Sponsored Links

Rabu, 04 Juli 2018

Sponsored Links

What Is Spamming..!! || How Spammers Can Steal Your PayPal Or ...
src: i.ytimg.com

Electronic spam is the use of an electronic messaging system to send unsolicited messages ( spam ), especially ads, as well as sending messages repeatedly on the same site. While the most popular spam is spam email, this term is applied to similar abuse in other media: instant messaging spam, Usenet email spam, search engine spam, spam on blogs, wiki spam, online classifieds spam, mobile spam messaging, spam internet forums, junk fax submissions, social spam, spam mobile apps, television ads, and file sharing spam. It's named after Spam, lunch meat, by Monty Python's sketch of a restaurant that has Spam on every dish and where customers suck "Spam!" again and again.

Spamming remains economically viable because advertisers have no operating costs beyond managing their mailing lists, servers, infrastructure, IP ranges, and domain names, and it's hard to hold back senders responsible for their bulk shipments. Because the barrier to entry is very low, many spammers, and the volume of unsolicited mail has become very high. In 2011, the estimated figure for spam messages was about seven trillion. Costs, such as loss of productivity and fraud, are borne by the public and by Internet service providers, who have been forced to add extra capacity to cope with flooding. Spamming has been the subject of legislation in many jurisdictions.

Someone who makes electronic spam is called spammers .


Video Spamming



Etimologi

The term spam comes from the 1970 Spam script from the BBC television comedy series Monty Python Terbang Circus . Sketches are arranged in a cafe where almost every item on the menu includes lunch meat cans Spam. As the waiter read the menu filled with Spam, the choir of the Viking visitors drowned out all the conversations with a song that repeated "Spam, Spam, Spam, Spam... Spam Spamoritas! Spam Spam!", So > dialog. The excessive amount of Spam mentioned the excess references of it and other imported meat products in Britain after World War II, as the country struggles to rebuild its agricultural base. Spam captured a large piece of the UK market in the lower classes, and became a byword among English children in the 1960s for low-grade food because of its similarity, monotonous taste and low prices, leading to Python's sketching humor.

In the 1980s the term was adopted to describe certain rough users who frequently visited BBS and MUD, who would repeat "Spam" multiple times to scroll other users' text from the screen. At the beginning of chat rooms like PeopleLink and the early days of America Online (later known as America Online or AOL), they literally flooded the screen with excerpts from Monty Python Spam sketches. With internet connections over phone lines, typically running at 1200 or even 300 bits/s, it can take a very long time for the spammy logo, drawn in ASCII art to scroll to the art of ASCII finished on the audience terminal. Submitting an annoying, large, and meaningless text block in this way is called spamming. This is used as a tactic by insiders from a group that wants to push new arrivals out of the room so regular conversations can continue. It's also used to prevent rival group members from chatting - for example, Star Wars fans often stormed the Star Trek chatroom, filling the space with blocks of text until Star Trek fans gone. This action, formerly called flood or contaminates , then known as spamming . The term was immediately applied to a large number of texts broadcast by many users.

This is then used in Usenet to mean lots of excess posts - re-posting the same message. Unwanted messages will appear in many, if not all newsgroups, such as Spam appearing in almost all menu items in the Monty Python sketch. The first use of this understanding was by Joel Furr after the ARMM incident on March 31, 1993, in which the experimental software released dozens of recursive messages into the news.admin.policy newsgroup . This usage also becomes established - to spam Usenet flooding newsgroups with junk messages. The word was also associated with a flood of "Make Money Fast" messages that clog up many newsgroups during the 1990s. In 1998, the New Oxford English Dictionary, which previously defined only "spam" in relation to trademarked food products, added a second definition to the entry for "spam": "Irrelevant or improper messages sent on the Internet to a large number of newsgroups or users. "

There is also an attempt to differentiate between types of newsgroup spam. Messages that are cross-inserted into too many newsgroups at once - compared to those posted too often - are called velveeta (after the cheese product). But this term does not continue.

Maps Spamming



History

Pre-Internet

In the late 19th century Western Union enabled telegraph messages on its network to be sent to many destinations. The first recorded example of an unsolicited commercial mass telegram was from May 1864, when some British politicians received an unsolicited telegram of dentist advertising.

