Down hundreds of staff, Weather Service ‘teetering on the brink of failure’
Hacker News Comments: https://news.ycombinator.com/item?id=15561533
Hacker News Comments: https://news.ycombinator.com/item?id=15561533
Hacker News Comments: https://news.ycombinator.com/item?id=15520554
Source: https://blog.x.company/turning-on-project-loon-in-puerto-rico-f3aa41ad2d7f
Hacker News Comments: https://news.ycombinator.com/item?id=15511962
Source: https://blog.twitter.com/official/en_us/topics/company/2017/safetycalendar.html
Hacker News Comments: https://news.ycombinator.com/item?id=15507538
Source: https://www.getgutenberg.io
Hacker News Comments: https://news.ycombinator.com/item?id=15488235
Source: http://zsync.moria.org.uk/
Hacker News Comments: https://news.ycombinator.com/item?id=15474893
Source: https://medium.freecodecamp.org/we-fired-our-top-talent-best-decision-we-ever-made-4c0a99728fde
Hacker News Comments: https://news.ycombinator.com/item?id=15469889
Hacker News Comments: https://news.ycombinator.com/item?id=15228225
Source: https://thenextweb.com/2017/09/12/google-down-gmail-youtube-maps/
Hacker News Comments: https://news.ycombinator.com/item?id=15225032
Hacker News Comments: https://news.ycombinator.com/item?id=15224199
Source: https://theconversation.com/the-only-safe-email-is-text-only-email-81434
Hacker News Comments: https://news.ycombinator.com/item?id=15220136
Hacker News Comments: https://news.ycombinator.com/item?id=15211274
Source: https://blog.acolyer.org/2017/08/28/using-chatbots-against-voicespam-analyzing-lennys-effectiveness/
Using chatbots against voice spam: analyzing Lenny’s effectiveness Sahin et al., SOUPS’17
Act I, Scene I. Lenny is at home in his living room. The phone rings.
Lenny: Hello, thi- this is Lenny!
Telemarketer: Lenny, I’m looking for Mr. NameRedacted
Lenny: Uh– sso- sorry, I’b- I can barely hear you there?
Telemarketer: homeowner
Lenny: ye- yes yes yes
Telemarketer: Mr. NameRedacted, we’re giving free estimates for any work you need on your house. Were you thinking about having any projects? A little craning driveway, roof work, anything you need done. We’ll give you a free estimate.
Lenny: oh good, yes, yes, yes.
Telemarketer: what would you like to have done? What were you thinking about? Anything around the house?
Lenny: uh yes, yes, uh, uh, someone, someone did- did say last week or someone did call last week about the same thing, wa-was that, was that, you?
Telemarketer: No, sir. I’ve might have been in another company. What was it that you were doing?
Lenny: ye-yes. ss- sorry, what- wa- what was your name again?
Telemarketer: yes. What were you thinking about having done?
Lenny: well, it- it it’s funny that you should call, because my third eldest Larissa, uhh, she, she was talking about this. uh, just this last week and you, you know sh- she is- she is very smart I would – I would give her that, because, you know she was the first in the family, to go to the university, and she passed with distinctions, you know we’re- we’re all quit proud of here yes yes, so uhh, yes she was saying that I should , look, you known, get into the, look into this sort of thing. uhh, so, what more can you tell me about it?
Telemarketer: …
(The actual conversation keeps going for over 11 minutes – see Appendix A in the paper for the full transcript.)
Even better, you can listen to a whole playlist’s worth of Lenny’s conversations on YouTube. If you haven’t guessed already, Lenny is a bot which plays a set of pre-recorded voice messages to interact with spammers. You might be surprised just how simple Lenny actually is (though a lot of thought has gone into what he says), yet he’s proven to be very effective at keeping spammers talking for a long time.
Just in the US alone there were over 5 million complaints about unwanted or fraudulent calls in 2016. About 75% of generic fraud-related complaints cite telephone as the initial method of contact. The people behind unwanted calls may be for example fundraising, telemarketing, or simply scamming. The callers may use robocalls playing pre-recorded messages, or real people in call centres. Having real people do the calling makes campaigns more effective. Among the 5 million 2016 complaints, 64% were robocalls, and hence 36% involved human agents. The cost of employing people becomes the limiting factor for fraudsters.
Callers have a script that they follow. For example, many spam calls begin with the following components:
Through a call, spammers may ask a number of questions. Even if the target does not in the end follow through on the offer, this information can used to enrich datasets for future campaigns. Here’s a quick summary of popular spam call types and the sorts of information they may request:
(Enlarge).
Although there is no indisputable evidence of this chatbot’s origins, some information can be found online. Lenny has been reported to be a recording performed for a specific company who wanted to answer telemarketing calls politely. Later, the recordings were modified to suit residential calls.
Even without any AI or speech recognition mechanism Lenny is able to trick many people and keep conversations going for many minutes, and in one case up to an hour!
Conversations with a hosted version of Lenny are available on a public YouTube channel (conducted in a country and under conditions which make the recordings legal), and it is a selection of 200 calls from this archive which are analysed for this paper. When a phone user identifies a spam call they can transfer the call to the PBX server hosting Lenny, or alternatively have blacklisted spam numbers sent straight to Lenny without even answering.
