US porn spammers convicted

Posted by   Virus Bulletin on   Jun 26, 2007

Two found guilty of CAN-SPAM breaches.

A federal jury in Phoenix, Arizona, has found two men guilty of two charges of violating the US CAN-SPAM regulations, as well as other charges including fraud and money laundering.

The two men, Californian Jeffrey Kilbride and Arizona citizen James Shaffer, both 41, are thought to have started their spamming business, promoting porn sites, in 2003 and made as much as $2 million from the operation. When the CAN-SPAM laws came into effect in 2004, they started using servers based in Amsterdam, the Netherlands in an attempt to bypass the regulations, and also used companies set up in Mauritius and the Isle of Man to hide their financial traces.

Use of domain names registered with fraudulent information and spoofing email headers meant the men fell foul of the CAN-SPAM acts requirements for openness and traceability. After a three week trial the two have been found guilty on all counts, and at their sentencing in September could face up to five years jail time for each CAN-SPAM count and another 20 years for the money laundering charges.

'This is a significant step forward in the fight against spam,' said John Hawes, Technical Consultant at Virus Bulletin. 'These men tried to use the global nature of the internet to get around the local focus of spam laws, but have been brought to book and should hopefully face appropriate penalties for their crimes. This should send a strong message to other spammers that their behaviour will no longer be tolerated.'

Full details of the decision are in a release from the US Department of Justice, here.

Posted on 26 June 2007 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.