Internet Fraud

INEC warns against circulating fake recruitment links

By Uzair Adam Imam

The Independent National Electoral Commission (INEC) has warned Nigerians against circulating fake recruitment links on social media and some online platforms.

The commission on Wednesday said the link, ‘inecnigeria.govservice.site’, is fake and aimed to defraud unsuspecting citizens.

It also reiterated that its original links remain: pres.inecnigeria.org and inecpress-app.com/pres, respectively.

It stated that its ad hoc recruitment exercise is free of charge, and no payment of any kind is required throughout the process.

“Our attention has been drawn to a fake ad hoc recruitment link being circulated on various social media platforms, frequently visited sites and blogs with the intention to defraud unsuspecting citizens.

“We implore Nigerians to disregard the fake link and avoid falling victims of swindlers,” the notice said.

Ponzi scheme: An ugly race for easy money (1)

By Bilyamin Abdulmumin

Needless to say, everyone wants money. Most of us have an insatiable love for them. There is this Hausa rhetoric:  if anyone says, “you have too much love for money, then the person saying that is playing with your intelligence”. In other words, the accuser is being unserious because what he said is a fact not only about you alone but everyone.

However, that is not the nitty-gritty of the matter because the like for money is one thing, and getting them is another. Getting the money is not as easy as pushing a standing pestle. Neither is it as easy as slapping a chick (in Dan Anace’s words)

To get the Phoenician’s invention, one has to invest a lot. It is a struggle for “survival of the fittest”. Those who bring or have the best ideas or strategy get them, thus putting us in constant skirmish and outweighing one another (capitalism in short).

Through their programs, some people have allegedly found a platform that can bring us this money almost effortlessly. In other words, the Ponzi scheme, alias pyramid, promises to free us from the bandage of suffering before getting the money.

To get to the utopia, according to these organizations, one will only invest a certain amount of money, and instantly a fixed profit is ensured (which one can claim after some time). The return of these investments is usually from 10 to 1000 per cent.

Initially, these Ponzi organizations’ operations were physical, with their offices and agents well known. One of such schemes that once cut across nook and cranny in Zamfara State was “oil and gas investment.”

The gale of the scheme in the state swept aside everyone on its path. It left neither business people, politicians, government workers, or even town heads. The “oil and gas” claimed an investment with a 100 per cent return in two weeks. For instance, an investment of 10,000 would qualify one to cash out 20,000 in two weeks. This is the type of eldorado business everyone can envisage, making it difficult to resist.

With the global transition from a physical to an online platform, the Ponzi schemes have followed suit. They would unleash their various applications where subscribers follow laid-down rules. Although different from the physical schemes, the concept remains the same: invest a certain amount of money and recoup mouth-watering profit (at 100 % assurance).

MMM was one online Ponzi that traversed the length and breadth of Nigeria, thanks to the subscribers’ testimonies like that of the oil and gas scheme. MMM promised and initially delivered 30 per cent profit to subscribers at every kobo invested within two weeks. This online investment was even riskier because the subscribers were dealing with faceless agents. When the MMM finally crashed, the bang of the burst was heard everywhere across the globe.

How the MMM founder from the far East of the globe, Russia, was able to convince Nigerians (some of whom are learned) to use not only their savings but other people’s money (staff salary, school registration fees, or money entrusted to them) was a mystery

The basic modus operandi of any pyramid scheme is the same: one particular schemer (the Ponzi initiator) would convince one to two people. Next, these two people convince four, four convince eight, and it keeps cascading like a symbolic pyramid hence the name pyramid scheme. Note the new subscribers in the pyramid pay the older ones; those at the top, especially the schemer who is at the top, bag the most money out of the scheme to the detriment of those at the bottom. For the scheme to remain healthy in operation, the new subscribers must always be able to pay the older ones; otherwise, the scheme becomes stuck in the mud.

Some of the Ponzi schemes recently to have met the waterloo are ISME and OSTIME. And according to “nogofalmaga”, an NGO specialist in dealing with Ponzi schemes, some other currently active schemes are only a matter of when not if they flow suit. These are SunPower, Tesla-recharger, Bitmaincenter sabrinascala, stormgain, among others.

In order not to take too much space, I reserved for the next article the discussion of some funny traits of Ponzi schemes

The elixir for easy money doesn’t exist. The Ponzi scheme can only provide for a few while robbing many others. If it is too good to be true, don’t trust it.

Bilyamin Abdulmumin wrote via bilal4riid13@gmail.com.

Publicizing privacy: How our personal information hunts us

By Sulaiman Badamasi (Mahir)

Social engineering (also known as human hacking) is the art of psychological manipulation of human beings to trick them into making privacy blunders to giving out delicate confidential information. The perpetrator (social engineer) digs background information of the potential victim to identify key necessary weak points and possibly gain the victim’s trust to use the information against them. Before the emergence of social media, it took social engineers a long, frustrating time to acquire as much information as possible about their targets.

