Thread:Coolharry64/@comment-8846246-20150130081437/@comment-26033828-20150411163542

If he doesn't know: This article is about unsolicited or undesirable electronic messages. For the food, see Spam (food). For information specific to email, see Email spam. For other uses, see Spam (disambiguation).An email box folder littered with spam messagesElectronic spamming  is the use of electronic messaging systems to send unsolicited messages (spam ), especially advertising, as well as sending messages repeatedly on the same site. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam,mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch in which Spam is included in every dish.[ 1 ]  The food is stereotypically disliked/unwanted, so the word came to be transferred by analogy.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions.[ 2 ]

A person who creates electronic spam is called a spammer .[ 3 ]



Contents
<span class="toctoggle" style="-webkit-user-select:none;font-size:15.6274995803833px;font-style:normal!important;"> [hide]  *<span class="tocnumber" style="font-style:normal!important;">1  <span class="toctext" style="font-style:normal!important;">In different media <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);"> ==<span class="mw-headline" id="In_different_media" style="font-style:normal!important;">In different media <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] == ===<span class="mw-headline" id="Email" style="font-style:normal!important;">Email <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === Main article: Email spam<p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Email spam, also known as unsolicited bulk email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. Spam in email started to become a problem when the Internet was opened up to the general public in the mid-1990s. It grew exponentially over the following years, and today composes some 80 to 85 percent of all the e-mail in the World, by a "conservative estimate".<sup class="reference" id="cite_ref-4" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 4<span style="font-style:normal!important;"> ]  Pressure to make email spam illegal has been successful in some jurisdictions, but less so in others. The efforts taken by governing bodies, security systems and email service providers seem to be helping to reduce the onslaught of email spam. According to "2014 Internet Security Threat Report, Volume 19" published by Symantec Corporation, spam volume dropped to 66% of all email traffic.<sup class="reference" id="cite_ref-5" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 5<span style="font-style:normal!important;"> ]  Spammers take advantage of this fact, and frequently outsource parts of their operations to countries where spamming will not get them into legal trouble.
 * <span class="tocnumber" style="font-style:normal!important;">1.1  <span class="toctext" style="font-style:normal!important;">Email
 * <span class="tocnumber" style="font-style:normal!important;">1.2  <span class="toctext" style="font-style:normal!important;">Instant messaging
 * <span class="tocnumber" style="font-style:normal!important;">1.3  <span class="toctext" style="font-style:normal!important;">Newsgroup and forum
 * <span class="tocnumber" style="font-style:normal!important;">1.4  <span class="toctext" style="font-style:normal!important;">Mobile phone
 * <span class="tocnumber" style="font-style:normal!important;">1.5  <span class="toctext" style="font-style:normal!important;">Social networking spam
 * <span class="tocnumber" style="font-style:normal!important;">1.6  <span class="toctext" style="font-style:normal!important;">Social spam
 * <span class="tocnumber" style="font-style:normal!important;">1.7  <span class="toctext" style="font-style:normal!important;">Online game messaging
 * <span class="tocnumber" style="font-style:normal!important;">1.8  <span class="toctext" style="font-style:normal!important;">Spam targeting search engines (spamdexing)
 * <span class="tocnumber" style="font-style:normal!important;">1.9  <span class="toctext" style="font-style:normal!important;">Blog, wiki, and guestbook
 * <span class="tocnumber" style="font-style:normal!important;">1.10  <span class="toctext" style="font-style:normal!important;">Spam targeting video sharing sites
 * <span class="tocnumber" style="font-style:normal!important;">1.11  <span class="toctext" style="font-style:normal!important;">SPIT
 * <span class="tocnumber" style="font-style:normal!important;">1.12  <span class="toctext" style="font-style:normal!important;">Academic search
 * <span class="tocnumber" style="font-style:normal!important;">2  <span class="toctext" style="font-style:normal!important;">Noncommercial forms
 * <span class="tocnumber" style="font-style:normal!important;">3  <span class="toctext" style="font-style:normal!important;">Geographical origins
 * <span class="tocnumber" style="font-style:normal!important;">4  <span class="toctext" style="font-style:normal!important;">History
 * <span class="tocnumber" style="font-style:normal!important;">4.1  <span class="toctext" style="font-style:normal!important;">Pre-Internet
 * <span class="tocnumber" style="font-style:normal!important;">4.2  <span class="toctext" style="font-style:normal!important;">Etymology
 * <span class="tocnumber" style="font-style:normal!important;">4.3  <span class="toctext" style="font-style:normal!important;">History
 * <span class="tocnumber" style="font-style:normal!important;">5  <span class="toctext" style="font-style:normal!important;">Trademark issues
 * <span class="tocnumber" style="font-style:normal!important;">6  <span class="toctext" style="font-style:normal!important;">Cost-benefit analyses
 * <span class="tocnumber" style="font-style:normal!important;">6.1  <span class="toctext" style="font-style:normal!important;">General costs
 * <span class="tocnumber" style="font-style:normal!important;">7  <span class="toctext" style="font-style:normal!important;">In crime
 * <span class="tocnumber" style="font-style:normal!important;">8  <span class="toctext" style="font-style:normal!important;">Political issues
 * <span class="tocnumber" style="font-style:normal!important;">9  <span class="toctext" style="font-style:normal!important;">Court cases
 * <span class="tocnumber" style="font-style:normal!important;">9.1  <span class="toctext" style="font-style:normal!important;">United States
 * <span class="tocnumber" style="font-style:normal!important;">9.2  <span class="toctext" style="font-style:normal!important;">United Kingdom
 * <span class="tocnumber" style="font-style:normal!important;">9.3  <span class="toctext" style="font-style:normal!important;">New Zealand
 * <span class="tocnumber" style="font-style:normal!important;">9.4  <span class="toctext" style="font-style:normal!important;">Bulgaria
 * <span class="tocnumber" style="font-style:normal!important;">10  <span class="toctext" style="font-style:normal!important;">Newsgroups
 * <span class="tocnumber" style="font-style:normal!important;">11  <span class="toctext" style="font-style:normal!important;">See also
 * <span class="tocnumber" style="font-style:normal!important;">12  <span class="toctext" style="font-style:normal!important;">References
 * <span class="tocnumber" style="font-style:normal!important;">12.1  <span class="toctext" style="font-style:normal!important;">Notes
 * <span class="tocnumber" style="font-style:normal!important;">12.2  <span class="toctext" style="font-style:normal!important;">Sources
 * <span class="tocnumber" style="font-style:normal!important;">13  <span class="toctext" style="font-style:normal!important;">Further reading
 * <span class="tocnumber" style="font-style:normal!important;">14  <span class="toctext" style="font-style:normal!important;">External links

