<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Why We Should Scam the Scammers</title>
	<atom:link href="http://habitablezone.com/2012/08/05/why-we-should-scam-the-scammers/feed/" rel="self" type="application/rss+xml" />
	<link>https://habitablezone.com/2012/08/05/why-we-should-scam-the-scammers/</link>
	<description></description>
	<lastBuildDate>Sun, 05 Apr 2026 21:05:37 -0700</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.1</generator>
	<item>
		<title>By: Jody</title>
		<link>https://habitablezone.com/2012/08/05/why-we-should-scam-the-scammers/#comment-17071</link>
		<dc:creator>Jody</dc:creator>
		<pubDate>Mon, 06 Aug 2012 03:31:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.habitablezone.com/?p=19495#comment-17071</guid>
		<description>Wow Robert! Badass!!!!!!!!!That is so something I would do if I had the know how.!!!</description>
		<content:encoded><![CDATA[<p>Wow Robert! Badass!!!!!!!!!That is so something I would do if I had the know how.!!!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ainz</title>
		<link>https://habitablezone.com/2012/08/05/why-we-should-scam-the-scammers/#comment-17058</link>
		<dc:creator>Ainz</dc:creator>
		<pubDate>Sun, 05 Aug 2012 20:55:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.habitablezone.com/?p=19495#comment-17058</guid>
		<description>It would sort of be like a cyber version of the TV series &#039;Leverage&#039;. 

It&#039;s fun to think of everyone here working on a common goal. That&#039;s not smarmy, I think it&#039;s cool as hell!

Exempting yours truly, Lord knows the brain power is here. And talent.

You recounted the Rooster T Cockburn story about 4 years ago.</description>
		<content:encoded><![CDATA[<p>It would sort of be like a cyber version of the TV series &#8216;Leverage&#8217;. </p>
<p>It&#8217;s fun to think of everyone here working on a common goal. That&#8217;s not smarmy, I think it&#8217;s cool as hell!</p>
<p>Exempting yours truly, Lord knows the brain power is here. And talent.</p>
<p>You recounted the Rooster T Cockburn story about 4 years ago.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: FrankC</title>
		<link>https://habitablezone.com/2012/08/05/why-we-should-scam-the-scammers/#comment-17055</link>
		<dc:creator>FrankC</dc:creator>
		<pubDate>Sun, 05 Aug 2012 20:38:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.habitablezone.com/?p=19495#comment-17055</guid>
		<description>Unfortunately, many, many people are just not smart and they are greedy.

My brother/inlaw got a nigerian a few years ago and I warned him in detail about the scam. In spite of this he felt compelled to explore the offer. It never cost him any money but it wound up making him feel stupid and he still deals with constant harassment from emails and calls from scammers.</description>
		<content:encoded><![CDATA[<p>Unfortunately, many, many people are just not smart and they are greedy.</p>
<p>My brother/inlaw got a nigerian a few years ago and I warned him in detail about the scam. In spite of this he felt compelled to explore the offer. It never cost him any money but it wound up making him feel stupid and he still deals with constant harassment from emails and calls from scammers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Robert</title>
		<link>https://habitablezone.com/2012/08/05/why-we-should-scam-the-scammers/#comment-17047</link>
		<dc:creator>Robert</dc:creator>
		<pubDate>Sun, 05 Aug 2012 19:00:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.habitablezone.com/?p=19495#comment-17047</guid>
		<description>And a lifelong eccentric now going senile, a juicy target for any scammer. I also played Arnold Hamenegger, the hard-boiled corporate security chief with the shadowy CIA contacts. 

First, Rooster responded to a Nigerian scam email, from &quot;Jon Kabila&quot;, sounding a bit confused and querulous. In the course of a couple of tentative email exchanges, Rooster establishes that he&#039;s wealthy and well-connected (names dropped included his nephew &quot;W&quot;, a &quot;high government official&quot;). When things got serious, Hamenegger enters, and develops a plan to fly the corporate jet to Lagos, Nigeria by way of Baghdad (cover story is checking on reconstruction contracts, emergency landing on the return), drop off the million bucks in &quot;expenses&quot;, and pick up the treasure chest of gold.

