Spam: A Shadow History of the Internet
By Finn Brunton
4/5
()
About this ebook
The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand.
This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms—spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.
Related to Spam
Related ebooks
War of the Web: Book One: The Battle of the Clouds Rating: 0 out of 5 stars0 ratingsThe Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers Rating: 4 out of 5 stars4/5Network Culture: Politics For the Information Age Rating: 5 out of 5 stars5/5The Dark Cloud: how the digital world is costing the earth Rating: 0 out of 5 stars0 ratingsThe History of the Internet in Byte-Sized Chunks Rating: 0 out of 5 stars0 ratingsCypherpunks: Freedom and the Future of the Internet Rating: 4 out of 5 stars4/5Holding On to Reality: The Nature of Information at the Turn of the Millennium Rating: 3 out of 5 stars3/5Eaves Drop Rating: 0 out of 5 stars0 ratingsNeurosphere: The Convergence of Evolution, Group Mind, and the Internet Rating: 0 out of 5 stars0 ratingsSurfing the Internet Rating: 0 out of 5 stars0 ratingsCutting the Cord: The Cell Phone has Transformed Humanity Rating: 0 out of 5 stars0 ratingsThe Spy in the Coffee Machine: The End of Privacy as We Know It Rating: 0 out of 5 stars0 ratingsX-Events: The Collapse of Everything Rating: 3 out of 5 stars3/5Reset: Reclaiming the Internet for Civil Society Rating: 0 out of 5 stars0 ratingsFolk Culture in the Digital Age: The Emergent Dynamics of Human Interaction Rating: 0 out of 5 stars0 ratingsToward a Conceptual Framework for the Study of Folklore and the Internet Rating: 0 out of 5 stars0 ratingsConnections Rating: 4 out of 5 stars4/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 3 out of 5 stars3/5Closer Together, Further Apart: The Effect of Technology and the Internet on Parenting, Work, and Relationships Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5SAFE: Science and Technology in the Age of Ter Rating: 3 out of 5 stars3/5True Names and the Opening of the Cyberspace Frontier Rating: 4 out of 5 stars4/5NREN Rating: 0 out of 5 stars0 ratingsEaves Drop Rating: 0 out of 5 stars0 ratingsThe New Age of Communications Rating: 4 out of 5 stars4/5High Tech Trash: Digital Devices, Hidden Toxics, and Human Health Rating: 4 out of 5 stars4/5Cave Lupus Rating: 0 out of 5 stars0 ratingsDigital Mythologies: The Hidden Complexities of the Internet Rating: 4 out of 5 stars4/5Information Politics: Liberation and Exploitation in the Digital Society Rating: 0 out of 5 stars0 ratings
Computers For You
101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 5 out of 5 stars5/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsAlan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5Uncanny Valley: A Memoir Rating: 4 out of 5 stars4/5Excel 101: A Beginner's & Intermediate's Guide for Mastering the Quintessence of Microsoft Excel (2010-2019 & 365) in no time! Rating: 0 out of 5 stars0 ratingsThe Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 4 out of 5 stars4/5The Best Hacking Tricks for Beginners Rating: 4 out of 5 stars4/5Pro Tools All-in-One For Dummies Rating: 5 out of 5 stars5/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsSQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5A Slackers Guide to Coding with Python: Ultimate Beginners Guide to Learning Python Quick Rating: 0 out of 5 stars0 ratingsWhat Video Games Have to Teach Us About Learning and Literacy. Second Edition Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Learning the Chess Openings Rating: 5 out of 5 stars5/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5
Reviews for Spam
11 ratings1 review
- Rating: 5 out of 5 stars5/5Thank You This Is Very Good, Maybe This Can Help You
Download Full Ebook Very Detail Here :
https://amzn.to/3XOf46C
- You Can See Full Book/ebook Offline Any Time
- You Can Read All Important Knowledge Here
- You Can Become A Master In Your Business
Book preview
Spam - Finn Brunton
© 2013 Massachusetts Institute of Technology
All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher.
Library of Congress Cataloging-in-Publication Data
Brunton, Finn, 1980–
Spam : a shadow history of the Internet / Finn Brunton.
p. cm.—(Infrastructures)
Includes bibliographical references and index.
