fbpx
Wikipedia

Spamming

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps,[1] television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.[2]

An email inbox containing a large amount of spam messages

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have added extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions.[3]

A person who creates spam is called a spammer.[4]

Etymology

 
Menu from Monty Python’s "Spam" sketch, from where the term is derived. Spam is included in almost every dish to the consternation of a customer.

The term spam is derived from the 1970 "Spam" sketch of the BBC sketch comedy television series Monty Python's Flying Circus.[5][6] The sketch, set in a cafe, has a waitress reading out a menu where every item but one includes the Spam canned luncheon meat. As the waitress recites the Spam-filled menu, a chorus of Viking patrons drown out all conversations with a song, repeating "Spam, Spam, Spam, Spam… Lovely Spam! Wonderful Spam!".[7]

In the 1980s the term was adopted to describe certain abusive users who frequented BBSs and MUDs, who would repeat "Spam" a huge number of times to scroll other users' text off the screen.[8] In early chat-room services like PeopleLink and the early days of Online America (later known as America Online or AOL), they actually flooded the screen with quotes from the Monty Python sketch.[citation needed] This was used as a tactic by insiders of a group that wanted to drive newcomers out of the room so the usual conversation could continue. It was also used to prevent members of rival groups from chatting—for instance, Star Wars fans often invaded Star Trek chat rooms, filling the space with blocks of text until the Star Trek fans left.[9]

It later came to be used on Usenet to mean excessive multiple posting—the repeated posting of the same message. The unwanted message would appear in many, if not all newsgroups, just as Spam appeared in all the menu items in the Monty Python sketch. One of the earliest people to use "spam" in this sense was Joel Furr.[10][11] This use had also become established—to "spam" Usenet was to flood newsgroups with junk messages. The word was also attributed to the flood of "Make Money Fast" messages that clogged many newsgroups during the 1990s.[citation needed] In 1998, the New Oxford Dictionary of English, which had previously only defined "spam" in relation to the trademarked food product, added a second definition to its entry for "spam": "Irrelevant or inappropriate messages sent on the Internet to a large number of newsgroups or users."

There was also an effort to differentiate between types of newsgroup spam. Messages that were crossposted to too many newsgroups at once, as opposed to those that were posted too frequently, were called "velveeta" (after a cheese product), but this term did not persist.[12]

History

Pre-Internet

In the late 19th century, Western Union allowed telegraphic messages on its network to be sent to multiple destinations. The first recorded instance of a mass unsolicited commercial telegram is from May 1864, when some British politicians received an unsolicited telegram advertising a dentist.[13]

History

The earliest documented spam (although the term had not yet been coined[14]) was a message advertising the availability of a new model of Digital Equipment Corporation computers sent by Gary Thuerk to 393 recipients on ARPANET on May 3, 1978.[10] Rather than send a separate message to each person, which was the standard practice at the time, he had an assistant, Carl Gartley, write a single mass email. Reaction from the net community was fiercely negative, but the spam did generate some sales.[15][16]

Spamming had been practiced as a prank by participants in multi-user dungeon games, to fill their rivals' accounts with unwanted electronic junk.[16]

The first major commercial spam incident started on March 5, 1994, when a husband and wife team of lawyers, Laurence Canter and Martha Siegel, began using bulk Usenet posting to advertise immigration law services. The incident was commonly termed the "Green Card spam", after the subject line of the postings. Defiant in the face of widespread condemnation, the attorneys claimed their detractors were hypocrites or "zealouts", claimed they had a free speech right to send unwanted commercial messages, and labeled their opponents "anti-commerce radicals". The couple wrote a controversial book entitled How to Make a Fortune on the Information Superhighway.[16]

An early example of nonprofit fundraising bulk posting via Usenet also occurred in 1994 on behalf of CitiHope, an NGO attempting to raise funds to rescue children at risk during the Bosnian War. However, as it was a violation of their terms of service, the ISP Panix deleted all of the bulk posts from Usenet, only missing three copies[citation needed].

Within a few years, the focus of spamming (and anti-spam efforts) moved chiefly to email, where it remains today.[8] By 1999, Khan C. Smith, a well known hacker at the time, had begun to commercialize the bulk email industry and rallied thousands into the business by building more friendly bulk email software and providing internet access illegally hacked from major ISPs such as Earthlink and Botnets.[17]

By 2009 the majority of spam sent around the World was in the English language; spammers began using automatic translation services to send spam in other languages.[18]

In different media

Email

Email spam, also known as unsolicited bulk email (UBE), or junk mail, is the practice of sending unwanted email messages, frequently with commercial content, in large quantities.[19] Spam in email started to become a problem when the Internet was opened for commercial use in the mid-1990s. It grew exponentially over the following years, and by 2007 it constituted about 80% to 85% of all e-mail, by a conservative estimate.[20] Pressure to make email spam illegal has resulted in legislation in some jurisdictions, but less so in others. The efforts taken by governing bodies, security systems and email service providers seem to be helping to reduce the volume of email spam. According to "2014 Internet Security Threat Report, Volume 19" published by Symantec Corporation, spam volume dropped to 66% of all email traffic.[21]

An industry of email address harvesting is dedicated to collecting email addresses and selling compiled databases.[22] Some of these address-harvesting approaches rely on users not reading the fine print of agreements, resulting in their agreeing to send messages indiscriminately to their contacts. This is a common approach in social networking spam such as that generated by the social networking site Quechup.[23]

Instant messaging

Instant messaging spam makes use of instant messaging systems. Although less prevalent than its e-mail counterpart, according to a report from Ferris Research, 500 million spam IMs were sent in 2003, twice the level of 2002.[24]

Newsgroup and forum

Newsgroup spam is a type of spam where the targets are Usenet newsgroups. Spamming of Usenet newsgroups actually pre-dates e-mail spam. Usenet convention defines spamming as excessive multiple posting, that is, the repeated posting of a message (or substantially similar messages). The prevalence of Usenet spam led to the development of the Breidbart Index as an objective measure of a message's "spamminess".

Forum spam is the creation of advertising messages on Internet forums. It is generally done by automated spambots. Most forum spam consists of links to external sites, with the dual goals of increasing search engine visibility in highly competitive areas such as weight loss, pharmaceuticals, gambling, pornography, real estate or loans, and generating more traffic for these commercial websites. Some of these links contain code to track the spambot's identity; if a sale goes through, the spammer behind the spambot earns a commission.

Mobile phone

Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers not only for the inconvenience, but also because of the fee they may be charged per text message received in some markets. To comply with CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end communication with the advertiser via SMS altogether.

Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending SMS. Recently, there are also observations of mobile phone spam delivered via browser push notifications. These can be a result of allowing websites which are malicious or delivering malicious ads to send a user notifications.[25]

Social networking spam

Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send false links under the guise of a user's trusted contacts such as friends and family.[26] As for Twitter, spammers gain credibility by following verified accounts such as that of Lady Gaga; when that account owner follows the spammer back, it legitimizes the spammer.[27] Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are broadcast to all followers of the user.[28] Spammers, out of malicious intent, post either unwanted (or irrelevant) information or spread misinformation on social media platforms.[29]

Social spam

Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites.[30]

Blog, wiki, and guestbook

Blog spam is spamming on weblogs. In 2003, this type of spam took advantage of the open nature of comments in the blogging software Movable Type by repeatedly placing comments to various blog posts that provided nothing more than a link to the spammer's commercial web site.[31] Similar attacks are often performed against wikis and guestbooks, both of which accept user contributions. Another possible form of spam in blogs is the spamming of a certain tag on websites such as Tumblr.

Spam targeting video sharing sites

 
Screenshot from a spam video on YouTube claiming that the film in question has been deleted from the site, and can only be accessed on the link posted by the spambot in the video description. If the video were actually removed by YouTube, the description would be inaccessible and the deletion notification would look different.

In actual video spam, the uploaded video is given a name and description with a popular figure or event that is likely to draw attention, or within the video a certain image is timed to come up as the video's thumbnail image to mislead the viewer, such as a still image from a feature film, purporting to be a part-by-part piece of a movie being pirated, e.g. Big Buck Bunny Full Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO file for a video game, or something similar. The actual content of the video ends up being totally unrelated, a Rickroll, offensive, or simply on-screen text of a link to the site being promoted.[32] In some cases, the link in question may lead to an online survey site, a password-protected archive file with instructions leading to the aforementioned survey (though the survey, and the archive file itself, is worthless and doesn't contain the file in question at all), or in extreme cases, malware.[33] Others may upload videos presented in an infomercial-like format selling their product which feature actors and paid testimonials, though the promoted product or service is of dubious quality and would likely not pass the scrutiny of a standards and practices department at a television station or cable network.