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Increasingly, e-mail spam today is sent via "zombie networks", networks of virus- or worm-infected personal computers in homes and offices around the globe. Many modern worms install a backdoor that allows the spammer to access the computer and use it for malicious purposes. This complicates attempts to control the spread of spam, as in many cases the spam does not obviously originate from the spammer. In November 2008 an ISP, McColo, which was providing service to botnet operators, was depeered and spam dropped 50 to 75 percent Internet-wide. At the same time, it is becoming clear that malware authors, spammers, and phishers are learning from each other, and possibly forming various kinds of partnerships.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">An industry of email address harvesting is dedicated to collecting email addresses and selling compiled databases.<sup class="reference" id="cite_ref-6" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 6<span style="font-style:normal!important;"> ] Some of these address-harvesting approaches rely on users not reading the fine print of agreements, resulting in their agreeing to send messages indiscriminately to their contacts. This is a common approach in social networking spam such as that generated by the social networking site Quechup.<sup class="reference" id="cite_ref-7" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 7<span style="font-style:normal!important;"> ] ===<span class="mw-headline" id="Instant_messaging" style="font-style:normal!important;">Instant messaging <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === Main article: Messaging spam<p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Instant messaging spam makes use of instant messaging systems. Although less ubiquitous than its e-mail counterpart, according to a report from Ferris Research, 500 million spam IMs were sent in 2003, twice the level of 2002. As instant messaging tends to not be blocked by firewalls, it is an especially useful channel for spammers. This is very common on many instant messaging systems such as Skype. ===<span class="mw-headline" id="Newsgroup_and_forum" style="font-style:normal!important;">Newsgroup and forum <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === Main article: Newsgroup spam<p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Newsgroup spam is a type of spam where the targets are Usenet newsgroups. Spamming of Usenet newsgroups actually pre-dates e-mail spam. Usenet convention defines spamming as excessive multiple posting, that is, the repeated posting of a message (or substantially similar messages). The prevalence of Usenet spam led to the development of the Breidbart Index as an objective measure of a message's "spamminess". Main article: Forum spam<p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Forum spam is the creation of advertising messages on Internet forums. It is generally done by automated spambots. Most forum spam consists of links to external sites, with the dual goals of increasing search engine visibility in highly competitive areas such as weight loss, pharmaceuticals, gambling, pornography, real estate or loans, and generating more traffic for these commercial websites. Some of these links contain code to track the spambot's identity; if a sale goes through, the spammer behind the spambot works on commission. ===<span class="mw-headline" id="Mobile_phone" style="font-style:normal!important;">Mobile phone <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === Main article: Mobile phone spam<p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers not only for the inconvenience, but also because of the fee they may be charged per text message received in some markets. The term "SpaSMS" was coined at the adnews website Adland in 2000 to describe spam SMS. To comply with CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end communication with the advertiser via SMS altogether.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending SMS, and installing trojans into other's phones that send spam (common for e-mail spam) is hard becauseapplications normally must be downloaded from a central database. ===<span class="mw-headline" id="Social_networking_spam" style="font-style:normal!important;">Social networking spam <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === Main article: Social networking spam<p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Facebook and Twitter are not immune to messages containing spam links. Most insidiously, spammers hack into accounts and send false links under the guise of a user's trusted contacts such as friends and family.<sup class="reference" id="cite_ref-8" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 8<span style="font-style:normal!important;"> ]  As for Twitter, spammers gain credibility by following verified accounts such as that of Lady Gaga; when that account owner follows the spammer back, it legitimizes the spammer and allows him or her to proliferate.<sup class="reference" id="cite_ref-9" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 9<span style="font-style:normal!important;"> ]  Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are broadcast to all followers of the user.<sup class="reference" id="cite_ref-10" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 10<span style="font-style:normal!important;"> ] ===<span class="mw-headline" id="Social_spam" style="font-style:normal!important;">Social spam <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites.<sup class="reference" id="cite_ref-11" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 11<span style="font-style:normal!important;"> ]  Well-meaning and malicious human users can break websites' policies by submitting profanity,<sup class="reference" id="cite_ref-12" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 12<span style="font-style:normal!important;"> ]  insults,<sup class="reference" id="cite_ref-13" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 13<span style="font-style:normal!important;"> ]  hate speech, and violent messages. ===<span class="mw-headline" id="Online_game_messaging" style="font-style:normal!important;">Online game messaging <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Many online games allow players to contact each other via player-to-player messaging, chat rooms, or public discussion areas. What qualifies as spam varies from game to game, but usually this term applies to all forms of message flooding, violating the terms of service contract for the website. This is particularly common in MMORPGs where the spammers are trying to sell game-related "items" for real-world money, chiefly among them being in-game currency. ===<span class="mw-headline" id="Spam_targeting_search_engines_.28spamdexing.29" style="font-style:normal!important;">Spam targeting search engines (spamdexing) <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === Main article: Spamdexing<p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Spamdexing (a portmanteau of <span style="font-style:normal!important;">spamming  and <span style="font-style:normal!important;">indexing ) refers to a practice on the World Wide Web of modifyingHTML pages to increase their chances of high placement on search engine relevancy lists. These sites use "black-hat"search engine optimization techniques to deliberately manipulate their rank in search engines. Many modern search engines modified their search algorithms to try to exclude web pages utilizing spamdexing tactics. For example, the search bots will detect repeated keywords as spamming by using a grammar analysis. If a website owner is found to have spammed the webpage to falsely increase its page rank, the website may be penalized by search engines. ===<span class="mw-headline" id="Blog.2C_wiki.2C_and_guestbook" style="font-style:normal!important;">Blog, wiki, and guestbook <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === Main article: Spam in blogs<p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Blog spam, or "blam" for short, is spamming on weblogs. In 2003, this type of spam took advantage of the open nature of comments in the blogging software Movable Type by repeatedly placing comments to various blog posts that provided nothing more than a link to the spammer's commercial web site.<sup class="reference" id="cite_ref-14" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 14<span style="font-style:normal!important;"> ]  Similar attacks are often performed against wikis and guestbooks, both of which accept user contributions. Another possible form of spam in blogs is the spamming of a certain tag on websites such as Tumblr. ===<span class="mw-headline" id="Spam_targeting_video_sharing_sites" style="font-style:normal!important;">Spam targeting video sharing sites <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === Screenshot from a spam video on YouTube claiming that the film in question has been deleted from the site, and can only be accessed on the link posted by the spambot in the video description (if the video were actually removed by YouTube, the description would be inaccessible, and the deletion notification would look different).