This document summarizes the history of bots and botnets, how botnets are controlled and used for criminal activities like DDoS attacks and spamming, and the large harms they cause. It discusses how botnets can include millions of compromised systems and generate huge amounts of attack traffic to bring down websites. The document also outlines approaches for detecting and mitigating botnets, including using darknets and honeypots to analyze anomalous traffic and identify infected systems.