VoIP Spam

VoIP spam is VoIP (Voice over Internet Protocol) spam, usually using SIP (Session Initiation Protocol). This is nearly identical to telemarketing calls over traditional phone lines. When the user chooses to receive the spam call, a pre-recorded spam message or advertisement is usually played back. This is generally easier for the spammer as VoIP services are cheap and easy to anonymize over the Internet, and there are many options for sending mass number of calls from a single location. Accounts or IP addresses being used for VoIP spam can usually be identified by a large number of outgoing calls, low call completion and short call length.

Academic search

Academic search engines enable researchers to find academic literature and are used to obtain citation data for calculating author-level metrics. Researchers from the University of California, Berkeley and OvGU demonstrated that most (web-based) academic search engines, especially Google Scholar are not capable of identifying spam attacks.[34] The researchers manipulated the citation counts of articles, and managed to make Google Scholar index complete fake articles, some containing advertising.[34]

Mobile apps

Spamming in mobile app stores include (i) apps that were automatically generated and as a result do not have any specific functionality or a meaningful description; (ii) multiple instances of the same app being published to obtain increased visibility in the app market; and (iii) apps that make excessive use of unrelated keywords to attract users through unintended searches.[35]

Noncommercial forms

E-mail and other forms of spamming have been used for purposes other than advertisements. Many early Usenet spams were religious or political. Serdar Argic, for instance, spammed Usenet with historical revisionist screeds. A number of evangelists have spammed Usenet and e-mail media with preaching messages. A growing number of criminals are also using spam to perpetrate various sorts of fraud.[36]

Geographical origins

In 2011 the origins of spam were analyzed by Cisco Systems. They provided a report that shows spam volume originating from countries worldwide.[37]

Rank Country Spam
volume(%)
1   India 13.7
2   Russia 9.0
3   Vietnam 7.9
4
(tie)
  South Korea 6.0
  Indonesia 6.0
6   China 4.7
7   Brazil 4.5
8   United States 3.2

Trademark issues

Hormel Foods Corporation, the maker of SPAM luncheon meat, does not object to the Internet use of the term "spamming". However, they did ask that the capitalized word "Spam" be reserved to refer to their product and trademark.[38]

Cost–benefit analyses

The European Union's Internal Market Commission estimated in 2001 that "junk email" cost Internet users €10 billion per year worldwide.[39] The California legislature found that spam cost United States organizations alone more than $13 billion in 2007, including lost productivity and the additional equipment, software, and manpower needed to combat the problem.[40] Spam's direct effects include the consumption of computer and network resources, and the cost in human time and attention of dismissing unwanted messages.[41] Large companies who are frequent spam targets utilize numerous techniques to detect and prevent spam.[42]

The cost to providers of search engines is significant: "The secondary consequence of spamming is that search engine indexes are inundated with useless pages, increasing the cost of each processed query".[4] The costs of spam also include the collateral costs of the struggle between spammers and the administrators and users of the media threatened by spamming.[43]

Email spam exemplifies a tragedy of the commons: spammers use resources (both physical and human), without bearing the entire cost of those resources. In fact, spammers commonly do not bear the cost at all. This raises the costs for everyone.[44] In some ways spam is even a potential threat to the entire email system, as operated in the past. Since email is so cheap to send, a tiny number of spammers can saturate the Internet with junk mail. Although only a tiny percentage of their targets are motivated to purchase their products (or fall victim to their scams), the low cost may provide a sufficient conversion rate to keep the spamming alive. Furthermore, even though spam appears not to be economically viable as a way for a reputable company to do business, it suffices for professional spammers to convince a tiny proportion of gullible advertisers that it is viable for those spammers to stay in business. Finally, new spammers go into business every day, and the low costs allow a single spammer to do a lot of harm before finally realizing that the business is not profitable.[citation needed]

Some companies and groups "rank" spammers; spammers who make the news are sometimes referred to by these rankings.[45][46]

General costs

In all cases listed above, including both commercial and non-commercial, "spam happens" because of a positive cost-benefit analysis result; if the cost to recipients is excluded as an externality the spammer can avoid paying.[citation needed]

Cost is the combination of

  • Overhead: The costs and overhead of electronic spamming include bandwidth, developing or acquiring an email/wiki/blog spam tool, taking over or acquiring a host/zombie, etc.
  • Transaction cost: The incremental cost of contacting each additional recipient once a method of spamming is constructed, multiplied by the number of recipients (see CAPTCHA as a method of increasing transaction costs).
  • Risks: Chance and severity of legal and/or public reactions, including damages and punitive damages.
  • Damage: Impact on the community and/or communication channels being spammed (see Newsgroup spam).

Benefit is the total expected profit from spam, which may include any combination of the commercial and non-commercial reasons listed above. It is normally linear, based on the incremental benefit of reaching each additional spam recipient, combined with the conversion rate. The conversion rate for botnet-generated spam has recently been measured to be around one in 12,000,000 for pharmaceutical spam and one in 200,000 for infection sites as used by the Storm botnet.[47] The authors of the study calculating those conversion rates noted, "After 26 days, and almost 350 million e-mail messages, only 28 sales resulted."

In crime

Spam can be used to spread computer viruses, trojan horses or other malicious software. The objective may be identity theft, or worse (e.g., advance fee fraud). Some spam attempts to capitalize on human greed, while some attempts to take advantage of the victims' inexperience with computer technology to trick them (e.g., phishing).

One of the world's most prolific spammers, Robert Alan Soloway, was arrested by US authorities on May 31, 2007.[48] Described as one of the top ten spammers in the world, Soloway was charged with 35 criminal counts, including mail fraud, wire fraud, e-mail fraud, aggravated identity theft, and money laundering.[48] Prosecutors allege that Soloway used millions of "zombie" computers to distribute spam during 2003.[49] This is the first case in which US prosecutors used identity theft laws to prosecute a spammer for taking over someone else's Internet domain name.[50]

In an attempt to assess potential legal and technical strategies for stopping illegal spam, a study cataloged three months of online spam data and researched website naming and hosting infrastructures. The study concluded that: 1) half of all spam programs have their domains and servers distributed over just eight percent or fewer of the total available hosting registrars and autonomous systems, with 80 percent of spam programs overall being distributed over just 20 percent of all registrars and autonomous systems; 2) of the 76 purchases for which the researchers received transaction information, there were only 13 distinct banks acting as credit card acquirers and only three banks provided the payment servicing for 95 percent of the spam-advertised goods in the study; and, 3) a "financial blacklist" of banking entities that do business with spammers would dramatically reduce monetization of unwanted e-mails. Moreover, this blacklist could be updated far more rapidly than spammers could acquire new banking resources, an asymmetry favoring anti-spam efforts.[51]

Political issues

An ongoing concern expressed by parties such as the Electronic Frontier Foundation and the American Civil Liberties Union has to do with so-called "stealth blocking", a term for ISPs employing aggressive spam blocking without their users' knowledge. These groups' concern is that ISPs or technicians seeking to reduce spam-related costs may select tools that (either through error or design) also block non-spam e-mail from sites seen as "spam-friendly". Few object to the existence of these tools; it is their use in filtering the mail of users who are not informed of their use that draws fire.[52]

Even though it is possible in some jurisdictions to treat some spam as unlawful merely by applying existing laws against trespass and conversion, some laws specifically targeting spam have been proposed. In 2004, United States passed the CAN-SPAM Act of 2003 that provided ISPs with tools to combat spam. This act allowed Yahoo! to successfully sue Eric Head who settled the lawsuit for several thousand U.S. dollars in June 2004. But the law is criticized by many for not being effective enough. Indeed, the law was supported by some spammers and organizations that support spamming, and opposed by many in the anti-spam community.[citation needed]

Court cases

United States

Earthlink won a $25 million judgment against one of the most notorious and active "spammers" Khan C. Smith in 2001 for his role in founding the modern spam industry which dealt billions in economic damage and established thousands of spammers into the industry.[53] His email efforts were said to make up more than a third of all Internet email being sent from 1999 until 2002.