<p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Video sharing sites, such as YouTube, are now frequently targeted by spammers. The most common technique involves spammers (or spambots) posting links to sites, most likelypornographic or dealing with online dating, on the comments section of random videos or user profiles. With the addition of a "thumbs up/thumbs down" feature, groups of spambots may constantly "thumbs up" a comment, getting it into the top comments section and making the message more visible. Another frequently used technique is using bots to post messages on random users' profiles to a spam account's channel page, along with enticing text and images, usually of a sexually suggestive nature. These pages may include their own or other users' videos, again often suggestive. The main purpose of these accounts is to draw people to the link in the home page section of their profile. YouTube has blocked the posting of such links. In addition, YouTube has implemented a CAPTCHAsystem that makes rapid posting of repeated comments much more difficult than before, because of abuse in the past by mass spammers who would flood individuals' profiles with thousands of repetitive comments.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Yet another kind is actual video spam, giving the uploaded movie a name and description with a popular figure or event that is likely to draw attention, or within the video has a certain image timed to come up as the video's thumbnail image to mislead the viewer, such as a still image from a feature film, purporting to be a part-by-part piece of a movie being pirated, e.g. <span style="font-style:normal!important;">Big Buck Bunny Full Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO file for a video game, or something similar. The actual content of the video ends up being totally unrelated, a Rickroll, offensive, or simply on-screen text of a link to the site being promoted.<sup class="reference" id="cite_ref-15" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 15<span style="font-style:normal!important;"> ]  In some cases, the link in question may lead to an online survey site, a password-protected archive file with instructions leading to the aforementioned survey (though the survey, and the archive file itself, is worthless and doesn't contain the file in question at all), or in extreme cases, malware.<sup class="reference" id="cite_ref-ts3scam_16-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 16<span style="font-style:normal!important;"> ]  Others may upload videos presented in an infomercial-like format selling their product which feature actors and paid testimonials, though the promoted product or service is of dubious quality and would likely not pass the scrutiny of a standards and practices department at a television station or cable network. ===<span class="mw-headline" id="SPIT" style="font-style:normal!important;">SPIT <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">SPIT (SPam over Internet Telephony) is VoIP (Voice over Internet Protocol) spam, usually using SIP (Session Initiation Protocol). This is nearly identical to telemarketing calls over traditional phone lines. When the user chooses to receive the spam call, a pre-recorded spam message or advertisement is usually played back. This is generally easier for the spammer as VoIP services are cheap and easy to anonymize over the Internet, and there are many options for sending mass amounts of calls from a single location. Accounts or IP addresses being used for VoIP spam can usually be identified by a large number of outgoing calls, low call completion and short call length. ===<span class="mw-headline" id="Academic_search" style="font-style:normal!important;">Academic search <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Academic search engines enable researchers to find academic literature and are used to obtain citation data for calculating performance metrics such as the H-index and impact factor. Researchers from the University of California, Berkeley and OvGU demonstrated that most (web-based) academic search engines, especially Google Scholar, are not capable of identifying spam attacks.<sup class="reference" id="cite_ref-acspam_17-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 17<span style="font-style:normal!important;"> ]  The researchers manipulated the citation counts of articles, and managed to make Google Scholar index complete fake articles, some containing advertising.<sup class="reference" id="cite_ref-acspam_17-1" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 17<span style="font-style:normal!important;"> ] ==<span class="mw-headline" id="Noncommercial_forms" style="font-style:normal!important;">Noncommercial forms <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] == <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">E-mail and other forms of spamming have been used for purposes other than advertisements. Many early Usenet spams were religious or political. Serdar Argic, for instance, spammed Usenet with historical revisionist screeds. A number of evangelists have spammed Usenet and e-mail media with preaching messages. A growing number of criminals are also using spam to perpetrate various sorts of fraud.<sup class="reference" id="cite_ref-18" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 18<span style="font-style:normal!important;"> ] ==<span class="mw-headline" id="Geographical_origins" style="font-style:normal!important;">Geographical origins <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] == <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">A 2011 Cisco Systems report shows spam volume originating from countries worldwide.<sup class="reference" id="cite_ref-19" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 19<span style="font-style:normal!important;"> ] ==<span class="mw-headline" id="History" style="font-style:normal!important;">History <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] == ===<span class="mw-headline" id="Pre-Internet" style="font-style:normal!important;">Pre-Internet <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In the late 19th Century Western Union allowed telegraphic messages on its network to be sent to multiple destinations. The first recorded instance of a mass unsolicited commercial telegram is from May 1864, when some British politicians received an unsolicited telegram advertising a dentistry shop.<sup class="reference" id="cite_ref-TheEconomist_20-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 20<span style="font-style:normal!important;"> ] ===<span class="mw-headline" id="Etymology" style="font-style:normal!important;">Etymology <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">According to the Internet Society and other sources, the term <span style="font-style:normal!important;">spam  is derived from the 1970 <span style="font-style:normal!important;">Spam sketch of the BBCtelevision comedy series <span style="font-style:normal!important;">Monty Python's Flying Circus .<sup class="reference" id="cite_ref-tools.ietf.org_21-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 21<span style="font-style:normal!important;"> ]  The sketch is set in a cafe where nearly every item on the menu includes Spam canned luncheon meat. As the waiter recites the Spam-filled menu, a chorus of Viking patrons drowns out all conversations with a song repeating "Spam, Spam, Spam, Spam… lovely Spam! wonderful Spam!", hence "Spamming" the dialogue.<sup class="reference" id="cite_ref-22" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 22<span style="font-style:normal!important;"> ]  The excessive amount of Spam mentioned in the sketch is a reference to the preponderance of imported canned meat products in the United Kingdom, particularly a brand of tinned pork and ham (SPAM) from the USA, in the years after World War II, as the country struggled to rebuild its agricultural base. Spam captured a large slice of the British market within lower economic classes and became a byword among British children of the 1960s<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (May 2014)">citation needed ]  for low-grade fodder due to its commonality, monotonous taste and cheap price — hence the humour of the Python sketch.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In the 1980s the term was adopted to describe certain abusive users who frequented BBSs and MUDs, who would repeat "Spam" a huge number of times to scroll other users' text off the screen.<sup class="reference" id="cite_ref-autogenerated2_23-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 23<span style="font-style:normal!important;"> ]  In early chat rooms services like PeopleLink and the early days of Online America (later known as America Online or AOL), they actually flooded the screen with quotes from the Monty Python Spam sketch.