I created a Web site for &quot;Petrocock Industries&quot;, complete with a private work area for projects like this. I gave the scammer &quot;Jon&quot; an account, and he went there to pick up documents like the PDF plan for the trip, and other props like a map.

The map was particularly mean on my part. I knew that Jon was often using an expensive satellite connection, and I created this &lt;i&gt;huge&lt;/i&gt; map, hundreds of megabytes, just an ordinary map graphic enlarged 10X. I think I cost him some real bucks on that one.

Near the end, I added a new character, an up-and-coming Nigerian kid trying to horn in on the deal. I had him contact Jon on the sly, and those two were starting to develop a mentoring relationship, with Jon critiquing his work. 

The endgame came when Jon logged in to the Petrocock site, to find a warning notice from Hamenegger to the other members of the project team that he&#039;d just discovered that &quot;Jon&quot; was a scammer, and he was working with his contacts at Interpol to bust him. He said he&#039;d cancelled Jon&#039;s account on the site, so Jon was led to believe he&#039;d gotten in to see this message by mistake...and that there was still time to save his neck.

My last contact with Jon was an email to the interloping kid, saying he was leaving the country (I&#039;d established he really was in Nigeria, and narrowed it down to one cybercafe), and didn&#039;t know when he&#039;d be back in touch.

The postscript is that a few months later, I read a news story about Interpol busting a Nigerian scammer hiding out in Ireland. The story was sketchy, but the few details suggested that this was indeed my &quot;Jon Kabila&quot;, and that I&#039;d panicked him to the extent of fleeing to Ireland with his wife and kids.

He he he.</description>
		<content:encoded><![CDATA[<p>And a lifelong eccentric now going senile, a juicy target for any scammer. I also played Arnold Hamenegger, the hard-boiled corporate security chief with the shadowy CIA contacts. </p>
<p>First, Rooster responded to a Nigerian scam email, from &#8220;Jon Kabila&#8221;, sounding a bit confused and querulous. In the course of a couple of tentative email exchanges, Rooster establishes that he&#8217;s wealthy and well-connected (names dropped included his nephew &#8220;W&#8221;, a &#8220;high government official&#8221;). When things got serious, Hamenegger enters, and develops a plan to fly the corporate jet to Lagos, Nigeria by way of Baghdad (cover story is checking on reconstruction contracts, emergency landing on the return), drop off the million bucks in &#8220;expenses&#8221;, and pick up the treasure chest of gold.</p>
<p>I created a Web site for &#8220;Petrocock Industries&#8221;, complete with a private work area for projects like this. I gave the scammer &#8220;Jon&#8221; an account, and he went there to pick up documents like the PDF plan for the trip, and other props like a map.</p>
<p>The map was particularly mean on my part. I knew that Jon was often using an expensive satellite connection, and I created this <i>huge</i> map, hundreds of megabytes, just an ordinary map graphic enlarged 10X. I think I cost him some real bucks on that one.</p>
<p>Near the end, I added a new character, an up-and-coming Nigerian kid trying to horn in on the deal. I had him contact Jon on the sly, and those two were starting to develop a mentoring relationship, with Jon critiquing his work. </p>
<p>The endgame came when Jon logged in to the Petrocock site, to find a warning notice from Hamenegger to the other members of the project team that he&#8217;d just discovered that &#8220;Jon&#8221; was a scammer, and he was working with his contacts at Interpol to bust him. He said he&#8217;d cancelled Jon&#8217;s account on the site, so Jon was led to believe he&#8217;d gotten in to see this message by mistake&#8230;and that there was still time to save his neck.</p>
<p>My last contact with Jon was an email to the interloping kid, saying he was leaving the country (I&#8217;d established he really was in Nigeria, and narrowed it down to one cybercafe), and didn&#8217;t know when he&#8217;d be back in touch.</p>
<p>The postscript is that a few months later, I read a news story about Interpol busting a Nigerian scammer hiding out in Ireland. The story was sketchy, but the few details suggested that this was indeed my &#8220;Jon Kabila&#8221;, and that I&#8217;d panicked him to the extent of fleeing to Ireland with his wife and kids.</p>
<p>He he he.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jody</title>
		<link>https://habitablezone.com/2012/08/05/why-we-should-scam-the-scammers/#comment-17046</link>
		<dc:creator>Jody</dc:creator>
		<pubDate>Sun, 05 Aug 2012 18:24:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.habitablezone.com/?p=19495#comment-17046</guid>
		<description>Okay...I&#039;ll bite...what *did* you do ten years ago with your adventures in Nigeria?</description>
		<content:encoded><![CDATA[<p>Okay&#8230;I&#8217;ll bite&#8230;what *did* you do ten years ago with your adventures in Nigeria?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Robert</title>
		<link>https://habitablezone.com/2012/08/05/why-we-should-scam-the-scammers/#comment-17044</link>
		<dc:creator>Robert</dc:creator>
		<pubDate>Sun, 05 Aug 2012 18:11:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.habitablezone.com/?p=19495#comment-17044</guid>
		<description>I&#039;m kind of blown away that you remember my adventures in Nigeria. That was almost ten years ago!

