Techniques for defense against unwanted communications by striking back
against the beneficiaries of the unwanted communications include
identifying a communication channel to a beneficiary of an unwanted
communication and sending a communication via the communication channel
to the beneficiary such that the communication imposes a cost to the
beneficiary. The cost to the beneficiary may be used to deter further
unwanted communication from the beneficiary.