Tuesday, August 6, 2013

Sean's Online Library: IT eBooks and Management Books

Information Management, Information Technology, Management and Strategic Planning and other? and E-Books?

(Click below the Link to view the Online Library)

Sean's Online Library

Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.

spalteaknowstech.blogspot.com © 2011-2013

Thursday, August 1, 2013

Electronic Mail (E-Mail)

Electronic mail, most commonly referred to as email or e-mail since approximately 1993,
is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages.

Historically, the term electronic mail was used generically for any electronic document transmission. For example, several writers in the early 1970s used the term to describe fax document transmission. As a result, it is difficult to find the first citation for the use of the term with the more specific meaning it has today.

An Internet email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp.

Originally a text-only (ASCII) communications medium, Internet email was extended to carry, e.g., text in other character sets, multi-media content attachments, a process standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called Multipurpose Internet Mail Extensions (MIME). Subsequently, the IETF defined an internationalization framework, e.g., Email Address Internationalization (eai), for using unencoded UTF-8 in email.

Electronic mail predates the inception of the Internet and was in fact a crucial tool in creating it,[5] but the history of modern, global Internet email services reaches back to the early ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC 561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the current services. An email sent in the early 1970s looks quite similar to a basic text message sent on the Internet today.

Email, e-mail or electronic mail is the transmission of messages (emails or email messages) over electronic networks like the internet.

I guess this dry definition is not what you've been looking for. And indeed, it doesn't say or mean much, not to me either. This "transmission of messages" could be anything. But don't let that intimidate or confuse you. Email is as simple and straight forward as letter writing.

Email and Postal Mail

To get a grasp of what email is its best — the terminology indicates it — to think in equivalents of "traditional" postal mail.

The email message - Instead of using a pen to write a letter on paper, you're using your keyboard to type an email message in an email program on your computer.


Sending the email - When the email is finished and has been addressed to the recipient's email address, you don't put a stamp on it and post it but press the Send button in the email program. This makes the email message go on its journey.

Email transport - Like postal services transport letters and parcel, email servers transmit email messages from sender to recipient. Usually, emails are not delivered to the recipient directly, though, but waiting at the "nearest" mail server to be picked up by them.

Fetching new mail - If you've got new mail in your mailbox, you go and fetch it. Similarly, your email program can check for new email messages at your mail server and download them for you to read.

Every day, the citizens of the Internet send each other billions of e-mail messages. If you're online a lot, you yourself may send a dozen or more e-mails each day without even thinking about it. Obviously, e-mail has become an extremely popular communication tool.
Have you ever wondered how e-mail gets from your computer to a friend halfway around the world? What is a POP3 server, and how does it hold your mail? The answers may surprise you, because it turns out that e-mail is an incredibly simple system at its core. In this article, we'll take an in-depth look at e-mail and how it works.

An E-mail Message

According to Darwin Magazine: Prime Movers, the first e-mail message was sent in 1971 by an engineer named Ray Tomlinson. Prior to this, you could only send messages to users on a single machine. Tomlinson's breakthrough was the ability to send messages to other machines on the Internet, using the @ sign to designate the receiving machine.


An e-mail message has always been nothing more than a simple text message -- a piece of text sent to a recipient. In the beginning and even today, e-mail messages tend to be short pieces of text, although the ability to add attachments now makes many messages quite long. Even with attachments, however, e-mail messages continue to be text messages -- we'll see why when we get to the section on attachments.

E-mail Clients

You've probably already received several e-mail messages today. To look at them, you use some sort of e-mail client. Many people use well-known, stand-alone clients like Microsoft Outlook, Outlook Express, Eudora or Pegasus. People who subscribe to free e-mail services like Hotmail or Yahoo use an e-mail client that appears in a Web page. If you're an AOL customer, you use AOL's e-mail reader. No matter which type of client you're using, it generally does four things:
  • Shows you a list of all of the messages in your mailbox by displaying the message headers. The header shows you who sent the mail, the subject of the mail and may also show the time and date of the message and the message size.
  • Let’s you select a message header and read the body of the e-mail message.
  • Let's you create new messages and send them. You type in the e-mail address of the recipient and the subject for the message, and then type the body of the message.
  • Let’s you add attachments to messages you send and save the attachments from messages you receive.

Sophisticated e-mail clients may have all sorts of bells and whistles, but at the core, this is all that an e-mail client does.

Spelling

Electronic mail has several English spelling options that occasionally prove cause for vehement disagreement.

E-mail is the most common form in print, and is recommended by some prominent journalistic and technical style guides. According to Corpus of Contemporary American English data, this is the form that appears most frequently in edited, published American English and British English writing.

Email is the most common form used online, and is required by IETF Requests for Comment and working groups and increasingly by style guides. This spelling also appears in most dictionaries.

Mail was the form used in the original RFC. The service is referred to as mail and a single piece of electronic mail is called a message.

