Wednesday, February 20, 2019
Crimes against information system analysis
Cyber disgust or computer crime is a type of crime that occurs with the meshing. This type o f crime has move very ballpark in modern times and soldieryy people take over been conned specie and other valuables. This kind of crime has grown to be high write to the extent that governings around the world be devising and implementing strategies and policies in a move to curb this kind of crime. Some of the most common types of internet crime include financial theft, fraud, intellectual property theft, industrial espionage, spamming, dissipate of computer virus, softw atomic number 18 hacking among others (Grabosky, 2006).This paper ordain review the Nigerian m unrivalledy Scams also called Advanced Fees Fraud or 419 Scams. The Nigerian scam is one of the most popular types of internet scam around the globe. It has been described as the widest ranging, cleverly planned and bizarre fraud schemes in the world in the recent years. The Federal Bureau of Investigations (FBI), Int erpol and Scotland Yard describe it as preposterous, amateurish and plainly crude (Lohr, 1992). The scam involves the direct of bogus letters with a promise of big pay offs.The fair game of this fraud usually receives an netmail that claims to be from Nigeria or a nonher West African country. Initially its target was businessmen but these days, the target also includes average citizens due to the low-toned cost associated with email communication and transactions. The content of the email includes an il court-ordered purpose, a gold laundering proposal or a legitimate and legal business proposal. It includes offers of jockstrap whereby the transmitter wants virtually assistance in merchant vessels out oil from Nigeria, romance, around supposedly deposited bullion in your account, a bequest left-hand(a) a will in your name.Others include claims overpayment of a contract by the Nigeria Government and then a need of a front man to get the overpayment out of Nigeria or an invite to conveyance a huge amount of notes, usually in US Dollars to your personalised offshore account (Nigerian scams, 2000). later on the recipient of this message responds positively, the glower then(prenominal) proceeds to advice him what else he requires to do. The declare oneself of the initial letter is to set the stage and is considered the opening ground to test the waters.Goal of the evil The main intention of the criminal is to confuse you into thinking that whatever you are being drawn into is a lucrative business opportunity and a high behavior into instant riches. so far though, the arrangement appears questionable but very few people advert at it that way. at that placefore the first letter makes sure that the recipient is left with no doubts and that he or she is assured, and confident of the fact that the breed will be very success and that he is not in no way encountering himself or herself.The allegations presented by these scammers are in such a w ay that you will be naturally cautious but darksome down you, you will be praying softly and wanting hopefully that the deal is genuine. Another element associated with these emails is a sense of momentumncy (Gill, 2005). Either that the regimen is closing in or that the job of the sender is at risk. Therefore, his necessitate is that the deal may be closed as son as possible. Their methodology is that they make sure that the recipient of the mail counts him or herself gold because he has been singled out from billions of people the world over.And so as more as this deal may look suspicious, the receipt is left with the urge of gaining millions of shillings for doing what? Absolutely nothing. Even to the most skeptical people, they take the next meter or s culmination an email, which will not cost you either risk at all and in return, might make you a multi millionaire. The ghost that being a rich man is only an email aside is what makes people respond to this mail. After making that call or sending the email, the sender p hightail its with you to make this as secret as possible because he or she is taking a great risk in communicating with you.He emphasizes on the secrecy in that any disclosure might lead to the transaction of the transfer of funds being incomplete. As the recipient, you dont see any harm in maintaining secrecy, confidentiality, utmost sense of purpose and maturity as it is what it will be asked of you by the sender (Lohr, 1992). After this communication, documents actually arrive to you. Official documents from the central stick of Nigeria together with documents from the dissolute of your newly appointed Nigerian practice of lawyers. This is what convinces most people of the authenticity of the proposal as they contain the Nigerian Government Letter head (Gill, 2005).After you are satisfied of the authenticity of the transaction, you are then asked to pay some notes to cater for unexpected taxes or contract fees demanded by t he central bank of Nigeria, transfer of funds fees or fees to cater for the attorneys acting on your behalf. The sender assures you that