The Reign of Botnets Defending Against Abuses Bots and Fraud on the Internet 1st Edition David Senecal 2024 scribd download
The Reign of Botnets Defending Against Abuses Bots and Fraud on the Internet 1st Edition David Senecal 2024 scribd download
com
https://ebookname.com/product/the-reign-of-botnets-
defending-against-abuses-bots-and-fraud-on-the-internet-1st-
edition-david-senecal/
OR CLICK BUTTON
DOWLOAD EBOOK
https://ebookname.com/product/internet-fraud-casebook-the-world-wide-
web-of-deceit-1st-edition-joseph-t-wells/
ebookname.com
https://ebookname.com/product/abrahamic-religions-on-the-uses-and-
abuses-of-history-1st-edition-aaron-w-hughes/
ebookname.com
https://ebookname.com/product/nietzsche-godfather-of-fascism-on-the-
uses-and-abuses-of-a-philosophy-1st-edition-edition-jacob-golomb/
ebookname.com
https://ebookname.com/product/spinoza-and-deep-ecology-challenging-
traditional-approaches-to-environmentalism-eccy-de-jonge/
ebookname.com
Gateway 2nd Edition Anna Cole
https://ebookname.com/product/gateway-2nd-edition-anna-cole/
ebookname.com
https://ebookname.com/product/ancient-health-skeletal-indicators-of-
agricultural-and-economic-intensification-1st-edition-mark-n-cohen/
ebookname.com
https://ebookname.com/product/interplays-between-dialogical-learning-
and-dialogical-self-1st-edition-m-beatrice-ligorio/
ebookname.com
https://ebookname.com/product/nuclear-physics-at-border-lines-
proceedings-of-the-international-conference-1st-edition-giorgio-
giardina/
ebookname.com
https://ebookname.com/product/no-43-fighting-cocks-squadron-andy-
saunders/
ebookname.com
Classics of Organization Theory 8th Edition Jay M.
Shafritz (Author)
https://ebookname.com/product/classics-of-organization-theory-8th-
edition-jay-m-shafritz-author/
ebookname.com
The
Reign of
Botnets
The
Reign of
Botnets
Defending Against Abuses,
Bots and Fraud on the Internet
David Sénécal
Copyright © 2024 by John Wiley & Sons, Inc. All rights, including for text and data mining, AI training, and similar
technologies, are reserved.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, elec-
tronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976
United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment
of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978)
750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should
be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011,
fax (201) 748-6008, or online at www.wiley.com/go/permission.
Trademarks: WILEY and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates,
in the United States and other countries, and may not be used without written permission. All other trademarks are the property
of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this
book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book
and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be
created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be
suitable for your situation.You should consult with a professional where appropriate. Further, readers should be aware that
websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not
limited to special, incidental, consequential, or other damages.
For general information on our other products and services, please contact our Customer Care Department within the
United States at (800) 762- 2974, outside the United States at (317) 572- 3993. For product technical support, you can
find answers to frequently asked questions or reach us via live chat at https://support.wiley.com.
If you believe you’ve found a mistake in this book, please bring it to our attention by emailing our reader support team at
[email protected] with the subject line “Possible Book Errata Submission.”
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in
electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.
David Sénécal grew up in France, lived in Germany and England, and immigrated to the
United States in 2005. He lives with his family in the San Francisco Bay Area, California, and
works for Akamai Technologies as a principal product architect. He brings 25+ years of experi-
ence working with web performance, security, and enterprise networking technologies through
various roles (support, integration, consulting, development, product management, architecture,
and research). He started working on bot detection concepts for Akamai in 2010, which became
the very successful Bot Manager product, consistently recognized as a market leader by
Forrester. He helped define the concept of bot management in the early 2010s, which combines
bot detection, classification, visibility, and response strategy. The competition and the industry
later adopted this term. In his current role, David leads a team of researchers, developers, and
architects to keep up with the evolution of attacks and define the next generation of bot and
fraud detection products.