History

The earliest documented spam (although the term has not yet been created) is a message that advertises the availability of a new model of Digital Equipment Corporation computers sent by Gary Thuerk to 393 recipients on the ARPANET in 1978. Instead of sending a separate message to everyone, which is standard practice at the time, he has an assistant, Carl Gartley, writing one bulk email. The reaction of the internet community is very negative, but spam generates some sales.

Spamming has been practiced as a joke by participants in multi-user dungeon games, to fill their opponent accounts with unwanted electronic junk. The first known electronic chain letter, titled Make Money Fast, was released in 1988.

The first major commercial spam incident began on March 5, 1994, when the husband and wife lawyers team, Laurence Canter and Martha Siegel, began using bulk Usenet posts to advertise immigration law services. The incident is commonly called "Green Card spam", after the subject line of the post. Opposing in the face of widespread criticism, lawyers claim their critics are hypocrites or "fans," claiming they have the right to free speech to send unwanted commercial messages, and label their opponents "anti-trafficking radicals". The couple wrote a controversial book titled How to Make a Fortune on the Information Highway .

Within a few years, the focus of spam (and anti-spam efforts) moved mainly to email, where it remains today. In a way, aggressive email spam by a number of high profile spammers like Sanford Wallace from Cyber ​​Promotion in the mid to late 1990s contributed to spam-dominated email phenomena in the public mind. In 1999, Khan C. Smith, a famous hacker at the time, has begun commercializing the mass email industry and amassing thousands into the business by building more friendly bulk email software and providing illegally hacked internet access from major ISPs such as Earthlink and Botnets.

In 2009, the majority of spam sent worldwide in English; spammers start using the automatic translation service to send spam in other languages.

How to Stop Spamming & Actually Get People to Listen to You
src: goinswriter.com


In different media

Email

Spam emails, also known as unsolicited bulk email (UBE), junk mail, or unsolicited commercial email (UCE), are the practice of sending unwanted email messages, often with commercial content, in bulk to a group of recipients without regard fur. Spam in email began to be a problem when the Internet was opened to the public in the mid-1990s. It grows exponentially over the following years, and currently comprises about 80 to 85 percent of all e-mails in the World, by "conservative estimates". The pressure to create illegal email spam has been successful in some jurisdictions, but less so in other countries. Efforts by regulators, security systems and email service providers seem to help reduce the onslaught of email spam. According to "Internet Security Threat Report 2014, Volume 19" published by Symantec Corporation, the volume of spam dropped to 66% of all email traffic. Spammers take advantage of this fact, and often transmit parts of their operations to countries where spam will not bring them into legal trouble.

Increasingly today, spam e-mails are sent through "zombie networks", personal computer networks infected with viruses or worms in homes and offices worldwide. Many modern worms install a backdoor that allows spammers to access computers and use them for malicious purposes. This complicates efforts to control the spread of spam, because in many cases, spam is not obviously coming from spammers. In November 2008, an ISP, McColo, which provided services to botnet operators, was defeated and spam fell 50 to 75 percent on the Internet. At the same time, it becomes clear that malware authors, spammers, and phishers learn from each other, and may form different types of partnerships.

An industry email address collection is dedicated to collecting email addresses and selling databases that are compiled. Some of the harvesting approaches of this address depend on users who do not read the printouts of good deals, so they agree to send messages indiscriminately to their contacts. This is a common approach in social networking spam such as those generated by the Quechup social networking site.

Instant message

Instant message spam uses instant messaging system. Although less common than its e-mail counterpart, according to a report from Ferris Research, 500 million spam spam was sent in 2003, twice the 2002 level. Because instant messaging tends not to be blocked by firewalls, it is a very useful channel for spammers. This is very common on many instant messaging systems like Skype.

Newsgroups and forums

Newsgroup spam is a type of spam where the target is Usenet newsgroups. Spamming from Usenet newsgroups has actually e-mailed spam e-mail. The Usenet convention defines spamming as some excessive postings, that is, repetitive message posting (or almost similar messages). The prevalence of Usenet spam led to the development of the Breidbart Index as an objective measure of the "spamminess" message.

