmeriTrade could do something similar -- once a stock is identified as being promoted in spams sent to AmeriTrade customers, any customer attempting to buy that stock would be presented with a message saying that AmeriTrade was blocking the transaction for security reasons. (If this runs afoul of some SEC regulation that a brokerage has to let you buy any stock you want any time you want, then at least display a big warning when AmeriTrade users try to buy it through their system, saying that the stock has been the subject of a fraudulent promotion scheme and is an extremely high-risk buy.)


    Wouldn't this also be abusable? Pick a stock, short it, spam the hell out of everybody, watch Ameritrade or whoever blacklist it, and watch the price drop.
    • Re:Abusable fix? (Score:4, Informative)

      by UbuntuDupe ( 970646 ) * on Wednesday May 30, 2007 @11:05AM (#19322861) Journal
      Based on the comments on other threads on this topic, the flaw with such a plan is in "short it". To short-sell a stock, you must borrow it. To borrow it, someone must be willing and able to lend it. To be able to lend stock, you have to be a large institution, which are generally prohibited from buying (and thus holding) thinly-traded penny stocks. And it's exactly the penny stocks that are targeted by pump-and-dump schemes.
      • Okay, maybe I should take that back. While spammers pick thinly-traded penny stocks, you, as an architect of such a plan, wouldn't necessarily be constrained to do so. But nevertheless, the higher the volume of the stock, the more wrongdoing you need to halt trading. You think someone could halt trading in ExxonMobil just by spamming people to buy it?
      • by RingDev ( 879105 )
        I think what the parent was trying to say is that IF there were a system in place that trading companies had to warn you that a stock had been the target of a fraudulent advertising campaign prior to selling you the stock, it would cause a lower trading rate for that stock, which could drop the price is people were trying to unload the stock while purchasers were being warned about buying the stock.

        The purpose I would imagine would be to attempt to limit a competitor's financial flexibility. Even if it does
      • You could also abuse it with options and just to harm a competitor. In my opinion its absolutely wrong to let the spammer and other people with bad intentions have power over a stock's price. If people fall for these pump and dump scams a lot, contact them and let them know that doing so is really dumb. If they continue, have something in place where those people specifically cannot buy/sell as stock that's being targeted by a pump and dump.
    • by jmv ( 93421 )
      Wouldn't this also be abusable? Pick a stock, short it, spam the hell out of everybody, watch Ameritrade or whoever blacklist it, and watch the price drop.

      You're forgetting a detail here. Pump&dump works because an idiot sees the spam and buys. The reverse wouldn't work because the said idiot cannot sell stocks he doesn't have. It's not like someone will see "oh, transactions are discouraged -- let's sell short".
    • Re: (Score:2, Informative)

      Wouldn't this also be abusable? Pick a stock, short it, spam the hell out of everybody, watch Ameritrade or whoever blacklist it, and watch the price drop.
      I'm pretty sure you can't short those stocks.
    • Re: (Score:3, Informative)

      by mcrbids ( 148650 )
      Wouldn't this also be abusable? Pick a stock, short it, spam the hell out of everybody, watch Ameritrade or whoever blacklist it, and watch the price drop.

      Thoughts like this are the kind of thoughts that convince Libertarians that the marketplace will ALWAYS correct itself. Notice that a protection against one type of unscrupulous behavior becomes an enabler for another type of behavior - which is then protected against.

      The net effect of this continuous spy-vs-spy type war is a balanced marketplace that doe
      • rock and roll man, I couldn't agree more.
      • Re: (Score:3, Insightful)

        by Gospodin ( 547743 )

        Every American is born with almost half a million dollars in pre-existing infrastructure...

        Source, please? By my calculations that means there is $150 trillion in infrastructure in the US that is publicly available - meaning that you can't count private buildings or land. Since annual tax revenues are under $3 trillion, and not all of this goes to infrastructure, I'm going to go ahead and significantly doubt the accuracy of your figure.

