What Exactly is Spam?

Spam, as defined in the context of computers, the Internet and electronic messaging, is a term used to designate unsolicited bulk electronic messaging and communication. In particular, spam is unsolicited bulk mailings that are commercially oriented. It is most commonly used in advertising, but it is also used to perpetrate religious, political or other types of messages. Spam is, often times, considered the electronic equivalent of junk postal mail, telemarketing or broadcast faxing. Spam got its bad name and reputation from the advertisement of ill reputable and questionable products, such as pornography, pyramid schemes, fad products, pump-and-dump stocks, etc.

Spam is delivered via several mediums, to include:

· E-mail messages

· Search engines

· Instant messaging

· Web blogs

· Usenet newsgroups

· Text messaging mobile phones

· Internet telephony

The growth of spam is a result of the cost benefit to initiators, who need only devise and develop distribution lists. The other associated costs of spam, such as bandwidth, message management and loss of productivity, become the responsibility of recipients of the messages, ISPs or other public and private entities.

In 2003, the US passed the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003, which establishes standards for sending commercial e-mail. More specifically, the act is intended "to regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited, commercial electronic mail via the Internet". The act establishes the Federal Trade Commission (FTC) as the overseer of its provisions.

The act establishes electronic mail as extremely important in communication since it "provides an opportunity for the development and growth of frictionless commerce", which is being threatened by unsolicited commercial email. The act establishes the following as criminal behaviors when used in connection with foreign or interstate electronic mail:

· Knowingly accessing a protected computer without authorization

· Intentionally deceiving or misleading the origin of messages

· Falsifying header information

· Falsifying registration information for 5 or more e-mail accounts or 2 or more domain names

· Falsely representing one's self as the registrant of 5 or more IP addresses

· Obtaining e-mail addresses through improper means

· Perpetrating fraud, identity theft, child pornography, obscenity and the sexual exploitation of children.

Criminal penalties include a fine and/or imprisonment for up to 5 years dependent upon:

· The volume of electronic transmissions

· The amount of falsified information

· Losses incurred by others

· Monetary gains from the act

· Whether the act was committed in furtherance of an felony

· Prior offenses.

Civil penalties are dependent upon the jurisdiction placing the charges and may range from hundreds of dollars to millions of dollars, dependent upon the severity of the crimes and losses involved. Also, property traceable to proceeds from monetary gains and equipment used to commit an offense may be forfeited to the US government.

As critics of the law argue, the legislation fails to dictate to marketers and advertisers, not to spam. In fact, the act does not make reference to the term, "spam", except as used in the name, CAN-SPAM. The act makes reference to the phrase, commercial electronic mail message, and defines it to be "any electronic mail message, the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose)".

Legislation is intended to curb practices inherent in spamming, such as e-mail harvesting, dictionary attacks and using viruses and Trojans to perpetrate messages. The act establishes the following with respect to commercial electronic mail messages:

· A message must contain a legitimate return address.

· A message must include and specify a method to opt-out of receiving further messages. The ability to opt-out must be available for 30 days.

· The sender may not initiate messages after 10 days of receipt of an opt-out.

· The sender may not sell, lease, exchange or transfer the opt-out e-mail address to an affiliate.

· The sender may offer a menu of options that allow the recipient to either opt-out or opt-in to future messages*.

· A message must include an identifier that specifies the message as an advertisement or solicitation.

· Messages containing sexually oriented material must contain clearly identifiable markings or notices

· A message must include a valid, physical, postal address by which the sender may be contacted.

· The sender may not send messages to addresses that were knowingly acquired from proprietary websites and ISPs, through automated methods. Particularly, when the site or ISP provides notice of their refusal to give, sell or transfer addresses for the purpose of initiating electronic mail messages.

· The sender may not create automated scripting and other means to gain multiple email addresses for the purpose of transmitting illegal messages.

· The sender may not transmit messages from a computer or email address obtained without authorization.

*Unlike opt-out advertising, which allows the recipients of advertisement to discontinue any unwanted advertisements from the sender, opt-in advertising allows the advertiser to request to have specific advertisement sent. The recipient may allow or deny permission to have further advertisement sent. If allowed, the advertiser immediately includes that e-mail address to its distribution list. Another option is, double opt-in advertising, which is similar to opt-in advertising except that once the recipient grants permission to send advertisements, a confirmation request is sent to the recipient to verify that they did, indeed, allow the permission. The e-mail address is added to the distribution list only after the recipient has positively responded to the confirmation request.

CAN-SPAM is not intended to provide cause for the general public to sue spammers, individually or in class action suits. It is designed to allow enforcement by the FTC and other federal agencies for the benefit of the general public. Individuals remain privy to the state laws and regulations of their particular jurisdictions.

Matt Bacak became "#1 Best Selling Author" in just a few short hours. Recent Entrepreneur Magazine's e-Biz radio show host is turning Authors, Speakers, and Experts into Overnight Success Stories. Discover The Secrets To Unleash The Powerful Promoter In You! Sign up for Matt Bacak's Promoting Tips Ezine ($100 value) just visit his website at http://www.powerfulpromoter.com or http://promotingtips.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Here's why you're getting so many spam phone calls
MarketWatch
What's more, the A.I. assistant will answer the call for you and send a transcript in real-time, so that you can decide whether to pick up or block it as spam. Here's how it works: The Google Assistant will answer the call for you, and an automated ...