Sanford Wallace and Cyber Promotions were the target of a string of lawsuits, many of which were settled out of court, up through a 1998 Earthlink settlement[54] that put Cyber Promotions out of business. Attorney Laurence Canter was disbarred by the Tennessee Supreme Court in 1997 for sending prodigious amounts of spam advertising his immigration law practice. In 2005, Jason Smathers, a former America Online employee, pleaded guilty to charges of violating the CAN-SPAM Act. In 2003, he sold a list of approximately 93 million AOL subscriber e-mail addresses to Sean Dunaway who sold the list to spammers.[55][56]

In 2007, Robert Soloway lost a case in a federal court against the operator of a small Oklahoma-based Internet service provider who accused him of spamming. U.S. Judge Ralph G. Thompson granted a motion by plaintiff Robert Braver for a default judgment and permanent injunction against him. The judgment includes a statutory damages award of about $10 million under Oklahoma law.[57]

In June 2007, two men were convicted of eight counts stemming from sending millions of e-mail spam messages that included hardcore pornographic images. Jeffrey A. Kilbride, 41, of Venice, California was sentenced to six years in prison, and James R. Schaffer, 41, of Paradise Valley, Arizona, was sentenced to 63 months. In addition, the two were fined $100,000, ordered to pay $77,500 in restitution to AOL, and ordered to forfeit more than $1.1 million, the amount of illegal proceeds from their spamming operation.[58] The charges included conspiracy, fraud, money laundering, and transportation of obscene materials. The trial, which began on June 5, was the first to include charges under the CAN-SPAM Act of 2003, according to a release from the Department of Justice. The specific law that prosecutors used under the CAN-Spam Act was designed to crack down on the transmission of pornography in spam.[59]

In 2005, Scott J. Filary and Donald E. Townsend of Tampa, Florida were sued by Florida Attorney General Charlie Crist for violating the Florida Electronic Mail Communications Act.[60] The two spammers were required to pay $50,000 USD to cover the costs of investigation by the state of Florida, and a $1.1 million penalty if spamming were to continue, the $50,000 was not paid, or the financial statements provided were found to be inaccurate. The spamming operation was successfully shut down.[61]

Edna Fiedler, 44, of Olympia, Washington, on June 25, 2008, pleaded guilty in a Tacoma court and was sentenced to 2 years imprisonment and 5 years of supervised release or probation in an Internet $1 million "Nigerian check scam." She conspired to commit bank, wire and mail fraud, against US citizens, specifically using Internet by having had an accomplice who shipped counterfeit checks and money orders to her from Lagos, Nigeria, the previous November. Fiedler shipped out $609,000 fake check and money orders when arrested and prepared to send additional $1.1 million counterfeit materials. Also, the U.S. Postal Service recently intercepted counterfeit checks, lottery tickets and eBay overpayment schemes with a value of $2.1 billion.[62][63]

In a 2009 opinion, Gordon v. Virtumundo, Inc., 575 F.3d 1040, the Ninth Circuit assessed the standing requirements necessary for a private plaintiff to bring a civil cause of action against spam senders under the CAN-SPAM Act of 2003, as well as the scope of the CAN-SPAM Act's federal preemption clause.[64]

United Kingdom

In the first successful case of its kind, Nigel Roberts from the Channel Islands won £270 against Media Logistics UK who sent junk e-mails to his personal account.[65]

In January 2007, a Sheriff Court in Scotland awarded Mr. Gordon Dick £750 (the then maximum sum that could be awarded in a Small Claim action) plus expenses of £618.66, a total of £1368.66 against Transcom Internet Services Ltd.[66] for breaching anti-spam laws.[67] Transcom had been legally represented at earlier hearings, but were not represented at the proof, so Gordon Dick got his decree by default. It is the largest amount awarded in compensation in the United Kingdom since Roberts v Media Logistics case in 2005.

Despite the statutory tort that is created by the Regulations implementing the EC Directive, few other people have followed their example. As the Courts engage in active case management, such cases would probably now be expected to be settled by mediation and payment of nominal damages.

New Zealand

In October 2008, an international internet spam operation run from New Zealand was cited by American authorities as one of the world's largest, and for a time responsible for up to a third of all unwanted e-mails. In a statement the US Federal Trade Commission (FTC) named Christchurch's Lance Atkinson as one of the principals of the operation. New Zealand's Internal Affairs announced it had lodged a $200,000 claim in the High Court against Atkinson and his brother Shane Atkinson and courier Roland Smits, after raids in Christchurch. This marked the first prosecution since the Unsolicited Electronic Messages Act (UEMA) was passed in September 2007. The FTC said it had received more than three million complaints about spam messages connected to this operation, and estimated that it may be responsible for sending billions of illegal spam messages. The US District Court froze the defendants’ assets to preserve them for consumer redress pending trial.[68] U.S. co-defendant Jody Smith forfeited more than $800,000 and faces up to five years in prison for charges to which he pleaded guilty.[69]

Bulgaria

While most countries either outlaw or at least ignore spam, Bulgaria is the first and until now[when?] only one to legalize it.[70] According to the Bulgarian E-Commerce act[71] (Чл.5,6) anyone can send spam to mailboxes published as owned by a company or organization as long as there is a "clear and straight indication that the message is unsolicited commercial e-mail" ("да осигури ясното и недвусмислено разпознаване на търговското съобщение като непоискано") in the message body.

This made lawsuits against Bulgarian ISP's and public e-mail providers with antispam policy possible, as they are obstructing legal commerce activity and thus violate Bulgarian antitrust acts. While there are no such lawsuits until now, several cases of spam obstruction are currently awaiting decision in the Bulgarian Antitrust Commission (Комисия за защита на конкуренцията) and can end with serious fines for the ISPs in question.[when?][72]

The law contains other dubious provisions — for example, the creation of a nationwide public electronic register of e-mail addresses that do not want to receive spam.[73] It is usually abused as the perfect source for e-mail address harvesting, because publishing invalid or incorrect information in such a register is a criminal offense in Bulgaria.