        Maybe you're playing with the word "born". Since about 10 million Am

  • Ameritrade is bunk (Score:5, Insightful)

    by linzeal ( 197905 ) on Wednesday May 30, 2007 @10:57AM (#19322735) Journal
    As someone who has used both Ameritrade, Etrade and Banc of America for stock trading I would say stick with a company who has more on the line than just a Web 1.0 company. Bricks and mortar Bank of America is not going to fuck over customers to get 10 bucks an email address and their security is run through a group of people who have to protect 100's of billions of dollars. It might cost more but you will sleep better at night.
    • by arodland ( 127775 ) on Wednesday May 30, 2007 @11:26AM (#19323209)
      Yeah, you're right. BoA expects to make a lot more money while they're fucking their customers over.
    • No, BofA just fucks over their customers every other way. They've charged me hundreds in overdraft because it took them weeks to deposit a check. They have the worst customer service reputation in the industry.
    • by mpapet ( 761907 )
      Bank of America is not going to fuck over customers

      You must be new here.

      Please, examine carefully BofA's role in the U.S. financial system before making such a careless statement. Look carefully at who controls Visa and Mastercard.

      Among other important things to understand is that BofA profits quite handsomely while consumers bear increased costs for everything purchased at retailers that accepts card payments.

      "Despite merchant discontent, card issuers have incentives to maintain or increase interchange fe
    • This excerpt will probably have more impact.

      "... when Visa and MasterCard were building their dominant credit card networks, they imposed exclusionary rules and restrictions on other parties to credit card transactions. In two cases, whose outcomes are described in this section, merchants and the U.S. Department of Justice (DOJ) successfully challenged some of these practices. The decisions in the two cases29 weakened some barriers to competition and reduced the control exercised by the card associations, t
    • by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Wednesday May 30, 2007 @11:50AM (#19323577) Homepage Journal

      Bricks and mortar Bank of America is not going to fuck over customers to get 10 bucks an email address

      Bank of America is pure, concentrated evil. Not only do they have some of the worst customer service on the planet (especially if they feel you are in the wrong) but they were one of the last corporations to pull out of their investments in Apartheid.

    • Re: (Score:3, Interesting)

      by YrWrstNtmr ( 564987 )
      Bricks and mortar Bank of America is not going to fuck over customers

      Now THAT is funny.
      Bank of America [nypost.com] hit Gloria Carlo, 51, a single mom from the South Bronx, with a lawsuit demanding $23,312.04. It's money the bank claims she overdrew in a two-month home-shopping spending spree after already exhausting $38,000 from her own savings.

      Bank of America Corp. [cnn.com] and Wachovia Corp. are among the big banks notifying more than 670,000 customers that account information was stolen in what may the biggest security
  • by hksld99 ( 1097707 ) on Wednesday May 30, 2007 @11:00AM (#19322795)

    I have been a long time AmeriTrade customer and, like the author, used a unique email address for my AmeriTrade account. I never received any spam on that email address until a few weeks after the TD Waterhouse merger last year. Suddenly I started getting tons of pump&dump spam on that address.

    Checking the "privacy" settings in my account revealed that somehow my account had been changed from "opt-out everything" to "opt-in everything" -- certainly not by me. I changed everything back to opt-out, assigned a new email address and have not received any spam on that new address since then. The old email address keeps getting spam, so I am hard-filtering it on my SMTP server now.

    To me it looks like the TD Waterhouse merger triggered a change in their privacy policy or account handling that caused "opt-in" to be set on at least some accounts.

    • by bugnuts ( 94678 )

      it looks like the TD Waterhouse merger triggered a change in their privacy policy or account handling that caused "opt-in" to be set on at least some accounts
      Nevertheless, stock brokers should not be in the business of assisting fraudulent schemes. This is almost certainly illegal, but ianasb.

