Pitcairn Island in the South Pacific case study

Pitcairn Island in the South Pacific is the smallest and least populated
jurisdiction in the world, described by the first mariner to observe it as a
“ great rock rising out of the sea . . . about a thousand leagues westward
to the continent of America. ” 1
It ’ s a lonely place; when the Bounty mutineers needed a refuge from the global empire whose laws they ’ d broken,
they sailed for Pitcairn and vanished for almost two decades. As of last
year ’ s electoral rolls, there are 45 people on Pitcairn, most of them
descended from the mutineers. There is a government-subsidized satellite
Internet connection for the island ’ s houses. Per capita, Pitcairn Island is
the world ’ s number-one source of spam.
How is this possible? Can this island, whose major export industries
are handicrafts for passing ships and stamps for philatelists, host a cabal of
spammers bombarding the world with phishing messages and Viagra ads
by satellite connection? In the list of spam production per capita, Pitcairn
is followed by Niue and Tokelau, also in the South Pacific; the Principality
of Monaco, whose population overwhelmingly consists of rich expatriates
dodging taxes in the world ’ s second smallest country; and the Principality
of Andorra, a country one-fifth the size of Rhode Island. 2
Are there really
that many Catalan-speaking Andorran spam barons, accumulating stolen
credit card data by the ski slopes of the Pyrenees?
The answer is no, of course. The Polynesians who live on Niue, like
the wealthy Europeans overlooking the Mediterranean, have been unknowingly conscripted into the business of spam. Virtually all of us on the
Internet have been, on one side or another. Spam has changed laws and
communities at the points of friction where the network ’ s capacities rub
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
against prior orders of work and governance. It has changed our language,
economics, and culture and exerted a profound effect on our technologies.
It has subtly — and not so subtly — deformed the shape of life online,
pulling it into new arrangements that make no more sense than the movement of the galaxies unless you allow for the mass of all the dark matter.
Only at scale, in time and in space, can we begin to bring this shape into
focus. It stretches from embryonic computer networks in the 1960s and
1970s to the global social graph of 2010, from the basements of MIT to
the cybercaf é s of Lagos, Rotterdam, and Tallinn. It encompasses points
across the network from covert chat channels to Google ’ s server farms to
“ ghost number blocks ”to anonymous banks of airport pay phones. The
spam most of us experience every day as a minor and inexplicable irritant
is like the lonely rock that sailor sighted, merely the visible peak of vast
and submerged infrastructures with much to say about the networked
The word “ spam ”means very different things to different people at
different times. It is a noun, collective and singular, as “ this spam ”can
mean “ all these messages I ’ ve received ”or “ this particular email. ”It is a
verb, as in “ they spam me, ”and an adjective, as in “ this is spammy. ”It refers
to many varieties of exploitation, malfeasance, and bad behavior, and spam
terminology has branched out into specific subdomains, from “ phishing
spam ”and “ 419 spam ”to splogs, linkfarms, floodbots, content farms. (All
of these new terms and forms will be defined and described in the following chapters.) It can easily slide into what philosophers call the “ sorites
paradox ”( “ sorites, ”appropriately for talking about spam, comes from the
Greek word for “ heap ”or “ pile ” ) to describe the linguistic confusion
between grains of sand and “ sand ”in dunes, the moment at which individual bits become a single big pile. When “ spam ”is discussed in journalism or casual conversation, the word is often meant as I have used it in
the previous paragraph, as a unified substance or a continuous event, like
smog or “ a mass or pulp, ”as Susanna Paasonen puts it. 3
But spam begins
to make sense only when we get specific and separate out the different
types, motives, actors, and groups.
Spam is not a force of nature but the product of particular populations
distributed through all the world ’ s countries: programmers, con artists, cops,
lawyers, bots and their botmasters, scientists, pill merchants, social media
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
entrepreneurs, marketers, hackers, identity thieves, sysadmins, victims, pornographers, do-it-yourself vigilantes, government officials, and stock touts.
Long as it is, this list mentions only those who live there more or less
full-time, because everyone online participates in the system of spam,
however indirectly. We fund and enable it with choices we make and
trade-offs we are willing to accept because the benefits to the network
outweigh the costs. We generate areas of relevance and attention whose
discovery and exploitation is the heart of the business. We alter how spam
works and break up its current order with choices, refusals, and purchases
whose consequences we may not understand.
Those houses on Pitcairn, for example, connected to their satellite link,
do not shelter spammers hard at work. At some point, a few of the computers on Pitcairn were taken over by a piece of malware, probably arriving
as the misleading payload of a spam message that appeared to come from
a friend, taking advantage of unpatched or insecure software that can be
daunting for the user to maintain. This malware quietly commandeered
the computers without their owners ever noticing (perhaps they merely
