Gordon v. Virtumundo Inc et al

Filing 99

DECLARATION of Neal Krawetz, Ph.D. filed by Defendants Virtumundo Inc, Adknowledge Inc, Scott Lynn re 98 MOTION for Summary Judgment (Newman, Derek)

Download PDF
Gordon v. Virtumundo Inc et al Doc. 99 Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 1 of 29 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 v. VIRTUMUNDO, INC, a Delaware corporation d/b/a ADNOWLEDGEMAIL.COM; ADKNOWLEDGE, INC., a Delaware corporation, d/b/a ADKNOWLEDGEMAIL.COM; SCOTT LYNN, an individual; and JOHN DOES, 1-X, Defendants. JAMES S. GORDON, Jr., a married individual, d/b/a `GORDONWORKS.COM'; OMNI INNOVATIONS, LLC., a Washington limited liability company, Plaintiffs, The Honorable John C. Coughenour UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE NO. CV06-0204JCC DECLARATION OF DR. NEAL KRAWETZ IN SUPPORT OF DEFENDANTS' MOTION FOR SUMMARY JUDGMENT NOTE ON MOTION CALENDAR: February 16, 2007 I, Neal Krawetz, swear under penalty of perjury under the laws of the United States to the following: 1. I am over age 18, and competent to be a witness. I am making this Declaration based on facts within my own personal knowledge. 2. I have been retained as an expert witness by Defendants Virtumundo, Inc. ("Virtumundo") and Adknowledge, Inc. ("Adknowledge"). 3. I am a computer security researcher with a Ph.D. in Computer Science from NEWMAN & NEWMAN, ATTORNEYS AT LAW, LLP 505 Fifth Ave. S., Ste. 610 Seattle, Washington 98104 (206) 274-2800 DECL. OF NEAL KRAWETZ RE: DEFS.' MOT. FOR SUMM. J. CASE NO. CV06-0204C - 1 Dockets.Justia.com Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 2 of 29 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Texas A&M University (1998). Much of my work has been focused on tracking on-line entities, including the use and development of novel forensic techniques. 4. 5. The Internet is an interconnected network of computer networks. Each computer connected to the Internet has a network address, commonly represented by a unique 32 bit number called an Internet protocol address (an "IP address"). 6. The IP address is usually represented by four decimal numbers (octets) separated by periods. 7. The IP address system is a part of a communication architecture standard known as TCP/IP (i.e., Transmission Control Protocol (TCP) and Internet Protocol (IP)). In 1969, TCP/IP was adopted as the basis for the ARPAnet. By the mid-1980's, the ARPAnet was replaced by other networks including the Internet. 8. 9. The architecture of today's Internet is based on the TCP/IP concept. Communications over the Internet are made possible in large part because of network development based on the TCP/IP communication architecture. 10. The "domain name system" (or "DNS") was developed to convert between machine-readable IP addresses and user-friendly alphanumeric host names (hostnames). 11. Sets of related computers are grouped by domain names, such as "example.com". Related hostnames include "host1.example.com" and "www.example.com". The use of hostnames dates to 1971 and DNS was conceived in 1981. 12. The domain name system operates through a series of databases that "resolve" or link domain names with the IP addresses with which they are associated. 13. In order to connect to the Internet, a user's computer must have an IP address. Consumers' computers are typically provisioned with IP addresses by their Internet service provider, or "ISP". 14. The term "ISP" generally refers to organizations or entities that provide Internet connectivity through means such as dial-up, cable modem, and digital subscriber DECL. OF NEAL KRAWETZ RE: DEFS.' MOT. FOR SUMM. J. CASE NO. CV06-0204C - 2 NEWMAN & NEWMAN, ATTORNEYS AT LAW, LLP 505 Fifth Ave. S., Ste. 610 Seattle, Washington 98104 (206) 274-2800 Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 3 of 29 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 line ("DSL") connections, although it also encompasses companies that provide server hosting and other connectivity services. 15. A server is a computer (in this context, connected to the Internet) that provides services to other computers or applications. A server may be dedicated to this role, or it may be used simultaneously for other purposes, such as a desktop workstation. Services provided over the Internet (network services), such as web sites and email, generally consist of software running on server computers. 16. I have reviewed Exhibit "A" to the declaration provided by Mr. Gordon in Opposition to Defendants' Motion to Compel Discovery Re Lynn Interrogatories (Dkt. No. 76-1). 17. Mr. Gordon's statements in Exhibit "A" to his declaration reflect a misunderstanding of the technical operation of the Internet in general and email in particular. Specifically, Mr. Gordon seems to believe that one who initiates an email can control the information prepended, appended, modified, or added to its header while it is in transit and at the time of delivery. This is untrue. 18. For the reasons described in my report, a true and correct copy of which is attached hereto as Exhibit A, some or all of the "bad" headers of which Mr. Gordon complains were outside the control of Virtumundo and/or Adknowledge. Many of the headers of which Mr. Gordon complains were added by his own email program. 19. I have reviewed Mr. Gordon's deposition testimony. In it, he makes a number of statements that I consider questionable. My analysis of his testimony is contained in my report attached hereto as Exhibit A. 20. Domain names are provided by name servers. Gordon/Omni uses name service providers to register and host their domain names. Gordon/Omni does not host his own domain name. 21. WHOIS is a network based query/response protocol through which users can access contact information for the registrants of domain names and network addresses. WHOIS data is compiled by registrars from information submitted by DECL. OF NEAL KRAWETZ RE: DEFS.' MOT. FOR SUMM. J. CASE NO. CV06-0204C - 3 NEWMAN & NEWMAN, ATTORNEYS AT LAW, LLP 505 Fifth Ave. S., Ste. 610 Seattle, Washington 98104 (206) 274-2800 Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 4 of 29 Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 5 of 29 EXHIBIT A Expert Report of Dr. Neal Krawetz NEWMAN & NEWMAN, ATTORNEYS AT LAW, LLP 505 Fifth Ave. S., Ste. 610 Seattle, Washington 98104 (206) 274-2800 Case 2:06-cv-00204-JCC Document 99 Page 1 of 24 Filed 01/22/2007 Page 6 of 29 Initial Expert Report of Dr. Neal Krawetz Gordon, et al. v. Virtumundo, Inc. et al. United States District Court, W.D. Wash. Case No. CV06-0204JCC January 22, 2007 Revision 2.1 Revision History........................................................................................................................................2 1. Qualifications of Dr. Neal Krawetz........................................................................................................3 2. Overview of my Conclusions.................................................................................................................4 3. Email Analysis.......................................................................................................................................5 3.a. Email Transport Requirements.......................................................................................................5 3.b. Email Header Structure..................................................................................................................6 3.c. Spam and CAN-SPAM...................................................................................................................7 4 Email Archive Evaluation.......................................................................................................................8 4.a. Differences between Mail Archives..............................................................................................10 4.b. Inconsistency within the Mail Archives.......................................................................................12 4.c. Messages Not from Virtumundo...................................................................................................13 4.d. Factual Issues in the Case.............................................................................................................15 5. Addressing Existing Testimony............................................................................................................17 6. Conclusion...........................................................................................................................................23 Case 2:06-cv-00204-JCC Document 99 Page 2 of 24 Filed 01/22/2007 Page 7 of 29 Revision History 1.0 2.0 16-January-2007 19-January-2007 Initial release Minor revision changes Corrected number of emails attributed to vm-mail.com. The count was off by 939 emails. This error was due to 939 emails from SpamAssassin where the content was removed and the original email header was duplicated in the email content, leading to the "From:" line being counted twice. The correct value is 6,987 and not 7,926. Revised transcript references. In version 1.0, I had cited the draft transcripts. Now I have the final transcripts. 