{"id":81,"date":"2006-05-31T18:58:23","date_gmt":"2006-05-31T22:58:23","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2006\/05\/31\/microsoft-to-fight-419-scammers\/"},"modified":"2006-05-31T18:58:23","modified_gmt":"2006-05-31T22:58:23","slug":"microsoft-to-fight-419-scammers","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2006\/05\/31\/microsoft-to-fight-419-scammers\/","title":{"rendered":"Microsoft to fight 419 Scammers?"},"content":{"rendered":"<p><a href=\"http:\/\/news.zdnet.com\/2100-1009_22-5895534.html\">Nigeria enlists Microsoft to fight spam scammers<\/a><br \/>\n<a href=\"http:\/\/www.securityfocus.com\/cgi-bin\/index.cgi?c=headlinecomments&amp;op=display_comments&amp;HeadlineID=41210&amp;expand_all=true&amp;mode=threaded\">Andy McCue<\/a>, ZDNet News 2005-10-14<\/p>\n<p><a href=\"http:\/\/research.microsoft.com\/news\/archive.aspx\">Microsoft<\/a> is planning to work with the <a href=\"http:\/\/news.google.com\/news?q=nigeria&amp;hl=en&amp;lr=&amp;ie=UTF-8&amp;sa=X&amp;oi=news&amp;ct=title\">Nigerian <\/a>government to help <a href=\"http:\/\/www.419eater.com\/html\/419faq.htm\">track down and prosecute criminals involved in e-mail scams and other Internet-based fraud originating from the African country.<\/a><br \/>\nThe 419 problem is very difficult to frame now that it has expanded from cafe surfers in Nigeria to Asian (and some say even Middle Eastern) cafes. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nigeria enlists Microsoft to fight spam scammers Andy McCue, ZDNet News 2005-10-14 Microsoft is planning to work with the Nigerian government to help track down and prosecute criminals involved in e-mail scams and other Internet-based fraud originating from the African country. The 419 problem is very difficult to frame now that it has expanded from [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[272],"tags":[],"class_list":["post-81","post","type-post","status-publish","format-standard","hentry","category-digital-warfare"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/81","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/81\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=81"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=81"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}