Spam forum is the creation of advertising messages on internet forums. This is generally done by automated robots. Most forum spam consists of links to external sites, with the dual goal of increasing search engine visibility in highly competitive areas such as weight loss, pharmaceuticals, gambling, pornography, real estate or loans, and generating more traffic for this commercial website. Some of these links contain code to track the identity of the spam; if sales pass, spammers behind spammers work on commission.

Mobile

Mobile phone spam is directed to the mobile phone text messaging service. This can be very annoying for customers not only because of the inconvenience, but also because of the costs that may be charged per SMS received in some markets. The term "SpaSMS" was created on adlandline Adland site in 2000 to describe spam SMS. In order to comply with US CAN-SPAM regulations, SMS messages must now provide the HELP and STOP option, the last one to end communication with advertisers via SMS altogether.

Despite the high number of phone users, there has not been a lot of phone spam, as there is a cost to send SMS, and installing trojans on other people's phones that send spam (common for email spam) is difficult as it usually has to be downloaded from the central database.

Social networking spam

Facebook and Twitter are not immune to messages containing spam links. Mostly silently, spammers hacked accounts and sent fake links under the guise of trusted users contacts like friends and family. As for Twitter, spammers get credibility by following a verified account like Lady Gaga; when the account owner follows the spammers back, it legitimizes the spammers and allows him to multiply. Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, even though the site uses a broadcast model, in which all tweets from the user are broadcasted to all user followers. Spammers, get out of evil intentions, post unwanted (or irrelevant) information or disseminate misinformation on social media platforms.

Social spam

Spread outside centrally managed social networking platforms, more user-generated content appears on business, government and nonprofit websites around the world. Counterfeit accounts and comments planted by computers programmed to exclude social spam can infiltrate this website. Malicious users of malicious intent may violate website policies by sending obscene, humiliating, hate speech, and violent messages.

Messaging online game

Many online games allow players to contact each other through player-to-player messages, chat rooms, or public discussion areas. What qualifies as spam varies from game to game, but usually this term applies to all forms of message flooding, violating the terms of the service contract for the website. This is very common in MMORPGs where spammers try to sell game-related "items" for real-world money, especially among the in-game currencies. In game terms, spam also refers to the use of the same fighting skills repeatedly as a cheap tactic (eg "To defeat the blue dragon, just fireball spam").

Search engine spam targeting (spamdexing)

Spamdexing (portmanteau spamming and indexing ) refers to the practice on the World Wide Web to modify HTML pages to increase their high placement chances on search engine relevance lists. These sites use search engine optimization techniques "black-hats" to deliberately manipulate their rankings in search engines. Many modern search engines modify their search algorithms to try to exclude webpages using spamdexing tactics. For example, search bots will detect repeated keywords as spam by using grammatical analysis. If a website owner finds spammed web pages to incorrectly increase their page rank, the website may be penalized by search engines.

Blogs, wikis, and guestbooks

Blog spam, or "blam" for short, is spam on the weblog. In 2003, this type of spam exploits the open commenting properties in Movable Type blog software by repeatedly posting comments to various blog posts that are nothing more than links to commercial websites of spammers. Similar attacks are often made on wikis and guest books, both of which accept user contributions. Another possible form of spam on blogs is spam from certain tags on websites like Tumblr.

Spam that targets video sharing sites

Video sharing sites, such as YouTube, are now often targeted by spammers. The most common technique involves spammers (posters) posting a link to a site, most likely pornography or dealing with online dating, in the comments section of a random video or user profile. With the addition of the "thumbs up/thumbs up" feature, the spambots group can constantly "comment" on comments, put them into the top comment section and make the message more visible. Another frequently used technique is to use a bot to post messages in a random user profile to a spam channel's channel page, along with interesting text and images, usually sexually suggestive. These pages may include their own videos or other users, again often suggestive. The main purpose of this account is to attract people to the links in the section of their profile home page. YouTube has blocked posting of such links. In addition, YouTube has implemented a CAPTCHA system that makes quick posts of repeated comments much more difficult than ever, due to past misuse by mass spammer who will flood an individual profile with thousands of repeat comments.

Yet another type is actual video spam, giving the name and description of a movie uploaded with a popular character or event that may be of interest, or in the video having a specific image whose time will appear as a video thumbnail image to mislead viewers, like a still image from a movie features, claiming to be part-by-part of a hijacked movie, such as Big Buck Bunny Full Movie Online - Part 1/10 HD , links to keygen files, trainers, ISOs that are supposed to be video games, or similar. The actual content of the video is ultimately unrelated, Rickroll text, offensive, or just on the screen from a link to a promoted site. In some cases, the link in question may lead to an online survey site, a password-protected archive file with instructions pointing to the previously mentioned survey (although the survey, and the archive file itself, is worthless and contains no files in question at all), or in extreme cases, malware. Others may upload videos presented in an infomercial-like format that sells their products that feature actors and paid testimonials, even if the product or service being promoted has dubious qualities and is unlikely to escape the standard oversight and practice department of a television station or network cable.

SPIT

SPIT (SPAM over Internet Telephony) is VoIP (Voice over Internet Protocol) spam, usually using SIP (Session Initiation Protocol). It's almost identical to telemarketing calls over traditional phone lines. When a user chooses to receive spam calls, spam messages or previously recorded ads usually play back. This is generally easier for spammers because VoIP services are cheap and easy to be anonymized via the Internet, and there are many options for sending large numbers of calls from a single location. The account or IP address used for VoIP spam can usually be identified by a large number of outgoing calls, low call settlement and short calls.

Academic search

The academic search engine allows researchers to find academic literature and is used to obtain citation data to calculate performance metrics such as H-index and impact factors. Researchers from the University of California, Berkeley and OvGU point out that most academic search engines (web-based), especially Google Scholar, are unable to identify spam attacks. The researchers manipulated the number of article citations, and successfully made the Google Scholar index complete a fake article, some containing ads.

Mobile app

Spam in mobile app stores includes (i) automatically generated apps and as a result has no special function or meaningful description; (ii) multiple instances of the same application issued to gain increased visibility in the app market; and (iii) applications that overly use unrelated keywords to attract users through unwanted searches.

spamming operation that gathered a list of 711.5 million email ...
src: www.softwaretestingnews.co.uk


Non-commercial form

E-mail and other forms of spam have been used for purposes other than advertising. A lot of early Usenet spam is religious or political. Serdar Argic, for example, spamed Usenet with a historical revisionist screed. A number of evangelists have been spaming Usenet media and e-mail with preaching messages. More and more criminals also use spam to commit various frauds.

Spamming - YouTube
src: i.ytimg.com


Geographic origin

In 2011 the origins of spam were analyzed by Cisco Systems. They provide reports showing the volume of spam originating from countries around the world.

SPAM (Electronic spamming) stock illustration. Illustration of ...
src: thumbs.dreamstime.com


Trademark Issues

Hormel Foods Corporation, the SPAM lunch lunch maker, does not mind the use of the Internet for the term "spam". However, they request the word "Spam" to capitalize specifically to refer to their products and trademarks. In general, this request is followed in a forum that discusses spam. In Hormel Foods v. SpamArrest , Hormel seeks to assert its trademark rights against SpamArrest, a software company, using a "spam" sign, because Hormel owns a trademark. In the dilution claim, Hormel argues that SpamArrest's use of spam terms has jeopardized and damaged "goodwill and good reputation" in relation to trade-marked lunch meat and related products. Hormel also asserted that SpamArrest's name is very similar to lunch meat so the public may be confused, or perhaps think that Hormel is supporting the SpamArrest product.

Hormel did not win. Lawyer Derek Newman responded on behalf of SpamArrest: "Spam has become ubiquitous throughout [w] orld to describe unsolicited commercial emails. No company can claim trademark rights in generic terms." Hormel states on his website: "In the end, we try to avoid the day when the public consumes asking, 'Why would Hormel Foods name its product after junk email?'".

Hormel also made two attempts dismissed in 2005 to revoke the "SPAMBUSTER" and Spam Cube marks. Hormel's corporate lawyer Melanie J. Neumann also sent SpamCop's Julian Haight letter on August 27, 1999 requesting that she remove the inappropriate image (a can of Hormel's Spam meat products in the trash bin), change references to UCE spam into all lower-case letters, and confirm his approval to do so.