2.1 22-January-2007 Minor additions Per request, added information about root access and Plesk. Reviewed Exhibit A (76-1) and revised my comments concerning the "R3" headers. Case 2:06-cv-00204-JCC Document 99 Page 3 of 24 Filed 01/22/2007 Page 8 of 29 1. Qualifications of Dr. Neal Krawetz I am a computer security researcher with a Ph.D. in Computer Science from Texas A&M University (1998). Much of my work has been focused on tracking on-line entities, including the use and development of novel forensic techniques. My research began in 1996 when I recognized that the problems with undesirable email (spam) were not being adequately addressed by existing filter-based technologies. I applied the scientific method and began investigating alternate anti-spam solutions by observing people who send spam (spammers), tracking their activities, developing theories and alternative explanations, and testing the theories. In 1997, I publicly identified my first spammer1. This led to the end of their spamming operations. Since 1998 I have presented in a variety of forums on the topics of email and spam. Some of my public presentations include: · · · · · You Are What You Type: Non-Classical Computer Forensics. Presented at the Black Hat Briefings, Las Vegas NV, August 2006. Nobody's Anonymous: Tracking Spam and Covert Channels. Presented at the Black Hat Briefings, Las Vegas NV, July 2004. (Presented under the pseudonym, "Curtis Kret".) Evil with Email: Evaluation of an Insecure Network Service. Presented at the ISSA Colorado Springs chapter security seminar, March 2004. Nobody's Anonymous: Tracking Spam. Presented at the Black Hat Briefings, Seattle, WA, January 2004. (Presented under the pseudonym, "Curtis Kret".) Spam Tracking and Covert Channels. Presented at InfowarCon, Washington DC, October 2003. Three of these presentations were at the Black Hat Briefings. This is one of the leading conferences on computer security. The attendees include people from academic, commercial, law enforcement, government, and military backgrounds. Beyond presentations, I have written a college textbook: Introduction to Network Security, Charles River Media, 2006 (ISBN 1-58450-464-1). This book includes an entire chapter on email including how it works, how to trace email headers, and its vulnerabilities. Although this book has been available for less than a year, it is already a required text for many university courses on networks and security. One of my duties at my company, Hacker Factor Solutions (dba Hacker Factor) is the creation of white papers on specific research projects and existing trends. Samples of my public spam-related papers include: · A Guide to Building Secure Web Applications and Web Services. (http://www.owasp.org/documentation/guide/guide_downloads.html) Open Web Application Security Project (OWASP), June 2005. I assisted with the document and wrote a section on spam and phishing for this document. Anti-Phishing: Page Encoding. (http://hackerfactor.com/papers/ap-page_encoding.pdf) Hacker Factor, April 2005. This document describes a novel approach for addressing the threat from phishing attacks. · 1 http://groups.google.com/group/comp.security.unix/browse_thread/thread/c9381bf882886fe7/70fa5c82a82c89d2?lnk=st &q=nealk%40net66&rnum=1&hl=en Case 2:06-cv-00204-JCC Document 99 Page 4 of 24 Filed 01/22/2007 Page 9 of 29 · Anti-Spam Solutions and Security, Part I and Part II. (http://securityfocus.com/infocus/1763 and http://securityfocus.com/infocus/1766) Security Focus, February and March 2004. This two-part paper evaluates existing anti-spam solutions, their effectiveness, and their limitations. "Anti-Honeypot Technology". IEEE Security and Privacy, January-February 2004 (Vol.2, No.1). This paper identifies a method used by spammers to identify honeypots. Honeypots are systems used to collect and evaluate new threats. Banking Scam Revealed. (http://securityfocus.com/infocus/1745) Security Focus, November 2003. This paper covers some of my novel research and how I identified a specific phisher. In November 2003, I sold this paper to a security company who, in turn, resold it to Security Focus. The only change to my original text is the title and removal of my name ­ it was originally titled Bank Closed: Gone Phishing. · · Although I have given presentations, assisted law enforcement and government agencies, and provided consulting services to security and anti-spam companies, this is my first experience as an expert witness. For this case, I am charging $250 per hour for expert witness reports. 2. Overview of my Conclusions This lawsuit involves the identification of false or misleading emails and an interpretation based on the CAN-SPAM act between Gordon, et al. and Virtumundo, Inc., Adknowledge, Inc., and Scott Lynn. My comments are focused on the email archives that I have been provided: adknowledgemailcom.mbx virtumundo-omni.mbx virtumundo.mbx virtumundo2.mbx I am not an expert in law and wish to avoid expressing opinions about any legal interpretations. In addition, my evaluation is based on the facts presented to me and not on my opinion concerning the ethics or socially acceptable actions demonstrated by either party. For this evaluation, I have been asked to respond to a specific set of questions. 1. Do any of the emails contain false or misleading header information? This includes the alteration or concealment of header information in a manner that would impair the ability of an individual to identify, locate, or respond to the person who initiated the email message. 2. Do any of the emails contain information used to obscure or misrepresent the email's point of origin (sender)? 3. Do the "From:" lines in the emails accurately identify the sender? 4. Is the sender clearly identifiable in the email header? 5. Is the sender clearly identifiable in the email content? 6. Is James Gordon or Omni Innovations, LLC (Gordon) an Internet access service? These questions address requirements found in the CAN-SPAM act [15 U.S.C. 7701 (2003)]. In particular, unsolicited commercial email must contain no forged nor misleading header elements, no deceptive subject lines, and a clearly identifiable opt-out mechanism. The sender of each unsolicited email must be readily identifiable. Case 2:06-cv-00204-JCC Document 99 Page 5 of 24 Filed 01/22/2007 Page 10 of 29 In addressing these factual issues I have arrived at the following conclusions. Please note that the conclusions summarized here are described and evaluated in greater detail in Sections 3 and 4 of this statement. With respect to the first two factual issues, I will testify that the emails have been modified by mail transport agents (MTA) and the recipient's mail user agent (MUA, the Eudora mail reader). These modifications occurred after the email messages were initially transmitted. However, nothing in the modified headers, nor in the pre-modified header components indicate false or misleading header information. The email headers provide enough information to readily identify and locate the message sender. With respect to the third factual issue, I will testify that I have made no attempt to contact the message senders in order to validate that they use valid response addresses. However, nothing appears to be fictitious and the domain names match the information in the content and throughout the header where the sender is identified. With respect to the fourth and fifth factual issues, I will testify that the sender is clearly identifiable in the email header and content, and identifies an opt-out mechanism. With respect to the sixth factual issue, I will testify that James Gordon does not appear to be an Internet access service as defined in the Communications Act of 1934 (47 U.S.C. 231(e)(4)). 