Did you read the comments? There was a self-referential irony: Quite a few people were so clueless they thought the solution was simply to block email from Nigeria...and one guy who billed himself as head of an anti-fraud group sounded more like an agitator egging them on. Maybe a scammer himself?

Anyway, got me to thinking about doing it again. And maybe this time more focused on developing, eventually, an automated (Eliza-grade &quot;AI&quot;) honey pot for pinning down AFF scammers (&quot;honey pot&quot;: see Winnie the Pooh).

My approach then was to continually send false identity clues, both explicit in the email, and contextual, like the &quot;victim&#039;s&quot; own Web site and a random real estate listing establishing residence. Veracity and plausibility are everything in that game.

These scammers are uniquely vulnerable to this kind of thing, because, as the article points out, they &lt;i&gt;don&#039;t&lt;/i&gt; try that hard, and expect their victims to be stupid. Once you get inside their filter, you&#039;re &quot;proven&quot; stupid and they&#039;re not on guard as much. Scammers project weak false identity signals and can be snowed by strong false identity information.

One scammer is about all one person can handle in a mano-a-mano duel. To pin down a lot of scammers will require a team effort. You&#039;d probably want each conversation carried on by one individual for consistency, conversations distributed among the team; and everybody provides support in building up backstories and creating &quot;pocket lint&quot;.

Over time you&#039;d build a library of that material, including the conversations themselves, which can be mined for trigger keywords paired with standard responses. That&#039;s necessary to achieve the WSJ&#039;s goal of an automated honey pot system. I don&#039;t see how you could start out cold designing such a thing from scratch. Better to observe reality and build automated assists over time (&quot;press F6 to request a photo holding a sign&quot;).

