e-v-mail

Korova Multimedia

Click the read the latest, greatest Hoax du Jour


E-v-mail

Public links to this specific article: http://www.korova.com/virus/. Also: this page, print-friendly.

The Internet. Who'd have known it would become the hula hoop of the Nineties? Everyone's talking about it, everyone wants it, and everyone loves it.

E-mail is considered the premier Internet, and intranet, application. As users become increasingly comfortable with e-mail tools, they begin to use it for more business (and non-business) uses. Some of the social uses regularly include sharing jokes, "nice to know informational tidbits," and dire warnings of digital doom. The electronic town square has been used (and abused) as ordinary folks take it upon themselves to "pass the word" about notorious rumors and shocking tales.

This page is organized into four sections:


'Net Rumors

Unfounded hearsay on the Internet, or 'Net rumors, appear in various forms, including these:


The "e-v-mail"

I lump most of these types of impersonal, spammed e-mail as "e-v-mail," or electronic virus mail. Why? They can all credit their success to the concept of a thought virus (see below). The thought virus is essentially that idea, buried inside the e-mail, which causes a user to forward it frivolously, needlessly infecting others.

Some users are notorious carriers of the thought virus, regularly spamming others with forwarded mail.


The Thought Virus (meme)


The Cure (vaccine)


"... An opportunistic self-replicating e-mail virus which tricks its host into replicating it, sometimes adding as many as 200,000 copies at a go. It works by finding hosts with defective parsing apparatus which prevents them from understanding that a piece of e-mail which says there is an e-mail virus and then asking them to remail the message to all their friends is the virus itself."

Clay Shirkey
Les Jones' Good Times Virus Hoax FAQ


"... The false belief is the real virus. As a thought contagion, it is a meme that manipulates you to retransmit rather than an actual computer virus infecting computers. The real 'host computer' is the human brain, and a population of brains interconnected by the Internet provides the susceptible medium for pandemic thought contagions."

Aaron Lynch
Thought Contagion Analyst
CC: Contagious Correction


"... sometimes people will foolishly send out their own paraphrase of an alert, perhaps based on something they heard verbally. These second-hand alerts usually contain exaggerations and other factual inaccuracies,...."

Phil Agre
Department of Information Studies
UCLA
Designing Effective Action Alerts For the Internet

Korova Multimedia's "Hoax du Jour"

AFU & Urban Legends Archive

Computer Incident Advisory Capability

Computer Virus Myths

The Crypt Newsletter

ICSA Anti-Virus Pages

About.com's Urban Legends & Folklore Guide

Urban Legends Reference Pages


At Work

The business impact can be far worse than the annoyance we feel at home. Negative impacts in the workplace can include:

  1. Users' inboxes are clogged with unsolicited warnings of dubious origin. Time and resources are squandered for a non-business activity.
  2. Mail servers are overloaded with multiple copies of redundant, incorrect information that does not contribute a business value; it's "spam" in the workplace. It can even crash a mail server.
  3. Notifications don't come from competent IS personnel within the organization. Instead, they're spread around like the seasonal cold, taking out half the staff on one shot.
  4. Possibly the most threatening danger is that when hoaxes are forwarded by employees using their business e-mail addresses, the hoax can gain considerable "authenticity" by virtue of the relay header. So if user Joe Blau at Computer Security Solutions gets the Join the Crew virus hoax, and then spams it to 250 of his best friends on the net, the forwarded message (with his very authoritative domain and organization fields) gains remarkable credibility. Never mind that Joe happens to be a summer intern in the game-testing unit. [See Rob Rosenberger's excellent article on the "False Authority Syndrome".]

In all my recent computer security discussions, I've recommended the policy that all virus alerts, warnings, and chain mail should be forwarded to the computer administration staff for evaluation. Bona fide threats and bulletins should originate in an organization only from the authorized parties within a technical support or computer security staff. This limits the frivolous use of company resources, and also promotes a process in which only valid information is disseminated, through proper channels.

If you receive e-mail at work like that described above, the first reasonable step is to forward it only to the company's computer staff (alternately called Information Technology, Information Services, Network Support, Network Administration). Let them track down the truth while you go on about your real work.

[As of January 1, 1999, several of the liabilities that I mentioned above have since come true for the American Chemical Society and the United States Post Office, no kidding. I hate to say I told you so....]

If you're a computer security professional or public information officer, drafting an e-mail warning or alert, I invite you to read my Drop-dead Internet Alerts page. It provides unbeatable tips for writing an effective Internet alert.


At Home

As for home users. Well. Sending out false information and bogus warnings aren't the actions we anticipate from friends. So why do it ourselves?

Many of this site's visitors tell me that it's a very real burden when coworkers, friends and family members include them in the problem. Here are some recent examples from Korova.com's mailbox:

David, this one came today from a friend, forwarded to him from his friend.

I hate it when friends and relatives send me this stuff.

I seem to be getting alot of these lately, both at work and at home. Here's another one.

I am sure I am going to see this "hoax" email in my in box for months unless it is stopped now.

I hope it ceases soon. I am being completely inundated.

This was sent to me by a well-meaning friend, and....

I got this from a friend I trust, but I was wondering if this was a valid article.

I get tired of the multiple "warnings of impending doom" that I get from many well-meaning but misguided friends, family and co-workers.

I'm trying to dispel this note that I received from my (well intentioned) father.

Personally, I dislike email chain-letters, even ones with a core of legitimacy....

I'm sick of people sending me this stuff !!!!

These correspondents have made clear to me the e-mail 'Net rumors that they receive from friends and loved ones really aren't welcome. To use an analogy, imagine if your friends treated you to large bags of catalogs and bulk rate mail every time they came over for dinner. Well, is this very different?

The inspiration seems to be that e-mail is such a convenience, sending these messages on with or without comment ("I don't know if this is true or not, but it's something to think about!") is too good an opportunity to pass up. Opportunity for what? To make contact. It takes time and effort to send an original, genuine letter. Forwarding impersonal e-mail must be the next best thing.

What's a friend to do? Be thoughtful, at the very least. Read the message, wield some healthy skepticism, check out any Web links (if any) that the message provides. If there's any remaining doubt, avail yourself of the references listed above. More than likely, you'll find that the "new, dire warning" you've received is actually stale, old hocus. Would you still hit the FORWARD button if you knew that the message was false?


Thank you for reading this page. Please feel free to share the link to this page with anyone who sends you e-v-mail. To hear the latest in net hoaxes and online deceptions, tune in to my regular column, the "Hoax du Jour."


David Spalding

08 September 1997 Last revision: 29 September 2001


Click the read the latest, greatest Hoax du Jour


© Copyright 1999 D.B. Spalding/Korova Multimedia. All rights reserved.

Contents
Contents

Music
Music

Film
Film

Books
Pubs

Computing
Computing

Consulting
Consulting

What's new?
New!

Map
Map

Bios
Whois?

Contact
Contact

FAQ
Help