Follow David on LinkedIn at www.linkedin.com/in/davidsenecal.
vii
About the Technical
Editor
Tyson Thomas has been a researcher in application security for eight years, focusing on bot
detection algorithms leveraging behavioral biometric, device telemetry, and network data from
web and mobile clients. Originally part of Akamai’s acquisition of Cyberfend in 2017, he now
leads the data science team at Akamai for the Bot Manager Premier security product. Prior to
entering cybersecurity, he worked on developing pattern recognition and anomaly detection
algorithms for drug discovery, manufacturing, automotive, retail, and military hyperspectral
imaging applications. Before entering the private sector,Tyson worked at the NASA Jet Propul-
sion Laboratory researching neural network and evolvable hardware while completing a PhD
in electrical engineering at the University of Southern California. He has a bachelor’s degree
in physics and economics.
ix
Acknowledgments
It takes a village to raise a child, and this is also true when writing a book. Many talented
researchers, data scientists, developers, and business leaders have indirectly contributed to this
book while working with me on building the Bot Manager product I have been responsible for
the last 10 years. Their input and feedback have been invaluable in shaping the direction of the
product and furthering my understanding of the bot and fraud problem.
I want to acknowledge my mentors throughout the years who helped me in my journey
as a professional: Patrice Boffa, who allowed me to build the very first prototype of Bot Man-
ager more than 10 years ago; John Dilley, who recruited me as a product architect and trusted
me to build Akamai’s Bot Manager product; and finally Sreenath Kurupati, who helped me
appreciate and understand the world of machine learning and artificial intelligence. I’m grateful
for their trust in my instincts, for giving me guidance and support to solve difficult problems,
and for allowing me to experiment and develop a fantastic product that protects thousands of
websites around the world.
From the research and development team, I’d like to call out in no particular order key
people who helped me throughout the years execute and deliver my vision: Spandan Brahmb-
hatt, Luke Stork, Chunliang Wu, Pujan Motiwala,Yossef Daya, Ory Segal, Nils Rehm, Nikolai
Tschacher, Idan Pinto, Michael Bergmann, Harish Somaraddi, Prajaka Bhurke, Tu Vuong, Sai
Modalavalasa, and more.
From the product management team, I’d like to acknowledge my partners in crime for
many years, Pawan Bajaj and Maik Maurer.
A special thank you to my technical editor,Tyson Thomas, a cybersecurity veteran and lead
data scientist who peer-reviewed this work and provided valuable feedback to improve the
xi
xii Acknowledgments
quality of this book. Finally, a shout-out to a rising artist, my niece Julie Sénécal, who designed
the robot illustrations and icons, adding character to the book.
All traffic graphs come from the Akamai Control Center with authorization from Akamai
Technologies.
I’ll always be grateful to be surrounded by such talented people.
—David Sénécal
Contents
Introductionxvii
xiii
xiv Contents
Inventory Hoarding 53
Business Intelligence 55
Scalping: Hype Events 58
Online Sales Events Mania and Scalping 58
The Retailer Botnet Market 59
Anatomy of a Hype Event 61
Carding Attacks 64
Gift Cards 65
Credit Card Stuffing 66
Spam and Abusive Language 66
Summary67
References219
Index223
Introduction
I’ve been interested in technology since a very young age with a particular attraction to
computers, even if in the late 1980s and 1990s their capabilities were limited compared to
what we have today. When I finished high school, the Internet existed but was not widely
available.When it came time for me to choose a major for my college application, I looked for
something that would allow me to learn and work with this emerging technology. I graduated
from the Paul Sabatier University in Toulouse in the South of France in 1998 with a major in
electrical engineering with a specialty in computer networking and telecommunications.
Armed with this unusual high-tech degree and my knowledge of network protocols and com-
puter programming, I started my career as a network administrator for a major insurance
company (Les Mutuelles du Mans Assurances – MMA) in France, overseeing and enhancing
the headquarters’ network, supporting more than 5,000 users. After a few years, with my solid
understanding of networks and telecommunication, I felt I needed an extra challenge. I moved
to England to work as a multilingual technical support engineer for Azlan, a company later
acquired by Tech Data, specializing in distributing networking equipment. Remotely helping
customers configure and install their switches, routers, and firewalls was occasionally challeng-
ing. Doing so in French, English, and German and dealing with multiple regional accents
made things even more interesting. Not only did I have to learn several products, but I also
sometimes helped customers configure them in unexpected ways.