Email, capitalizing only the letter M, was common among ARPANET users and the early developers of UNIX, CMS, AppleLink, eWorld, AOL, GEnie, and Hotmail.

Email is a traditional form that has been used in RFCs for the "Author's Address", and is expressly required "for historical reasons".

E-mail is sometimes used, capitalizing the initial letter E as in similar abbreviations like E-piano, E-guitar, A-bomb, H-bomb, and C-section.

There is also some variety in the plural form of the term. In US English email is used as a mass noun (like the term mail for items sent through the postal system), but in British English it is more commonly used as a count noun with the plural emails.

Origin

AUTODIN network provided message service between 1,350 terminals, handling 30 million messages per month, with an average message length of approximately 3,000 characters.
Autodin was supported by 18 large computerized switches, and was connected to the United States General Services Administration Advanced Record System, which provided similar services to roughly 2,500 terminals.

Host-based mail systems

With the introduction of MIT's Compatible Time-Sharing System (CTSS) in 1961 multiple users were able to log into a central system from remote dial-up terminals, and to store and share files on the central disk. Informal methods of using this to pass messages developed and were expanded to create the first system worthy of the name "email":
  • 1965 – MIT's CTSS MAIL.
  • Other early systems soon had their own email applications:
  • 1962 – 1440/1460 Administrative Terminal System
  • 1968 – ATS/360
  • 1972 – Unix mail program
  • 1972 – APL Mailbox by Larry Breed
  • 1974 – The PLATO IV Notes on-line message board system was generalized to offer 'personal notes' (email) in August, 1974.
  • 1978 – EMAIL at University of Medicine and Dentistry of New Jersey
  • 1981 – PROFS by IBM
  • 1982 – ALL-IN-1 by Digital Equipment Corporation

Email networks

Soon systems were developed to link compatible mail programs between different organizations’s over dialup modems or leased lines, creating local and global networks.
In 1971 the first ARPANET email was sent, and through RFC 561, RFC 680, RFC 724, and finally 1977's RFC 733, became a standardized working system.
Other, separate networks were also being created including:

  • UNIX mail was networked by 1978's uucp, which was also used for USENET newsgroup postings
  • IBM mainframe email was linked by BITNET in 1981
  • IBM PCs running DOS in 1984 could link with FidoNet for email and shared bulletin board posting

Uses of Email

Flaming

Flaming occurs when a person sends a message with angry or antagonistic content. The
term is derived from the use of the word Incendiary to describe particularly heated email discussions. Flaming is assumed to be more common today because of the ease and impersonality of email communications: confrontations in person or via telephone require direct interaction, where social norms encourage civility, whereas typing a message to another person is an indirect interaction, so civility may be forgotten.

Email bankruptcy

Also known as "email fatigue", email bankruptcy is when a user ignores a large number of email messages after falling behind in reading and answering them. The reason for falling behind is often due to information overload and a general sense there is so much information that it is not possible to read it all. As a solution, people occasionally send a boilerplate message explaining that the email inbox is being cleared out. Harvard University law professor Lawrence Lessig is credited with coining this term, but he may only have popularized it.

In business

Email was widely accepted by the business community as the first broad electronic communication medium and was the first 'e-revolution' in business communication. Email is very simple to understand and like postal mail, email solves two basic problems of communication: logistics and synchronization.


LAN based email is also an emerging form of usage for business. It not only allows the business user to download mail when offline, it also allows the small business user to have multiple users' email IDs with just one email connection.

Pros

The problem of logistics: Much of the business world relies upon communications between people who are not physically in the same building, area or even country; setting up and attending an in-person meeting, telephone call, or conference call can be inconvenient, time-consuming, and costly. Email provides a way to exchange information between two or more people with no set-up costs and that is generally far less expensive than physical meetings or phone calls.

The problem of synchronization: With real time communication by meetings or phone calls, participants have to work on the same schedule, and each participant must spend the same amount of time in the meeting or call. Email allows asynchrony: each participant may control their schedule independently.

Cons

Most business workers today spend from one to two hours of their working day on email: reading, ordering, sorting, and’re-contextualizing' fragmented information, and writing email. The use of email is increasing due to increasing levels of globalization – labor division and outsourcing amongst other things. Email can lead to some well-known problems:

  • Loss of context: which means that the context is lost forever; there is no way to get the text back. Information in context (as in a newspaper) is much easier and faster to understand than unedited and sometimes unrelated fragments of information. Communicating in context can only be achieved when both parties have a full understanding of the context and issue in question.
  • Information overload: Email is a push technology – the sender controls who receives the information. Convenient availability of mailing lists and use of "copy all" can lead to people receiving unwanted or irrelevant information of no use to them.
  • Inconsistency: Email can duplicate information. This can be a problem when a large team is working on documents and information while not in constant contact with the other members of their team.
  • Liability. Statements made in an email can be deemed legally binding and be used against a party in a court of law.

Despite these disadvantages, email has become the most widely used medium of communication within the business world. In fact, a 2010 study on workplace communication, found that 83% of U.S. knowledge workers felt that email was critical to their success and productivity at work.

