Skip to content
ADVERTISEMENT
Sign In
  • Sections
    • News
    • Advice
    • The Review
  • Topics
    • Data
    • Diversity, Equity, & Inclusion
    • Finance & Operations
    • International
    • Leadership & Governance
    • Teaching & Learning
    • Scholarship & Research
    • Student Success
    • Technology
    • Transitions
    • The Workplace
  • Magazine
    • Current Issue
    • Special Issues
    • Podcast: College Matters from The Chronicle
  • Newsletters
  • Events
    • Virtual Events
    • Chronicle On-The-Road
    • Professional Development
  • Ask Chron
  • Store
    • Featured Products
    • Reports
    • Data
    • Collections
    • Back Issues
  • Jobs
    • Find a Job
    • Post a Job
    • Professional Development
    • Career Resources
    • Virtual Career Fair
  • More
  • Sections
    • News
    • Advice
    • The Review
  • Topics
    • Data
    • Diversity, Equity, & Inclusion
    • Finance & Operations
    • International
    • Leadership & Governance
    • Teaching & Learning
    • Scholarship & Research
    • Student Success
    • Technology
    • Transitions
    • The Workplace
  • Magazine
    • Current Issue
    • Special Issues
    • Podcast: College Matters from The Chronicle
  • Newsletters
  • Events
    • Virtual Events
    • Chronicle On-The-Road
    • Professional Development
  • Ask Chron
  • Store
    • Featured Products
    • Reports
    • Data
    • Collections
    • Back Issues
  • Jobs
    • Find a Job
    • Post a Job
    • Professional Development
    • Career Resources
    • Virtual Career Fair
    Upcoming Events:
    An AI-Driven Work Force
    University Transformation
Sign In
Wired Campus circle logo

Wired Campus

The latest on tech and education.

Anonymous E-Mails Can Be Traced to Authors, Concordia U. Research Shows

By Ben Wieder March 10, 2011

That scourge of all in boxes, the anonymous e-mail, might have met its match.

Researchers at Concordia University in Montreal have developed a technique to determine the origins of anonymous e-mails by analyzing the sender’s writing style. The result is a unique “write-print” that’s like a fingerprint for prose, identifying an author through a collection of writing characteristics. The method isn’t intended to reveal the spam authors who clutter your in box, but to aid law-enforcement officials in investigating crimes involving e-mail.

To continue reading for FREE, please sign in.

Sign In

Or subscribe now to read with unlimited access for as low as $10/month.

Don’t have an account? Sign up now.

A free account provides you access to a limited number of free articles each month, plus newsletters, job postings, salary data, and exclusive store discounts.

Sign Up

That scourge of all in boxes, the anonymous e-mail, might have met its match.

Researchers at Concordia University in Montreal have developed a technique to determine the origins of anonymous e-mails by analyzing the sender’s writing style. The result is a unique “write-print” that’s like a fingerprint for prose, identifying an author through a collection of writing characteristics. The method isn’t intended to reveal the spam authors who clutter your in box, but to aid law-enforcement officials in investigating crimes involving e-mail.

“Some people like to write their e-mails in all lowercase; some people like to use lots of commas,” says Benjamin C. M. Fung, an assistant professor in information-systems engineering at Concordia, who helped develop the approach. It will be published in a forthcoming issue of Information Sciences.

ADVERTISEMENT

The Concordia researchers tested their technique on a trove of internal Enron e-mails, a byproduct of court cases against executives of the infamous energy company. The researchers achieved 80 percent to 90 percent reliability in determining the authorship of the more than 200,000 e-mails.

Currently, attempts to track down the authors of anonymous e-mails rely primarily on on an Internet-related identifier attached to a message, known as an IP address. It’s tied to a physical address where the server that first forwarded the message is located. But that physical address is often like a large apartment building. It could have multiple occupants who move around frequently, and so it can’t prove who actually wrote the e-mail.

This is no more reliable than using the self-reported address on a piece of mail, says David Brumley, an assistant professor in electrical and computer engineering at Carnegie Mellon University. He works with Carnegie Mellon’s CyLab, a cybersecurity research center.

Previously a computer security officer at Stanford University, Mr. Brumley says tracking down the authors of anonymous e-mails is extremely difficult.

“If the person is intelligent in what they do and plans it out, it usually leads to a dead end,” he says.

ADVERTISEMENT

The method developed by the researchers at Concordia uses data-mining techniques to search e-mails automatically for the characteristic’s of an author’s writing style.

