Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic.

Mail forwarding: is a service that allows you to have your mail sent to a “mailbox” and then they will forward it off to your location. This mail is generally sent in bulk to the recipient and is very useful if you travel, or don’t have a permanent address.

Mail Redirection: is when you have mail sent direct to a mailbox and then it is “remailed” to another location. This is mainly used by organisations or individuals who wish to keep their physical address a secret.

Remailing: is as simple as receiving a letter, re-stamping and addressing the letter then posting it again. This is pretty much what happens when mail is forwarded or redirected.

First of all when you think about tampering with mail such as remailing, forwarding etc. you think “dodgy” or is that legal? Quite simply yes, it is legal but it all depends on what the intent of the service is. I will explain why people need to have a fake mail address.

Mail Drop: is defined as “an address or place at which a nonresident person receives mail, often of a secret nature” (2005) Dictionary.com

So why are there so many names for the same services?

It is pretty simple to understand why there are so many names and that is because the vendors that offer these services are trying to obtain as many hits through search engines as possible, they use phrases such as “forwarding” “redirection” etc.

In doing this they can confuse the customer and they will not have a clear understanding of the services that are available.

What service should I use then?

Mail drops are generally the most defined term and are understandably the most common. I define Mail Drops as a mailbox that has been purchased on your behalf and all mail within the mailbox is sent to your predefined recipient address. Most Vendors provide shared mail boxes, where you share a box with many users for a cheap price, or dedicated services where you actually rent the whole mailbox. You should look at how manageable your account is, can you have multiple predefined recipient addresses, and can you see what mail you have and how much mail you have in the box at any time.

Why would people even use such a service?

Anonymity is the simple answer, or people who choose to keep their identity secret from others. There are many reasons for doing this, the most legitimate reason for using such services is for people who move around and do not have one stagnant address. Although the services are set up by legitimate vendors, there are the customers who wish to evade the law and have private documents sent without detection. These customers can harm or damage the vendor’s reputation and if any prohibited material is detected they can often face heavy charges.

There are many vendors out there who provide this service, I am not going to recommend any particular vendor but I do advise that you shop around and take a look at their history and talk to other customers who have used their services. All the vendors are located in multiple countries; you should take a look at their country of origin, what privacy laws are enforced there, what is their law enforcement like? Then take a look at the site. Read their privacy statement, try to understand it. Make sure you fully understand their terms of service. You do not want to be stuck with a huge fine, or if you’re trying to keep yourself anonymous, you don’t want to have your private information public. Or worst of all have them read your private mail!

Good luck

Steve
©Private Mail Services
http://www.private-services.com 2005 - Keeping You Anonymous

In The News:


Kitsap Sun

OC launches investigation of security director
Kitsap Sun
BREMERTON — Olympic College has launched an investigation of complaints against its director of campus safety in light of a vote of no confidence by the union representing security guards. The vote, taken in mid-January, showed 88 percent of members ...


The Sun

Security services knew of glaring weakness in Parliament security after 'war game' simulating attack on Westminster ...
The Sun
SECURITY services were aware of gaps in Parliament's security after a simulated attack ended with most MPs being killed, it has been claimed. A source quoted by the Sunday Times claimed a “table-top” exercise revealed four terrorists with automatic ...
Security chief told MPs they were safe in parliament before attackThe Guardian
Urgent review of security gates of Parliament needed after Westminster attackExpress.co.uk

all 56 news articles »

The Independent

Security breach renders in-flight laptop ban useless
The Independent
The airport which is the main target of the Government's ban on electronic devices has a security flaw that renders rigorous checks futile, The Independent can reveal. After clearing six separate security hurdles at Istanbul airport, passengers bound ...

and more »

Rochester Democrat and Chronicle

JCC receives $200000 to improve security
Rochester Democrat and Chronicle
The Jewish Community Center of Rochester will receive $200,000 to upgrade security measures at the Brighton facility. The news was announced Sunday morning, just two weeks after the JCC was evacuated following a bomb threat to the facility, the second ...
JCC of Rochester gets $200000 for security enhancementsWXXI News

all 4 news articles »

The Japan Times

European security ties 'too precious' for Brexit talks
The Japan Times
LONDON – Britain's intelligence expertise may be “too precious” to use as a bargaining tool in the upcoming Brexit talks, experts said, after a terror attack in London highlighted the need for continued European security cooperation. The suggestion ...

and more »

New System Estimates Cleveland Airport Security Wait Times
U.S. News & World Report
New System Estimates Cleveland Airport Security Wait Times. Cleveland's main airport is developing a system to help travelers more accurately compare wait times at its security checkpoints and better plan their trips. | March 27, 2017, at 12:08 a.m.. MORE.

and more »

Reuters

Britain reviewing security at parliament after deadly attack
Reuters
Interior minister Amber Rudd told the BBC there would be another review of security at the Palace of Westminster, but that such arrangements were continually assessed. "There are constant reviews and updates so that we have the right form of defense in ...
London attack fuels calls for tighter Westminster securityThe Guardian
London attack: Parliament security under reviewBBC News
Questions over Parliament security as motorcyclist rides through gate shortly after terrorist attackTelegraph.co.uk
Wall Street Journal (subscription)
all 8,313 news articles »

Huffington Post

What Don't We Talk About When We Talk About Israel's Security
Huffington Post
When Israeli and American Jews talk about “Israel's security” they are thinking about the Holocaust and about extermination. That is the reason they choose the narrowest possible definition of “security,” a strip. Israel's “security” is what we ...

and more »

Otago Daily Times

Ivory Coast rescinds port security measures, attack threat unfounded
Reuters
"After compiling the information ... it emerged that the threat is not real," the head of maritime security Colonel Bertin Koffi Tano wrote in a second order to the Abidjan and San Pedro port authorities and shipping companies on Sunday. "I ask that ...
Ivory Coast boosts port security over attack threatOtago Daily Times

all 5 news articles »

The Sun

Security alert at Ant and Dec's Saturday Night Takeaway as police called amid claims four men broke into the studio
The Sun
An ITV spokesman said: “A youth who attempted to gain access to the London Television Centre, as a prank, at 11pm last night was quickly apprehended by our security team when he triggered an alarm as he climbed an external wall. “He did not gain access ...
Ant and Dec at centre of security alert after four men tried to 'break into' Saturday Night Takeaway studioMirror.co.uk

all 38 news articles »
Google News

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More