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;">[http://en.wikipedia.org/wiki/Wikipedia:Citation_needed <span style="font-style:normal!important;" title="This claim needs references to reliable sources. (August 2011)">citation needed ] ]  With internet connections over phone lines, typically running at 1200 or even 300 bit/s, it could take an enormous amount of time for a <span style="font-style:normal!important;">spammy  logo, drawn in<span style="font-style:normal!important;">ASCII art  to scroll to completion on a viewer's terminal. Sending an irritating, large, meaningless block of text in this way was called <span style="font-style:normal!important;">spamming.  This was used as a tactic by insiders of a group that wanted to drive newcomers out of the room so the usual conversation could continue. It was also used to prevent members of rival groups from chatting—for instance, Star Wars fans often invaded Star Trek chat rooms, filling the space with blocks of text until the Star Trek fans left.<sup class="reference" id="cite_ref-goldberg_24-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 24<span style="font-style:normal!important;"> ]  This act, previously called <span style="font-style:normal!important;">flooding  or <span style="font-style:normal!important;">trashing, came to be known as <span style="font-style:normal!important;">spamming .<sup class="reference" id="cite_ref-25" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 25<span style="font-style:normal!important;"> ]  The term was soon applied to a large amount of text broadcast by many users.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">It later came to be used on Usenet to mean <span style="font-style:normal!important;">excessive multiple posting —the repeated posting of the same message. The unwanted message would appear in many, if not all newsgroups, just as Spam appeared in nearly all the menu items in the Monty Python sketch. The first usage of this sense was by Joel Furr<sup class="reference" id="cite_ref-npr_26-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 26<span style="font-style:normal!important;"> ]  in the aftermath of the ARMMincident of March 31, 1993, in which a piece of experimental software released dozens of recursive messages onto the<span style="font-style:normal!important;">news.admin.policy  newsgroup.<sup class="reference" id="cite_ref-27" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 27<span style="font-style:normal!important;"> ]  This use had also become established—to spam Usenet was flooding newsgroups with junk messages. The word was also attributed to the flood of "Make Money Fast" messages that clogged many newsgroups during the 1990s.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (June 2007)">citation needed ]  In 1998, the New Oxford Dictionary of English, which had previously only defined "spam" in relation to the trademarked food product, added a second definition to its entry for "spam": "Irrelevant or inappropriate messages sent on the Internet to a large number of newsgroups or users."<sup class="reference" id="cite_ref-28" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 28<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">There was also an effort to differentiate between types of newsgroup spam. Messages that were crossposted to too many newsgroups at once – as opposed to those that were posted too frequently – were called velveeta (after a cheese product). But this term didn't persist.<sup class="reference" id="cite_ref-29" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 29<span style="font-style:normal!important;"> ] ===<span class="mw-headline" id="History_2" style="font-style:normal!important;">History <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Earliest documented spam (although the term had not yet been coined<sup class="reference" id="cite_ref-30" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 30<span style="font-style:normal!important;"> ] ) was a message advertising the availability of a new model of Digital Equipment Corporation computers sent by Gary Thuerk to 393 recipients on ARPANET in 1978.<sup class="reference" id="cite_ref-npr_26-1" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 26<span style="font-style:normal!important;"> ]  Rather than send a separate message to each person, which was the standard practice at the time, he had an assistant, Carl Gartley, write a single mass email. Reaction from the net community was fiercely negative, but the spam did generate some sales.<sup class="reference" id="cite_ref-31" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 31<span style="font-style:normal!important;"> ] <sup class="reference" id="cite_ref-sfc_32-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 32<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Spamming had been practiced as a prank by participants in multi-user dungeon games, to fill their rivals' accounts with unwanted electronic junk.<sup class="reference" id="cite_ref-sfc_32-1" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 32<span style="font-style:normal!important;"> ]  The first known electronic chain letter, titled Make Money Fast, was released in 1988.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">The first major commercial spam incident started on March 5, 1994, when a husband and wife team of lawyers,Laurence Canter and Martha Siegel, began using bulk Usenet posting to advertise immigration law services. The incident was commonly termed the "Green Card spam", after the subject line of the postings. Defiant in the face of widespread condemnation, the attorneys claimed their detractors were hypocrites or "zealouts", claimed they had afree speech right to send unwanted commercial messages, and labeled their opponents "anti-commerce radicals." The couple wrote a controversial book entitled <span style="font-style:normal!important;">How to Make a Fortune on the Information Superhighway .<sup class="reference" id="cite_ref-sfc_32-2" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 32<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Within a few years, the focus of spamming (and anti-spam efforts) moved chiefly to email, where it remains today.<sup class="reference" id="cite_ref-autogenerated2_23-1" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 23<span style="font-style:normal!important;"> ]  Arguably, the aggressive email spamming by a number of high-profile spammers such as Sanford Wallaceof Cyber Promotions in the mid-to-late 1990s contributed to making spam predominantly an email phenomenon in the public mind.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;">[http://en.wikipedia.org/wiki/Wikipedia:Citation_needed <span style="font-style:normal!important;" title="This claim needs references to reliable sources. (September 2009)">citation needed ] ]  By 2009, the majority of spam sent around the World was in the English language; spammers began using automatic translation services to send spam in other languages.<sup class="reference" id="cite_ref-33" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 33<span style="font-style:normal!important;"> ] ==<span class="mw-headline" id="Trademark_issues" style="font-style:normal!important;">Trademark issues <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">]  == <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Hormel Foods Corporation, the maker of SPAM luncheon meat, does not object to the Internet use of the term "spamming". However, they did ask that the capitalized word "Spam" be reserved to refer to their product and trademark.<sup class="reference" id="cite_ref-34" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 34<span style="font-style:normal!important;"> ]  By and large, this request is obeyed in forums that discuss spam. In <span style="font-style:normal!important;">Hormel Foods v. SpamArrest, Hormel attempted to assert its trademark rights against SpamArrest, a software company, from using the mark "spam", since Hormel owns the trademark. In a dilution claim, Hormel argued that SpamArrest's use of the term "spam" had endangered and damaged "substantial goodwill and good reputation" in connection with its trademarked lunch meat and related products. Hormel also asserted that SpamArrest's name so closely resembles its luncheon meat that the public might become confused, or might think that Hormel endorses SpamArrest's products.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Hormel did not prevail. Attorney Derek Newman responded on behalf of SpamArrest: "Spam has become ubiquitous throughout the [w]orld to describe unsolicited commercial email. No company can claim trademark rights on a generic term." Hormel stated on its website: "Ultimately, we are trying to avoid the day when the consuming public asks, 'Why would Hormel Foods name its product after junk email?'".