ISBN 978-0-262-01887-6 (hardcover : alk. paper)
ISBN 978-0-262-31395-7 (retail e-book)
1. Spam (Electronic mail)—History. I. Title.
HE7553.B78 2013
384.3′4—dc23
2012034252
10 9 8 7 6 5 4 3 2 1
d_r1
This book is dedicated to the memory of Gunard Solberg, dear friend and inspiration, deeply missed.
Contents
Acknowledgments
Introduction: The Shadow History of the Internet
Prelude: The Global Spam Machine
The Technological Drama of Spam, Community, and Attention
The Three Epochs of Spam
1 Ready for Next Message: 1971–1994
Spam and the Invention of Online Community
The Wizards
The Charivari
For FREE Information via Email
2 Make Money Fast: 1995–2003
Introduction: The First Ten Moves
The Entrepreneurs
Building Antispam
You Know the Situation in Africa: Nigeria and 419
The Art of Misdirection
3 The Victim Cloud: 2003–2010
Filtering: Scientists and Hackers
Poisoning: The Reinvention of Spam
New Twist in Affect
: Splogging, Content Farms, and Social Spam
The Botnets
Conclusion
Notes
Bibliography
Index
Acknowledgments
This book owes its start as a dissertation to Christopher Fynsk and Mario Biagioli. Without their advice, encouragement, feedback, provocations, and patience, it would never have been written. James Leach and Timothy Lenoir were kind enough to sit on my dissertation committee, where they provided excellent comments towards that document eventually becoming this book. Its production would likewise have been impossible without the conversation and support of Helen Nissenbaum while I was at NYU; portions of this book were written at NYU while funded by grants from the National Science Foundation (CNS/NetS 1058333) and the AFSOR-MURI Presidio grant. Paul Edwards, Gabrielle Hecht, and the STS Reading Group at the University of Michigan in Ann Arbor read a full draft of this manuscript and gave a writer’s dream of thorough, exacting, and unfailingly helpful comments and advice. Finally, this book would not have taken shape without the work of Marguerite Avery, Katie Persons, Kathleen Caruso, Nancy Kotary, Celeste Newbrough, and the reviewers at MIT.
Many of the ideas, examples and conclusions in this book evolved while in conversation with Lucy Alford, C. W. Anderson, Gus Andrews, Burhanuddin Baki, Don Blumenfeld, danah boyd, Mia Sara Bruch, Douglass Carmichael, Michael Cohen, Sande Cohen, Gabriella Coleman, Jean Day and the reviewers at Representations, Charlie DeTar, Alexander Galloway, Kristoffer Gansing, Lisa Gitelman, Matt Gleeson, Sumana Harihareswara, Sean Higgins, Micah Jacob, Ben Kafka, Daniel V. Klein, Jorge Ledo, Joanne McNeil, Ben Marsden, Jay Murphy, Kathryn Myronuk, Quinn Norton, Camille Paloque-Bergès, Jussi Parikka, Leonard Richardson, Nora Roberts, Erica Robles, Tony Sampson, Luke Simcoe, Fred Turner, and a number of people who would like to remain anonymous. Thanks so much to you all. Any mistakes are, of course, my own.
Introduction: The Shadow History of the Internet
Prelude: The Global Spam Machine
Pitcairn Island in the South Pacific is the smallest and least populated jurisdiction in the world, described by the first mariner to observe it as a great rock rising out of the sea . . . about a thousand leagues westward to the continent of America.
¹ It’s a lonely place; when the Bounty mutineers needed a refuge from the global empire whose laws they’d broken, they sailed for Pitcairn and vanished for almost two decades. As of last year’s electoral rolls, there are 45 people on Pitcairn, most of them descended from the mutineers. There is a government-subsidized satellite Internet connection for the island’s houses. Per capita, Pitcairn Island is the world’s number-one source of spam.
How is this possible? Can this island, whose major export industries are handicrafts for passing ships and stamps for philatelists, host a cabal of spammers bombarding the world with phishing messages and Viagra ads by satellite connection? In the list of spam production per capita, Pitcairn is followed by Niue and Tokelau, also in the South Pacific; the Principality of Monaco, whose population overwhelmingly consists of rich expatriates dodging taxes in the world’s second smallest country; and the Principality of Andorra, a country one-fifth the size of Rhode Island.² Are there really that many Catalan-speaking Andorran spam barons, accumulating stolen credit card data by the ski slopes of the Pyrenees?