Several years later, I felt like introducing a change in my life again, and I moved to the
United States, where I started working for Akamai Technologies.There, I became more familiar
with the intricacies of the Internet. My focus was initially on helping companies accelerate
their websites. I worked with the top brands on the Internet from various industries, including
e-commerce, travel and hospitality, media, social media, healthcare, and banking. It quickly
evolved to help secure their websites as well. What became rapidly apparent to me was that
most of the traffic on any website came from bots, causing stability issues. The tools available at
xvii
xviii Introduction
the time to defend against such activity (mainly web application firewalls) were only partially
effective. New tools needed to be developed to deal with the problem more effectively. So, once
more, I decided to get out of my comfort zone and started building a product focusing mostly
on bot detection. After all, how hard could it be? This started a new phase of my career as a
product architect. At the time, I thought I’d work on solving this problem for a couple of years
and then move on to the next challenge. I certainly managed to solve the original threat, but
I did not anticipate how it would evolve then. More than 10 years later, I am still working on
bot management.
Bot management products evolved rapidly and grew in complexity while becoming a
must-have product for protecting life online. However, existing knowledge on bot and fraud
detection is fragmented, surrounded by many misconceptions fueled by marketing pitches,
myths, and sometimes outdated best practices. This makes the subject much more confusing
and frustrating for web security professionals and website owners to understand. The lack of
understanding of the problem prevents them from dealing with it effectively, ultimately benefit-
ing fraudsters.
While building bot management products, educating security professionals became a big
part of my mission. My peers, the sales force, the product support staff, and, more importantly,
customers looking to use my products to protect their online business needed to be trained.
Good content that goes to the heart of the problem in simple terms is hard to find and mostly
nonexistent. So, I thought: maybe I should write a book! Because, after all, how hard could it
be? It turns out it’s not easy but somewhat easier and less time-consuming than building a bot
management product! I persevered and wrote this book to cover the knowledge gap on the
threat landscape and defense strategies. I want to unveil the mystery, clear up some misconcep-
tions, clarify best practices, and make bots and fraud detection more accessible. This book
focuses on the bot management concepts and applies to any product, whether from a vendor
or homegrown.
This book aims to provide a comprehensive overview of the threat landscape and defense
strategies. It provides some insight into the evolution of attacks and defense strategies over time,
the motivation of attackers, how detection methods work, and how to analyze the traffic to
assess accuracy and decide on the most appropriate response strategy. The knowledge acquired
from this book will help security teams regain their advantage over attackers.
Beginners will learn the basics of the Internet and web security while progressively diving
deeper into bots, fraud, and abuse detection and mitigation. Web security practitioners with inter-
mediate or advanced knowledge will better understand the threat evolution and the methods
and best practices to mitigate attacks consistently and successfully. Executives and decision-makers
reading this book will better appreciate the topic without the common vendor buzzwords or
marketing bias, which will help them ask the right questions and make informed buy or build
decisions. Technology managers (product managers) and implementers (security architects, develop-
ers, solution architects) will better understand the context of the bot problem and the best
practices to integrate and use bot management technology to drive the most optimal outcome.
Data scientists, data analysts, and security operation support staff monitoring and evaluating the activ-
ity detected will be able to interpret the data with a full understanding of the problem and help
make data- and context-driven decisions to support the needs of their organization. Students in
the field of computer science who are attracted to the cybersecurity space will gain a general
understanding of the most critical security issues that affect online businesses today.
Any online business that generates significant revenue is at risk of fraudsters attacking their
website using botnets to steal information, take over their users’ identity, and make off with any
assets included in the accounts. E-commerce sites (Amazon, Nike, Macy’s), social media and
dating sites (Facebook, LinkedIn, Match.com), fintech/banking sites (Bank of America, U.S.
Bank, Wells Fargo), digital media (Netflix, Hulu, NBC), and gaming websites (Roblox, Elec-
tronic Arts, Epic Games) are all targets of bot and fraud attacks abusing the resources available
on the website.
1
A Short History of the
Internet
Our journey begins with a description of the evolution of the Internet and the emergence of
a new type of fraud and abuse that leverages botnets.