      No, more likely their database was compromised, possibly from the inside, and continues to have a mole or hole.
    • Re: (Score:3, Funny)

      by omeomi ( 675045 )
      The old email address keeps getting spam, so I am hard-filtering it on my SMTP server now.

      Me too...I receive 0% of my email from my SMTP server...

      ;-)
  • by eebra82 ( 907996 ) on Wednesday May 30, 2007 @11:01AM (#19322807) Homepage
    I am shocked to say that after signing up to a news letter on a few porn sites, I am now receiving non-porn content e-mails.
  • by sholden ( 12227 ) on Wednesday May 30, 2007 @11:02AM (#19322821) Homepage
    count as a big enough leak to trigger disclosure laws. If they are just selling email addresses without any other personal details they may be violating there privacy policy but probably not disclosure laws.
  • by TheGreatOrangePeel ( 618581 ) on Wednesday May 30, 2007 @11:06AM (#19322871) Homepage

    Gmail has got a neat trick you can use to learn who sells your email address...

    If your email is xyz@gmail.com and you're registering at site ABC, you can register at that site with the email address xyz+ABC@gmail.com. Gmail still delivers it to you and at the same time allows you to see who sold your email information.

    • by UbuntuDupe ( 970646 ) * on Wednesday May 30, 2007 @11:13AM (#19323009) Journal
      Couldn't spammers circumvent this by purging +-type suffixes, (i.e., converting "xyz+ABC@gmail.com" to "xyz@gmail.com") since the email will still get to you?
      • Couldn't customers circumvent the circumvention if gmail allowed + characters in the name, then when the spammers stripped it out, it would no longer get to you?
        • Re: (Score:3, Informative)

          Make sure you use something like my.address+personal@gmail.com, and then set gmail to automatically filter anything without a +suffix.
          • by jfengel ( 409917 ) on Wednesday May 30, 2007 @01:58PM (#19325553) Homepage Journal
            That works nicely, though you still lose when your true address+personal email address leaks out. Your friends will insist on sending you e-greeting cards, mailing you articles from newspapers, including you on large mailings that get forwarded to some jackass spammer... and once your name leaks out to one, it's leaked out to all of them.

            Or maybe I just need smarter friends.
    • That trick only works sometimes.

      I tried it with one site (Amazon IIRC) and got back an error message saying "No no you ninny, we said enter a VALID e-mail address. What are you, an idiot?" or something French like that. Apparenlty some forms are smart enough to check for invalid characters.
      • by Fred_A ( 10934 )
        Except it's not invalid. It's just their form that's broken.
      • Re: (Score:3, Insightful)

        by swillden ( 191260 ) *

        Apparenlty some forms are smart enough to check for invalid characters.

        You mean: Apperently some forms are dumb enough to deny valid characters.

      • by egypt_jimbob ( 889197 ) on Wednesday May 30, 2007 @11:49AM (#19323567) Homepage Journal

        ...invalid characters.
        Read the rfc [faqs.org]. Specifically sections 3.2.4 and 3.4.1; "+" is an atext character that is valid in the local-part (the junk before "@") of an address.

        And to the grandparent: gmail is not the only mail client that allows this. Mutt and pine definitely do and I am sure there are others, since the use of "+" is perfectly valid. In fact, the ones that don't are non-compliant.
    • Re: (Score:3, Informative)

      You're assuming that said site knows that email addresses containing a + are valid.

      Lots of places check for alphanumerics, dot and @ and reject anything else.
    • by Tronster ( 25566 )
      A similar feature is offered to users of Spamcop accounts. Unfortunately I've had mixed results...

      The official RFC for e-mail addresses say that a plus symbol is valid; but roughly half of the web-forms I've interacted with do not consider a plus in a name to be a valid address. Some bigger web-sites (i.e., Xbox Live) don't allow this, and those that do may break if the e-mails they sent are from a listserv. (e.g., unable to unsubscribe, change passwords over e-mail, etc...)
    • by horatio ( 127595 ) on Wednesday May 30, 2007 @11:24AM (#19323181)
      You're right, and that works great except for most sites that I've come across use a regex which disallows the use of a '+' sign in the email address.

