21.07.2013 Views

Essential Guide to E-mail Marketing - Haymarket

Essential Guide to E-mail Marketing - Haymarket

Essential Guide to E-mail Marketing - Haymarket

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

04 FEATURE DM News • E-Mail <strong>Marketing</strong> <strong>Guide</strong> 2007<br />

Q&A<br />

A conversation with AOL’s Charles Stiles<br />

BY DIANNA DILWORTH<br />

Spam is a never-ending problem. Overall spam levels in<br />

August 2007 increased <strong>to</strong> an average of 69% of <strong>to</strong>tal e<strong>mail</strong>,<br />

according <strong>to</strong> the September issue of Symantec’s<br />

monthly spam report. It seems that no sooner does a<br />

spam-blocking firm or ISP identify and s<strong>to</strong>p a spam phenomenon<br />

than a new one pops up. DM News spoke with AOL postmaster<br />

Charles Stiles about the state of spam <strong>to</strong>day, the lingering<br />

challenges and what this means <strong>to</strong> legitimate e-<strong>mail</strong> marketers.<br />

DM News: What are the biggest spam problems you’ve seen in<br />

recent months and what are you doing <strong>to</strong> track them?<br />

Charles Stiles: As of late, we are seeing a lot more criminal-type<br />

behavior. The flavor of the day right now is people taking advantage<br />

of individuals’ home computers. They are using botnets, which take<br />

over home computers <strong>to</strong> send out spam. There is that type of activity,<br />

and then there is registering fraudulent accounts, and that’s really<br />

what it comes down <strong>to</strong>. It’s no longer legitimate marketers using bad<br />

practices. It’s really about criminal activity now.<br />

DM News: How do you deal with this huge problem of botnets,<br />

especially when sometimes one can fall on<strong>to</strong> a computer and only<br />

be active for an hour before erasing itself?<br />

CS: One of the things that we do is we try and figure out how<br />

these machines are connecting <strong>to</strong> us. Typically they are coming<br />

through and sending stuff out on Port 25, that’s the standard <strong>mail</strong><br />

port. So AOL doesn’t use the same standard <strong>mail</strong> port. Instead we<br />

require people <strong>to</strong> authenticate. You can’t just send e-<strong>mail</strong> off of our<br />

<strong>mail</strong> servers when you are connected. You have <strong>to</strong> actually provide<br />

a user name and password. Now with our clients, it’s done in the<br />

background, you don’t see it, and with Outlook or other thirdparty<br />

clients, you can configure it. But we do require user name<br />

“<br />

Charles Stiles, Postmaster, AOL<br />

ESSENTIAL GUIDE<br />

and password so that not just anybody can connect.<br />

We also track how much <strong>mail</strong> each account is sending, whether<br />

you are using our client or whether you are using a third-party<br />

<strong>mail</strong> client. This is not so much <strong>to</strong> make sure that you don’t send<br />

<strong>to</strong>o much <strong>mail</strong>, but we look at your pattern of sending. If you<br />

only sent five or 10 messages a day on average and suddenly you<br />

just sent out 500, that’s certainly outside of your normal pattern —<br />

very similar <strong>to</strong> what a credit card issuer might do — in which<br />

case we would challenge you. And we wouldn’t necessarily just<br />

block you, but we would offer you a challenge <strong>to</strong> say, “Is this a<br />

real human behind this? Is she sending us a message and this is<br />

just outside of her norm?”<br />

We would also use what you call a capture test or the image challenge<br />

test. So long as you passed it, you are fine <strong>to</strong> go ahead and<br />

continue sending. If you don’t, then we will probably scramble your<br />

password and say OK, we’re just not going <strong>to</strong> allow you <strong>to</strong> connect<br />

<strong>to</strong> the servers anymore. Then there’s an online process whereby you<br />

can get it unscrambled, but you again have <strong>to</strong> pass that capture test,<br />

just <strong>to</strong> make sure that it is a human that is behind the keyboard.<br />

DM News: So how are spammers getting more sophisticated, and<br />

what is going on with image spam?<br />

CS: Spammers have started using images as opposed <strong>to</strong> just text on<br />

a lot of these messages, because they have found that the text is easily<br />

deciphered by most of our filters and engines. So instead they’ll<br />

put <strong>to</strong>gether a picture that contains all the text that they would<br />

need for their spam message. But because sending the same picture<br />

over and over would be easily detected, they change it and put<br />

static in it or additional elements so that it is very difficult <strong>to</strong> track.<br />

DM News: And what are some of the things that you are doing <strong>to</strong><br />

track image spam? Is it also part of the authentication and login<br />

process?<br />

Even if a marketer did have express written consent from the consumer, if they<br />

had copies of his driver’s license, knew his address, his telephone number,<br />

blood type, if at the end of the day, the consumer says,‘I don’t want it,’ then we<br />

want the <strong>mail</strong>er <strong>to</strong> s<strong>to</strong>p <strong>mail</strong>ing it <strong>to</strong> them.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!