Research on email marketing

Research suggests that email marketing can be viewed as useful by consumers if it contains information such as special sales offerings and new product information. Offering interesting hyperlinks or generic information on consumer trends is less useful. This research by Martin et al. (2003) also shows that if consumers find email marketing useful, they are likely to visit a store, thereby overcoming limitations of Internet marketing such as not being able to touch or try on a product.

Problems

Speed of correspondence

Despite its name implying that its use is faster than either postal (physical) mail or telephone calls, correspondence over email often varies incredibly steeply — ranging from communication that is indeed semi-instant (often the fastest when a person is already sitting in front of a computer with their email program open, or when the person has email services automatically set up to speedily check for new messages on their mobile phone) to communication that can quite literally take weeks or even months to garner a response. In the case of the latter, it often proves much more rapid to call the person via telephone or via some other means of audio. Therefore, as a rule, unless one's workplace or social circle already communicates heavily via email in a rapid manner, a person should assume that email runs a perpetual risk of actually being slower as a communication mode than either mobile phone or text messaging communication.

This general rule of thumb is often perplexing to those who use email heavily but whose colleagues and friends do not. Meanwhile, some people, due to exasperation with not getting responses to urgent messages, may eventually decline to use email with any regularity at all, and may be put in the sometimes-awkward position of having to notify their friends and colleagues who do use email regularly, that this is not a good way to reach them.


Attachment size limitation

Email messages may have one or more attachments, i.e., MIME parts intended to provide copies of files. Attachments serve the purpose of delivering binary or text files of unspecified size. In principle there is no technical intrinsic restriction in the InternetMessage Format, SMTP protocol or MIME limiting the size or number of attachments. In practice, however, email service providers implement various limitations on the permissible size of files or the size of an entire message.

Furthermore, due to technical reasons, often a small attachment can increase in size when sent, which can be confusing to senders when trying to assess whether they can or cannot send a file by email, and this can result in their message being rejected.

As larger and larger file sizes are being created and traded, many users are either forced to upload and download their files using an FTP server, or more popularly, use online file sharing facilities or services, usually over web-friendly HTTP, in order to send and receive them.

Information overload

A December 2007 New York Times blog post described information overload as "a $650 Billion Drag on the Economy", and the New York Times reported in April 2008 that "E-MAIL has become the bane of some people's professional lives" due to information overload, yet "none of the current wave of high-profile Internet start-ups focused on email really eliminates the problem of email overload because none helps us prepare replies". GigaOm posted a similar article in September 2010, highlighting research that found 57% of knowledge workers were overwhelmed by the volume of email they received. 
Technology investors reflect similar concerns.

In October 2010, CNN published an article titled "Happy Information Overload Day" that compiled research on email overload from IT companies and productivity experts. According to Basex, the average knowledge worker receives 93 emails a day. Subsequent studies have reported higher numbers. Marsha Egan, an email productivity expert, called email technology both a blessing and a curse in the article. She stated, "Everyone just learns that they have to have it dinging and flashing and open just in case the boss e-mails," she said. "The best gift any group can give each other is to never use e-mail urgently. If you need it within three hours, pick up the phone."

Spamming and computer viruses

The usefulness of email is being threatened by four phenomena: email bombardment, spamming, phishing, and email worms.
Spamming is unsolicited commercial (or bulk) email. Because of the minuscule cost of sending email, spammers can send hundreds of millions of email messages each day over an inexpensive Internet connection. Hundreds of active spammers sending this volume of mail results in information overload for many computer users who receive voluminous unsolicited email each day.

Email worms use email as a way of replicating themselves into vulnerable computers. Although the first email worm affected UNIX computers, the problem is most common today on the Microsoft Windows operating system.

The combination of spam and worm programs results in users receiving a constant drizzle of junk email, which reduces the usefulness of email as a practical tool.

A number of anti-spam techniques mitigate the impact of spam. In the United States, U.S. Congress has also passed a law, the Can Spam Act of 2003, attempting to regulate such email. Australia also has very strict spam laws restricting the sending of spam from an Australian ISP, but its impact has been minimal since most spam comes from regimes that seem reluctant to regulate the sending of spam.

Email spoofing

Email spoofing occurs when the header information of an email is altered to make the message appear to come from a known or trusted source. It is often used as a ruse to collect personal information.

Email bombing

Email bombing is the intentional sending of large volumes of messages to a target address. The overloading of the target email address can render it unusable and can even cause the mail server to crash.

Privacy concerns

Today it can be important to distinguish between Internet and internal email systems. Internet email may travel and be stored on networks and computers without the sender's or the recipient's control. During the transit time it is possible that third parties read or even modify the content. Internal mail systems, in which the information never leaves the organizational network, may be more secure, although information technology personnel and others whose function may involve monitoring or managing may be accessing the email of other employees.
Email privacy, without some security precautions, can be compromised because:
  • Email messages are generally not encrypted.
  • Email messages have to go through intermediate computers before reaching their destination, meaning it is relatively easy for others to intercept and read messages.
  • Many Internet Service Providers (ISP) store copies of email messages on their mail servers before they are delivered. 
  • The backups of these can remain for up to several months on their server, despite deletion from the mailbox.

