Home » Negative affects of spamming

Negative affects of spamming

One of the strengths of electronic communications media is that it costs virtually nothing to send a message. These media are not free of charge: setting up a cellular telephone network or an Internet e-mail service has substantial overhead costs in equipment and connectivity. However, once these costs are paid for, the cost to transmit a message to a single recipient is minuscule when compared with older media such as postal mail. Electronic messaging is cheap and fast. It is also easy to automate: computer programs can send out millions of messages via e-mail, instant message (IM), or Usenet netnews in minutes or hours at nearly no labor cost.

From these economic realities, a sort of tragedy of the commons emerges. Any communications mechanism which is cheap and easy to automate is easy to flood with bulk messages. To send instant messages to millions of users on most IM services, all one needs is a piece of scriptable software and those users’ IM usernames. The ability to send e-mail from a computer program is built in to popular operating systems such as Microsoft Windows and Unix — the only added ingredient needed is the list of addresses to target.

Sending bulk messages in this fashion, to recipients who have not solicited them, has come to be known as spamming, and the messages themselves as spam. The etymology of the term is discussed below.

Spamming has been considered by various commercial, government, and independent entities to be one of the foremost social problems facing electronic media today. All manner of attempts have been made to curb this problem: technical measures such as e-mail filtering and the automated cancellation of netnews spam; contractual measures such as Internet Service Providers’ acceptable-use policies; laws such as the Can Spam Act of 2003; and market pressures such as boycotts of those who use or support spam.

The costs of spam
Spam’s direct effects include the consumption of computer and network resources, and the cost in human time and attention of dismissing unwanted messages. In addition, spam has costs stemming from the kinds of spam messages sent, from the ways spammers send them, and from the arms race between spammers and those who try to stop or control spam.

In part because of the bad reputation (and dubious legal status) which spamming carries, it is chiefly used to carry offers of an ill-reputed or questionably legal nature. Many of the products advertised in spam are fraudulent in nature, such as quack medications and get-rich-quick schemes. Spam is frequently used to advertise scams, such as the well-known advance fee fraud and password phishing. It is also often used to advertise pornography indiscriminately, even in jurisdictions where it is illegal to transmit pornographic solicitations to minor children.

The methods of spammers are likewise costly — to ISPs and the rest of the network, not to the spammers themselves. Because spamming contravenes ISP acceptable-use policies, spammers have for many years gone to some trouble to conceal the origins of their spam. E-mail, Usenet, and instant-message spam are often sent through insecure proxy servers belonging to unwilling third parties. Spammers frequently use false names, addresses, phone numbers, and other contact information to set up “disposable” accounts at various Internet service providers. In some cases, they have used falsified or stolen credit card numbers to pay for these accounts. This allows them to quickly move from one account to the next as each one is discovered and shut down by the host ISPs.

Finally, the costs of spam must include the collateral costs of the struggle between spammers and the administrators and users of the media threatened by spamming. [1]

Spamming in different media

E-mail spam
E-mail spam is by far the most common form of spamming on the internet. It involves sending identical or nearly identical messages to thousands (or millions) of recipients. Unlike legitimate commercial email, spam is sent without the permission of the recipients, and frequently contains various tricks to bypass email filters.

Spammers obtain email addresses by a number of means: harvesting addresses from Usenet postings, DNS listings, or Web pages; guessing common names at known domains (known as a dictionary attack); and “e-pending” or searching for email addresses corresponding to specific persons, such as residents in an area.

E-mail spammers go to great lengths to conceal the origin of their messages. They do this by spoofing email addresses (similar to Internet protocol spoofing). The spammer modifies the email message so it looks like it is coming from another email address.

Messaging spam
Messaging spam is a type of spamming where the target of the spamming is instant messaging (IM). Many IM systems offer a directory of users, including demographic information such as age and sex. Advertisers can gather this information, sign on to the system, and send unsolicited messages.

A similar sort of spam can be sent with the “NET SEND” command in Microsoft Windows, a function intended for remotely alerting a system administrator. This causes a pop-up window to appear on the targeted system’s screen. This kind of spam is very easy to switch off, just follow these steps

Click on the Start button
Click on “Run …”
Type Services.msc
Locate Messenger in the Name comomn
Right click on it and click on “Stop”
Double click on it
Change Startup type to “disable”
Click on OK

Newsgroup spam
Newsgroup spam is a type of spamming where the target of the spamming are Usenet newsgroups. Spamming of Usenet newsgroups actually pre-dates email spam. Old Usenet convention defines spamming as excessive multiple posting, that is, the repeated posting of a message (or substantially similar messages). Since posting to newsgroups is nearly as easy as sending e-mails, newsgroups are a popular target of spammers.

Spamdexing (search engine spam)
Spamdexing (a combination of spamming and indexing) refers to the practice on the World Wide Web of deliberately modifying HTML pages to increase the chance of them being placed high on search engine relevancy lists. People who do this are called search engine spammers.