NullTX

XRP is a Valuable Tool for Addressing Crypto Spam on Twitter
NullTX
Although a Chrome plug-in by the name of “You're Welcome” might not necessarily attract a lot of attention at first, the concept certainly has a lot of merit. This plugin is designed to help users block out cryptocurrency-related spam access the ...


No, the bishop is not asking you to get him iTunes cards
Hawaii Catholic Herald
Most spam emails get caught up in the Diocese of Honolulu's spam filters, said the diocese's information technology manager Francis Kung, but spoofers are getting more elaborate and knowledgeable in how to avoid getting caught by spam blocker keywords ...


ITWeb

Hive-mind of apps secures cyber resiliency
ITWeb
Working together, a firewall, anti-virus, and malware and spam blocker can intelligently perform all of those activities in the blink of an eye. Initial stimulation from human administrators and perhaps some pre-installation, lab-based intelligence ...


New York Times

How to Block and Report Spam Calls and Text Messages
New York Times
Telemarketers have been a thorn in the side of humankind for decades. And while technology offers more options for blocking unwanted calls, it also makes spammers more agile than ever before. Here's what to do when you get a spam call or text message, ...


IT PRO

WatchGuard FireboxV review: Virtually perfect network security
IT PRO
WatchGuard offers a wide choice of licensing schemes with one- and three-year subscriptions. The Basic Security Suite subscription enables anti-virus, anti-spam, web filtering, HTTPS inspection, IPS, application controls and WatchGuard's RED ...


WatchGuard Firebox M270 review: Top-notch security, rock-bottom price
IT PRO
Spam filtering is easy to apply; the spamBlocker wizard asked us to select incoming SMTP traffic and provide an internal mail server address or just activate IMAP or POP3. We chose the latter for transparent scanning where the POP3 proxy client was set ...


WRAL.com

Georgia Voting Begins Amid Accusations of Voter Suppression
WRAL.com
It ended up that his election office was using a spam blocker that prohibited his emails from being seen. “People just give up because they don't have time for this,” Thompson said. Georgia is one of a few states that uses electronic-only voting ...
Stacey Abrams's Burning of Georgia Flag With Confederate Symbol Surfaces on Eve of DebateNew York Times

all 1,161 news articles »

The Verge

How to stop annoying robocalls on your iPhone or Android phone
The Verge
AT&T has a free app, Call Protect, that's designed to block some fraudulent robocalls from reaching you, and you won't have to do anything besides install the software on your phone. It won't completely block spam or telemarketer calls, however ...


Small Business Trends

10 Best Call Blocker Apps to Prevent Nuisance Calls to Your Small Business
Small Business Trends
What's different about this call blocker app is that as well as identifying unknown phone calls and warning you of annoying spam calls, its adds a caller picture to your contacts from Twitter, Facebook and Google+, meaning you can identify calls made ...

Google News

How Spammers Fool Spam Blacklists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

How to Avoid Spam Complaints in Your Emails

Spam filters are responsible for deleting a high percentage of... Read More

What Exactly is Spam?

Spam, as defined in the context of computers, the Internet... Read More

How To Stop Unwanted Email Spam

You can stop unwanted email spam, you can choose to... Read More

Corporate Email Policies Lower Unnecessary Legal and Security Risks

What comes to your mind when you think about your... Read More

How Spammers Fool Whitelists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

The Vanishing Mail

Am I Just Being Paranoid Or Are The Robots Out... Read More

Block Spam with An Easy Behavioral Change

E-mails now have a connection back to their servers. I... Read More

Spamicide: Man Spammed to Death While Checking His E-mail

Death by spam is now possible with a new device... Read More

Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and... Read More

Spasms & Spamocidal Mania

Below is a letter I wrote to the following organizations:S.H.U.... Read More

Spam - Its Whats For Breakfast

The first thing I do every morning when I wake... Read More

What To Do When You Get Spam

When you go to your mailbox and find pieces of... Read More

Spam Filters Explained

What do they do? How do they work? Which one... Read More

Are You A Spam Zombie?

Over the past few years you've all become familiar with... Read More

Edating Readers

One of our Australian clients sent out a campaign using... Read More

The Cybermagic of Whitelists

Before we start getting deep into the meat of this... Read More

20 Words That Kill - At Least When It Comes to Spam Filters

Spam, spam, spam. It's terrible not only for those of... Read More

Is Email Dying?

2004 was really a year when the whole subject of... Read More

5 Zero-Cost Spam Prevention Tools For All Situations!

Anyone who uses email knows what Spam is!It's annoying and... Read More

Spammer in the Slammer: Jeremy Jaynes Sentenced to Nine Years

Will other spammers take heed? Don't count on it.Jeremy Jaynes... Read More

Do Not Spam

The temptation among internet marketers to SPAM is greater than... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

Of Spam and Sandboxes

About a month ago I had the privilege of giving... Read More