CSC 379 SUM2008:Week 1, Group 2: Difference between revisions
No edit summary |
|||
(43 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
=Political Uses of Spam for Special Interests and Influencing Elections= | =Political Uses of Spam for Special Interests and Influencing Elections= | ||
E-mail presents candidates with a new medium to reach the voters. Traditionally, advertising through a new technology costs more - television ads cost more than radio ads, which cost more than print ads. However, the advantage of e-mail is that it costs so little. Each e-mail message costs roughly two cents, while a direct mail message costs about 35 cents.40 Thus, e-mail has the potential to liberate candidates from the stranglehold of special interest groups. Historically, the key to a successful campaign was a deep war chest. How else could someone pay for all those television spots? Referring to California gubernatorial candidate Bill Jones' much-maligned e-mail campaign, two political experts wrote, "In an era of cynicism toward money in politics - money typically spent on other unsolicited communication mediums - Jones tried to level the playing field." E-mail reduces a candidate's dependency on fund raising, and diminishes the role of money in elections. | |||
== | |||
Young politicians and older statesmen, are coming up with savvy ways of using spam and chain letters to influence or communicate with large audiences. Spam campaigns have become increasingly more popular on a national level and even on local political levels. With the technology readily available it would make sense for politicians to utilize this as a resource to reach a certain demographic audience or a broad range of its constituents. | |||
==Spam and Chain Letters in Politics== | |||
Acquiring votes by e-mail is a logical extension of campaigning by telephone or mail, and is nothing but marketing for political ends. Whenever the e-mails are unsolicited, they qualify as spam. They can be sent by, on behalf of, or without any knowledge by, the favoured party or candidate. Young politicians and older statesmen, are coming up with savvy ways of using spam and chain letters to influence or communicate with large audiences. Spam campaigns have become increasingly more popular on a national level and even on local political levels. With the technology readily available it would make sense for politicians to utilize this as a resource to reach a certain demographic audience or a broad range of its constituents. | |||
===Spam in Politics=== | |||
Election-themed spam is the latest, and largest, example of topical spam — messages linked to a news event. The ploy surfaced during the U.S. war against Iraq and gained steam during California's recall election. Nearly 1.4 billion messages linked to the presidential election have been sent since August, with a 300% jump since September 2004. | |||
With this new power to connect with voters and constituents also comes with the ability to abuse this power. In a completely ethical world political figures would only spam those who have agreed to receive such emails. And the content of the spam would be truthful and relevant to the reader. In reality this is not the case. Many people in the city of Pittsburgh for example, complained about receiving several spam emails from a candidate for mayor which they did not request. Even after complaining and requesting to be removed from the list the spam still came in. It was later determined that someone who didn't work for the mayors office entered these peoples emails through a web form off the mayors website. | With this new power to connect with voters and constituents also comes with the ability to abuse this power. In a completely ethical world political figures would only spam those who have agreed to receive such emails. And the content of the spam would be truthful and relevant to the reader. In reality this is not the case. Many people in the city of Pittsburgh for example, complained about receiving several spam emails from a candidate for mayor which they did not request. Even after complaining and requesting to be removed from the list the spam still came in. It was later determined that someone who didn't work for the mayors office entered these peoples emails through a web form off the mayors website. | ||
===Chain Letters in Politics=== | |||
Another form of spam in the political realm are chain letters sent by independent groups or individuals. Some of the more famous instances of political spam were during the 2004 presidential elections. These messages can be as caustic as they are humorous. One shows a photo of two toilets marked Kerry and Edwards with the sign, "Flush The Johns." A bogus e-mail from "George W. Bush" recites a "résumé" with embarrassing disclosures. | |||
[[Image:814i.jpg]] | |||
== Ethical Concerns == | |||
Politicians love to spam for the same reason that Viagra vendors and alleged widows of deposed Nigerian dictators do: Bulk e-mail is a cheap way to reach lots of people. Sen. Joseph Lieberman was caught spamming, as was Howard Dean's ostensibly tech-savvy campaign. Republicans Bill Jones, the unsuccessful candidate for governor of California, Florida Gov. Jeb Bush and senatorial candidate Elizabeth Dole have resorted to junk e-mail, too. | |||
