<html><head></head><body>It's been pointed out to me (thanks Leo!), that the WG is called Anti-Spam below. This is a mistake, to clarify, we're still very much the Anti-Abuse WG.<br>
<br>
Brian<br><br><div class="gmail_quote">On 3 June 2014 17:12:49 GMT+01:00, Brian Nisbet <brian.nisbet@heanet.ie> wrote:<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<pre class="k9mail">Colleagues,<br /><br />Having taken on board a number of points, here is another draft of this. <br />I think we've got the kinks knocked out, so to speak, or at least <br />reached a point where rough consensus may be manageable. I'm going to <br />set a deadline of 15:00 UTC +1 on Friday 6th June to end this round of <br />discussions. Obviously if something needs to be discussed beyond that, <br />it can, but we've been talking about this for a couple of weeks now.<br /><br />Importantly while I'd like some statements of support, silence, at this <br />point, will be taken to indicate consent.<br /><br />Please see the draft below,<br /><br />Brian<br /><br />**********************************<br /><br />As the Internet has evolved, so has the scope and scale of network <br />abuse. Unsolicited bulk email (spam) is often merely a symptom of <br />deeper abuse such as viruses or botnets. Consequently the Anti-Spam <br />Working Group has a wide scope, to
include all relevant kinds of abuse.<br /><br />The technical details of spam and other abuse constantly vary, in terms <br />of application channel and technique. Channel examples include SMTP, <br />SIP, XMPP and HTTP. Examples of techniques range from buffer overrun to <br />social engineering.<br /><br /> Within scope are all systems and mechanisms, both technical and <br />non-technical, that are used to create, control, and make money from, <br />such abuse.<br /><br /> While areas such as hosting illegal content or copyright <br />infringement are not seen as a central part of the working group's <br />remit, they are unquestionably bound up in other aspects of network <br />abuse and, as such, may be areas of interest.<br /><br />The working group considers both technical and non-technical aspects of <br />abuse, with the following goals:<br /><br /> Produce and continue to update a BCP (Best Common Practice) <br />document for ISPs similar in nature
to RIPE-409 but covering a wider <br />range of possible abusive behaviours.<br /><br /> Provide advice (beyond that of the BCP) to relevant parties <br />within the RIPE region such as ISPs, Governments and Law Enforcement <br />Agencies on strategic and operational matters.<br /><br /> Discuss and disseminate information on technical and <br />non-technical methods of preventing or reducing network abuse.<br /><br /></pre></blockquote></div><br>
-- <br>
Brian Nisbet<br>
Network Operations Manager, HEAnet<br>
(Sent from a mobile device, apologies for brevity)</body></html>