Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications

    E-Mail Bill May Fail to Curtail Spamming

    By
    eWEEK EDITORS
    -
    April 27, 2012
    Share
    Facebook
    Twitter
    Linkedin

      In my last column, I discussed the pending Unsolicited Commercial Electronic Mail Act of 2001 (H.R. 95) and compared its potential effectiveness with the ineffective Telephone Consumer Protection Act of 1991, which dealt with junk faxes.

      The thing that bothers me most about the proposed anti-spam bill is the matter of enforcement. As we all know, laws are only as strong as the deterrents set against them, and as far as Im concerned, on the big list of crimes against humanity, spammers may be the lowest priority in the entire crime spectrum.

      Lets assume the anti-spam bill becomes law and the next day you get spammed by 30 entities. Who are you going to call? Can you imagine the reaction if you were to call your local police department to report that someone in Canada sent you a spam e-mail? You could always report it to your states attorney general—that is, until they get so many they stop responding to spam reports. Remember, your state attorney general also takes action against fraud and scam artists who con money or whose products actually kill people. Where do you think your spam report will fit in their priorities? So that leaves only one option: suing the party who spammed you. That task could be formidable, at best.

      First, consider how much spam you get each day and the numerous sources from which it originates, most of the time from masked addresses. Now think about how much time it would take to backtrack each of the spam messages to its source. Once you do, how do you go about deciding what/whom to sue? If you make it this far, three to four months down the road you will finally get your court date. You better be sure to have some network and computer experts willing to testify that the accused IP address went from here to there, changing, mutating, eventually arriving in your in-box, because youll be in front of a judge who probably has little expertise in advanced computer networks.

      Finally, you win. But by the time you get back to your PC, there are 30 more spam messages waiting for you. Is this a process youre willing to go through, and if so, how often? Is this something your company is willing to spend your time on, or is it easier to simply click delete? Unlike junk fax, which is considered theft because perpetrators use your paper and toner to print their advertisements, spam isnt nearly as costly—it just takes some bandwidth and disk space. Sure, spam can be a security risk and a major annoyance, but whos going to actually go to court over it?

      This morning I was checking the logs of my personal firewall at home and noticed that 10 people tried to break into my computer while I was asleep. Are there laws in place for this, and if were going to be filling our courts with such cases, shouldnt hackers be our first priority?

      Avatar
      eWEEK EDITORS

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×