Politicians could, of course, regulate themselves. Both the House of Representatives and the Senate have enacted rules governing how their members may use U.S. mail. Unfortunately, most elected representatives show no signs of being able to police their Internet outreach. | |||
=== Unethical? === | |||
Taking a cue from phishing con artists, political scammers might seek to hijack or spoof the official sites of campaigns or local election boards, giving their misinformation an added veneer of credibility. Similarly, spoofed e-mails could be employed to persuade recipients that information is coming from a trusted source. In addition to conventional denial of service attacks, the Internet might also be used to facilitate distributed phone-jamming, of the sort often used to disrupt get-out-the-vote efforts. “ | |||
Critics detest political spam as another nuisance. To many, unsolicited political e-mails are no different than commercial spam or junk mail. It invades your living room; it clogs your inbox. Advocates, though, see political e-mail in a higher light. "Political e-mail is not selling widgets. The free flow of ideas and information is critical to keeping the U.S. political system and First Amendment of the Constitution intact. Like other forms of political speech - direct mail, television and radio advertising - the medium should not be hindered." Advocates also point out that political e-mail is no worse for the voter-recipient than political advertising on other media. | |||
=== Intrusive? === | |||
E-mail is no more intrusive than direct mail, telemarketing, or TV advertising when it comes to politicians seeking to reach voters. A simple link in good e-mail campaigns allows recipients to opt out of future mailings. Direct mail takes at least a phone call or stamp to be taken off the list, and viewers must repeatedly endure TV ads. | |||
In truth, many complaints about political spam come from people who never should have received the e-mail. When Bill Jones e-mailed over a million people, one of the biggest criticisms was the inaccuracy of his mailing list. Intending to mail only California residents, the campaign sent the e-mail to a number of people with the suffix ".ca," a Canadian domain. That is a technological mistake - one that is correctable as the practice and sophistication of political e-mailing progress. It is not enough to stifle political e-mailing altogether. | |||
==Legal Considerations== | |||
There have been several attempts to create laws that protect the public from unsolicited messages. The Controlling the Assault of Non-Solicited Pornography and Marketing [CAN-SPAM] Act of 2003 (6) as well as laws in thirty-six states have established clear protocols for email advertising. However, these laws are restricted to commercial advertising and do not apply to political campaigning. In fact, some laws that are enforced in other forms media do not extend to email. For example, the Supreme Court ruling of McConnell V. the Federal Elections Commission in 2003, prohibited candidates from broadcasting advertisements paid for with “soft money” within certain time periods before a federal election, but emails are not included in this ban (7). | |||
One reason political spamming remains unrestricted is our constitutional principle that open and free political discourse is at the crux of ensuring a true democracy (5). In the Supreme Court ruling in New York Times Co. V. Sullivan case in 1964, it was found that “uninhibited, wide-open, and robust” debate is inherent in our First Amendment rights (6). Though the Electronic Communications Privacy Act of 1986 established emails as private (9), it is still unclear whether unsolicited emails fall under the same regulations as unsolicited phone calls or unsolicited snail mail. | |||
Other related precedents include the case of Van Bergen V. Minnesota in 1995 in which it was decided that the unsolicited phone calls were an invasion of privacy. In the case of USPS v. Council of Greenburgh Civic Associations in 1981, it was decided that even a government agency did not have the right to deliver mail directly into a mailbox, and should instead use the usual delivery system provided by the postal service (5). Finally, in the Supreme Court ruling of Storer v. Brown in 1974 (6), it was established that there needs to be some regulation of the electoral process to minimize voter confusion and maintain standards of fairness and honesty. Advocates of anti-spam legislation hope that these precedents will pave the way for protecting the public from onslaughts of political spam. | |||
==Links== | ==Links== | ||
[[http://www.pcworld.com/article/115379-1/spam_slayer_alls_fair_in_politics_and_spam.html|1]] | [[http://www.pcworld.com/article/115379-1/spam_slayer_alls_fair_in_politics_and_spam.html|1]] | ||
[[http://www.law.duke.edu/journals/dltr/articles/2003dltr0001.html|2]] | [[http://www.law.duke.edu/journals/dltr/articles/2003dltr0001.html|2]] | ||
