Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic.

Mail forwarding: is a service that allows you to have your mail sent to a “mailbox” and then they will forward it off to your location. This mail is generally sent in bulk to the recipient and is very useful if you travel, or don’t have a permanent address.

Mail Redirection: is when you have mail sent direct to a mailbox and then it is “remailed” to another location. This is mainly used by organisations or individuals who wish to keep their physical address a secret.

Remailing: is as simple as receiving a letter, re-stamping and addressing the letter then posting it again. This is pretty much what happens when mail is forwarded or redirected.

First of all when you think about tampering with mail such as remailing, forwarding etc. you think “dodgy” or is that legal? Quite simply yes, it is legal but it all depends on what the intent of the service is. I will explain why people need to have a fake mail address.

Mail Drop: is defined as “an address or place at which a nonresident person receives mail, often of a secret nature” (2005) Dictionary.com

So why are there so many names for the same services?

It is pretty simple to understand why there are so many names and that is because the vendors that offer these services are trying to obtain as many hits through search engines as possible, they use phrases such as “forwarding” “redirection” etc.

In doing this they can confuse the customer and they will not have a clear understanding of the services that are available.

What service should I use then?

Mail drops are generally the most defined term and are understandably the most common. I define Mail Drops as a mailbox that has been purchased on your behalf and all mail within the mailbox is sent to your predefined recipient address. Most Vendors provide shared mail boxes, where you share a box with many users for a cheap price, or dedicated services where you actually rent the whole mailbox. You should look at how manageable your account is, can you have multiple predefined recipient addresses, and can you see what mail you have and how much mail you have in the box at any time.

Why would people even use such a service?

Anonymity is the simple answer, or people who choose to keep their identity secret from others. There are many reasons for doing this, the most legitimate reason for using such services is for people who move around and do not have one stagnant address. Although the services are set up by legitimate vendors, there are the customers who wish to evade the law and have private documents sent without detection. These customers can harm or damage the vendor’s reputation and if any prohibited material is detected they can often face heavy charges.

There are many vendors out there who provide this service, I am not going to recommend any particular vendor but I do advise that you shop around and take a look at their history and talk to other customers who have used their services. All the vendors are located in multiple countries; you should take a look at their country of origin, what privacy laws are enforced there, what is their law enforcement like? Then take a look at the site. Read their privacy statement, try to understand it. Make sure you fully understand their terms of service. You do not want to be stuck with a huge fine, or if you’re trying to keep yourself anonymous, you don’t want to have your private information public. Or worst of all have them read your private mail!

Good luck

Steve
©Private Mail Services
http://www.private-services.com 2005 - Keeping You Anonymous

In The News:


Reuters

Exclusive: U.S. Homeland Security found SEC had 'critical' cyber ...
Reuters
WASHINGTON (Reuters) - The U.S. Department of Homeland Security detected five “critical” cyber security weaknesses on the Securities and Exchange ...
Homeland Security Found SEC Had Critical Cybersecurity Flaws As Far Back As JanuaryFortune

all 2 news articles »

CoinDesk

Zcash Audit Finds No Serious Issues in Launch Ceremony Security
CoinDesk
No small feat, the proceedings would determine not only the viability and security of the entire network, but require the coordination of six participants in six locations around the world – all of whom needed to be in direct contact to ensure a ...


Reuters

Olympics: France to skip 2018 Winter Games if security risk too great
Reuters
PARIS (Reuters) - France's Winter Olympics team will not travel to the 2018 Games in South Korea if its security cannot be guaranteed, French Sports Minister Laura Flessel said on Thursday, raising the first major doubts by a participating country over ...

and more »

NPR

Equifax Confirms Another 'Security Incident'
NPR
After the revelation that a cybersecurity breach at the international credit reporting agency Equifax exposed personal information of 143 million people, the company has confirmed an additional security incident with a payroll-related service in the ...
Equifax acknowledges a second security 'incident' happened in MarchCNBC
Equifax Execs Resign; Security Head, Mauldin, Was Music MajorNBCNews.com
Equifax security and information executives are stepping downTechCrunch
CNNMoney -Bloomberg -Engadget -Bloomberg
all 1,839 news articles »

FTC lawsuit over D-Link's lax router security just took a big hit
Engadget
In January, the Federal Trade Commission (FTC) took D-Link to court over its incredibly insufficient security. The FTC claimed that the company failed to protect its routers and IP cameras from unauthorized access, exposing them to use in botnet ...

and more »

Fox News

Billy Joel concert will boost security in Busch Stadium
Fox News
Busch Stadium officials say they do have security plans in place to handle various situations that could arise. Specifics are not being made public. Officials say they have been in frequent communication with law enforcement and they are taking every ...

and more »

CNET

CNET asks: How has the Equifax security breach affected you?
CNET
In today's world, security compromises are as common as the common cold. Most security breaches involve the theft of email addresses, passwords and credit card numbers. And while these compromises can wreak havoc on victims, the massive security ...

and more »

Fox News

UC system to shell out $300G to help with security costs for controversial speakers
Fox News
In an unprecedented step, the University of California system is preparing to give at least $300,000 to help UC Berkeley pay the security costs for right-leaning controversial speakers during the campus' “Free Speech Week,” with the system's president ...
UC President to Pay Half of Security Costs for Shapiro, YiannopoulosInside Higher Ed
UC system will chip in at least $300000 to help Berkeley pay security costs for controversial speakersLos Angeles Times

all 60 news articles »

The Diplomat

How Can Europe Contribute to Northeast Asia's Security?
The Diplomat
However, the EU is glaringly absent from discussions regarding regional security and how to deal with North Korea's missile and nuclear threats. The EU possesses various soft security assets that could make a distinctive contribution to regional ...

and more »

Investor's Business Daily

What Nest's Push Into Security Products Means For Alarm.com
Investor's Business Daily
Alphabet (GOOGL)-owned Nest's push into home security products and services shouldn't worry investors in Alarm.com (ALRM), says one Wall Street analyst. Nest on Wednesday rolled out Nest Secure, a do-it-yourself $499 system. It includes a hub/motion ...
Nest jumps into home security with Nest SecureTechHive
Google's Nest plays catch up with new security productsThe INQUIRER

all 29 news articles »
Google News

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More