The "Received:"-fields and other information in the email can often identify the sender, preventing anonymous communication.

There are cryptography applications that can serve as a remedy to one or more of the above. For example, Virtual Private Networks or the Tor anonymity network can be used to encrypt traffic from the user machine to a safer network while GPG, PGP, SMEmail, or S/MIME can be used for end-to-end message encryption, and SMTP STARTTLS or SMTP over Transport Layer Security/Secure Sockets Layer can be used to encrypt communications for a single mail hop between the SMTP client and the SMTP server.

Additionally, many mail user agents do not protect logins and passwords, making them easy to intercept by an attacker. Encrypted authentication schemes such as SASL prevent this.
Finally, attached files share many of the same hazards as those found in peer-to-peer filesharing. Attached files may contain Trojans or viruses.

Tracking of sent mail

The original SMTP mail service provides limited mechanisms for tracking a transmitted message, and none for verifying that it has been delivered or read. It requires that each mail server must either deliver it onward or return a failure notice (bounce message), but both software bugs and system failures can cause messages to be lost. To remedy this, the IETF introduced Delivery Status Notifications (delivery receipts) and Message Disposition Notifications (return receipts); however, these are not universally deployed in production. (A complete Message Tracking mechanism was also defined, but it never gained traction; see RFCs 3885 through 3888.)

Many ISPs now deliberately disable non-delivery reports (NDRs) and delivery receipts due to the activities of spammers:
  • Delivery Reports can be used to verify whether an address exists and so is available to be spammed

If the spammer uses a forged sender email address (email spoofing), then the innocent email address that was used can be flooded with NDRs from the many invalid email addresses the spammer may have attempted to mail. These NDRs then constitute spam from the ISP to the innocent user.

There are a number of systems that allow the sender to see if messages have been opened. The receiver could also let the sender know that the emails have been opened through an "Okay" button. A check sign can appear in the sender's screen when the receiver's "Okay" button is pressed.


