Fact-checked by Grok 2 weeks ago

Spamming

Spamming is the abuse of electronic messaging systems, such as email, to indiscriminately send unsolicited bulk messages, often for commercial advertising, scams, or disruption. The term "spam" originated from a 1970 Monty Python comedy sketch featuring repetitive chanting of the word, which was later adopted in the 1980s to describe excessive or abusive messaging in early online environments like multi-user dungeons (MUDs) and bulletin board systems (BBSs). The first documented instance of spamming occurred in 1978, when Digital Equipment Corporation broadcast an advertising message to approximately 400 users on the ARPANET, the precursor to the modern internet. While initially confined to , spamming has expanded to , platforms, search engines, and online forums, employing techniques like automated bots, harvested email lists, and obfuscated content to evade detection. These messages frequently promote fraudulent schemes, distribute , or propagate , imposing substantial costs on recipients and through wasted , , and user time. In 2023, spam accounted for approximately 46% of the roughly 347 billion daily emails sent worldwide, underscoring its pervasive scale despite advancements in filtering technologies. Efforts to curb spamming include technical solutions like Bayesian filters and domain-based message authentication, alongside legal measures such as the U.S. , which mandates accurate headers, mechanisms, and penalties for deceptive practices in commercial emails. Internationally, similar regulations exist, yet spammers continually adapt, exploiting jurisdictional gaps and emerging technologies, which perpetuates the ongoing digital arms race between senders and defenders.

Definition and Etymology

Core Definition

Spamming constitutes the abuse of electronic messaging systems through the indiscriminate transmission of unsolicited bulk messages to numerous recipients. These messages, commonly known as , are unwanted digital communications sent without prior consent, often via but extending to , , , and online forums. Core characteristics include high volume distribution, irrelevance or inappropriateness to the recipient, and purposes such as , , or dissemination. In technical terms, spamming exploits messaging infrastructures to impose costs on recipients and system operators, including bandwidth consumption, storage demands, and time wasted filtering content. Unlike legitimate bulk messaging, which may involve opt-in lists, spamming disregards recipient preferences and evades controls through tactics like forged headers or obfuscated content. Legally, frameworks like the U.S. target commercial electronic mail but define it narrowly as messages primarily promoting products or services, excluding non-commercial variants. The practice undermines trust in digital communication channels, with empirical data indicating billions of spam messages daily; for instance, cybersecurity reports estimate over 85% of global traffic as in recent years. While early definitions centered on , contemporary spamming adapts to evolving platforms, incorporating automated bots for scaling and evasion.

Historical Origins of the Term

The term "spam," when applied to unwanted or excessive digital communications, derives from a 1970 sketch in the British comedy series Monty Python's Flying Circus, titled "Spam." In the sketch, a group of Vikings repeatedly chants the word "Spam"—referring to the canned meat product—overpowering the rest of the café menu and conversation, symbolizing intrusive repetition. This analogy later described similar disruptive behaviors in online environments, where irrelevant or repetitive messages overwhelmed discussions. Early adoption of "" for net abuse occurred in the 1980s within text-based online games and systems (). On multi-user dungeons (MUDs), players used "spamming" to denote flooding chat channels with automated, repetitive text, mimicking the sketch's relentless chanting. Similarly, on early chat systems like Bitnet's —precursor to Internet Relay Chat (IRC)—users invoked the term for disruptive, high-volume inputs that drowned out legitimate interaction. These usages predated widespread application to or newsgroups, establishing "" as shorthand for resource-wasting excess in networked communication. The term gained prominence in Usenet newsgroups with its first documented application to a crossposted message on March 31, 1993. Software developer Richard Depew accidentally flooded numerous groups with a single post due to a bug in his cancellation script, prompting users to label the incident as "spam" in discussions on news.admin.policy. This event, distinct from prior commercial solicitations like the 1994 "" spam, cemented "spam" for deliberate or erroneous mass duplication across forums. By the mid-1990s, as commercial bulk email proliferated, the term extended to unsolicited messages, reflecting its evolution from playful analogy to descriptor of systemic abuse.

Historical Development

Pre-Digital Era Practices

In 1864, the earliest recorded instance of unsolicited bulk electronic messaging occurred via telegraph, when a London dentist transmitted advertisements for artificial teeth to multiple recipients across the network, marking an analog precursor to modern spamming by exploiting rapid communication for promotional purposes. Similar practices emerged in the United States, where con artists used telegraphs in the late 19th century to dispatch mass solicitations for fraudulent horse-racing tips, preying on recipients' willingness to pay for premium wire services before verifying the information. These efforts were constrained by the high per-word costs of telegraphy, limiting scale compared to later media, yet they demonstrated the incentive to flood channels with unrequested commercial or deceptive content. Postal systems facilitated broader junk mail campaigns starting in the mid-19th century, enabled by regulatory changes that lowered rates for matter. In the United States, third-class mail for circulars and advertisements was formalized in , allowing senders to distribute printed promotions at reduced postage compared to letters, which spurred early bulk mailings. One of the first organized direct-mail efforts dates to , when the mailed abolitionist pamphlets to southern mailboxes, prompting backlash and even violence against postal workers, highlighting recipient aversion to unsolicited ideological or commercial intrusions. By the early , brokers emerged, compiling addresses from and sales to enable targeted bulk , with volumes growing steadily; for instance, U.S. mail-order sales doubled between 1941 and 1944 amid wartime demand. constituted about 25% of all U.S. delivered by 1972, reflecting the postal service's role in scaling unsolicited despite public complaints over waste and privacy invasion. Telephone-based solicitation, an auditory analog to , gained traction in the mid-20th century as call centers professionalized outbound calls. Early traces to the , with anecdotal reports of housewives dialing prospects for products like cookies, evolving into structured campaigns by the when the first commercial inbound call centers formed to handle sales inquiries. Outbound practices proliferated in the 1970s, leveraging the Bell System's on phone services for widespread cold-calling, often for consumer goods or donations, though became rampant; by the late 1990s, estimates pegged annual telemarketing scams at $40–50 billion in consumer losses, underscoring the medium's vulnerability to abuse. States like responded with the first Do Not Call registry in 1987, signaling regulatory pushback against intrusive, unsolicited calls that mirrored the annoyance of bulk mail. These pre-digital methods—telegraph wires, postal floods, and phone barrages—laid the groundwork for by prioritizing volume over consent, driven by advertisers' cost-benefit calculations rather than recipient preference.

Emergence in Early Computing and Networks

The practice of spamming first manifested in early computer networks through unsolicited bulk electronic messages intended for promotional purposes. On May 3, 1978, Gary Thuerk, a manager at (DEC), sent the earliest documented instance of such activity over , the U.S. Department of Defense-funded network that served as a precursor to the modern . Thuerk's advertised DEC's WSGI 20 computer systems and was distributed to roughly 393 recipients at 27 West Coast ARPANET sites, circumventing standard protocols by directly addressing each user. This transmission elicited immediate backlash, with recipients decrying it as an unethical exploitation of a research-oriented network lacking formal commercial allowances. ARPANET administrators, including those at Stanford Research Institute, condemned the action for risking congestion on limited bandwidth and violating emerging netiquette norms that prioritized academic collaboration. Network logs and contemporary accounts indicate the message consumed disproportionate resources, prompting policy discussions on usage restrictions; however, Thuerk reported generating over $13–30 million in subsequent sales leads, underscoring the tactic's commercial viability despite ethical concerns. As evolved and interconnected with systems like —distributed in 1979–1980 for discussion forums—isolated instances of promotional cross-posting emerged, though constrained by small user bases of under 1,000 nodes and manual dissemination limits. 's topology, which replicated messages across servers without centralized control, facilitated early abuses such as repeated advertisements in unrelated newsgroups, but these remained sporadic due to high operational costs and community moderation via "kill files" to filter offenders. The absence of scalable automation tools and commercial incentives kept spamming nascent until broader network commercialization, yet these precursors established patterns of resource strain and user irritation that would intensify later.

Expansion in the Internet Age (1990s–2000s)

The commercialization of the internet in the early 1990s facilitated the rapid expansion of spamming beyond early networks into Usenet newsgroups and email systems. In April 1994, immigration lawyers Laurence Canter and Martha Siegel conducted the first major commercial spam campaign, posting advertisements for U.S. green card lottery services to approximately 5,000-6,000 Usenet newsgroups, reaching an estimated 30 million users. This action, while generating client leads for the firm, provoked widespread backlash from Usenet administrators and users, who viewed it as a violation of netiquette norms against off-topic advertising, leading to the development of cancelbots to remove such posts. As proliferated and adoption surged in the mid-1990s, unsolicited commercial emails became commonplace, often promoting products like , get-rich-quick schemes, and pharmaceuticals. The Mail Abuse Prevention System (MAPS) was established in 1996 by engineers Dave Rand and to track and publicize spammers' addresses, enabling by ISPs and fostering collaborative anti-spam efforts. By the late 1990s, spam extended to platforms, with unsolicited ads appearing on services like AOL Instant Messenger, termed SPIM. Entering the , spam volumes escalated dramatically alongside global email traffic growth, comprising nearly half of all emails by the early decade according to industry reports. Spammers increasingly automated distribution using scripts and compromised servers, evading early filters through obfuscated text and rotating domains. In response, the U.S. passed the Controlling the Assault of Non-Solicited and (CAN-SPAM) on December 16, 2003, which imposed requirements for accurate headers, mechanisms, and identification in commercial emails but permitted their sending with compliance, resulting in limited reduction of spam volumes as enforcement focused on egregious violators rather than prohibiting unsolicited bulk messaging. Despite these measures, spam persisted as a low-cost, high-volume tactic, with global estimates indicating billions of daily messages by mid-decade.

Contemporary Evolution (2010s–Present)

In the 2010s, spamming adapted to intensified anti-spam measures, with comprising approximately 89% of global traffic in 2010, totaling around 107 trillion messages annually, often promoting pharmaceuticals, financial schemes, and . Spammers shifted tactics to evade filters, incorporating image-based content, obfuscated text, and targeted campaigns that delivered or credential-harvesting payloads, while botnet dismantlings like Rustock in 2011 reduced volumes temporarily by up to 50% in some metrics. Parallel to , spamming proliferated on platforms, with a reported 355% surge in social spam from January to July 2013, exploiting compromised accounts for link dissemination and scams mimicking legitimate interactions. By the mid-2010s, spam extended to content manipulation, including poisoning and sites optimized for search engines to drive traffic to malicious domains, coinciding with the growth of platforms like and where automated bots amplified deceptive narratives. Email spam volumes stabilized but grew more sophisticated, with attempts rising exponentially alongside the expansion of mobile messaging, where and app-based spam targeted users with premium-rate service lures. Regulatory responses, such as enhanced enforcement under the CAN-SPAM Act and emerging GDPR provisions from , prompted spammers to favor decentralized infrastructures like networks and encrypted channels to obscure origins. Entering the 2020s, spamming integrated deeper into cybercrime ecosystems, leveraging pandemic-related themes for phishing spikes in 2020, while overall email spam rates hovered around 45-50% of daily traffic—projected at 160-170 billion messages by 2025 amid total volumes exceeding 376 billion emails per day. A pivotal shift occurred with artificial intelligence adoption, enabling generative models to produce 51% of spam emails by April 2025, crafting hyper-personalized, grammatically flawless content that bypassed traditional filters and mimicked legitimate correspondence for advanced persistent threats. This AI-driven evolution extended to multimodal spam across platforms, including deepfake audio in VoIP robocalls and automated comment flooding on video sites, underscoring spammers' reliance on machine learning to scale operations while countermeasures like AI-enhanced detection lag in adapting to novel variants. Despite volume declines from improved global takedowns—evident in a consistent downward trend post-2020—spam's economic toll persists, with U.S. entities alone facing billions in annual losses from associated fraud.

