Three spammers face obscenity and CAN-SPAM charges

Graphic porn emails sent to tens of millions


Three spammers were indicted in Phoenix last week for sending obscene spam in violation of US anti-spam regulations. The three were also charged with breaches of federal obscenity, money laundering and conspiracy laws.

According to the US Justice Department, Jennifer Clason, 32, Jeffrey Kilbride, 39 and James Schaffer, 39, have each been charged with one count of criminal conspiracy and two counts of fraud and related activity in connection with the sending of unsolicited email under the CAN-SPAM Act.

The CAN-SPAM Act, which came into force on 1st January 2004, established a framework of administrative, civil, and criminal tools to tackle unsolicited commercial email.

It provides for a national Do-Not-Spam list; requires that spam sent to consumers includes a means of opting-out of the mailing list used by the sender; bans the sending of fraudulent emails or unmarked sexually oriented emails, and provides for civil and criminal sanctions for those spammers who breach the rules.

The penalties may amount to fines of $6m and five years in prison in the most severe cases.

In this case, the Justice Department alleges that the spam was sent in ways that made it difficult for ISPs and recipients to identify or respond to the senders – either by sending the spam from Internet Protocol addresses registered in the Netherlands and domain names registered in Mauritius, falsifying the “From:” line in the emails, or installing the computers and equipment used in sending the emails in the Netherlands and remotely controlling them from the US.

In addition, according to the indictment, the spam sent by the defendants contained graphic pornographic images embedded in the emails, while some emails advertised porn sites to earn the defendants’ commission for directing internet traffic there.

The indictment therefore charges Kilbride and Schaffer with two counts of interstate transportation of obscene material using an interactive computer service and two counts of interstate transportation of obscene material for the purpose of sale or distribution.

The indictment also alleges that Kilbride and Schaffer created two overseas companies to hide their activities and used overseas bank accounts in Mauritius and the Isle of Man for the purpose of laundering and distributing the proceeds of the spamming operation.

Finally, Schaffer has been charged with one count of operating three pornographic internet websites without including statements describing the location of identification and other records for the performers portrayed in the websites, as is required by federal law.

According to the Justice Department, the defendants’ spamming operation resulted in more than 600,000 user complaints to America Online between 30th January and 9th June 2004. Estimates as to the actual number of users who received the unsolicited emails run in the tens of millions, it says.

The Department also reveals that the operation was listed as one of the 200 largest spaming operations in the world by Spamhaus, an international non-profit organisation which collects information and evidence on the worst spammers worldwide.

If convicted, Kilbride and Schaffer each face a maximum sentence of 20 years in prison on the money laundering charge, and five years in prison on the obscenity charges. All three defendants face a maximum sentence of five years in prison on each of the spamming and criminal conspiracy charges, while Schaffer also faces a maximum sentence of two years in prison on the improper pornographic record keeping charge.

A fourth defendant, Andrew Ellifson, 31, pleaded guilty in February to one count of spamming under the CAN-SPAM Act and one count of criminal conspiracy, marking the first federal conviction related to the transmission of obscene spam e-mails.

According to the indictment, Ellifson assisted in the creation, operation, and management of the computer network used to transmit the spam sent by the operation. He faces a maximum penalty of five years in prison for each of the spamming and criminal conspiracy offences.

“The internet is both a blessing and a curse,” said US Attorney Paul Charlton of the District of Arizona. “Unwanted email and pornography in our houses represents a kind of home invasion. Children are especially vulnerable to this kind of act and we will vigorously pursue those who put children at risk in this way.”

© Pinsent Masons 2000 - 2005


Other stories you might like

  • India extends deadline for compliance with infosec logging rules by 90 days
    Helpfully announced extension on deadline day

    India's Ministry of Electronics and Information Technology (MeitY) and the local Computer Emergency Response Team (CERT-In) have extended the deadline for compliance with the Cyber Security Directions introduced on April 28, which were due to take effect yesterday.

    The Directions require verbose logging of users' activities on VPNs and clouds, reporting of infosec incidents within six hours of detection - even for trivial things like unusual port scanning - exclusive use of Indian network time protocol servers, and many other burdensome requirements. The Directions were purported to improve the security of local organisations, and to give CERT-In information it could use to assess threats to India. Yet the Directions allowed incident reports to be sent by fax – good ol' fax – to CERT-In, which offered no evidence it operates or would build infrastructure capable of ingesting or analyzing the millions of incident reports it would be sent by compliant organizations.