However, the dawn of technology saw the 21st century as the swiftest ever in terms of information circulation. The world has appeared at a height where a single tweet (for example) reaches a billion people in seconds. Thus, information runs fast, businesses nurture, distances diminish, causes foster, coverage enlarges, relationships are created/strengthened, thus making us and our lifestyles more publicized and learned about.

Despite its tremendous impact on making life more relaxed, social media compels us to unconsciously reveal vital personal information about ourselves, families, friends, etc., which could be easily used against us. In other words, what you need to know about people to trigger any havoc on them and their close ones is almost certainly on social media. People’s personal info has become so plentiful that they have a copy of their voter card, national ID card, and driver’s license posted on social media.

Moreover, people reveal their workplaces, positions, type and colour of their vehicles, wives and children (by number, names & faces), schools where their children attend (including class, level, course, location), the colour of their children’s uniforms, favourite food, the interior of their rooms, the kind of electronic devices they own/use, current location, movement plans and means of transportation (motorcycle, car, truck, train, plane) with picture evidence. You know when they sleep/wake, to mention a few.

The recent #KanuTrain attack is a decent scenario of how our personal information can be used against us. The intruders appeared to have readily gathered background details of some of the passengers, including their sitting positions on the train and their social profiles. In a video interview, the killer of Hanifa, the primary school pupil who was allegedly abducted and murdered by her teacher, explained how he took his time, gathered adequate information, and built up his fraternity before executing the unfortunate assault.

The fact is, no ill group/individual strategizes and carries out a successful attack devoid of having sufficient information, which of course, we give generously. Without data, plans go wrong, and they (perpetrators) hardly take these risks nowadays. Repeated evidence has struck our screens on how ill-doers use human informants, drones, and social media accounts to gather information about target victims before carrying out attacks on them, including military bases.

Ethical hackers do not just attack or penetrate internet environments or webservers. Instead, they do footprinting and reconnaissance to know the strengths and identify weaknesses in the system they plan to attack and then exploit them.

Have you ever wondered how your profile pictures can be grilled to reveal more information about you? We often change profile pictures on several occasions. Let us assume you have been on Facebook for ten years and have changed your profile picture ten times (once each year). These ten naturally varying images can be processed using deep learning and natural language processing to understand, for instance, the rate at which you are ageing, how happy/angry/suspicious/innocent you are looking, how healthy or otherwise, to mention a few.

A 30-minute walkthrough of the pictures you have uploaded in the last five years reveals what calibre of people you do mingle with, the state of structure your house is in, the number of countries, states, or towns you have visited, conferences you have attended, how beautiful your wife looks like, which of your siblings/parents/children you love the most, and more. Do you know that a data scientist who knows where you have been going for one year or less can use that data to predict where you will possibly be going next?

All these can be used to perpetrate evils against you/us, thus, informing a possible abductor/kidnapper whether you look like someone who/whose family can afford a ransom payment. Knowing a lot about your family tells them of the softer target amongst them. Of course, they would find it easier to abduct that daughter of yours whose school name, picture, name, age, the colour of the uniform, time to and from school you have made available than you.

Unless we have underlying valid reasons to do so, making our private information and our families public could make them more vulnerable to unnecessary access. Life now looks as if the more your sensitive information is made private, the less you are prone to some unfortunate events.

So, beware!

Sulaiman Badamasi (Mahir) can be reached via sulaimanmahir@gmail.com.

Internet fraud: EFCC arrests 33 suspects in Calabar

The Economic and Financial Crimes Commission of the Uyo Zonal Command has apprehended no fewer than 33 suspects, alleged to have been involved in Internet fraud, in different places in Calabar, Cross River State.

This was disclosed in a statement on Friday by the anti-graft agency via its official Facebook account.

According to the commission, “The suspects aged between 22-35 years are Modey Terrence Akong, Detoo Bem Daniel, Godson Topbie, Moses Valentine Nkpung, Idang Confidence, Chinagorom Edward, Enwereuzo Chidiebere, Obioma ThankGod, Richard Reinhard, Clinton Christopher, Raymond Samuel, Etim Paul, Okechukwu Caleb and Joseph Akobo.

“Others are Morayo Jerry, Ogar Jemyford, Emmanuel Chika, Okpubeku Prosper, Onedo Caleb, Enajemo Oghenekaro, Great Asume, Ebuka Uzokwe, Obikwelu Ugochukwu, Oloko Pius Monshe, Gideon Ani, Effiong Akaninyene, Agoh Oscar, Agu Favour, Abang Godswill, Amalam Micheal, Luka Kaben, Ifeanyi Enwereuzo and Achilonu Moses.”

Not only the arrests were made, but the commission also recovered mobile phones and computers in the course of their raid on the locations the suspected fraudsters were nabbed.

“At the point of arrest, several laptops and mobile phones were recovered from the suspects. Also recovered from them are three Lexus saloon cars with registration numbers: LAGOS AKD 56 FQ, ABUJA KUJ 79 BM and IMO UMG 956 KU; a Toyota Camry and a Honda Accord with registration numbers LAGOS -APP 368FY and OYO-BDJ 476AQ respectively,” the commission stated

It also added that “The arrested suspects will be charged to court as soon as the investigation is concluded.”