References:
1.     http://email.about.com/cs/beginningemail/a/email_basics.htm
2.       http://computer.howstuffworks.com/e-mail-messaging/email.htm
3.       ^ "RFC 5321 – Simple Mail Transfer Protocol". Network Working Group. Retrieved 2010-02=October 2008.
4.       ^ Google Ngram Viewer. Books.google.com. Retrieved 2013-04-21.
5.       ^ Ron Brown, Fax invades the mail market, New Scientist, Vol. 56, No. 817 (Oct., 26, 1972), pages 218–221.
6.       ^ Herbert P. Luckett, What's News: Electronic-mail delivery gets started, Popular Science, Vol. 202, No. 3 (March 1973); page 85
7.       ^ See (Partridge 2008) for early history of email, from origins through 1991.
8.       ^ Long, Tony (23 October 2000). A Matter of (Wired News) Style. Wired magazine.
9.       ^ Readers on (Wired News) Style. Wired magazine. 24 October 2000.
10.   ^ ""Email" or "e-mail"". English Language & Usage – Stack Exchange. August 25, 2010. Retrieved September 26, 2010.
11.   ^ "RFC Editor Terms List". IETF. This is suggested by the RFC Document Style Guide
12.   ^ Yahoo style guide
13.   ^ AP Stylebook editors share big changes from the American Copy Editors Society
14.   ^ Gerri Berendzen; Daniel Hunt. "AP changes e-mail to email". 15th National Conference of the American Copy Editors Society (2011, Phoenix). ACES. Retrieved 23 March 2011.
15.   ^ AskOxford Language Query team. "What is the correct way to spell 'e' words such as 'email', 'ecommerce', 'egovernment'?". FAQ. Oxford University Press. Archived from the original on July 1, 2008. Retrieved 4 September 2009. "We recommend email, as this is now by far the most common form"
16.   ^ Reference.com
17.   ^ Random House Unabridged Dictionary, 2006
18.   ^ The American Heritage Dictionary of the English Language, Fourth Edition
19.   ^ Princeton University WordNet 3.0
20.   ^ The American Heritage Science Dictionary, 2002
21.   ^ RFC 821 (rfc821) – Simple Mail Transfer Protocol
22.   ^ a b RFC 1939 (rfc1939) – Post Office Protocol – Version 3
23.   ^ a b RFC 3501 (rfc3501) – Internet Message Access Protocol – version 4rev1
24.   ^ "RFC Style Guide", Table of decisions on consistent usage in RFC
25.   ^ Excerpt from the FAQ list of the Usenet newsgroup alt.usage.english
26.   ^ a b USPS Support Panel, Louis T Rader, Chair, Chapter IV: Systems, Electronic Message Systems for the U.S. Postal Service, National Academy of Sciences, Washington, D.C., 1976; pages 27–35.
27.   ^ "CTSS, Compatible Time-Sharing System" (September 4, 2006), University of South Alabama, USA-CTSS.
28.   ^ an IBM 7094
29.   ^ Tom Van Vleck, "The IBM 7094 and CTSS" (September 10, 2004), Multicians.org (Multics), web: Multicians-7094.
30.   ^ a b c Tom Van Vleck. "The History of Electronic Mail".
31.   ^ IBM, 1440/1460 Administrative Terminal System (1440-CX-07X and 1460-CX-08X) Application Description, Second Edition, IBM, p. 10, H20-0129-1.
32.   ^ IBM, System/36O Administrative Terminal System DOS (ATS/DOS) Program Description Manual, IBM, H20-0508.
33.   ^ IBM, System/360 Administrative Terminal System-OS (ATS/OS) Application Description Manual, IBM, H20-0297.
34.   ^ Version 3 Unix mail(1) manual page from 10/25/1972
35.   ^ Version 6 Unix mail(1) manual page from 2/21/1975
36.   ^ APL Quotations and Anecdotes, including Leslie Goldsmith's story of the Mailbox
37.   ^ History of the Internet, including Carter/Mondale use of email
38.   ^ David Wooley, PLATO: The Emergence of an Online Community, 1994.
39.   ^ Stromberg, Joseph (22 February 2012). "A Piece of Email History Comes to the American History Museum". Smithsonian Institution. Retrieved 11 June 2012.
40.   ^ "...PROFS changed the way organizations communicated, collaborated and approached work when it was introduced by IBM's Data Processing Division in 1981...", IBM.com
41.   ^ "1982 – The National Security Council (NSC) staff at the White House acquires a prototype electronic mail system, from IBM, called the Professional Office System (PROFs)....", fas.org
42.   ^ Gordon Bell's timeline of Digital Equipment Corporation
43.   ^ with various vendors supplying gateway software to link these incompatible systems
44.   ^ Ray Tomlinson. "The First Network Email".
45.   ^ Version 7 Unix manual: "UUCP Implementation Description" by D. A. Nowitz, and "A Dial-Up Network of UNIX Systems" by D. A. Nowitz and M. E. Lesk
46.   ^ "BITNET History", livinginternet.com
47.   ^ a b Email History
48.   ^ "The Technical Development of Internet Email" Craig Partridge, April–June 2008, p.5
49.   ^ The First Email
50.   ^ Wave New World,Time Magazine, October 19, 2009, p.48
51.   ^ How E-mail Works (internet video). howstuffworks.com. 2008.
52.   ^ Simpson, Ken (October 3, 2008). "An update to the email standards". Mail Channels Blog Entry.
53.   ^ P. Resnick, Ed. (October 2008). "RFC 5322, Internet Message Format". IETF.
54.   ^ Moore, K (November 1996). "MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text". IETF. Retrieved 2012-01-21.
55.   ^ A Yang, Ed. (February 2012). "RFC 6532, Internationalized Email Headers". IETF.ISSN 2070-1721.