thought that the machine, and the Internet connection, had become a
little slower) and enrolled them along with many thousands of other captured computers in homes and offices around the world into a system
called a “ botnet. ”One of the functions of the botnet is to use spare computer power and Internet connection bandwidth to send out spam messages on behalf of the botnet ’ s controller, who can thus generate hundreds
of millions of messages at effectively no cost. A desktop computer, manufactured in Shenzhen or Xiamen or Chennai, powered by a diesel generator and online through a satellite over the Tropic of Capricorn, on a
remote island in the Melvillean Pacific, has become part of a distributed
machine controlled by a remote group of botmasters in Denver or St.
Petersburg. This is a system unprecedented in human history, a vision out
of science fiction, that writes constantly repeating messages of crushing
banality: “ YOU HAVE WON!!!/Congratulations!!! You have won
£ 250,000.00POUNDS from Pepsi Company award 2010, Please provide
your Full name, Age, Sex, Country, Occupation ” ; “ Permanent En1argedPenis/She prefers your lovestick bigger ” ; “ Listen up. I must let you in on
a few insider *secrets*: Instead of waiting months to generate sales on
your site, you can start gaining the hits you want right now. ”
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
This is a book about spam for anyone who wants to understand what
spam is, how it works, and what it means, from the earliest computer
networks to the present day. To understand spam means understanding
what spam is not, because — as you will see — the history of spam is always
a history of shifting definitions of what it is that spam harms and the
wrong that it produces. The history of spam is the negative shape of the
history of people gathering on computer networks, as people are the target
of spam ’ s stratagems. It is defined in opposition to the equally shifting and
vague value of “ community. ”(In fact, many of the early cases of spam
provoke groups of people on computers into the task of self-definition
and self-organization as communities.) To put this history and this book
into a single sentence: spamming is the project of leveraging information
technology to exploit existing gatherings of attention.
Attention, the scarce resource of human notice, is what makes a community on the network, and the creation of communities, the invention
of “ we ”on the Internet, is an act of attention. Communities and spam as
a whole are projects in the allocation of attention, and spam is the difference — the shear — between what we as humans are capable of evaluating
and giving our attention, and the volume of material our machines are
capable of generating and distributing when taken to their functional
extremes. 4
Over four decades of networked computing, spammers have
worked in that gulf between our human capacities and our machinic
capabilities, often by directly exploiting the same technologies and beneficial effects that enable the communities on which they predate. These two
forces build, provoke, and attack each other, and the history of one cannot
be understood without accounting for its nemesis.
This co-constitutive feedback loop between communities and spammers
is a major event in the technological drama that is the Internet and its
sister networks. This term, “ technological drama, ”is from the work of
Bryan Pfaffenberger and provides framing and context for the story to
come; it is the life of a technology, from conception and design through
adoption, adaptation, and obsolescence. 5
Why a drama? Because technologies are statements about the distribution of needful things such as power,
status, access, wealth, and privilege, for good and for ill. They are stages
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
on which social and political arguments and counterarguments are made.
These arguments may be not merely irrational but also deeply cultural
and ritualistic, expressing convictions that lie well beyond the immediate
physical constraints of engineering. A technological drama is suspenseful:
it is not played out to foregone conclusions but is rife with the possibility
of subversion, takeover, and unexpected captures. It is a drama of escalation
and feedback loops, for technologies are never merely passive vessels for
holding ideas and ideologies but active things in the world that open new
possibilities and capacities. They change the communities that created them
and those that take them up.
The inciting incident that frames any technological drama and gets it
moving is the gathering of a “ design constituency, ”in Pfaffenberger ’ s
phrase. “ Constituency ”is well-chosen, because we are not simply referring
to the engineers, inventors, scientists, or designers who actually work the
lathe, draw out the blueprints, or blow the glass but to the entire body of
people who participate in the design and who stand to directly benefit
from the technology ’ s success. It is to their benefit if it sells, of course,
assuming that it is the kind of technology that can be commoditized into
widgets and not, for instance, a civil engineering project. More important,
however, is that the values embedded in the technology, intentionally or
unintentionally, become dominant. Those values reflect an arrangement of
power, control, and prestige that the design constituency would like to see
in the world, whether centralized and privatized, open and egalitarian, or
otherwise. This design constituency can include the engineers and applied
designers themselves, as well as managers and shareholders in firms, but