1
2 The Reign of Botnets
profit one day. These companies’ valuations, which were purely based on speculative future
earnings and profits, surged in the late 1990s with record‐breaking initial public offerings
(IPOs) that saw their stock triple within a day. These events fueled an irrational investment
strategy from venture capital firms to companies that sometimes did not have a strong business
plan or viable products for fear of missing out. In March 2000, large stock sell orders from lead-
ing high‐tech companies like Cisco or Dell caused a panic sale and marked the beginning of
the decline of the “Internet bubble.” Investors became more rational, and capital became harder
to find for startups that were not profitable. Many of these cash‐strapped startups disappeared
rapidly. Companies that reorganized and refocused their effort on developing valuable services
and products survived, and some, like Akamai Technologies, Google, Amazon, and Apple,
became very successful and key players in the development of the Internet.
When the bubble burst, it felt like a setback, but eventually, the Internet not only survived
but started to thrive. As the quality of the Internet network improved, so did the content. The
classic dial‐up modem connection that had a maximum speed of 56Kbps was soon replaced by
a more advanced and reliable network and telecom infrastructure. Integrated Services Digital
Network (ISDN) offered speeds of up to 128Kbps, more than double what a dial‐up modem
could achieve. At the turn of the century, digital subscriber lines (DSLs), which offered high‐
speed Internet, became more widely available through conventional telephone networks, cable,
and fiber optics. Today, Internet service providers offer connections as fast as 10Gbps, which is
178,571 times faster than the fastest dial‐up modem. Advancements in mobile telecommunica-
tion and the emergence of smartphones meant that consumers could access the Internet from
anywhere at any time for the first time. Mobile network expansion also helped expand the
reach of the Internet to rural areas. Today, one can even browse the Internet while on a plane
or cruising on the ocean, thanks to satellite networks.
As more and more people were drawn to the Internet, the distribution of rich content
became a real issue. The networks that carried the Internet traffic did not always have the
adequate capacity to handle the demand. Telecom operators would do their best to route the
traffic, but frequent congestion and often long distances between the client and the server led
to slow page load or stream buffering for Internet users, especially during popular events.
Content Delivery Network (CDN) companies like Akamai Technologies, Fastly, and Cloud-
flare, to name a few, became the backbone of the Internet. CDNs helped fix the problem by
avoiding transporting the content long distances and bringing it closer to the user. CDNs
helped make the Internet faster and more reliable. I’ve worked on and off for the biggest CDN
company in the world, Akamai Technologies, since 2006 and saw the Internet evolve from a
front‐row seat.
Let’s look at different types of websites and services that became available on the Internet
and how they managed to turn their online presence into a revenue stream.
Discovering Diverse Content Through
Random Scribd Documents
THE GHOSTS OF THE TROPICAL FOREST.
Perhaps the rarest, certainly the least known to man of all the
creatures which, by a strange chance, find their way to the Gardens
of the Zoological Society in Regent’s Park, are the denizens of the
Tropical Forest. We say forest, because, though divided by the
dissociable ocean, there is only one great forest which belts the
globe. The notion of the physical symmetry of the world, which
fascinated the old geographers, and led Herodotus to surmise that
the course of the great river of Africa must of necessity conform in
the main to that of the Danube in the opposite continent, was wrong
in theory and application. But shifting the guiding forces from the
control of original and plastic design to the influence of the dominant
Sun, the theory still holds good; and while the tropical heats remain
constant and undisturbed, so must the tropical forest flourish and
endure, with its inseparable concomitants of vegetable growth
overpowering and replacing the marvellous rapidity of vegetable
decay.