Technical Techniques

Delivery Mechanisms and Infrastructure

Spam delivery relies on distributed networks of compromised devices, known as , which enable high-volume transmission while obscuring origins. consist of infected hosts—often routers, , or endpoints—controlled via command-and-control () servers to relay spam through protocols like SMTP for or HTTP for web-based dissemination. In 2024, such as RondoDox exploited over 50 vulnerabilities across 30 vendors to expand infection bases for spam and distribution, demonstrating how attackers chain exploits for scalable delivery. Similarly, a Russian-linked leveraged DNS misconfigurations in 13,000 hijacked routers to propagate malspam via fake invoices, bypassing IP-based filters by masking traffic through legitimate-looking sources. To evade and detection, spammers employ networks and techniques. Residential proxies, which route traffic through legitimate consumer addresses, have been increasingly adopted by spam operations, as seen in China-nexus phishing campaigns targeting in 2025, where attackers shifted from data center proxies to residential ones for better camouflage. Fast-flux DNS further enhances resilience by rapidly rotating resolutions to multiple IPs, a used by cybercriminals and state actors to maintain uptime for spam-serving infrastructure despite takedown attempts. These mechanisms distribute sending loads across vast IP pools, reducing per-source volume to avoid triggering filters, with botnets often integrating chaining for layered anonymity. Bulletproof hosting (BPH) providers form a critical backbone, offering servers in jurisdictions with lax enforcement that ignore abuse reports, allowing persistent operation of relays, pages, and hosts. These services, often located in countries like or the , support campaigns by hosting disposable domains and panels, with operators paying premiums for "guaranteed" uptime against complaints. In 2024, BPH was implicated in sustaining distribution sites alongside forums and exploit kits, complicating global disruption efforts due to jurisdictional hurdles. Compromised legitimate infrastructure, such as routers or RDP endpoints, supplements BPH by providing free, high-reputation vectors, as evidenced by PRC-linked actors building botnets from thousands of hijacked devices in 2024.

Content Generation and Evasion Tactics

Spammers generate content using templated structures that are systematically varied to mimic legitimate communications while incorporating promotional or malicious elements. Common methods include starting with boilerplate phrases from real emails or websites, then applying substitutions such as synonyms, abbreviations, or reordered sentences to reduce similarity to known patterns. Recent advancements incorporate generative models to produce diverse, contextually plausible text that evades signature-based detection, enabling rapid scaling of campaigns with low human oversight. To further diversify output, spammers employ lexical manipulations like deliberate misspellings (e.g., "Viagra" as "V1agra"), homophones, or character substitutions (e.g., replacing 'o' with '0'), which disrupt keyword-based filtering without fully degrading for recipients. In SMS spam, these tactics extend to crafted perturbations, such as inserting irrelevant characters or using variants to alter string hashes used in classifiers. Evasion tactics focus on obfuscating detectable features, including encoding URLs with IP addresses in hostnames, which browsers resolve but static analyzers may overlook. Hidden text salting embeds invisible elements or whitespace-filled strings to inflate word counts or alter statistical profiles, tricking Bayesian filters into classifying content as non-spam. Attachments and links are often disguised via zero-width characters or obfuscation to mask payloads from content scanners. Advanced methods draw from adversarial machine learning, where spammers apply targeted perturbations—minimal changes like adding noise to feature vectors—to fool neural network-based filters trained on historical data. Randomization of elements, such as varying sender domains or embedding randomized benign content, exploits the brittleness of probabilistic models, as demonstrated in behavioral studies where manual evasion succeeded against over 70% of filters by balancing detectability and delivery rates. These techniques evolve in response to filter updates, prioritizing causal delivery over perfect undetectability.

Automation and Scaling via Botnets

Botnets consist of large collections of compromised computers, often infected via distributed through emails, drive-by downloads, or software vulnerabilities, which operators commandeer remotely to execute coordinated operations. These networks automate spam dissemination by equipping infected devices—known as or bots—with capabilities to relay emails through local SMTP servers or chains, allowing operators to issue directives via command-and-control (C&C) servers for mass distribution of lures, payloads, or fraudulent advertisements. This distributed architecture minimizes , as individual bots contribute modestly to the overall volume while collectively amplifying output to billions of messages daily; for instance, in , an average bot transmitted approximately 77 spam emails per minute, with some botnets exceeding 200 per minute per bot. Scaling is achieved through rapid botnet expansion, often reaching hundreds of thousands to millions of nodes, which enables campaigns to overwhelm filters by flooding inboxes from diverse, residential IP ranges that mimic legitimate traffic. Early prominent examples include the , active from 2007, which infected millions of machines and powered alongside DDoS attacks, contributing to the era's surge in resilient, controlled networks. By 2008, major botnets like Srizbi alone accounted for a significant portion of global , with the top collective botnets capable of over 100 billion messages per day; its partial disruption that November slashed worldwide volumes by up to 93%. Subsequent botnets refined evasion tactics, such as fast-flux DNS for C&C and polymorphic to hinder antivirus detection, further enhancing scalability. Rustock, peaking with around 250,000 bots, dominated roughly 30% of global before its March 2011 takedown by and partners, which temporarily reduced overall by 20-40%; Cutwail, with about 100,000 bots, then emerged as a leading spammer, sustaining pharmaceutical and campaigns into the . Grum, estimated at 560,000 to 840,000 bots, handled 18% of worldwide until its 2012 dismantling, underscoring how botnet size directly correlates with dominance. In the , while s have faced disruptions and competition from cloud-based spam services, they persist in high-volume s, as seen in variants that randomized headers and templates to prolong delivery from infected hosts, per analyses. operators scale by renting access on markets or leasing infrastructure, automating recruitment through self-propagating worms, though takedowns reveal vulnerabilities: coordinated seizures of C&C domains and sinkholing traffic have repeatedly curtailed output, affirming the causal link between botnet integrity and spam prevalence. Detection relies on traffic signatures, such as synchronized participation across bots, enabling proactive mitigation before full scaling.

Manifestations Across Media

Email and Bulk Messaging

Email spamming involves the mass distribution of unsolicited messages via , typically for commercial promotion, fraudulent schemes, or dissemination. The practice originated on May 3, 1978, when Gary Thuerk, a marketer at , dispatched the first bulk commercial to around 400 recipients advertising DEC computers, generating significant backlash for bypassing network etiquette. By the 1990s, as expanded, proliferated through list harvesting and automated tools, manifesting as floods of advertisements in inboxes that overwhelmed early users. In contemporary contexts, email spam accounts for over 45% of global email volume, with 45.6% identified as such in and exceeding 46.8% by December 2024. Daily transmissions reach approximately 160 billion emails, comprising a substantial share of the roughly 376 billion total emails sent worldwide each day. Manifestations include lures impersonating banks or services to harvest credentials, advance-fee scams promising unclaimed funds, and promotional blasts for pharmaceuticals or products, often employing deceptive subject lines and forged sender addresses to evade filters. These messages frequently arrive in bulk from compromised servers or botnets, appearing as repetitive, low-effort content designed for high-volume targeting rather than personalization. Bulk messaging spam parallels email tactics but operates through , , or app-based platforms, delivering unsolicited texts that promote dubious offers or initiate scams termed smishing. In the United States, consumers lost $470 million to text-initiated frauds in 2024, with reports highlighting prevalent schemes like fake package delivery alerts or bank account verifications leading to malicious links. Globally, spam texts affect recipients at rates such as 41 per month for the average , often manifesting as short, urgent prompts to URLs or reply with sensitive data. Unlike consented bulk messaging for alerts, spam variants disregard preferences, utilizing disposable numbers or spoofing to inundate devices, thereby exploiting the high open rates of texts—around 95%—for rapid .

Social Networks and Instant Communication

Spamming on social networks involves the creation and deployment of automated or semi-automated accounts to disseminate unsolicited promotional content, scams, or manipulative tactics, such as generic comments like "Awesome pic" or "Love this" designed to boost visibility or direct users to external links. Platforms like , , and X (formerly ) face persistent challenges from these bots, which exploit algorithmic amplification to evade detection. In the second quarter of 2025, removed 165 million pieces of content, reflecting a quarterly decline from 366 million but underscoring the scale of the issue amid rising AI-generated . Similarly, X conducted a major cleanup in October 2025, eliminating 1.7 million violating manipulation and policies. Common tactics include fake giveaway scams promising prizes in exchange for personal information or payments, and via direct messages urging users to click malicious links disguised as account recovery or opportunities. On , bots often post vague promotional comments or follow-unfollow cycles to inflate metrics, while X sees coordinated reply spam promoting cryptocurrencies or adult content. These methods leverage platform features like comments, direct messages, and stories for rapid dissemination, with scammers using stolen or purchased account credentials to appear legitimate. In instant communication apps like , spamming manifests through unsolicited additions to groups or broadcast lists for promotional blasts, often from unknown international numbers peddling scams such as fake job offers or schemes. 's systems block approximately 1.8 million suspicious links weekly via AI-driven detection, yet users report escalating promotional , with 35% of surveyed Indians encountering fraudulent messages multiple times in 2025. Such exploits by mimicking personal contacts, leading to higher engagement rates than filtered equivalents, though reporting mechanisms and business restrictions aim to curb bulk messaging abuses. Overall, these platforms' reactive moderation—relying on user reports and algorithmic filters—struggles against evolving botnets, resulting in persistent user exposure to .

Web Forums, Search Engines, and Content Platforms

Spamming in web involves automated or manual posting of promotional , irrelevant , or fake opinions to drive to external sites, often exploiting the ' link equity for rankings. Forum spammers frequently use bots to register accounts en masse and post disguised advertisements, with techniques including profile creation and threaded posts to mimic legitimate activity. A 2007 study analyzing forum found that context-based features, such as post timing and patterns, could detect over 90% of posts in sampled datasets from popular . Search engine spamming, commonly executed through black-hat tactics, aims to manipulate rankings by violating algorithmic guidelines, including —repeating terms unnaturally to inflate relevance—and , where different content is served to users versus crawlers. Other methods encompass doorway pages, which are low-quality sites optimized for specific queries to funnel traffic, and deceptive redirects that send users to unrelated promotional pages post-click. These practices peaked in prevalence during the early but persist, with recent variants leveraging to generate synthetic content and fake author profiles for apparent credibility. On content platforms such as and , spamming manifests as comment flooding, fake product reviews, and bot-driven uploads of stolen or low-value videos to harvest views or links. 's policies prohibit such deceptive practices, including mass-tagged misleading videos and scams exploiting viewer trust, with enforcement relying on algorithmic detection and user reports. A 2023 analysis of thousands of product review videos across search engines identified spam indicators like repetitive scripting and affiliate link proliferation, achieving high detection accuracy via classifiers. On , spambots have historically posted links to pirated content while copying legitimate comments to evade moderation, contributing to manipulation where forum threads dominate search results. Botnets amplify these efforts, with bots comprising up to 47% of in 2022, enabling scaled posting across platforms. Opinion spamming on forums and platforms, where fabricated reviews boost commercial interests, underscores a broader tactic of subverting for profit.

Mobile, VoIP, and Emerging Devices

Spamming via mobile devices primarily manifests as unsolicited short message service () and (MMS) communications, often termed smishing when involving tactics to extract or induce fraudulent actions. In 2024, U.S. consumers reported losses exceeding $470 million from SMS-initiated scams, marking a fivefold increase from 2020 levels. Techniques include number spoofing, bulk messaging through compromised carrier gateways, and exploitation of opt-in lists harvested from data breaches, enabling spammers to evade basic filters. The identified prevalent 2024 text scams such as fake package delivery alerts and warnings, with hand-coded analysis of over 1,000 reports revealing these as top vectors for financial deception. Voice over Internet Protocol (VoIP) spamming, known as spam over Internet telephony (SPIT), relies on automated dialing systems to deliver robocalls promoting , , or political messages . U.S. consumers received nearly 5 billion robocalls in April 2025 alone, reflecting a 12.3% year-over-year rise and the highest monthly volume since August 2023. Monthly and calls averaged 2.56 billion through September 2025, up from 2.14 billion in 2024, despite regulatory efforts like the FCC's framework mandating authentication. Fraudsters exploit VoIP's low cost and global reach, often routing calls through hijacked providers or international gateways to bypass traceback, with 46% of fraudulent calls originating from VoIP sources per industry studies. Emerging devices, including (IoT) endpoints like smart thermostats, wearables, and connected appliances, serve as spam vectors through compromise for botnet operations or direct messaging abuse. Spammers increasingly hijack insecure IoT devices—often lacking robust —to relay spam emails or calls, with studies showing such devices used as proxies in up to 90% of observed compromises tied to data exfiltration or spam campaigns. Machine learning-based detection methods have been proposed to identify anomalous traffic from IoT spam, as these devices generate time-series data vulnerable to injection attacks mimicking legitimate commands. In 2021, nearly 90% of compromised IoT devices funneled data to servers in high-risk countries like , facilitating spam amplification, though recent trends indicate growing use in vishing via voice-enabled assistants.

