Fighting Fire With FireFighting Fire With Fire
Everyone has a spam revenge fantasy. What's yours?
August 24, 2006
5:15 PM -- Okay, 'fess up: Aren't you the tiniest bit curious about the human behind that automated spam message?
Not the obvious spam riddled with typos, but the one that somehow appears legit enough to evade your spam filter and nearly trick you into opening it when you're slogging through your inbox in the wee hours of the morning, before the caffeine kicks in.
Assuming you got past the bot-controlled machine to a real human on the other end of the "pitch," what would you do if you actually made contact with the human behind the smelly spam? Play along? Say, "You're punk'd?" Cuss him/her out?
Researchers at the University of Illinois at Chicago's Artificial Intelligence Laboratory recently turned the tables on spammers. (See Fighting Spam With Spamalot .) Before they built their Spamalot toolkit -- which engages spammers with intelligent agents that pose as victims and interact as much as possible with the human behind the spam -- they communicated with spammers themselves, by email and phone. They got 25 return phone calls from mortgage brokers after following one spam link to a mortgage refinance Website.
The goal of the experiment, and ultimately, Spamalot, is to weaken the spammers by tying them up with a fake victim's correspondence, or to gather enough information to nail a phisher.
Sounds cool. Revenge can be sweet. But is scamming the spammers to derail or identify them worth the risk?
Share your spam turnabout fantasy with us. And please, not by email or spam, but by posting to our message board using the "Discuss" button a few lines down.
No agents will call. — Kelly Jackson Higgins, Senior Editor, Dark Reading
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
2021 Banking and Financial Services Industry Cyber Threat Landscape Report
5 Reasons To Move your PKI Deployment to the Cloud