Home Messaging

Below are the M3AAWG published materials related to our messaging anti-abuse work. There is also a Messaging video playlist on our YouTube channel at www.youtube.com/maawg and there are a few selected videos on our website in the Training Videos and Keynotes Videos sections under the Meetings menu tab.

Best Practices

February 10, 2023

M3AAWG Help! I Hit a Spam Trap!

The Senders Committee has created this document in an effort to help Email Service Providers (ESPs) mitigate the consequences of hitting spam traps. The document provides details on what spam traps are, the impact they have on mailings, and includes suggestions on ways to use spam trap feedback to improve customers’ sending practices, thereby minimizing future spam trap hits. In this document, “customer” refers to the organization using the ESP to send emails. 

September 19, 2022

M3AAWG Objectionable Content Takedown Template

(M3AAWG Objectionable Content Takedown Template Checklist)

(M3AAWG Objectionable Content Takedown Diagram - Download to Personalize)

This document provides a template for designing an enforcement process to use when an organization becomes aware of objectionable content being hosted on its network and determines that it requires a takedown. This objectionable content might fall under – but may not necessarily be limited to – the organization’s policies and applicable regulations.

June 27, 2022

M3AAWG Protecting Parked Domains Best Common Practices Update 2022-06

Many organizations and individuals register domains without an immediate intent to use these domains or to use them in a limited context. These domains (or subdomains) are not meant to send or receive email traffic. For instance, a domain can be registered to prevent a bad actor from acquiring and abusing the domain, known as a defensive registration. These domains are “parked.” In other instances, the domain or subdomain is used exclusively to contain a website with no email service enabled. This document provided general updates to the 2015 document and removed items that are no logner relevant.   (pending Japanese translation update)

February 21, 2022

M3AAWG Brand Protection Kit Domain Management

This document focuses on domain management. It outlines how to protect brands from threat actors who are keen to register domains that mimic a brand in order to steal information and/or assets. 

September 13, 2021

M3AAWG Disposition of Child Sexual Abuse Materials Best Common Practices

This document is not legal advice. M3AAWG strongly suggests that readers work with their company’s legal counsel or avail themselves of independent legal advice regarding their rights, responsibilities and obligations relevant to prevailing legal jurisdictions.


Public Policy Comments

May 25, 2023

M3AAWG Comments on the NTIA's Introduction of Accountable Measures Regarding Access to Personal Information of .us Registrants

M3AAWG has submitted comments on the National Telecommunications and Information Administration's Introduction of Accountable Measures Regarding Access to Personal Information of .us Registrants. In this set of Comments, M3AAWG urges the Agency NOT to implement the potential changes described in this request for comments. Read more for additional insight into M3AAWG's submission.

December 19, 2022

In the Matter of Trade Regulation Rule on Impersonation of Government and Businesses | Docket No. FTC-2022-0064 | COMMENTS OF THE MESSAGING MALWARE MOBILE ANTI-ABUSE WORKING GROUP (M3AAWG) ON THE NOTICE OF PROPOSED RULEMAKING

Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) supports the U.S. Federal Trade Commission’s (FTC) proposed rulemaking as part of its current mission in protecting the public from deceptive or unfair business practices to include a critical role in protecting consumers from ongoing and increasing impersonation schemes targeting businesses and governments alike. M3AAWG suggests additional regulatory solutions and best practices to complement the goals of this rule, such as clarifying the scope of the rule to include the use of domain names in impersonation schemes and the use of technologies that enable impersonation. M3AAWG notes that the investigation of impersonation schemes requires cooperation and information from many entities.  Specifically, WHOIS information is vital to the investigation of impersonation scams. The Comment identifies best practices to tackle impersonation scams, including the validation of commercial senders, DNS mitigation steps, and adoption of trusted notifier relationships to facilitate abuse reporting.

January 06, 2022

EPDP Phase 2A Policy Recommendations for ICANN Board Consideration

It is in the public interest for anti-abuse actors to be able to contact, and obtain information about, the registrant of a public resource such as a domain name, in order to address cybercrime, hacking, botnets, phishing, and other abuse. For bona fide actors with a legitimate interest, access to WHOIS must be effective, functional, timely, and efficient to ensure appropriate cybercrime and abuse response. Thus, we would like to voice our agreement with the recommendations made in SAC118, as released by SSAC on July 15th 2021.

September 30, 2021

Recommendations pertaining to findings from the M3AAWG and APWG WHOIS Survey Report presented to ICANN in June, 2021

As a followup to the June 2021 survey report of cyber investigators and anti-abuse service providers on the ongoing impacts of ICANN’s implementation of the EU GDPR, the Temporary Specification for gTLD Registration Data (Temporary Specification, adopted in May 2018), M3AAWG and the Anti-Phishing Working Group (APWG) has released their recommendations for ICANN'S consideration.

June 08, 2021

ICANN, GDPR, and the WHOIS: A Users Survey - Three Years Later

M3AAWG and the Anti-Phishing Working Group (APWG) conducted a follow up survey to our 2018 survey of cyber investigators and anti-abuse service providers to determine the ongoing impacts of ICANN’s implementation of the EU GDPR, the Temporary Specification for gTLD Registration Data (Temporary Specification, adopted in May 2018). The report contains our findings and presents some recommendations for consideration.


M3AAWG Reports

M3AAWG Email Metrics Report

January 01, 2012

First-Fourth Quarter 2011

March 22, 2011

Third and Fourth Quarter 2010

November 18, 2010

First and Second Quarter 2010

March 11, 2010

Third and Fourth Quarter 2009

July 01, 2009

First and Second Quarter 2009


DM3Z Blog


Articles About M3AAWG

November 12, 2020

Phantom Clicks: Non-Human Intervention Distorts Email Marketing Metrics, Study Finds

It seems simple: You send a marketing email, and the recipient opens and clicks on it or doesn’t. Right?
Not quite. Received email is increasingly being handled via Non-Human Interaction (NHI) — through software programs that can throw off marketers' metrics and hurt their sender reputation.

June 01, 2020

Should you deploy a TLS 1.3 middlebox?

To inspect or not to inspect, that is the question.

TLS 1.3 is by far the most secure version of the Transport Layer Security (TLS) protocol, but its use of ephemeral elliptic curve keys--and the deprecation of static RSA keys--means that TLS sessions now offer forward secrecy, a bane to enterprise security administrators who want to maintain visibility into their network traffic.

May 07, 2020

MarTech Interview with Len Shneyder, VP of Industry Relations at Twilio SendGrid

Domain-based Message Authentication, and Reporting, and Conformance is a policy that adds to SPF and DKIM and gives a receiving set of instructions on what they should do when an email they received fails other authentication checks.

April 29, 2020

AdExchanger Politics: Text Messaging Captures The Spotlight This Year

Text messaging isn’t new or trendy, but it’s an increasingly popular medium for political advertisers. That was true before the coronavirus swept the country, and now texting is even more important for candidates to connect with supporters without rallies, events or canvassing teams.


Subscribe to