Feeds

How much of the Internet economy is fake?

We hear of a very disturbing setup that is all too real

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

There is little doubt that the Internet is a very different beast to other media, and so different, innovative business models have been implemented in order to squeeze whatever cash is available. Paying per referral, charging per click, making valuations according to traffic etc etc.

However, we have heard of a scam that undermines a large chunk of the Internet economy's foundations, puts current models under the microscope and begs the question: how much of the Internet's perceived worth is real and how much is virtual?

What is it? We'll tell you, but names etc have had to be removed to protect our sources. A large-scale consumer online email site was desperate to gain customers and so offered a small fee of a few dollars per referral to other sites. Deliver them a customer, and you will get a small thankyou.

Fine, you say. But we know of at least one company that abused this setup, creating instead tens of thousands of fake addresses and taking the money, thankyou very much. Obviously, these need to be maintained and so the company wrote some code that gets those email addresses to write to each other, put it on a server and watched the money roll in.

It's a big scam and easily done, what with modern technology the way it is. So what, you say. The email company will see all the requests coming from just one or two IP addresses and shut them down. Or will it? And this is the fundamental flaw in the Internet models in existence.

Why would the email company pull all these accounts when they look real enough, they're being used and far more importantly they make the company a lot of money because it sells the number of accounts it has as its customer base. This customer base is what it earns its revenue on through an ad supply company. Pull those addresses out and you put yourself out of business.

Take the case of the ad supplier. Even if it was aware of exactly what was going on down the line, what possible incentive does it have to come clean? It feels no guilt and the sheer quantity of hits supplied is exactly what also keeps it going.

And so we have the situation where the only people losing are the companies that are paying for the advertising in the first place. Many of the hits it is paying for may exist only in a virtual way - it's like paying for billboard advertising and people not bothering to put it up. It's one of the oldest scams in the book - getting people to pay for something that doesn't exist - but with modern Internet technology, it can be reproduced millions of times at the touch of a button.

Also, this is just one isolated example. There are some clever people out there and while fraud remains in everyone's interests, you have to ponder whether the Internet economy is riding a white elephant. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.