      What I've done instead is to create a catch-all email address in a subdomain and sign up as, ie amazon@subdomain.domain.com. I suppose I could first create a unique 16-character string for each one and add a new address before creating any accounts, but a) that requires additional effort and management and b) when you call, for example, amazon customer support they ask for your email address to identify your account. Good luck communicating 16 random letters and numbers over the phone to level-1 customer support.

      Eventually a "dictionary" attack might end up forcing me to shut down the catch-all and be explicit.
    • Uh, sendmail and postfix do to. This is a very common MTA feature (in the *NIX world, anyway :)
    • by dmeranda ( 120061 ) on Wednesday May 30, 2007 @11:50AM (#19323575) Homepage
      Another gmail trick that is more friendly to dumb sites that
      use broken regexes is to just insert extra periods in your
      mailbox name. Then you can filter based on that. If your
      gmail address is johndoe@gmail.com, then you can also use
      things like jo.hnd.oe@gmail.com, joh.n.do.e@gmail.com, etc.
  • Other explanations (Score:4, Interesting)

    by Craig Ringer ( 302899 ) on Wednesday May 30, 2007 @11:09AM (#19322947) Homepage Journal
    The test you did is not conclusive by any means. You must also prove that the address was never exposed in any other way (stolen by malware on your machine, leaked through other communications, sold by a corrupt mail server administrator, etc), OR you need to find conclusive evidence that the leaked address came from the company's end.

    I've seen addresses turn up in spam that I wouldn't have believed if I hadn't seen it.

    Now, if you are able to confirm that several addreses created by different people & never shared get similar scams that addresses not given to the company DO NOT get, then that might be something interesting.
  • by TheWoozle ( 984500 ) on Wednesday May 30, 2007 @11:09AM (#19322949)
    I always assume that any business that I give my e-mail address to will sell it; that's why I don't give it out. Surprisingly enough, I don't get any spam.

    This is why many pundits are saying "email is broken"; and it makes sense if you think about it. The setting up of different accounts for each company/person you interact with goes against the whole point of having an e-mail *address* (i.e., a not-too-frequently-changing place to find you).

    Really, the spam problem is a symptom of human nature (look up "tragedy of the commons"), and if any of you think you have the secret of changing *that*, then please share...
    • Re: (Score:2, Insightful)

      by UbuntuDupe ( 970646 ) *
      No no no, you're hastily attributing the problem to the wrong market failure story! I think the one you're looking for is path dependence [wikipedia.org]: that is, we could convert an email system in which you can't forge sender information, but the costs are too great and the market participants too uncoordinated to make the transition.

      Oh, and as a bonus, I'm going to repeat the myth about the Dvorak keyboard as proof of the harms of path dependence.
    • Yes, but the story here is that Ameritrade is not only spamming, they are spamming stock tips, or at least they are causing that to happen.

      A brokerage firm that randomly gives stock tips with the intent of buying the the stock low beforehand, and selling it after a bunch of people purchase it, thus passing the loss on to their customers, is in violation of half a dozen laws and can be subject to large fines and lose its ability to trade stock, which, considering that's all Ameritrade does, would kill it. A firm that lets someone at that firm do it is, instead of the firm itself, is just as culpable.

      Screw involving Ameritrade or the media in this, someone needs to inform the SEC of what's going on.

      • This is the really outrageous part of the story and I'm amazed that it took this long for someone to point it out. Surely the SEC would be interested in a brokerage house being involved in a "pump-and-dump" scheme.
  • From the article:
    The SEC recently announced that they would suspend trading of companies whose stocks had been the target of spam campaigns to manipulate the price.