    The Directions were roundly criticized by tech lobby groups that pointed out requirements such as compelling clouds to store logs of customers' activities was futile, since clouds don't log what goes on inside resources rented by their customers. VPN providers quit India and moved their servers offshore, citing the impossibility of storing user logs when their entire business model rests on not logging user activities. VPN operators going offshore means India's government is therefore less able to influence such outfits.

    Continue reading
  • Hangouts hangs up: Google chat app shuts this year
    How many messaging services does this web giant need? It's gotta be over 9,000

    Google is winding down its messaging app Hangouts before it officially shuts in November, the web giant announced on Monday.

    Users of the mobile app will see a pop-up asking them to move their conversations onto Google Chat, which is yet another one of its online services. It can be accessed via Gmail as well as its own standalone application. Next month, conversations in the web version of Hangouts will be ported over to Chat in Gmail. 

    Continue reading
  • OpenSSL 3.0.5 awaits release to fix potential worse-than-Heartbleed flaw
    Though severity up for debate, and limited chips affected, broken tests hold back previous patch from distribution

    The latest version of OpenSSL v3, a widely used open-source library for secure networking using the Transport Layer Security (TLS) protocol, contains a memory corruption vulnerability that imperils x64 systems with Intel's Advanced Vector Extensions 512 (AVX512).

    OpenSSL 3.0.4 was released on June 21 to address a command-injection vulnerability (CVE-2022-2068) that was not fully addressed with a previous patch (CVE-2022-1292).

    But this release itself needs further fixing. OpenSSL 3.0.4 "is susceptible to remote memory corruption which can be triggered trivially by an attacker," according to security researcher Guido Vranken. We're imagining two devices establishing a secure connection between themselves using OpenSSL and this flaw being exploited to run arbitrary malicious code on one of them.

    Continue reading
  • Not enough desks and parking spots, wobbly Wi-Fi: Welcome back to the office, Tesla staff
    Don't worry, the tweetings will continue until morale improves

    Employees at Tesla suffered spotty Wi-Fi and struggled to find desks and parking spots when they were returned to work at the office following orders from CEO Elon Musk.

    Most tech companies are either following a hybrid work model or are still operating fully remotely. Musk, however, wants his automaker's staff back at the office working for at least 40 hours a week. Those who fail to return risk losing their jobs, he warned in an internal email earlier this month.

    "Everyone at Tesla is required to spend a minimum of 40 hours in the office per week. Moreover, the office must be where your actual colleagues are located, not some remote pseudo office. If you don't show up, we will assume you have resigned," he wrote.

    Continue reading
  • LGBTQ+ folks warned of dating app extortion scams
    Uncle Sam tells of crooks exploiting Pride Month

    The FTC is warning members of the LGBTQ+ community about online extortion via dating apps such as Grindr and Feeld.

    According to the American watchdog, a common scam involves a fraudster posing as a potential romantic partner on one of the apps. The cybercriminal sends explicit of a stranger photos while posing as them, and asks for similar ones in return from the mark. If the victim sends photos, the extortionist demands a payment – usually in the form of gift cards – or threatens to share the photos on the chat to the victim's family members, friends, or employer.

    Such sextortion scams have been going on for years in one form or another, even attempting to hit Reg hacks, and has led to suicides.

    Continue reading
  • 5G C-band rollout at US airports slowed over radio altimeter safety fears
    Well, they did say from July, now they really mean from July 2023

    America's aviation watchdog has said the rollout of 5G C-band coverage near US airports won't fully start until next year, delaying some travelers' access to better cellular broadband at crowded terminals.

    Acting FAA Administrator Billy Nolen said in a statement this month that its discussions with wireless carriers "have identified a path that will continue to enable aviation and 5G C-band wireless to safely co-exist."

    5G C-band operates between 3.7-3.98GHz, near the 4.2-4.4GHz band used by radio altimeters that are jolly useful for landing planes in limited visibility. There is or was a fear that these cellular signals, such as from cell towers close to airports, could bleed into the frequencies used by aircraft and cause radio altimeters to display an incorrect reading. C-band technology, which promises faster mobile broadband, was supposed to roll out nationwide on Verizon, AT&T and T-Mobile US's networks, but some deployments have been paused near airports due to these concerns. 

    Continue reading

Biting the hand that feeds IT © 1998–2022