Spam Kings


Book Description

"People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings, an investigative look into the shady world of email spammers and the people trying to stop them. This compelling exposé explores the shadowy world of the people responsible for today’s junk-email epidemic. Investigative journalist Brian McWilliams delivers a fascinating account of the cat-and-mouse game played by spam entrepreneurs in search of easy fortunes and anti-spam activists. McWilliams chronicles the activities of several spam kings, including Hawke, a notorious Jewish-born neo-Nazi leader. You’ll follow this 20-year-old’s rise in the trade, where he became a major player in the lucrative penis pill market—a business that would make him a millionaire and the target of lawsuits. You’ll also meet cyber-vigilantes, such as Susan Gunn, who have taken up the fight against spammers like Hawke. Explore the sleazy spammer business practices, the surprising new partnership between spammers and computer hackers, and the rise of a new breed of computer viruses designed to turn the PCs of innocent bystanders into secret spam factories.




Spam Kings


Book Description

Looks at a variety of spam entrepreneurs and how anti-spam activists are trying to stop their activities.




Spam


Book Description

What spam is, how it works, and how it has shaped online communities and the Internet itself. The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms—spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.




Internet Freedom


Book Description

We rely on the media to give us information about internet freedom. But how do we know what are the real stories behind the news? Should people be allowed to do what they like on the Internet, or should there be laws to stop activities such as piracy and spamming? How would you decide?




Evolutionary Intelligence


Book Description

A surprising vision of how human intelligence will coevolve with digital technology and revolutionize how we think and behave. It is natural for us to fear artificial intelligence. But does Siri really want to kill us? Perhaps we are falling into the trap of projecting human traits onto the machines we might build. In Evolutionary Intelligence, Neuman offers a surprisingly positive vision in which computational intelligence compensates for the well-recognized limits of human judgment, improves decision making, and actually increases our agency. In artful, accessible, and adventurous prose, Neuman takes the reader on an exciting, fast-paced ride, all the while making a convincing case about a revolution in computationally augmented human intelligence. Neuman argues that, just as the wheel made us mobile and machines made us stronger, the migration of artificial intelligence from room-sized computers to laptops to our watches, smart glasses, and even smart contact lenses will transform day-to-day human decision making. If intelligence is the capacity to match means with ends, then augmented intelligence can offer the ability to adapt to changing environments as we face the ultimate challenge of long-term survival. Tapping into a global interest in technology’s potential impacts on society, economics, and culture, Evolutionary Intelligence demonstrates that our future depends on our ability to computationally compensate for the limitations of a human cognitive system that has only recently graduated from hunting and gathering.




The Language of Deception


Book Description

A penetrating look at the dark side of emerging AI technologies In The Language of Deception: Weaponizing Next Generation AI, artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes. In the book, you will explore multiple foundational concepts to include the history of social engineering and social robotics, the psychology of deception, considerations of machine sentience and consciousness, and the history of how technology has been weaponized in the past. From these foundations, the author examines topics related to the emerging risks of advanced AI technologies, to include: The use of Large Language Models (LLMs) for social manipulation, disinformation, psychological operations, deception and fraud The implementation of LLMs to construct fully autonomous social engineering systems for targeted attacks or for mass manipulation at scale The technical use of LLMs and the underlying transformer architecture for use in technical weapons systems to include advanced next-generation malware, physical robotics, and even autonomous munition systems Speculative future risks such as the alignment problem, disembodiment attacks, and flash wars. Perfect for tech enthusiasts, cybersecurity specialists, and AI and machine learning professionals, The Language of Deception is an insightful and timely take on an increasingly essential subject.




The dotCrime Manifesto


Book Description

Internet crime keeps getting worse...but it doesn’t have to be that way. In this book, Internet security pioneer Phillip Hallam-Baker shows how we can make the Internet far friendlier for honest people—and far less friendly to criminals. The dotCrime Manifesto begins with a revealing new look at the challenge of Internet crime—and a surprising look at today’s Internet criminals. You’ll discover why the Internet’s lack of accountability makes it so vulnerable, and how this can be fixed —technically, politically, and culturally. Hallam-Baker introduces tactical, short-term measures for countering phishing, botnets, spam, and other forms of Internet crime. Even more important, he presents a comprehensive plan for implementing accountability-driven security infrastructure: a plan that draws on tools that are already available, and rapidly emerging standards and products. The result: a safer Internet that doesn’t sacrifice what people value most: power, ubiquity, simplicity, flexibility, or privacy. Tactics and strategy: protecting Internet infrastructure from top to bottom Building more secure transport, messaging, identities, networks, platforms, and more Gaining safety without sacrificing the Internet’s unique power and value Making the Internet safer for honest people without sacrificing ubiquity, simplicity, or privacy Spam: draining the swamp, once and for all Why spam contributes to virtually every form of Internet crime—and what we can do about it Design for deployment: how to really make it happen Defining security objectives, architecture, strategy, and design—and evangelizing them




Internet Predators


Book Description

Provides an overview of issues related to criminal and antisocial activity that occurs online, including history, terminology, biographical information on important individuals, and a complete annotated bibliography.




The Internet Police: How Crime Went Online, and the Cops Followed


Book Description

Describes how authorities in Australia, Belgium, Ukraine, and the United States combined forces to respond to a child pornography ring as well as how other criminal sting operations have been policed and patrolled online.




Encyclopedia of Computer Science and Technology


Book Description

Presents an illustrated A-Z encyclopedia containing approximately 600 entries on computer and technology related topics.