56.   ^ J. Yao, Ed., W. Mao, Ed. (February 2012). "RFC 6531, SMTP Extension for Internationalized Email Addresses". IETF. ISSN 2070-1721.
57.   ^ RFC 5322, 3.6. Field Definitions
58.   ^ RFC 5322, 3.6.4. Identification Fields
59.   ^ Microsoft, Auto Response Suppress, 2010, microsoft reference, 2010 Sep 22
60.   ^ RFC 5064
61.   ^ John Klensin (October 2008). "Trace Information". Simple Mail Transfer Protocol. IETF. sec. 4.4. RFC 5321.
62.   ^ John Levine (14 January 2012). "Trace headers". Email message. IETF. Retrieved 16 January 2012. "there are many more trace headers than those two"
63.   ^ This extensible field was defined by RFC 5451 that also defined an IANA registry of Email Authentication Parameters.
64.   ^ RFC 4408.
65.   ^ Defined in RFC 3834, and updated by RFC 5436.
66.   ^ RFC 5518.
67.   ^ Craig Hunt (2002). TCP/IP Network Administration. O'Reilly Media. p. 70. ISBN 978-0-596-00297-8.
68.   ^ "Email policies that prevent viruses".
69.   ^ "When posting to a RootsWeb mailing list..."
70.   ^ "...Plain text, 72 characters per line..."
71.   ^ How to Prevent the Winmail.dat File from Being Sent to Internet Users
72.   ^ In practice, some accepted messages may nowadays not be delivered to the recipient's InBox, but instead to a Spam or Junk folder which, especially in a corporate environment, may be inaccessible to the recipient
73.   ^ RFC 2368 section 3: by Paul Hoffman in 1998 discusses operation of the "mailto" URL.
74.   ^ Allen, David (2004). Windows to Linux. Prentice Hall. p. 192.
75.   ^ Barrett, Grant (December 23, 2007). "All We Are Saying.". New York Times. Retrieved 2007-12-24.
76.   ^ Aamoth, Doug (15 November 2011). "The Man Who Invented Email". Time Magazine: Techland. Retrieved 11 June 2012.
77.   ^ "Email Right to Privacy – Why Small Businesses Care". Anita Campbell. 2007-06-19.
78.   ^ C. J. Hughes (February 17, 2011). "E-Mail May Be Binding, State Court Rules". New York Times. Retrieved 2011-02-20.
79.   ^ A b By Om Malik, GigaOm. "Is Email a Curse or a Boon?" September 22, 2010. Retrieved October 11, 2010.
80.   ^ Martin, Brett A. S., Joel Van Durme, Mika Raulas, and Marko Merisavo (2003), "E-mail Marketing: Exploratory Insights from Finland", Journal of Advertising Research, 43 (3), 293–300.
81.   ^ "Exchange 2007: Attachment Size Increase,...". TechNet Magazine, Microsoft.com US. 2010-03-25.
82.   ^ Lohr, Steve (2007-12-20). "Is Information Overload a $650 Billion Drag on the Economy?". New York Times. Retrieved May 1, 2010.
83.   ^ Stross, Randall (2008-04-20). "Struggling to Evade the E-Mail Tsunami". New York Times. Retrieved May 1, 2010.
84.   ^ "Did Darwin Skip Over Email?". Foundry Group. 2008-04-28.
85.   ^ Radicati, Sara. "Email Statistics Report, 2010".
86.   ^ Gross, Doug (July 26, 2011). "Happy Information Overload Day!". CNN.
87.   ^ Rich Kawanagh. The top ten email spam list of 2005. ITVibe news, 2006, January 02,ITvibe.com
88.   ^ How Microsoft is losing the war on spam Salon.com
89.   ^ Spam Bill 2003 (PDF)
90.   ^ M. Toorani, SMEmail – A New Protocol for the Secure E-mail in Mobile Environments, Proceedings of the Australian Telecommunications Networks and Applications Conference (ATNAC'08), pp. 39–44, Adelaide, Australia, December 2008. (arXiv:1002.3176)
91.   ^ Amy Harmon (2000-11-22). "Software That Tracks E-Mail Is Raising Privacy Concerns". The New York Times. Retrieved 2012-01-13.
92.   ^ About.com
93.   ^ Webdevelopersnotes.com
94.   ^ Microsoft.com
95.   ^ In re Request for declaratory ruling and investigation by Graphnet Systems, Inc., concerning the proposed E-COM service, FCC Docket No. 79-6 (September 4, 1979)
96.   ^ History of the United States Postal Service, USPS
97.   Hardy, Ian R; The Evolution of ARPANET Email; 1996-05-13; History Thesis Paper; University of California at Berkeley
98.   James Bovard, The Law Dinosaur: The US Postal Service, CATO Policy Analysis (February 1985)
99.   Jay Akkad, The History of Email
100.                        US Postal Service: Postal Activities and Laws Related to Electronic Commerce, GAO-00-188
101.                        Implications of Electronic Mail and Message Systems for the U.S. Postal Service , Office of Technology Assessment, Congress of the United States, August 1982
102.                        Email History, How Email was Invented, Living Internet
103.                        Cybertelecom : Internet History
104.                        Cybertelecom : SPAM Reference
105.                        Cybertelecom : Can Spam Act
106.                        2001: A Space Laptop | SpaceRef – Your Space Reference
107.                        The Mac Observer – This Week in Apple History – August 22–31: "Welcome, IBM. Seriously," Too Late to License
108.                        Linzmayer, Owen W. (2004). Apple confidential 2.0 : the definitive history of the world's most colorful company ([Rev. 2. ed.]. ed.). San Francisco, Calif.: No Starch Press. ISBN 1-59327-010-0.
109.                        Bilton, Nick (January 22, 2010). "First Tweet from Space". New York Times.