also politicians, experts, theorists, and elites. What is complex and important here is to be able to view technologies in two ways at once: seeing
both their physical capacities and functions, and their social and political
assertions — the moves they make in the allocation of resources and power.
We will explore computer networks and the people building and using
them with this perspective.
To get some perspective on how technological dramas work as an analytic tool, consider the case of heavier-than-air aviation. No one would
argue against the profound benefits delivered by the development of
powered flight, but to really understand the adoption and adaptation of
the technology we must account for the acts of political stake-planting
and the renegotiations of influence and control that went with it. Aviation ’ s
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
roots included the powerful early idea of “ air-mindedness, ”for which
planes were not just powered, winged craft for flight but objects whose
existence was a direct expression of a rational, modern, and global mindset
that would simultaneously bring about world peace and subdue colonized
populations through bombing. 6
H. G. Wells, for instance, in his role as a
public intellectual and policy advocate, framed the work of getting from
one place to another by air as nothing less than the formation of a new
generation of intellectual pilot-samurai who would enforce a technocratic
world state. This coming class would be necessarily scientific, cosmopolitan,
and forward thinking, because they used planes. Airplanes, Le Corbusier
asserted, were “ an indictment, an accusation, a summons ”to architects and
city planners, shaming their retrograde ideas: planes were pure futurity, the
avatars of the machine age. 7
At the same moment, figures such as Gabriele
D ’ Annunzio, aviator and Fascist literary icon, and Italo Balbo, commander
of Italian North Africa and leader of the famous Century of Progress
Rome – Chicago flight, were using both the glamour and threat of flight
as an assertion of Fascism ’ s fusion of futuristic dynamism with nationalist
and archaic agendas. In the United States, flight included the democratic
vision of self-taught tinkerers hacking on planes in barns and garages and
potent assertions of military superiority and the projection of power
abroad in an abruptly smaller world. And so on. This many-layered complexity of motives, ideas, fantasies, and goals obtains across the technological domain. To understand any technical event in depth, we need to be
able to describe the full range of interests in the work of the design
The other side of the drama is the “ impact constituency, ”those whose
situation is being changed by what the design constituency produces. Neil
Postman simply called them the “ losers, ”because the rearrangement of the
world, although not necessarily one in which they lose out explicitly, is
one over which they have little initial control. Examples from Pfaffenberger ’ s research are particularly well suited for this purpose. Consider
the politics of irrigation projects in Sri Lanka, a particularly bald-faced
attempt at social engineering via technological deployment. Landed, powerful, and deeply anti-industrial local elites sought to manage the threat
of dispossessed, dissatisfied, and mobile peasants by creating a neatly controllable system of rural settlements. It was a project of getting them back
on the farm, to put it simply, where they would stay ignorant of modernity
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
and easier to tax and manage, forestalling the arrival of an industrial order
in which the landholding “ brown sahibs ”stood to lose. The landholders
did the designing, and peasants felt the impact. James C. Scott ’ s work
provides several cases along these lines — of compulsory villagization, collectivization of agriculture, and high modernist urban planning — in which
the capture and redistribution of value is exerted through the production
of artifacts, places, and systems of living, always framed as “ for their own
good. ” 8
We could also speak on the far smaller and more intimate scale
of something like the Victorian household ’ s hallway bench, with its ornate
mirrors and carved hooks, for the household ’ s masters to view as they walk
by and hang their hats, and the strikingly uncomfortable bare low bench
on which the servants, messengers, and peddlers are to sit and wait.
What makes these relationships of design and impact into a drama is
the back-and-forth of technological statements and counterstatements.
After the original assertion made in the design and deployment of a technology come the responses, as the impact constituencies take things up,
change them, and accept them or fight back. The design constituency
cooks up methods and language for using technologies to arrange, distribute, or contain power, status, and wealth, and impact constituencies
have countermoves available. They can produce arguments to get their
hands on the technology, for instance, and reconstitute it, which does not
merely ameliorate the painful setbacks produced by the deployment but
actually generates a new technology that builds on the old for their own
The most obvious and canonical instance of reconstitution in a technological drama, producing a “ counterartifact ”out of the existing technology,
is the personal computer. Decades of development in computing had been
the product of the military, academia, and contractors and corporations
such as IBM. The computer was “ the government machine, ”sitting in the
ballistics lab and running models for building nuclear weapons and game
theory analyses of Cold War outcomes. 9