Who is spamming the bitcoin cash mempool and why? - Bitcoin Stack ...
src: i.stack.imgur.com


Cost-benefit analysis

The European Commission Market Commission estimated in 2001 that "junk email" cost Internet users EUR10 billion per year worldwide. The California legislature found that the cost of spam of the United States organization alone was more than $ 13 billion in 2007, including loss of productivity and additional equipment, software, and personnel needed to address the problem. Spam direct effects include computer consumption and network resources, and cost in human time and attention to ignore unwanted messages. Large companies that are often targeted by spam take advantage of many techniques to detect and prevent spam.

In addition, spam has costs that come from types of spam messages sent, from how the spam sender sent them, and from the arms race between spammers and those who try to stop or control spam. In addition, there is an opportunity cost for those who do not use spam-stricken systems. There are direct costs, as well as the indirect costs incurred by the victim - both those related to the spam itself, and to other crimes that typically accompany it, such as financial theft, identity theft, data theft and intellectual property, viruses and other malware infections, child pornography , fraud, and deceptive marketing.

Fees for search engine providers are insignificant: "A secondary consequence of spam is a search engine index overrun with useless pages, increasing the cost of each query processed". Spammers method is also expensive. Because spamming violates most ISP acceptable policies, most spammers over the years have experienced issues to hide their spam origins. Email, Usenet, and instant message spam are often sent via non-secure third-party proxy servers that you do not want. Spammers often use fake names, addresses, phone numbers, and other contact information to set up "disposable" accounts on various Internet service providers. In some cases, they have used a fake or stolen credit card number to pay for these accounts. This allows them to move quickly from one account to the next because each is found and closed by the host's ISP.

The cost of spam also includes the cost of collateral from the struggle between spammers and administrators and media users threatened by spam. Many users are distracted by spam because it interferes with the time spent reading the email. Many also find spam content that is often offensive, in pornography it is one of the most frequently advertised products. Spammers send their spam massively indiscriminately, so pornographic ads can appear in work email inboxes - or children, the latter illegal in many jurisdictions. Recently, there has been a noticeable increase in spam advertising websites that contain child pornography.

Some spammers argue that most of these costs are potentially resolved by asking spammers to replace ISPs and people for their material. There are three problems with this logic: first, the level of reimbursement that they can trust their budget is not high enough to pay for direct costs; secondly, human costs (lost letters, lost time, and lost opportunities) are essentially irreversible, and third, spammers often using stolen bank accounts and credit cards to finance their operations, and may do so to pay the penalties imposed.

Email spam exemplifies a shared tragedy: spammers use resources (both physical and human), without taking on all the costs of those resources. In fact, spammers generally do not bear any costs at all. This increases the cost for everyone. In some ways, spam is even a potential threat to the entire email system, as it was operated in the past. Because email is so cheap to post, a small number of spammers can saturate the Internet with junk email. Although only a fraction of their target is motivated to buy their product (or be a victim of their fraud), low cost can provide enough conversion rate to keep spam alive. Also, although spam does not seem economically viable as a way for leading companies to do business, it's enough for professional spammers to convince a small percentage of gullible advertisers that spammers can stay in business. Finally, new spammers get into the business every day, and the low cost allows one spammers to do a lot of harm before realizing that the business is not profitable.

Some companies and groups "rank" spammers; Spammers who make news are sometimes referred to by this ranking. The confidential nature of spamming operations makes it difficult to determine how productive an individual spammers are, making spammers hard to trace, block, or avoid. In addition, spammers can target different networks to different levels depending on how successful they are in targeting attacks. Thus, enough resources are used to actually measure the amount of spam produced by a single person or group. For example, victims who use common hardware, software or anti-spam services provide opportunities for such tracking. However, such ratings should be taken with a grain of salt.

General costs

In all of the cases listed above, including commercial and noncommercial, "spam occurs" because the results of a positive profit and loss analysis; if the cost to the recipient is exempted as an externality, spammers may avoid payments.

Cost is a combination of

  • Overhead: The cost and cost of sending electronic spam including bandwidth, developing or acquiring email/wiki/blog spam tools, taking over or acquiring hosts/zombies, etc.
  • Transaction costs: Additional costs to contact each additional recipient after the spamming method is built, multiplied by the number of recipients (see CAPTCHA as a method to increase transaction costs).
  • Risk: Opportunities and severity of legal and/or public reactions, including damages and punitive damages.
  • Damage: Impact on community and/or communications channel being spammed (see Newsgroup spam).