The answer is no, of course. The Polynesians who live on Niue, like the wealthy Europeans overlooking the Mediterranean, have been unknowingly conscripted into the business of spam. Virtually all of us on the Internet have been, on one side or another. Spam has changed laws and communities at the points of friction where the network’s capacities rub against prior orders of work and governance. It has changed our language, economics, and culture and exerted a profound effect on our technologies. It has subtly—and not so subtly—deformed the shape of life online, pulling it into new arrangements that make no more sense than the movement of the galaxies unless you allow for the mass of all the dark matter. Only at scale, in time and in space, can we begin to bring this shape into focus. It stretches from embryonic computer networks in the 1960s and 1970s to the global social graph of 2010, from the basements of MIT to the cybercafés of Lagos, Rotterdam, and Tallinn. It encompasses points across the network from covert chat channels to Google’s server farms to ghost number blocks
to anonymous banks of airport pay phones. The spam most of us experience every day as a minor and inexplicable irritant is like the lonely rock that sailor sighted, merely the visible peak of vast and submerged infrastructures with much to say about the networked world.
The word spam
means very different things to different people at different times. It is a noun, collective and singular, as this spam
can mean all these messages I’ve received
or this particular email.
It is a verb, as in they spam me,
and an adjective, as in this is spammy.
It refers to many varieties of exploitation, malfeasance, and bad behavior, and spam terminology has branched out into specific subdomains, from phishing spam
and 419 spam
to splogs, linkfarms, floodbots, content farms. (All of these new terms and forms will be defined and described in the following chapters.) It can easily slide into what philosophers call the sorites paradox
(sorites,
appropriately for talking about spam, comes from the Greek word for heap
or pile
) to describe the linguistic confusion between grains of sand and sand
in dunes, the moment at which individual bits become a single big pile. When spam
is discussed in journalism or casual conversation, the word is often meant as I have used it in the previous paragraph, as a unified substance or a continuous event, like smog or a mass or pulp,
as Susanna Paasonen puts it.³ But spam begins to make sense only when we get specific and separate out the different types, motives, actors, and groups.
Spam is not a force of nature but the product of particular populations distributed through all the world’s countries: programmers, con artists, cops, lawyers, bots and their botmasters, scientists, pill merchants, social media entrepreneurs, marketers, hackers, identity thieves, sysadmins, victims, pornographers, do-it-yourself vigilantes, government officials, and stock touts. Long as it is, this list mentions only those who live there more or less full-time, because everyone online participates in the system of spam, however indirectly. We fund and enable it with choices we make and trade-offs we are willing to accept because the benefits to the network outweigh the costs. We generate areas of relevance and attention whose discovery and exploitation is the heart of the business. We alter how spam works and break up its current order with choices, refusals, and purchases whose consequences we may not understand.
Those houses on Pitcairn, for example, connected to their satellite link, do not shelter spammers hard at work. At some point, a few of the computers on Pitcairn were taken over by a piece of malware, probably arriving as the misleading payload of a spam message that appeared to come from a friend, taking advantage of unpatched or insecure software that can be daunting for the user to maintain. This malware quietly commandeered the computers without their owners ever noticing (perhaps they merely thought that the machine, and the Internet connection, had become a little slower) and enrolled them along with many thousands of other captured computers in homes and offices around the world into a system called a botnet.
One of the functions of the botnet is to use spare computer power and Internet connection bandwidth to send out spam messages on behalf of the botnet’s controller, who can thus generate hundreds of millions of messages at effectively no cost. A desktop computer, manufactured in Shenzhen or Xiamen or Chennai, powered by a diesel generator and online through a satellite over the Tropic of Capricorn, on a remote island in the Melvillean Pacific, has become part of a distributed machine controlled by a remote group of botmasters in Denver or St. Petersburg. This is a system unprecedented in human history, a vision out of science fiction, that writes constantly repeating messages of crushing banality: YOU HAVE WON!!!/Congratulations!!! You have won £250,000.00POUNDS from Pepsi Company award 2010, Please provide your Full name, Age, Sex, Country, Occupation
; Permanent En1argedPenis/She prefers your lovestick bigger
; Listen up. I must let you in on a few insider *secrets*: Instead of waiting months to generate sales on your site, you can start gaining the hits you want right now.
