I read this and had to post it. It's an amazing explanation of image-based spam methods and how they work -- complete with image examples of how the techniques are confusing filtration systems.
http://csoonline.com/read/040107/fea_spam_by_the_numbers.html