Spam comes in all sorts of shapes and sizes as it evolves to conquer protection against virus infection, trojan horse programmes that lie dormant for some time before being triggered, either by, for example, running a script that runs every end of month. Back ups at that time are essential.
Ferocious spam is also a disservice to those that spam to make money. They employ the same technology as do keystroke relay systems that can silently and efficiently capture every keystroke you type from there on, and then send it encrypted to a storage place. The US Government most likely already records the internet in that very fashion - it is not even a remotely private medium.
The law acts against those that use spam to make money. The law can not keep up with those who use spam to destroy computer data if they are smart enough. The only solution is universal client monitoring. What else is driving the price of raw memory down? Silicon was always going to be a cheap resource, so memory has become less a commodity but almost a consumable product, when old memory becomes slow, it is replaced by another set of initials that can conquer previously impossible speeds. Watch how fast that screen clears! See that curve calculation whizz you by. Watch movies, just like a "real DVD player". Watch anything that's remotely video. Enable the user to infinitely distribute and duplicate works and then reap the legal benefits. The recording industry collects for artists and sues for its own expansion. It has a huge source of readily available data forensics.
It is that field that is of importance. Not only what is left behind, but what transpires. For a change, one is able to make an indelible copy of a news story and record history as it happens. Researching that history is what Google is laying claim to, the searching of the history we weave. Myths can be dispelled, when we can search history.
Spam pervades myths about artificial fortunes that is being offered to you at no cost on the part of some self-acclaimed provender of miracles. For example, supplying you with myths about your computer system security.
Here is the real fact. Nothing on your computer is sacred. Anything is available to the skilled network engineer or systems programmer. Scanning data streams sounds innocuous enough, maybe, but recording every keystroke - that is a real threat. The American Government has spend billions on security and that expresses a need to monitor data streams. The model of a recording device that constantly analyses and decrypts streams of information from a data source is not as unrealistic as it sounds. Of course, the vast majority of data sources (for example the webaddress of a registered media such as a newspaper) can be ignored. But certain patterns of encryption or even delta patterns may reveal the work of terrorists or banks or others.
Of course, it is the trailing of reasons for suspicion that lead the law into places criminals do their deeds, but never before has the historical context so favoured the law. Now that your every thought can be monitored, a police investigation may delve into more than you may think. And fair enough. Personal veracity matters when it comes to money and property otherwise one has to abandon the idea of money and property.
Now that the law has started to act against spammers, and all spammers have left trails that ultimately reveal who they are, the tide of spam is turning into something more threatening. Intimate intelligence and knowledge works both ways.