The Technological Drama of Spam, Community, and Attention
This is a book about spam for anyone who wants to understand what spam is, how it works, and what it means, from the earliest computer networks to the present day. To understand spam means understanding what spam is not, because—as you will see—the history of spam is always a history of shifting definitions of what it is that spam harms and the wrong that it produces. The history of spam is the negative shape of the history of people gathering on computer networks, as people are the target of spam’s stratagems. It is defined in opposition to the equally shifting and vague value of community.
(In fact, many of the early cases of spam provoke groups of people on computers into the task of self-definition and self-organization as communities.) To put this history and this book into a single sentence: spamming is the project of leveraging information technology to exploit existing gatherings of attention.
Attention, the scarce resource of human notice, is what makes a community on the network, and the creation of communities, the invention of we
on the Internet, is an act of attention. Communities and spam as a whole are projects in the allocation of attention, and spam is the difference—the shear—between what we as humans are capable of evaluating and giving our attention, and the volume of material our machines are capable of generating and distributing when taken to their functional extremes.⁴ Over four decades of networked computing, spammers have worked in that gulf between our human capacities and our machinic capabilities, often by directly exploiting the same technologies and beneficial effects that enable the communities on which they predate. These two forces build, provoke, and attack each other, and the history of one cannot be understood without accounting for its nemesis.
This co-constitutive feedback loop between communities and spammers is a major event in the technological drama that is the Internet and its sister networks. This term, technological drama,
is from the work of Bryan Pfaffenberger and provides framing and context for the story to come; it is the life of a technology, from conception and design through adoption, adaptation, and obsolescence.⁵ Why a drama? Because technologies are statements about the distribution of needful things such as power, status, access, wealth, and privilege, for good and for ill. They are stages on which social and political arguments and counterarguments are made. These arguments may be not merely irrational but also deeply cultural and ritualistic, expressing convictions that lie well beyond the immediate physical constraints of engineering. A technological drama is suspenseful: it is not played out to foregone conclusions but is rife with the possibility of subversion, takeover, and unexpected captures. It is a drama of escalation and feedback loops, for technologies are never merely passive vessels for holding ideas and ideologies but active things in the world that open new possibilities and capacities. They change the communities that created them and those that take them up.
The inciting incident that frames any technological drama and gets it moving is the gathering of a design constituency,
in Pfaffenberger’s phrase. Constituency
is well-chosen, because we are not simply referring to the engineers, inventors, scientists, or designers who actually work the lathe, draw out the blueprints, or blow the glass but to the entire body of people who participate in the design and who stand to directly benefit from the technology’s success. It is to their benefit if it sells, of course, assuming that it is the kind of technology that can be commoditized into widgets and not, for instance, a civil engineering project. More important, however, is that the values embedded in the technology, intentionally or unintentionally, become dominant. Those values reflect an arrangement of power, control, and prestige that the design constituency would like to see in the world, whether centralized and privatized, open and egalitarian, or otherwise. This design constituency can include the engineers and applied designers themselves, as well as managers and shareholders in firms, but also politicians, experts, theorists, and elites. What is complex and important here is to be able to view technologies in two ways at once: seeing both their physical capacities and functions, and their social and political assertions—the moves they make in the allocation of resources and power. We will explore computer networks and the people building and using them with this perspective.
To get some perspective on how technological dramas work as an analytic tool, consider the case of heavier-than-air aviation. No one would argue against the profound benefits delivered by the development of powered flight, but to really understand the adoption and adaptation of the technology we must account for the acts of political stake-planting and the renegotiations of influence and control that went with it. Aviation’s roots included the powerful early idea of air-mindedness,
for which planes were not just powered, winged craft for flight but objects whose existence was a direct expression of a rational, modern, and global mindset that would simultaneously bring about world peace and subdue colonized populations through bombing.⁶ H. G. Wells, for instance, in his role as a public intellectual and policy advocate, framed the work of getting from one place to another by air as nothing less than the formation of a new generation of intellectual pilot-samurai who would enforce a technocratic world state. This coming class would be necessarily scientific, cosmopolitan, and forward thinking, because they used planes. Airplanes, Le Corbusier asserted, were an indictment, an accusation, a summons
to architects and city planners, shaming their retrograde ideas: planes were pure futurity, the avatars of the machine age.⁷ At the same moment, figures such as Gabriele D’Annunzio, aviator and Fascist literary icon, and Italo Balbo, commander of Italian North Africa and leader of the famous Century of Progress Rome–Chicago flight, were using both the glamour and threat of flight as an assertion of Fascism’s fusion of futuristic dynamism with nationalist and archaic agendas. In the United States, flight included the democratic vision of self-taught tinkerers hacking on planes in barns and garages and potent assertions of military superiority and the projection of power abroad in an abruptly smaller world. And so on. This many-layered complexity of motives, ideas, fantasies, and goals obtains across the technological domain. To understand any technical event in depth, we need to be able to describe the full range of interests in the work of the design constituency.