Newsgroups

See also

History

References

Citations

  1. ^ "Developer Policy Center – Intellectual Property, Deception, and Spam". play.google.com. Retrieved 2016-05-01.
  2. ^ "Spam". Merriam-Webster Dictionary (definition & more). 2012-08-31. Retrieved 2013-07-05.
  3. ^ "The Definition of Spam". The Spamhaus Project. Retrieved 2013-09-03.
  4. ^ a b Gyöngyi, Zoltan; Garcia-Molina, Hector (2005). "Web spam taxonomy" (PDF). Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2005 in The 14th International World Wide Web Conference (WWW 2005) May 10, (Tue) – 14 (Sat), 2005, Nippon Convention Center (Makuhari Messe), Chiba, Japan. New York, NY: ACM Press. ISBN 978-1-59593-046-0.
  5. ^ Monty Python (2009-01-13), , archived from the original on 2010-05-22, retrieved 2017-01-11
  6. ^ Hambridge, S.; Lunde, A. (1999). "RFC 2635 - DON\x27T SPEW A Set of Guidelines for Mass Unsolicited Mailings and Postings (spam*)". doi:10.17487/RFC2635. Retrieved 2010-09-29. {{cite journal}}: Cite journal requires |journal= (help)
  7. ^ "The Origin of the word 'Spam'". Retrieved 2010-09-20.
  8. ^ a b "Origin of the term "spam" to mean net abuse". Templetons.com. Retrieved 2013-09-03.
  9. ^ Goldberg, Myshele. "The Origins of Spam". Retrieved 2014-07-15.
  10. ^ a b Thuerk, Gary; Furr, Joel, "At 30, Spam Going Nowhere Soon", NPR.org (interviews), NPR.
  11. ^ Darren Waters (31 March 2008). "Spam blights e-mail 15 years on". news.bbc.co.uk. Retrieved 26 August 2010.
  12. ^ "velveeta", The Jargon File (4.4.7 ed.), CatB.
  13. ^ "Getting the message, at last". The Economist. 2007-12-14.
  14. ^ Zeller, Tom (1 June 2003). "Ideas & Trends; Spamology". The New York Times.
  15. ^ "Reaction to the DEC Spam of 1978". Templetons. Retrieved 2013-09-03.
  16. ^ a b c Abate, Tom (May 3, 2008). "A very unhappy birthday to spam, age 30". San Francisco Chronicle.
  17. ^ Conway, Andrew. "Twenty Years of Spam". Cloudmark. Retrieved April 11, 2014.
  18. ^ Danchev, Dancho. "Spammers go multilingual, use automatic translation services." ZDNet. July 28, 2009. Retrieved on August 31, 2009.
  19. ^ Ahmad, Adnan; Azhar, Anique; Naqvi, Sajid; Nawaz, Asif; Arshad, Samia; Zeshan, Furkh; Yousif, Mohammed; Salih, Ali O. M. (2020-03-04). Farouk, Ahmed (ed.). "A methodology for sender-oriented anti-spamming". Journal of Intelligent & Fuzzy Systems. 38 (3): 2765–2776. doi:10.3233/JIFS-179562. S2CID 213636917.
  20. ^ (PDF). MAAWG. Archived from the original (PDF) on 2007-12-03.
  21. ^ "2014 Internet Security Threat Report, Volume 19" (PDF). Symantec Corporation. Retrieved 7 May 2014.
  22. ^ "FileOn List Builder-Extract URL, MetaTags, Email, Phone, Fax from www-Optimized Webcrawler". List DNA. Retrieved 2013-09-03.
  23. ^ Hansell, Saul (September 13, 2007), "Social network launches worldwide spam campaign", The New York Times.
  24. ^ Thomas Claburn (30 March 2004). "Spim, Like Spam, Is On The Rise". Retrieved 17 December 2018.
  25. ^ "Is this website allowed to send you notifications? NO! - caution is advised". lotsofways.de. 2018-10-18. Retrieved 2018-10-29.
  26. ^ "Marketers need to build trust as spam hits social networks", Grace Bello, Direct Marketing News, June 1, 2012
  27. ^ Understanding and Combating Link Farming in the Twitter Social Network, Max Planck Centre for Computer Science
  28. ^ "On the Precision of Social and Information Networks" (PDF).
  29. ^ Gupta, Arushi; Kaushal, Rishabh (2015). "Improving spam detection in Online Social Networks". 2015 International Conference on Cognitive Computing and Information Processing(CCIP). www.ieee.org. IEEE. pp. 1–6. doi:10.1109/CCIP.2015.7100738. ISBN 978-1-4799-7171-8. S2CID 18207001.
  30. ^ Dan Tynan (3 April 2012). "Social spam is taking over the Internet". ITworld.
  31. ^ The (Evil) Genius of Comment Spammers - Wired Magazine, March 2004
  32. ^ Fabrício Benevenuto, Tiago Rodrigues, Virgílio Almeida, Jussara Almeida and Marcos Gonçalves (July 2009). "Detecting Spammers and Content Promoters in Online Video Social Networks". ACM SIGIR Conference (PDF).{{cite conference}}: CS1 maint: multiple names: authors list (link)
  33. ^ . Web User magazine. Archived from the original on 11 May 2012. Retrieved 23 January 2012.
  34. ^ a b Joeran Beel and Bela Gipp. Academic search engine spam and google scholar’s resilience against it. Journal of Electronic Publishing, 13(3), December 2010. PDF
  35. ^ Seneviratne, Suranga (Apr 2017). "Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis". ACM Transactions on the Web. 11 (1). doi:10.1145/3007901. S2CID 1944093.
  36. ^ See: Advance fee fraud
  37. ^ Cisco 2011 Annual Security Report (PDF)
  38. ^ "Hormel Foods Corp. v. Jim Henson Prods". Harvard University. 73 F.3d 497 (2d Cir. 1996). Retrieved 2015-02-12.
  39. ^ "Data protection: "Junk" email costs internet users 10 billion a year worldwide – Commission study". Europa. Retrieved 2013-09-03.
  40. ^ "California business and professions code". Spamlaws. Retrieved 2013-09-03.
  41. ^ "Spam Cost Calculator: Calculate enterprise spam cost?". Commtouch. Retrieved 2013-09-03.
  42. ^ Ghosemajumder, Shuman (18 March 2008). "Using data to help prevent fraud". Google Blog. Retrieved 12 August 2011.
  43. ^ - William R. James 2003-03-10
  44. ^ Rao, Justin M.; Reiley, David H. (2012), "Economics of Spam", Journal of Economic Perspectives, 26 (3): 87–110, doi:10.1257/jep.26.3.87
  45. ^ Spamhaus' "TOP 10 spam service ISPs"
  46. ^ "The 10 Worst ROKSO Spammers". Spamhaus. Retrieved 2013-09-03.
  47. ^ Kanich, C.; C. Kreibich; K. Levchenko; B. Enright; G. Voelker; V. Paxson; S. Savage (2008-10-28). "Spamalytics: An Empirical Analysis of Spam Marketing Conversion" (PDF). Proceedings of Conference on Computer and Communications Security (CCS). Alexandria, VA, USA. Retrieved 2008-11-05.
  48. ^ a b Lombardi, Candace. "Alleged 'Seattle Spammer' arrested - CNET". News.com. Retrieved 2013-09-03.
  49. ^ Thomas Claburn.. InformationWeek. Mar 17, 2008. Archived from the original on 2015-02-09.
  50. ^ SPAMfighter News (6 November 2007). "Spam Kingpin Robert Soloway Arrested". Retrieved 17 December 2018.
  51. ^ Levchenko, Kirill; et al. (2011). "Click Trajectories: End-to-End Analysis of the Spam Value Chain" (PDF). 2011 IEEE Symposium on Security and Privacy. pp. 431–446. CiteSeerX 10.1.1.706.1497. doi:10.1109/SP.2011.24. ISBN 978-0-7695-4402-1. S2CID 16146219. {{cite book}}: Missing or empty |title= (help)
  52. ^ "RBL criticism". www.anti-abuse.org. 11 February 2008. Retrieved 31 March 2020.
  53. ^ Credeur, Mary. "Staff Writer". BizJournals.com. BizJournals.com. Retrieved July 22, 2002.
  54. ^ "On the dark side of the planet temperatures average 110amp160K". www.brechtweigelhaus.de.
  55. ^ U.S. v Jason Smathers and Sean Dunaway, amended complaint, US District Court for the Southern District of New York (2003). Retrieved 7 March 2007, from "Pair Nabbed In AOL Spam Scheme". thesmokinggun.com. 2010-07-14.
  56. ^ Ex-AOL employee pleads guilty in spam case. (2005, February 4). CNN. Retrieved 7 March 2007, from "Ex-AOL employee pleads guilty in spam case". CNN.com. February 5, 2005. Retrieved 27 August 2010.
  57. ^ Braver v. Newport Internet Marketing Corporation et al. -U.S. District Court - Western District of Oklahoma (Oklahoma City), 2005-02-22
  58. ^ "Two Men Sentenced for Running International Pornographic Spamming Business". United States Department of Justice. October 12, 2007. Retrieved 2007-10-25.
  59. ^ Gaudin, Sharon, Two Men Convicted Of Spamming Pornography InformationWeek, June 26, 2007
  60. ^ . Office of the Florida Attorney General. Archived from the original on 15 January 2009. Retrieved 21 December 2014.
  61. ^ . Office of the Florida Attorney General. Archived from the original on 15 January 2009. Retrieved 21 December 2014.
  62. ^ "Woman gets prison for 'Nigerian' scam". upi.com.
  63. ^ "Woman Gets Two Years for Aiding Nigerian Internet Check Scam (PC World)". PC World. 2008-06-25. Retrieved 2014-01-30.
  64. ^ Gordon v. Virtumundo, Inc., 575 F.3d 1040 (9th Cir. 2009).
  65. ^ "Businessman wins e-mail spam case". BBC News. 27 December 2005. Retrieved 13 November 2011.
  66. ^ "Gordon Dick v Transcom Internet Service Ltd". Scotchspam.co.uk. Retrieved 2013-09-03.
  67. ^ "Article 13-Unsolicited communications". Eur-lex.europa.eu. Retrieved 2013-09-03.
  68. ^ "Kiwi spam network was 'World's biggest'". Stuff.co.nz. 16 October 2008. Retrieved 13 November 2011.
  69. ^ "Court Orders Australia-based Leader of International Spam Network to Pay $15.15 Million". Ftc.gov. 2011-06-24. Retrieved 2013-09-03.
  70. ^ "Spams". prezi.com. Retrieved 2021-02-18.
  71. ^ "Закон За Електронната Търговия". Lex.bg. 2011-08-14. Retrieved 2013-09-03.
  72. ^ Griffin, Ry'mone (2018). Internet Governance. London: ETP. ISBN 978-1-78882-354-8. OCLC 1045588608.
  73. ^ "Регистър на юридическите лица, които не желаят да получават непоискани търговски съобщения". Kzp.bg. Retrieved 2013-09-03.

Sources

  • Specter, Michael (2007-08-06). "Damn Spam". The New Yorker. Retrieved 2007-08-02.

Further reading

  • Brunton, Finn. Spam: A Shadow History of the Internet (MIT Press; 2013) 304 pages; $27.95). A cultural and technological history
  • Sjouwerman, Stu; Posluns, Jeffrey, "Inside the spam cartel: trade secrets from the dark side", Elsevier/Syngress; 1st edition, November 27, 2004. ISBN 978-1-932266-86-3
  • Brown, Bruce Cameron "How to stop e-mail spam, spyware, malware, computer viruses, and hackers from ruining your computer" Atlantic Publishing Group, 2011. ISBN 978-1-601383-03-7
  • Dunne, Robert "Computers and the law: an introduction to basic legal principles and their application in cyberspace" Cambridge University Press, 2009. ISBN 978-0-521886-50-5
  • The Spam Archive | Spamdex "Spam Archive list of spam from traceable sources", 2014-15 (including 2008-2013) over 35,000 spam emails listed

External links

  • 1 December 2009: arrest of a major spammer
  • Cybertelecom:: Federal spam law and policy
  • Federal Trade Commission page with spam reduction tips and reporting
  • BitDefender's weekly report on spam trends and techniques.
  • Reaction to the DEC Spam of 1978 Overview and text of the first known internet e-mail spam.
  • Slamming Spamming Resource on Spam
  • Spamtrackers SpamWiki: a peer-reviewed spam information and analysis resource.

