[Update: A week after the initial spam wave, Evans sent several additional waves advertising his LocatePC service (5th) as well as National Cyber Security Radio (6th, 9th, 10th, and 11th). Two are included at the bottom. The NCS Radio spam was sent each time as HTML and was over 500k, the copy below is text only (161k). Attempts to unsubscribe are met with "Too many connections" or "Invalid information".]
On December 29, 2011, Gregory Evans / Hi-Tech Crime Solutions sent out email to a long list of people. The list included people who signed up for his broken "amihackerproof.com" scanning service as well as hundreds of security professionals that never signed up for any of his services or had a business relationship with. This is one of many ways that the email campaign violated the Federal CAN-SPAM Act.
The email does not clearly state it is an advertisement, does not provide a mailing address for the company sending the email, and offers no method for removal from the mailing list. These are three distinct guidelines that Evans / Hi-Tech Crime Solutions violated in sending this email. Each mail he sent in violation of the CAN-SPAM Act is subject to penalties up to $16,000. If you received this message and wish to report it, visit the FTC Complaint Assistant Web Site.
From: no-reply[at]howtobecomeahackerin15minutes.com To: Date: Thu, 29 Dec 2011 18:22:25 -0500 Subject: Hacker Conference For Dummies "How to become a hacker in 15 minutes" View the web page for this email: http://www.howtobecomeahackerin15minutes.com/ In order to Catch a Hacker it takes a Hacker. Every 6 seconds a personal computer is hacked. In 2011 alone, we saw it happen to Nintendo, InfraGard, L-3 Communications, Google mail, PBS, Canada's Conservative Party, Citigroup, Lockheed Martin, NASA, Fox Broadcasting Company, LIGATT Security International, Sony, FBI, CIA and even the hit TV show, "The X Factor." According to the FBI 55% of computer crimes come from stolen computers. If multi-million and multi-billion dollar companies, who have thousands of employees working within their IT departments can get hacked, your home or small business network is next How to "Hi-Jack" a facebook or twitter account and what you can do to protect yourself. How to get anyone's IP Address to your network or computer. How to scan a network or computer looking for ways to hack into their computer. How to hack into a computer once you've completed your scan. How to install spyware on computers and how to detect them. How to install spyware on a cell phone and how to avoid it or detect cell phone spyware. How to avoid having your computer stolen. How to track down a cyberbully. How to track down a hacker. How to be invisible on the internet. How to hack a persons voicemail and how to protect your voicemail from being hacked. How to send untraceable emails and text messages. How to send an email and make it look like it came from someone else. Social Engineering. This is where you convince a person to give you their username and password. This Class Includes: The eBooks' for your iPhone, iPad or Android phone or tablet How To Become The Worlds No. 1 Hacker Laptop Security Short and Simple 48 Ways To Protect Your Personal Computer 3-month subscription for AmIHackerProof.com 3-month subscription to HTCS Suites 60-minute subscription to SPOOFEM.COM A copy of the class video, so you can remember everything you learned in class A free T-shirt Two Ways to Join: Live in person at Embassy Suites Atlanta - Buckhead 3285 Peachtree Road NE, Atlanta, GA 30305 Jan. 28, 2012 from 10:00 AM to 2:00 PM Via Skype if you are not in the Atlanta area
Return-Path: (firstname.lastname@example.org) X-Original-To: [redacted] Delivered-To: [redacted] Received: from mx2.gigahost.dk (unknown [126.96.36.199]) by mailstore1.gigahost.dk (Postfix) with ESMTP id 3F3DC2607E95 for (redacted); Thu, 5 Jan 2012 18:28:08 +0100 (CET) X-Greylist: delayed 526 seconds by postgrey-1.32 at mx2; Thu, 05 Jan 2012 17:28:07 UTC Received: from 50-57-106-81.static.cloud-ips.com (50-57-106-81.static.cloud-ips.com [188.8.131.52]) by mx2.gigahost.dk (Postfix) with ESMTP id BFEBD33831D1 for (redacted); Thu, 5 Jan 2012 17:28:07 +0000 (UTC) Received: by 50-57-106-81.static.cloud-ips.com (Postfix, from userid 1009) id DE620E38F1F; Thu, 5 Jan 2012 12:19:41 -0500 (EST) To: (redacted) Subject: LocatePC/MAC Features X-PHP-Originating-Script: 1009:class.phpmailer.php Date: Thu, 5 Jan 2012 12:19:41 -0500 From: email@example.com Reply-to: firstname.lastname@example.org Message-ID: (email@example.com) X-Priority: 3 X-Mailer: PHPMailer 5.1 (phpmailer.sourceforge.net) MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="b1_b64962c82450d2e38b44dc489c28f786" LOGIN Skip to content Home FAQ Products Purchase How does it work? Downloads Help Contact us Blog Sitemap LocatePC/Mac Features Geolocation - LocatePC/Mac uses the most efficient and successful way to get your lost or stolen computer back. Using the mobile tracker and apps for the iPad and iPhone, you do not have to depend on the law enforcement during the recovery process. Receive alerts each time your computer‚??s IP address changes. Video Snap Shot ‚?? If a person has a camera connected to their laptop, LocatePC/Mac will take snap shots every 30 seconds of the person and/or everything in the room. It will then add the pictures to the LocatePC/Mac Control Panel with a date and time stamp. Key Logging ‚?? The ability to record all the key strokes the thief types. For instance,if the thief logs in to their Facebook or Twitter account, you will have the ability to access their real name, username and password. Text Message ‚?? The ability to set your computer to text message your cell phone or email you every time the computers IP Address changes. Text to Screen ‚?? The ability to send a message to your computer screen that the thief can read. Shut Down ‚?? The ability to have the computer shut down every time the thief turns your computer on. File Recovery ‚?? Once LocatePC/Mac is installed on the computer, set up folders you want constant access to. If your computer is stolen you can delete those specified files or feel comfortable knowing your sensitive information is protected from the thief wiping the hard drive. Activity ‚?? LocatePC/Mac will check into the Monitoring Center allowing you to see the IP address and the map of where in the world your computer is located. Groups ‚?? If you have a large organization i.e. a corporation or university, you can set groups. Take a group of the laptops running LocatePC/Mac and assign them to a group or department such as sales, marketing, freshmen class or biology department. Inventory ‚?? Attempting to track all the desktops, laptops, iPhones and iPads; along with current operating systems, memory, hard drive space and even their location can be difficult to say the least. LocatePC/Mac takes complete inventory of each device anywhere in the world. Reports ‚?? Get PDF reports of Short Inventory, Detailed Inventory, Keylogger Reports, Image Reports, Police/Insurance Reports. Police/Insurance Report ‚?? If your computer is lost/stolen click 1 button and a detailed PDF report will be generated to send to the police or insurance company. Unlimited Monitoring ‚?? To monitor 1, 2 or 2000 computers, you do not need multiple accounts. Monitor unlimited accounts with 1 username and password. iPad/iPhone ‚?? Stolen or Lost?? Track your computer right from your iPhone or iPad for free. Beginning April 1, 2011, track your iPad and iPhone FREE! Upgrades ‚?? Unlimited FREE upgrades! Some company‚??s charge for software updates, not LocatePC/Mac. ‚??The U.S. Federal Trade Commission recommends using tracking devices like LocatePC/Mac which can help track down the location of a stolen laptop. We are excited about this product launch and know this product will benefit our customers.‚??