3. Email Analysis This part of the testimony establishes critical definitions and background information about email functionality, email headers, and spam. 3.a. Email Transport Requirements Email is the common name for messages sent using the Simple Mail Transport Protocol (SMTP). SMTP is defined by a series of de facto standard documents called the Request For Comments (RFCs). The RFCs are currently maintained by the Internet Engineering Task Force (IETF). The RFCs are not laws or standards. Instead, they represent a common repository for information sharing. This way, different developers can create compatible systems. In many cases, RFCs become proposed and are not widely adopted or are eventually discarded ­ many anti-spam recommendations never passed the proposal phase. In other cases, RFCs define one standard but the community implements a different standard. This is the case with VoIP and peer-to-peer technologies ­ the accepted RFCs came after the de facto standards were developed. Usually the recommendations made by RFCs are used to provide some form of common guidelines when no official standards exist. Each RFC defines a different proposed standard or technical specification and is available from the IETF. RFC524 (http://www.ietf.org/rfc/rfc524.txt, June 1973) provided the initial framework for today's email. This defines an email messages as having one sender and one or more recipients. Additional RFC documents revised the specifications and added additional functionality. Occasionally new SMTP RFC documents are released that obsolete previous SMTP documents and attempts to unify all of the modifications and changes into one single document. RFC821 and RFC822 (1982) performed one of the first unifications (RFC821 defines SMTP and RFC822 defines the message format). These documents were replaced by RFC2821 and RFC2822 (2001). Email was designed for reliable ­ but not immediate ­ message delivery. Each email contains a single sender and one or more recipients, identified by email addresses. Each email address contains two required components: an account name and a host. The host may be a specific computer or a Case 2:06-cv-00204-JCC Document 99 Page 6 of 24 Filed 01/22/2007 Page 11 of 29 domain name where the account is located. The account represents an individual mailbox (recipient) located at the host. In addition, email addresses may be associated with text strings (comments). The comments have no impact on email delivery. Email is transmitted by a set of relays, called Mail Transport Agents (MTA). An MTA may receive emails from other MTAs (relaying) or from a sender's Mail User Agent (MUA). Similarly, an MTA may pass a message to another MTA or save it on the system (mail spool). The recipients MUA eventually retrieves the email from the mail spool. For example, I can send an email from my Gmail account to my YahooMail account. Gmail's web interface acts as the sender's MUA. The email is sent from the MUA to Gmail's MTA (the first relay hop). Gmail then sends the email to YahooMail (second relay hop) where it is stored in Yahoo's mail spool. I can then use Yahoo's web interface as the recipient's MUA in order to receive the email. The path becomes MUAMTAMTAMUA. It is very possible to route an email through multiple MTAs. Some of this routing can be natural; if a direct path is not available then email will be transported indirectly. Other routing can be intentional. Intentional routing can be done to explicitly route around a network congestion. However, it is also used to obscure a sender's path. Unscrupulous email senders frequently use open mail relays (publicly accessible MTAs) for obscuring email delivery and anonymizing the initial sender. In cases of explicit routing or mailing-by-proxy, the Received headers added by subsequent MTA systems provide logs for traceability.2 The normal delivery case relies on mail exchange records (MX records in DNS, see RFC974). These records are created by the owners of each MTA's domain. In general, the sender has no control of the email's delivery route. The route is determined by the recipient's MX records, as determined by the host in the email address.3 As with the intentional and proxied routing methods, Received headers added by intermediate MTAs permit tracking the email's normal delivery route. 3.b. Email Header Structure Every email contains three components: header, blank line, and content. The header consists of "field: value" pairs and provides meta-information for the email. The meta-information includes sender (From:), recipient (To:, Cc:, and Bcc:), subject (Subject:), and other fields. These headers are intended to be transmitted between MTAs ­ even if the MTA does not know the meaning of the field. The only headers with universal meaning to the MTAs are the sender and recipient lists. The header is well defined, including permitted character sets and some fields and values. After the header is a single blank line that is used to separate the header from the content. Finally, there is the content. This is a large text block. Whether the block contains a text message, HTML, or attachments is independent of this definition; this is strictly the "content area". RFC822 defined a minimal SMTP mail header. Every email must contain a "Date:", "From:", and a recipient ­ either "To:", "Cc:", or "Bcc:". In addition, the first MTA must create a "Message-ID:" field containing a unique identifier for tracking the email. The Message-ID is used for tracking mailing errors (debugging) and linking response emails (chaining email messages). Finally, every MTA prepends the email message with a "Received:" header for tracking the email's delivery route. (The Received header has a very well defined format, containing the source, destination, optional protocol, and date.) For example, the MUA can send the following header to the first MTA: 2 Although an intermediate MTA could modify the Received headers, this is virtually never seen. In particular, the people who are most interested in disguising headers are senders who desire anonymity. Since the sender has no control over intermediate MTAs, there is no incentive for an MTA to modify existing headers. 3 Technically, there are other routing methods available besides MX records. These other methods are also controlled by the MTA and not by the sender. Case 2:06-cv-00204-JCC Document 99 Page 7 of 24 Filed 01/22/2007 Page 12 of 29 From: Pete <pete@silly.example> To: John <jdoe@one.test> Date: Thu, 13 Feb 1969 23:32:54 -0330 Subject: test The first MTA will add in the Message-ID and Date (if either is not present), and a Received header for tracking the email. Received: from user.machine by smtp.server.machine; 21 Nov 1997 10:05:43 -0600 From: Pete <pete@silly.example> To: John <jdoe@one.test> Date: Thu, 13 Feb 1969 23:32:54 -0330 Subject: test Message-Id: <12345@cowabunga> RFC822 was obsoleted by RFC2822. RFC2822 specifies that emails should have the minimal headers, but the minimal headers are no longer required. A message may be sent without a Date, Message-Id, etc. In particular, RFC2822 says: When RFC 822 format is being used, the mail data include the memo header items such as Date, Subject, To, Cc, From. Server SMTP systems SHOULD NOT reject messages based on perceived defects in the RFC 822 or MIME message header or message body. In particular, they MUST NOT reject messages in which the numbers of Resent-fields do not match or Resent-to appears without Resent-from and/or Resent-date. While RFC documents specify de facto standards, they are not standards unto themselves. For example, some MTAs do not follow the defined Received header format, and some may not even add in Received headers. This leads to a complexity when tracking emails. In addition, protocols other than SMTP can be used to transfer email messages. The most common are the Post Office Protocol (POP3) and the Internet Message Access Protocol (IMAP). These protocols do not modify emails or their headers. Because some MTAs and MUAs may use RFC822, RFC2822, or some intermediary (or postRFC2822) specifications, formats may appear similar but not explicitly compatible. Finally, spam filters and recipient MUAs may alter the email content by modifying headers, removing hostile content, or generating additional content. 