<sup class="reference" id="cite_ref-35" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 35<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Hormel also made two attempts that were dismissed in 2005 to revoke the marks "SPAMBUSTER"<sup class="reference" id="cite_ref-36" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 36<span style="font-style:normal!important;"> ]  and Spam Cube.<sup class="reference" id="cite_ref-37" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 37<span style="font-style:normal!important;"> ]  Hormel's corporate attorney Melanie J. Neumann also sent SpamCop's Julian Haight a letter on August 27, 1999 requesting that he delete an objectionable image (a can of Hormel's Spam luncheon meat product in a trash can), change references to UCE spam to all lower case letters, and confirm his agreement to do so.<sup class="reference" id="cite_ref-38" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 38<span style="font-style:normal!important;"> ] ==<span class="mw-headline" id="Cost-benefit_analyses" style="font-style:normal!important;">Cost-benefit analyses <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] == <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">The European Union's Internal Market Commission estimated in 2001 that "junk email" cost Internet users €10 billion per year worldwide.<sup class="reference" id="cite_ref-39" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 39<span style="font-style:normal!important;"> ]  The California legislature found that spam cost United States organizations alone more than $13 billion in 2007, including lost productivity and the additional equipment, software, and manpower needed to combat the problem.<sup class="reference" id="cite_ref-40" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 40<span style="font-style:normal!important;"> ]  Spam's direct effects include the consumption of computer and network resources, and the cost in human time and attention of dismissing unwanted messages.<sup class="reference" id="cite_ref-41" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 41<span style="font-style:normal!important;"> ]  Large companies who are frequent spam targets utilize numerous techniques to detect and prevent spam.<sup class="reference" id="cite_ref-42" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 42<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In addition, spam has costs stemming from the <span style="font-style:normal!important;">kinds  of spam messages sent, from the <span style="font-style:normal!important;">ways  spammers send them, and from the <span style="font-style:normal!important;">arms race  between spammers and those who try to stop or control spam. In addition, there are the opportunity cost of those who forgo the use of spam-afflicted systems. There are the direct costs, as well as the indirect costs borne by the victims—both those related to the spamming itself, and to other crimes that usually accompany it, such as financial theft, identity theft, data and intellectual property theft, virus and other malwareinfection, child pornography, fraud, and deceptive marketing.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">The cost to providers of search engines is not insignificant: "The secondary consequence of spamming is that search engine indexes are inundated with useless pages, increasing the cost of each processed query".<sup class="reference" id="cite_ref-Gyongyi_3-1" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 3<span style="font-style:normal!important;"> ]  The methods of spammers are likewise costly. Because spamming contravenes the vast majority of ISPs' acceptable-use policies, most spammers have for many years gone to some trouble to conceal the origins of their spam. Email, Usenet, and instant-message spam are often sent through insecure proxy servers belonging to unwilling third parties. Spammers frequently use false names, addresses, phone numbers, and other contact information to set up "disposable" accounts at various Internet service providers. In some cases, they have used falsified or stolen credit card numbers to pay for these accounts. This allows them to quickly move from one account to the next as each one is discovered and shut down by the host ISPs.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">The costs of spam also include the collateral costs of the struggle between spammers and the administrators and users of the media threatened by spamming.<sup class="reference" id="cite_ref-43" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 43<span style="font-style:normal!important;"> ]  Many users are bothered by spam because it impinges upon the amount of time they spend reading their email. Many also find the content of spam frequently offensive, in thatpornography is one of the most frequently advertised products. Spammers send their spam largely indiscriminately, so pornographic ads may show up in a work place email inbox—or a child's, the latter of which is illegal in many jurisdictions. Recently, there has been a noticeable increase in spam advertising websites that contain child pornography.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (July 2012)">citation needed ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Some spammers argue that most of these costs could potentially be alleviated by having spammers reimburse ISPs and persons for their material.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (November 2007)">citation needed ]  There are three problems with this logic: first, the rate of reimbursement they could credibly budget is not nearly high enough to pay the direct costs<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;">[http://en.wikipedia.org/wiki/Wikipedia:Citation_needed <span style="font-style:normal!important;" title="This claim needs references to reliable sources. (July 2008)">citation needed ] ], second, the human cost (lost mail, lost time, and lost opportunities) is basically unrecoverable, and third, spammers often use stolen bank accounts and credit cards to finance their operations, and would conceivably do so to pay off any fines imposed.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Email spam exemplifies a tragedy of the commons: spammers use resources (both physical and human), without bearing the entire cost of those resources. In fact, spammers commonly do not bear the cost at all. This raises the costs for everyone. In some ways spam is even a potential threat to the entire email system, as operated in the past. Since email is so cheap to send, a tiny number of spammers can saturate the Internet with junk mail. Although only a tiny percentage of their targets are motivated to purchase their products (or fall victim to their scams), the low cost may provide a sufficient conversion rate to keep the spamming alive. Furthermore, even though spam appears not to be economically viable as a way for a reputable company to do business, it suffices for professional spammers to convince a tiny proportion of gullible advertisers that it is viable for those spammers to stay in business. Finally, new spammers go into business every day, and the low costs allow a single spammer to do a lot of harm before finally realizing that the business is not profitable.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Some companies and groups "rank" spammers; spammers who make the news are sometimes referred to by these rankings.<sup class="reference" id="cite_ref-44" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 44<span style="font-style:normal!important;"> ] <sup class="reference" id="cite_ref-45" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 45<span style="font-style:normal!important;"> ]  The secretive nature of spamming operations makes it difficult to determine how proliferated an individual spammer is, thus making the spammer hard to track, block or avoid. Also, spammers may target different networks to different extents, depending on how successful they are at attacking the target. Thus considerable resources are employed to actually measure the amount of spam generated by a single person or group. For example, victims that use common anti-spam hardware, software or services provide opportunities for such tracking. Nevertheless, such rankings should be taken with a grain of salt. ===<span class="mw-headline" id="General_costs" style="font-style:normal!important;">General costs <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In all cases listed above, including both commercial and non-commercial, "spam happens" because of a positive cost-benefit analysis result, if the cost to recipients is excluded as an externality the spammer can avoid paying.