overview 
                         
                        industry 
                         
                        offers 
                         
                        attention  
                         
                        fraud  
                      statistics 
                      blacklists 
                         
                        EU cases  
                         
                        US cases 
                       
                         
                         
                         
                         
                         
                         
                         
                         
                         
                         
                         
                          
                        related  
                        Guides: 
                         
                        Governance 
                         
                        Information 
                        Economy  
                         
                        Security 
                        & Crime  
                         
                        Identity  
                        Crimes 
                         
                         
                         
                         
                         
                         
                         
                          
                        related  
                        Profiles: 
                      Spam 
                         
                        regulation in Australia 
                         
                        Email & 
                        Messaging  
                         
                        Do Not Call 
                        Registries  
                         
                        Wireless 
                        access  
                         
                        Forgery & 
                        Forensics 
                         
                        Surveillance 
                          
                         
                       | 
                            
                        address 
                        fraud 
                         
                        This page highlights fraudulent use of email addresses 
                        by spammers, potentially including your email 
                        address.  
                         
                        It covers - 
                      
                      It 
                        is supplemented by a note 
                        on the forgery of email addresses and a broader discussion 
                        of address fraud as an aspect of identity pollution. 
                         
                              
                        introduction 
                         
                        Much of the literature regarding regulation of spam centres 
                        on inconvenience to recipients of electronic junk mail: 
                        the exasperation, if not disgust, associated with maintaining 
                        filters and deleting the day's barrage of unwanted offers. 
                         
                        For some people, including the operators of this site, 
                        spam's real impact is fraudulent use by a spammer of someone 
                        else's email address. If that hijacking is sufficiently 
                        extensive it can result in blacklisting of the specific 
                        address or even the overall domain, given that automated 
                        blacklists do not differentiate 
                        between forged and legitimate email headers. Blacklisting 
                        can mean that an address is no longer usable, as legitimate 
                        mail from that address will be automatically excluded 
                        by many ISPs along with the spam sent under the forged 
                        header. 
                         
                        Some spammers, in making unauthorised use of someone else's 
                        email address, demonstrate a high degree of chutzpah. 
                         
                        One example is broadcastemailcorporation.org, which in 
                        purporting to send mail from one of our domains, disingenuously 
                        offers to 
                       
                        email 
                          advertise your web site to 8,000,000 people for free 
                           
                          this non-commercial offer is solely intended for non-commercial 
                          charities only. 
                           
                          this email offer is not a commercial service for sale/lease/trade. 
                       
                      Others 
                        display their ingenuity or ineptitude in the supposed 
                        names of authors: Doolittle C Acetone, Miranda BongoBongo, 
                        Increments M Fortnight, Seymour Acquaintance, Magisterial 
                        D Subdivision, Nightgowns J Rapidity, Insert Name, Iced 
                        M Prudishly, Obtained Q Brewery, Sweatlips Mcgraw, Misinterpretation 
                        R Calligraphy, Algonquain H Alleged, Layover G Cogency, 
                        Immaculate D Mermaid and so forth. 
                         
                              
                        responses 
                         
                        Responses to 'address fraud' vary considerably. 
                         
                        Some recipients assume that spam does indeed emanate from 
                        the supposed address. 
                         
                        Others, often more net savvy, recognise that an address 
                        may be forged or that 
                        email may come from a 'zombie' personal computer.  
                         
                        Most apparently rely on filtering provided by their ISPs 
                        (or the operator of their corporate network) or on personal 
                        filters (on a desktop or laptop machine) to exclude junk 
                        mail. The effect of that exclusion may be that a particular 
                        address is no longer usable, because major ISPs will restrict 
                        both legitimate messages and the illegitimate. 
                         
                        There have been few prosecutions for spam-related forgery 
                        of email addresses. That is partly because of the difficulty 
                        of identifying offenders and proving meaningful damage 
                        to a court's satisfaction. It is partly because of lack 
                        of support from government agencies, which understandably 
                        concentrate their resources on more heinous offences such 
                        as child pornography or terrorism.  
                         
                        Arguably it is also because victims feel powerless, lacking 
                        the skills to successfully chase someone who has appropriated 
                        their name or instead questioning whether the costs (in 
                        legal fees and time) outweigh the likely benefits of prosecution 
                        - particularly prosecution in another jurisdiction. 
                       
                        
                         
                         
                           
                          next page  
                        (spam statistics)  
                         
                         
                           | 
                      
                        
                       
                       |