Impacts and Externalities

Economic Burdens

Spam generates substantial economic burdens primarily through direct financial losses incurred by victims of associated scams and from diminished productivity and mitigation efforts. Globally, scams propagated via spam channels, including , , and , led to over $1.03 trillion in reported losses during the 12 months ending October 2024, equivalent to the GDP of mid-sized nations. In the United States, the recorded $125 billion in total fraud losses for 2024, with a significant portion stemming from spam-initiated schemes such as investment fraud ($5.7 billion) and imposter scams. Productivity losses represent another major economic toll, as individuals and organizations divert time to identifying, reviewing, and discarding . Worldwide, businesses incur approximately $20.5 billion annually in lost due to , with the average employee forfeiting about two workdays per year on spam-related tasks. These figures arise from even brief daily engagements—such as one minute per employee at typical wage rates—scaling across workforces to substantial aggregate costs. Phishing, a targeted variant of , amplifies these burdens through high-value exploits like business email compromise (BEC), where incidents average $150,000 in losses per affected organization, contributing to global costs projected at $250 billion in 2024. Additional expenses include investments in anti-spam infrastructure and strained by unsolicited traffic, further eroding efficiency without yielding value.

Productivity and Resource Wastes

Spam across digital platforms imposes substantial productivity losses on users and organizations by diverting human attention from value-creating activities to and disposal tasks. Employees typically spend up to 80 hours per year identifying and handling messages in inboxes, equivalent to two full workdays lost to non-productive filtering. This time sink arises from the sheer volume of unsolicited content—approximately 160 billion emails dispatched daily in 2023—overwhelming recipients and burying legitimate communications. On a broader scale, such disruptions translate to $20.5 billion in annual global productivity losses for businesses, with individual employees forfeiting around $1,934 yearly in effective output due to -related distractions. Beyond human effort, entails direct resource consumption in network infrastructure and computing hardware. Unsolicited messages strain , as service providers must allocate capacity for inbound spam traffic that yields no utility, inflating operational expenses tied to transit and agreements. Server-side processing exacerbates this: filtering and storing spam demands CPU cycles, , and disk , with one enterprise Exchange Server analysis estimating €22,500 annually in handling costs for a mid-sized . In web forums, spam accumulation can drive overheads to hundreds of dollars yearly per platform, scaling with volume and necessitating redundant hardware or provisioning. These inefficiencies compound as spammers exploit botnets for mass dissemination, forcing recipients' systems to expend energy on detection algorithms that consume additional power—often unquantified but inherent to the causal chain of unsolicited flows.

Broader Societal and Environmental Costs

Spamming imposes societal costs by fostering widespread toward communications, diminishing interpersonal and institutional . Unsolicited messages overload inboxes and channels, prompting users to adopt defensive postures that extend to legitimate interactions, such as hesitancy in responding to unknown contacts or overlooking critical alerts amid noise. This erosion manifests in disrupted relationships and , where of —prevalent in —leads to missed opportunities, as evidenced by surveys indicating that spam calls cause users to ignore potentially vital communications. Furthermore, exposure to spam-linked correlates with psychological strain, including heightened anxiety and distress from repeated intrusions and attempts. Over two-thirds of scam victims report impacts, ranging from to eroded confidence in online interactions. On a broader scale, spamming exacerbates vulnerabilities in information ecosystems by normalizing , which indirectly amplifies propagation through similar unsolicited channels. While direct causation studies are limited, the pervasive nature of spam trains users toward cynicism, weakening communal reliance on shared digital spaces for reliable exchange. Environmentally, spamming drives substantial demands through the processing, storage, and filtering of billions of messages across global networks and . Annual global spam reaches 33 billion kilowatt-hours, comparable to powering 2.4 million U.S. households. Each spam generates approximately 0.3 grams of CO2 equivalent emissions, scaling to massive totals given the volume—estimated at tens of billions daily—that burdens non-renewable sources. This footprint arises from server computations for routing, scanning, and deletion, contributing to broader emissions that rival in scale, though spam's share underscores inefficient resource allocation in digital infrastructure.

Foundational Laws and International Agreements

The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act) represents a foundational U.S. federal law regulating commercial electronic mail, signed into law on December 16, 2003, by President . It prohibits deceptive subject lines and header information, mandates that messages identify themselves as advertisements, include a valid physical postal address for the sender, and provide a clear mechanism allowing recipients to unsubscribe without incurring costs. The Act preempts most state anti-spam laws but preserves those addressing fraud or deception, with enforcement primarily by the (), which has pursued numerous cases resulting in penalties exceeding millions of dollars for violations. In the , Directive 2002/58/EC, known as the , adopted on March 12, 2002, and effective from July 31, 2002, establishes core protections against unsolicited communications by requiring prior consent (opt-in) for most via electronic means, including and SMS, except in cases of existing customer relationships where applies. It harmonizes rules across member states on traffic data retention, cookie usage, and , obligating providers to prevent unsolicited messages and imposing fines for non-compliance, though implementation varies nationally and has been supplemented by the General Data Protection Regulation (GDPR) for data processing aspects. Member states must ensure effective enforcement, with the Directive influencing subsequent national laws in countries like and . No binding international treaty specifically targets spamming, reflecting challenges in extraterritorial enforcement due to the internet's borderless nature and differing national priorities. However, the Organisation for Economic Co-operation and Development () issued its Anti-Spam Toolkit of Recommended Policies and Measures on July 5, 2006, advocating non-binding guidelines for signatory countries, including promoting opt-in regimes, international cooperation on enforcement, , and technical standards to reduce spam propagation. This toolkit, endorsed by over 30 economies, has informed policy in nations like (via the 2014 Anti-Spam Legislation) and (Spam Act 2003), fostering voluntary networks such as the London Action Plan for cross-border investigations. Additional multilateral efforts, like the 2004 for the Unsolicited Communications Enforcement Network, facilitate information sharing among regulators but lack treaty status.

Country-Specific Regulations

In the United States, the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act) of 2003 establishes federal standards for commercial email messages, prohibiting deceptive subject lines and headers while requiring a clear opt-out mechanism, accurate sender information, and physical postal address disclosure; violations can result in fines up to $51,744 per email as of 2024. The Act applies to all commercial emails sent by entities in or affecting commerce, but does not mandate prior consent, differing from stricter opt-in regimes elsewhere; enforcement is shared by the Federal Trade Commission (FTC) and Federal Communications Commission (FCC), with over 100 enforcement actions yielding more than $500 million in penalties since inception. Canada's Anti-Spam Legislation (CASL), enacted in 2014, imposes stringent requirements for commercial electronic messages (CEMs), mandating express or , sender identification, and an unsubscribe option effective within 10 days; it covers emails, texts, and other formats, with penalties up to CAD $10 million for corporations per violation. Unlike the U.S. model, CASL's rules—enforced by the Canadian Radio-television and Commission (CRTC), , and Office of the Privacy Commissioner—aim to prevent unsolicited proactively, leading to over 200 investigations and fines exceeding CAD $5 million by 2023. In the , Directive 2002/58/EC (), as amended, requires prior opt-in consent for unsolicited communications via , , or automated calls, with exceptions for existing customer relationships allowing ; member states implement variations, but all prohibit without explicit permission, backed by fines up to 4% of global turnover under integrated GDPR enforcement. The framework targets confidentiality and spam suppression, with the noting persistent challenges despite legislation, as illicit activities continue across borders. The United Kingdom's Privacy and Electronic Communications Regulations (PECR) 2003, implementing the , ban unsolicited marketing emails and texts to individuals without prior consent, requiring clear identification and easy ; corporate subscribers may receive communications, but enforcement by the (ICO) has issued fines up to £500,000, such as the 2016 case against a firm for 6.8 million illegal texts. Australia's Spam Act 2003 regulates commercial electronic messages, demanding (express or inferred from inquiries), accurate sender details, and a functional unsubscribe facility; it applies to messages with an Australian link, enforced by the Australian Communications and Media Authority (ACMA), which has levied over AUD $2 million in penalties since 2006 for violations like unsolicited campaigns. The Act's model aligns more with opt-in principles than the U.S., emphasizing designated communications providers' role in blocking .
Country/RegionKey LawConsent ModelPrimary RequirementsMax Penalty (per violation)
CAN-SPAM Act (2003)Opt-outHonest headers, opt-out link, address$51,744 (civil)
CASL (2014)Opt-in (express/implied)Consent proof, unsubscribe in 10 daysCAD $10M (corporate)
ePrivacy Directive (2002/58/EC)Opt-inPrior consent, no unsolicited marketingUp to 4% global turnover
PECR (2003)Opt-in for individualsConsent, identification, opt-out£500,000 (ICO fine)
Spam Act (2003)Opt-in/inferredConsent, unsubscribe facilityAUD $2.22M (corporate)

Key Court Cases and Precedents

Intel Corp. v. Hamidi (2003), decided by the California Supreme Court, established that unsolicited bulk emails do not inherently constitute under state unless they demonstrably impair the recipient's computer system's functionality, such as by consuming significant or causing operational harm. In this case, a former employee sent approximately 16,000 critical emails over 18 months to Intel's internal system despite cease-and-desist requests; the court reversed a lower , holding that no actionable interference occurred absent tangible damage, distinguishing it from prior cases involving denial-of-service-like spamming. This precedent curtailed the use of property torts to combat , emphasizing the need for of harm over mere annoyance. Prior to the federal CAN-SPAM Act's full implementation, Corp. v. Richter (2005) exemplified aggressive enforcement under statutes. sued , dubbed the "Spam King," for sending billions of deceptive emails via forged headers and misleading subjects, violating Washington's Commercial Electronic Mail Act and similar laws; the case settled with Richter paying $7 million in damages and agreeing to reformed practices, including opt-in requirements and accurate disclosures. This outcome reinforced corporate incentives to litigate against high-volume spammers pre-federal uniformity, yielding injunctions that disrupted operations. Federal enforcement under the gained traction through -led actions, with early precedents like the 2004 suits against Phoenix Avatar and related entities establishing liability for deceptive headers, absent s, and false claims in diet supplement promotions, resulting in asset freezes and permanent bans on spamming. Subsequent cases clarified preemption: the Ninth Circuit in Gordon v. Virtumundo (2009) held that CAN-SPAM displaces state laws imposing stricter commercial email regulations, limiting private suits to federal standards and barring "professional plaintiffs" without direct harm. Recent enforcement underscores escalating penalties; in v. (2024), the company faced a record $2.95 million fine for sending non-compliant marketing emails lacking valid physical addresses and mechanisms, alongside lapses. Criminal precedents emerged alongside civil ones, with the first U.S. spam conviction in Virginia's Commonwealth v. Jaynes (2004 trial, appealed 2006), where Jeremy Jaynes was sentenced to a year in prison for forging headers in over 10 million emails promoting Nigerian scams, though parts of the state law were later struck as overbroad under the First Amendment for chilling protected speech. Similarly, DOJ actions like U.S. v. Consumer Services (2023) imposed a $650,000 penalty and for systematic opt-out failures in credit monitoring emails, affirming CAN-SPAM's role in curbing institutional ming. These cases collectively prioritize verifiable deception and non-compliance over volume alone, with private rights limited to internet service providers under 15 U.S.C. § 7706(g), excluding individual recipients to prevent litigation abuse.

Counterstrategies and Mitigations

Technological Filters and AI Defenses

Technological filters against spamming originated with rule-based systems in the , employing keyword matching, sender reputation checks, and to identify and block unsolicited messages, primarily in . These methods relied on predefined patterns, such as suspicious subject lines or addresses from known spam sources, but proved limited against evolving tactics like obfuscated text or polymorphic content. Bayesian filtering emerged as a probabilistic advancement around 2002, popularized by Paul Graham's , using statistical analysis of word frequencies and user feedback to classify emails as or legitimate with . Naive Bayes classifiers, a core implementation, achieved early detection rates exceeding 90% on benchmark datasets by calculating posterior probabilities based on prior / corpora. Machine learning techniques expanded spam detection in the 2010s, incorporating support vector machines (SVM), decision trees, and for feature extraction from headers, body text, and metadata. ensembles have demonstrated up to 95.87% accuracy in empirical tests on public datasets like Enron-Spam, outperforming single models by reducing through bagging. Hybrid approaches combining multiple algorithms, such as Naive Bayes with neural networks, further enhance robustness against imbalanced classes common in spam data. Deep learning models, including convolutional neural networks (CNNs) and recurrent neural networks (RNNs), have advanced defenses since the late by processing sequential text and embeddings for contextual understanding, achieving superior performance on multilingual and obfuscated spam. Recent studies report variants reaching 96% accuracy in detecting AI-generated emails, leveraging on stylometric features like sentence complexity. AI-driven systems now integrate and behavioral analysis for real-time filtering across , , and VoIP, examining sender patterns, attachment anomalies, and network flows. Authentication protocols like , DKIM, and complement by verifying origins, reducing spoofed spam delivery by up to 80% in compliant networks. For and messaging apps, employs to flag promotional bursts or shortener abuse, though evasion via generative remains a challenge, with up to 83% of 2025 incorporating synthetic text. Despite high detection rates, filters incur false positives at 0.1-1% in production systems, necessitating user overrides and continuous retraining to balance amid adversarial adaptations. Cloud-based AI services, such as those from major providers, process billions of messages daily, evolving via to counter zero-day without compromising .