    Does anyone else see the problem with that?
    If I want to kill my competitor's stock, all I have to do is launch a pump and dump scam using it as the target?
    • Re: (Score:3, Informative)

      by nelsonal ( 549144 )
      Pump and dumps are for little bitty companies that don't really do anything (most aren't operating) think Infinium Labs (maker of the Phantom console). It would take billions to pump and dump a listed stock.
  • Strangely enough (Score:4, Informative)

    by zappepcs ( 820751 ) on Wednesday May 30, 2007 @11:11AM (#19322983) Journal
    I met someone not long ago that wanted some DB work. They were wanting to organize and sell phone numbers, street addresses, email addresses, and they attempt to collect/gather as much meta information as possible. Various relationships tell them whether you are a good target for any given spam type email or direct mail campaign.

    Someone with your address on their list will try to sell it for $.50 or up to $5/10 if they can get it providing it is a valid address. There is money in selling such information. THAT is why you get spam. If they could figure out how to make all drivers of any vehicle made before 2000 as they drive down the highway, people would sell that to autodealers... Its all about Ad revenues, and your email address is just another pageview sort of thing for people buying the lists.

    There is no method to prevent this. If one person at company X illegally sells a list of clients of that company, it will be out in the wild, nothing to stop it from being resold dozens of times.
  • long time customer (Score:4, Interesting)

    by hb253 ( 764272 ) on Wednesday May 30, 2007 @11:13AM (#19323001)
    Lone anecdotal datapoint: I'm a long time TD Ameritrade customer. I don't get any spam to the email address I've registered with them.
  • by drgroove ( 631550 ) on Wednesday May 30, 2007 @11:13AM (#19323007)
    AmeriTrade is simply selling your information to third parties.

    Dell does this. I know this for a fact - I gave Dell my information while setting up a business account for a small consultancy that I was running a few years back out of my house. I hadn't yet formalized the business legally, but gave Dell the name that I was going to use for my business. Within weeks, I began to receive snail-mail spam using the business address that I had only given to Dell. No one within Dell was stealing my information - Dell sells information about their customers to make a buck.

    AmeriTrade very likely does the same thing. After you give your email, snail mail, phone, etc info to them, they turn around and earn a buck or two by selling your information to other companies.
  • by JoeD ( 12073 ) on Wednesday May 30, 2007 @11:15AM (#19323033) Homepage
    ...what can be explained by stupidity.

    It's possible that Ameritrade itself is selling the email addresses. What's their privacy policy?

    In large companies, it's very easy for someone in one division to do something that people in other divisions don't know about.
  • Re: (Score:2, Insightful)

    Comment removed based on user account deletion
    • It seems that Ameritrade has been specifically targeted, though, so odds are it's someone specifically monitoring them, either an insider or someone working for Ameritrade's ISP.
    • A fourth option (Score:4, Insightful)

      by gr8_phk ( 621180 ) on Wednesday May 30, 2007 @12:26PM (#19324163)
      d) your own machine has malware on it that intercepted the address.
      Don't assume that because you know about malware and run a couple programs to prevent or eradicate it, that you don't have any. Now if you're not running an MS operating system, the likelihood of this is nearly zero, but no matter what you do it's never actually zero. Just very close.
  • This is why I have my own domain, and sign up every new account setting the email address to the domain @ my domain e.g.:
    slashdot_org@mydomain.com
    Naturally, all the mail @ mydomain.com forwards to my real email account which is elsewhere. Thus, if someone is sleazy and starts spamming my account, I can easily setup a filter to get rid of it. This is akin to andy rooney's use of creative misspellings of his own name in the 70s to track down junk mail.
  • I do similar stuff with a catchall address, and for places like slashdot I also change them monthly. Seems a Japanese spam shop did some harvesting here in November, 2006 and that list is still seeing heavy use. It generally takes a few months after using an address on slashdot comments for the spam to start flowing.