3.c. Spam and CAN-SPAM Email is a system ripe for abuse. In my presentations, I frequently refer to SMTP as "the poster child for how not to build a secure network protocol." Since the MTA can receive email from an MUA or another MTA, a sender can generate false Received headers and false or misleading sender email addresses without any way for the MTA or recipient MUA to validate the information. This single weakness ­ email is unauthenticated ­ has directly led to today's spam problem. Unscrupulous email senders frequently include false or misleading information in order to obscure the delivery trail, deterring their identification. Each Received header contains information about the sender (MUA or MTA). This is either a hostname or an IP address (and usually both). To obscure the trail, many unscrupulous email senders relay the messages through proxies that provide an alternate network address from the original sender. The CAN-SPAM act was one attempt at defining spam, when it can be used, and when it is in violation of the law. The use of forged mail headers, anonymous proxies, and misleading headers is forbidden by the CAN-SPAM act. Case 2:06-cv-00204-JCC Document 99 Page 8 of 24 Filed 01/22/2007 Page 13 of 29 4 Email Archive Evaluation The email archives that I received were reportedly provided to Derek Newman from Gordon et al. They contain a large number of email messages, including the headers. They are reportedly from a Eudora mail client (the recipient MUA). A sample email is as follows: From ???@??? Mon Feb 06 09:36:07 2006 X-Persona: <gordonworks.com> Return-Path: <faye@gordonworks.com> Delivered-To: 7-jim@gordonworks.com Received: (qmail 20163 invoked by uid 0); 6 Feb 2006 10:39:04 -0600 Date: 6 Feb 2006 10:39:00 -0600 Message-ID: <20060206163900.18822.qmail@gordonworks.com> Received: (qmail 17088 invoked from network); 6 Feb 2006 10:38:49 -0600 Received: from vm208-28.adknowledgemail.com (216.21.208.28) by celiajay.com with SMTP; 6 Feb 2006 10:38:49 -0600 X-ClientHost: 102097121101064103111114100111110119111114107115046099111109 X-MailingID: 46823899 From: Franchise <FranchiseOpportunity@adknowledgemail.com> To: <faye@gordonworks.com> Errors-To: errors@adknowledgemail.com Reply-To: return46823899@adknowledgemail.com Subject: Work for yourself, not by yourself with a franchise. Mime-Version: 1.0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: 8bit X-Spam-Checker-Version: SpamAssassin 2.63 (2004-01-11) on gordonworks.com X-Spam-Level: X-Spam-Status: No, hits=-0.2 required=7.0 tests=BAYES_20, HTML_FONTCOLOR_UNSAFE,HTML_MESSAGE,MIME_HTML_ONLY, MSGID_FROM_MTA_HEADER autolearn=no version=2.63 <x-html> <HTML> <head><meta http-equiv="charset" content="iso-8859-1"></head> ... This email message shows a number of modifications from the original sent message. The following list of points evaluate the email message from bottom to top because many headers are prepended to the message during delivery. Modified content. The message content begins with an <x-html> tag. This was likely added by the Eudora mailer. In particular, it was likely added after the email was delivered to the mail spool. The web site http://www.slipstick.com/config/e2mtips.htm provides a list of modifications made by the Eudora mailer. Blank line. A blank line separates the header from the content. SpamAssassin headers. The series of X-Spam headers were added by an anti-spam tool called SpamAssassin. SpamAssassin categorizes emails based on common attributes found in spam message and assigns a point value to each attribute. If the number of points exceeds a threshold set by the recipient, then the email is automatically classified as spam. For example, most emails contain a Date header, so the absence of a Date header awards the email a point. The use of the word "viagra" awards a point, as does the use of HTML. The items that can be awarded points and the point values are configurable by the user. The SpamAssassin classification method differs from the definition found in the CAN-SPAM act. In addition, SpamAssassin adds header information to the bottom on the header rather than the top of the header ­ an action that is non-standard by RFC822 and RFC2822. Case 2:06-cv-00204-JCC Document 99 Page 9 of 24 Filed 01/22/2007 Page 14 of 29 The X-Spam-Status line lists the number of points awarded, threshold value, and rules that trigged the spam value. In this case, all but one of the rules concern the email content. The one rule for the email header is MSGID_FROM_MTA_HEADER. This indicates that the Message-ID was added by an intermediate MTA rather than by the sender. SpamAssassin found no other spam-like items in the header. Original headers. The next ten headers (from "X-ClientHost:" to "Content-TransferEncoding:") are likely the original headers generated by the sending MUA and/or first MTA. The original headers contain two non-standard headers (X-ClientHost and X-MailingID) which are likely used by the initial sender to track the email message in case of delivery error. First Received header. The first Received header (from vm208-28.adknowledgemail.com) appears to have been created by the sender's MTA. This includes an IP address (216.21.208.28) logged by the MTA of the sender's machine. This IP address matches the sender's domain name. In particular, the registrant information for this IP address says: [whois.arin.net] OrgName: OrgID: Address: City: StateProv: PostalCode: Country: Adknowledge, Inc. ADKNO 4600 Madison Ave, Suite 1000 Kansas City MO 64112 US ReferralServer: rwhois://rwhois.adknowledge.com:4321 NetRange: CIDR: NetName: NetHandle: Parent: NetType: NameServer: NameServer: Comment: RegDate: Updated: 216.21.208.0 - 216.21.223.255 216.21.208.0/20 ADKNO NET-216-21-208-0-1 NET-216-0-0-0-0 Direct Assignment NS1.AK-NETWORKS.COM NS2.AK-NETWORKS.COM 2003-07-30 2004-06-22 ISPRE-ARIN ISP Relations +1-816-931-1771 isprelations@adknowledge.com OrgTechHandle: OrgTechName: OrgTechPhone: OrgTechEmail: Second Received header. The second Received header (qmail 17088) was added by the recipient's mail relay (MTA). In this case, the MTA is a program called Qmail. Qmail is a common MTA, however it does not follow the Received header formats defined by the RFCs. In particular, Qmail includes two or three Received lines on every message and does not include all required information ("from", "by" and "date" subfields). Two Received headers are used if Qmail is the final MTA, and three if Qmail is relaying to another MTA. Qmail headers. Between the two Received headers added by Qmail are a Date and Message-ID header. These were added by Qmail per the requirements in the RFCs. In particular, if the Date or Message-ID do not exist, then the MTA should add them. They should have been added by Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 15 of 29 Page 10 of 24 the first MTA, however their appearance is not mandatory. In this case, they were added by the second MTA. Failing to add them at the first MTA does not invalidate the email header, per RFC2822. Eudora headers. The next three header (X-Persona, Return-Path, and Delivered-To) are likely to have been added by Eudora. In particular, Eudora adds an X-Persona header, and may add Return-Path and Delivered-To headers depending on the user's configuration. From separator. The top-most header does not follow the normal "field: value" convention (it is missing the colon.) This is the From Separator and is used by the Unix mailbox format (mbox) to distinguish between different mail messages in the same file. Eudora uses a variation of the Unix mailbox format, but uses the same From Separator. The use of "???