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);"><span style="font-style:normal!important;">Cost  is the combination of <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);"><span style="font-style:normal!important;">Benefit  is the total expected profit from spam, which may include any combination of the commercial and non-commercial reasons listed above. It is normally linear, based on the incremental benefit of reaching each additional spam recipient, combined with the conversion rate. The conversion rate for botnet-generated spam has recently been measured to be around one in 12,000,000 for pharmaceutical spam and one in 200,000 for infection sites as used by the Storm botnet.<sup class="reference" id="cite_ref-46" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 46<span style="font-style:normal!important;"> ]  The authors of the study calculating those conversion rates noted, "After 26 days, and almost 350 million e-mail messages, only 28 sales resulted." ==<span class="mw-headline" id="In_crime" style="font-style:normal!important;">In crime <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] == <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Spam can be used to spread computer viruses, trojan horses or other malicious software. The objective may beidentity theft, or worse (e.g., advance fee fraud). Some spam attempts to capitalize on human greed, while some attempts to take advantage of the victims' inexperience with computer technology to trick them (e.g., phishing). On May 31, 2007, one of the world's most prolific spammers, Robert Alan Soloway, was arrested by US authorities.<sup class="reference" id="cite_ref-autogenerated1_47-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 47<span style="font-style:normal!important;"> ] Described as one of the top ten spammers in the world, Soloway was charged with 35 criminal counts, including mail fraud, wire fraud, e-mail fraud, aggravated identity theft, and money laundering.<sup class="reference" id="cite_ref-autogenerated1_47-1" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 47<span style="font-style:normal!important;"> ]  Prosecutors allege that Soloway used millions of "zombie" computers to distribute spam during 2003.<sup class="reference" id="cite_ref-48" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 48<span style="font-style:normal!important;"> ]  This is the first case in which US prosecutors used identity theft laws to prosecute a spammer for taking over someone else's Internet domain name.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;">[http://en.wikipedia.org/wiki/Wikipedia:Citation_needed <span style="font-style:normal!important;" title="This claim needs references to reliable sources. (February 2008)">citation needed ] ]
 * Overhead: The costs and overhead of electronic spamming include bandwidth, developing or acquiring an email/wiki/blog spam tool, taking over or acquiring a host/zombie, etc.
 * Transaction cost: The incremental cost of contacting each additional recipient once a method of spamming is constructed, multiplied by the number of recipients (see CAPTCHA as a method of increasing transaction costs).
 * Risks: Chance and severity of legal and/or public reactions, including damages and punitive damages.
 * Damage: Impact on the community and/or communication channels being spammed (see Newsgroup spam).

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In an attempt to assess potential legal and technical strategies for stopping illegal spam, a study from the University of California, San Diego, and the University of California, Berkeley, "Click Trajectories: End-to-End Analysis of the Spam Value Chain", cataloged three months of online spam data and researched website naming and hosting infrastructures. The study concluded that: 1) half of all spam programs have their domains and servers distributed over just eight percent or fewer of the total available hosting registrars and autonomous systems, with 80 percent of spam programs overall being distributed over just 20 percent of all registrars and autonomous systems; 2) of the 76 purchases for which the researchers received transaction information, there were only 13 distinct banks acting as credit card acquirers and only three banks provided the payment servicing for 95 percent of the spam-advertised goods in the study; and, 3) a "financial blacklist" of banking entities that do business with spammers would dramatically reduce monetization of unwanted e-mails. Moreover, this blacklist could be updated far more rapidly than spammers could acquire new banking resources, an asymmetry favoring anti-spam efforts.<sup class="reference" id="cite_ref-49" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 49<span style="font-style:normal!important;"> ] ==<span class="mw-headline" id="Political_issues" style="font-style:normal!important;">Political issues <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] == <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Spamming remains a hot discussion topic. In 2004, the seized Porsche of an indicted spammer was advertised on the Internet;<sup class="reference" id="cite_ref-50" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 50<span style="font-style:normal!important;"> ]  this revealed the extent of the financial rewards available to those who are willing to commit duplicitous acts online. However, some of the possible means used to stop spamming may lead to other side effects, such as increased government control over the Internet, loss of privacy, barriers to free expression, and the commercialization of e-mail.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (June 2007)">citation needed ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">One of the chief values favored by many long-time Internet users and experts, as well as by many members of the public, is the free exchange of ideas. Many have valued the relative anarchy of the Internet, and bridle at the idea of restrictions placed upon it.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (February 2007)">citation needed ]  A common refrain from spam-fighters is that spamming itself abridges the historical freedom of the Internet, by attempting to force users to carry the <span style="font-style:normal!important;">costs  of material that they would not choose.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;">[http://en.wikipedia.org/wiki/Wikipedia:Citation_needed <span style="font-style:normal!important;" title="This claim needs references to reliable sources. (June 2007)">citation needed ] ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">An ongoing concern expressed by parties such as the Electronic Frontier Foundation and the American Civil Liberties Union has to do with so-called "stealth blocking", a term for ISPs employing aggressive spam blocking without their users' knowledge. These groups' concern is that ISPs or technicians seeking to reduce spam-related costs may select tools that (either through error or design) also block non-spam e-mail from sites seen as "spam-friendly". Spam Prevention Early Warning System (SPEWS) is a common target of these criticisms. Few object to the existence of these tools; it is their use in filtering the mail of users who are not informed of their use that draws fire.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (June 2007)">citation needed ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Some see spam-blocking tools as a threat to free expression—and laws against spamming as an untoward precedent for regulation or taxation of e-mail and the Internet at large. Even though it is possible in some jurisdictions to treat some spam as unlawful merely by applying existing laws against trespass and conversion, some laws specifically targeting spam have been proposed. In 2004, United States passed the CAN-SPAM Act of 2003 that provided ISPs with tools to combat spam. This act allowed [http://en.wikipedia.org/wiki/Yahoo! Yahoo!] to successfully sue Eric Head, reportedly one of the biggest spammers in the World, who settled the lawsuit for several thousand U.S. dollars in June 2004. But the law is criticized by many for not being effective enough. Indeed, the law was supported by some spammers and organizations that support spamming, and opposed by many in the anti-spam community. Examples of effective anti-abuse laws that respect free speech rights include those in the U.S. against unsolicited faxes and phone calls, and those in Australia and a few U.S. states against spam.