Computing had become virtually
synonymous with a bureaucratic, administered society in which people
were subsumed as mere components, in what Lewis Mumford termed the
“ megamachine. ”Against this concept came the first hackers and subversive
tinkerers, activists, and artists, with Ted Nelson (who coined the term
“ hypertext ” ) asserting, “ You can and must understand computers now, ”
“ countercomputers ”for the counterculture, the Homebrew Computer
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
Club, the Apple I and II, and so on. 10 The drama never stops, and Fortune ’ s
wheel keeps turning, casting down and raising up and demanding new
technical statements and counterstatements.
Getting a significant new technology that is instilled with cultural values
and political goals to “ work ”is an act of assembly, of mobilizing different
groups, ideas, forces, and stakeholders together. There needs to be a flexibility to the idea, enough that you can pull heterogeneous and sometimes
even opposed powers into an alliance behind it. A technology too clearly
and narrowly defined may not be able to develop all the alliances it needs.
For the Sri Lankan irrigation project, it meant creating a complicated
alliance of ethnic and religious chauvinism, paternalistic philanthropy,
opposition to the old British colonial order (by an elite whose power
derived from the restructuring of society under the British), and so on. A
similar multiplex set of alliances could be seen in the free/libre open
source software (FOSS) movement, with businesses, individual charismatic
activists, developers, and political radicals of many stripes and very diverse
agendas trying to gather under the same banner. The epic semantic fork
between the models of open source and free software in 1998 captures
one of the moments when the ambiguities became unsustainable and had
to be reformulated. “ Movement, ”writes Christopher Kelty, “ is an awkward
word; not all participants would define their participation this way. . . .
[They] are neither corporations nor organizations nor consortia (for there
are no organizations to consort); they are neither national, sub-national,
nor international; they are not ‘ collectives ’because no membership is
required or assumed. . . . They are not an ‘ informal ’organization, because
there is no formal equivalent to mimic or annul. Nor are they quite a
crowd, for a crowd can attract participants who have no idea what the
goal of the crowd is. ” 11 This complex mesh, sharing practices and debating
ideology, is a design constituency, gathering around the technology and
trying to marshal support for different and sometimes conflicting visions
to push the project into the world.
This process of gathering and marshaling is strengthened by some
founding ambiguities. These let the designers cast a wide net and make it
easier to argue that this technological project speaks for you, too. Some of
these ambiguities are invoked of necessity. The story that a design constituency builds to draw in stakeholders from different domains to support a
new technology must draw on what Victor Turner terms “ root paradigms, ”
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
the deep organizing principles of a culture and an epoch that provide a
rationale and a motive for action. Root paradigms aren ’ t exact and precise,
and they are never simply true or false. Whether they be submission to
the free market, the sanctity of human life, the vital and cleansing power
of war, or the unquestionable role of the dynastic king, root paradigms are
dynamic, messy, and enormously powerful concepts built on internal oppositions. They draw their energy and vitality from their unsettled condition
of irreconcilable struggle within which new technologies, political initiatives, and movements can be placed and contextualized. At major turning
points in the development of the Internet and spam, struggles between
constituencies were played out that drew on far older root paradigms such
as absolute freedom of speech, communal self-defense and self-organization, the technological autonomy of the capable individual, the inevitability
of destructive anarchy without governance, and the centrality of commerce
to society. The presence of these paradigms gives technological deployments the thrilling, and often later inexplicable, attraction of social movements (because that is, in fact, what they are). They draw their strength
from roots sunk deep into the earth, where the bones of prior orders and
the ruins of previous civilizations underlie the present.
These foundational ambiguities in a technology ’ s design are a crucial
resource for the impact constituencies and others to exploit. Sally Moore
describes how a reworking of the arrangements introduced by a technology is made possible, by “ exploiting the indeterminacies of the situation,
or by generating such indeterminacies . . . areas of inconsistency, contradiction, conflict, ambiguity, or open areas that are normatively indeterminate. ” 12 The indeterminate space is the place for trade-offs and concessions,
ways to get many diverse parties working together and pointed in the
general direction envisioned by the design constituency. It is also leaves
apertures and affordances in the plan for the manipulation, escapes, and
exploitation of others, from innovations and improvements to exploits and
deliberate sabotage — and thus for things like spam.
This complex indeterminacy obtained at every stage of the Internet ’ s
development. As will be discussed later in this book, there was deep uncertainty and widely varying understandings as to what this thing was to be