@???" for the From Separator's email address is a distinctive attribute set by the Eudora mail agent. For a comparison, a Unix mbox would include the sender's email address instead of "???@???". Because of the flexibility within SMTP and the email format, it is easy to imitate other systems. For example, the Qmail headers could have been created by some non-Qmail MTA that is imitating the Qmail format. However, it is more likely that the header was created by Qmail. Similarly, I attribute some of the email formatting to Eudora and SpamAssassin. However, these could be attributed to other mail agents. Since the mail header says "SpamAssassin" and is consistent with SpamAssassin, I see no reason to assume otherwise. Similarly, the emails were reportedly from a Eudora mail archive and are consistent with Eudora. The Qmail header is consistent with the mail server located at gordonworks.com, which reports as being a Qmail server. $ telnet gordonworks.com 25 Trying 208.109.91.140... Connected to gordonworks.com. Escape character is '^]'. 220 gordonworks.com ESMTP HELP 214 qmail home page: http://pobox.com/~djb/qmail.html quit 221 gordonworks.com Connection closed by foreign host. 4.a. Differences between Mail Archives Four email archives (Eudora mailboxes) were provided for evaluation. There are slight differences between each of the email archives. adknowledgemailcom.mbx. This mailbox contains 1,695 email messages. Most of the emails appear to be from Adknowledge. Emails dated 1-April-2004 to 1-June-2005 were delivered from Adknowledge to a variety of domains. The primary domain was gordonworks.com, however chiefmusician.net was also used. These emails have been processed by Qmail and Eudora. Emails dated 2-June-2005 to 11-June-2005 were processed by SpamAssassin. SpamAssassin included the email header from the message but removed the email's content. These email messages are incomplete. However, the included original headers match Adknowledge's headers. Emails dated 12-June-2005 to 14-December-2005 appear similar to the first date range; the emails were from Adknowledge and processed by Qmail and Eudora. However, these emails were delivered to a wide range of domains including greatnorthwest-alpha.org, Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 16 of 29 Page 11 of 24 itdidnotendright.com, anthonycentral.com, ehahome.com, rcw19190020.com, jaycelia.com, jammtomm.com, chiefmusician.net, celiajay.com, gordonworks.com, xj4x4.net, clrobin.com, jaykaysplace.com, and omniinnovations.com. All of these domains are found in the final Qmail Received headers indicating that they are the final destination. Since all emails were delivered to Gordonworks.com, they are likely owned by the same registrar. In addition, many of the domains appear to have registrants with names similar to James Gordon. For example, jaycelia.com is registered to: Registrant: Jay Gordon 200 Waldron Avenue Apt. #4 Richland, Washington 99354 United States Registered through: GoDaddy.com, Inc. (http://www.godaddy.com) Domain Name: JAYCELIA.COM Created on: 17-Jun-05 Expires on: 17-Jun-07 Last Updated on: 25-Jun-06 Administrative Contact: Gordon, Jay jaygordon@charter.net 200 Waldron Avenue Apt. #4 Richland, Washington 99354 United States (509) 943-8858 Fax - A few emails (e.g., 19-June-2007, subject "Graduate school. A whole new level of learning.") show a Symantec anti-virus filter processed the email before Eudora. Emails dated 15-December-2005 to 16-December-2005 were processed using SpamAssassin and are missing their content. The headers indicate that the sender was Adknowledge. Emails dated 16-December-2005 to 6-February-2006 were processed using a different SpamAssassin configuration, leaving the email content intact. These emails were processed by Qmail, SpamAssassin, and Eudora. As with the earlier messages, these were delivered to a large variety of domains. virtumundo-omni.mbx. This archive contains 7,016 email messages. Most came from Virtumundo. They contain the same original header fields as the Adknowledge emails. The first email (7-December-2005) is an enrollment confirmation from Virtumundo. The remaining emails, dated 15-December-2005 to 14-April-2006 came from Virtumundo and were delivered to a variety of domains; the same domains found in the Adknowledge archive. These emails were processed by Qmail, SpamAssassin, and Eudora. virtumundo.mbx. This archive contains 5,101 email messages. Most came from Virtumundo. The emails were delivered to a variety of hosting providers. The emails are intermixed within the email archive. These emails span the date range 7-October-2003 to 13-June-2004. Many of the emails were delivered to Affinity, a hosting provider used by James Gordon. Either Affinity's mailing system or Gordon's email retrieval system modified the email header, adding in a "Date:" header that is not compliant with RFC822 nor RFC2822. In particular, a space is missing after the colon. In addition, tabs have been added to the From: Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 17 of 29 Page 12 of 24 and To: fields (they should be spaces). Affinity also added a Message-Id. To restate this finding, the Message-Id, tabs, and Date header fields were not not added by Virtumundo. Instead, the Message-Id was added by Affinity, and the Date and tabs was either added by Affinity or by the recipient's email application. A sample header: From ???@??? Tue Oct 07 18:26:02 2003 X-Persona: <ValueWeb> Received: from cust_req_fwding (faye@gordonworks.com --> jim@gordonworks.com) by ams.ftl.affinity.com id <4406176-22862>; Tue, 7 Oct 2003 19:31:23 -0400 Received: from vm096.vmadmin.com ([216.64.222.96]) by ams.ftl.affinity.com with ESMTP id <3784754-30738>; Tue, 7 Oct 2003 19:30:09 -0400 Received: from vmadmin.com (192.168.3.11) by vm096.vmadmin.com with SMTP; 07 Oct 2003 18:30:08 -0500 X-ClientHost: 102097121101064103111114100111110119111114107115046099111109 X-MailingID: 154978 From: 1800 Inkjets <QualityInkCartridges154978@vmadmin.com> To: Faye <faye@gordonworks.com> Errors-To: errors@vmadmin.com Reply-To: MailCenter <mailcenter+154978@virtumundo.com> Subject: FREE Inkjets...No gimmicks - with our quality Mime-Version: 1.0 Content-Type: text/html Content-Transfer-Encoding: 8bit Message-Id: <03Oct7.193009-0400_edt.3784754-30738+970@ams.ftl.affinity.com> Date:Tue, 7 Oct 2003 19:30:09 -0400 Some emails were directly delivered to gordonworks.com and were not sent to Affinity. The final email (6-February-2006) appears to be from Jim Gordon <Kamau@charter.net> to bob@msfseattle.com (redirected to BertShawn@aol.com). The email bounced as undeliverable. In the email, Gordon appears to be including information about a potential defendant. The potential defendant in question does not appear to be Adknowledge nor Virtumundo; nothing in the email suggests otherwise. In this bounced email, Gordon wrote to "Bob" about a bounced email that he sent to the potential defendant: Bob: This "bounced email" is one of close to 100 emails that have bounced from spam by marketers for "Bed N Bath", a Boston company. Bill Silverstein and Joe Wagner (CA residents) will be filing a lawsuit against this company in March (after waiting for the demand letter...). I checked my spam repository and found over 700 spam from Bed N Bath. One of my clients has also asked to join this action. By the way, Bill and Joe will be suing this company in Boston (they have selected an attorney to represent them). I would prefer the federal district court... My client will sue under its business name and I as "gordonworks.com". There may be one or two additional plaintiffs in this case. I should have firm details by Tuesday the 7th. Thank you considering this case. Best Regards, Jim Gordon virtumundo2.mbx. This archive contains 5,047 email messages that appear to mostly be from Virtumundo and are dated 7-October-2003 to 24-March-2006. As with the other email archives, these were delivered to a variety of hosting sites and processed by SpamAssassin, Qmail, Eudora, and other email relays at hosting sites such as Affinity. 