Lenny simply plays a set of audio recordings one after another to interact with the caller. The same set of prompts is always used in the same order. Lenny is controlled by an IVR script which allows simple scripting and detection of silences.
The script starts with a simple “Hello, this is Lenny.” and will wait for the caller to take his turn. If he does not respond within 7 seconds, the server switches to a set of “Hello?” playbacks until the caller takes his turn. However, if the caller speaks, the IVR script waits until he finishes his turn. The script detects the end of the caller’s turn by detecting a 1.55 second long silence period, at this point it will play the next recording. When the 16 distinct turns that are available have been played, it returns to the 5th turn (the 4 first prompts are supposed to be introductory adjacency pairs) and continues playing those 12 turns sequentially, forever.
Why does a fixed set of 16 pre-recorded responses work so well?? Lenny’s secret is that it’s based upon findings from Conversation Analysis – something that might be of use to anyone designing bots in other contexts too!
Conversation Analysis (CA) is a sociological perspective which aims at studying the organization of natural talk in interactional order to uncover the seen but unnoticed methodical apparatus which speakers and recipients use in order to solve the basic organizational issues they deal with while talking. Trying to show how the participants to a conversational exchange orient themselves on those methods, CA adopts a descriptive stance, deeply rooted into the detailed analysis of recorded conversational exchanges.
Key results from CA date back to the 1970’s. There are four main mechanisms in conversations which have been isolated and explained:
… adjacency pairs point to the normative expectations that are embedded into the ways we order turns at talk as pairs.
The 200 randomly selected calls from the 487 publicly available at the time of the study were sent to a commercial transcription service, and selected fragments were further converted to the ‘Jeffersonian transcription notation‘ required for very fine-grained analysis. Call logs from 19,402 calls to the PBX were also analysed.
Best not to answer your phone if someone calls around 1pm on a Wednesday it seems!
Here’s the breakdown of how long Lenny managed to keep spammers talking for conversations on the YouTube channel. Spammers on average spend 10:13 minutes talking to Lenny, and these conversations have an average of 58 turns!
…72% of calls contain Lenny’s set of scripts repeated more than once. On average, a caller hears 27 turns of Lenny, which corresponds to 1.7x repetition of the whole script… Surprisingly, in only 11 calls (5%), the caller realizes and states that he is talking to a recording or an automated system.
Spammers get frustrated talking to Lenny, but only scammers tend to start cursing!
Here’s a reminder of Lenny’s first five steps (T1 to T5):
From a CA perspective there are both sequential and turn-constructional features here which help to keep the call going. T1 and T2 are first pair parts from adjacency parts, which project second pair parts. T3 and T4 are designed as second-pair parts of an adjacency pair (i.e., they are designed to follow a question, proposal, request etc.). T4 adds the ‘oh’ turn-initiated particle, “which has been demonstrably analyzed as a change-of-state token” and works well when followed by an assessment token (‘good’) and the affirmations (yes, yes, yes). T5 pre-supposes that the reason for the call has been previously introduced by the caller. Almost all turns display self-initiated self-repairs.
Inspecting Lenny’s turns in isolation is not sufficient enough to understand how Lenny can be so efficient in so many different calls. This efficiency is locally built in each call development. Once embedded into a real call, Lenny’s turns display an understanding of prior turn and brings new material to be understood by his co-participant. This in situ inspection of Lenny’s turn is inevitably made, with more or less care, by the participants, in order to build their own contribution and to fit each new turn into the ongoing conversation. This is what CA calls the “next-turn proof procedure” and what explains the various, flexible ways in which Lenny’s turns can play their part in some calls.
Sadly, we have to wait for another paper for analysis of Lenny’s conversation beyond the introduction. (But remember you can check out some of the recorded conversation to hear it for yourself).
At the end of the paper, you’ll find a set of eight guidelines for developing Lenny-like bots, some of which may also be useful in other contexts!
Hacker News Comments: https://news.ycombinator.com/item?id=15208388
Source: https://twitter.com/webster/status/906346071210778625
OMG, Equifax security freeze PINs are worse than I thought. If you froze your credit today 2:15pm ET for example, you'd get PIN 0908171415.
— Tony Webster (@webster) September 9, 2017
Hacker News Comments: https://news.ycombinator.com/item?id=15198997
Source: https://psyarxiv.com/hv28a/
Hacker News Comments: https://news.ycombinator.com/item?id=15188894
Source: https://aeon.co/essays/the-end-of-a-world-of-nation-states-may-be-upon-us
Hacker News Comments: https://news.ycombinator.com/item?id=15084588
Hacker News Comments: https://news.ycombinator.com/item?id=15058979
Hacker News Comments: https://news.ycombinator.com/item?id=15055522
Source: http://dci.mit.edu/assets/papers/decentralized_web.pdf
Hacker News Comments: https://news.ycombinator.com/item?id=15053064
Source: https://medium.com/@EthanZ/mastodon-is-big-in-japan-the-reason-why-is-uncomfortable-684c036498e5
Hacker News Comments: https://news.ycombinator.com/item?id=15034304
Chirp! is a social network. It runs on GNU social, version 2.0.1-beta0, available under the GNU Affero General Public License.
All Chirp! content and data are available under the Creative Commons Attribution 3.0 license.