Feeds

US porn spammers guilty as charged

Canned by CAN-SPAM

Securing Web Applications Made Simple and Scalable

Two men who ran a spam operation to promote pornographic websites had the book thrown at them today. A federal jury in Phoenix, Arizona convicted Jeffrey Kilbride, 41, of Venice, California and James Schaffer, 41 of Paradise Valley, Arizona of eight counts, including conspiracy, fraud, money laundering, and transportation of obscene materials.

In 2003, Kilbride and Schaffer set up a spamming operation to promote pornography sites. They earned $2m in commission from porn site operators for the traffic generated from the emails. Hard-core porn was embedded in each email, which meant that anyone who opened the email could see it.

Kilbride and Schaffer did not let the CAN-SPAM Act, which banned the distribution of multiple electronic commercial mail messages containing falsified header information, stand in their way.

When the law came into effect on Jan 1, 2004, they simply logged onto servers in Amsterdam, to make it seem like their email came from outside the US. Also, the 'from' names and email addresses were different from the 'reply to' addresses, so recipients could not identify the sender or reply to email.

In another violation of CAN-SPAM, the domain names used to send the spam were registered in the name of a "fictitious employee at a shell corporation Kilbride and Schaffer established in the Republic of Mauritius," the US Department of Justice said today.

To cap it all, the dastardly duo funneled their ill-gotten gains through the Republic of Mauritius and the Isle of Man to "further insulate themselves from detection by U.S. law enforcement".

In August, 2005 Kilbride and Schaffer were the first people charged under the CAN-SPAM Act. They face up to five years in jail for each spam and obscenity offense and a fine of up to $500,000 and up to 20 years for money laundering. They will be sentenced in September. Boy are they in trouble.

Three associates of Kilbride and Schaffer, who include housewife Jennifer Clason, 34, of Raymond, New Hampshire, have already pleaded guilty to breaching CAN-SPAM. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.