Benefit is the total expected profit from spam, which may include a combination of the commercial and non-commercial reasons listed above. This is usually linear, based on the added benefit of reaching any additional spam recipients, combined with conversion rates. The conversion rate for botnet-generated spam has recently been measured to about one in 12,000,000 for pharmaceutical spam and one in 200,000 for infected sites used by the Storm botnet. The study authors who calculated the conversion rate noted, "After 26 days, and nearly 350 million e-mail messages, only 28 sales were generated."

Spamming Vector Set Of Modern Simple Icons Royalty Free Cliparts ...
src: previews.123rf.com


In crime

Spam can be used to spread computer viruses, Trojan horses, or other malicious software. The goal may be identity theft, or worse (e.g., Fraudulent charges). Some spam try to exploit human greed, while some attempt to leverage the victims' experience with computer technology to trick them (eg, phishing). On May 31, 2007, one of the world's most productive spammers, Robert Alan Soloway, was arrested by US authorities. Described as one of the top ten spammers in the world, Soloway was charged with 35 criminal charges, including mail fraud, wire fraud, email fraud, aggravated identity theft, and money laundering. Prosecutors alleged that Soloway used millions of "zombie" computers to distribute spam during 2003. This is the first case where US prosecutors use identity theft laws to prosecute a spammer for taking over someone else's Internet domain name.

In an attempt to assess the potential for legal and technical strategies to stop illegal spam, a study from the University of California, San Diego and the University of California, Berkeley, "Click Trajectories: End-to-End Analysis of the Spam Value Chain", catalogs spam data online three months and naming the website and hosting infrastructure under investigation. This study concludes that: 1) half of all spam programs have domains and servers distributed over eight percent or less of the total available hosting registries and autonomous systems, with 80 percent of the overall spam program being distributed by only 20 percent of all registrars and systems autonomous; 2) of 76 purchases in which the researchers received the transaction information, there were only 13 different banks acting as credit card acquirers and only three banks provided payment services for 95 percent of spam advertised in this study; and, 3) the "financial blacklist" of banking entities that do business with spammers dramatically reduces the monetization of unwanted e-mail. In addition, this blacklist can be updated much faster than spammers can gain new banking resources, asymmetries that support anti-spam efforts.

Spamming - YouTube
src: i.ytimg.com


Political issues

Spamming remains a hot topic of discussion. In 2004, Porsche seized from a spammer charged with advertising on the Internet; this reveals the extent to which financial rewards are available to those who are willing to take online duplicate actions. However, some of the possible ways to stop spam may lead to other side effects, such as increased government control over the Internet, loss of privacy, barriers to freedom of expression, and e-mail commercialization.

One of the key values ​​favored by many old users and Internet experts, as well as by many members of the public, is the free exchange of ideas. Many judge the relative anarchy of the Internet, and restrictions on the idea of ​​restrictions placed on it. The common repetition of spam-fighters is that spamming itself hinders the historical freedom of the Internet, by trying to force users to bring the cost of materials they would not choose.

Ongoing concerns expressed by parties such as the Electronic Frontier Foundation and the American Civil Liberties Union relate to the so-called "stealth blocking", a term for ISPs that use aggressive spam blocking without the knowledge of their users. The group's concern is that ISPs or technicians seeking to reduce spam-related costs may choose a tool (either through error or design) as well as blocking non-spam e-mail from sites considered "spam-friendly". Early Warning System Spam Prevention (SPEWS) is a common target of this criticism. Some objections to the existence of these tools; it is its use in filtering user mail which is not informed of its use of fire draws.

Some people see spam blocking tools as a threat to free expression - and laws against spamming as unwanted precedents for extensive e-mail and Internet settings or taxation. While it may be possible in some jurisdictions to treat some spam as invalid simply by applying existing laws against infringement and conversion, some laws specifically targeting spam have been submitted. In 2004, the United States passed the CAN-SPAM Act of 2003 that provides ISPs with tools to combat spam. This action allows Yahoo! to successfully sue Eric Head, reportedly one of the largest spammers in the World, who settled the lawsuit for several thousand dollars in June 2004. However, the law was criticized by many people for not being effective enough. Indeed, the law is supported by some spammers and organizations that support spam, and is opposed by many in the anti-spam community. Examples of effective anti-harassment laws that respect the right to free speech include those in the US against unsolicited fax and phone calls, as well as those in Australia and some U.S. states against spam.

