Book review: Spam: A Shadow History of the Internet

Posted by   Martijn Grooten on   Jun 2, 2017

This review, by VB Editor Martijn Grooten, was originally published in the Journal of the International Committee for the History of Technology (ICON). It is republished with their kind permission.


book-cover.jpg   Title: Spam: A Shadow History of the Internet
  Author: Finn Brunton
  Publisher: The MIT Press Cambridge, MA, 2013.
  ISBN: 9780262018876 / 9780262527576 / 9780262313933

Those who find themselves tasked with fighting the daily deluge of unsolicited bulk email need to have a good understanding of the basic Internet protocols, such as SMTP, DNS and TCP/IP, as well as a keen eye for the ever-changing ways the spam messages try to get past the various defences in place. But to really understand where spam is coming from, how it has played and continues to play a role on the Internet, and where it might be going, one needs to go back to the beginning of the Internet. Finn Brunton's Spam: a Shadow History of the Internet does exactly that.

While most histories of spam consider the spam sent before the mid-1990s to only be worth mentioning as funny anecdotes, Brunton divides the history of spam into three epochs, with the period until 1995 being the essential first one. It was during this period that the Internet, with its written and many unwritten rules, took shape. It was also then that 'spammers', i.e. people who didn't follow these rules, began to appear in various forms and with various intentions.

The second epoch spanned the eight years following 1995, when the Internet became a huge commercial and social success. Spam took off in this period as well, and many of the kinds of spam we still see today, such as the pump-and-dump spam and the 419 spam, date back to this period (of course, offline versions of 419 spam date back many centuries). This period also saw the community experiment with technical (blocklists, spam filters) and legal (anti-spam laws and lawsuits) measures against the fast-growing problem of spam.

As these measures wiped out most of the over-zealous marketers that had no malicious intent but who had failed to see the social consequences of their efforts, the third epoch in the history of spam, the period from 2003 until today, saw spam turn into a proper criminal enterprise. At the same time, it saw the increasing sophistication of the algorithms that fight spam and that make sure that email and other messaging platforms continue to be usable for today's Internet users.

Though largely chronological in nature, Brunton's book is far more than a timeline of anecdotes around spam and the various efforts to fight it. Brunton really tries to understand spam, from both a technical and sociological point of view. While for most working in the anti-spam community the latter aspect may not seem particularly relevant to their jobs, it helps to understand not just the early clashes between spammers and anti-spammers, but also many similar cases with people misbehaving in various kinds of online communities. Brunton's division of Internet pioneers into royalists, anarchists, technolibertarians and parliamentarians will seem all too familiar to those following discussions about tools for protecting online privacy today.

Indeed, while the bulk of the book focuses on email spam, some very early and very recent examples of spam cited in the book ('spam books' and 'Twitter spam', both of which were new phenomena in 2013, when the book was written) took place on other platforms, and Brunton expects more of this to happen in the future.

For those approaching spam from a technical point of view, the book may appear a tad academic. Indeed, Brunton doesn't eschew references to sociologists like Tönnies and Durkheim, or even authors such as William Gibson and Jorge Luis Borges. I did not think this was a problem though: it served as an all-too-important reminder that spam isn't just a technical issue, but is just as much, and perhaps more importantly, a social one, even in an era in which the business of spam is a purely criminal enterprise.

One possible criticism of the book may be that Brunton pays relatively little attention to the criminal aspect of spam. However, it would have been hard to do so without going into the murky details about how online criminals operate today. For those interested in this side of spam, Brian Krebs's Spam Nation complements Brunton's book rather well.

As the Internet continues to evolve, few people even remember what spam looked like 15 years ago, let alone what kinds of messaging abuse took place in the very early days of the Internet. These events still cast their shadow on today's fight against spam though. For that reason alone, we should be very grateful to Finn Brunton for having written this important book.



Latest posts:

Book review: Serious Cryptography

VB Editor Martijn Grooten recommends Jean-Philippe Aumasson's 'Serious Cryptography' as a very solid but practically focused introduction to cryptography.

Necurs pump-and-dump spam campaign pushes obscure cryptocurrency

A Necurs pump-and-dump spam campaign pushing the lesser known Swisscoin botnet is mostly background noise for the Internet.

Alleged author of creepy FruitFly macOS malware arrested

A 28-year old man from Ohio has been arrested on suspicion of having created the mysterious FruitFly malware that targeted macOS and used it to spy on its victims.

The threat and security product landscape in 2017

At the start of the new year, Virus Bulletin looks back at the threats seen in the 2017 and at the security products that are available to help mitigate them.

Spamhaus report shows many botnet controllers look a lot like legitimate servers

Spamhaus's annual report on botnet activity shows that botherders tend to use popular, legitimate hosting providers, domain registrars and top-level domains when setting up command-and-control servers.