Skip to main content

New technique unmasks anonymous email senders

anonymous-emailResearchers at Concordia University have developed a reliable technique for revealing the identity of anonymous email senders, reports the Concordia Journal. In fact, the method is so reliable, it can be used to provide evidence in courts of law.

“In the past few years, we’ve seen an alarming increase in the number of cybercrimes involving anonymous emails,” the study’s co-author Benjamin Fung, a Concordia professor of Information Systems and Engineering, tells the Concordia Journal. “These emails can transmit threats or child pornography, facilitate communications between criminals or carry viruses.”

Related Videos

The technique was first developed based on the need of police departments to be able to identify who wrote a particular email sent from an IP address used by multiple people. Fung and his team aimed to develop a technique which was reliable enough that it could be used in official investigations.

So how does it work?

First, analysts must identify patterns in emails written by a particular subject, like the suspect in a police investigation, for example. They must then narrow down the patterns to those that are unique to the subject, and discard those patterns that are duplicated by other suspects.

These unique patterns have been dubbed a “write-print,” and are said to be as distinctive as a fingerprint, and are the key to identifying the exact author of a particular email.

“Let’s say the anonymous email contains typos or grammatical mistakes, or is written entirely in lowercase letters,” says Fung. “We use those special characteristics to create a write-print. Using this method, we can even determine with a high degree of accuracy who wrote a given email, and infer the gender, nationality and education level of the author.”

Fung and his team tested the technique on a batch of 100 emails taken from the roughly 200,000 emails written by 158 real-life Enron employees. The team used 10 emails for 10 different people, and were able to identify the correct email author with 80 to 90 percent accuracy.

Perhaps now would be a good time for the hacktivists at Anonymous to stop writing all those press releases. Just a thought.

Editors' Recommendations

A beginner’s guide to Tor: How to navigate the underground internet
A person using a laptop at a desk.

While the internet has dramatically expanded the ability to share knowledge, it has also made issues of privacy more complicated. Many people are justifiably worried about their personal information being stolen or viewed, including bank records, credit card info, and browser or login history.

If you're looking for more privacy while browsing, Tor is a good way to do that, as it is software that allows users to browse the web anonymously. It should be noted that Tor can be used to access illegal content on the dark web, and Digital Trends does not condone or encourage this behavior.
Why does Tor exist?
In this climate of data gathering and privacy concerns, the Tor browser has become the subject of discussion and notoriety. Like many underground phenomena on the internet, it is poorly understood and shrouded in the sort of technological mysticism that people often ascribe to things like hacking or Bitcoin.

Read more
How to run a free background check
A person's hands typing on a laptop placed on a black desk.

Whether it’s embarrassing Facebook photos or the complete criminal record of your sister’s new boyfriend, the internet is a treasure trove of background information. And while there are many fee-based services, it’s possible to learn quite a bit about someone from public records or through content found on online social networks.
While you could run a check on somebody else, perhaps you should scan your own background first. You’ll be able to check your credit report and insurance information for inaccuracies. You’ll also see what potential landlords, employers, or anyone else can find out about you if they decide to do a little detective work of their own.
Either way, here’s how to run a comprehensive background check without spending a dime.

Using search engines
The first place you should start is with a web search. Google can easily pull up a ton of information, assuming you know the person's name or any relevant information pertaining to him or her. The results can function as a starting point from which to branch out.

Read more
Best Antivirus Deals: Protect your PC or Mac from just $25
norton 360 deluxe with lifelock deal best buy december 2021 antivirus shutterstock stock image

The best antivirus deals offer you great protection for your devices in a nice and simple-to-use package. Right now, there are some great antivirus deals out there so we've narrowed things down to the highlights of the bunch. Read on while we guide you through the best options and explain why you should consider them.
Today's Best Antivirus Deals
NortonLifeLock 360 Deluxe -- $25, was $90

Why Buy

Read more