About spam

On this page:


The term "spam" is internet slang that refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE). Some people refer to this kind of communication as junk email to equate it with the paper junk mail that comes through the US Mail. Unsolicited email most often contains advertisements for services or products, but very few reputable marketers use UCE to advertise. The most commonly seen spam includes:

  • Phishing scams, a very popular and dangerous form of email fraud
  • Foreign bank scams or advance fee fraud schemes
  • Pyramid schemes, including multilevel marketing (MLM)
  • Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes
  • Quack health products and remedies
  • Ads for pornographic websites
  • Offers of software for collecting email addresses and sending UCE
  • Offers of bulk emailing services for sending UCE
  • Chain letters (see About chain mail)
  • Illegally pirated software ("Warez")

See About email fraud.

How spammers operate

Unlike junk paper mail, email spam costs the sender very little to send; almost all of the costs are paid by the recipient and carriers, because spammers don't pay for the internet bandwidth tied up in the delivery of the spam. Because they have no incentive to be efficient in their mass emailing, spammers usually don't put much effort into verifying email addresses; they use automatic programs called bots to collect addresses from the web and Usenet newsgroups, or buy them in bulk from other companies. Spammers also guess at addresses using name generation programs, and even send thousands of messages that bounce. In order to get a single response, spammers are willing to send out a thousand email messages or ten thousand; it makes very little difference to them.

Many spam emailers use tricks to get you to read their messages. For example, they use the "Subject:" line to entice you to open the message. Because of the tricks spammers use to send the email to you, your email address may not be visible in the "To:" line of the message, and you almost never see the email addresses of the other people they sent the message to. The worst thing about spam, though, is that the spammers use tricks that help disguise the origin of their messages.

One of the most common tricks is to relay messages through the email server of an innocent third party. This tactic doubles the damages: both the receiving system and the innocent relay system are flooded with spam. And for any mail that gets through, often the flood of complaints goes back to the innocent site that was made to look like the origin of the spam. Many spammers send their spam from a free account from a large ISP such as AOL, Yahoo!, or Hotmail, and then abandon the account and open a new one to use for the next assault. Another common trick is to forge the headers of messages, making it appear as though the message originated elsewhere. This is called spoofed email. There are some pieces of information in the full headers that the spammer cannot forge, but even after technical investigation into the source of the message, most often the resulting information leads to a dead end, usually an abandoned account or an innocent mail relay server.

Why you receive spam

Research by the Federal Trade Commission and by the Center for Democracy and Technology found that email addresses posted on websites or in newsgroups attract the most spam. A simple way to find out why you're getting so much spam is to type your email address into a search engine, such as Google. The number of times your address is found by the search may surprise you. Although your Indiana University personal home page isn't indexed by search engines, departmental pages and other official university websites are.

You might also receive spam if you fill out online forms or correspond with certain companies via email. Although most reputable sites have good privacy policies and won't share your information, it is up to you to decide what sites you trust not to sell your address to spammers.

IU does not and will not sell your information. Moreover, IU will not share your information except in cases when that sharing is consistent with the university's mission or is required by law. For instance, IU has a legal requirement to provide directory information, including email addresses, to the US military for all eligible recruits. This information is required under the terms of the Solomon Amendment, which requires male students to register with the Selective Service to be eligible for Title IV Federal Student Financial Aid.

Avoid spam

Unfortunately, much of the email that currently travels over the internet is spam (unsolicited commercial or bulk email), which can contain either legitimate or illegitimate content. It is all but inevitable that you will receive some such email, but you can take steps to decrease the amount you receive. IU also has mechanisms in place to reduce junk email.


Report spam

If a sender disregards your explicit request not to be contacted, this can be considered harassment, and you should contact the designated authorities for your account. At IU, the University Information Security Office (UISO) handles such issues. If you feel that your safety or property is at risk, contact university law enforcement immediately.

Should you need to report an incident, it is important to collect and keep all the information you can with regard to the offending email messages (for example, times received, any replies you have made). It is also important to understand and use the full headers of the email message(s), since the "From:" line of a message can be forged or "spoofed".


Mass mailings

Of course, it is important that you not become a part of the spam problem by sending mass messages or by passing along chain mail. See Email policies at IU for more information about your rights and responsibilities regarding email usage. Also, see:

This is document afne in the Knowledge Base.
Last modified on 2021-09-03 12:35:26.