4.b. Inconsistency within the Mail Archives Each of the email archives appear to be collections from a variety of email accounts: FAYE@GORDONWORKS.COM JAMES@GORDONWORKS.COM JAY@GORDONWORKS.COM Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 18 of 29 Page 13 of 24 ant@anthonycentral.com bonniegg@gordonworks.com business@gordonworks.com celia@celiajay.com chuck@anthonycentral.com dewayne@anthonycentral.com faye@gordonworks.com hum@ehahome.com indi@jammtomm.com james@gordonworks.com jamila@gordonworks.com jay@gordonworks.com jay@jaycelia.com jim@gordonworks.com jim@itdidnotendright.com jim@rcw19190020.com jobs@gordonworks.com jon@jaykaysplace.com jonathan@gordonworks.com katie@ehahome.com mila@jammtomm.com sandy@anthonycentral.com tj@anthonycentral.com The email collections were processed using a variety of tools after the email message left control of Adknolwedge and Virtumundo. They were processed using SpamAssassin, Eudora, and some MTAs. None of this post-processing is surprising or unexpected. However, the variety of systems used, including different SpamAssassin configurations and different hosting sites per collection adds complexity to the analysis due to inconsistencies within the email archives. 4.c. Messages Not from Virtumundo Not all of the email messages in the archives came from Virtumundo or Adknowledge. This is determined from the sender's IP address logged in the receiving MTA's Received header and from the set of original email header, before any recipient MTA and MUA modifications. adknowledgemailcom.mbx. There are 14 email messages not from Adknowledge. These appear to come from a different company: Digital Connexxions (aka WKI Data). Their headers use capitalized "To:" addresses, different header orderings from Adknowledge and Virtumundo, and are missing the X-ClientHost and X-MailingID headers found in Adknowledge and Virtumundo emails. These emails also include a Date: and Message-Id header that are set by the sender; Adknowledge and Virtumundo do not include these fields. A sample header: From ???@??? Thu Jan 19 15:17:10 2006 X-Persona: <gordonworks.com> Return-Path: <JAMES@GORDONWORKS.COM> Delivered-To: 7-jim@gordonworks.com Received: (qmail 11330 invoked by uid 0); 19 Jan 2006 15:46:21 -0600 Received: (qmail 7242 invoked from network); 19 Jan 2006 15:46:15 -0600 Received: from smtp16.prefersend.com (HELO smtp.prefersend.com) (207.53.245.26) by jammtomm.com with SMTP; 19 Jan 2006 15:46:15 -0600 Content-Transfer-Encoding: 7bit Content-Type: multipart/alternative; boundary="_----------=_11377071587729947" MIME-Version: 1.0 X-Mailer: MIME::Lite 2.117 (F2.6) Date: Thu, 19 Jan 2006 21:45:58 UT To: JAMES@GORDONWORKS.COM From: Electronic Federal Tax Payment System <EFTPS@prefersend.com> Reply-To: EFTPS@prefersend.com Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 19 of 29 Page 14 of 24 Subject: EFTPS: Faster, Simpler Tax Payments X-Campid: cid=199-uid=1821060-mid=1218-pid=47-X-Eid: JAMES@GORDONWORKS.COM Message-Id: <20060119214558.57A4E28F390B@smtp.prefersend.com> X-Spam-Checker-Version: SpamAssassin 2.63 (2004-01-11) on gordonworks.com X-Spam-Level: X-Spam-Status: No, hits=-0.7 required=7.0 tests=BAYES_00,HTML_60_70, HTML_FONTCOLOR_RED,HTML_FONTCOLOR_UNSAFE,HTML_IMAGE_ONLY_10, HTML_IMAGE_RATIO_04,HTML_MESSAGE,HTML_TAG_BALANCE_A,MIME_HTML_ONLY, MIME_HTML_ONLY_MULTI,RCVD_IN_SBL autolearn=no version=2.63 virtumundo-omni.mbx. There are six email messages not from Virtumundo or Adknowledge. These emails appear to have come from WKI Data. virtumundo.mbx. There are 15 emails not from Virtumundo or Adknowledge. Some appear to be from WKI Data, while others came from Popular Enterprises and other spammers. Some of these emails contain forged email headers. One email message was sent by James Gordon. This email, menioned above, is dated 6February-2006 and appears to be from Jim Gordon <Kamau@charter.net> to bob@msfseattle.com. This email does not appear to be related to Virtumundo or Adknowledge. In one of the emails (27-January-2005 from "Carrie a"), the email uses forged a Virtumundo email address in the Reply-To field. Spammers running scams frequently impersonate domain names in their forged headers in order to anonymize the sender. As with the other non-Virtumundo emails, this email includes fake Received headers, a Message-ID and Date (real Virtumundo emails are missing these), and a partial SpamAssassin filter header, indicating that this header line is also forged. The full non-Virtumundo header is as follows, with forged components highlighted in bold text. This email actually originated from 211.184.9.3 (Korea), as noted on the first real Received line. The forged headers and Korean originator are inconsistent with the thousands of email samples from Virtumundo and Adknowledge. This leads me to conclude that this email is not from Virtumundo or Adknowledge. From ???@??? Thu Jan 27 06:20:42 2005 X-Persona: <spam> Return-Path: <uleon@yesmeds-now.net> Delivered-To: virtual-gordonworks_com-spam@gordonworks.com Received: (qmail 7424 invoked by uid 10003); 27 Jan 2005 10:30:50 -0000 Received: (qmail 7401 invoked from network); 27 Jan 2005 10:30:49 -0000 Received: from unknown (HELO 66.230.220.20) (211.184.9.3) by ns48.webmasters.com with SMTP; 27 Jan 2005 10:30:49 -0000 Received: from 234.30.43.48 by 211.184.9.3; Thu, 27 Jan 2005 04:21:53 -0600 Message-ID: <OMALLWDHYOTXAFSCDVVGG@webone8.com> From: "Carrie a" <ULeon@yesmeds-now.net> Reply-To: "Israel F Story" <CWilliam@virtumundo.com> To: business@gordonworks.com Subject: What IS OEM software and why do you care? Date: Thu, 27 Jan 2005 14:21:53 +0400 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="--4172417560795376943" X-Spam-Filter: F3_Unwanted_To_Address: business@gordonworks.com virtumundo2.mbx. There are 17 emails not from Virtumundo or Adknowledge. As with virtumundo.mbx, these came from a variety of spammers. Some emails contain forged headers, content hash-busters (used to bypass hash-based spam filters), and false or misleading sender information as specified in the CAN-SPAM act. Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 20 of 29 Page 15 of 24 4.d. Factual Issues in the Case There are six factual issues that have been requested in the expert report. My testimony is as follows: 1. Do any of the emails contain false or misleading header information? This includes the alteration or concealment of header information in a manner that would impair the ability of an individual to identify, locate, or respond to the person who initiated the email message. The headers attributed to Adknowledge and Virtumundo do not contain false or misleading information. The headers are minimalistic and compliant with accepted email formatting specified in RFC2822. 2. Do any of the emails contain information used to obscure or misrepresent the email's point of origin (sender)? There are no false or proxied Received headers used to obscure the sender's identity. The reverse lookup information for the IP address information accurately identifies Adknowledge or Virtumundo. 3. Do the "From:" lines in the emails accurately identify the sender? Each of the "From:" lines specify the domain name of the sender. All of the Adknowledge emails from adknowledge.mbx are from "@adknowledgemail.com" (1,673 emails) or "@my-freemail.com" (8 emails). The my-freemail.com messages came from an IP subnet owned by Adknowledge and the domain is registered to Venture Direct. According to a representative from Adknowledge, Venture Direct is a client and they were permitted to use the IP range. The emails from all of Virtumundo archives (virtumundo-omni.mbx, virtumundo.mbx, andvirtumundo2.mbx) came from a variety of domains managed by Virtumundo and Adknowledge: adknow-net.com (1,198 emails), virtumundo.com (25 email), vm-mail.com (6,987 emails), vmadmin.com (5,643 emails), vmadmin.com (5,643 emails), vmamdin.com (8 emails), vmlocal.com (3,165 emails), and vtarget.com (100 emails). The only false domains appear to be the eight emails from "vmamdin.com". These appear to be a typographical error from "vmadmin.com". These eight emails were sent within the same minute to eight email addresses on 23-January-2004. Although the "From:" line was invalid, the "Errors-To:", IP addresses, and content's contact information all identify Adknowledge and Virtumundo. Virtually all of the "From:" lines contain different accounts within the Adknowledge and Virtumundo domains. However, the account names appear related to the email content and do not appear to be false or misleading. 