Slicing up spam
Page 3

...agencies, and telecommunications companies will have taken control of one of the last truly free media – perhaps a fate even worse than spam. Some thought this past year would see the end of spam as we know it in the US. The government passed the “Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003”, or the CAN-SPAM Act of 2003. Despite the clever name, the law was widely viewed as toothless. It clarifies a spammer's responsibilities -- they must clearly label their email as advertisement, they must describe how a recipient could arrange to be removed from their mailing list -- but the law never gets around to making spam illegal. And it's not clear yet if such a law could withstand constitutional challenges.

Even if there were a clear and accepted law in the U.S. against unsolicited commercial emails, spam would adapt. According to an ongoing survey by Sophos, an Internet security firm, this country currently leads the world in spam production, with about 54% of spam messages being sent from computers in the US. But most of these operations could very easily be run remotely in countries with no anti-spam laws. Spam operations have to be fairly mobile anyway, moving frequently between service providers, since ISPs will often refuse to serve a company once they realize the nature of its business.

As more Americans have moved up to fast, permanent internet connections like DSL service or cable, they have unwittingly joined the spammers' ranks. Cybercrime investigators don't get involved in cases where personal computers are hacked but nothing of value is stolen, so a new spamming tactic, technically illegal, is now common. Graham Cluley, a consultant at Sophos, writes in their survey that 30 per cent of the world's spam is sent from compromised computers -- regular PCs that have been taken over by a Trojan Horse program that turns the computer into a rabid, remotely-controlled spam broadcaster. A spam marketing contractor is typically in control of a stable of hundreds of these zombie machines, each doing the spammer's bidding. The innocent home computer user notices only that sometimes his computer is really slow and his Internet connection seems really busy.