Identifying ‘Anonymous’ Email Authors

A team of researchers from Concordia University has developed an effective new technique to determine the authorship of anonymous emails.

Tests showed their method has a high level of accuracy — and unlike many other methods of ascertaining authorship, it can provide presentable evidence in courts of law. Findings on the new technique are published in the journal Digital Investigation.

“In the past few years, we’ve seen an alarming increase in the number of cybercrimes involving anonymous emails,” says study co-author Benjamin Fung, a professor of Information Systems Engineering at Concordia University and an expert in data mining — extracting useful, previously unknown knowledge from a large volume of raw data. “These emails can transmit threats or child pornography, facilitate communications between criminals or carry viruses.”

While police can often use the IP address to locate the house or apartment where an email originated, they may find many people at that address. They need a reliable, effective way to determine which of several suspects has written the emails under investigation. Continue reading…

Related Posts

Ubuntu Touch – SDK alpha and preview images released The Software Development Kit (SDK) and preview installation images for Ubuntu Touch have been released. Ubuntu Touch is the umbrella name for Ubuntu f...
Mainframe2, NVIDIA GRID and the future of streamed apps. Don’t leave Linux out Step in to a time machine and listen to what you and some of your future friends will be discussing. It will probably go like this: You: Dude, when...
Riak Cloud Storage released under Apache 2 license Riak Cloud Storage (Riak CS) is a storage software which can be used to build public or private Cloud storage systems. It is built atop Riak, a distri...
Technique Turns Computer Chip Defects Into an Advantage Physicists at Ohio State University have discovered that tiny defects inside a computer chip can be used to tune the properties of key atoms in the ch...
Containerize your Ruby on Rails/PostgreSQL application with RHSCL Docker images Editor: RHSCL is Red Hat Software Collections, a subscription-based suite of tools available to Red Hat's customers that make it possible to build and...
Your Web Surfing History Is Accessible Without Your Permission The Web surfing history saved in your Web browser can be accessed without your permission. JavaScript code deployed by real websites and online advert...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*