"And our bots would kick ass."he fact that AI con artists are up to such tricks isn't surprising or new.
But what's truly phenomenal is the durability of this online hustle, and the millions of saps still falling for it.
The company would simply run the dialogue lines through
"A lot of people think this only happens to dumb people, and they can tell if they're talking to a bot," says Steve Baker, a lead investigator for the Federal Trade Commission tells me. The people running these scams are professionals, they do this for a living."The scam starts with creating a chat bot, which is easier than you'd think. The Artificial Linguistic Internet Computer Entity, or ALICE, which generates scripts for chatterbots, has been around for decades.
These programs can be modified for any purpose, though designing a believable online dating companion can take considerable time and effort — perhaps too much for some of the troops at Ashley Madison.
(Both sides agreed to drop the suits early last year.) Despite the controversy, the company subsequently attempted to streamline its bot-creation process.
Internal documents leaked during the Ashley Madison hack detail how, according to a 2013 email from managing director Keith Lalonde to then-CEO Noel Biderman, the company improved sex machine production for "building Angels enmass [sic]." This was done, Lalonde wrote, because the staff was getting "writers block when making them one at a time and were not being creative enough." (Reps for Ashley Madison did not return requests for comment).
D., boot up the site of a top competitor, Fling, and demonstrate how, shortly after registering, they are wooed by what appear to be bots. "We doubt it really is Megan Summers."In an email, Fling owner Abe Smilowitz writes, "We absolutely don't use fake profiles and bots…Us and AFF are pretty much the only guys that don't." This could be true. "We still think they do."To keep out the bots of spammers and hackers on AFF, Conru, who launched the site shortly after getting his doctorate as a means to meet women, codes his own countermeasures and frequently checks user names and IP addresses for veracity.