Policy Enforcement and User Practices

Major email service providers enforce anti-spam policies through mandatory authentication protocols such as Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC). For instance, Google and Yahoo implemented requirements in February 2024 mandating DMARC policies for domains sending over 5,000 emails daily to high-volume senders, rejecting or quarantining non-compliant messages to curb spoofing and unauthorized bulk emailing. Microsoft followed suit in May 2025, applying stricter outbound spam protections for senders exceeding 5,000 daily emails, including automatic rejection by recipient providers like Gmail if authentication fails. These measures prioritize verifiable sender identity over content alone, reducing spam ingress by an estimated 20-30% in compliant systems through pre-delivery filtering. Social media platforms similarly deploy automated and manual enforcement against , defined as unsolicited commercial content, repetitive posting, or deceptive practices. Meta's community standards prohibit via account suspensions, content removal, and visibility restrictions, with quarterly reports detailing millions of actions—such as 1.7 billion spam-related takedowns in Q1 2024. enforces policies against scams and excessive posting by demonetizing channels or issuing strikes, leading to over 5.6 billion policy violations addressed in 2023, including . Enforcement relies on algorithmic detection combined with human review, though evasion tactics like bot networks persist, prompting iterative policy updates. Users contribute to spam mitigation by actively reporting suspicious messages, which refines models in filters. In ecosystems, user-reported or junk emails directly enhance global anti-spam intelligence, reducing false negatives by incorporating real-time feedback loops. Best practices include marking emails as rather than deleting them, avoiding disclosure of addresses publicly, and disabling automatic replies or read receipts that signal active accounts to spammers. On platforms like clients, users can create custom filters to quarantine patterns, while reporting tools flag repetitive or unsolicited content, contributing to account-level blocks. Empirical shows Gmail's user-assisted filters achieve lower delivery rates (around 6.8%) compared to (14.6%), underscoring the impact of integrated reporting. However, user complacency—such as ignoring —undermines these efforts, as default opt-ins often expose to harvesting. Despite advancements, policy enforcement faces challenges from adaptive spammers who exploit volume to overcome filters, creating a feedback loop where increased compensates for higher rates. User practices thus remain essential, with studies indicating that consistent reporting can improve filter accuracy by 10-15% over passive systems alone, though reliance on user vigilance introduces variability tied to awareness levels. Platforms encourage these behaviors through in-app prompts and , balancing enforcement with minimal false positives to sustain trust.

Industry and Economic Incentives

Industries incur substantial economic costs from , including lost productivity and diminished trust in communications, estimated at nearly $20 billion annually for firms and consumers combined as of early analyses, incentivizing heavy investments in countermeasures to safeguard operations. These burdens manifest in employee time diverted to filtering unsolicited messages—equivalent to hours of unproductive labor—and from associations, compelling companies to deploy filtering solutions that, without such interventions, would allow spam volumes to surge by factors of 100 or more. The burgeoning anti-spam software sector underscores these incentives, with global market valuation reaching $7.7 billion in 2024 and projected to expand to $9.59 billion in 2025 at a exceeding 24%, driven by demand for advanced detection amid rising and threats originating via . providers, including operators and cybersecurity firms, profit from delivering effective filters, as clean inboxes enhance user retention and engagement; for instance, providers historically adopted filtering to curb per- costs for users and prevent churn from inundated accounts. Legitimate marketing entities further align economically by prioritizing list and authentication protocols like , DKIM, and , since spam filters block 60.3% of campaigns as the primary deliverability barrier, threatening the high —often $36 per dollar spent—that compliant yields. In sectors like mobile telecommunications, industry and consumer interests converge on spam mitigation, as operators bear filtering costs but recoup through sustained subscriber loyalty and reduced fraud-related liabilities, fostering self-regulatory measures and technological upgrades over fragmented enforcement. Over 90% of cyberattacks initiate via vectors, amplifying return-on-investment calculations for security investments that avert breaches costing millions in recovery and . These dynamics perpetuate a where economic propels ongoing in AI-driven defenses and advocacy, countering spammers' low-cost volume strategies despite persistent challenges in attribution and global coordination.

Analyses and Perspectives

Cost-Benefit Dynamics

Spammers derive economic viability from the asymmetry between minimal distribution costs and scalable outreach. Operating via s or compromised infrastructure, the per can fall below $0.0001, enabling billions of messages daily with upfront investments in propagation estimated at thousands of dollars for large-scale operations. This structure yields profitability even at conversion rates as low as 1 in 12.5 million responses, where a single successful or sale—yielding hundreds to thousands in profit—offsets vast non-responses. Empirical analysis of campaigns like those from the Cutwail reveals net profits of $1.7–4.2 million over 14 months, driven by pharmaceutical and promotions with response-driven affiliate payouts. For recipients and infrastructure providers, costs manifest in productivity losses, , and escalated risks. U.S. firms and consumers incur approximately $20 billion annually in direct expenditures on filtering, lost time (averaging 10–20 minutes daily per worker), and indirect harms like phishing-induced breaches averaging $4.88 million each. Globally, constitutes 45–50% of traffic, straining and resources equivalent to billions in uncompensated operational overhead, while enabling downstream that amplifies economic damage beyond mere annoyance. These externalities—unpriced negative impacts on non-participants—sustain the activity, as spammers externalize detection evasion and burdens onto email providers and regulators. The persistence of spamming reflects a rational where operator benefits exceed private costs, despite rising countermeasures. models indicate campaigns remain viable if marginal profit per conversion surpasses delivery expenses, a threshold met through volume and product margins (e.g., 50–80% on goods). spam markets generate $180–360 million yearly in gross revenues, underscoring low enforcement efficacy and adaptation via techniques. However, escalating sophistication and legal penalties have compressed margins, with botnet dismantlements reducing some operations' outputs by orders of magnitude, though new entrants continually recalibrate via cheaper underground tools. This dynamic incentivizes innovation in evasion over cessation, as shutdown risks are diffused across pseudonymous networks.

Non-Commercial and Activist Variants

Non-commercial spamming encompasses unsolicited bulk communications disseminated for ideological, religious, political, or purposes rather than direct financial gain. These variants often evade regulations like the U.S. , which primarily targets commercial messages, leaving recipients with limited recourse such as unsubscribing where offered or reporting to platforms. Early instances appeared on in the , including religious proselytizing posts that flooded discussions unrelated to the content. Religious spamming frequently involves automated distribution of evangelical materials, such as emails appending verses or links to scripture for every outgoing message from users of services like FaithNames.org, which markets itself as a Christian email platform embedding topical messages to facilitate witnessing. have been documented sending unsolicited religious mailings via postal services, with recipients reporting repeated deliveries despite requests to , though variants persist as lower-cost alternatives to traditional efforts. Such tactics aim to convert or remind, but empirical data from spam filters indicate they contribute to inbox clutter, with religious-themed unsolicited s comprising a subset of non-phishing annoyances reported by users. Political spamming surged during the 2024 U.S. elections, with campaigns sending billions of unsolicited texts for and ; Democratic operations alone dispatched over 1 billion messages in the final months, often purchased from data brokers without prior consent, leading to widespread recipient fatigue. These messages typically lack functional unsubscribe mechanisms due to exemptions for political content under laws like the Telephone Consumer Protection Act for certain voter outreach, though recipients can register with the for partial relief. Critics argue this volume—exacerbated by super PACs and grift networks raising millions while delivering minimally to candidates—distorts discourse by prioritizing volume over substance, with one analysis estimating spam PACs funneled $11 million to campaigns amid broader spam networks. Activist variants include coordinated floods targeting officials or agencies to pressure policy changes, such as the September 2024 campaign by LGBTQ groups overwhelming the Department of Public Safety's internal email with thousands of messages protesting transgender requirements, prompting the agency to create a dedicated inbox to manage the . Similar tactics, akin to historical "fax attacks" in the , leverage for but risk backlash, as seen in post-2024 waves of unsolicited partisan or hate texts that evaded filters, highlighting vulnerabilities in carrier-level blocking. While proponents frame these as democratic exercises in free speech, reveals they impose externalities like resource diversion—agencies report hours spent triaging—and diminished in communication channels, without proportional policy impact in many cases.

Ethical and Free Speech Debates

Spam imposes significant ethical burdens on recipients by consuming computational resources, bandwidth, and user time without consent, with global estimates placing annual economic costs at over $20 billion as of 2017 due to lost productivity and infrastructure strain. Ethicists argue this constitutes a form of digital trespass, violating norms of reciprocity and respect for others' attention, as spammers externalize costs onto non-consenting parties while pursuing narrow commercial gains. Deceptive practices common in spam, such as forged sender addresses or misleading subject lines, further exacerbate harm by eroding trust in electronic communication and facilitating scams, which accounted for 14.5 billion spam emails daily worldwide in 2023. Defenders of spamming contend it represents a low-barrier form of mass communication akin to traditional advertising, potentially informing consumers about products they might otherwise overlook, with some empirical evidence showing conversion rates as high as 1-2% among targeted demographics despite broad dissemination. From a utilitarian perspective, proponents assert that prohibiting spam could stifle entrepreneurial outreach in digital markets, where opt-in models disadvantage small actors unable to afford compliant infrastructure. However, duty-based ethical frameworks reject this, emphasizing that spam disregards established communication protocols—like email headers signaling consent—and fails the universality test, as widespread adoption would render systems unusable. Free speech debates center on whether unsolicited bulk messaging qualifies as protected expression, particularly under the U.S. First Amendment, which safeguards commercial speech but permits regulation if narrowly tailored to prevent deception or substantial harm. The 2003 CAN-SPAM Act, requiring opt-out mechanisms and accurate headers, has withstood challenges by distinguishing regulable commercial solicitations from fully protected political or non-commercial speech. In contrast, the Virginia Supreme Court invalidated a state anti-spam law on September 12, 2008, ruling it overly broad for criminalizing non-deceptive bulk emails, thereby chilling anonymous and political advocacy. Critics of stringent anti-spam measures, including the ACLU, argue they infringe on the right to communicate anonymously and burden platforms with enforcement that indirectly censors dissenting voices, as seen in challenges to laws conflating with protected like emails. Opponents counter that spam's involuntary delivery model resembles physical or —both regulable under Rowan v. U.S. Post Office (1970)—prioritizing recipients' property rights in their inboxes over senders' speech interests, without implicating core political expression. Empirical data supports this, showing spam's low value-to-noise ratio (over 99% deletion rates) justifies content-neutral filters over blanket protections. These tensions persist internationally, where laws like the EU's balance speech with privacy but face enforcement gaps against cross-border spammers.

References

  1. [1]
    spam - Glossary | CSRC - NIST Computer Security Resource Center
    Definitions: Electronic junk mail or the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. Sources: CNSSI 4009 ...Missing: credible | Show results with:credible
  2. [2]
    What Is Spam - Internet Society
    Jul 27, 2014 · Definitions of spam. The classic definition of spam is unsolicited bulk messages, that is, messages sent to multiple recipients who did not ask ...
  3. [3]
    Origin of the term "spam" to mean net abuse - Brad Templeton
    Rich Frueh believes the term originated on Bitnet's Relay, the early chat system that IRC (Internet Relay Chat) was named after. When the ability to input a ...
  4. [4]
    Why is junk mail called spam? A brief inbox history – Microsoft 365
    May 12, 2023 · The term 'spam' came from a Monty Python sketch where Vikings chanted about Spam, a canned meat brand, which became synonymous with annoying ...
  5. [5]
    The History of Digital Spam - Communications of the ACM
    Aug 1, 2019 · The first reported case of digital spam occurred in 1978 and was attributed to Digital Equipment Corporation, who announced their new computer ...
  6. [6]
    What Is Spam? - Email Spam Threats & Protection | Proofpoint US
    Spam, in the context of cybersecurity, refers to any unsolicited and often irrelevant or inappropriate messages sent over the internet.Missing: credible sources
  7. [7]
    Spam Statistics 2025: Survey on Junk Email, AI Scams & Phishing
    Oct 16, 2024 · 160 billion spam emails are sent every day, with 46% of the 347 billion daily emails sent, considered spam (numbers recorded for 2023). · The ...
  8. [8]
    CAN-SPAM Act: A Compliance Guide for Business
    The CAN-SPAM Act, a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop ...
  9. [9]
    Controlling the Assault of Non-Solicited Pornography and Marketing ...
    This Act establishes requirements for those who send unsolicited commercial email. The Act bans false or misleading header information and prohibits deceptive ...Missing: definition | Show results with:definition
  10. [10]
    What is Spam? | Definition & Types of Spam - Malwarebytes
    Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via ...
  11. [11]
    Spam - an overview | ScienceDirect Topics
    Spam is defined as bulk e-mail sent to individuals who did not request or expect it, often for advertising purposes or to disrupt e-mail systems.
  12. [12]
    What is Spam? - GeeksforGeeks
    Jul 23, 2025 · Spam describes large numbers of undesired messages sent via email, instant chatting, social media, or text messages.
  13. [13]
    What is the CAN-SPAM Act? | Wex - Law.Cornell.Edu
    The CAN-SPAM Act sets a national standard for spam email regulation, prohibiting deceptive information, requiring return addresses, and opt-out for emails.
  14. [14]
    What is Spam? Types, Risks, and How to Protect Your Business
    Jul 17, 2025 · Spam refers to unsolicited, usually irrelevant messages broadcast over the internet to a large segment of users for advertising, phishing, malware, or to ...Missing: credible | Show results with:credible
  15. [15]
    What is Spamming? How It Works & Examples - Twingate
    Jul 26, 2024 · Spamming refers to the practice of sending unsolicited and often irrelevant messages over the internet to a large number of users.<|separator|>
  16. [16]
    The Evolution of Spam: The History (Part 1 of 3) - Abusix
    The term “spam” in this context is believed to have originated from a Monty Python sketch in which the word “spam” is repeated excessively. However, spam ...
  17. [17]
    [PDF] The History of Spam | Internet Society
    1993 First use of the term spam was for a post from USENET by Richard Depew to news.admin.policy, which was the result of a bug in a software program that ...<|separator|>
  18. [18]
    The Origin of Spam and Other Online Intrusions - USC Viterbi
    Jul 24, 2019 · The term “spam” is internet slang that refers to unsolicited commercial email (UCE). The first reported case of spam occurred in 1898, when the ...
  19. [19]
    Telegraph "spam" - CHM Revolution - Computer History Museum
    This is one of the earliest known unsolicited electronic messages. But telegrams were costly to send, which limited spam.<|separator|>
  20. [20]
    Crime on the Wire: How the Telegraph was Used to Send the First ...
    Sep 28, 2018 · It seems that con men were using the telegraph to send the first spam mail: solicitations of horse betting tips to unsuspecting “suckers” who paid handsomely ...
  21. [21]
    Here is a Spam Message from 1864, as Old as the Victorian Internet
    May 30, 2018 · Most of us can see spam's ancestry in junk mail, but it was being delivered electronically a century and a half ago.Missing: unsolicited | Show results with:unsolicited
  22. [22]
  23. [23]
    When did junk mail become a thing in the post? Would Buster ...
    Feb 25, 2025 · One of the first known direct mail campaigns in the US was from the American Anti-Slavery Society (AAS) in 1835.
  24. [24]
    The "Junk Mail" Men: Selling Your Data for over a Century
    Dec 6, 2019 · The mailing list brokers of the mid-century spawned political junk mail and today's Big Brother digital marketing.<|separator|>
  25. [25]
    How We Ended Up With All This Junk Mail - VICE
    Oct 15, 2020 · Videos by VICE · In 1972, junk mail was roughly 25 percent of all mailpieces delivered. · The number of catalogs sent to US addresses ballooned ...
  26. [26]
    The History of Call Center Services - ROI CX Solutions
    The first commercial inbound call centers were established in the 1960s. The telephone had already found its place in the marketing world.
  27. [27]
    Telemarketing: Overview - Ad Age
    Sep 14, 2003 · In the late 1990s, the U.S. Justice Department estimated that telemarketing fraud cost consumers $40 billion to $50 billion each year, or ...Missing: pre- | Show results with:pre-
  28. [28]
    The History of Do Not Call and How Telemarketing Has Evolved
    May 3, 2017 · Florida implemented the first state Do Not Call registry in 1987.8 Other early methods of opting out of telemarketing calls seem quaint today.
  29. [29]
    The Birth of Email Spam: Gary Thuerk's 1978 'Green Card' Incident
    On May 3, 1978, he dispatched an email message to 393 recipients across ARPANET. ... Spam in 1978 and (the Lack of) ARPANET Regulation. Some recipients found it ...
  30. [30]
    (PDF) A brief history of spam - ResearchGate
    PDF | The behaviour both of spammers and those who have sought to counter their activities has gone through a rapid evolution as each has responded to.
  31. [31]
    Reaction to the DEC Spam of 1978 - Brad Templeton
    Possibly the first spam ever was a message from a DEC marketing rep to every Arpanet address on the west coast, or at least the attempt at that.
  32. [32]
    The History of Email Spam - Knak
    Aug 16, 2024 · Email spam evolved alongside the internet, with the first mass email in 1978, and the first spam email in 1970s. The 1990s saw an arms race ...<|separator|>
  33. [33]
    The Spam That Started It All | WIRED
    Apr 13, 1999 · The notorious "Green Card Spam" marked the beginning of a flood of spam that has since made Usenet a very different place.
  34. [34]
    This Day in History: The First Mass Commercial Internet Spam ...
    Apr 12, 2012 · On this day in history, 1994, the world's first mass commercial internet spam campaign was launched when husband and wife immigration lawyer team, Laurence ...
  35. [35]
    The History of Spam Email: Origins, Evolution, and Impact
    Rating 5.0 (1) Oct 7, 2025 · When was the first spam email sent? The very first spam email was sent in 1978 on ARPANET, the internet's predecessor. · What is the origin of ...Missing: pre- | Show results with:pre-
  36. [36]
    5 Reasons Why the CAN-SPAM Act Has Failed to Stop Unwanted ...
    Rating 4.0 (18) Apr 16, 2023 · In sum, the CAN-SPAM Act has failed to stop spam emails due to a lack of enforcement and weak penalties for violators. Additionally, spammers ...
  37. [37]
    40 years on from the first spam email, what have we learned? Here ...
    May 4, 2018 · Spam costs billions each year. By 2010, an estimated 107 trillion pieces of spam email were being sent each year, costing around $130 billion ...
  38. [38]
    Spam, social media dominated the web in 2010 | The Independent
    Jan 19, 2011 · In 2010, 1.88 billion email users worldwide sent 107 trillion emails - 89.1 percent of which were spam.Missing: rise | Show results with:rise
  39. [39]
    Statistics on spam, phishing, viruses, ransomware and advertising
    Jul 31, 2020 · Thanks to the dismantling of botnets, the number of spam messages fell sharply between 2010 and 2012. Spam were fewer in number, but became more ...
  40. [40]
    Rise of spam and compromised accounts in online social networks
    Evidences revealed that within a span of six months (January to July, 2013), there had been a 355% increase in social spam . It was also reported that 1 in 200 ...
  41. [41]
    A Brief History of Spam - USC Viterbi | Magazine
    The first case of email spam is attributed to Dig- ital Equipment Corp. and circulated to 400 users of ARPANET, the precursor to the modern internet. Mid-1990s
  42. [42]
    The history of anti-spam and spam filters - Halon Security
    May 21, 2024 · While early offenders like Thuerk were identified, curbing spam remains elusive. 1994 was the year the first large-scale spam attack hit USENET.
  43. [43]
    Email Spam Statistics 2025: Shocking Trends to Prevent Loss
    Sep 10, 2025 · Daily global email traffic is projected at 376.4 billion emails in 2025. Spam makes up nearly 46.8% of email traffic as of December 2024.Missing: 2010-2025 | Show results with:2010-2025
  44. [44]
    Email Spam Statistics 2025 - DeBounce
    In 2025, the number of emails sent and received worldwide is projected to reach 376.4 billion per day.
  45. [45]
    Half the spam in your inbox is generated by AI – its use in advanced ...
    Jun 18, 2025 · By April 2025, most spam emails (51%) were generated by AI rather than a human. The majority of the emails currently sitting in the average junk/spam folder ...Missing: developments | Show results with:developments
  46. [46]
    AI Now Generates Majority of Spam and Malicious Emails
    Jun 18, 2025 · Over half (51%) of malicious and spam emails are now generated using AI tools, according to a study by Barracuda, in collaboration with researchers from ...Missing: generation developments
  47. [47]
    AI Is Behind 50% Of Spam — And Now It's Hacking Your Accounts
    Jun 20, 2025 · It's official: more than half of the spam that you receive has been created using AI tools. That's the finding of newly published research.
  48. [48]
    Why Spam Decreased: Insights into Cybersecurity Evolution - LinkedIn
    Sep 27, 2025 · ... Email In recent years, we have observed a consistent downward trend in global spam volume. This reduction is no coincidence but the result ...
  49. [49]
    30 Email Spam Statistics to Know in 2025 - AgainstData
    May 19, 2025 · In 2025, 45% of daily emails are spam, with 14.5 billion sent daily. The US and China send the most, and spam costs businesses $20.5 billion ...Missing: 2010-2025 | Show results with:2010-2025
  50. [50]
    Operation Endgame | Botnets disrupted after international action
    May 30, 2024 · This effort targeted multiple botnets such as IcedID, Smokeloader, SystemBC, Pikabot and Bumblebee, as well as some of the operators of these botnets.
  51. [51]
    2025 Botnet Trend Report - NSFOCUS
    NSFOCUS now releases the 2025 Botnet Trend Report based on our monitoring data and analysis. Please fill in the form below to receive your copy of the report.
  52. [52]
    Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws ...
    Oct 13, 2025 · Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over ...
  53. [53]
    New Botnet Leverages DNS Misconfiguration to Launch Massive ...
    Sep 22, 2025 · New botnet uses DNS flaws & 13K hijacked MikroTik routers to spread malspam via fake invoices, evading IP filters & masking origins.
  54. [54]
    Bad sushi: China-nexus phishers shift to residential proxies
    Oct 16, 2025 · Spamhaus reports a China-linked phishing shift in Japan, using residential proxy networks. Learn about the campaign and countermeasures.
  55. [55]
    [PDF] Fast Flux: A National Security Threat
    Apr 3, 2025 · Malicious cyber actors, including cybercriminals and nation-state actors, use fast flux to obfuscate the locations of malicious servers by ...
  56. [56]
    Understanding Email Spam: A Comprehensive Guide to Types ...
    Dec 28, 2024 · The Technical Infrastructure of Spam​​ These networks: Distribute the sending load across multiple IP addresses. Evade detection and blocking ...Types Of Email Spam Attacks · Risks Of Email Spam · Technical Controls
  57. [57]
    What is Bulletproof Hosting? - SentinelOne
    Jul 31, 2025 · Bulletproof hosting services are actively used by platforms such as online casinos, spam distribution sites, and pornographic resources.
  58. [58]
    Bulletproof Hosting: A Critical Cybercriminal Service | Intel 471
    Jan 22, 2024 · Cybercriminals use "bulletproof" hosting in order to keep malware and phishing pages online longer. Here's why this is a sought-after ...
  59. [59]
    What is bulletproof hosting? - Huntress
    Oct 3, 2025 · Phishing and Spam Campaigns: Many fake websites and spam email servers rely on bulletproof hosting to avoid constant takedowns. Malware ...
  60. [60]
    Bulletproof hosting – there's a new kid in town | Spamhaus
    Dec 19, 2019 · What operations are running on this hosting service? · Carding and hacker forums · Spammer sites · Phishing sites · Malware distribution sites ...
  61. [61]
    People's Republic of China-Linked Actors Compromise Routers and ...
    Sep 19, 2024 · People's Republic of China (PRC)-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home office (SOHO) ...Missing: spam | Show results with:spam
  62. [62]
    US-based RDPs under attack from immense global botnet | SC Media
    Oct 14, 2025 · BleepingComputer reports that attacks involving a massive multi-country botnet have been aimed at U.S.-based Remote Desktop Protocol ...
  63. [63]
    Fly Phishing. How to Bypass SPAM Filters - SpecterOps Blog
    Jun 12, 2024 · One of my favorite tricks for bypassing content filters is to simply copy legitimate emails that have hit my inbox in the past.
  64. [64]
    [PDF] Behavioral Experiments in Email Filter Evasion
    The problem is that spammers have themselves become quite sophisticated in the techniques of filter evasion, or manipulating the spam email templates to bypass ...<|separator|>
  65. [65]
    The Evolution of Spam: The Future and Generative AI (Part 3 of 3)
    Advancements Empowering Spammers​​ Evasion Techniques: New technologies may offer spammers novel ways to evade detection, such as using decentralized networks or ...
  66. [66]
    [PDF] Investigating Evasive Techniques in SMS Spam Filtering
    Spammers employ deliberate spelling mistakes as an evasion tactic to outsmart spam filters [54]. To quantify this phe- nomenon, we used Python's pyspellchecker ...
  67. [67]
    [PDF] Investigating Evasive Techniques In SMS Spam Filtering A ... - RJPN
    SMS spam evasion includes character obfuscation, lexical manipulation, and crafted perturbations, ranging from simple to complex adversarial techniques.<|separator|>
  68. [68]
    Evasive URLs in Spam | Trustwave
    Sep 17, 2020 · Evasive URLs in spam use encoded hexadecimal IP addresses in the hostname to evade detection, which browsers convert to a valid IP.
  69. [69]
    Hackers Employ hidden text salting Method to Trick spam filters ...
    Jan 28, 2025 · Hidden text salting enables attackers to obscure information by inserting irrelevant or invisible content within the HTML structure, ...
  70. [70]
    Techniques Attackers Use To Evade Email Security - Forbes
    Feb 3, 2025 · Obfuscation is a technique used by threat actors to mask or disguise malicious elements in emails such as attachments, URLs and content. This ...
  71. [71]
    [PDF] Machine Learning in Adversarial Environments - covert.io
    Jun 28, 2010 · The urgency of spam filter evasion has lead to a significant interest to investigation of spam evasion constraints and robust spam filtering ...
  72. [72]
    [PDF] arXiv:2210.15043v2 [cs.CR] 1 Jun 2023
    Jun 1, 2023 · Adversarial machine learning: The rise in. AI-enabled crime and its role in spam filter evasion. 2022. [51] Tom Sorell. Scambaiting on the ...
  73. [73]
  74. [74]
    Diving deep into email spam statistics - Pingdom
    Jan 19, 2011 · On average in 2010, a bot (compromised computer) in a botnet sent out 77 spam emails per minute. In some botnets that number was over 200 per ...Missing: examples | Show results with:examples
  75. [75]
    The Evolution of Botnets: How They Have Transformed Cyber ...
    Feb 16, 2025 · 2007: The Storm Botnet – One of the largest botnets at the time, Storm infected millions of computers and was used for spam and DDoS attacks.Missing: statistics | Show results with:statistics
  76. [76]
    Top Spam Botnets Exposed - Secureworks
    Apr 7, 2008 · Collectively the top botnets are capable of sending over 100 billion spams per day; Srizbi maintains the top spot both in terms of number of ...Missing: takedown | Show results with:takedown
  77. [77]
    Pharma Wars: 'Google,' the Cutwail Botmaster - Krebs on Security
    Jan 1, 2012 · For many years, Cutwail has been among the top three most prolific spam botnets. With the recent takedown of the Rustock botnet, Cutwail now is ...
  78. [78]
    Experts take down Grum spam botnet, world's third largest - CNET
    Jul 18, 2012 · Computer-security experts took down the world's third-largest botnet, which they say was responsible for 18 percent of the world's spam.
  79. [79]
    Botnet Business Models, Takedown Attempts, and the Darkweb Market
    Grum was considered as the third largest spam botnet in 2012, along with Lethic and Pushdo/Cutwail. It is estimated to have had around 560,000 to 840,000 ...
  80. [80]
    [PDF] ENISA ETL2020 - Spam
    A persistent high-volume spam campaign emanated from a botnet system sending messages with randomized headers and often changing the template. 03_Emotet spam ...
  81. [81]
    [PDF] Characterizing Botnets from Email Spam Records - UC Berkeley
    The primary indicator we use to guide assigning multiple bots to membership in a single botnet is participation in spam campaigns, coordinated mass emailing of ...
  82. [82]
    23 Email Spam Statistics to Know in 2025 - Mailmodo
    Mar 18, 2025 · In 2023, around 45.6% of all emails worldwide were identified as spam. In December 2024, spam messages accounted for more than 46.8% of email ...
  83. [83]
    2025 Phishing Statistics: (Updated August 2025) - Keepnet Labs
    Aug 13, 2025 · In 2024, 1 in 5 emails globally (20%) contained some form of phishing or spam content. Over 1 billion emails were exposed in breaches in 2021, ...
  84. [84]
    Spear phishing techniques in mass phishing: a new trend | Securelist
    Jul 11, 2024 · Bulk phishing email campaigns tend to target large audiences. They use catch-all wordings and simplistic formatting, and typos are not ...
  85. [85]
    New FTC Data Show Top Text Message Scams of 2024
    Apr 16, 2025 · New data from the Federal Trade Commission show that in 2024, consumers reported losing $470 million to scams that started with text messages.
  86. [86]
    Smishing Statistics: SMS Phishing Trends & Stats (Updated 2025 Sep)
    Jan 26, 2024 · The average American receives 41 spam texts per month, many being smishing attempts. Over 1.1 billion spam texts are sent per minute globally.
  87. [87]
    SMS Marketing Statistics - The Power of Immediate Engagement
    Apr 4, 2024 · SMS messages have an average open rate of around 95%, compared to email which ranges between 15-20%​. The immediacy and direct nature of SMS ...
  88. [88]
    How to Spot and Block Instagram Spam Bots | ClickCease Blog
    Aug 9, 2023 · Here are some tips on how to recognize spam bots on Instagram: ... Examples of spam comments or messages: Promote it on; Send pic; Send ...
  89. [89]
    Instagram Spam Bots : Here's How To Stop The Madness
    One of the most recognizable traits of a bot is the posting of vague or generic comments. Phrases like “Awesome pic ” or “Love this ❤️” frequently dot posts, ...
  90. [90]
    Facebook spam content deletion 2025 - Statista
    Sep 4, 2025 · Facebook removed 165 million pieces of spam in the second quarter of 2025, down from 366 million pieces in the previous quarter.
  91. [91]
    It's not just you. More weird spam is popping up on Facebook - CNN
    Sep 3, 2024 · Facebook users have complained of an increase in AI-generated spam content on the platform, as new artificial intelligence and other tools make ...
  92. [92]
    In another major cleanup effort, Elon Musk's X (formerly Twitter) has ...
    Oct 18, 2025 · In another major cleanup effort, Elon Musk's X (formerly Twitter) has announced the successful removal of 1.7 million fake accounts as part ...
  93. [93]
    13 Instagram scams to look out for in 2025 - LifeLock
    Mar 26, 2025 · From fake giveaways to phishing attempts, Instagram scams can compromise your privacy and security, empty your bank account, and even lead to a stolen identity.
  94. [94]
    5 Common Instagram Scams (With Examples!) | Trend Micro News
    Mar 20, 2024 · 5 Common Instagram Scams (With Examples!) ; Giveaway Scam; Account Purchase Scam; Fake Influencer Scam ; Be wary of unsolicited messages and ...Password Reset Link Scam · Forex / Cryptocurrency... · Giveaway Scam
  95. [95]
    Twitter Spam Bots : Faking Comments & Engagement - Fraud Blocker
    Twitter is overrun with bots—some even have blue checkmarks. Find out how fake accounts manipulate conversations and how to protect yourself.
  96. [96]
    How to Remove Counterfeits from X (formerly Twitter) - Corsearch
    In this guide, we look at the common scams on X/ Twitter and how to manually remove counterfeits and infringing content from the platform.<|separator|>
  97. [97]
    About suspicious messages and scams | WhatsApp Help Center
    Understanding common scams could help you recognize a scammer and protect yourself. Someone attempting to scam you might message you, call you, or add you to a ...Missing: statistics | Show results with:statistics
  98. [98]
    WhatsApp Statistics 2025: Messaging, Calls, Business Use & More
    Oct 3, 2025 · WhatsApp's AI-powered phishing detection system blocks around 1.8 million suspicious links weekly. In response to data protection laws, users in ...
  99. [99]
    WhatsApp frauds and scams becoming increasingly common
    May 22, 2025 · The data shows 9% received such messages at least once; 19% a few times; and 7% several times. 35% Indians surveyed who use Whatsapp have ...
  100. [100]
    15 WhatsApp scams happening right now and how to avoid them
    Aug 19, 2025 · Learn how to spot and avoid WhatsApp scams and ways to protect yourself while chatting online.Missing: statistics | Show results with:statistics
  101. [101]
    Musk's X Begins Bot Purge—Here's How X Has Tried To Squash Its ...
    Apr 4, 2024 · X's safety account followed up Musk's post hours later and said it is eliminating accounts that violate manipulation and spam rules, telling ...
  102. [102]
    Forum Spam: How to Permanently Stop Spam Bot Registrations
    Jan 19, 2024 · This guide will start by discussing forum spam and all its variations. Then, it will outline the negative effects of spam and why certain anti-spam techniques ...
  103. [103]
    How to spam a forum. | The Admin Zone
    Dec 8, 2012 · So, 2 main types of spam, Human and automated. This can then be split down into profiles, and posts. Posts are good as they give you the in ...
  104. [104]
    [PDF] A Quantitative Study of Forum Spamming Using Context-based ...
    Click-through cloaking, a new and lesser-known technique, attempts to fool human spam investigators and automatic spam-detection tools that directly visit the ...<|separator|>
  105. [105]
    Top 10 Black Hat SEO Techniques to Avoid - Bluehost
    Sep 16, 2025 · Black hat SEO practitioners use manipulative tactics against search engine rules. These include keyword stuffing, invisible text and deceptive redirects.Introduction · What are the top 10 black hat... · Why should you avoid black...
  106. [106]
    14 Black Hat SEO Examples & Case Studies
    What is black hat SEO? Black Hat SEO is an attempt to improve search rankings using techniques search engines disapprove of in their guidelines.
  107. [107]
    White Hat and Black Hat SEO Best Practices in the Age of AI
    Aug 19, 2025 · Creating AI-generated avatars, fake author bios, and synthetic LinkedIn profiles to appear credible are considered black hat SEO practices. An ...
  108. [108]
    Spam, deceptive practices, & scams policies - YouTube Help
    YouTube doesn't allow spam, scams, or other deceptive practices that take advantage of the YouTube community.
  109. [109]
    Product Spam on YouTube: A Case Study
    We examine YouTube video reviews for several thousand products retrieved from three commercial search engines and conduct spam detection experiments.
  110. [110]
    YouTube Content Stealing Spambots on Reddit - Random Notes
    Sep 15, 2016 · Spambots are posting links to stolen videos on Reddit, copying comments from others to masquerade as legitimate users.
  111. [111]
    47% of all internet traffic came from bots in 2022 : r/technews - Reddit
    May 15, 2023 · Most traffic is viral, the viruses that install spam and spam-bots to users. ... 58.6% of all internet statistics were generated by bots using ...
  112. [112]
    Opinion Spam Detection in Web Forum: A Real Case Study
    Opinion spamming refers to the illegal marketing practice which involves delivering commercially advantageous opinions as regular users.
  113. [113]
    Unmasking the Top Five SMS Scams of 2024–2025 - IoT Marketing
    May 5, 2025 · In 2024, consumers reported losses of $470 million from SMS-initiated scams—more than five times the 2020 total—<|separator|>
  114. [114]
    Top text scams of 2024 | Federal Trade Commission
    Apr 14, 2025 · [2] The share of text scam reports indicating that money was lost increased as follows: 5% (2020), 4% (2021), 6% (2022), 9% (2023), 11% (2024).
  115. [115]
    U.S. Consumers Received Nearly 5 Billion Robocalls in April 2025 ...
    May 6, 2025 · That's also a 12.3% increase on a year-over-year basis from April 2024. "We're seeing robocalls continue to trend higher in 2025, after a ...
  116. [116]
    Ringing in Our Fears 2025: Robocalls hit 6-year high - PIRG
