{"id":1128,"date":"2013-06-18T17:54:02","date_gmt":"2013-06-19T00:54:02","guid":{"rendered":"http:\/\/thelawlers.com\/Blognosticator\/?p=1128"},"modified":"2013-09-05T03:30:24","modified_gmt":"2013-09-05T10:30:24","slug":"heres-a-worthwhile-job-for-the-nsa","status":"publish","type":"post","link":"https:\/\/thelawlers.com\/Blognosticator\/?p=1128","title":{"rendered":"Here\u2019s a worthwhile job for the NSA"},"content":{"rendered":"<p><a href=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2011\/07\/Blognosticator-Head.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5\" alt=\"Blognosticator Head\" src=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2011\/07\/Blognosticator-Head.png\" width=\"252\" height=\"115\" \/><\/a><\/p>\n<p>Missing from most of the journalistic free-for-all that has been aimed at the NSA recently is any discussion as to what spy organizations should be doing as compared to what they are doing while intercepting our electronic communications.<\/p>\n<p>Economic crime is a form of terrorism in my opinion. When groups of criminals use technology to steal from the citizens of any country, they are committing economic terrorism. The U.S. is a victim of this form of terrorism, and all of it is occurring right under the nose of the NSA.<\/p>\n<p><a href=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2013\/06\/SpamLogo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1129\" alt=\"SpamLogo\" src=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2013\/06\/SpamLogo.png\" width=\"402\" height=\"401\" srcset=\"https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2013\/06\/SpamLogo.png 402w, https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2013\/06\/SpamLogo-150x150.png 150w, https:\/\/thelawlers.com\/Blognosticator\/wp-content\/uploads\/2013\/06\/SpamLogo-300x300.png 300w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/><\/a><\/p>\n<p>In addition to searching for \u201cforeign terrorists\u201d who might be using the telephone networks to perpetrate crime, and in addition to watching the traffic of e-mail and text messages, how about shutting down e-mail spam? The NSA could do this in an afternoon, sparing the world trillions of dollars in losses to fraud, and ridding us of this pestilence forever.<\/p>\n<p>According to Wikipedia, about 75 percent of all e-mails sent are fraudulent. Three out of four. I feel like I get them all.<\/p>\n<p>The economic cost of this, again referring to the Wikipedia article on the topic, is over $20 billion in the U.S. alone. All of us know someone who has been scammed by the e-mail predators out there posing as lost grandchildren, heirs to absconded riches, or poor Nigerian widows with cancer.<\/p>\n<p>I found it most interesting that Nigeria doesn\u2019t even make the list of places from which fraudulent e-mails are sent. They come mostly from the U.S. and Asia, with Russia coming in a distant third (come on, Russia, get your fraudulent act together!). I say this because Nigeria is famous in popular culture as the source of these e-mail scams. The reality is that Los Angeles is more likely to be the source than Lagos, according to the statistics.<\/p>\n<p>I use Apple Mail as my mail application, and it\u2019s a boat-load of work to keep up with the scammers on my part. I use Mail\u2019s very effective Rules filters to weed-out annoying e-mails. So far, I have written 154 filters, some containing as many as 35 search criteria, to kill incoming spam. I give them cute names like Russian Rulette for my incoming Russian scams, Thai Spring Rule for the Thai scams, and Las Spammas Mexicanas for those coming (ostensibly) from across the border (they are more likely coming from New Jersey).<\/p>\n<p>Five (5)* additional IP filters on my e-mail server are targeting incoming e-mails from specific senders, specifically an \u201corganization\u201d that pretends to be called F Media. All of the physical addresses of this group are fake, and they send millions of spam e-mails daily (maybe billions). They also use my e-mail address in fraudulent e-mails sent to recipients in Italy. My Internet provider allows me to blacklist specific IP addresses, so when I can identify an IP address of a malicious sender, I can kill all incoming mail from them. This is very difficult, as the clever fraudulent e-mail perpetrators almost never use the same IP address more than a few times.<\/p>\n<p>The reason that I know the spammers are using my e-mail address is that I get all their bounced attempts to send spam to Italy. It\u2019s really annoying.<\/p>\n<p>You might argue that the NSA is not in the law enforcement business. That\u2019s true, but I know that they know some people who are in law enforcement, and those guys are keen to stop economic terrorism. At least they claim that they are working on it all the time.<\/p>\n<p>Let\u2019s give them this challenge: rid the world of economic terrorism by e-mail fraud.<\/p>\n<p>We\u2019ll all be better off. I promise.<\/p>\n<p>*This is here to entertain my readers who don\u2019t approve of <a title=\"Putting numbers in parentheses\" href=\"https:\/\/thelawlers.com\/Blognosticator\/?p=810\">the practice of putting numbers in parentheses after they appear in text.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Missing from most of the journalistic free-for-all that has been aimed at the NSA recently is any discussion as to what spy organizations should be doing as compared to what they are doing while intercepting our electronic communications. Economic crime &hellip; <a href=\"https:\/\/thelawlers.com\/Blognosticator\/?p=1128\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,23,21],"tags":[63,64,67,69,68],"class_list":["post-1128","post","type-post","status-publish","format-standard","hentry","category-business-2","category-curmudgeon-2","category-mistakes-you-can-avoid","tag-blognosticator","tag-brian-lawler","tag-spam","tag-spam-elimination","tag-spam-reduction"],"_links":{"self":[{"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/posts\/1128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1128"}],"version-history":[{"count":3,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/posts\/1128\/revisions"}],"predecessor-version":[{"id":1215,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=\/wp\/v2\/posts\/1128\/revisions\/1215"}],"wp:attachment":[{"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thelawlers.com\/Blognosticator\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}