spamming, this, article, about, unsolicited, undesirable, electronic, messages, information, specific, email, email, spam, other, uses, spam, disambiguation, messaging, systems, send, multiple, unsolicited, messages, spam, large, numbers, recipients, purpose, . This article is about unsolicited or undesirable electronic messages For information specific to email see Email spam For other uses see Spam disambiguation Spamming is the use of messaging systems to send multiple unsolicited messages spam to large numbers of recipients for the purpose of commercial advertising for the purpose of non commercial proselytizing for any prohibited purpose especially the fraudulent purpose of phishing or simply repeatedly sending the same message to the same user While the most widely recognized form of spam is email spam the term is applied to similar abuses in other media instant messaging spam Usenet newsgroup spam Web search engine spam spam in blogs wiki spam online classified ads spam mobile phone messaging spam Internet forum spam junk fax transmissions social spam spam mobile apps 1 television advertising and file sharing spam It is named after Spam a luncheon meat by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing Spam repeatedly 2 An email inbox containing a large amount of spam messages Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists servers infrastructures IP ranges and domain names and it is difficult to hold senders accountable for their mass mailings The costs such as lost productivity and fraud are borne by the public and by Internet service providers which have added extra capacity to cope with the volume Spamming has been the subject of legislation in many jurisdictions 3 A person who creates spam is called a spammer 4 Contents 1 Etymology 2 History 2 1 Pre Internet 2 2 History 3 In different media 3 1 Email 3 2 Instant messaging 3 3 Newsgroup and forum 3 4 Mobile phone 3 5 Social networking spam 3 6 Social spam 3 7 Blog wiki and guestbook 3 8 Spam targeting video sharing sites 3 9 VoIP Spam 3 10 Academic search 3 11 Mobile apps 4 Noncommercial forms 5 Geographical origins 6 Trademark issues 7 Cost benefit analyses 7 1 General costs 8 In crime 9 Political issues 10 Court cases 10 1 United States 10 2 United Kingdom 10 3 New Zealand 10 4 Bulgaria 11 Newsgroups 12 See also 13 References 13 1 Citations 13 2 Sources 14 Further reading 15 External linksEtymology Edit Menu from Monty Python s Spam sketch from where the term is derived Spam is included in almost every dish to the consternation of a customer The term spam is derived from the 1970 Spam sketch of the BBC sketch comedy television series Monty Python s Flying Circus 5 6 The sketch set in a cafe has a waitress reading out a menu where every item but one includes the Spam canned luncheon meat As the waitress recites the Spam filled menu a chorus of Viking patrons drown out all conversations with a song repeating Spam Spam Spam Spam Lovely Spam Wonderful Spam 7 In the 1980s the term was adopted to describe certain abusive users who frequented BBSs and MUDs who would repeat Spam a huge number of times to scroll other users text off the screen 8 In early chat room services like PeopleLink and the early days of Online America later known as America Online or AOL they actually flooded the screen with quotes from the Monty Python sketch citation needed This was used as a tactic by insiders of a group that wanted to drive newcomers out of the room so the usual conversation could continue It was also used to prevent members of rival groups from chatting for instance Star Wars fans often invaded Star Trek chat rooms filling the space with blocks of text until the Star Trek fans left 9 It later came to be used on Usenet to mean excessive multiple posting the repeated posting of the same message The unwanted message would appear in many if not all newsgroups just as Spam appeared in all the menu items in the Monty Python sketch One of the earliest people to use spam in this sense was Joel Furr 10 11 This use had also become established to spam Usenet was to flood newsgroups with junk messages The word was also attributed to the flood of Make Money Fast messages that clogged many newsgroups during the 1990s citation needed In 1998 the New Oxford Dictionary of English which had previously only defined spam in relation to the trademarked food product added a second definition to its entry for spam Irrelevant or inappropriate messages sent on the Internet to a large number of newsgroups or users There was also an effort to differentiate between types of newsgroup spam Messages that were crossposted to too many newsgroups at once as opposed to those that were posted too frequently were called velveeta after a cheese product but this term did not persist 12 History EditPre Internet Edit In the late 19th century Western Union allowed telegraphic messages on its network to be sent to multiple destinations The first recorded instance of a mass unsolicited commercial telegram is from May 1864 when some British politicians received an unsolicited telegram advertising a dentist 13 History Edit The earliest documented spam although the term had not yet been coined 14 was a message advertising the availability of a new model of Digital Equipment Corporation computers sent by Gary Thuerk to 393 recipients on ARPANET on May 3 1978 10 Rather than send a separate message to each person which was the standard practice at the time he had an assistant Carl Gartley write a single mass email Reaction from the net community was fiercely negative but the spam did generate some sales 15 16 Spamming had been practiced as a prank by participants in multi user dungeon games to fill their rivals accounts with unwanted electronic junk 16 The first major commercial spam incident started on March 5 1994 when a husband and wife team of lawyers Laurence Canter and Martha Siegel began using bulk Usenet posting to advertise immigration law services The incident was commonly termed the Green Card spam after the subject line of the postings Defiant in the face of widespread condemnation the attorneys claimed their detractors were hypocrites or zealouts claimed they had a free speech right to send unwanted commercial messages and labeled their opponents anti commerce radicals The couple wrote a controversial book entitled How to Make a Fortune on the Information Superhighway 16 An early example of nonprofit fundraising bulk posting via Usenet also occurred in 1994 on behalf of CitiHope an NGO attempting to raise funds to rescue children at risk during the Bosnian War However as it was a violation of their terms of service the ISP Panix deleted all of the bulk posts from Usenet only missing three copies citation needed Within a few years the focus of spamming and anti spam efforts moved chiefly to email where it remains today 8 By 1999 Khan C Smith a well known hacker at the time had begun to commercialize the bulk email industry and rallied thousands into the business by building more friendly bulk email software and providing internet access illegally hacked from major ISPs such as Earthlink and Botnets 17 By 2009 the majority of spam sent around the World was in the English language spammers began using automatic translation services to send spam in other languages 18 In different media EditEmail Edit Main article Email spam Email spam also known as unsolicited bulk email UBE or junk mail is the practice of sending unwanted email messages frequently with commercial content in large quantities 19 Spam in email started to become a problem when the Internet was opened for commercial use in the mid 1990s It grew exponentially over the following years and by 2007 it constituted about 80 to 85 of all e mail by a conservative estimate 20 Pressure to make email spam illegal has resulted in legislation in some jurisdictions but less so in others The efforts taken by governing bodies security systems and email service providers seem to be helping to reduce the volume of email spam According to 2014 Internet Security Threat Report Volume 19 published by Symantec Corporation spam volume dropped to 66 of all email traffic 21 An industry of email address harvesting is dedicated to collecting email addresses and selling compiled databases 22 Some of these address harvesting approaches rely on users not reading the fine print of agreements resulting in their agreeing to send messages indiscriminately to their contacts This is a common approach in social networking spam such as that generated by the social networking site Quechup 23 Instant messaging Edit Main article Messaging spam Instant messaging spam makes use of instant messaging systems Although less prevalent than its e mail counterpart according to a report from Ferris Research 500 million spam IMs were sent in 2003 twice the level of 2002 24 Newsgroup and forum Edit Main articles Newsgroup spam and Forum spam Newsgroup spam is a type of spam where the targets are Usenet newsgroups Spamming of Usenet newsgroups actually pre dates e mail spam Usenet convention defines spamming as excessive multiple posting that is the repeated posting of a message or substantially similar messages The prevalence of Usenet spam led to the development of the Breidbart Index as an objective measure of a message s spamminess Forum spam is the creation of advertising messages on Internet forums It is generally done by automated spambots Most forum spam consists of links to external sites with the dual goals of increasing search engine visibility in highly competitive areas such as weight loss pharmaceuticals gambling pornography real estate or loans and generating more traffic for these commercial websites Some of these links contain code to track the spambot s identity if a sale goes through the spammer behind the spambot earns a commission Mobile phone Edit Main article Mobile phone spam Mobile phone spam is directed at the text messaging service of a mobile phone This can be especially irritating to customers not only for the inconvenience but also because of the fee they may be charged per text message received in some markets To comply with CAN SPAM regulations in the US SMS messages now must provide options of HELP and STOP the latter to end communication with the advertiser via SMS