Feeds

Aussies prosecute first 'spammer'

A biggie, they say

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Australia is prosecuting the first alleged spammer under its new-ish Spam Act. The Australian Communications Authority (ACA) accuses Perth-based Clarity1 of sending at least 56 million junk emails since the Spam Act came into force in April last year.

And it accuses the company and its managing director, Wayne Mansfield, of harvesting some of the email addresses he sent mail to. Citing the "scale of the breach" of the Spam Act, the ACA is seeking an interim injunction until the court hearing against Clarity1.

In a release announcing the action against Mansfield, the ACA notes that his company – under its trading name Business Seminars Australia - is listed by Spamhaus, as one of the world’s top 200 spammers.

The ACA wrote to several alleged spammers based in Australia on the Spamhaus list before the Spam Act began in April 2004.

ACA Acting Chairman Dr Bob Horton said: “We advised them that they were required to comply with the new Act,” he said. “Spamhaus subsequently reported that several major Australian spammers on their list had stopped operating, or left the jurisdiction. “However, this particular operation continues today allegedly in breach of the Act.”

Mansfield denies breaking the law. He said he welcomes the opportunity to prove the legality of his operations in court, Australia’s ABC News reports. ®

Related stories

Aussie crooks recruit teen phishing mules
Aussie 419 ringleader jailed for four years
419ers take Aussie financial advisor for AU$1m
Aussie PM slammed for spam
US looks to be master of Aussie IP
US, UK and Australia sign anti-spam act
Aussie spam watchdog investigates itself

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.