Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Spam : a shadow history of the Internet
Brunton F., The MIT Press, Cambridge, MA, 2013. 296 pp. Type: Book (978-0-262018-87-6)
Date Reviewed: Mar 25 2014

One is amazed by the creative approaches used to exploit holes and opportunities in communication systems to, say, push a message or make money fast. We’ve all been trying to fight the annoying messages that we’re used to seeing in our mailboxes and across our computer screens. Sadly, it seems that we have mostly either given up or built immunity. This persistent onslaught of tricky communications is the subject of this book. It is a story of “The Technological Drama of Spam, Community, and Attention,” as one chapter title puts it. That story is excellently told.

In three parts, reflecting the relationship between the technology and the annoyances referred to as spam (without truly knowing the etymology of the word in this context, the meat, or the Monty Python references), the author walks us (and reminds us of our past pains) through the short history that is well known to most people. The early days include 1971 to 1994, when online communities were first emerging. This first section, “Ready for the Next Message,” recounts the building of the technological infrastructure we now know as the Internet, and the emergence of rules and behaviors as we were learning to play nice to each other behind our screens. Also featured in this section are the chat rooms, trusts, and protocols of communication, and the emergence of spam online, especially via email in the form of free information and pitches such as the “Green Card Lottery.”

The second section, “Make Money Fast: 1995-2003,” refreshes our memory about get-rich-quick schemes, especially those that report needs in exotic locations, ask for cash, and promise huge paybacks (which never actually materialize, even after an initial cash intervention is transferred). While the messages from Nigeria, for example, typically sought to secretly share a questionable windfall, many people contributed to plausible sounding organizations promising to help poor people (who never actually benefited from a single dime).

The last section, “The Victim Cloud,” covers the historical period from 2003 to 2010. The ideas in these new messages are the same, but the execution is different. It seems that we have learned some lessons on how to catch it more effectively. Today, we are dealing with content farms and social spam. Most of this new content boils down to algorithmic journalism.

Despite the fascinating advances in technological infrastructures, spam has proven resilient. The forms might have changed, but the annoyances have not.

If you start this book, plan to read 200 pages before even looking up. Occasionally, some anecdote will remind you of spam incidents you have personally experienced. On a larger scale, you may appreciate the ingenuity in the continual reincarnation of spamming approaches. What is next? Who knows, really? Regardless, we will learn to deal with it, figure out ways to combat it, move on, and fight again.

More reviews about this item: Amazon, Goodreads

Reviewer:  Goran Trajkovski Review #: CR142105 (1406-0413)
Bookmark and Share
  Featured Reviewer  
 
Electronic Mail (H.4.3 ... )
 
 
Abuse And Crime Involving Computers (K.4.2 ... )
 
 
History of Computing (K.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Electronic Mail": Date
Multimedia electronic mail
Borenstein N. Communications of the ACM 34(4): 117-119, 1991. Type: Article
Aug 1 1991
The Z-Mail handbook
Nelson H., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175767)
Oct 1 1992
Electronic mail
Panko R., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy