
E-mail Advocacy: Online Petitions, Spamming the Globe
by Guest Blogger, 2/17/2002
While electronic mail is still recognized by US nonprofits as a primary means of communicating with elected officials at the national level, e-mail campaigns and online petitions, however, are generally regarded with a high degree of suspicion, skepticism, or indifference by elected officials. Even the general public expresses hesitancy with this form of advocacy.
Assume, for a minute, that you were on the receiving end of a barrage of e-mail communications, especially junk mail or "spam." You have to go through each message and verify who generated it, whether there is any way to contact the sender, if it is a general or specific concern or set of issues the sender is trying to articulate, and what to do with it. Hill offices are not the only entities that must contend with such concerns. Chances are, you deal with this on a regular basis.
Think of those chain-mails some of you receive (and forward, come on admit it!), warning, for example, of "URGENT LEGISLATIVE ACTIVITY" regarding the US Postal Service's attempt to levy a 5-cent surcharge on every email delivered within the United States, or the similarly suspicious "Alert to Save Funding for PBS, NPR, and NEA." These usually ask you to (1) forward a copy of the letter to other people who will then pass it along to others, and/or (2) sign your name to the attached e-mail "petition."
David Emery, the About.com guide for Urban Legends and Folklore, writes about the elements of faulty online petitions and campaigns, citing the PBS/NPR/NEA example as particularly instructive. In this case, two University of Northern Colorado students generated an e-mail petition to protect the Public Broadcasting System and National Public Radio from Republican threats to cut their funding. Everyone who receives the notice (which has been in circulation since 1995!) is asked to "sign" the document by adding their names to the bottom of the message, and then to forward it to others.
The initial intent may have been to alert and educate a broad (albeit unidentified) audience about the need to support a particular item. The notice has, however, outlived its usefulness. One of the reasons is that the petition was issued without any way to halt or recall it. There was no specific language regarding how long to circulate the message. Currently, people now add their own subject line to this (or a similar) message, so that it seems "fresh" and "new".
in general, one should be wary of the Internet tax e-mail and other "urban legends" or hoax messages, especially if they ask for personal information. Why? Among other reasons:
- If no one else has attached personal information, you will most likely be the only one who does so
- If you have no idea who the *original* sender is, you have no way to verify the legitimacy of the letter. Legitimate campaigns will at least point to an organization, phone number, mailing address, and website with information that is dated as current. If none of these components is in place, you should be hesitant to sign. If any of these components are present, you should follow up with any contact information available before signing.
- Some "chain mail" campaigns exist to clog the mail servers of their intended targets, for example, the mail server of a university, a nonprofit organization, the Hill, or the White House. Such efforts do grab media attention, and may show the target that there are a lot of people who received a particular message and felt encouraged to do something about it. "Clogging" efforts, however, may also backfire. Unless done with some planning, the ultimate effect could be to make the effort look malicious and focused on disrupting a mechanism, as opposed to presenting an actual concern.
- Other chain mail campaigns may cite organizations and people who do exist, yet may contain errors or false information that intentionally or unintentionally damage the reputation of groups cited.
- Online petitions, quite frankly, are not taken seriously. In the eyes of elected officials, names and e-mail addresses can be made up quite easily. As pointed out before, in the absence of concrete contact information, such as phone numbers and mailing addresses, the number of names adds up to nothing.
- DO NOT HIT REPLY, even if you are given instructions to reply to an address to stop receiving unwanted messages. Many times, spammers use false addresses, or are waiting to see if the addresses they have collected are valid. Sending them a reply message only confirms that your inbox is open for all of their content.
- Send the full copy of any suspect message to your Internet Service Provider or system administrator
- Visit the Blacklist of Internet Advertisers, which coordinates a listing of the worst spam offenders, and links to other anti-spam resources.
- Send complete copies of spam, particularly online petitions from organizations that may ask for money as well as signatures, to the Internal Revenue Service's Internet abuse e-mail address.
- Use the built-in filter on your e-mail software (if you have that feature), or check out "anti-spam" shareware programs, including those available at the ZDNet Shareware Library and other sources. Check with your system administrators before downloading a program to ensure full compatibility with your existing software.