altogether Despite the high number of phone users there has not been so much phone spam because there is a charge for sending SMS Recently there are also observations of mobile phone spam delivered via browser push notifications These can be a result of allowing websites which are malicious or delivering malicious ads to send a user notifications 25 Social networking spam Edit Main article Social networking spam Facebook and Twitter are not immune to messages containing spam links Spammers hack into accounts and send false links under the guise of a user s trusted contacts such as friends and family 26 As for Twitter spammers gain credibility by following verified accounts such as that of Lady Gaga when that account owner follows the spammer back it legitimizes the spammer 27 Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam despite the site using the broadcast model in which all tweets from a user are broadcast to all followers of the user 28 Spammers out of malicious intent post either unwanted or irrelevant information or spread misinformation on social media platforms 29 Social spam Edit Spreading beyond the centrally managed social networking platforms user generated content increasingly appears on business government and nonprofit websites worldwide Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites 30 Blog wiki and guestbook Edit Main article Spam in blogs Blog spam is spamming on weblogs In 2003 this type of spam took advantage of the open nature of comments in the blogging software Movable Type by repeatedly placing comments to various blog posts that provided nothing more than a link to the spammer s commercial web site 31 Similar attacks are often performed against wikis and guestbooks both of which accept user contributions Another possible form of spam in blogs is the spamming of a certain tag on websites such as Tumblr Spam targeting video sharing sites Edit Screenshot from a spam video on YouTube claiming that the film in question has been deleted from the site and can only be accessed on the link posted by the spambot in the video description If the video were actually removed by YouTube the description would be inaccessible and the deletion notification would look different In actual video spam the uploaded video is given a name and description with a popular figure or event that is likely to draw attention or within the video a certain image is timed to come up as the video s thumbnail image to mislead the viewer such as a still image from a feature film purporting to be a part by part piece of a movie being pirated e g Big Buck Bunny Full Movie Online Part 1 10 HD a link to a supposed keygen trainer ISO file for a video game or something similar The actual content of the video ends up being totally unrelated a Rickroll offensive or simply on screen text of a link to the site being promoted 32 In some cases the link in question may lead to an online survey site a password protected archive file with instructions leading to the aforementioned survey though the survey and the archive file itself is worthless and doesn t contain the file in question at all or in extreme cases malware 33 Others may upload videos presented in an infomercial like format selling their product which feature actors and paid testimonials though the promoted product or service is of dubious quality and would likely not pass the scrutiny of a standards and practices department at a television station or cable network VoIP Spam Edit Main article VoIP spam VoIP spam is VoIP Voice over Internet Protocol spam usually using SIP Session Initiation Protocol This is nearly identical to telemarketing calls over traditional phone lines When the user chooses to receive the spam call a pre recorded spam message or advertisement is usually played back This is generally easier for the spammer as VoIP services are cheap and easy to anonymize over the Internet and there are many options for sending mass number of calls from a single location Accounts or IP addresses being used for VoIP spam can usually be identified by a large number of outgoing calls low call completion and short call length Academic search Edit Academic search engines enable researchers to find academic literature and are used to obtain citation data for calculating author level metrics Researchers from the University of California Berkeley and OvGU demonstrated that most web based academic search engines especially Google Scholar are not capable of identifying spam attacks 34 The researchers manipulated the citation counts of articles and managed to make Google Scholar index complete fake articles some containing advertising 34 Mobile apps Edit Spamming in mobile app stores include i apps that were automatically generated and as a result do not have any specific functionality or a meaningful description ii multiple instances of the same app being published to obtain increased visibility in the app market and iii apps that make excessive use of unrelated keywords to attract users through unintended searches 35 Noncommercial forms EditE mail and other forms of spamming have been used for purposes other than advertisements Many early Usenet spams were religious or political Serdar Argic for instance spammed Usenet with historical revisionist screeds A number of evangelists have spammed Usenet and e mail media with preaching messages A growing number of criminals are also using spam to perpetrate various sorts of fraud 36 Geographical origins EditIn 2011 the origins of spam were analyzed by Cisco Systems They provided a report that shows spam volume originating from countries worldwide 37 Rank Country Spamvolume 1 India 13 72 Russia 9 03 Vietnam 7 94 tie South Korea 6 0 Indonesia 6 06 China 4 77 Brazil 4 58 United States 3 2Trademark issues EditHormel Foods Corporation the maker of SPAM luncheon meat does not object to the Internet use of the term spamming However they did ask that the capitalized word Spam be reserved to refer to their product and trademark 38 Cost benefit analyses EditThe European Union s Internal Market Commission estimated in 2001 that junk email cost Internet users 10 billion per year worldwide 39 The California legislature found that spam cost United States organizations alone more than 13 billion in 2007 including lost productivity and the additional equipment software and manpower needed to combat the problem 40 Spam s direct effects include the consumption of computer and network resources and the cost in human time and attention of dismissing unwanted messages 41 Large companies who are frequent spam targets utilize numerous techniques to detect and prevent spam 42 The cost to providers of search engines is significant The secondary consequence of spamming is that search engine indexes are inundated with useless pages increasing the cost of each processed query 4 The costs of spam also include the collateral costs of the struggle between spammers and the administrators and users of the media threatened by spamming 43 Email spam exemplifies a tragedy of the commons spammers use resources both physical and human without bearing the entire cost of those resources In fact spammers commonly do not bear the cost at all This raises the costs for everyone 44 In some ways spam is even a potential threat to the entire email system as operated in the past Since email is so cheap to send a tiny number of spammers can saturate the Internet with junk mail Although only a tiny percentage of their targets are motivated to purchase their products or fall victim to their scams the low cost may provide a sufficient conversion rate to keep the spamming alive Furthermore even though spam appears not to be economically viable as a way for a reputable company to do business it suffices for professional spammers to convince a tiny proportion of gullible advertisers that it is viable for those spammers to stay in business Finally new spammers go into business every day and the low costs allow a single spammer to do a lot of harm before finally realizing that the business is not profitable citation needed Some companies and groups rank spammers spammers who make the news are sometimes referred to by these rankings 45 46 General costs Edit In all cases listed above including both commercial and non commercial spam happens because of a positive cost benefit analysis result if the cost to recipients is excluded as an externality the spammer can avoid paying citation needed Cost is the combination of Overhead The costs and overhead of electronic spamming include bandwidth developing or acquiring an email wiki blog spam tool taking over or acquiring a host zombie etc Transaction cost The incremental cost of contacting each additional recipient once a method of spamming is constructed multiplied by the number of recipients see CAPTCHA as a method of increasing transaction costs Risks Chance and severity of legal and or public reactions including damages and punitive damages Damage Impact on the community and or communication channels being spammed see Newsgroup spam Benefit is the total expected profit from spam which may include any combination of the commercial and non commercial reasons listed above It is normally linear based on the incremental benefit of reaching each additional spam recipient combined with the conversion rate The conversion rate for botnet generated spam has recently been measured to be around one in 12 000 000 for pharmaceutical spam and one in 200 000 for infection sites as used by the Storm botnet 47 The authors of the study calculating those conversion rates noted After 26 days and almost 350 million e mail messages only 28 sales resulted In crime EditSpam can be used to spread computer viruses trojan horses or other malicious software The objective may be identity theft or worse e g advance fee fraud Some spam attempts to capitalize on human greed while some attempts to take advantage of the victims inexperience with computer technology to trick them e g phishing One of the world s most prolific spammers Robert Alan Soloway was arrested by US authorities on May 31 2007 48 Described as one of the top ten spammers in the world Soloway was charged with 35 criminal counts including mail fraud wire fraud e mail fraud aggravated identity theft and money laundering 48 Prosecutors