To the naturalist, the most marked feature of the great tropical
forest south of the Equator, is the inequality in the balance of Nature
between vegetable and animal life. From the forests of Brazil to the
forests of the Congo, through the wooded heights of northern
Madagascar, to the tangled jungles of the Asiatic Archipelago and
the impenetrable woods of New Guinea, the boundless profusion of
vegetable growth is unmatched by any similar abundance in animal
forms. A few brilliant birds of strange shape and matchless plumage,
such as the toucans of Guinea and the Amazon, or the birds of
paradise in the Moluccas or the Papuan Archipelago, haunt the
loftiest trees, and from time to time fall victims to the blow-pipe or
arrow of the natives, who scarcely dare to penetrate that foodless
region, even for such rich spoils, until incantation and sacrifice have
propitiated the offended spirits of the woods; but except the sloth
and the giant ant-eater, there is hardly to be found in the tropical
regions of the New World a quadruped which can excite the curiosity
of the naturalist, or form food even for the wildest of mankind. In
the corresponding tracts of Africa and the Asiatic Archipelago, the
rare four-footed animals that live in the solitary forests are, for the
most part, creatures of the night. Unlike the lively squirrels and
marten-cats of temperate regions, they do not leave their hiding-
places till the tropical darkness has fallen on the forest, when they
seek their food, not on the surface of the ground, but, imitating the
birds, ascend to the upper surface of the ocean of trees, and at the
first approach of dawn seek refuge from the hateful day in the dark
recesses of some aged and hollow trunk. There is nothing like the
loris or the lemur in the fauna of temperate Europe. We may rather
compare them to a race of arboreal moles, the condition of whose
life is darkness and invisibility. But, unlike the moles, the smaller
members of these rarely seen tribes are among the most beautiful
and interesting creatures of the tropics, though the extreme difficulty
of capturing creatures whose whole life is spent on the loftiest forest
trees, is further increased by the reluctance of the natives to enter
the deserted and pathless forests. The beautiful lemurs, most of
which are found in Madagascar, are further believed by the Malagasi
to embody the spirits of their ancestors; and the weird and plaintive
cries with which they fill the groves at night, uttered by creatures
whose bodies, as they cling to the branches, are invisible, and
whose delicate movements are noiseless, may well have left a doubt
on the minds of the first discoverers of the island as to whether
these were not in truth the cries and wailings of true lemures, the
unquiet ghosts of the departed.
Several of the larger lemurs are to be found at the Zoo, and
though these suffer so much if unduly exposed to the light that
before long they lose their sight, they may occasionally be seen in
their cages. Others, the rarest and most delicate members of the
race, are so entirely creatures of darkness that their exposure to
daylight seems to benumb all their faculties. They appear drugged
and stupefied, and, though capable of movement, seem indisposed
either to attempt escape when handled, or to move in any other
direction than that of shelter from the odious day. Even food is
refused before nightfall, and, unlike the epicure’s ortolans, which
awake and feed in a darkened room whenever the rays of a lamp
suggest the sunrise, the lemur only consumes its meal of fruit and
insects when nightfall has aroused its drowsy wits. These midnight
habits clearly unfit it for public exhibition at the Zoo, and the last
and rarest of the tribe which have arrived in London occupy a private
room adjacent to the monkey palace, in common with other lemurs
and loris, and a few of the most delicate marmosets and tropical
monkeys which have escaped the rigours of an English winter. One
large cage, which, in spite of the label “Coquerel’s Lemur” placed
upon it, seemed at the time of our last visit to contain nothing but a
pile of hay, is the dwelling-place of these latest guests. After
displacing layer after layer of the hay, the two sleeping beauties
were discovered lying in a ball, each with its long furry tail wrapped
round the other, in the deepest and most unconscious repose. When
at last the two were separated, and the least reluctant was taken in
the hand, the extreme beauty of the little “ghost” was at once
apparent. In colour it is a rich cinnamon, fading to lavender beneath.
The texture of the fur is like nothing but that of the finest and best-
finished seal-skin jacket, only far deeper and closer, so that the hand
sinks into it as into a bed of moss. The head is large and most
intelligent, the face being set with a pair of very large, round, hazel
eyes, in which the lines of the orbit seem not to radiate from the
centre, but to be arranged in circles, like the layers of growth in the
section of a tree. The long tail is at the base almost as wide as the
body, tapering to a point, and covered with deep fur. But the
greatest beauty of form which this lemur owns is the shape of its
hands and feet. These exquisite little members are so far an exact
reproduction of the human hand, that not only the hands, but also
the feet, own a fully-developed thumb. But each finger, as well as
the thumb, expands into a tiny disc, as in certain tree-frogs, so that
the little hands may cling to the tree with the tightness of an air-
pump. It is plain, as the half-sleeping lemur climbs over the arms
and shoulders of its visitor, that it takes him for a tree. The arms are
stretched wide apart, the thumbs and fingers are spread, and grasp
each fold of the coat with the anxious care of one who thinks that a
slip will cause a fall of a hundred feet, and the soft body and tail half
envelop the limb down which they are descending, fitting to the
surface like some warm enveloping boa. As soon as it reaches the
hay-pile in its cage the lemur instantly burrows, its long tail
vanishing like a snake, and in a minute it is once more asleep, and
unconscious of the world.