==Sources== | |||
1. Mike McCurry and Larry Purpuro, A Vote for Political Spam, Boston Globe, Aug. 23, 2002, at A27. | |||
2. Larry Purpuro, The Big Push: The Case for Political E-mailing, Campaigns & Elections, Oct. 2002, at 47. | |||
3. McCurry and Purpuro, supra note 40. | |||
4. shopaim.org (http://www./Keep-America-Clean--Flush-Both-Johns_p_47-153.html) | |||
5. http://www.law.duke.edu/journals/dltr/articles/2003dltr0001.html | |||
6. http://www.bicklaw.com/Publications/PoliticalSpam.htm | |||
7. New and Improved. By: Cornfield, Michael, Campaigns & Elections, 01970771, Feb2004, Vol. 25, Issue 1 | |||
8. http://dir.salon.com/story/tech/feature/2002/11/20/political_spam/ | |||
9. http://www.lectlaw.com/files/emp41.htm | |||
10. http://technology.newscientist.com/article/dn12754-hackers-could-skew-us-elections.html | |||
11. http://news.cnet.com/Political-spam-as-national-pastime/2010-1028_3-5213287.html |
Latest revision as of 03:04, 12 July 2008
Political Uses of Spam for Special Interests and Influencing Elections
E-mail presents candidates with a new medium to reach the voters. Traditionally, advertising through a new technology costs more - television ads cost more than radio ads, which cost more than print ads. However, the advantage of e-mail is that it costs so little. Each e-mail message costs roughly two cents, while a direct mail message costs about 35 cents.40 Thus, e-mail has the potential to liberate candidates from the stranglehold of special interest groups. Historically, the key to a successful campaign was a deep war chest. How else could someone pay for all those television spots? Referring to California gubernatorial candidate Bill Jones' much-maligned e-mail campaign, two political experts wrote, "In an era of cynicism toward money in politics - money typically spent on other unsolicited communication mediums - Jones tried to level the playing field." E-mail reduces a candidate's dependency on fund raising, and diminishes the role of money in elections.
Spam and Chain Letters in Politics
Acquiring votes by e-mail is a logical extension of campaigning by telephone or mail, and is nothing but marketing for political ends. Whenever the e-mails are unsolicited, they qualify as spam. They can be sent by, on behalf of, or without any knowledge by, the favoured party or candidate. Young politicians and older statesmen, are coming up with savvy ways of using spam and chain letters to influence or communicate with large audiences. Spam campaigns have become increasingly more popular on a national level and even on local political levels. With the technology readily available it would make sense for politicians to utilize this as a resource to reach a certain demographic audience or a broad range of its constituents.
Spam in Politics
Election-themed spam is the latest, and largest, example of topical spam — messages linked to a news event. The ploy surfaced during the U.S. war against Iraq and gained steam during California's recall election. Nearly 1.4 billion messages linked to the presidential election have been sent since August, with a 300% jump since September 2004.
With this new power to connect with voters and constituents also comes with the ability to abuse this power. In a completely ethical world political figures would only spam those who have agreed to receive such emails. And the content of the spam would be truthful and relevant to the reader. In reality this is not the case. Many people in the city of Pittsburgh for example, complained about receiving several spam emails from a candidate for mayor which they did not request. Even after complaining and requesting to be removed from the list the spam still came in. It was later determined that someone who didn't work for the mayors office entered these peoples emails through a web form off the mayors website.
Chain Letters in Politics
Another form of spam in the political realm are chain letters sent by independent groups or individuals. Some of the more famous instances of political spam were during the 2004 presidential elections. These messages can be as caustic as they are humorous. One shows a photo of two toilets marked Kerry and Edwards with the sign, "Flush The Johns." A bogus e-mail from "George W. Bush" recites a "résumé" with embarrassing disclosures.
Ethical Concerns
Politicians love to spam for the same reason that Viagra vendors and alleged widows of deposed Nigerian dictators do: Bulk e-mail is a cheap way to reach lots of people. Sen. Joseph Lieberman was caught spamming, as was Howard Dean's ostensibly tech-savvy campaign. Republicans Bill Jones, the unsuccessful candidate for governor of California, Florida Gov. Jeb Bush and senatorial candidate Elizabeth Dole have resorted to junk e-mail, too.
Politicians could, of course, regulate themselves. Both the House of Representatives and the Senate have enacted rules governing how their members may use U.S. mail. Unfortunately, most elected representatives show no signs of being able to police their Internet outreach.
Unethical?