allege that Soloway used millions of zombie computers to distribute spam during 2003 49 This is the first case in which US prosecutors used identity theft laws to prosecute a spammer for taking over someone else s Internet domain name 50 In an attempt to assess potential legal and technical strategies for stopping illegal spam a study cataloged three months of online spam data and researched website naming and hosting infrastructures The study concluded that 1 half of all spam programs have their domains and servers distributed over just eight percent or fewer of the total available hosting registrars and autonomous systems with 80 percent of spam programs overall being distributed over just 20 percent of all registrars and autonomous systems 2 of the 76 purchases for which the researchers received transaction information there were only 13 distinct banks acting as credit card acquirers and only three banks provided the payment servicing for 95 percent of the spam advertised goods in the study and 3 a financial blacklist of banking entities that do business with spammers would dramatically reduce monetization of unwanted e mails Moreover this blacklist could be updated far more rapidly than spammers could acquire new banking resources an asymmetry favoring anti spam efforts 51 Political issues EditAn ongoing concern expressed by parties such as the Electronic Frontier Foundation and the American Civil Liberties Union has to do with so called stealth blocking a term for ISPs employing aggressive spam blocking without their users knowledge These groups concern is that ISPs or technicians seeking to reduce spam related costs may select tools that either through error or design also block non spam e mail from sites seen as spam friendly Few object to the existence of these tools it is their use in filtering the mail of users who are not informed of their use that draws fire 52 Even though it is possible in some jurisdictions to treat some spam as unlawful merely by applying existing laws against trespass and conversion some laws specifically targeting spam have been proposed In 2004 United States passed the CAN SPAM Act of 2003 that provided ISPs with tools to combat spam This act allowed Yahoo to successfully sue Eric Head who settled the lawsuit for several thousand U S dollars in June 2004 But the law is criticized by many for not being effective enough Indeed the law was supported by some spammers and organizations that support spamming and opposed by many in the anti spam community citation needed Court cases EditSee also E mail spam legislation by country United States Edit Earthlink won a 25 million judgment against one of the most notorious and active spammers Khan C Smith in 2001 for his role in founding the modern spam industry which dealt billions in economic damage and established thousands of spammers into the industry 53 His email efforts were said to make up more than a third of all Internet email being sent from 1999 until 2002 Sanford Wallace and Cyber Promotions were the target of a string of lawsuits many of which were settled out of court up through a 1998 Earthlink settlement 54 that put Cyber Promotions out of business Attorney Laurence Canter was disbarred by the Tennessee Supreme Court in 1997 for sending prodigious amounts of spam advertising his immigration law practice In 2005 Jason Smathers a former America Online employee pleaded guilty to charges of violating the CAN SPAM Act In 2003 he sold a list of approximately 93 million AOL subscriber e mail addresses to Sean Dunaway who sold the list to spammers 55 56 In 2007 Robert Soloway lost a case in a federal court against the operator of a small Oklahoma based Internet service provider who accused him of spamming U S Judge Ralph G Thompson granted a motion by plaintiff Robert Braver for a default judgment and permanent injunction against him The judgment includes a statutory damages award of about 10 million under Oklahoma law 57 In June 2007 two men were convicted of eight counts stemming from sending millions of e mail spam messages that included hardcore pornographic images Jeffrey A Kilbride 41 of Venice California was sentenced to six years in prison and James R Schaffer 41 of Paradise Valley Arizona was sentenced to 63 months In addition the two were fined 100 000 ordered to pay 77 500 in restitution to AOL and ordered to forfeit more than 1 1 million the amount of illegal proceeds from their spamming operation 58 The charges included conspiracy fraud money laundering and transportation of obscene materials The trial which began on June 5 was the first to include charges under the CAN SPAM Act of 2003 according to a release from the Department of Justice The specific law that prosecutors used under the CAN Spam Act was designed to crack down on the transmission of pornography in spam 59 In 2005 Scott J Filary and Donald E Townsend of Tampa Florida were sued by Florida Attorney General Charlie Crist for violating the Florida Electronic Mail Communications Act 60 The two spammers were required to pay 50 000 USD to cover the costs of investigation by the state of Florida and a 1 1 million penalty if spamming were to continue the 50 000 was not paid or the financial statements provided were found to be inaccurate The spamming operation was successfully shut down 61 Edna Fiedler 44 of Olympia Washington on June 25 2008 pleaded guilty in a Tacoma court and was sentenced to 2 years imprisonment and 5 years of supervised release or probation in an Internet 1 million Nigerian check scam She conspired to commit bank wire and mail fraud against US citizens specifically using Internet by having had an accomplice who shipped counterfeit checks and money orders to her from Lagos Nigeria the previous November Fiedler shipped out 609 000 fake check and money orders when arrested and prepared to send additional 1 1 million counterfeit materials Also the U S Postal Service recently intercepted counterfeit checks lottery tickets and eBay overpayment schemes with a value of 2 1 billion 62 63 In a 2009 opinion Gordon v Virtumundo Inc 575 F 3d 1040 the Ninth Circuit assessed the standing requirements necessary for a private plaintiff to bring a civil cause of action against spam senders under the CAN SPAM Act of 2003 as well as the scope of the CAN SPAM Act s federal preemption clause 64 United Kingdom Edit In the first successful case of its kind Nigel Roberts from the Channel Islands won 270 against Media Logistics UK who sent junk e mails to his personal account 65 In January 2007 a Sheriff Court in Scotland awarded Mr Gordon Dick 750 the then maximum sum that could be awarded in a Small Claim action plus expenses of 618 66 a total of 1368 66 against Transcom Internet Services Ltd 66 for breaching anti spam laws 67 Transcom had been legally represented at earlier hearings but were not represented at the proof so Gordon Dick got his decree by default It is the largest amount awarded in compensation in the United Kingdom since Roberts v Media Logistics case in 2005 Despite the statutory tort that is created by the Regulations implementing the EC Directive few other people have followed their example As the Courts engage in active case management such cases would probably now be expected to be settled by mediation and payment of nominal damages New Zealand Edit In October 2008 an international internet spam operation run from New Zealand was cited by American authorities as one of the world s largest and for a time responsible for up to a third of all unwanted e mails In a statement the US Federal Trade Commission FTC named Christchurch s Lance Atkinson as one of the principals of the operation New Zealand s Internal Affairs announced it had lodged a 200 000 claim in the High Court against Atkinson and his brother Shane Atkinson and courier Roland Smits after raids in Christchurch This marked the first prosecution since the Unsolicited Electronic Messages Act UEMA was passed in September 2007 The FTC said it had received more than three million complaints about spam messages connected to this operation and estimated that it may be responsible for sending billions of illegal spam messages The US District Court froze the defendants assets to preserve them for consumer redress pending trial 68 U S co defendant Jody Smith forfeited more than 800 000 and faces up to five years in prison for charges to which he pleaded guilty 69 Bulgaria Edit While most countries either outlaw or at least ignore spam Bulgaria is the first and until now when only one to legalize it 70 According to the Bulgarian E Commerce act 71 Chl 5 6 anyone can send spam to mailboxes published as owned by a company or organization as long as there is a clear and straight indication that the message is unsolicited commercial e mail da osiguri yasnoto i nedvusmisleno razpoznavane na trgovskoto sobshenie kato nepoiskano in the message body This made lawsuits against Bulgarian ISP s and public e mail providers with antispam policy possible as they are obstructing legal commerce activity and thus violate Bulgarian antitrust acts While there are no such lawsuits until now several cases of spam obstruction are currently awaiting decision in the Bulgarian Antitrust Commission Komisiya za zashita na konkurenciyata and can end with serious fines for the ISPs in question when 72 The law contains other dubious provisions for example the creation of a nationwide public electronic register of e mail addresses that do not want to receive spam 73 It is usually abused as the perfect source for e mail address harvesting because publishing invalid or incorrect information in such a register is a criminal offense in Bulgaria Newsgroups Editnews admin net abuse emailSee also Edit Internet portalAddress munging avoidance technique Advance fee scam Type of fraud Nigerian spam Anti spam techniques Methods to prevent email spam Identity theft Deliberate use of someone else s identity usually as a method to gain a financial advantage Image spam Type of email spam Confidence trick Attempt to defraud a person or group after first gaining their confidence Junk mail Distribution of advertising by direct mail or letterbox drop List of spammers Malware Malicious software Network Abuse Clearinghouse Phishing Attempt to trick a person into revealing