A near relation of the lemurs is a beautiful little creature, whose
uncouth native name has not been replaced, called the “moholi.” It
only differs from the lemurs in the shape of the ears, which in the
moholi are either pricked up, like those of a bat, or folded down on
its head at will. It has the same wonderful brown eyes, so large and
round that they seem to occupy the greater part of the head; the
moholi is, in fact, “all eyes.” As it stretches its slender arms out wide
against the keeper’s chest, and turns its head to look at the visitors,
it has the most winning expression of any quadruped we have ever
seen. The coat, of a pinkish-grey above, turns into light saffron
below, and the texture is less deep than the lemur’s fur. In touch it
resembles floss-silk, thickly piled. The “Slow Loris,” from Malacca, is
a tailless lemur. In exchange it has received a fretful temper, which
seems a permanent trait in this species. When wakened it growls,
bites, and fights, until once more allowed to sleep in peace. This
loris hardly falls short of the beauty of the lemurs. The fur is cream-
coloured, with a cinnamon stripe running from the head down the
back. Of the three species which we have described, the first seems
to combine some of the characteristics of the monkey and the mole,
the second of the squirrel and the bat, the last those of the monkey
and the weasel tribe. The “Slender Loris” is a still greater puzzle. It
has all the characteristic “points” of the lemurs, without the tail. In
size it resembles a squirrel; but its movements are so strange and
deliberate, and so unlike those of any other quadruped, that it
seems impossible to guess either at its habits or its purpose in
creation. Each hand or foot is slowly raised from the branch on
which it rests, brought forward, and set down again; the fingers
then close on the wood until its grasp is secure, when the other
limbs begin to move, like those of a mechanical toy. As we looked,
its “affinities” with other types presently suggested themselves. It is
a furry-coated chameleon. The round, protruding eyes, the slow
mechanical movements, and the insect-feeding habits, are identical,
except that the loris hunts by night and the chameleon by day. The
loris even possesses an auxiliary tongue, which aids it in catching
moths, just as the development of the same member marks the
insect-catching lizard. From dawn till dusk all the lemurs are the very
bond-slaves of sleep, hypnotized in the literal sense, drugged and
steeped in slumber. Had the old poets known them, had the
Phœnician sailors brought them back when they visited the land of
Ophir, they would have been the consecrated companions of
Somnus. Ovid’s famous picture of the Cave of Sleep, and the
noiseless hall where
“A couch of down, raised high on ebony,
Self-coloured, sombre, draped with sable pall,
Stands in the midst, whereon that god doth lie,
While all his limbs relaxed in slumber fall,”
The winter of the year 1892, like the days of pestilence before the
walls of Troy, was fatal both to man and beast. Even the carefully
tended inmates of the Zoological Society’s Gardens did not escape;
and as the new year opened with the death within a week of “Sally,”
most human and most intelligent of apes, and of her neighbour
“Tim,” the silver gibbon, who was almost as great a favourite of the
London public as the educated chimpanzee, so the spring saw the
death of the two beautiful giraffes, the sole survivors left in the
collection. The experience which the Society has had in maintaining
its stock of these interesting creatures has not, however, been
altogether discouraging. Since the first four specimens were brought
to England in 1836, no less than seventeen fawns have been born in
the Gardens, and many of these lived to grow up. But the stock
gradually diminished, until in 1866 two were burnt to death in their
stable, and a third died of old age, leaving only the pair now lost.
The Last Giraffe. From a photograph by Gambier
Bolton.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookname.com