Scamorama


Book Description

This book is about liars telling lies with compound interest to other liars. A -struggle is being waged on the Internet between criminals and comedians. On one side are fraudsters who con their victims out of hundreds of millions of dollars each year. The basic tool of the trade is e-mail, and the crime is the infamous "419" scam - a form of fraud whose current masters hail from Nigeria and which gets its name from section 419 of the Nigerian criminal code. It begins with an e-mail from a stranger: I am soliciting your assistance as to enable my family round up the remains of our life. Following the death of my husband Sani Abacha, former head of state of Nigeria, the new president has turned the country against us . . . I will be grateful if you could receive my last $50 million for safe keeping. I will give you 10% as a commission and to cover any expenses . . . On the other side of the struggle, pranksters from around the world are writing back to scammers strictly to waste their time. The resulting literary genre is -scambaiting - psychological warfare for clowns. Some anti-scammers go further, breaking into scammers? e-mail accounts to warn off their victims, and helping law enforcement. This book documents a weird form of cultural exchange made possible by the Internet. It is a hilarious introduction to the "419" scam, with correspondences between scammers and people who love to yank their chains.




Internet Fictions


Book Description

The Internet is nothing less than a medium for the indiscriminate and global dissemination of information if we take "information" in its cybernetic sense as bits of data – any data. As such, it is also a massive, amorphous, rhizomic collection of substantiated facts, guesswork, fantasy, madness, debate, criminal energy, big business, stupidity, brilliance, all in all a seemingly limitless multiplication of voices, all clamouring to be heard. It is a medium which proliferates stories, narratives, fictions, in ways which are both new and familiar. It is as a generator of fictions that the Internet seems to be just waiting to be explored by the disciplines of literary, cultural and linguistic studies: Fan-fiction, slash and straight; scam baiting; fan sites; ‘wild’ or ‘rogue’ interpretive universes; gossip, theories, musings, opinions. As a singularly unstructured – and hence as yet uncanonizable – body of texts, the stories told on the Internet have a distinct element of ‘grass-roots’ fictionalization and so offer an unprecedented opportunity to access, hear and investigate the stories and fantasies woven by non-professional writers alongside their more formally recognized colleagues. As a medium which is beginning to investigate itself by means of various meta-debates within the vast community of Internet fictionalizers, it is also a location where emergent phenomena may be debated in their process of being generated. This collection seeks to explore this for the most part uncharted territory in creative, innovative, theory-savvy ways using the manifold fictions the Internet generates. It brings together a wide variety of expertise from the fields of linguistic, literary, media and cultural studies. All contributors bring to the collection their individual voices and approaches which speak from various positions of involvedness or critique to provide searching and passionate discussions of the issues involved in Internet Fictions.




Building an Import/Export Business


Book Description

Do you dream of traveling to exotic places to buy or sell your lines of merchandise? Building an Import/Export Business shows you how to start your own business, from researching a raw idea to a successful launch to ongoing, profitable business operations. Author Kenneth Weiss objectively and accurately describes the difficulties and rewards of this kind of business.




The Dark Side of the Internet


Book Description

In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.




A Culture of Corruption


Book Description

E-mails proposing an "urgent business relationship" help make fraud Nigeria's largest source of foreign revenue after oil. But scams are also a central part of Nigeria's domestic cultural landscape. Corruption is so widespread in Nigeria that its citizens call it simply "the Nigerian factor." Willing or unwilling participants in corruption at every turn, Nigerians are deeply ambivalent about it--resigning themselves to it, justifying it, or complaining about it. They are painfully aware of the damage corruption does to their country and see themselves as their own worst enemies, but they have been unable to stop it. A Culture of Corruption is a profound and sympathetic attempt to understand the dilemmas average Nigerians face every day as they try to get ahead--or just survive--in a society riddled with corruption. Drawing on firsthand experience, Daniel Jordan Smith paints a vivid portrait of Nigerian corruption--of nationwide fuel shortages in Africa's oil-producing giant, Internet cafés where the young launch their e-mail scams, checkpoints where drivers must bribe police, bogus organizations that siphon development aid, and houses painted with the fraud-preventive words "not for sale." This is a country where "419"--the number of an antifraud statute--has become an inescapable part of the culture, and so universal as a metaphor for deception that even a betrayed lover can say, "He played me 419." It is impossible to comprehend Nigeria today--from vigilantism and resurgent ethnic nationalism to rising Pentecostalism and accusations of witchcraft and cannibalism--without understanding the role played by corruption and popular reactions to it. Some images inside the book are unavailable due to digital copyright restrictions.