<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (June 2007)">citation needed ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In November 2004, Lycos Europe released a screen saver called make LOVE not SPAM that made Distributed Denial of Service attacks on the spammers themselves. It met with a large amount of controversy and the initiative ended in December 2004.<sup class="reference" id="cite_ref-51" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 51<span style="font-style:normal!important;"> ] <sup class="reference" id="cite_ref-52" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 52<span style="font-style:normal!important;"> ] <sup class="reference" id="cite_ref-53" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 53<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);"><span style="font-style:normal!important;">Anti-spam  policies may also be a form of disguised censorship, a way to ban access or reference to questioning alternative forums or blogs by an institution. This form of occult censorship is mainly used by private companies when they can not muzzle criticism by legal ways.<sup class="reference" id="cite_ref-54" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 54<span style="font-style:normal!important;"> ] ==<span class="mw-headline" id="Court_cases" style="font-style:normal!important;">Court cases <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] == See also: E-mail spam legislation by country===<span class="mw-headline" id="United_States" style="font-style:normal!important;">United States <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Sanford Wallace and Cyber Promotions were the target of a string of lawsuits, many of which were settled out of court, up through a 1998 Earthlink settlement<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (August 2008)">citation needed ]  that put Cyber Promotions out of business. AttorneyLaurence Canter was disbarred by the Tennessee Supreme Court in 1997 for sending prodigious amounts of spam advertising his immigration law practice. In 2005, Jason Smathers, a former America Online employee, pled guilty to charges of violating the CAN-SPAM Act. In 2003, he sold a list of approximately 93 million AOL subscriber e-mail addresses to Sean Dunaway who, in turn, sold the list to spammers.<sup class="reference" id="cite_ref-55" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 55<span style="font-style:normal!important;"> ] <sup class="reference" id="cite_ref-56" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 56<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In 2007, Robert Soloway lost a case in a federal court against the operator of a small Oklahoma-based Internet service provider who accused him of spamming. U.S. Judge Ralph G. Thompson granted a motion by plaintiff Robert Braver for a default judgment and permanent injunction against him. The judgment includes a statutory damages award of $10,075,000 under Oklahoma law.<sup class="reference" id="cite_ref-57" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 57<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In June 2007, two men were convicted of eight counts stemming from sending millions of e-mail spam messages that included hardcore pornographic images. Jeffrey A. Kilbride, 41, of Venice, California was sentenced to six years in prison, and James R. Schaffer, 41, of Paradise Valley, Arizona, was sentenced to 63 months. In addition, the two were fined $100,000, ordered to pay $77,500 in restitution to AOL, and ordered to forfeit more than $1.1 million, the amount of illegal proceeds from their spamming operation.<sup class="reference" id="cite_ref-NAME_58-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 58<span style="font-style:normal!important;"> ]  The charges included conspiracy, fraud, money laundering, and transportation of obscene materials. The trial, which began on June 5, was the first to include charges under the CAN-SPAM Act of 2003, according to a release from the Department of Justice. The specific law that prosecutors used under the CAN-Spam Act was designed to crack down on the transmission of pornography in spam.<sup class="reference" id="cite_ref-59" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 59<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In 2005, Scott J. Filary and Donald E. Townsend of Tampa, Florida were sued by Florida Attorney General Charlie Crist for violating the Florida Electronic Mail Communications Act.<sup class="reference" id="cite_ref-60" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 60<span style="font-style:normal!important;"> ]  The two spammers were required to pay $50,000 USD to cover the costs of investigation by the state of Florida, and a $1.1 million penalty if spamming were to continue, the $50,000 was not paid, or the financial statements provided were found to be inaccurate. The spamming operation was successfully shut down.<sup class="reference" id="cite_ref-61" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 61<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Edna Fiedler, 44, of Olympia, Washington, on June 25, 2008, pleaded guilty in a Tacoma court and was sentenced to 2 years imprisonment and 5 years of supervised release or probation in an Internet $1 million "Nigerian check scam." She conspired to commit bank, wire and mail fraud, against US citizens, specifically using Internet by having had anaccomplice who shipped counterfeit checks and money orders to her from Lagos, Nigeria, last November. Fiedler shipped out $609,000 fake check and money orders when arrested and prepared to send additional $1.1 million counterfeit materials. Also, the U.S. Postal Service recently intercepted counterfeit checks, lottery tickets and eBay overpayment schemes with a face value of $2.1 billion.<sup class="reference" id="cite_ref-62" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 62<span style="font-style:normal!important;"> ] <sup class="reference" id="cite_ref-63" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 63<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In a 2009 opinion, <span style="font-style:normal!important;">[http://en.wikipedia.org/wiki/Gordon_v._Virtumundo,_Inc. Gordon v. Virtumundo, Inc.], 575 F.3d 1040, the Ninth Circuit assessed the standing requirements necessary for a private plaintiff to bring a civil cause of action against spam senders under the CAN-SPAM Act of 2003, as well as the scope of the CAN-SPAM Act's federal preemption clause.<sup class="reference" id="cite_ref-Gordon2_64-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 64<span style="font-style:normal!important;"> ] ===<span class="mw-headline" id="United_Kingdom" style="font-style:normal!important;">United Kingdom <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In the first successful case of its kind, Nigel Roberts from the Channel Islands won £270 against Media Logistics UK who sent junk e-mails to his personal account.<sup class="reference" id="cite_ref-65" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 65<span style="font-style:normal!important;"> ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In January 2007, a Sheriff Court in Scotland awarded Mr. Gordon Dick £750 (the then maximum sum that could be awarded in a Small Claim action) plus expenses of £618.66, a total of £1368.66 against Transcom Internet Services Ltd.<sup class="reference" id="cite_ref-66" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 66<span style="font-style:normal!important;"> ]  for breaching anti-spam laws.<sup class="reference" id="cite_ref-67" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 67<span style="font-style:normal!important;"> ]  Transcom had been legally represented at earlier hearings, but were not represented at the proof, so Gordon Dick got his decree by default. It is the largest amount awarded in compensation in the United Kingdom since Roberts -v- Media Logistics case in 2005 above, but it is not known, if Mr. Dick ever received anything. (An image of Media Logistics' cheque is shown on Roberts' website<sup class="reference" id="cite_ref-68" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 68<span style="font-style:normal!important;"> ]  ) Both Roberts and Dick are well known figures in the British Internet industry for other things. Dick is currently Interim Chairman of Nominet UK (the manager of .UK and .CO.UK) while Roberts is CEO of CHANNELISLES.NET (manager of .GG and .JE).

