The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers.
Spam: A Shadow History of the Internet (Infrastructures)
Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means.
- Data Protection Choices?
- Our Frequent Buyer Card.
- Curves for the Outlaw (BDSM Erotica).
- Stolen Child.
- The Common Enemy.
Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. Indeed, the profusion of spam has consistently created markets for counterspam tools as well as for servers, cables, and other hardware, software, and services.
Botnet spam in the form of Project MUSE promotes the creation and dissemination of essential humanities and social science resources through collaboration with libraries, publishers, and scholars worldwide. Forged from a partnership between a university press and a library, Project MUSE is a trusted part of the academic and scholarly community it serves.
July’s Bookclub Selection: Spam – A Shadow History of the Internet
Without cookies your experience may not be seamless. Institutional Login. LOG IN. Technology and Culture.
Brunton traces spam through three epochs: the s to , and the early, noncommercial computer networks that became the Internet; to , with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and to the present, with the war of algorithms-spam versus anti-spam.
Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves. Finn Brunton's excellent cultural history of spam offers a readable, witty account of the battle between the spammers and the spammed-a battle of often surprising complexity and astonishing technological escalation, in an arms race that is still being fought.
But it has plenty to offer computer scientists and online-community researchers as well This masterful telling of the history illustrates just how much has changed and how we fit into the larger story.
Get PDF Spam: A Shadow History of the Internet (Infrastructures)
The goings-on of the twisted personages who populate cyberpunk lit have nothing on the ingenious scheming of the spammers and the scientists dedicated to shutting them down. Read here and in days to come about this fascinatingly bizarre subterranean cyberworld. Finn Brunton's investigation of the question of spam, Spam: A Shadow History of the Internet-the problems of defining it, understanding it, and tackling it-takes us to the front of an ongoing and highly sophisticated technological war, a keenly contested territorial struggle for control of the information superhighway.
The real value of the book however, does not lie in this historical reconstruction, but in its ability to use spam, as a tool through to reveal by negative reflection the positive values and beliefs that lay at the foundation of internet communities, and the importance of attention and trust in their working. Added to basket. The Truth Machine. Michael J.
- Finn Brunton, “Spam: A Shadow History of the Internet” (MIT Press, ) | New Books Network?
- Most Popular Videos.
- Oral History: An Interdisciplinary Anthology (American Association for State and Local History)?
- A Distant Heritage; Free Speech: Growth of Free Speech in Early America.
- Read more by.
Cybersecurity Essentials. Charles J. Terrorism in the Twenty-First Century. Cynthia C.
Cynical tales for desperate times... on through 15 September
Data and Goliath. Bruce Schneier. Surveillance Valley. Yasha Levine. Tools and Weapons.
Brad Smith. Blockchain Basics. Daniel Drescher.