Wireless hackers. Whackers tend to defend their practices by claiming that they do not take advantage of their unauthorized access to perform criminal activities, and for some, this is true. However, some Black Hat whackers engage in warspamming—the act of using an unsecure network’s Simple Mail Transfer Protocol (SMTP) gateway to send spam through the Internet. Other Black Hat whackers engage in telecommunication theft. McFedries, P. Technically Speaking: Hacking Unplugged. IEEE Spectrum, February 2004, p. 80.