Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Blogs
    • Security Watch

    DoJ Cans College Spammers

    Written by

    Matthew Hines
    Published May 1, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A federal grand jury indicted four men charged with running a $4 million spam campaign that specifically targeted college network users yesterday. The indictment marks the federal law enforcement agency’s latest success in finding and pursuing mass-mailers who violate the CAP-SPAM Act in doing business online.

      With cooperation from FBI investigators, three Americans and a Chinese national were charged with violating the Can-Spam Act through an enterprise that started in 2004 and spammed almost every secondary school in the U.S., DoJ press agents reported.

      Brothers Amir Ahmad Shah, 28, of St. Louis., and Osmaan Ahmad Shah, 25, of Columbia, Mo., who spearheaded the spam campaign via their company I2O, Inc. were the primary targets of the investigation, which also led to the indictment of their business partners, Liu Guang Ming, a citizen of China, and Paul Zucker, 55, of Wayne, N.J.,

      All four were charged in a 51-count indictment returned under seal by a federal grand jury in Kansas City, Mo., on April 23, 2009. That indictment was unsealed and made public Wednesday upon the suspects’ arrests and initial court appearances of Amir and Osmaan Shah.

      “Nearly every college and university in the United States was impacted by this scheme,” said Matt J. Whitworth, Acting United States Attorney for the Western District of Missouri, in a statement. “Illegal hacking and e-mail spamming wreaks havoc on computer networks. These schools spent significant funds to repair the damage and to implement costly preventive measures to defend themselves against future intrusions. We take computer crimes seriously and will aggressively prosecute those who violate the federal CAN-SPAM Act.”

      The indictment claims that the Shahs developed e-mail extracting programs used to illegally harvest more than 8 million student e-mail addresses from more than 2,000 colleges and universities. The suspects allegedly used their database of e-mail addresses to send targeted spam selling various products and services to the involved students via 31 different campaigns. Many of the attacks were launched using the computer network at the University of Missouri, where Osmaan Shah is a student, DoJ officials claim.

      Osmaan Shah reportedly used the campus’ wireless Internet service or connected directly to the network through an ethernet cable connection in a classroom or campus building to conduct their work. The DoJ also charges that the university’s network sustained damage from the huge amount of network resources and bandwidth used during the transmission of the millions of messages being generated through the attacks.

      The university also “expended a substantial amount of time, money and resources to respond to and repair problems caused by the spam e-mail campaigns and to protect and defend its network from future spam e-mail campaigns,” the investigators contend.

      Whitworth thanks the U of M for lending a hand in tracking the spammers.

      As part of the scheme, the two brothers and their partners used messages that suggested they had an association with the university or college that the student receiving the spam attended, making up fictitious names and claiming to be “campus representatives” from the college of the targets receiving the spam.

      They also falsely claimed that the businesses who manufactured or sold the products in the spam e-mail were “alumni-owned” organizations. The group made their money by garnering referral fees for selling the products advertised in their messages, or by buying products themselves and selling them.

      Among the goods offered in the messages were digital cameras, MP3 players, magazine subscriptions, spring break travel offers, pepper spray and teeth whiteners.

      There were also other unnamed partners involved in the business, who are specifically credited with creating the e-mail harvesting tool, which reportedly falsified e-mail header information to avoid spam filters by rotating subject lines, reply addresses, message content and URLs, and other information in the headers and e-mails themselves. The schemers also launched “dozens” of identical Web sites for each campaign to further avoid detection, DoJ charges.

      According to the indictment, the spammers first used hosting services based in China, which is how Ming became involved in the effort. The partner also helped maintain the many Web sites, and used the Shahs to market spam hosting services to others, including Zucker, the indictment claims. After learning that investigators were on their trail, the group moved to other hosts, said DoJ.

      The Shahs are charged each with five counts of computer hacking related to the use of e-mail harvesting programs, with each of the defendants also charged with one count of aiding and abetting each other to unlawfully use the University of Missouri computer network to send spam e-mail.

      All of the defendants are charged in each of nine counts of aiding and abetting each other to access a protected computer without authorization and transmit multiple commercial e-mails, and all of the defendants are charged in each of nine counts of aiding and abetting each other to materially falsify header information in multiple commercial e-mails.

      The Shahs and I2O are also charged in each of 26 counts of aiding and abetting each other to access a protected computer without authorization and transmit multiple commercial e-mails with the intent to deceive or mislead the recipients, and the indictment also contains a forfeiture allegation requiring the defendants to forfeit $4,191,966 including their houses and cars.

      Lesson of the story? You can cook up plenty of spam, but you better be ready to fry when you get caught.

      (Correction – This piece originally implied that the indicted parties had ripped of end users, when in fact they’ve been charged with violating CAN-SPAM in selling products they actually supplied. Apologies.)

      Matt Hines has been following the IT industry for over a decade as a reporter and blogger, and has been specifically focused on the security space since 2003, including a previous stint writing for eWeek and contributing to the Security Watch blog. Hines is currently employed as marketing communications manager at Core Security Technologies, a Boston-based maker of security testing software. The views expressed herein do not necessarily represent the views of Core Security, and neither the company, nor its products and services will be actively discussed in the blog. Please send news, research or tips to [email protected].

      Matthew Hines
      Matthew Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×