<P> A chain letter is a message that attempts to convince the recipient to make a number of copies of the letter and then pass them on to a certain number of recipients (either a predefined number or as many as possible). The "chain" is actually an exponentially growing pyramid (a tree graph) that cannot be sustained indefinitely . Common methods used in chain letters include emotionally manipulative stories, get - rich - quick pyramid schemes, and the exploitation of superstition to threaten the recipient with bad luck or even physical violence or death if he or she "breaks the chain" and refuses to adhere to the conditions set out in the letter . Originally, chain letters were letters one received in the mail . Today, chain letters are often sent via email messages, postings on social network sites, and text messages . </P> <P> There are two main types of chain letters: </P> <Ol> <Li> Hoaxes--Hoaxes attempt to trick or defraud users . A hoax could be malicious, instructing users to delete a file necessary to the operating system by claiming it is a virus . It could also be a scam that convinces users to send money or personal information . Phishing attacks could fall into this . </Li> <Li> Urban legends--Urban legends are designed to be redistributed and usually warn users of a threat or claim to be notifying them of important or urgent information . Another common form are the emails that promise users monetary rewards for forwarding the message or suggest that they are signing something that will be submitted to a particular group . Urban legends usually have no negative effect aside from wasted time . </Li> </Ol> <Li> Hoaxes--Hoaxes attempt to trick or defraud users . A hoax could be malicious, instructing users to delete a file necessary to the operating system by claiming it is a virus . It could also be a scam that convinces users to send money or personal information . Phishing attacks could fall into this . </Li>

A false claim that is spread through electronic means such as chain letters