Est. 1985 Software Architecture • Engineering • Leadership 40 Years of Excellence

Fred Lackey

Software Architect, Engineer & Leader

From the Problem to the Solution

SpamJammer did not begin as an anti-spam product. It began as the opposite.

In the years before spam was a household word, Fred Lackey built a product called 321 Email — a service for creating and renting targeted email lists to companies and entrepreneurs. Email marketing in that era had no standardized regulations, no opt-out mechanisms, and no concept of permission. Users could be reached directly and cheaply, and businesses were eager to do exactly that.

But as 321 Email grew, so did the complaints. Without an unsubscribe mechanism, recipients had no recourse. The ethical weight of facilitating unsolicited email became impossible to ignore. Rather than adapt 321 Email incrementally, Fred shut it down entirely — and redirected his energy toward building the thing that would have stopped it.

“Having built the problem, I understood it from the inside. That made building the solution considerably easier.”

SpamJammer launched as a free email relay service at SpamJammer.com, introducing a technique that would later become foundational to email security: URL confirmation — verifying that a sender is a real human being before their message is ever delivered.

URL Confirmation: Before It Had a Name

The mechanism SpamJammer introduced seems obvious in retrospect. At the time, it was novel enough to be patentable, and it predated widely known implementations of the technique by years.

The concept: do not deliver email from unknown senders automatically. Instead, intercept it, queue it, and send the would-be sender a unique confirmation link. A human clicks the link; their message is delivered. A spam bot ignores it; the message never arrives. The sender only has to confirm once — after that, they are trusted.

01

Incoming email from an unknown sender arrives at SpamJammer.com’s relay infrastructure. Instead of forwarding it to the recipient, the system queues it and holds it in place.

02

A confirmation email is sent back to the original sender containing a unique URL — generated using Microsoft GUID technology, novel for this application at the time.

03

If the sender is a real person, they click the link. Their original message is immediately released from the queue and delivered to the intended recipient.

04

If the confirmation is ignored — as automated spam systems invariably do — the queued message is discarded. The sender is confirmed; future messages from them pass through without interruption.

The elegance of this approach is that it costs legitimate senders almost nothing — a single click, once — while imposing an insurmountable burden on automated spam systems operating at volume. It is a fundamentally asymmetric defense.

From Consumer Service to Enterprise Platform

SpamJammer’s technical stack evolved in direct response to market opportunity. The consumer relay service proved the concept; the enterprise market demanded something categorically different.

v1
Active Server Pages — Consumer Relay

The initial implementation ran on ASP before .NET existed. Without XMLHttpRequest or AJAX, all processing was synchronous and server-side. GUID-based verification identifiers — innovative for this application at the time — created unique confirmation tokens. Despite the constraints of the technology, the core mechanism worked.

v2
ANSI C++ — Enterprise Rewrite

Enterprise clients ran Linux and Unix. A Microsoft-stack solution was a non-starter. The entire codebase was rewritten in ANSI C++ to target Linux deployment environments and deliver the performance characteristics that enterprise email volumes demanded.

v3
Custom MTA — Production-Grade Infrastructure

The most significant technical achievement: a custom-built Mail Transfer Agent designed from the ground up for the specific demands of anti-spam processing. The MTA handled receiving, queuing, scanning, retrying, and delivering millions of messages with full asynchronous processing, message state correlation, and fault tolerance. No existing MTA was suited to this workload — building one from scratch was the only viable path.

v4
Hardware Appliance — Plug-and-Play Enterprise

The final form: a purpose-built hardware appliance that eliminated installation complexity entirely. Enterprises could rack a SpamJammer unit and have it operational within minutes, without configuring software or managing dependencies.

Yellow Bezel on the Rack Floor

SpamJammer partnered with a Midwest-based hardware manufacturer to produce custom 1U and 2U rack servers. The units shipped with a distinctive yellow bezel bearing the SpamJammer logo — immediately identifiable on any data center floor.

The appliance architecture was modular by design. Each unit could assume one of three roles depending on where it was placed in the network:

INBOUND MAIL
  ↓ all external email enters here

EDGE DEVICE  // 1U rack server, yellow bezel
  Initial email reception & storage
  URL confirmation dispatch
  Queue management

  ↓ confirmed messages only

PROCESSING SERVER  // 2U rack server
  Spam filtering & scanning
  Content analysis
  Policy enforcement

  ↓ clean mail delivered

MAIL SERVER  // user-facing
  Web client access
  User management & control panel
  Reporting & administration

Auto-discovery: new appliances perform handshake, negotiate role, join the cluster automatically

The most operationally significant feature was automatic scaling. When a new SpamJammer appliance was racked and powered on, it automatically detected the existing cluster, performed a handshake with other units, and negotiated its own role. No manual configuration. No provisioning scripts. The system grew itself.

The control panel was designed explicitly for non-technical administrators. At a time when enterprise security products routinely required specialist knowledge to operate, SpamJammer could be managed by anyone with basic computer literacy.

What It Accomplished

SpamJammer was early enough in the anti-spam space that its innovations were genuinely novel — not incremental improvements on existing approaches, but first-of-kind solutions to problems the industry was still learning to articulate.

  • Pioneered URL confirmation as a spam-fighting technique, predating widely known implementations by years and establishing a pattern that would later become industry standard
  • Built one of the earliest enterprise-grade spam-filtering appliances, at a time when most organizations had no dedicated hardware solution for email security
  • Developed a custom Mail Transfer Agent capable of processing millions of messages asynchronously with full state correlation — a non-trivial engineering achievement in the era before cloud infrastructure
  • Engineered plug-and-play appliance clustering with automatic role negotiation, eliminating the configuration complexity that made competing solutions difficult to deploy
  • Designed a control panel accessible to non-technical administrators — a product philosophy that prioritized usability at a time when enterprise security tools routinely required specialist operators
  • Achieved commercial validation through acquisition by a major antivirus company, where SpamJammer became the core engine powering their enterprise anti-spam product line
“SpamJammer was ahead of its time, offering solutions that later became standard practices in the fight against spam.”

Stack & Craft

The technology choices at each phase of SpamJammer’s development were constrained by what existed at the time. There was no cloud, no containerization, no mature open-source MTA ecosystem suited to this use case. Every component that needed to exist and did not yet exist was built.

Active Server Pages GUID Verification SQL Server Windows Server
ANSI C++ Custom MTA Linux / Unix Async Message Queue State Correlation Engine
Custom 1U / 2U Hardware Auto-Discovery Protocol Role Negotiation Web Admin Console Cluster Management

SpamJammer Is Back

The original SpamJammer solved a version of the spam problem that existed in the early 2000s. The core problem — unsolicited, automated contact from unknown senders — has not been solved. It has gotten worse.

SpamJammer is now in active development again, reimagined as a Gmail-native service under Briskhaven Holdings. The same foundational principle applies: unknown senders are quarantined until they confirm they are human. The implementation is entirely new, built for the world of OAuth, cloud APIs, and label-driven user interfaces.

Current Development — SpamJammer Gmail Edition

The Original Idea, Rebuilt for Gmail

SpamJammer connects to a Gmail account via Google OAuth. No email address change required. All mail stays within Gmail, managed through Gmail’s own label infrastructure. SpamJammer does not store, copy, or move mail outside Google’s infrastructure.

Messages from unknown senders are quietly moved to a quarantine label, removing them from the inbox without deleting them. A confirmation email goes to the sender. One click from a real person releases their message. Automated systems never respond — and never reach the inbox.

  • Sender verification via URL confirmation — the original SpamJammer mechanism
  • Quarantine lives inside Gmail under a dedicated label (SJ/Quarantine)
  • Users signal intent by dragging messages to action labels (SJ/to_block, SJ/to_allow)
  • Four sender states: pending, confirmed, allowed, blocked
  • Subject and body pattern rules for granular control
  • Built on Bun + Hono API + React 19 + PostgreSQL
  • Gmail as the source of truth — no parallel quarantine database to keep in sync