Blog spam
In blog spam the targets are weblogs. In 2003, this type of spam took advantage of the open nature of comments in the blogging software Movable Type by repeatedly placing comments to various blog posts that provided nothing more than a link to the spammer’s commercial web site. These link would in theory enhance the ranking of the target page in search engine indexes. [2]

Mobile phone spam
Mobile phone spam is a form of spamming directed at the text messaging service of a mobile phone. This can be especially irritating to consumers not only for the inconvenience but also because they sometimes have to pay to receive the text message.

Commercial uses
The most common purpose for spamming is advertising. Goods commonly advertised in spam include pornography, computer software, medical products such as Viagra, credit card accounts, and fad products. Spam is also used to promote scams such as pyramid schemes, stock pump-and-dump schemes, and the Nigerian money transfer fraud (419 fraud).

Comparison to postal “junk” mail
There are a number of differences between spam and junk mail:

Unlike junk postal mail, the costs of spam are paid for by the recipient’s mail site, in terms of bandwidth, CPU processing time, and storage space. Spammers frequently use free dial-up accounts, so their costs may be quite minimal indeed. Because of this offloading of costs onto the recipient, many consider spamming to be theft or criminal conversion.
Junk mail often subsidizes the delivery of mail customers want to receive. For example, the United States Postal Service allows bulk mail senders to pay a lower rate than for first-class mail, because they are required to sort their mailings and apply bar codes, which makes their mail much cheaper to process.
Another distinction is that the costs of sending junk mail provide incentives to be somewhat selective about recipients, whereas the spammer has no such incentives. Once a certain volume is reached, doubling the number of recipients often doubles the costs. For a spammer the cost of sending a single message is often no different than sending a million. Spammers do not have the bulk mailer’s incentive to prune their lists of invalid addresses or those unlikely to buy.
Finally, bulk mail is by and large used by businesses who are traceable and can be held responsible for what they send. Laws restrict the sending of pornographic materials in the post, and governmental agencies (postal inspectors) exist to enforce these laws. Spammers frequently operate on a fly-by-night basis, using the so-called “anarchy” of the Internet, and its unfamiliarity to law enforcement, as a cover.

Non-commercial spam
E-mail and other forms of spamming have been used for purposes other than advertisements. Many early Usenet spams were religious or political in nature. Serdar Argic, for instance, spammed Usenet with historical revisionist screeds. A number of evangelists have spammed Usenet and email media with preaching messages.

Spamming has also been used as a denial of service tactic, particularly on Usenet. By overwhelming the readers of a newsgroup with an inordinate number of nonsense messages, legitimate messages can be lost and computing resources are consumed. Since these messages are usually forged (that is, sent falsely under regular posters’ names) this tactic has come to be known as sporgery (from spam + forgery). This tactic has for instance been used by partisans of the Church of Scientology against the alt.religion.scientology newsgroup (see Scientology vs. the Internet) and by spammers against news.admin.net-abuse.email, a forum for mail administrators to discuss spam problems. Applied to email, this is termed mailbombing.

In a handful of cases, forged email spam has been used as a tool of harassment. The spammer collects a list of addresses as usual, then sends a spam to them signed with the name of the person he wishes to harass. Some recipients, angry that they received spam and seeing an obvious “source”, will respond angrily or pursue various sorts of revenge against the apparent spammer, the forgery victim. A widely known victim of this sort of harassment was Joe’s CyberPost, which has lent its name to the offense: it is known as a joe job. Such joe jobs have been most often used against anti-spammers: in more recent examples, Steve Linford of spamhaus.org and Timothy Walton, a California attorney, have been targeted.

Spammers have also abused resources set up for purposes of anonymous speech online, such as anonymous remailers. As a result, many of these resources have been shut down, denying their utility to legitimate users.

Email worms or viruses may be spammed to set up an initial pool of infected machines, which then re-send the virus to other machines in a spammy manner. The infected machines can often be used as remote-controlled zombie computers, for more conventional spamming or DDoS attacks. Sometimes trojans are spammed to phish for bank account details, or to set up a pool of zombies without using a virus.

The term spam is derived from the Monty Python SPAM sketch, set in a cafe where everything on the menu includes SPAM luncheon meat. While a customer plaintively asks for some kind of food without SPAM in it, the server reiterates the SPAM-filled menu. Soon, a chorus of Vikings join in with a song: “SPAM, SPAM, wonderful SPAM, glorious SPAM,” over and over again, drowning out all conversation.

Although the first known instance of unsolicited commercial email occurred in 1978, the term “spam” for this practice had not yet been applied. The Monty Python reference was applied to disruptive activity on MUD games. It later came to be used on Usenet to mean excessive multiple posting — the repeated posting of the same message. The first evident usage of this sense was by Joel Furr in the aftermath of the ARMM incident of March 31, 1993, in which a piece of experimental software released dozens of recursive messages onto the news.admin.policy newsgroup.

