Skip to main content

The Underbelly of Junk Mail

I just finished watching a report about porn junk mail on NBC's Dateline tonight and saw something that reminded me of some other business actions not allowed in the US. The story went along the line that people, family people, where receiving pornographic e-mail without asking for it. The reporter John Hockenberry then went on a journey of two continents and 4 cities to trek down and confront the actual person that send the e-mail. I found it interesting that even though each piece of mail is identified with a code that shows you who sent the mail, no one wanted to correct the problem. Through Mr. Hockenberry's trips to Toronto, Las Vegas and Montreal He came across companies that did not have a physical listing. At the same time he found that several companies employed the same people even though they know they are breaking policies set by the company.

This is all fine and well and I do think that junk mail is a part of business that laws have turned there back on. What I don't see is why the companies that have fake or non physical addresses get strict penalties imposed on them for there illicit activities. The company that is being advertised in the junk mail has records of who is sending the mail and while some companies are out of the bounds of US law a large part of them still are and so they should be forced to give up who is behind all this internet clogging mail.

Internet providers are trying to fight the problem buy locking down the network they control. The logic is that you or me have some virus or Trojan that turns us into what's been called a SPAM ZOMBIE. If you become a zombie the locked down network now forces you to sign in to send mail. the zombie program doesn't use your outlook or thunderbird mail application so it doesn't know what it is and therefor is blocked. This will help for a few months but is not the answer. So instead of one person sending millions of e-mail it's thousands of people sending hundreds of thousands of e-mail. You don't know it and mail doesn't show up in your sent folder because the program that is doing this is different from the outlook or thunderbird program. Some answers for a common user like you and me is to use temporary e-mail accounts like or They are free to use, easy to sign up for, and you have no obligation to the account after it's created. The alternate solution is to have one account that you use for anything that asks for your e-mail address. Wait a few weeks to see if new types of junk mail is sent to you. Once a few weeks pass you change your e-mail account that you signed up with to one that you don't give out to just anyone. Another idea has been to restrict who can send you mail by placing them in your contact list.

Link to Datline story


  1. If you have a GMail account you can sort out unwanted email and know who gave the spammer your address.
    Simply enter the below when you enter your email address.
    emailname+place you signed up
    Adding the plus symbol between your e-mail addres and something else will allow you to get the email and sort it out based on what is after the plus.


Post a Comment

Popular posts from this blog

QR Codes

  So what are all these mixed up checker board looking things you're seeing everywhere? They are called QR codes, and they make your smart phone a whole lot smarter. Imagen you are walking through the mall and you see a poster of that new movie everyone is talking about. You want to discover more about it, but you're never going to remember the web address. Then you see the QR Code in the corner. You scan the code with your phone's camera and you are taken to the web page. All with a few taps of your fingers and none of it typing on a keyboard. Let's find out what else QR codes can do and what is needed to read them.   QR is the abbreviation for Quick Response, and was named so because the 2D bar code is meant to be decoded at high speed. It was developed in 1994 by Denso-Wave for automobile parts tracking. Since then the technology has evolved to allow much more. To use them you will have to have a camera phone and an app designed to read the QR codes. Google has pu


Almost anywhere you look you can find someone or something playing music. Since the time of Napster the internet has been linked to music with little success from the powers that be to separate them. As if almost in spite of the efforts to keep a tight hold onto the rights to distribute the music places like Amazon, Napster, Real player, and iTunes have legitimized the internet as a system to distribute music. Among all this confusion piracy still holds a place when looking to acquire a song or album. The RIAA would have you believe that the number is much larger then it could be but since the applications and sites that host the illicit content do not keep tabs or share the information with anyone it is near imposable to know for sure. While it seems that all the angles have been covered and that you could not find another avenue, hope is just a web address away. In an effort to distance myself from pop-media music I started to look for sites that offered great content that was not

Peer 2 Peer sharing

Recently the supreme court ruled that a company that makes software can be held accountable if it is shown that the intention of the software was for illegal use. Many other tech savvy sites equate this ruling to gun makers being responsible for gun related murders and armed robbery. I do see the similarities but I think gun violence is a far more serious crime then copyright piracy. And yet we have millions of dollars being spent to create legal boundaries on who is responsible when little Johnny downloads a song. If companies can be held accountable for creating programs like Grokster, Kazza, and Limewire then what about the companies that create FTP server and client software? What about the companies that create the old telnet bulletin board systems? Each of these are methods of transmitting software and each have been used in some form or another to pirate copyrighted material. I think this is all a waste of time because the simple truth is that if you take away the companies that