Login/New-Account | Search | Submit a Story! | Greplaw!??
 
GrepLaw
- About
- FAQ
- Discussions
- Messages
- Topics
- Authors

- Preferences
- Older Stuff
- Past Polls
- Submit Story
- XML/RSS

GrepLaw
This site is a production of the Berkman Center for Internet & Society. Please email if you have questions, contributions, or ideas about improving this site.

F & F
Family

Friends

 
James Glieck on Spam
posted by turmis on Monday February 10, @10:17AM
from the Its-My-inbox-and-I-want-it-back dept.
privacy The New York Times has run a thoughtful and comprehensive article which discusses, the methods motives and history of Spam. It suggests that Spam is making the internet unusable and destroying a lot of the benefit that could be realized. It also argues that the FTC could be doing more, stating that “In reality almost all spam qualifies as deceptive.” (the FTC will only go after deceptive mail). It also suggests that Spammers are the “new organized crime” of society. Finally, the article suggests that the legal avenue of attack should be privacy regulation, which gets around that nasty free speech argument. Finally, the article suggests that the solution should be the outlawing of forged headers and a mandatory bulk mail tag.

Some pertinent Quotes differentiating Spam from traditional advertising

"E-mail marketers, from the sleazy to the near-legitimate, defend their behavior by citing postal junk mail and unsolicited telemarketing. These irritate consumers but are tolerated, up to a point. Spam is different. It is intrusive because, in the nature of e-mail, it arrives round the clock, demanding attention. It lacks even the modest checks and balances of traditional marketing: to print letters and send them through the post costs money; likewise to make telephone calls. A direct mailer can't afford a pitch so shabby and fruitless that it will produce a one-in-a-thousand rate of return. A spammer can, because sending a million more copies is practically free. "

"As a magazine reader, you might feel that advertisements are an intrusion, but you also know that the advertisers had to pay thousands of dollars and that this money supports whatever it is you like about the magazine. You've made a voluntary economic bargain -- as you do when you watch free broadcast television."

OPG and Finkelstein Submit CIPA Amicus Brief | CA Lawsuit: Shrink-Wrap Licenses Unfair  >

 

 
GrepLaw Login
Nickname:

Password:

[ Create a new account ]

Related Links
  • New York Times
  • article
  • More on privacy
  • Also by turmis
  • This discussion has been archived. No new comments can be posted.
    James Glieck on Spam | Login/Create an Account | Top | 2 comments | Search Discussion
    Threshold:
    The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
    Criminal sanction (Score:1)
    by darkonc on Monday February 10, @01:05PM (#610)
    User #463 Info
    As a result of anti-aspam block lists, many spammers have now taken to various methods of hijacking unsuspecting users' computers to do their dirty work. These range from the ancient "open relay" to outright hijacking and trojans.

    Using somebody elses' computer to do your dirty work -- without their permission is hacking. It is hacking with the intent of financial gain.

    To my knowledge, this is a criminal offence in most jurisdictions. Forget about prosecuting these people for misleading and advertising and spamming people, let's nail them for hijacking people's computers.

    This process is not necessarily without cost to the victims.
    Lets consider a user with a 1.5megabit broadband connection. Once these spam hackers gain access to a box, they tend to saturate their bandwidth for as long as the connection is useful. If you do the math (or have a Linux box with the 'units' command), it turns out that 1.5megabits/second is 493 gigabytes/month. At a relatively reasonable $2/gigabyte transfer charge, that comes to almost $1000 worth of bandwidth per month. Multiply that by the scores of connections that can be controlled by a 100megabit backbone connnection, and you have some seriously nasty pilferage.

    On the basis of this seriously nasty pilferage, I think that you could put some of these spammers away for a number of years.

    This is not just random ramblings. I've seen customers' machines hijacked in this manner, and my own analysis of spam sources indicates that spammers seem to be making use of a surprising number of random IP addresses -- even for identical spams. This seems to point to the fact that these tactics are relatively common.

    What is needed is someone willing to take this base data, mount a criminal investigation, and lay charges against these people.

    Spam (Score:2)
    by miladus on Tuesday February 11, @06:28AM (#611)
    User #324 Info | http://www.miladus.org/mt/
    Take a look at Jon udell's related item where he discusses the shortcoming of the NYTimes piece: http://weblog.infoworld.com/udell/

    Humanity has the stars in its future, and that future is too important to be lost under the burden of juvenile folly and ignorant superstition. - Isaac Asimov

    [ home | contribute story | older articles | past polls | faq | authors | preferences ]