14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

146 Edges<br />

spam while still permitting all “meaningful” e - mail to penetrate safely.<br />

And still it is a foregone conclusion that each e - mail session will require<br />

a certain amount <strong>of</strong> manual spam identification and deletion.<br />

Spam is not quite as aggressive as a computer virus or an Internet worm,<br />

and though spam attachments can be viruses or worms, spam is by<br />

and large something to be deleted or marked as trash. As an informational<br />

entity, spam is less a question <strong>of</strong> antivirus protection and more<br />

one <strong>of</strong> bureaucratic data management: algorithmic filtering <strong>of</strong> the<br />

meaningful from the meaningless, marking the corralled messages for<br />

deletion, junking attachments from mailboxes, and approving or deny -<br />

ing the status <strong>of</strong> one message over another. Spam leverages the low<br />

marginal costs <strong>of</strong> electronic mail by exploiting the flaws (some would<br />

say features) <strong>of</strong> the planetary e - mail network and in doing so elicits<br />

an antagonistic response from users in the form <strong>of</strong> informatic network<br />

management.<br />

Spam signifies nothing and yet is pure signification. Even <strong>of</strong>fline<br />

junk mail, anonymously addressed to “Current Resident,” still contains<br />

nominally coherent information, advertising a clearance sale or fastfood<br />

delivery. Spam is not anonymous, for a receiver address is a technical<br />

requirement, and yet its content has no content, the receiver<br />

address the result <strong>of</strong> algorithmic data collection and processing done<br />

by Web spiders and collected in massive databases. Often spam uses<br />

Web bugs that call back to a central server, confirming the existence<br />

<strong>of</strong> the receiver’s address, nothing more, nothing less. <strong>The</strong> spam might<br />

be deleted, but the damage is done. A subject line might advertise<br />

one thing—typically the three P’s, porn, pharmaceuticals, and payment<br />

notices—but <strong>of</strong>ten the body <strong>of</strong> the e - mail advertises something<br />

else entirely. Misspellings and grammatical errors are strategic<br />

in spam e - mails, in part to elude spam filters in an ever - escalating<br />

game <strong>of</strong> syntactic hide - and - seek. Thus Ambien becomes “Amb/ en,”<br />

or Xanax becomes “X&nax.” Many spam generators use keywords<br />

from e - mail subject headings and recombine those terms into new<br />

subject headings. But in the end, spam e - mail simply wants to generate<br />

a new edge for the graph; it wants the user to click on a URL, or<br />

to open an attachment, either action a new link in the net.<br />

In the midst <strong>of</strong> all this, something has happened that may or may<br />

not have been intentional. Spam e - mails, with their generated mis-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!