Cyberwarfare!

Cyberwarfare

What is Cyberwarfare?


Cyberwarfare is Internet-based conflict involving politically motivated attacks on
information and information systems. Cyberwarfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and criple financial systems -- among many other possibilities.

According to Jeffrey Carr, author of "Inside Cyber Warfare," any country can wage cyberwar on any other country, irrespective of resources, because most military forces are network-centric and connected to the Internet, which is not secure. For the same reason, non-governmental groups and individuals could also launch cyberwarfare attacks. Carr likens the Internet's enabling potential to that of the handgun, which became known as "the great equalizer."


Examples of cyberwarfare:


In 1998, the United States hacked into Serbia's air defense system to compromise air

traffic control and facilitate the bombing of Serbian targets.
In 2007, in Estonia, a botnet of over a million computers brought down government, business and media websites across the country. The attack was suspected to have originated in Russia, motivated by political tension between the two countries.Also in 2007, an unknown foreign party hacked into high tech and military agencies in the United States and downloaded terabytes of information.In 2009, a cyber spy network called "GhostNet" accessed confidential information belonging to both governmental and private organizations in over 100 countries around the world. GhostNet was reported to originate in China, although that country denied responsibility.The most effective protection against cyberwarfare attacks is securing information and networks. Security updates should be applied to all systems -- including those that are not considered critical -- because any vulnerable system can be co-opted and used to carry out attacks. Measures to mitigate the potential damage of an attack include comprehensive disaster recovery planning that includes provisions for extended outages.

Cyberwarfare involves the following attack methods:


Sabotage: Military and financial computer systems are at risk for the disruption of normal operations and equipment, such as communications, fuel, power and transportation infrastructures.





Espionage and/or security breaches: These illegal exploitation methods are used to disable networks, software, computers or the Internet to steal or acquire classified information from rival institutions or individuals for military, political or financial gain.On the flip side, systems procedures are continuously developed and tested to defend against cyberwarfare attacks. For example, organizations will internally attack its system to identify vulnerabilities for proper removal and defense. A common perception of a hacker is that of a teenage geek who fools breaks into computer systems for fun. While this perception was perhaps once true, modern cyberwarfare involves well trained, well funded professionals backed by nation states. Examples, such as the Stuxnet virus, are given by some experts to demonstrate that much more is happening behind the scenes, and that the front lines in future wars will be digital.


Motivations





Military


In the U.S., General Keith B. Alexander, first head of the recently formed USCYBERCOM,

told the Senate Armed Services Committee that computer network warfare is evolving so rapidly that there is a "mismatch between our technical capabilities to conduct operations and the governing laws and policies. Cyber Command is the newest global combatant and its sole mission is cyberspace, outside the traditional battlefields of land, sea, air and space." It will attempt to find and, when necessary, neutralize cyberattacks and to defend military computer networks.

Alexander sketched out the broad battlefield envisioned for the computer warfare command, listing the kind of targets that his new headquarters could be ordered to attack, including "traditional battlefield prizes – command-and-control systems at military headquarters, air defense networks and weapons systems that require computers to operate."





One cyber warfare scenario, Cyber ShockWave, which was wargamed on the cabinet level by former administration officials, raised issues ranging from the National Guard to the power grid to the limits of statutory authority.


The distributed nature of internet based attacks means that it is difficult to determine motivation and attacking party, meaning that it is unclear when a specific act should be considered an act of war.


Other cyberwarfares caused from political motivations can be found worldwide. In 2008, Russia began a cyber attack to Georgian government website, which was carried out along with military operation in South Ossetia. In 2008, Chinese 'nationalist hackers' attacked CNN as CNN announced on Chinese repression on Tibet.


Terrorism


Eugene Kaspersky, founder of Kaspersky Lab, concludes that "cyberterrorism" is a more

accurate term than "cyberwar." He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism." He also equates large-scale cyber weapons, such as the Flame Virus and NetTraveler Virus which his company discovered, to biological weapons, claiming that in an interconnected world, they have the potential to be equally destructive.

Civil


Potential targets in internet sabotage include all aspects of the Internet from the backbones of the web, to the Internet Service Providers, to the varying types of data communication mediums and network equipment. This would include: web servers, enterprise information systems, client server systems, communication links, network equipment, and the desktops and laptops in businesses and homes. Electrical grids and telecommunication systems are also deemed vulnerable, especially due to current trends in automation.






Private sector


Computer hacking represents a modern threat in ongoing industrial espionage and as such is presumed to widely occur. It is typical that this type of crime is underreported. According to McAfee's George Kurtz, corporations around the world face millions of cyberattacks a day. "Most of these attacks don’t gain any media attention or lead to strong political statements by victims." This type of crime is usually financially motivated.


Non profit Research


But not all examinations with the issue of cyberwarfare are achieving profit or personal gain. There are still institutes and companies like the University of Cincinnati, the Kasperski Security Laband the Framsteg Think Tank which are trying to increase the sensibility of this topic by researching and publishing of new security threats.


Cyber counterintelligence


Cyber counter-intelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.


On 7 April 2009, The Pentagon announced they spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems.


On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time.


On 9 February 2009, the White House announced that it will conduct a review of the nation's cyber security to ensure that the Federal government of the United States cyber security initiatives are appropriately integrated, resourced and coordinated with the United States Congress and the private sector.





In the wake of the cyberwar of 2007 waged against Estonia, NATO established the Cooperative Cyber Defence Centre of Excellence (CCD CoE) in Tallinn, Estonia, in order to enhance the organization's cyber defence capability. The center was formally established on 14 May 2008, and it received full accreditation by NATO and attained the status of International Military Organization on 28 October 2008. Since Estonia has led international efforts to fight cybercrime, the United States Federal Bureau of Investigation says it will permanently base a computer crime expert in Estonia in 2009 to help fight international threats against computer systems.


One of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult. However Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable".