Soon, it came to refer also to the flooding of Usenet newsgroups with junk messages. After a pair of lawyers, Laurence Canter and Martha Siegel, started using bulk Usenet posting as a means of advertisement, the term came to include unauthorized commercial use of the noncommercial Usenet. Email spamming, and the use of the term, followed shortly. [3]

There are two popular (and incorrect) folk etymologies of the word “spam”. The first, promulgated by spammers Canter & Siegel, is that “spamming” is what happens when one dumps a can of SPAM (the meat product) into a fan blade. The second is the acronym “shit posing as mail.”

Hormel Foods, the makers of SPAM luncheon meat, do not object to the Internet use of the term “spamming.” However, they do ask that the capitalized word “SPAM” be reserved to refer to their product and trademark. [4].

See also: History of spamming

Related vocabulary
The terms unsolicited commercial email (UCE) and unsolicited bulk email (UBE) are sometimes used as more precise or less slang-like expressions for specific types of email spam. Many email users regard all UBE as spam, regardless of its content — but most legislative efforts against spam are tailored to address UCE. A small but noticeable proportion of unsolicited bulk email is not, in fact, also commercial; examples include political advocacy spam and chain letters.

An ISP which offers special terms of service to spammers is said to have signed a pink contract. Specifically, this refers to a contract which exempts the spammer from the ISP’s normal acceptable-use policies — or one in which the spammer’s violation of same is deliberately overlooked.

In the high-tech battle between spammers and anti-spammers, spammers have now started employing what the trade press have dubbed spackers, crackers who work for the spammers. These spackers works with things such as writing computer viruses to open up the victims computer to use it to send spam, host spamvertised websites or launch denial of service attacks on sites run by anti-spammers.

On Usenet in the early 1990s there was a significant controversy among netnews administrators and users over ways to handle different types of Usenet abuse. A culture of neutrality towards content precluded defining spam on the basis of advertisement or commercial solicitations. The word “spam” was usually taken to mean excessive multiple posting (EMP), and other neologisms were coined for other abuses — such as “velveeta” (from the processed cheese product) for excessive cross-posting. [5] A subset of spam was deemed cancellable spam, for which it is considered justified to issue third-party cancel messages. [6]

Alternate meanings
The term “spamming” is also used in the older sense of something repetitious and disruptive by players of first-person shooter computer games. In this sense it refers to “area denial” tacticsrepeatedly firing rockets or other explosive shells into an area. Or to any tactic whereby a large volume of ammunition is expended in the hope of scoring a single hit.

MUD, MUSH, and MUCK players happily continue using the word in its original sense. When a player returns to the terminal after a brief break to find her screen filled with pages of random chat, that’s still called “spam”. [7]

Neither of these senses of the word imply that the “spamming” is abusive.

Costs of spam
Many users are bothered by spam because it impinges upon the amount of time they spend reading their email. Many also find the content of spam frequently offensive, in that pornography is one of the most frequently advertised products. Spammers send their spam largely indiscriminately, so pornographic ads may show up in a work place email inbox — or a child’s, the latter of which is illegal in many jurisdictions.

Some spammers argue that most of these costs could potentially be alleviated by having spammers reimburse ISPs and individuals for their material. There are two problems with this logic: first, the rate of reimbursement they could credibly budget is unlikely to be nearly high enough to pay the cost; and second, the human cost (lost mail, lost time, and lost opportunities) is basically unrecoverable.

E-mail spam is a true tragedy of the commons, where a small number of non-cooperators force costs in a system which would have extremely low costs in a community of co-operators.

Since E-mail is so cheap to send, a tiny number of spammers can saturate the Internet with junk mail. Although only a tiny number of their targets are motivated to purchase their products (or fall victim to their scams), this is a sufficient conversion rate to keep spamming alive. Furthermore, even though spam appears not to be economically viable as a way for a reputable company to do business, it suffices for professional spammers to convince a tiny proportion of gullible advertisers that it is for them to stay in business.

Political issues
One of the chief values favored by many long-time Internet users and experts, as well as by many members of the public, is the free exchange of ideas. Many have valued the relative anarchy of the Internet, and bridle at the idea of restrictions placed upon it. Some see spam-blocking tools as a threat to free expression — and laws against spamming as an untoward precedent for regulation or taxation of email and the Internet at large.

Two common refrains from spam-fighters address these concerns: First, spamming itself abridges the historical freedom of the Internet, by attempting to force users to carry the costs of material which they would not choose. Second, to treat spam as unlawful requires no new incursion of law into the online world, merely the application of existing laws against trespass and conversion.

An ongoing concern expressed by parties such as the Electronic Frontier Foundation and the ACLU has to do with so-called “stealth blocking”, a term for ISPs employing aggressive spam blocking without their users’ knowledge. These groups’ concern is that ISPs or technicians seeking to reduce spam-related costs may select tools which (either through error or design) also block non-spam email from sites seen as “spam-friendly”. SPEWS is a common target of these criticisms. Few object to the existence of these tools; it is their use in filtering the mail of users who are not informed of their use which draws fire.

Cite This Work

To export a reference to this essay please select a referencing style below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Leave a Comment