    The good news is I haven’t seen any spam from any of the other addresses I’ve used, meaning that of the hundred or more distinct entities I’ve given an email address to, only p
  • Inside Job (Score:5, Informative)

    by interstellar_donkey ( 200782 ) <pathighgate&hotmail,com> on Wednesday May 30, 2007 @11:26AM (#19323213) Homepage Journal
    Probably someone inside AmeriTrade is selling customer data to an outside spammer

    That would be my guess. There's probably not a whole lot Ameritrade (or any company) can do about it other than figure out a way to deeply restrict access to the email addresses. But when you need customer service/marketing/administration departments to have access to customer's email addresses, it can get a little hairy.

    I can remember back in '99 going to work for a rather large ISP. My first day there they created an email account for me. After four days of orientation and I started to actually do work, I checked my email and found it loaded with spam. This account had been on no mass mailings, has had nothing sent out, and had received no communication from within the company. The name wasn't anything close to what you'd find in a dictionary. As far as I could tell, the only way spammers could have gotten their fingers on the address was if someone inside the company was selling the address out.
    • by nuzak ( 959558 )
      The spam was probably not going directly to you, but to distribution lists you were a member of. Perhaps back in '99, email address lists were worth something to sell, so I'm not ruling it out, just applying Occam's Razor is all.
  • I feel like there needs to be more information about the "test". Did the Ameritrade-unique addresses *only* get stock spam, or spam in general (including stocks)? The former would of course be highly suspicious, but the latter would indicate all possibilities should be fairly examined.

    Another example, this logic seems flawed...

    he got a response saying that even if he was getting spammed by an address that he only gave to AmeriTrade, that could be the result of hackers "implanting 'bots' that have the ability to extract e-mail addresses from your computer, even when you have protective spy software engaged". But of course this makes no sense -- if this were the source of the problem, it would affect everyone's e-mail addresses equally, and would not explain why a disproportionate number of complaints were coming from people who created addresses that they gave to AmeriTrade specifically.

    How would anyone know if or how much other email was affected? Most likely it would be trashed by a spam filter anyway, and even if it wasn't how could they compare "every

  • Anyone signing up for an Ameritrade account has to sign away their right to sue the company for damages. They're all like that now. So, who cares if customer data slips out? It's not like you can sue them for the actual cost of the loss or credit monitoring.

    It's just a big yawner to Ameritrade. You can't do anything and they know it. So they can BS, soft shoe, deny and all you can do is have a passive-aggressive little snit fit.

  • No (Score:2, Funny)

    by MagicM ( 85041 )
    No, he's not. He's on first, though.
  • by rueger ( 210566 ) on Wednesday May 30, 2007 @11:40AM (#19323401) Homepage
    1. Signs up for an Ameritrade account using a unique e-mail address.
    2. Gets pump and dump spam at that address.
    3. Profit!

    The balance of the article:

    a) outlines a variety of conspiratorial possibilities
    b) finds that other Ameritrade customers get pump and dump spam
    c) makes repeated reference to a lost customer data tape from 2005.
    d) Ameritrade has poor customer service.
  • by JeffL ( 5070 ) on Wednesday May 30, 2007 @11:41AM (#19323421) Homepage

    The first time I received spam, not ads for "partner" companies, but pump-and-dump image spam, and such, I reported Ameritrade to the SEC. After contacting Ameritrade and receiving a big "so what" from them, I filled in the SEC's online complaint form, detailing the problem. A week or two later I received a letter (on paper) from them asking me to e-mail them more information and any additional evidence. I sent them a detailed explanation of the problem, along with information about why it was extremely unlikely that the e-mail address was stolen from my end (none of my other unique addresses were receiving spam), and a copy of all of the spam messages that had been sent to my ameritrade address.

    Since that time I've not heard anything back from the SEC. I didn't really expect to, but I was hoping that if 10-20 people complained about the same thing, and provided evidence, they might actually start an investigation. That was August, 2006, so maybe they really are doing something, and I should just be more patient.

    A friend who was also receiving the ameritrade spam convinced ameritrade to waive the account transfer fee, and moved all of his stuff to Scottrade. I changed my ameritrade e-mail address, and haven't received spam to the new address, so I thought perhaps the leak had been fixed. Now that I see the problem is still occurring, I'll take the time to move my accounts.