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">Despite the statutory tort that is created by the Regulations implementing the EC Directive, few other people have followed their example. As the Courts engage in active case management, such cases would probably now be expected to be settled by mediation and payment of nominal damages. ===<span class="mw-headline" id="New_Zealand" style="font-style:normal!important;">New Zealand <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">In October 2008, a vast international internet spam operation run from New Zealand was cited by American authorities as one of the world’s largest, and for a time responsible for up to a third of all unwanted e-mails. In a statement the US Federal Trade Commission (FTC) named Christchurch’s Lance Atkinson as one of the principals of the operation. New Zealand’s Internal Affairs announced it had lodged a $200,000 claim in the High Court against Atkinson and his brother Shane Atkinson and courier Roland Smits, after raids in Christchurch. This marked the first prosecution since the Unsolicited Electronic Messages Act (UEMA) was passed in September 2007. The FTC said it had received more than three million complaints about spam messages connected to this operation, and estimated that it may be responsible for sending billions of illegal spam messages. The US District Court froze the defendants’ assets to preserve them for consumer redress pending trial.<sup class="reference" id="cite_ref-Stuff.co.nz_675386_69-0" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 69<span style="font-style:normal!important;"> ]  U.S. co-defendant Jody Smith forfeited more than $800,000 and faces up to five years in prison for charges to which he pled guilty.<sup class="reference" id="cite_ref-70" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 70<span style="font-style:normal!important;"> ] ===<span class="mw-headline" id="Bulgaria" style="font-style:normal!important;">Bulgaria <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] === <p style="font-family:'YesevaOne';margin-top:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">While most countries either outlaw or at least ignore spam, Bulgaria is the first and until now<sup class="noprint Inline-Template" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;">[http://en.wikipedia.org/wiki/Wikipedia:Manual_of_Style/Dates_and_numbers#Chronological_items <span style="font-style:normal!important;" title="The time period mentioned near this tag is ambiguous. (May 2014)">when? ] ]  only one<sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (May 2014)">citation needed ] to legalize it. According to the Bulgarian E-Commerce act<sup class="reference" id="cite_ref-71" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 71<span style="font-style:normal!important;"> ]  (Чл.5,6) anyone can send spam to mailboxes published as owned by a company or organization, as long as there is a "clear and straight indication that the message is unsolicited commercial e-mail" ("да осигури ясното и недвусмислено разпознаване на търговското съобщение като непоискано") in the message body.

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">This made lawsuits against Bulgarian ISP's and public e-mail providers with antispam policy possible, as they are obstructing legal commerce activity and thus violate Bulgarian antitrust acts. While there are no such lawsuits until now, several cases of spam obstruction are currently awaiting decision in the Bulgarian Antitrust Commission (Комисия за защита на конкуренцията) and can end with serious fines for the ISP's in question.<sup class="noprint Inline-Template" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;">[http://en.wikipedia.org/wiki/Wikipedia:Manual_of_Style/Dates_and_numbers#Chronological_items <span style="font-style:normal!important;" title="The time period mentioned near this tag is ambiguous. (May 2014)">when? ] ] <sup class="noprint Inline-Template Template-Fact" style="line-height:1;font-size:14px;white-space:nowrap;font-style:normal!important;">[<span style="font-style:normal!important;"><span style="font-style:normal!important;" title="This claim needs references to reliable sources. (May 2014)">citation needed ]

<p style="font-family:'YesevaOne';margin-top:0.5em;margin-bottom:0.5em;line-height:28px;color:rgb(37,37,37);font-size:17.5px;background-color:rgb(255,255,255);">The law contains other dubious provisions — for example, the creation of a nationwide public electronic register of e-mail addresses that do not want to receive spam.<sup class="reference" id="cite_ref-72" style="line-height:1;unicode-bidi:-webkit-isolate;font-size:14px;"><span style="font-style:normal!important;">[ 72<span style="font-style:normal!important;"> ]  It is usually abused as the perfect source for e-mail address harvesting, because publishing invalid or incorrect information in such a register is a criminal offense in Bulgaria. ==<span class="mw-headline" id="Newsgroups" style="font-style:normal!important;">Newsgroups <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] == ==<span class="mw-headline" id="See_also" style="font-style:normal!important;">See also <span class="mw-editsection" style="font-family:sans-serif;-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;unicode-bidi:-webkit-isolate;font-style:normal!important;"><span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">[ edit<span class="mw-editsection-bracket" style="color:rgb(85,85,85);font-family:'YesevaOne'!important;font-style:normal!important;">] ==
 * <span style="font-style:normal!important;">news.admin.net-abuse.email