4. Is the sender clearly identifiable in the email header? With the exception of the eight typographical errors, all Virtumundo and Adknowledge emails are clearly identifiable by the "From:" header. Even with the eight errors, the senders are identifiable by their origination IP addresses, reply email address, and errors email address. 5. Is the sender clearly identifiable in the email content? To answer this question, I am ignoring the emails where the recipient's SpamAssassin removed the content. In those emails, there is no content to evaluate. The removal of the content was performed by the recipient and outside of the control of Adknowledge or Virtumundo. Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 21 of 29 Page 16 of 24 Each of the Virtumundo and Adknowledge emails with content contain URLs to their domains and a sentence or paragraph stating who it came from. In most of the emails, the paragraph is very explicit. For example: You received this email because you signed up at one of Virtumundo's websites (see the "Properties" listed at http://privacy.virtumundo.com/properties.html) or you signed up with a party that has contracted with Virtumundo. To unsubscribe from the Virtumundo Rewards List, go to http://www.virtumundo.com/unsub or go here [URL]. To read Virtumundo's privacy policy, go to Privacy Policy [URL]. The products and/or services advertised in this email are the sole responsibility of the advertiser, and questions about this offer should be directed to the advertiser. (c) 1998-2003 Virtumundo, Inc. All rights reserved. In these emails, the font size is specified as "1" (1 point font). However, most web browsers set a minimal font size that is larger than 1 pt, so the text should be readable. In other emails, the paragraph is less wordy. for example: To unsubscribe click here [URL]. 428 River View Plaza Trenton, New Jersey 08611 Can-spam Act 2003 Compliant In a few of the emails, there is no text identifying the sender, but there are hyperlinks and images from Virtumundo sites. For example, an email from 8-June-2004 contains an image with text stating who sent the email. The image (http://v1.cc/ft/robot.gif) says: This image is associated with a URL. In the "my-freemail.com" emails, the sender is identified with a paragraph as coming from company "MyFree.com" with the domain "my-freemail.com". Yes, I believe the sender is clearly identified in the content. I believe this primarily because the URLs in the unsubscribe links match the header information, but also because of the text (or images containing text) that identify the sender within the content. Based on the presence of the opt-out removal instructions, it appears that Gordon was provided an opt-out mechanism. It appears that he had the opportunity to opt-out from future mailings. 6. Is James Gordon an Internet access service? The Communication Act of 1934 defines an Internet access service (47 U.S.C. 231(e)(4)) as follows: The term "Internet access service" means a service that enables users to access content, information, electronic mail, or other services offered over the Internet, and may also include access to proprietary content, information, and other services as part of a package of services offered to consumers. Such term does not include telecommunications services. Based on this definition, I see no evidence suggesting that Gordon is an Internet access service. Gordon's role with the Internet access services appears to have been as a customer. The list of service providers found in the email archives include Affinity and GoDaddy. The email headers show no evidence of Gordon owning or operating a service that enables users to access Internet services. In addition to the email recipient providers, there is the previously mentioned email dated 6- Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 22 of 29 Page 17 of 24 February-2006 from Jim Gordon <Kamau@charter.net> to bob@msfseattle.com. This email originated from 68.113.1.119. This IP address resolves as 68-113-1-119.dhcp.knwk.wa.charter.com, a Washington-based DHCP customer for Charter Communications. Charter is an Internet access service provider and Gordon appears to be a customer. There is no evidence in the logs of email being delivered to this IP address or of other people using this IP address. This IP address appears to be a residential service, and not a commercial service.4 According to Charter's use policy (http://www.charter.com/Visitors/Policies.aspx?Policy=6), the service is only for use in a single household, and not as a third-party to email or other Internet services. In the Gordon testimony (Page 112, lines 10-25), Gordon states that he uses GoDaddy for server hosting and identifies that he does not have root access on the systems. The "root" account is the administrator on Unix/Linux systems. Without root access, the user is not the system administrator. (Root for Unix is similar to the Microsoft Windows "Administrator" account.) However, some system services may be managed by user accounts (non-root). For example, GoDaddy provides an administrative tool called Plesk (http://www.swsoft.com/plesk/) for managing DNS information. Gordon states that he uses Plesk (page 109, lines 9-20) to administer the domains that he has registered or manages. In particular, GoDaddy only permits the management of domains registered through GoDaddy (http://help.godaddy.com/article.php?article_id=663&topic_id=163&&); this excludes third-party hosting. Although Gordon may be a domain administrator for a set of domains, he is not an Internet access service for DNS hosting. To fully illustrate this relationship: The domain "ehahome.com" is registered to "Emily Abbey" through GoDaddy. The DNS servers for managing this host are "ns1.gordonworks.com" and "ns2.gordonworks.com". The domain "gordonworks.com" is registered to "Omni Innovations, LLC" through GoDaddy. The DNS servers for managing this host are "ns1.gordonworks.com" and "ns2.gordonworks.com". On 22-January-2007, the host "ns1.gordonworks.com" resolved to the IP address 68.178.150.119. This IP address has a reverse-lookup of ip-68-178-150-119.ip.secureserver.net. The domain "secureserver.net" is owned and operated by GoDaddy. The host "ns2.gordonworks.com" resolves to 208.109.91.7 with a reverse lookup of ip-208-109-917.ip.secureserver.net; another GoDaddy address. For Gordon to use GoDaddy's server and administer the "ehahome.com" domain, he must have administrative rights but not hosting rights. The company providing the hosting rights is GoDaddy. GoDaddy permits Gordon to administer the domain. Thus, GoDaddy is the Internet access service, while Gordon is a customer of GoDaddy. 5. Addressing Existing Testimony Derek Newman requested that I review James Gordon deposition transcripts. Within the transcripts are some technical inaccuracies. Seattle, Washington; January 9, 2007, 9:23 AM. Deposition of James S. Gordon, Junior. Page 81, line 25. 4 Determined from the ARIN (American Registry for Internet Numbers) registration records for the subnet and from a DNS scan. The ARIN records do not identify the subnet as a commercial subnet. However, this is not conclusive. A DNS scan of the subnet 68.113.1.0 ­ 68.113.1.255 do not identify any domain names beyond "charter.com". Although not conclusive, this is a very strong indicator of a residential subnetwork. In contrast, the Charter subnet 68.113.3.0 ­ 68.113.3.255 contains alternate DNS names and "static" instead of "dhcp" in the hostnames, suggesting commercial customers. Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 23 of 29 Page 18 of 24 Gordon states that SpamAssassin identifies spam relays. This is not entirely correct. SpamAssassin uses data from third-party RBS (Realtime Blacklist Systems) to identify networks linked to the distribution of undesirable email. RBS lists identify IP addresses and subnets associated with sending spam. This could be due to open relays and compromised hosts, or because a company is sending directly but the company is identified as a spammer. In many cases, RBS lists can lead to false-positives, where an IP address or subnet is classified as a spammer even though the owner never sent any spam emails. For example, this can happen if a user (or company) is assigned an IP address previously used by a spammer. Some companies have been blacklisted as a pressure-move and not due to spam. For example, nearly all Comcast IP addresses assigned to cable modems have been blacklisted. This is not because they are all spammers or that Comcast is a spammer. This is because Comcast is reported as doing little to prevent malware from being used to send spam from their customer's computers. The blacklist is intended to pressure Comcast into filtering their customer's web access. I believe it is important to point out that all RBS providers operate outside of government or legal influence. They are run by teams of individuals without any external oversight. Furthermore, some anti-spam groups such as SpamHaus offer methods to contest a RBS listing. However, since they use their own RBS lists, it can be difficult for an accused spammer to contact them. Per page 131 line 23, it is also important to mention that the definition of spam from SpamHaus and other RBS providers differs from the definition found in the CAN-SPAM act. Page 98, line 10. Gordon states that the email was delivered because it was not bounced. This is a minor technical issue. Not every email system generates a delivery failure message. Bounce-back messages are occasionally used by spammers to re-mail spam and has been used for email based denial-of-service (DoS) attacks. As a result, many servers have disabled this functionality. In addition, spam filters on the receiver's end may discard the email before delivery. While most of the time no response means it was delivered, this is not always the case. It is plausible that Gordon's emails were sent to a bad address or filtered by Adknowledge as spam. I cannot speak on the probability of this. Page 255, line 4. Gordon states that the systems were up because they were reachable using Visual Route. Visual Route performs a traceroute function, used to identify the direct network path to a host. Traceroute does not necessarily nor usually follow the path taken by email. Traceroute also does not validate whether any network services are available besides ICMP (a network-layer protocol). In particular, traceroute does not check if a mail server is active on the destination system. Seattle, Washington; January 10, 2007, 9:07 AM. Deposition of James S. Gordon, Junior. Page 297, beginning at line 15. Gordon explains how an email's "From:" line should say who it comes from. He implies that it should be a person's name. RFC2822 gives some example email addresses including ones where the "From:" line's text field contains a comment. On Unix systems, the "From:" line's text string is usually taken from the GECOS field in the password file. The General Electric Comprehensive Operating Supervisor field contains the name associated with an account, office location, phone number, and other meta- Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 24 of 29 Page 19 of 24 information. All parts of the GECOS are optional. On Windows system, there is no directly equivalent information to the GECOS field and the default string is usually left to the user to enter. Neither RFC822 nor RFC2822 require a string to be present nor specify the purpose of the string associated with an email address. While using a person's name is common for emails from individuals, it is not common for emails from companies or other organizations. A few examples: From: "Challenge" <challenge@dc3.mil> I received this email from the Department of Defense's Cyber Crime Center (DC3). The email was related to a Forensic Challenge that I entered. (I was the highest scoring team among civilian contestants.) Although it was sent by an individual, the sender's name references the contest described in the email content. From: <watch.help@wsp.wa.gov> An email reply from the State of Washington concerning a criminal background check I requested in 2004. There is no string identifying the sender. From: "sbirhelp" <sbirhelp@brtrc.com> This is comes from an email I received in 2003 from the Department of Defense's SBIR grant process. It contains the account name in the text field. From: NW Customer Services <customer_service@nww.com> This header comes from Network World's magazine subscription system. The domain does not say "Network World" but is related to the content. Each of these example services generate opt-in emails and provide an opt-out mechanism. In many cases, the opt-out method was similar to the process provided by Adknowledge and Virtumundo. Finally, in the sample email archive virtumundo.mbx, the last email was sent by James Gordon. It says: From: Jim Gordon <Kamau@charter.net> The string associated with the email address does not match the email address and does not match any domains owned by Gordon. In addition, the email address does not match the content. However, this does not indicate that the sender nor the email address is fictitious, forged, or misleading. Page 306, beginning at line 7. Gordon attempts to explain how email is transmitted and when headers are added. In his explanation, he mistakenly states that the sender adds in headers and tracking information. Received headers are intended to be added by the receiving MTA and not the sending MTA. Any IP address or hostname listed in the Received header was added by the recipient, not the sender. There are two common situations where the sender creates Received headers. First, the MTA may be passing the email between processes on the same server. This is why Qmail includes additional Received headers. The second situation is in spam with false Received headers. The spammer may include false Received lines in order to obscure their origination address. The Adknowledge and Virtumundo emails do not contain false Received headers. Page 306, beginning at lines 17-20. Gordon states that the emails from Adknowledge and Virtumundo are missing Received headers. I see no evidence of missing Received headers. In addition, there are Received headers in the Case 2:06-cv-00204-JCC Document 99 Filed 01/22/2007 Page 25 of 29 Page 20 of 24 email as sent from Adknowledge and Virtumundo. These headers were added by the recipient, outside of the control of the sender. Gordon's testimony in this case is incorrect. Gordon continues on page 307 to state that the emails from Adknowledge and Virtumundo lack chaining between the Received headers. I see no indication of this. In fact, I explicitly see chaining between the mail agents, indicating no false Received headers. Page 355, line 17. Gordon attempts to describe Received headers. He states, "The "from" token in R3, which according to Internet protocol...". The Internet Protocol (IP) does not define any such "R" tokens. Nor are "R" tokens defined in any of the email RFC documents. These tokens appear in Exhibit A and are attributed to the interpretation from a tool called eMailTracking Pro. Because Received headers are added by each receiving mail relay, there are frequently many of them. There is no consistent enumeration method for identifying specific headers. Some researchers count the top-most header a "1", and subsequent headers as "2", "3", etc., and other people begin counting from the bottom of the list. The only consist

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?