Taking a cue from phishing con artists, political scammers might seek to hijack or spoof the official sites of campaigns or local election boards, giving their misinformation an added veneer of credibility. Similarly, spoofed e-mails could be employed to persuade recipients that information is coming from a trusted source. In addition to conventional denial of service attacks, the Internet might also be used to facilitate distributed phone-jamming, of the sort often used to disrupt get-out-the-vote efforts. “
Critics detest political spam as another nuisance. To many, unsolicited political e-mails are no different than commercial spam or junk mail. It invades your living room; it clogs your inbox. Advocates, though, see political e-mail in a higher light. "Political e-mail is not selling widgets. The free flow of ideas and information is critical to keeping the U.S. political system and First Amendment of the Constitution intact. Like other forms of political speech - direct mail, television and radio advertising - the medium should not be hindered." Advocates also point out that political e-mail is no worse for the voter-recipient than political advertising on other media.
Intrusive?
E-mail is no more intrusive than direct mail, telemarketing, or TV advertising when it comes to politicians seeking to reach voters. A simple link in good e-mail campaigns allows recipients to opt out of future mailings. Direct mail takes at least a phone call or stamp to be taken off the list, and viewers must repeatedly endure TV ads.
In truth, many complaints about political spam come from people who never should have received the e-mail. When Bill Jones e-mailed over a million people, one of the biggest criticisms was the inaccuracy of his mailing list. Intending to mail only California residents, the campaign sent the e-mail to a number of people with the suffix ".ca," a Canadian domain. That is a technological mistake - one that is correctable as the practice and sophistication of political e-mailing progress. It is not enough to stifle political e-mailing altogether.
Legal Considerations
There have been several attempts to create laws that protect the public from unsolicited messages. The Controlling the Assault of Non-Solicited Pornography and Marketing [CAN-SPAM] Act of 2003 (6) as well as laws in thirty-six states have established clear protocols for email advertising. However, these laws are restricted to commercial advertising and do not apply to political campaigning. In fact, some laws that are enforced in other forms media do not extend to email. For example, the Supreme Court ruling of McConnell V. the Federal Elections Commission in 2003, prohibited candidates from broadcasting advertisements paid for with “soft money” within certain time periods before a federal election, but emails are not included in this ban (7).
One reason political spamming remains unrestricted is our constitutional principle that open and free political discourse is at the crux of ensuring a true democracy (5). In the Supreme Court ruling in New York Times Co. V. Sullivan case in 1964, it was found that “uninhibited, wide-open, and robust” debate is inherent in our First Amendment rights (6). Though the Electronic Communications Privacy Act of 1986 established emails as private (9), it is still unclear whether unsolicited emails fall under the same regulations as unsolicited phone calls or unsolicited snail mail.
Other related precedents include the case of Van Bergen V. Minnesota in 1995 in which it was decided that the unsolicited phone calls were an invasion of privacy. In the case of USPS v. Council of Greenburgh Civic Associations in 1981, it was decided that even a government agency did not have the right to deliver mail directly into a mailbox, and should instead use the usual delivery system provided by the postal service (5). Finally, in the Supreme Court ruling of Storer v. Brown in 1974 (6), it was established that there needs to be some regulation of the electoral process to minimize voter confusion and maintain standards of fairness and honesty. Advocates of anti-spam legislation hope that these precedents will pave the way for protecting the public from onslaughts of political spam.
Links
Sources
1. Mike McCurry and Larry Purpuro, A Vote for Political Spam, Boston Globe, Aug. 23, 2002, at A27.
2. Larry Purpuro, The Big Push: The Case for Political E-mailing, Campaigns & Elections, Oct. 2002, at 47.
3. McCurry and Purpuro, supra note 40.
4. shopaim.org (http://www./Keep-America-Clean--Flush-Both-Johns_p_47-153.html)
5. http://www.law.duke.edu/journals/dltr/articles/2003dltr0001.html
6. http://www.bicklaw.com/Publications/PoliticalSpam.htm
7. New and Improved. By: Cornfield, Michael, Campaigns & Elections, 01970771, Feb2004, Vol. 25, Issue 1
8. http://dir.salon.com/story/tech/feature/2002/11/20/political_spam/
9. http://www.lectlaw.com/files/emp41.htm
10. http://technology.newscientist.com/article/dn12754-hackers-could-skew-us-elections.html
11. http://news.cnet.com/Political-spam-as-national-pastime/2010-1028_3-5213287.html