information Social spam Unwanted spam content appearing on social networking services Spam and Open Relay Blocking System SORBS List of e mail servers suspected of enabling spam SpamCop Email spam reporting service The Spamhaus Project Organization targetting email spammers Spamigation VoIP spam Spoetry Sporgery Posting a flood of articles to a Usenet group with falsified headers Suppression list Voice phishing also known as Vishing Phishing attack via telephonyHistoryHoward Carmack Make Money Fast Electronic chain letter Sanford Wallace Spam King Usenet Death Penalty Policy of blocking and deleting postsReferences EditCitations Edit Developer Policy Center Intellectual Property Deception and Spam play google com Retrieved 2016 05 01 Spam Merriam Webster Dictionary definition amp more 2012 08 31 Retrieved 2013 07 05 The Definition of Spam The Spamhaus Project Retrieved 2013 09 03 a b Gyongyi Zoltan Garcia Molina Hector 2005 Web spam taxonomy PDF Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web AIRWeb 2005 in The 14th International World Wide Web Conference WWW 2005 May 10 Tue 14 Sat 2005 Nippon Convention Center Makuhari Messe Chiba Japan New York NY ACM Press ISBN 978 1 59593 046 0 Monty Python 2009 01 13 Spam Monty Python s The Flying Circus archived from the original on 2010 05 22 retrieved 2017 01 11 Hambridge S Lunde A 1999 RFC 2635 DON x27T SPEW A Set of Guidelines for Mass Unsolicited Mailings and Postings spam doi 10 17487 RFC2635 Retrieved 2010 09 29 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help The Origin of the word Spam Retrieved 2010 09 20 a b Origin of the term spam to mean net abuse Templetons com Retrieved 2013 09 03 Goldberg Myshele The Origins of Spam Retrieved 2014 07 15 a b Thuerk Gary Furr Joel At 30 Spam Going Nowhere Soon NPR org interviews NPR Darren Waters 31 March 2008 Spam blights e mail 15 years on news bbc co uk Retrieved 26 August 2010 velveeta The Jargon File 4 4 7 ed CatB Getting the message at last The Economist 2007 12 14 Zeller Tom 1 June 2003 Ideas amp Trends Spamology The New York Times Reaction to the DEC Spam of 1978 Templetons Retrieved 2013 09 03 a b c Abate Tom May 3 2008 A very unhappy birthday to spam age 30 San Francisco Chronicle Conway Andrew Twenty Years of Spam Cloudmark Retrieved April 11 2014 Danchev Dancho Spammers go multilingual use automatic translation services ZDNet July 28 2009 Retrieved on August 31 2009 Ahmad Adnan Azhar Anique Naqvi Sajid Nawaz Asif Arshad Samia Zeshan Furkh Yousif Mohammed Salih Ali O M 2020 03 04 Farouk Ahmed ed A methodology for sender oriented anti spamming Journal of Intelligent amp Fuzzy Systems 38 3 2765 2776 doi 10 3233 JIFS 179562 S2CID 213636917 Email Metrics Report PDF MAAWG Archived from the original PDF on 2007 12 03 2014 Internet Security Threat Report Volume 19 PDF Symantec Corporation Retrieved 7 May 2014 FileOn List Builder Extract URL MetaTags Email Phone Fax from www Optimized Webcrawler List DNA Retrieved 2013 09 03 Hansell Saul September 13 2007 Social network launches worldwide spam campaign The New York Times Thomas Claburn 30 March 2004 Spim Like Spam Is On The Rise Retrieved 17 December 2018 Is this website allowed to send you notifications NO caution is advised lotsofways de 2018 10 18 Retrieved 2018 10 29 Marketers need to build trust as spam hits social networks Grace Bello Direct Marketing News June 1 2012 Understanding and Combating Link Farming in the Twitter Social Network Max Planck Centre for Computer Science On the Precision of Social and Information Networks PDF Gupta Arushi Kaushal Rishabh 2015 Improving spam detection in Online Social Networks 2015 International Conference on Cognitive Computing and Information Processing CCIP www ieee org IEEE pp 1 6 doi 10 1109 CCIP 2015 7100738 ISBN 978 1 4799 7171 8 S2CID 18207001 Dan Tynan 3 April 2012 Social spam is taking over the Internet ITworld The Evil Genius of Comment Spammers Wired Magazine March 2004 Fabricio Benevenuto Tiago Rodrigues Virgilio Almeida Jussara Almeida and Marcos Goncalves July 2009 Detecting Spammers and Content Promoters in Online Video Social Networks ACM SIGIR Conference PDF a href Template Cite conference html title Template Cite conference cite conference a CS1 maint multiple names authors list link Toy Story 3 movie scam warning Web User magazine Archived from the original on 11 May 2012 Retrieved 23 January 2012 a b Joeran Beel and Bela Gipp Academic search engine spam and google scholar s resilience against it Journal of Electronic Publishing 13 3 December 2010 PDF Seneviratne Suranga Apr 2017 Spam Mobile Apps Characteristics Detection and in the Wild Analysis ACM Transactions on the Web 11 1 doi 10 1145 3007901 S2CID 1944093 See Advance fee fraud Cisco 2011 Annual Security Report PDF Hormel Foods Corp v Jim Henson Prods Harvard University 73 F 3d 497 2d Cir 1996 Retrieved 2015 02 12 Data protection Junk email costs internet users 10 billion a year worldwide Commission study Europa Retrieved 2013 09 03 California business and professions code Spamlaws Retrieved 2013 09 03 Spam Cost Calculator Calculate enterprise spam cost Commtouch Retrieved 2013 09 03 Ghosemajumder Shuman 18 March 2008 Using data to help prevent fraud Google Blog Retrieved 12 August 2011 Thank the Spammers William R James 2003 03 10 Rao Justin M Reiley David H 2012 Economics of Spam Journal of Economic Perspectives 26 3 87 110 doi 10 1257 jep 26 3 87 Spamhaus TOP 10 spam service ISPs The 10 Worst ROKSO Spammers Spamhaus Retrieved 2013 09 03 Kanich C C Kreibich K Levchenko B Enright G Voelker V Paxson S Savage 2008 10 28 Spamalytics An Empirical Analysis of Spam Marketing Conversion PDF Proceedings of Conference on Computer and Communications Security CCS Alexandria VA USA Retrieved 2008 11 05 a b Lombardi Candace Alleged Seattle Spammer arrested CNET News com Retrieved 2013 09 03 Thomas Claburn Spam King Robert Alan Soloway Pleads Guilty InformationWeek Mar 17 2008 Archived from the original on 2015 02 09 SPAMfighter News 6 November 2007 Spam Kingpin Robert Soloway Arrested Retrieved 17 December 2018 Levchenko Kirill et al 2011 Click Trajectories End to End Analysis of the Spam Value Chain PDF 2011 IEEE Symposium on Security and Privacy pp 431 446 CiteSeerX 10 1 1 706 1497 doi 10 1109 SP 2011 24 ISBN 978 0 7695 4402 1 S2CID 16146219 a href Template Cite book html title Template Cite book cite book a Missing or empty title help RBL criticism www anti abuse org 11 February 2008 Retrieved 31 March 2020 Credeur Mary Staff Writer BizJournals com BizJournals com Retrieved July 22 2002 On the dark side of the planet temperatures average 110amp160K www brechtweigelhaus de U S v Jason Smathers and Sean Dunaway amended complaint US District Court for the Southern District of New York 2003 Retrieved 7 March 2007 from Pair Nabbed In AOL Spam Scheme thesmokinggun com 2010 07 14 Ex AOL employee pleads guilty in spam case 2005 February 4 CNN Retrieved 7 March 2007 from Ex AOL employee pleads guilty in spam case CNN com February 5 2005 Retrieved 27 August 2010 Braver v Newport Internet Marketing Corporation et al U S District Court Western District of Oklahoma Oklahoma City 2005 02 22 Two Men Sentenced for Running International Pornographic Spamming Business United States Department of Justice October 12 2007 Retrieved 2007 10 25 Gaudin Sharon Two Men Convicted Of Spamming Pornography InformationWeek June 26 2007 Crist Announces First Case Under Florida Anti Spam Law Office of the Florida Attorney General Archived from the original on 15 January 2009 Retrieved 21 December 2014 Crist Judgment Ends Duo s Illegal Spam Internet Operations Office of the Florida Attorney General Archived from the original on 15 January 2009 Retrieved 21 December 2014 Woman gets prison for Nigerian scam upi com Woman Gets Two Years for Aiding Nigerian Internet Check Scam PC World PC World 2008 06 25 Retrieved 2014 01 30 Gordon v Virtumundo Inc 575 F 3d 1040 9th Cir 2009 Businessman wins e mail spam case BBC News 27 December 2005 Retrieved 13 November 2011 Gordon Dick v Transcom Internet Service Ltd Scotchspam co uk Retrieved 2013 09 03 Article 13 Unsolicited communications Eur lex europa eu Retrieved 2013 09 03 Kiwi spam network was World s biggest Stuff co nz 16 October 2008 Retrieved 13 November 2011 Court Orders Australia based Leader of International Spam Network to Pay 15 15 Million Ftc gov 2011 06 24 Retrieved 2013 09 03 Spams prezi com Retrieved 2021 02 18 Zakon Za Elektronnata Trgoviya Lex bg 2011 08 14 Retrieved 2013 09 03 Griffin Ry mone 2018 Internet Governance London ETP ISBN 978 1 78882 354 8 OCLC 1045588608 Registr na yuridicheskite lica koito ne zhelayat da poluchavat nepoiskani trgovski sobsheniya Kzp bg Retrieved 2013 09 03 Sources Edit Specter Michael 2007 08 06 Damn Spam The New Yorker Retrieved 2007 08 02 Further reading EditBrunton Finn Spam A Shadow History of the Internet MIT Press 2013 304 pages 27 95 A cultural and technological history Sjouwerman Stu Posluns Jeffrey Inside the spam cartel trade secrets from the dark side Elsevier Syngress 1st edition November 27 2004 ISBN 978 1 932266 86 3 Brown Bruce Cameron How to stop e mail spam spyware malware computer viruses and hackers from ruining your computer Atlantic Publishing Group 2011 ISBN 978 1 601383 03 7 Dunne Robert Computers and the law an introduction to basic legal principles and their application in cyberspace Cambridge University Press 2009 ISBN 978 0 521886 50 5 The Spam Archive Spamdex Spam Archive list of spam from traceable sources 2014 15 including 2008 2013 over 35 000 spam emails listedExternal links Edit Wikimedia Commons has media related to Electronic spam 1 December 2009 arrest of a major spammer Anti Spam Consumer Resources and Information Cybertelecom Federal spam law and policy Federal Trade Commission page with spam reduction tips and reporting Malware City The Spam Omelette BitDefender s weekly report on spam trends and techniques Reaction to the DEC Spam of 1978 Overview and text of the first known internet e mail spam Slamming Spamming Resource on Spam Spamtrackers SpamWiki a peer reviewed spam information and analysis resource Why am I getting all this spam CDT Retrieved from https en wikipedia org w index php title Spamming amp oldid 1125764676, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.