The other side of the drama is the impact constituency,
those whose situation is being changed by what the design constituency produces. Neil Postman simply called them the losers,
because the rearrangement of the world, although not necessarily one in which they lose out explicitly, is one over which they have little initial control. Examples from Pfaffenberger’s research are particularly well suited for this purpose. Consider the politics of irrigation projects in Sri Lanka, a particularly bald-faced attempt at social engineering via technological deployment. Landed, powerful, and deeply anti-industrial local elites sought to manage the threat of dispossessed, dissatisfied, and mobile peasants by creating a neatly controllable system of rural settlements. It was a project of getting them back on the farm, to put it simply, where they would stay ignorant of modernity and easier to tax and manage, forestalling the arrival of an industrial order in which the landholding brown sahibs
stood to lose. The landholders did the designing, and peasants felt the impact. James C. Scott’s work provides several cases along these lines—of compulsory villagization, collectivization of agriculture, and high modernist urban planning—in which the capture and redistribution of value is exerted through the production of artifacts, places, and systems of living, always framed as for their own good.
⁸ We could also speak on the far smaller and more intimate scale of something like the Victorian household’s hallway bench, with its ornate mirrors and carved hooks, for the household’s masters to view as they walk by and hang their hats, and the strikingly uncomfortable bare low bench on which the servants, messengers, and peddlers are to sit and wait.
What makes these relationships of design and impact into a drama is the back-and-forth of technological statements and counterstatements. After the original assertion made in the design and deployment of a technology come the responses, as the impact constituencies take things up, change them, and accept them or fight back. The design constituency cooks up methods and language for using technologies to arrange, distribute, or contain power, status, and wealth, and impact constituencies have countermoves available. They can produce arguments to get their hands on the technology, for instance, and reconstitute it, which does not merely ameliorate the painful setbacks produced by the deployment but actually generates a new technology that builds on the old for their own purposes.
The most obvious and canonical instance of reconstitution in a technological drama, producing a counterartifact
out of the existing technology, is the personal computer. Decades of development in computing had been the product of the military, academia, and contractors and corporations such as IBM. The computer was the government machine,
sitting in the ballistics lab and running models for building nuclear weapons and game theory analyses of Cold War outcomes.⁹ Computing had become virtually synonymous with a bureaucratic, administered society in which people were subsumed as mere components, in what Lewis Mumford termed the megamachine.
Against this concept came the first hackers and subversive tinkerers, activists, and artists, with Ted Nelson (who coined the term hypertext
) asserting, "You can and must understand computers now,
countercomputers" for the counterculture, the Homebrew Computer Club, the Apple I and II, and so on.¹⁰ The drama never stops, and Fortune’s wheel keeps turning, casting down and raising up and demanding new technical statements and counterstatements.
Getting a significant new technology that is instilled with cultural values and political goals to work
is an act of assembly, of mobilizing different groups, ideas, forces, and stakeholders together. There needs to be a flexibility to the idea, enough that you can pull heterogeneous and sometimes even opposed powers into an alliance behind it. A technology too clearly and narrowly defined may not be able to develop all the alliances it needs. For the Sri Lankan irrigation project, it meant creating a complicated alliance of ethnic and religious chauvinism, paternalistic philanthropy, opposition to the old British colonial order (by an elite whose power derived from the restructuring of society under the British), and so on. A similar multiplex set of alliances could be seen in the free/libre open source software (FOSS) movement, with businesses, individual charismatic activists, developers, and political radicals of many stripes and very diverse agendas trying to gather under the same banner. The epic semantic fork between the models of open source and free software in 1998 captures one of the moments when the ambiguities became unsustainable and had to be reformulated. Movement,
writes Christopher Kelty, is an awkward word; not all participants would define their participation this way. . . . [They] are neither corporations nor organizations nor consortia (for there are no organizations to consort); they are neither national, sub-national, nor international; they are not ‘collectives’ because no membership is required or assumed. . . . They are not an ‘informal’ organization, because there is no formal equivalent to mimic or annul. Nor are they quite a crowd, for a crowd can attract participants who have no idea what the goal of the crowd is.
