Problem

Electronic spam

Other Names:
Unsolicited emails
Involuntary relaying of commercial e-mail
Nature:

Sending multiple (thousands/millions) of unsolicited email messages is very cheap. However, the costs for the recipients are considerably greater. These costs can occur at many places along the process of transmitting and delivering email and are closely related to time. Internet Service Providers (ISPs) have an unnecessary load on the processor in their mail servers, reducing performance, slowing access times and displacing normal email. When ISPs are forced to raise rates to cover for an increase in expensive bandwidth, recipients are forced to bear costs that the advertiser has avoided. Many large ISPs have suffered major system outages as the result of massive junk email campaigns.

The methods employed by spammers to avoid being held responsible for their actions are very often fraudulent and tortuous. Numerous court cases are underway between spammers and innocent victims. Many ISPs have set up "filters" to help dispose of unsolicited commercial email. While filters often consume more resources at the ISP, making mail delivery and web surfing slower, they can sometimes help end-users cope a little bit better. Spammers know this, so as they see that mail is being blocked or filtered, the use tricks that help disguise the origin of their messages. One of the most common tricks is to relay their messages off the mail server of an innocent third party. This tactic doubles the damages: both the receiving system, and the innocent relay system are flooded with junk email. And for any mail that gets through, often times the flood of complaints goes back to the innocent site because they were made to look like the origin of the spam. Another common trick that spammers use is to forge the headers of messages, making it appear as though the message originated elsewhere, again providing a convenient target.

Background:

One online pioneer believes he has pinpointed the first e-mail spam: in 1978, a Digital Equipment Corporation salesperson typed several hundred addresses by hand – those of scientists and researchers on the Arpanet, the predecessor of the Internet - and sent them an announcement of a product presentation. A small furor erupted. "Where is the line to be drawn between this sort of thing (if it is to be allowed at all) and advertising?" a recipient at Stanford University.

Early Internet users reacted so angrily to commercial mass mailings that fake return addresses became a necessity. This was but a temporary tactic. The protest was futile however because two features of the modern Internet (both more or less accidental) make spamming easy: service providers desperate for market share at all costs; and an architecture of relatively open and insecure mail gateways. Together these enable hit-and-run e-mailers to create quick, disposable, false identities.

The modern epidemic coincided with the explosive popularization of e-mail in 1993 and 1994. A chain letter began to spread, titled "MAKE MONEY FAST". A pair of Arizona immigration lawyers, bombarded the Internet with a notorious advertisement about the "Green Card Lottery". Angry recipients counterattacked, overwhelming the lawyers' service provider with complaints. But these proto-spammers were unrepentant. Eventually they tried marketing a book "How to Make a Fortune on the Information Superhighway: Everyone's Guerrilla Guide to Marketing on the Internet and Other On-Line Services." Many others have since followed, including those who compile millions of addresses and sell them on CD.

Incidence:

A survey in 1999 found that about 17% of typical mail systems allow relaying of mail that is not from or for the system. Such relaying makes it much easier for malicious senders of unsolicited bulk email (UBE) to send their mail without paying any costs. This represents a reduction from 36% a year earlier.

America on Line (AOL) carries in an estimated 30 million email messages each day, about 30% on average was unsolicited commercial email (UCE). The most common UCE appears in the form of: (a) Chain letters; (b) Pyramid schemes (including Multilevel Marketing, or MLM); (c) Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes; (d) Offers of phone sex lines and ads for pornographic web sites; (e) Offers of software for collecting e-mail addresses and sending UCE; (f) Offers of bulk e-mailing services for sending UCE; (g) Stock offerings for unknown start-up corporations; (h) Quack health products and remedies; and (i) Illegally pirated software ("Warez").

Narrower Problems:
Sporgery
Aggravates:
Electronic harassment
Values:
Unsolicited
Related UN Sustainable Development Goals:
GOAL 9: Industry, Innovation and InfrastructureGOAL 16: Peace and Justice Strong Institutions
Problem Type:
E: Emanations of other problems
Date of last update
25.09.2019 – 17:42 CEST