The technique can be used to whittle down the pool of potential suspects identified by an IP-address search, Mr. Fung says, by comparing anonymous e-mails with other examples of their writing. Their latest research determines the profile of the sender, characteristics such as his or her gender, race, age, and language proficiency, among others. He says this is particularly useful in helping investigators focus their search in earlier stages of an investigation. It could also help determine whether phishing messages, which pose as official communication and try to solicit sensitive user information, are the product of one author or several.

Mr. Brumley says the Concordia approach, by focusing on the composition of anonymous messages rather than their point of origin, could be a huge improvement over existing techniques.

While the Concordia researchers aren’t the first to develop the idea of a write-print, the advantage of their technique is that its results can be broken down into a series of writing-style characteristics that justify the conclusion, says Mourad Debbabi, a professor and director of the Concordia Institute for Information Systems Engineering who worked with Mr. Fung.

Other techniques aren’t as transparent about how they identify the author of anonymous e-mails, and that presents problems in court, he says. “In a court you need to not only make a claim but also explain how you reached that conclusion.”

Future research by the Concordia team hopes to identify the authors of anonymous chat-room and text messages, Mr. Fung says, although these mediums present greater challenges because the messages are shorter and, thus, present less material from which to discern writing characteristics.

We welcome your thoughts and questions about this article. Please email the editors or submit a letter for publication.
Share
  • Twitter
  • LinkedIn
  • Facebook
  • Email
ADVERTISEMENT
ADVERTISEMENT

More News

Illustration showing the logos of Instragram, X, and TikTok being watch by a large digital eyeball
Race against the clock
Could New Social-Media Screening Create a Student-Visa Bottleneck?
Mangan-Censorship-0610.jpg
Academic Freedom
‘A Banner Year for Censorship’: More States Are Restricting Classroom Discussions on Race and Gender
On the day of his retirement party, Bob Morse poses for a portrait in the Washington, D.C., offices of U.S. News and World Report in June 2025. Morse led the magazine's influential and controversial college rankings efforts since its inception in 1988. Michael Theis, The Chronicle.
List Legacy
‘U.S. News’ Rankings Guru, Soon to Retire, Reflects on the Role He’s Played in Higher Ed
Black and white photo of the Morrill Hall building on the University of Minnesota campus with red covering one side.
Finance & operations
U. of Minnesota Tries to Soften the Blow of Tuition Hikes, Budget Cuts With Faculty Benefits

From The Review

A stack of coins falling over. Motion blur. Falling economy concept. Isolated on white.
The Review | Opinion
Will We Get a More Moderate Endowment Tax?
By Phillip Levine
Photo illustration of a classical column built of paper, with colored wires overtaking it like vines of ivy
The Review | Essay
The Latest Awful Ed-Tech Buzzword: “Learnings”
By Kit Nicholls
William F. Buckley, Jr.
The Review | Interview
William F. Buckley Jr. and the Origins of the Battle Against ‘Woke’
By Evan Goldstein

Upcoming Events

07-16-Advising-InsideTrack - forum assets v1_Plain.png
The Evolving Work of College Advising
Plain_Acuity_DurableSkills_VF.png
Why Employers Value ‘Durable’ Skills
Lead With Insight
  • Explore Content
    • Latest News
    • Newsletters
    • Letters
    • Free Reports and Guides
    • Professional Development
    • Events
    • Chronicle Store
    • Chronicle Intelligence
    • Jobs in Higher Education
    • Post a Job
  • Know The Chronicle
    • About Us
    • Vision, Mission, Values
    • DEI at The Chronicle
    • Write for Us
    • Work at The Chronicle
    • Our Reporting Process
    • Advertise With Us
    • Brand Studio
    • Accessibility Statement
  • Account and Access
    • Manage Your Account
    • Manage Newsletters
    • Individual Subscriptions
    • Group and Institutional Access
    • Subscription & Account FAQ
  • Get Support
    • Contact Us
    • Reprints & Permissions
    • User Agreement
    • Terms and Conditions
    • Privacy Policy
    • California Privacy Policy
    • Do Not Sell My Personal Information
1255 23rd Street, N.W. Washington, D.C. 20037
© 2025 The Chronicle of Higher Education
The Chronicle of Higher Education is academe’s most trusted resource for independent journalism, career development, and forward-looking intelligence. Our readers lead, teach, learn, and innovate with insights from The Chronicle.
Follow Us
  • twitter
  • instagram
  • youtube
  • facebook
  • linkedin