Compliments of the Day!


Book Description

If you have an e-mail address, chances are good that you've received a message offering you a wonderful opportunity to earn plenty of money-if you're only willing to send a couple thousand dollars to West Africa! In this hilarious and wildly readable book, Dr. Rabbi Ben Zona shares his experiences scamming professional scammers. Through the use of alter egos and gritty determination, Rabbi Ben exposes international Internet fraudsters, giving them a taste of their own medicine-and making the web just a little bit safer for the innocent and gullible. A would-be caped crusader for the World Wide Web, Rabbi Ben himself is an alter ego, often working alongside yet another alter ego, Nigerian barrister Owata Dikedjua, to scam the scammers. Detailing his interactions and correspondences with the scammers, Compliment of the Day shines a light on a number of different Internet hoaxes. Peppered with Hebrew, Yiddish, and Nigerian phrases-and featuring a glossary of terms-this sidesplitting book will enlighten and delight anyone who has ever received an e-mail that reads, "Hello! This message may come to you as a surprise, but I have an urgent proposal that I'd like you to keep confidential.




Hyena


Book Description

Hyenas are almost universally regarded as nasty, scheming charlatans that skulk in the back alleyways of the animal kingdom. They have been scorned for centuries as little more than scavenging carrion-eaters, vandals, and thieves. Here to restore the Hyena’s reputation is Mikita Brottman, who offers an alternate view of these mistreated and misunderstood creatures and proves that they are complex, intelligent, and highly sociable animals. Investigating representations of the hyena throughout history, Brottman divulges that the hyena, though shrouded in taboo, has been the source of talismanic objects since the ancient Greek and Roman empires. She discovers that many cultures use parts of the hyena—from excrement and blood to genitalia and hair—to make charms that both avert evil and promote fertility. Brottman also considers representations of hyenas in today’s popular fiction, including The Lion King and The Life of Pi,where they are often depicted as villains, cowardly henchmen, or clowns, while ignoring their more noble qualities. Rightly returning hyenas to their proper place in the animal pantheon, this richly illustrated book will be enjoyed by any animal lover with an interest in the unusual and offbeat.




Organized Crime and Terrorist Networks


Book Description

This collection explores organized crime and terror networks and the points at which they intersect. It analyses the close relationships between these criminalities, the prevalence and ambiguity of this nexus, the technological elements facilitating it, and the financial aspects embedded in this criminal partnership. Organized Crime and Terrorist Networks is the outcome of empirical research, seminars, workshops and interviews carried out by a multinational consortium of researchers within ‘TAKEDOWN’, a Horizon 2020 project funded by the European Commission. The consortium’s objective was to examine the perspectives, requirements and misgivings of front-line practitioners operating in the areas of organized crime and terrorism. The chapters collected in this volume are the outcome of such analytical efforts. The topics addressed include the role of Information and Communication Technology in contemporary criminal organizations, terrorism financing, online transnational criminality, identity crime, the crime-terror nexus and tackling the nexus at supranational level. This book offers a compelling contribution to scholarship on organized crime and terrorism, and considers possible directions for future research. It will be of much interest to students and researchers engaged in studies of criminology, criminal justice, crime control and prevention, organized crime, terrorism, political violence, and cybercrime.




Cybercrime Through an Interdisciplinary Lens


Book Description

Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.




New Scientist


Book Description