    Oct 16, 2025 · The monthly average of scam and telemarketing calls increased from 2.14 billion a month in 2024 to 2.56 billion a month through September, ...
  117. [117]
    Introduction to VoIP fraud - TransNexus
    VoIP devices are the primary tools used by fraudsters. Studies have shown that 46% of fraudulent calls were made from VoIP phones.
  118. [118]
    IoTD: An approach to identify E-mails sent by IoT devices
    Nov 1, 2021 · Spammers use not only laptops or desktop computers, but also IoT devices to deliver spamming mails. A study [5] discovers that spamming brings ...
  119. [119]
    Zscaler Study Confirms IoT Devices are a Major Source of Security ...
    Jul 15, 2021 · The majority of compromised IoT devices, nearly 90 percent, were observed sending data back to servers in one of three countries: China (56 ...Missing: emerging | Show results with:emerging
  120. [120]
    Ensemble-Based Spam Detection in Smart Home IoT Devices Time ...
    This paper investigates the trustworthiness of the IoT devices sending house appliances' readings, with the help of various parameters.
  121. [121]
    International Scammers Steal Over $1 Trillion in 12 Months in New ...
    Nov 7, 2024 · Scammers have siphoned away over $1.03 trillion globally in just the past year—a figure that rivals the GDP of some nations, in the Global ...
  122. [122]
    New FTC Data Show a Big Jump in Reported Losses to Fraud to ...
    Mar 10, 2025 · Newly released Federal Trade Commission data show that consumers reported losing more than $12.5 billion to fraud in 2024, which represents a 25% increase over ...
  123. [123]
    The Hidden Cost of Spam: How It's Draining Your Business and ...
    Apr 6, 2025 · Lost Productivity: If each employee spends just 1 minute daily on spam at $30/hour, that's $50.10 daily or $18,250 yearly. That's real money ...
  124. [124]
    Phishing Trends Report (Updated for 2025) - Hoxhunt
    A staggering 64% of businesses report facing BEC attacks in 2024, with a typical financial loss averaging $150,000 per incident​. These phishing attacks ...
  125. [125]
    The True Costs of Spam Blocking - Abusix
    Neglecting spam can result in various costs within an organization, affecting productivity, security, and financial well-being for companies of all sizes. 1 ...
  126. [126]
    Employees can lose around two business days per year sorting out ...
    May 31, 2022 · Employees who receive 30-60 external emails per day could be wasting 11 hours every year looking through and identifying spam messages.
  127. [127]
    Spam emails are wasting hundreds of work hours every year
    Jun 1, 2022 · According to a Kaspersky report showing people can lose up to 80 hours a year just scrolling through, or filtering out, spam messages.
  128. [128]
    The Growth And Resulting Cost Of Spam Abuse To Service Providers
    The Cost Of Bandwidth. Service providers have to purchase bandwidth based on the projected usage of their current customer base. This cost can form a large ...Missing: server | Show results with:server
  129. [129]
    Who pays for the cost of spam and email delivery? - Technical - Suped
    Apr 25, 2025 · The hidden cost of spam for businesses · Lost productivity: Employees spend valuable time identifying, deleting, or reporting spam, diverting ...
  130. [130]
    How much spam hurts the economy - JAM Software
    Jul 17, 2023 · The cost of €22,500 per year just by processing spam emails may seem high, but it is quite realistic. If the spam filter of our Exchange Server ...
  131. [131]
    Storage Cost of Spam 2.0 in a Web Discussion Forum - ResearchGate
    The experiment resulted that the storage cost for our research forum are AUD 23.66 based on self-hosted server, AUD133.90 for commercial web hosting, and AUD11.
  132. [132]
    Measuring the Business Impact of Spam Blocking - Abusix
    Spam emails also consume network bandwidth and storage resources. By filtering out spam at the server level, ISPs can reduce the load on their infrastructure, ...
  133. [133]
    Email Marketing, Spam, and the Erosion of Trust
    May 19, 2016 · Unfortunately, a tidal wave of spam mail has led to the erosion of consumer trust. Here are four ways to help your messages stand out and build ...Missing: communications | Show results with:communications
  134. [134]
    The True Cost of Spam and Scam Calls in America - Truecaller
    Mar 12, 2024 · The societal impact of spam calls extends beyond financial loss, creating significant disruptions in communication and leading to missed ...Missing: economic | Show results with:economic
  135. [135]
  136. [136]
    Exposure to Higher Rates of False News Erodes Media Trust and ...
    Aug 7, 2024 · We found that exposure to higher proportions of false news decreased trust in the news but did not affect participants' perceived accuracy of news headlines.
  137. [137]
    [PDF] The Carbon Footprint of Email Spam Report
    Globally, annual spam energy use totals 33 billion KWh, equivalent to 2.4 million US homes. Each spam message emits 0.3 grams of CO2.
  138. [138]
    Report: The Massive Carbon Footprint of Spam Emails - Today Testing
    Jun 4, 2025 · Spam Email's Environmental Impact: By the Numbers · The average spam email has a footprint of 0.3g CO2e, according to the BBC (although this ...
  139. [139]
    How Your Netflix And Email Hoarding Are Fueling Environmental ...
    Sep 16, 2024 · The carbon footprint of a single email is relatively small—around 0.3 grams of CO2 per email without attachments—but when multiplied by the ...
  140. [140]
    [PDF] Protecting privacy and fighting spam. - European Commission
    Protecting privacy and fighting spam. The EU's ePrivacy Directive sets specific limits on how personal data can be stored and used, particularly when it ...
  141. [141]
    What is the ePrivacy Directive? - Cloudflare
    The ePrivacy Directive is an important European privacy directive regulating cookie usage, data minimization, unsolicited emails, and more.
  142. [142]
    [PDF] OECD Anti-Spam Toolkit of Recommended Policies and Measures
    The main lines and objectives of national and international anti-spam policy should be outlined at an earlier stage and need to underlie the entire governmental ...Missing: foundational | Show results with:foundational
  143. [143]
    International Cooperation Agreements | Federal Trade Commission
    Memorandum of Understanding Among Public Authorities of the Unsolicited Communications Enforcement Network Pertaining to Unlawful Telecommunications and Spam
  144. [144]
    CAN-SPAM Rule - Federal Trade Commission
    The CAN-SPAM Act requires the Commission to issue regulations “defining the relevant criteria to facilitate the determination of the primary purpose of an ...
  145. [145]
    Canada's anti-spam legislation
    Jul 15, 2024 · Canada's anti-spam legislation (CASL) protects consumers and businesses from the misuse of digital technology, including spam and other electronic threats.Understand Canada’s anti... · Protect your business and... · Report spam
  146. [146]
    Frequently Asked Questions about Canada's Anti-Spam Legislation
    Jul 18, 2024 · Frequently Asked Questions about Canada's Anti-Spam Legislation. How to report spam. Canadians can report spam to the Spam Reporting Centre.
  147. [147]
    Proposal for an ePrivacy Regulation | Shaping Europe's digital future
    Protection against spam: this proposal bans unsolicited electronic communications by email, SMS and automated calling machines. Depending on national law people ...
  148. [148]
    Fight against spam, spyware and malicious software - EUR-Lex
    Fight against spam, spyware and malicious software. Despite the passing of Community legislation banning spam in Europe, illicit online activities continue ...
  149. [149]
    Electronic and telephone marketing | ICO
    PECR restrict unsolicited marketing by phone, fax, email, text, or other electronic message. There are different rules for different types of communication.Missing: spam | Show results with:spam
  150. [150]
    Spam Act 2003 - Federal Register of Legislation
    Spam Act 2003. In force. Administered by. Department of Infrastructure, Transport, Regional Development ...
  151. [151]
    Avoid sending spam - ACMA
    Nov 29, 2024 · If you plan to send marketing messages or emails, you must first have consent from the person who will receive them.
  152. [152]
    INTEL CORPORATION v. HAMIDI (2003) - FindLaw Caselaw
    Intel sued Hamidi and FACE-Intel, pleading causes of action for trespass to chattels and nuisance, and seeking both actual damages and an injunction against ...
  153. [153]
    Intel Corporation v. Hamidi: Spamming Is Not a Trespass in California
    Oct 13, 2003 · The Court, in a 4-3 decision, held that Intel could not use state trespass to chattels laws to block Hamidi's e-mail messages to its employees, ...
  154. [154]
    <em>Intel v. Hamidi</em> and the Future of Trespass to Chattels
    Aug 30, 2023 · Intel Corp. v. Hamidi, the canonical case about whether unwanted e-mail spam sent to a company's server could give rise to a trespass to chattels claim.
  155. [155]
    Microsoft and Former “Spam King” Scott Richter Announce Settlement
    Aug 9, 2005 · Microsoft Corp. and Scott Richter today announced they reached a full settlement of Microsoft's claims against Mr. Richter and his company OptInRealBig.com LLC.
  156. [156]
    Former spammer to pay Microsoft $7 million - CNET
    Aug 9, 2005 · In its lawsuit, Microsoft argued that Richter and his companies violated state and federal law by sending e-mail and helping other people send e ...
  157. [157]
    Microsoft settles with 'Spam King' for $7 million - Network World
    Aug 9, 2005 · Microsoft's case, brought in Washington state, accused Richter of sending mass e-mails with misleading subject lines and forged sender addresses ...
  158. [158]
    FTC Announces First Can-Spam Act Cases
    Apr 29, 2004 · At the request of the FTC, a U.S. District Court judge has barred the illegal spamming and frozen the defendants' assets. Federal criminal ...Missing: important | Show results with:important
  159. [159]
    9th Circuit Deals Blow to "Professional" CAN-SPAM Complaint Mills
    Oct 8, 2009 · The court also found the Washington state Commercial Electronic Mail Act (CEMA) to be displaced by the CAN-SPAM Act, which preempts state laws ...
  160. [160]
    FTC's Largest CAN-SPAM Action: What Every Email Marketer ...
    Oct 14, 2024 · This case marks the largest-ever penalty under the CAN-SPAM Act. The $2.95 million fine underscores the FTC's commitment to enforcing email ...
  161. [161]
    Permanent Injunction and $650000 Civil Penalty Imposed on ...
    Aug 22, 2023 · Permanent Injunction and $650,000 Civil Penalty Imposed on Experian Consumer Services for Allegedly Sending Commercial Emails Without Providing ...
  162. [162]
    Who can sue under the CAN-SPAM Act? | Wex - Law.Cornell.Edu
    The Federal Trade Commission ("FTC"), certain other Federal agencies, and state attorneys general have standing to bring suits under Section 7 of the Act. See ...
  163. [163]
    The evolution of antispam measures from basic filters to cloud ...
    Aug 23, 2023 · This article explores the history of spam, and spam filters from early ineffective attempts to curb it to the advanced system we now have.
  164. [164]
  165. [165]
    [PDF] Spam Filtering in the Modern Era: A Review of Machine Learning ...
    This review examines the current state of spam filtering systems, particularly those using Machine. Learning (ML) and Deep Learning (DL) models. A comparative ...
  166. [166]
    How Spam Filtering Techniques Are Adopting The ... - DuoCircle
    Some popular Machine Learning techniques for spam filtering are Naive Bayes, Support Vector Machines, Decision Trees, Neural Networks, etc.Missing: SMS | Show results with:SMS<|separator|>
  167. [167]
    [PDF] an examination of machine learning algorithms for spam filtering
    This study develops a hybrid spam filter using Random Forest, Neural Networks, and Naive Bayes. Random Forest achieved 95.87% accuracy, and the hybrid improved ...Missing: studies | Show results with:studies
  168. [168]
    enhancing email spam detection through ensemble machine learning
    This study demonstrates the effectiveness of an ensemble approach for email spam detection by aggregating multiple weak machine learning algorithms.Missing: studies | Show results with:studies
  169. [169]
    Email Spam: A Comprehensive Review of Optimize Detection ...
    Sep 25, 2024 · The review aims to systematically identify various ML and DL methods applied for spam detection, evaluate their effectiveness, and highlight ...
  170. [170]
    Evaluating spam filters and Stylometric Detection of AI-generated ...
    Jun 1, 2025 · Introduced 47 novel stylometric features for detecting AI-generated phishing emails. Achieved 96% accuracy with XGBoost in detecting AI- ...
  171. [171]
    How AI and machine learning are shaping the future of spam filtering
    Rating 4.6 (8) Mar 6, 2025 · Discover how AI is transforming spam filtering and email security. Learn how it detects and creates spam, deceives filters, and what to ...Why classic spam filters don't... · How AI fuels the problem · How AI is the solution
  172. [172]
    Spam Filtering Techniques: Security Benefits and Solutions.
    Aug 27, 2025 · Spam filters prevent unsolicited or malicious emails from reaching your inbox. Filters check authentication protocols (SPF, DKIM, DMARC) and ...Missing: SMS | Show results with:SMS
  173. [173]
    How AI Empowers Both Cyber Spammers and Defenders | Enea
    Jul 17, 2025 · Rich media messaging will require AI in spam protection ... AI agents, for example, make AI a much more helpful technology for spam filtering.Missing: defenses | Show results with:defenses
  174. [174]
    AI Scams and Fraud: 5 Trends to Look Out for as 2025 Ends
    Oct 3, 2025 · In 2025, up to 83% of phishing emails were AI-generated, a sharp rise from previous years. BEC scams, where fraudsters impersonate executives ...
  175. [175]
    Machine learning for email spam filtering: review, approaches and ...
    Our review compares the strengths and drawbacks of existing machine learning approaches and the open research problems in spam filtering.
  176. [176]
    The Evolution of Spam: From Basic Filters to AI solution - EmailTree AI
    From the early days of basic filters to the latest AI solutions, explore the evolution of spam and its impact on email with EmailTree.ai.Missing: SMS | Show results with:SMS
  177. [177]
    Understanding Gmail and Yahoo DMARC Requirements - Dmarcian
    Jan 2, 2024 · Starting February 2024, your email domain must have a DMARC policy in your DNS. These messages must pass DMARC Alignment or they will not be delivered.
  178. [178]
    Microsoft Outlook steps up email security with new policies
    Starting May 5, 2025, Microsoft will begin enforcing stricter policies. So, if your company sends out over 5000 emails per day, you must have proper ...
  179. [179]
    Outbound spam protection - Microsoft Defender for Office 365
    Sep 3, 2025 · Many email service providers (for example, Gmail, Yahoo!, and Outlook.com) are configured to reject messages that don't meet email ...
  180. [180]
    How are Gmail and Outlook policies raising the bar for DMARC ...
    Jul 22, 2025 · DMARC gives you control over what happens to these fake emails. By setting a DMARC policy, you tell email providers exactly how to handle emails ...
  181. [181]
    Spam - Transparency Center
    Meta regularly publishes reports to give our community visibility into community standards enforcement, government requests and internet disruptions.Missing: social | Show results with:social
  182. [182]
    How Social Media Platforms' Community Standards Address ...
    Apr 1, 2021 · YouTube's policy on spam, deceptive practices, and scams is an example. It prohibits excessive, repeated posting (behavior); scams and ...
  183. [183]
    Social Media Policies: Mis/Disinformation, Threats, and Harassment
    Feb 24, 2025 · Post deletion; · Requiring the user to remove the content; · Temporarily locking the user out of their account; · Profile modifications, if the ...
  184. [184]
    Is there any reason to not have user reporting of phishing emails ...
    Oct 11, 2023 · First of all, letting users report phishing and junk emails is an effective way to help Microsoft improve its anti-spam and anti-malware ...
  185. [185]
    Reducing Spam - CISA
    Reporting messages as spam or junk helps to train the mail filter so that the messages aren't delivered to your inbox. However, check your junk or spam folders ...
  186. [186]
    10 tips on how to help reduce spam - Microsoft Support
    Follow these guidelines to help lower your risk of receiving junk e-mail. Turn off read and delivery receipts and automatic processing of meeting requests.
  187. [187]
    Gmail vs Outlook: Email Deliverability Comparison - Warmforge
    Spam Rates: Gmail's spam rate is lower (6.8%) than Outlook's (14.6%). Ease of Use: Gmail is simpler to set up and integrates better with email marketing tools.
  188. [188]
    [PDF] Effectiveness and Limitations of Statistical Spam Filters - arXiv
    Instead, there is a positive feedback loop, as spammers send larger spam volumes to compensate for the reduced throughput due to filtering. It is because of ...<|control11|><|separator|>
  189. [189]
    Effectiveness and Limitations of Statistical Spam Filters
    In this paper we discuss the techniques involved in the design of the famous statistical spam filters that include Naive Bayes, Term Frequency-Inverse ...
  190. [190]
    The Economics of Spam
    We estimate that American firms and consumers experience costs of almost $20 billion annually due to spam.
  191. [191]
    [PDF] The Economics of Spam - andrew.cmu.ed
    We estimate that American firms and consumers experience costs of almost $20 billion annually due to spam.
  192. [192]
    Anti-Spam Software Market Share, Insights Report 2025 - 2034
    In stockThe anti-spam software market size has grown exponentially in recent years. It will grow from $7.7 billion in 2024 to $9.59 billion in 2025 at a compound annual ...
  193. [193]
    Economics of spam | Word to the Wise
    Mar 1, 2019 · One of the initial drives for filtering was to stop spammers from costing the receivers so much money. Very early on some ISP users had to pay ...<|control11|><|separator|>
  194. [194]
    Spam filters, poor list hygiene are killing email marketing campaign ...
    May 30, 2025 · Email deliverability issues are costing businesses revenues and engagement. Spam filters, bounce rates, and data quality issues are the largest culprits.
  195. [195]
    Proper Incentives? The Economics of Spam Management ... - SSRN
    Sep 16, 2016 · This paper shows that with regard to spam control on mobile wireless phones, the interests of the industry and the consumer are aligned.
  196. [196]
    Understand the ROI of Email Security and Its Benefits for Businesses
    Oct 14, 2025 · Good email security is an essential money-saving investment. Over 90% of cyberattacks begin through spear phishing emails or other ...
  197. [197]
    [PDF] Economic Incentives for Internet Security through Reputation and ...
    Oct 7, 2010 · These three new levels of organization provide economic incentives via reputation and direct economic payments and penalties for ESPs (and users ...
  198. [198]
    [PDF] The Underground Economy of Spam: A Botmaster's Perspective of ...
    We provide an in-depth analysis of the Cutwail spam operation and present detailed statistics based on the analysis of 16 servers belonging to this bot- net.
  199. [199]
    Spam ROI: Profit on 1 in 12.5m Response Rate - SitePoint
    Feb 13, 2024 · Spam ROI: Profit on 1 in 12.5m Response Rate ... It can lead to more spam, as it confirms to the spammer that your email address is active.
  200. [200]
    [PDF] Spamalytics: an empirical analysis of spam marketing conversion
    Sep 1, 2009 · As long as the product of the conversion rate and the marginal profit per sale exceeds the marginal delivery cost, the campaign is profitable.
  201. [201]
    [PDF] The Economics of Spam - David Reiley's
    Spam to end users located in the United States costs approximately $20 billion annually, compared with approximately $200 million in surplus generated by the ...
  202. [202]
    The Tricks of the Trade: What Makes Spam Campaigns Successful?
    Abstract: Spam is a profitable business for cyber criminals, with the revenue of a spam campaign that can be in the order of millions of dollars.Missing: studies | Show results with:studies
  203. [203]
    Beloved in God! Religion in Spam Mails - Marginalien
    Aug 5, 2015 · Their diagnosis pointed out spam mails which brought along a religious message, so to speak an updated version of early missionary mails, e.g. ...
  204. [204]
    FaithNames.org - Christian Email Service - Email with a message
    Every email sent by a FaithNames email user includes a snippet of scripture or a topical message at the bottom of the email and includes a live link to a ...Why FaithNames? · Witnessing With Email · Technical Features · How to Switch
  205. [205]
    Received unsolicited religious mailing from a "neighbor" via USPS
    Sep 28, 2023 · Nothing you can do via the USPS, mailing spam is perfectly legal. However, you can write to the nearest Jehovah's Witness church and request ...4 people including myself have gotten Christian spam messages ...Unwanted religious letter, spam mail? : r/CanadaPost - RedditMore results from www.reddit.com
  206. [206]
    Why do spam emails that I'm receiving have Bible quotes at the end ...
    May 1, 2019 · Spam emails that I'm receiving have Bible quotes at the end of them. What is the point of this? Are they even Bible quotes, and could they be a religious ...
  207. [207]
    What's up with all those unhinged texts from political campaigns? - Vox
    Oct 23, 2024 · ... campaign, go directly to their website and make a donation. If you write a check, you will not get spam text messages for quite awhile. What ...
  208. [208]
    Yes, the Political Spam Texts Were Out of Control This Year
    Nov 7, 2024 · Let's say 'good riddance' to those annoying political spam texts, and recognize that the Democrats now have a serious grifter problem.<|separator|>
  209. [209]
    Political Spam Emails and Texts | You Can't Unsubscribe | Foster Swift
    Jul 21, 2022 · Anyone with an email address or cell phone is painfully familiar with spam messages, unsolicited e-mails, phone calls, and text messages, ...
  210. [210]
    "The Mothership Vortex: An Investigation Into the Firm at the Heart of ...
    ... a network of spam PACs while delivering just $11 million to actual campaigns.” August 3, 2025, 4:10 pm campaign finance, campaigns, chicaneryRick Hasen.
  211. [211]
    LGBTQ activists spam state agency over driver's license policy ...
    Sep 20, 2024 · In an attempt to learn more about the changes, The Texas Newsroom requested all the messages sent to the new internal email.
  212. [212]
    Racist texts bypassed some anti-spam protections after election - NPR
    Feb 2, 2025 · Americans across the country received harmful hate messages via text after the election. The communication industry has been trying to ...
  213. [213]
    [PDF] Political Spam: Why It Sucks and How To Fix It*
    May 24, 2024 · This Comment examines the problem of unsolicited bulk email through the lens of one particular type: political fundraising messages. Part I ...
  214. [214]
    Why Can't We End Spam? Ask An Economist. - JSTOR Daily
    Apr 18, 2017 · Law enforcement recently took out a bot network capable of sending 1.5 billion spam emails a day. So what are the economic incentives—and costs— ...Missing: papers | Show results with:papers
  215. [215]
    The Ethics of Spam - Philosophy, et cetera
    Mar 24, 2005 · Each time someone responds to spam, they guarantee the rest of us will suffer more of it. That's just wrong. Given the huge costs imposed on ...
  216. [216]
    (PDF) Ethical reflections on the problem of spam - ResearchGate
    Aug 10, 2025 · The spam is widely considered unethical due to its invasion of privacy, deceptive practices, and potential harm to individuals and systems [25] ...
  217. [217]
    The Unsaid Truth About Spam Marketing | by Paulo A. José - Medium
    Apr 28, 2024 · Spam is an extremely effective marketing tool, but for some reason, most people involved in marketing don't talk about it. And they keep quiet.
  218. [218]
    (PDF) Ethical dimensions of spam - ResearchGate
    Aug 6, 2025 · The ultimate objective of this paper is to apply the ethical framework developed by Berenheim (1988) to better understand the impact that spam ...Missing: debates | Show results with:debates
  219. [219]
    Ethical reflections on the problem of spam
    After reviewing some of the difficulties caused by spam and summarizing the arguments of its defenders, this paper will focus on its present legal status.Missing: debates | Show results with:debates
  220. [220]
    The U.S. Legal Context: Privacy, Commercial Solicitation, and ...
    Because the First Amendment has been held to protect commercial speech, there are limits on the extent to which commercial solicitation can be regulated.
  221. [221]
    Canning Spam: Consumer Protection or a Lid on Free Speech?
    This iBrief looks at the current state of spam and explains that it is too early to tell whether the effects of the CAN-SPAM Act warrant new anti-spam measures.
  222. [222]
    Virginia Supreme Court Rules State Anti-SPAM Law Violates Free ...
    Sep 12, 2008 · The Supreme Court of Virginia today struck down a Virginia law banning unsolicited bulk emails, or SPAM, on grounds that the law is overly broad.
  223. [223]
    Anti-Spam Laws and the First Amendment
    Aug 7, 2008 · The ACLU argues that the First Amendment protects a right to anonymous speech, which I wholeheartedly agree with. However, I don't think that ...
  224. [224]
    Spam | The First Amendment Encyclopedia - Free Speech Center
    Jan 1, 2009 · The law, though, is largely unenforceable against anonymous or non-U.S.spammers. Governments have tried to address adult content in spam.
  225. [225]
    Is Spam Free Speech?
    Aug 22, 2017 · A state court ruling in Maryland confirmed the state's anti-spam statute was valid, since commercial speech was less protected than other forms ...
  226. [226]
    The Legal Regulation of Spam: An International Comparative Study
    Feb 3, 2022 · Several member countries have already legislated anti-spam legislation, including Austria, Belgium, Denmark, Finland, Greece, France, Italy, ...