and how it should be used by people and by hardware and software. This
uncertainty was an enormous boon for innovators and inventors, for the
strange frontiers of network culture, and for both hackers and criminals,
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
whose somewhat blurry relationship and ambiguous legal status recurs in
this history. Spam survived and prospered by operating in the edge cases
around these big ideas, in the friction between technical facts and the root
paradigms that are expressed in them where powerful concepts like trust,
anonymity, liberty, and community online were reinvented, modified, and
sometimes discarded. In following spam, we will explore how these ideas
evolved and, above all, how human attention online, and the strategies for
capturing it, changed over time.
Appropriately for a technological drama, the history of spam has three
distinct acts, which are reflected in this book ’ s three sections. The first, from
the early 1970s to 1995, begins with conversations among the architects
of the earliest computer networks, who were trying to work out acceptable
rules, mores, and enforcement tools for online communication. It closes
with the privatization of the Internet and the end of the ban on commercial
activity, the arrival of the Web, and the explosion of spam that followed
the Green Card Lottery message on Usenet in May 1994. It is a quartercentury of polylogue concerning the fate and the purpose of this astonishing thing the online population was fashioning and sharing ( “ polylogue ”
being a term from an early computer network for this new form of asynchronous and many-voiced conversation on screens). It includes a remarkable cast of postnational anarchists, baronial system administrators, visionary
protocol designers, community-building “ process queens, ”technolibertarian engineers, and a distributed mob of angry antispam activists. It is an
era of friction between concepts of communal utility, free speech, and selfgovernance, all of which were shaped in a negative way by spam. “ Spam ”
here is still used in its precommercial meaning of undesirable text, whether
repetitive, excessive, or interfering. The imminent metamorphosis of these
ideas as the values and vision of the network changed in the mid-1990s
was partially signaled and partially led by changes in spam ’ s significance
and means of production.
The next phase lasts about eight years, from 1995 to 2003, or from the
privatization of the network through the collapse of the dot-com boom
and the passage of the CAN-SPAM Act in the United States. It is about
money and the balance between law and collective social action. Those
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
years are filled with the diversification of spam into a huge range of
methods and markets, following and sometimes driving innovations on the
Internet and the Web, from search engine manipulation and stock market
“ pump-and-dump ”schemes to fake password requests and “ Nigerian
prince ”fraud campaigns. During this time, a strange class of magnates and
hustlers is born, arbitraging the speed of new technological developments
against the gradual pace of projects to regulate them. Their nemeses start
here as well, with antispam projects ranging from message-filtering programs to laws and coordinated campaigns of surveillance, research, and
harassment. This period is fraught with uncertainty about the role of
nations and territorial boundaries online, the ambiguous rights and responsibilities of “ users, ”and the relationship between what algorithms can
process and what humans can read.
The most recent phase, from 2003 to the present day, turns on these
questions of algorithms and human attention. A constellation of events is
dramatically changing the economics of the spam business: the enforcement of laws, the widespread adoption of powerful spam filters, and the
creation of user-produced content tools. To keep the business profitable,
those spammers who survive the transition will develop systems of automation and distributed computing that span the globe and lead to military
applications — building nothing less than a criminal infrastructure. In turn,
antispammers will rely on sophisticated algorithms and big data to minimize the labor of catching and blocking spam messages. As spam prefigured and provoked crises in community and governance on the Internet,
it now shows us an imminent crisis of attention — in the most abject and
extreme form, as always. After four decades of interrupting conversations,
grabbing clicks, demanding replies, and muddling search results, spam has
much to teach us about the technologies that capture our attention, now
and to come.
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.
Brunton, Finn. Spam : A Shadow History of the Internet, edited by Geoffrey C. Bowker, MIT Press, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/lynnu/detail.action?docID=3339610.
Created from lynnu on 2018-10-13 20:03:17. Copyright © 2013. MIT Press. All rights reserved.

Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently

Online Academic Help With Different Subjects


Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.


Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!


While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.


Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.


In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.


Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.


We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!


We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.


Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper