Why E-mail Spam is So Difficult to Stop

Why E-mail Spam is So Difficult to Stop
Page content

One of the downsides of the speed, convenience, and low-cost of e-mail is the amount of spam that clogs up e-mail servers and erodes the user’s overall experience with using this communication medium. The equivalent of junk mail, spam is a tool of advertisers who believe that the more people they reach, the more likely it is that the communication will return potential customers. The reason spam is so prolific is because this relationship is generally true from a business point of view.

Spam – A Brief Discussion

Spam is defined as unsolicited advertisements sent to multiple e-mail accounts simultaneously in hopes of attracting new leads for goods and services. What makes e-mail so fast, convenient, and inexpensive for regular users are the same reasons why spamming is so prevalent. Since there is no restriction on to whom an advertiser can send unsolicited messages, spammers can use it almost limitlessly. The nearly costless nature of e-mail and the lack of restrictions on how many e-mails may be sent are the reason why so few people can flood the market with so much spam.

Avoiding spam is a major concern for e-mail users spawning a whole micro-industry of software and services with the purpose of weeding out spam from legitimate messages. Early in this industry, too many false positives removed legitimate messages from reaching recipients reducing the positive impact spam-filters offered to users. More sophisticated techniques were later developed to both analyze the content of messages and blacklist offending senders to improve the detection of true spam.

The Real Problem

Sending an e-mail requires four main entities. The author of an e-mail writes a message and a sender, usually the sender’s Internet Service Provider (ISP), sends the message to the Internet. It is beyond the scope of this article to discuss the technical aspects of sending an e-mail to the Internet but suffice it to say that the message potentially travels along many connections and through many servers before being received by the receiver. The receiver is usually the recipient’s ISP. Finally, the recipient’s ISP sends the message to his/her inbox. The path looks something like this:

Author > Sender > Internet > Receiver > Recipient

The whole process can take anywhere from a few seconds to a few days depending on traffic and any errors or anomalies encountered in transit.

The problem with this process is that there is no real verification procedure in place to ensure that the author is really the sender of a message. Some spam filters attempt to blacklist suspicious e-mails but this just means that the recipient must manage and control a list of authorized authors. The nuisance of missing legitimate e-mails is usually worse than dealing with the spam in the first place. It also precludes anyone not on the authorized list from communicating with the recipient.

Since not all unsolicited e-mail is spam, communication lines must be open for anyone to send a message. Imagine if your phone could only receive messages from approved phone numbers. This would greatly reduce the telephone’s usefulness because emergency phone calls or legitimate calls from people using a different phone number at a different location could not get their message through.

Another problem with reducing spam is the identification of spammers. From an e-mail point of view, there is no way to universally identify a sender who is using many different e-mails from a variety of ISPs. Some spam filters attempt to block IP addresses, called blacklisting, but this actually causes more problems. Some ISPs rotate and assign different IPs to Internet service customers sometimes as often as every time a connection to the Internet is made. Blacklisting an IP may block a legitimate sender when the blacklisted IP is assigned to a different user.

The Internet and all its communication protocols have their roots in academia and science. Regulation of electronic communication over networks was deemed unnecessary when first utilized. The creators of the technologies and protocols developed to allow people to send e-mail did not consider the need for security and authentication because only a relatively few professionals were involved in its use. The now-archaic standards set down by these early protocols were not able to scale to the levels for which they are now used in terms of security, authentication, and privacy.

Conclusion

The problem of spam is not likely to disappear any sooner than junk mail received through the post office. Unregulated communication such as e-mail creates a wild-west environment where everything and anything goes. In addition, the Internet is an international phenomenon; laws or regulations in one country would not apply in another. It is ironic that the features that make e-mail communication free from regulation and taxation are the very features that make spam possible. Several attempts to regulate aspects of the Internet have failed to materialize into law. It would appear that the open nature of the Internet is more important to people than the negative consequences that regulation would reduce or eliminate.