In November 2004, Lycos Europe released a screen saver called make LOVE not SPAM that created a Distributed Denial of Service attack on spammers themselves. It met with a large number of controversies and the initiative ended in December 2004.

Spamming Background With Smooth Lines And Highlights Stock Photo ...
src: previews.123rf.com


Court case

United States

Earthlink won a $ 25 million assessment against one of Khan C. Smith's most famous and active "spammers" in 2001 for his role in setting up a modern spam industry that handles billions of economic damages and shapes thousands of spammers into the industry. His email efforts are said to make up more than a third of all Internet emails sent from 1999 to 2002.

Sanford Wallace and Maya Promotion were the target of a series of lawsuits, many of which were resolved out of court, through the completion of Earthlink 1998 that made Maya Business Promotion out of business. Lawyer Laurence Canter was sacked by the Tennessee High Court in 1997 for sending a large amount of spam advertising her immigration law practice. In 2005, Jason Smathers, a former employee of America Online, pleaded guilty to allegations of violating CAN-SPAM Law. In 2003, he sold a list of about 93 million AOL customer e-mail addresses to Sean Dunaway who, in turn, sold the list to spammers.

In 2007, Robert Soloway lost a case in federal court against a small Oklahoma-based Internet service provider accused of spam. US Judge Ralph G. Thompson granted a lawsuit by plaintiff Robert Braver over a default verdict and a permanent order against him. Judgment includes a $ 10,075,000 legal damages award under Oklahoma law.

In June 2007, two people were found guilty of eight allegations stemming from sending millions of spam e-mail messages that included hardcore pornographic images. Jeffrey A. Kilbride, 41, from Venice, California was sentenced to six years in prison, and James R. Schaffer, 41, of Paradise Valley, Arizona, was sentenced to 63 months. In addition, both were fined $ 100,000, ordered to pay $ 77,500 in damages to AOL, and ordered to lose more than $ 1.1 million, the number of illegal results from their spam operations. Accusations include conspiracy, fraud, money laundering, and transportation of obscene materials. The trial, which began on 5 June, was the first to include allegations under the CAN-SPAM Act of 2003, according to a release from the Department of Justice. The special law used by prosecutors under the CAN-Spam Act is designed to crack down on the transmission of pornography in the form of spam.

In 2005, Scott J. Filary and Donald E. Townsend of Tampa, Florida were sued by Florida Attorney General Florida Crist for violating the Florida Electronic Mail Communications Act. Both spammers are required to pay $ 50,000 USD to cover the cost of the investigation by the state of Florida, and a $ 1.1 million penalty if the spam will resume, $ 50,000 not paid, or the financial statements provided are found to be inaccurate. Spam operation has been successfully shut down.

Edna Fiedler, 44, from Olympia, Washington, on June 25, 2008, pleaded guilty in a Tacoma court and was sentenced to 2 years in prison and 5 years of guided liberation or trial in the Internet $ 1 million "Nigerian check scam." He conspired to commit bank fraud, wire and letters, against US citizens, especially using the internet by having accomplices sending fake checks and money orders to him from Lagos, Nigeria, last November. Fiedler sent $ 609,000 fake checks and money orders when arrested and ready to send an additional $ 1.1 million of counterfeit materials. In addition, the US Postal Service recently intercepted fake checks, lottery tickets, and payment schemes on eBay for a nominal value of $ 2.1 billion.

In the opinion of 2009, Gordon v. Virtumundo, Inc. , 575 F.3d 1040, the Ninth Circuit assesses the requirements required for private plaintiffs to file a civil suit against spammers under the CAN-SPAM Act of 2003, as well as the scope of the federal CAN-SPAM Act preemption clause.

United Kingdom

In the first successful case of its kind, Nigel Roberts of the Channel Islands won Ã, Â £ 270 against Media Logistics UK who sent junk mail to his personal account.