Incidents

On 21 November 2011, it was widely reported in the U.S. media that a hacker had

destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence Center.
On 6 October 2011, it was announced that Creech AFB's drone and Predator fleet's command and control data stream has been keylogged, resisting all attempts to reverse the exploit, for the past two weeks. The Air Force issued a statement that the virus had "posed no threat to our operational mission".


In July 2011, the South Korean company SK Communications was hacked, resulting in the theft of the personal details (including names, phone numbers, home and email addresses and resident registration numbers) of up to 35 million people. A trojaned software update was used to gain access to the SK Communications network. Links exist between this hack and other malicious activity and it is believed to be part of a broader, concerted hacking effort.


Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported by Internet security company McAfee in August 2011. The attacks have hit at least 72 organizations including governments and defense contractors.


On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry.


On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites
belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist attacks.

In October 2010, Iain Lobban, the director of the Government Communications 

Headquarters (GCHQ), said Britain faces a "real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened Britain's economic future, and some countries were already using cyber assaults to put pressure on other nations.

In September 2010, Iran was attacked by the Stuxnet worm, thought to specifically target its Natanz nuclear enrichment facility. The worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of cyberwarfare.


In July 2009, there were a series of coordinated denial of service attacks against major government, news media, and financial websites in South Korea and the United States. While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom.


Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers during the 2008 South Ossetia War.


In 2007 the website of the Kyrgyz Central Election Commission was defaced during its election. The message left on the website read "This site has been hacked by Dream of Estonian organization". During the election campaigns and riots preceding the election, there were cases of Denial-of-service attacks against the Kyrgyz ISPs.


In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard. U.S. industry and military sources speculated that the Israelis may have used cyberwarfare to allow their planes to pass undetected by radar into Syria.


In April 2007, Estonia came under cyber attack in the wake of relocation of the Bronze Soldier of Tallinn. The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia. In the attack, ministries, banks, and media were targeted.


In the 2006 war against Hezbollah, Israel alleges that cyber-warfare was part of the conflict, where the Israel Defense Forces (IDF) intelligence estimates several countries in the Middle East used Russian hackers and scientists to operate on their behalf. As a result, Israel attached growing importance to cyber-tactics, and became, along with the U.S., France and a couple of other nations, involved in cyber-war planning. Many international high-tech companies are now locating research and development operations in Israel, where local hires are often veterans of the IDF's elite computer units. Richard A. Clarke adds that "our Israeli friends have learned a thing or two from the programs we have been working on for more than two decades."


References:


  1. http://www.techopedia.com/definition/13600/cyberwarfare
  2. http://searchsecurity.techtarget.com/definition/cyberwarfare
  3. Andress, Jason. Winterfeld, Steve. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress. ISBN 1-59749-637-5
  4. Brenner, S. (2009). Cyber Threats: The Emerging Fault Lines of the Nation State. Oxford University Press. ISBN 0-19-538501-2
  5. Carr, Jeffrey. (2010). Inside Cyber Warfare: Mapping the Cyber Underworld. O'Reilly. ISBN 978-0-596-80215-8
  6. Cordesman, Anthony H., Cordesman, Justin G. Cyber-threats, Information Warfare, and Critical Infrastructure Protection, Greenwood Publ. (2002)
  7. Gaycken, Sandro. (2012). Cyberwar – Das Wettrüsten hat längst begonnen. Goldmann/Randomhouse. ISBN 978-3442157105
  8. Geers, Kenneth. (2011). Strategic Cyber Security. NATO Cyber Centre. Strategic Cyber Security, ISBN 13 (PDF): 978-9949-9040-7-5 169 pages
  9. Janczewski, Lech; Colarik, Andrew M. Cyber Warfare and Cyber Terrorism IGI Global (2008)
  10. Rid, Thomas (2011) "Cyber War Will Not Take Place," Journal of Strategic Studies, doi:10.1080/01402390.2011.608939
  11. Ventre, D. (2007). La guerre de l'information. Hermes-Lavoisier. 300 pages
  12. Ventre, D. (2009). Information Warfare. Wiley – ISTE. ISBN 978-1-84821-094-3
  13. Ventre, D. (Edit.) (2010). Cyberguerre et guerre de l'information. Stratégies, règles, enjeux. Hermes-Lavoisier. ISBN 978-2-7462-3004-0
  14. Ventre, D. (2011). Cyberespace et acteurs du cyberconflit. Hermes-Lavoisier. 288 pages
  15. Ventre, D. (Edit.) (2011). Cyberwar and Information Warfare. Wiley. 460 pages
  16. Ventre, D. (2011). Cyberattaque et Cyberdéfense. Hermes-Lavoisier. 336 pages
  17. Ventre, D. (Edit.) (2012). Cyber Conflict. Competing National Perspectives. Wiley-ISTE. 330 pages
  18. Woltag, Johann-Christoph: 'Cyber Warfare' in Rüdiger Wolfrum (Ed.) Max Planck Encyclopedia of Public International Law (Oxford University Press 2012)