¹¹ This complex mesh, sharing practices and debating ideology, is a design constituency, gathering around the technology and trying to marshal support for different and sometimes conflicting visions to push the project into the world.
This process of gathering and marshaling is strengthened by some founding ambiguities. These let the designers cast a wide net and make it easier to argue that this technological project speaks for you, too. Some of these ambiguities are invoked of necessity. The story that a design constituency builds to draw in stakeholders from different domains to support a new technology must draw on what Victor Turner terms root paradigms,
the deep organizing principles of a culture and an epoch that provide a rationale and a motive for action. Root paradigms aren’t exact and precise, and they are never simply true or false. Whether they be submission to the free market, the sanctity of human life, the vital and cleansing power of war, or the unquestionable role of the dynastic king, root paradigms are dynamic, messy, and enormously powerful concepts built on internal oppositions. They draw their energy and vitality from their unsettled condition of irreconcilable struggle within which new technologies, political initiatives, and movements can be placed and contextualized. At major turning points in the development of the Internet and spam, struggles between constituencies were played out that drew on far older root paradigms such as absolute freedom of speech, communal self-defense and self-organization, the technological autonomy of the capable individual, the inevitability of destructive anarchy without governance, and the centrality of commerce to society. The presence of these paradigms gives technological deployments the thrilling, and often later inexplicable, attraction of social movements (because that is, in fact, what they are). They draw their strength from roots sunk deep into the earth, where the bones of prior orders and the ruins of previous civilizations underlie the present.
These foundational ambiguities in a technology’s design are a crucial resource for the impact constituencies and others to exploit. Sally Moore describes how a reworking of the arrangements introduced by a technology is made possible, by exploiting the indeterminacies of the situation, or by generating such indeterminacies . . . areas of inconsistency, contradiction, conflict, ambiguity, or open areas that are normatively indeterminate.
¹² The indeterminate space is the place for trade-offs and concessions, ways to get many diverse parties working together and pointed in the general direction envisioned by the design constituency. It is also leaves apertures and affordances in the plan for the manipulation, escapes, and exploitation of others, from innovations and improvements to exploits and deliberate sabotage—and thus for things like spam.
This complex indeterminacy obtained at every stage of the Internet’s development. As will be discussed later in this book, there was deep uncertainty and widely varying understandings as to what this thing was to be and how it should be used by people and by hardware and software. This uncertainty was an enormous boon for innovators and inventors, for the strange frontiers of network culture, and for both hackers and criminals, whose somewhat blurry relationship and ambiguous legal status recurs in this history. Spam survived and prospered by operating in the edge cases around these big ideas, in the friction between technical facts and the root paradigms that are expressed in them where powerful concepts like trust, anonymity, liberty, and community online were reinvented, modified, and sometimes discarded. In following spam, we will explore how these ideas evolved and, above all, how human attention online, and the strategies for capturing it, changed over time.
The Three Epochs of Spam
Appropriately for a technological drama, the history of spam has three distinct acts, which are reflected in this book’s three sections. The first, from the early 1970s to 1995, begins with conversations among the architects of the earliest computer networks, who were trying to work out acceptable rules, mores, and enforcement tools for online communication. It closes with the privatization of the Internet and the end of the ban on commercial activity, the arrival of the Web, and the explosion of spam that followed the Green Card Lottery message on Usenet in May 1994. It is a quarter-century of polylogue concerning the fate and the purpose of this astonishing thing the online population was fashioning and sharing (polylogue
being a term from an early computer network for this new form of asynchronous and many-voiced conversation on screens). It includes a remarkable cast of postnational anarchists, baronial system administrators, visionary protocol designers, community-building process queens,
technolibertarian engineers, and a distributed mob of angry antispam activists. It is an era of friction between concepts of communal utility, free speech, and self-governance, all of which were shaped in a negative way by spam. Spam
here is still used in its precommercial meaning of undesirable text, whether repetitive, excessive, or interfering. The imminent metamorphosis of these ideas as the values and vision of the network changed in the mid-1990s was partially signaled and partially led by changes in spam’s significance and means of production.