That&#039;d be fun, wouldn&#039;t it? Sounds like the sort of thing that might appeal to Zoners, especially at a time when the alternative is arid partisan politics. We already have the facility for the first part, it&#039;d be a matter of getting organized.</description>
		<content:encoded><![CDATA[<p>I&#8217;m kind of blown away that you remember my adventures in Nigeria. That was almost ten years ago!</p>
<p>Did you read the comments? There was a self-referential irony: Quite a few people were so clueless they thought the solution was simply to block email from Nigeria&#8230;and one guy who billed himself as head of an anti-fraud group sounded more like an agitator egging them on. Maybe a scammer himself?</p>
<p>Anyway, got me to thinking about doing it again. And maybe this time more focused on developing, eventually, an automated (Eliza-grade &#8220;AI&#8221;) honey pot for pinning down AFF scammers (&#8220;honey pot&#8221;: see Winnie the Pooh).</p>
<p>My approach then was to continually send false identity clues, both explicit in the email, and contextual, like the &#8220;victim&#8217;s&#8221; own Web site and a random real estate listing establishing residence. Veracity and plausibility are everything in that game.</p>
<p>These scammers are uniquely vulnerable to this kind of thing, because, as the article points out, they <i>don&#8217;t</i> try that hard, and expect their victims to be stupid. Once you get inside their filter, you&#8217;re &#8220;proven&#8221; stupid and they&#8217;re not on guard as much. Scammers project weak false identity signals and can be snowed by strong false identity information.</p>
<p>One scammer is about all one person can handle in a mano-a-mano duel. To pin down a lot of scammers will require a team effort. You&#8217;d probably want each conversation carried on by one individual for consistency, conversations distributed among the team; and everybody provides support in building up backstories and creating &#8220;pocket lint&#8221;.</p>
<p>Over time you&#8217;d build a library of that material, including the conversations themselves, which can be mined for trigger keywords paired with standard responses. That&#8217;s necessary to achieve the WSJ&#8217;s goal of an automated honey pot system. I don&#8217;t see how you could start out cold designing such a thing from scratch. Better to observe reality and build automated assists over time (&#8220;press F6 to request a photo holding a sign&#8221;).</p>
<p>That&#8217;d be fun, wouldn&#8217;t it? Sounds like the sort of thing that might appeal to Zoners, especially at a time when the alternative is arid partisan politics. We already have the facility for the first part, it&#8217;d be a matter of getting organized.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ER</title>
		<link>https://habitablezone.com/2012/08/05/why-we-should-scam-the-scammers/#comment-17040</link>
		<dc:creator>ER</dc:creator>
		<pubDate>Sun, 05 Aug 2012 17:47:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.habitablezone.com/?p=19495#comment-17040</guid>
		<description>The internet has very quickly become essential to the world&#039;s commerce and communications, not to mention science, government, defense, administration...you name it.  And yet it has proven to be highly vulnerable to criminals, vandals, pranksters, terrorists, military attack and espionage.  Losses due to unauthorized activity, and the costs of technical defenses against these activities, must be enormous.

Granted, the system as a whole has been shown to be quite robust, when compromised, it continues to operate, albeit at reduced efficiency. But the fact remains that it doesn&#039;t take the resources of a government or giant corporation to mount an attack that can be devastating to the victim.  Not only is protecting and repairing the system expensive, the capabilities lost while it is down could be critical. And the efforts of the attackers, often just adolescent amateurs, seem to have no trouble keeping up with the evolution of our defenses.

And yet, we continue to design our society to be more and more dependent on this technology, simply because it appears to be cheaper.
I don&#039;t think it is.  I just believe we are not properly taking into account the costs and potential costs.  And I believe one day it will bite us in the ass big time.</description>
		<content:encoded><![CDATA[<p>The internet has very quickly become essential to the world&#8217;s commerce and communications, not to mention science, government, defense, administration&#8230;you name it.  And yet it has proven to be highly vulnerable to criminals, vandals, pranksters, terrorists, military attack and espionage.  Losses due to unauthorized activity, and the costs of technical defenses against these activities, must be enormous.</p>
<p>Granted, the system as a whole has been shown to be quite robust, when compromised, it continues to operate, albeit at reduced efficiency. But the fact remains that it doesn&#8217;t take the resources of a government or giant corporation to mount an attack that can be devastating to the victim.  Not only is protecting and repairing the system expensive, the capabilities lost while it is down could be critical. And the efforts of the attackers, often just adolescent amateurs, seem to have no trouble keeping up with the evolution of our defenses.</p>
<p>And yet, we continue to design our society to be more and more dependent on this technology, simply because it appears to be cheaper.<br />
I don&#8217;t think it is.  I just believe we are not properly taking into account the costs and potential costs.  And I believe one day it will bite us in the ass big time.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
