Nigeria scam grabs dollars of gullible;Americans continue to fall victim to absurd schemes, especially from Nigeria, which is notorious for financial crime.BY ERIC ROSENBERG.WASHINGTON - Wanted: Americans to share in the fabulous wealth of African despot. Must be discreet, willing to fork over thousands of dollars in advance and, above all, gullible
http://www.miami.com/mld/miamiherald/business/national/13520351.htm
The first news I read online on Nigeria in 2006 was on how foreign morons lost over $170 Million to Internet Scammers last year and the notorious Nigerians are always the first suspects. I responded immediately by sending a rejoinder to The Miami Herald that published the erroneous news report online.
The Editor
The Readers' Forum
The Miami Herald
One Herald Plaza
Miami, Florida 33132-1693
E-mail: HeraldEd@herald.com
Dear Editor,
RE:Nigeria scam grabs dollars of gullible;Americans continue to fall victim to absurd schemes, especially from Nigeria, which is notorious for financial crime.BY ERIC ROSENBERG(Hearst News Service.)
May I react to the above news report Posted on Sun, Jan. 01, 2006 of the online edition of your newspaper, The Miami Herald.
I am a Nigerian publisher and editor who has had the privilege of working relationships with the USAID and the UNICEF. Therefore, your report attracted my attention and I have to respond.
Yes, greediness, ignorance and gulliblity are largely responsible for the prevalence of the notorious Nigerian Internet Scams. But, I blame the CIA,FBI and the Interpol for failing to investigate and arrest the criminals perpetrating these harmful crimes of Phishing. Because, the perpetrators could be traced. They could be traced through their telephones lines and also could be traced to the cyber cafes used by the Nigerian Internet Scammers through their Yahoo or Hotmail accounts. The IP IDs of the computers are not hidden. And I have reported on my weblog http://nigeriantimes.blogspot.com that most of us in Nigeria know the Internet Scammers, because they have their own cyber cafes used solely for their Internet scams and they are not hidden from the public. So, the agents of the CIA, FBI and the Interpol have to go to Nigeria and recruit Nigerian informants or spies to help them to track and report these Internet Scammers. And I know one of the biggest Internet fraudusters who is now a "born again" Christian and claims to have given up a life of crime. So, he could be helpful in disclosing the members of their network who are still actively engaged in the "Yahoo-Yahoo" Internet Scams. I can also direct them to the cyber cafes I know engaged in these crimes. I know some people who are engaged in these crimes and I have written to the CIA and the Interpol, but they did not reply. So, I published that people should ignore these Internet Scam spam and have anti-spam filters to prevent such Internet scam e-mails from flooding their e-mail boxes.
In Nigeria, we call those engaged in the Internet Scams "Yahoo-Yahoo", because 99% of them use Yahoo e-mail accounts and we see them at work in numerous cyber cafes in Lagos and other cities all over Nigeria. They work everyday and night and prefer working overnight to make sure that others will not disturb, distract or interrupt them as they use chicanery and flattery to swindle and defraud their ignorant, gullible and greedy foreign targets who are mostly Americans and Europeans.
These Internet Scams can be stopped once and for all if the Americans and Europeans and other foreigners stop being GREEDY, IGNORANT and GULLIBLE and if the CIA, FBI and INTERPOL can do their work accordingly.
Yours faithfully,
Orikinla Osinachi.
The Publisher/Editor
Nigerian Times
http://nigeriantimes.blogspot.com
N.B:What is Phishing?
Phishing is the act of tricking someone into giving them confidential information or tricking them into doing something that they normally wouldn’t do or shouldn’t do. For example: sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.www.michigan.gov/cybersecurity/0,1607,7-217-34415---,00.html
No comments:
Post a Comment