A Three-pronged Approach to Eliminating Phishing Emails, part 1