  • Assume the worst... (Score:5, Informative)

    by wowbagger ( 69688 ) on Wednesday May 30, 2007 @11:48AM (#19323559) Homepage Journal
    Assume the worst:
    • Assume that any business to which you give an email will immediately sell it to every spammer on the planet.
    • Assume that any individual to whom you give your email will be trojan'ed and harvested by spammers.
    • Assume that any web site to which you give an email will be scraped by spammers.
    • Assume that every mailing list to which you sign up will be scraped by spammers.

    In other words, for any email address you use, assume that it will at some point fall into the hands of spammers.


    So, given these assumptions, what are you to do?

    1. Never get too attached to any given email address. Be prepared to drop any address like a hot rock.
    2. Thus, try to have one address for each role in your life: one for friends, one for close friends, one for work, one for each mailing list, one for each business with which you do business, etc. Use sites like SneakEmail or SpamGourmet as needed.
    3. Refuse to give your email where-ever possible. Most places that want it don't need it, but ask for it so that they can spam it. Ask yourself "Do they REALLY need to be able to email me?" If you cannot think of a good reason why they should, refuse.
    4. For entities which will NOT allow you to refuse to give your email, give them a disposable email, and revoke it as soon as possible. Alternatively, use an email which has become compromised and is now worthless.
    5. Make up a list of disposable emails, print it out, and carry it with you, to deal with those Big Blue Room incidents where you need to fork over an email. Make the print-out have 2 parts — one to tear off and hand to the requester, one to keep for yourself (with a space below the email into which you enter the entity assigned to it.)
    6. Use email hosts which have the best possible spam filtering. I suggest setting up an account with Spamcop and using them.
    7. Don't use the email assigned by your ISP for anything if at all possible: that way if you need to change ISPs you can do so without any big issue.
    8. When creating an email address, don't use your name or any other unique identifying information (e.g. a ham radio call sign) - those are too easy to guess.


    Yes, this may sound paranoid. But unfortunately until the technology is changed to allow tracking spammers down, and the laws are changed to allow dealing with spammers effectively (.30-06 is effective), these are the sorts of measures needed to keep your inbox relatively clean.

  • by Colin Smith ( 2679 ) on Wednesday May 30, 2007 @12:15PM (#19323953)
    If you want Ameritrade to take notice then dump them.

     
  • Fighting the pig (Score:4, Insightful)

    by hysterion ( 231229 ) on Wednesday May 30, 2007 @12:53PM (#19324545) Homepage
    Commendable effort, yet is the knowledge gained worth it? Somehow it brings to mind this observation [paulgraham.com]:

    "I got addicted to trying to identify spam features myself, as if I were playing some kind of competitive game with the spammers."

    "Norbert Wiener said if you compete with slaves you become a slave, and there is something similarly degrading about competing with spammers. To recognize individual spam features you have to try to get into the mind of the spammer, and frankly I want to spend as little time inside the minds of spammers as possible."
  • by noidentity ( 188756 ) on Wednesday May 30, 2007 @01:11PM (#19324805)
    "[...] he got a response saying that even if he was getting spammed by an address that he only gave to AmeriTrade, that could be the result of hackers "implanting 'bots' that have the ability to extract e-mail addresses from your computer, even when you have protective spy software engaged". [...] if this were the source of the problem, it would affect everyone's e-mail addresses equally [...]"

    This is why you should have done a scientific experiment, where you had at the very least two e-mail addresses of similar random makeup, and only made one available to AmeriTrade. The one you didn't give would be the control. Then you compare the SPAM received between the two, rather than between your single submitted address and an imaginary address that receives none. Perhaps you have a third that you submit to a trusted server you know does not share it (like one you set up yourself with a trusted bandwidth provider).

Pascal is not a high-level language. -- Steven Feiner

Working...