those are things that he is not in control of. For example, he may tell you that the lawyers want 5% of the whole money or $200,000 in advance in order to continue with the transfer. Being a intelligent person, you smell a rat and say no way.It is then afterwards sometime that the sender contacts you again and tells you that he has been able to negotiate with the lawyers and they carry brought down their fees to say $100,000. He convinces you that it is nothing compared to what you two are overtaking to gain. But since you are a wise person, you say no way (Lohr, 1992). It is then that he calls you again and tells that correct though he is a poor guy, he is ready to sell his only house to fix $30,000 if you are in a position of raising the rest. He cannot lay to rest to remind you that it is a loan he has advanced to you and that you will g ive back it to him once you receive the money.Here, you see the commitment and you finally send the money and you wait for your cash. You even start planning for holiday. After two days, you are informed that there have been some few problems and that the inside man is asking for a small bribe. After paying the initial amount, you become the ultimate milk cow. More requests start coming your way for you to send in more money. At this juncture, you are faced with two options each send more money as demanded or risk loosing the promised millions and the money you have already sent.In this way, you are a prey and tens or even hundreds of dollars may be swindled from you (Gill, 2005). Each amount of money that you send is regarded as the last amount but eventually, there rises some temporary difficulties, errors or complications that you are prompted to solve. This may go on for months until you run out of money or until you give up. But these scammers will not stop there. If you exh ibition signs of giving up, they remind you of the ultimate prize awaiting you. The asking of these advance fees is the ultimate objective of this scam.Thats why it is referred to as the Advance Fees Fraud (Gill, 2005). at once a victim has sent in more and more cash, he gets hooked up to the scam and the more he believes that it is not a scam but that it is a substantive deal. The denial of most victims that they have been conned is what drives them to make just one more payment and their windfall happens (Nigerian Scams, 2000). There are even instances whereby one is invited to Nigeria and you are taken through real or fake government offices. The fake government offices include legion(predicate) government support staff and you are left with no doubt.In some instances, victims have confessed going to the directory, looking up the number of the alleged government officiate and finding it there. On calling, it is received by the very alike person who he has been in contact with . There are some victims who have been invited to go to Nigeria. They are told that a Visa is not needful and in that case, they bribe an airport official for you to enter Nigeria. On accounting entry you are told that it is illegal to be in Nigeria without a passport (which is true) and this is use to coerce more money from you (Lohr, 1992). Mechanism to discourage these crimesThe federal authorization of investigations has but in some mechanisms in bid to stop these fraudsters. The FBI has warned the humanity to be wary and not fall into this trick. In this regard, the public has been warned to be skeptical of any email or letter from persons claiming to be Nigerian government officials or any other foreigner asking for help with regard to transfer of large sums of money. The public has also been advised not to believe in the promise of large sums of money once they succor (FBI, 2010). Many countries have put in legislations that require citizens to report any form of 419 ema ils.In general, the governments all over the world are committed to ending this vice. There have also been developments of network Technologies which aim at stemming the onward motion of the Nigerian Advanced Fee Fraud scams. Through the use of this technology, law enforcement officers are in a position to cooperate internationally and therefore are able to track these scammers, obtain the necessary evidence and prosecuting them (Lohr, 1992). References FBI. (2010). Internet Fraud. Retrieved distinguished 19, 2010 from http//www. fbi. gov/majcases/fraud/internetschemes. htm. Gill, P. (2005). About. Com. The Top ten internet/ Email Scams.Retrieved August 19, 2010 from http//netforbeginners. about. com/od/scamsandidentitytheft/ss/top10inetscams. htm Grabosky, P. (2006). Electronic Crime, recent Jersey Prentice Hall http//www. nytimes. com/1992/05/21/business/nigerian-scam-lures-companies. html. Lohr, S. (1992). Nigerian Scam Lures Companies. Nigerian Advanced Fee Fraud Detection, Education, Eradication. The New York Times. Retrieved August 19, 2010 from http//www. nextwebsecurity. com/ Nigerian scams. (2000). Schemes, Scams and frauds. Retrieved August 19, 2010 from http//www. crimes-of-persuasion. com/Crimes/Business/nigerian. htm.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment