What is spam?
Note: The spam quarantine service
analyzes all mail delivered to Indiana University
Cyrus/Webmail and Exchange accounts. Any spam
messages you receive are quarantined for five days in a
Spam (Cyrus/Webmail) or
(IU Exchange) folder in your account. After five days, the spam service
deletes these messages automatically. For more, see At IU, what is the spam quarantine service?
On this page:
The term "spam" is Internet slang that refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE). Some people refer to this kind of communication as junk email to equate it with the paper junk mail that comes through the US Mail. Unsolicited email most often contains advertisements for services or products, but very few reputable marketers use UCE to advertise. The most commonly seen spam includes the following:
- Phishing scams, a very popular and dangerous form of email fraud
- Foreign bank scams or advance fee fraud schemes
- Pyramid schemes, including multilevel marketing (MLM)
- Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes
- Quack health products and remedies
- Ads for pornographic web sites
- Offers of software for collecting email addresses and sending UCE
- Offers of bulk emailing services for sending UCE
- Chain letters (see About chain mail)
- Illegally pirated software ("Warez")
How spammers operate
Unlike junk paper mail, email spam costs the sender very little to send; almost all of the costs are paid by the recipient and the carriers, because the spammer does not have to pay for all the Internet bandwidth tied up in the delivery of the spam. Because they have no incentive to be efficient in their mass emailing, spammers usually don't put much effort into verifying email addresses; they use automatic programs called bots to scour the web and Usenet newsgroups, collecting addresses, or buy them in bulk from other companies. Spammers also guess at addresses using name generation programs, and even send thousands of messages that bounce. In order to get a single response, spammers are willing to send out a thousand email messages or ten thousand; it makes very little difference to them.
Many spam emailers use tricks to get you to read their messages. For example, they use the "Subject:" line to entice you to open the message. Because of the tricks spammers use to send the email to you, your email address may not be visible in the "To:" line of the message, and you almost never see the email addresses of the other people they sent the message to. The worst thing about spam, though, is that the spammers use tricks that help disguise the origin of their messages.
One of the most common tricks is to relay messages through the email server of an innocent third party. This tactic doubles the damages: both the receiving system and the innocent relay system are flooded with spam. And for any mail that gets through, often the flood of complaints goes back to the innocent site that was made to look like the origin of the spam. Many spammers send their spam from a free account from a large ISP such as AOL, Yahoo!, or Hotmail, then abandon the account and open a new one to use for the next assault. Another common trick is to forge the headers of messages, making it appear as though the message originated elsewhere. This is called spoofed email. There are some pieces of information in the full headers that the spammer cannot forge, but even after technical investigation into the source of the message, most often the resulting information leads to a dead end, usually an abandoned account or an innocent mail relay server.
Why am I getting spam?
Research by the Federal Trade Commission and by the Center for Democracy and Technology found that email addresses posted on web sites or in newsgroups attract the most spam. A simple way to find out why you're getting so much spam is to type your email address into a search engine, such as google.com. The number of times your address is found by the search may surprise you. Although your Indiana University personal home page isn't indexed by search engines, departmental pages and other official university web sites are. If your address is on one of those, then it's available for harvesting; see How can I protect my web pages from email address harvesting?
You might also receive spam if you fill out online forms or correspond with certain companies via email. Although most reputable sites have good privacy policies and won't share your information, it is up to you to decide what sites you trust not to sell your address to spammers.
IU does not and will not sell your information. Moreover, IU will not share your information except in cases when that sharing is consistent with the university's mission or is required by law. For instance, IU has a legal requirement to provide directory information, including email addresses, to the US military for all eligible recruits. This information is required under the terms of the Solomon Amendment, which requires male students to register with the Selective Service to be eligible for Title IV Federal Student Financial Aid.
What to do
Spam has increasingly become a problem on the Internet, and even though there may be state or federal laws concerning some types of unsolicited email (most often the fraudulent kind), these laws do not address all types of spam email and it can be very costly to pursue spammers through the courts. Although computer experts are constantly designing better and better ways to filter out unwanted mail, the spammers are also constantly devising ways to get around those technical solutions. It is a very frustrating situation for users as well as for technical support personnel. It is a basic fact of Internet life that if you use the Internet, you will get unsolicited email.
Fortunately, there are some things that you can do that may help reduce the amount of spam you receive (see What can I do to avoid receiving spam email?), and some things IU does to help reduce the amount of spam you receive (see What does IU do to protect users from spam and virus-infected email?).
Most Internet service providers (ISPs) are reputable and they also take what steps are available to them to reduce the amount of spam you receive. In order for them to take action against spammers, ISPs need to know about spam coming from their domains. See the "Reporting spam" section of What should I do when I get spam email?
- The spam.abuse.net site is run by a group that has been actively engaged in fighting spam for years. Available to the public since 1996, this site has been referenced as one of the best anti-spam sites available.
- The Federal Trade Commission also offers information for identifying and avoiding spam.
Last modified on November 09, 2012.