1 00:00:00,250 --> 00:00:08,130 Sperm as I'm sure you are aware is unsolicited messages most often coming in e-mail like the one you 2 00:00:08,130 --> 00:00:13,310 can see here trying to get you to buy pharmaceuticals or some other nonsense. 3 00:00:13,470 --> 00:00:20,550 But they also comb through instant messages forums social media even text messages. 4 00:00:20,550 --> 00:00:28,300 Now blogs wikis and pretty much anywhere else they can think of you know to spam you mostly is to advertise 5 00:00:28,300 --> 00:00:29,910 some sort of product. 6 00:00:30,030 --> 00:00:35,820 You would think that spamming wouldn't work but the barrier to entry to become a spammer is low. 7 00:00:36,030 --> 00:00:44,910 So spamming remains economically viable because spammers have very small operating costs and it is difficult 8 00:00:44,910 --> 00:00:49,020 to hold senders accountable for their mass mailings. 9 00:00:49,110 --> 00:00:52,940 It's relatively easy to hide where the emails are coming from. 10 00:00:53,160 --> 00:00:59,850 If you send millions upon millions of e-mails you know for very small small percentage take the bay 11 00:01:00,150 --> 00:01:08,020 the e-mail protocols we use today and always use were designed in a time of trust. 12 00:01:08,040 --> 00:01:13,290 So there is little defense built into those protocols to defend against spam. 13 00:01:13,350 --> 00:01:19,300 And that's something we're going to cover a lot more in the section on e-mail security with spam if 14 00:01:19,460 --> 00:01:24,000 or any e-mails if you didn't request it then you should be suspicious of it. 15 00:01:24,000 --> 00:01:32,010 Doxing something completely different to spamming docs is an abbreviation of document doxing is to do 16 00:01:32,010 --> 00:01:40,170 research on an individual or it can be an organization or company to find personal and private information 17 00:01:40,650 --> 00:01:47,270 often in order to cause embarrassment discredit extort coerce harass. 18 00:01:47,400 --> 00:01:54,570 You know just generally cause problems for the victim by publicly releasing the information or the threat 19 00:01:54,720 --> 00:01:56,440 to publicly release it. 20 00:01:56,510 --> 00:02:02,010 If someone is said to be dogs it means that information about them has been made public or has been 21 00:02:02,010 --> 00:02:08,130 broadcast in some way and can be achieved by simply searching on the Internet and looking at public 22 00:02:08,130 --> 00:02:08,760 records. 23 00:02:08,760 --> 00:02:14,940 There's often lots of information about people out there that they don't realize you know you can search 24 00:02:14,940 --> 00:02:22,170 through social media sites and forums which is one reason why you should keep anything private. 25 00:02:22,170 --> 00:02:27,680 Private people are quite surprised at the amount of information that is actually out there on them. 26 00:02:27,690 --> 00:02:34,340 It can also be done through contacting your phone company through IP address lock ups. 27 00:02:34,360 --> 00:02:35,680 They know where you are. 28 00:02:35,700 --> 00:02:42,400 You or your general location looking at browser history domain name who is information basically. 29 00:02:42,450 --> 00:02:49,590 Whatever method the doctor can use based on their level of skill it can involve social engineering and 30 00:02:49,590 --> 00:02:54,020 tricking people to give away information that they otherwise wouldn't. 31 00:02:54,030 --> 00:02:58,980 It can also escalate to hacking the victim's computer and accounts. 32 00:02:58,980 --> 00:03:06,750 Examples include anonymous releasing the identities of members of the Klu Klux Klan and Donald Trump 33 00:03:06,870 --> 00:03:10,740 reading out the phone number of Senator Lindsey Graham. 34 00:03:10,740 --> 00:03:15,010 The ethics of doxing is obviously considered questionable.