11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

speech recognition <strong>and</strong> synthesis 451that does not include Spam (the popular luncheon meat). Agroup <strong>of</strong> Vikings then keeps interrupting the conversationby loudly singing “Spam, lovely Spam, wonderful Spam. . . .”Segue to the mid-1990s when people (including a legal firm)began automatically posting hundreds <strong>of</strong> identical messageson Usenet (see netnews <strong>and</strong> newsgroups) groups; thesketch came to mind <strong>and</strong> the postings were quickly dubbed“spam”—although the term may actually date back to the1980s. As news <strong>of</strong> the spam grew, some administrators <strong>and</strong>users used “cancelbots” to automatically delete the <strong>of</strong>fendingmessages; others opposed this as censorship, <strong>and</strong> manynewsgroups became effectively unreadable.While spam can appear in any communications medium(including chat, instant messaging, <strong>and</strong> even blogs), themost prevalent type is e-mail spam, which costs U.S. businessesbillions <strong>of</strong> dollars a year in processing expenditures,lost time, <strong>and</strong> damage caused by malicious s<strong>of</strong>tware (malware)for which spam can be either a delivery vehicle or aninducement. In 2007 an estimated 90 billion spam messageswere sent each day.The fundamental driving force <strong>of</strong> spam is the fact that,given one has Internet access, sending e-mail costs essentiallynothing, no matter how many messages are sent. Thuseven if only a tiny number <strong>of</strong> people respond to a spamsolicitation (such as for sexual-enhancement products), theresult is almost pure pr<strong>of</strong>it for the spammer.Besides directly making fraudulent solicitations forproducts that are ineffective, counterfeit, or nonexistent,spam carries two other dangers: inducements to click tovisit fake Web sites (see phishing <strong>and</strong> spo<strong>of</strong>ing) <strong>and</strong>attachments containing viruses or other dangerous s<strong>of</strong>tware(see computer virus <strong>and</strong> spyware <strong>and</strong> adware).Fighting SpamMuch spam is spread by first compromising thous<strong>and</strong>s <strong>of</strong>systems (via viruses) <strong>and</strong> planting in them “bots,” or s<strong>of</strong>twarethat can be programmed to mail spam. The controllers<strong>of</strong> “botnets” can then sell their service to spammerswho want to get their message distributed widely. Thespammers can also buy lists <strong>of</strong> e-mail addresses that havebeen “harvested” from postings, poorly secured Web sites,<strong>and</strong> so on.Ways to stop the spread <strong>of</strong> spam include the following:• e-mail filtering s<strong>of</strong>tware, using a combination <strong>of</strong> textanalysis by keyword or statistical correlation (seeBayesian analysis) <strong>and</strong> lists <strong>of</strong> Internet locations(domains) associated with spamming; filtering can bedone both by service providers <strong>and</strong> individual users,or collaboratively• tightening the technical requirements for messages tobe accepted by mail servers (much spam has poorlyformatted headers)• improving techniques for blocking the viruses usedby spammers to set up their bots—see computervirus <strong>and</strong> firewall• attempting to shut down the infrastructure that supportsspam operations, such as hosts who allow bulke-mail, <strong>and</strong> sellers <strong>of</strong> spamming s<strong>of</strong>tware <strong>and</strong> illicitlygathered address listsSpam is illegal in a number <strong>of</strong> respects. Spamming is againstthe “acceptable use policy” <strong>of</strong> most Internet Service Providers(ISP), though willingness to enforce these rules varies.In 2003 Congress passed the CAN-SPAM act, whichbans bulk e-mail that contains misleading subject or headerlines, but has been criticized for being weak <strong>and</strong> for preemptingmore stringent state laws. (The law also requiresthat messages include an opt-out provision, but spammerssimply use this to verify that the e-mail address is valid.)Although filtering s<strong>of</strong>tware <strong>and</strong> other measures canreduce the amount <strong>of</strong> spam seen by the average user, spammers<strong>and</strong> spam-fighters continue their relentless battle witheach countermeasure, leading to altering the spam to makeit more likely to pass through. In the long run probablyonly a Net-wide authentication <strong>of</strong> all e-mail senders <strong>and</strong>/ora small per-message e-mail fee could effectively banish thescourge <strong>of</strong> spam.Further ReadingBoutin, Paul. “Can E-mail Be Saved?” InfoWorld, April 16, 2004.Available online. URL: http://www.infoworld.com/article/04/04/16/16FEfuturemail_1.html. Accessed November 18, 2007.Garretson, Cara. “12 Spam Research Projects That Might Make aDifference.” Network World, November 2007. Available online.URL: http://www.networkworld.com/news/2007/112007-spamresearch.html.Accessed April 28, 2008.Gregory, Peter H., <strong>and</strong> Michael A. Simon. Blocking Spam & Spywarefor Dummies. Hoboken, N.J.: Wiley, 2005.Lee, Nicole. “How to Fight Those Surging Splogs” [spam blogs].Wired News, October 27, 2005. Available online. URL: http://www.wired.com/culture/lifestyle/news/2005/10/69380.Accessed November 18, 2007.Mark<strong>of</strong>f, John. “Attack <strong>of</strong> the Zombie <strong>Computer</strong>s Is a GrowingThreat.” New York Times, January 7, 2007. Available online.URL: http://www.nytimes.com/2007/01/07/technology/07net.html. Accessed November 18, 2007.McWilliams, Brian S. Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, <strong>and</strong> %*@)# Enlargements.Sebastapol, Calif.: O’Reilly, 2004.Naughton, Philippe. “Arrest <strong>of</strong> ‘Spam King’ No Relief for Inboxes.”Times (London) online, June 1, 2007. Available online. URL:http://technology.timesonline.co.uk/tol/news/tech_<strong>and</strong>_web/article1870548.ece. Accessed November 18, 2007.Spammer-X. Inside the Spam Cartel: Trade Secrets from the DarkSide. Rockl<strong>and</strong>, Mass.: Syngress, 2004.Zeller, Tom. “The Fight Against V1@gra (<strong>and</strong> Other Spam).” NewYork Times, May 21, 2006. Available online. URL: http://www.nytimes.com/2006/05/21/business/yourmoney/21spam.html?_r=1&oref=slogin. Accessed November 18, 2007.speech recognition <strong>and</strong> synthesisThe possibility that computers could use spoken languageentered popular culture with Hal 2001, the self-aware talkingcomputer in the film 2001: A Space Odyssey. On a practicallevel, the ability <strong>of</strong> users to communicate using speechrather than a keyboard would bring many advantages, suchas mobile, h<strong>and</strong>s-free computing <strong>and</strong> greater independencefor disabled persons. Considerable progress has been madein this technology since Hal “talked” in 1968.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!