The next phase lasts about eight years, from 1995 to 2003, or from the privatization of the network through the collapse of the dot-com boom and the passage of the CAN-SPAM Act in the United States. It is about money and the balance between law and collective social action. Those years are filled with the diversification of spam into a huge range of methods and markets, following and sometimes driving innovations on the Internet and the Web, from search engine manipulation and stock market pump-and-dump
schemes to fake password requests and Nigerian prince
fraud campaigns. During this time, a strange class of magnates and hustlers is born, arbitraging the speed of new technological developments against the gradual pace of projects to regulate them. Their nemeses start here as well, with antispam projects ranging from message-filtering programs to laws and coordinated campaigns of surveillance, research, and harassment. This period is fraught with uncertainty about the role of nations and territorial boundaries online, the ambiguous rights and responsibilities of users,
and the relationship between what algorithms can process and what humans can read.
The most recent phase, from 2003 to the present day, turns on these questions of algorithms and human attention. A constellation of events is dramatically changing the economics of the spam business: the enforcement of laws, the widespread adoption of powerful spam filters, and the creation of user-produced content tools. To keep the business profitable, those spammers who survive the transition will develop systems of automation and distributed computing that span the globe and lead to military applications—building nothing less than a criminal infrastructure. In turn, antispammers will rely on sophisticated algorithms and big data to minimize the labor of catching and blocking spam messages. As spam prefigured and provoked crises in community and governance on the Internet, it now shows us an imminent crisis of attention—in the most abject and extreme form, as always. After four decades of interrupting conversations, grabbing clicks, demanding replies, and muddling search results, spam has much to teach us about the technologies that capture our attention, now and to come.
1 Ready for Next Message: 1971–1994
Spam and the Invention of Online Community
Life will be happier for the on-line individual because the people with whom one interacts most strongly will be selected more by commonality of interests and goals than by accidents of proximity.
—J. C. R. Licklider and Robert Taylor, 1968
Those who buy into the myth that Cyberspace is a real place also believe that this illusory locale houses a community, with a set of laws, rules, and ethics all its own. Unfortunately, the perceived behavior codes of Cyberspace are often in conflict with the laws of more substantive lands like, for instance, the United States of America.
—Lawrence Canter and Martha Siegel (creators of the green card lottery spam), 1995
Galapagos
To understand the history and the meaning of spamming in depth, we need to understand the history of computer networks, the people on them, and the cultures they created. In many ways, the most remarkable thing about the word spam
is its transitivity and portability. It is used to talk about completely different kinds of activity, not just on different websites or applications but on completely different networks. Forms of spamming
existed on networks like Usenet and The WELL, quite distinct from the Internet, as well as on email and the web, and web-based systems from blog comments and wikis to Twitter. What do we mean, then, by a network of computers—the prerequisite for spam? It is something contingent and historically complex, something that could have developed in very different ways. There was not one network, but many. Spam, in all its meanings, is entwined with this polymorphic history.¹
Initially, computer networks were specific to types of machines, institutions, and projects. The Internet, when it came, was the network of these networks, and early forms of spam retained some local character from the different kinds of systems on which they developed. In the beginning, the programmers would create an operating system specifically for a single computer, purpose-built for a customer’s goals. Likewise, the engineers and architects built each network for its specific purpose, with an enormous diversity of approaches, and it is important to remember how many and how strange were the systems made so computers could talk together.
For a start, there were networks for businesses, such as the international packet-switching network (using the same technology underlying the Internet) for managing airline reservations in the late 1960s and the General Electric Information Services, part of GE’s construction of their own continent-wide network for internal use. There were military defense networks, such as the Semi-Automatic Ground Environment or SAGE, fully operational in 1963, which could display all of U.S. airspace in real time so that the Air Defense Command could spot potential enemy planes and coordinate a response, using lightguns to click
on the screen. It was a milestone of technological planetary visualization running for crewcut specialists in Mutually Assured Destruction, with an ashtray built into every console. Yet by the early