In January 2007, the Scottish Sheriff Court gave Mr. Gordon Dick Ã, Â £ 750 (maximum amount later that can be awarded in Small Claims action) plus a fee of £ 618.66, total Ã, £ 1368.66 against Transcom Internet Services Ltd for violating anti-spam laws. Transcom had been legitimately represented at the previous hearing, but was not represented on the evidence, so Gordon Dick got his decision by default. This is the largest amount given as compensation in the UK since the Roberts v Media Logistics case in 2005.

Although there are lawsuits made by the Regulations implementing the EC Directives, some others have followed their example. Since the Court is involved in active case management, such cases may now be expected to be resolved through mediation and payment of nominal losses.

New Zealand

In October 2008, a large international internet spam operation run from New Zealand was cited by the American authorities as one of the largest in the world, and was temporarily responsible for up to one-third of all unwanted e-mails. In a statement, the US Federal Trade Commission (FTC) called Christchurch's Lance Atkinson one of its chief operations. New Zealand Internal Affairs announced it has filed a $ 200,000 claim in the High Court against Atkinson and his brother Shane Atkinson and courier Roland Smits after raids in Christchurch. It marked the first prosecution since the Unsolicited Electronic Messaging Act (UEMA) was passed in September 2007. The FTC said it has received more than three million complaints about spam messages linked to this operation, and estimates that it may be responsible for sending billions of messages illegal spam. The US District Court froze the defendant's assets to preserve them for consumer reparations pending trial. The US Defendant, Jody Smith, lost more than $ 800,000 and was sentenced to five years in prison on charges that he claims to be guilty.

Bulgarian

Although most countries forbid or at least ignore spam, Bulgaria is the first and only today to legalize it. According to Bulgarian E-Commerce legislation (5.6) anyone can send spam to mailboxes issued as owned by the company or organization, as long as there is "a clear and direct indication that the message is unwanted e-commerce". email "(" ????????????????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????????????? ?????

This makes lawsuits against Bulgarian ISPs and public e-mail providers with antispam policies possible, as they hinder legal trading activities and thus violate Bulgarian antitrust actions. While there have been no lawsuits until now, some cases of spam obstruction are currently pending at the Bulgarian Antitrust Commission (????????????????????????) and can be terminated with a serious fine for the ISP concerned.

The law contains other dubious provisions - for example, the creation of a list of national public electronic e-mail addresses that do not want to receive spam. Usually misused as the perfect source for harvesting e-mail addresses, because publishing false or wrong information on such a list is a criminal offense in Bulgaria.

Spam Laptop Shows Unwanted Spamming Unsolicited And Malicious ...
src: c8.alamy.com


Newsgroups

  • news.admin.net-abuse.email

Spamming Attack , Spam Email , Receive Many Emails Concept ...
src: us.123rf.com


See also


Spammers, Beware: Sharing Customers Email IDs Will Be Punishable ...
src: letsdigi.com


References

Note

Source




Further reading

  • Brunton, Finn. Spam: A Shadow History of the Internet (MIT Press; 2013) 304 pages; $ 27.95). Cultural and technological history
  • Sjouwerman, Stu; Poslun, Jeffrey, "Inside the spam cartel: trade secrets from the dark", Elsevier/Syngress; First edition, November 27, 2004. ISBN: 978-1-932266-86-3
  • Brown, Bruce Cameron "How to stop spamming e-mail, spyware, malware, computer viruses and hackers from destroying your computer" Atlantic Publishing Group, 2011. ISBNÃ, 978-1-601383-03-7
  • Dunne, Robert "Computers and law: introduction to basic legal principles and their application in cyberspace" Cambridge University Press, 2009. ISBNÃ, 978-0-521886-50-5
  • Archive Spam | Spamdex "Spam Archive spam listings from trackable sources", 2014-15 (including 2008-2013) more than 35,000 spam emails listed



External links

  • December 1, 2009: main spammers' capture
  • Consumer Anti-Spam Resources and Information
  • Cybertelecom :: Federal spam law and policy
  • Federal Trade Commission page with spam reduction tips and reporting
  • Malware City - Spam Omelette BitDefender's weekly report on spam trends and techniques.
  • Reactions to DEC Spam of 1978 Summary and spam of the first known e-mail emails.
  • Slamming Spamming Resource on Spam
  • Spamtrackers SpamWiki: a source of spam information and analysis examined by colleagues.
  • Why am I getting all this spam? CDT

Source of the article : Wikipedia

Comments
0 Comments