Scammers Are Known For Developing Their Own Slang, But It Has Gone From Just A Few Words To Almost A Language
As part of the strategies developed to ‘institutionalize’ scammers and their illicit Illicit means something that is not legally permitted or authorized under the law; unlicensed; unlawful. It can also mean disapproved of or not permitted for moral or ethical reasons. business, and evade the punitive hand(s) of the Nigerian and international law enforcement agencies, cyber scammers in Nigeria have devised various strategies, including the deployment of anti-language and slangy expressions in their transactional and social interaction.
Studies on cybercrime Cybercrime is a crime related to technology, computers, and the Internet. Typical cybercrime are performed by a computer against a computer, or by a hacker using software to attack computers or networks. in the Nigerian context have largely addressed the phenomenon from the sociological, economical and information technological perspectives with little attention paid to it from a linguistic perspective. Therefore, this study investigates the linguistic strategies employed by cyber scammers in Southwestern Nigeria in their social and transactional interaction.
Findings reveal slang coinages and overlexicalisation, and relexicalization (semantic extensions) are anti-language phenomena characterizing cyber scammers’ language in the region.
In other words, scammers are inventing their own language or terminology in their work and interpersonal or organizational relationships.
The full PDF of the study is below, but here are some of the important findings!
Types Of Cybercrimes Cybercrime is a crime related to technology, computers, and the Internet. Typical cybercrime are performed by a computer against a computer, or by a hacker using software to attack computers or networks. In Nigeria
Nigeria’s cybercrimes include cloning of websites, false representations, Internet purchase and other e–commerce kinds of fraud In law, fraud is intentional deception to secure unfair or unlawful gain (money or other assets), or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensation) or criminal law (e.g., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities), or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong. The purpose of fraud may be monetary gain or other benefits, for example by obtaining a passport, travel document, or driver's license, or mortgage fraud, where the perpetrator may attempt to qualify for a mortgage by way of false statements.
A fraud can also be a hoax, which is a distinct concept that involves deliberate deception without the intention of gain or of materially damaging or depriving a victim..
The commonest forms of cybercrimes in Nigeria are financial fraud, cloning of electronic mails, identity theft Identity theft is when someone uses another person's personal identifying information, without their permission, to commit fraud or other crimes. In both the U.K. and the United States it is the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources. (which often manifests or comes in form of emails emanating from impostors claiming to be representing certain financial institutions and requesting customers to supply certain sensitive information about their accounts to avoid their accounts being blocked, thus making transactions impossible) credit card theft, cyber harassment, fraudulent electronic mail, cyber laundering, malware Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts., and cloning of websites.
Prevalent in Nigeria include:
- Yahoo attack, which involves the use of e-mail address-harvesting devices to obtain information about the prospective victim’s e-mail address(es) from the Internet access points, with the intention of sending such scam A Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. messages;
- hacking which has to do with the perpetrator breaking the security codes of financial institutions or organizations for e-commerce,
- funds point cards and e-marketing products sites;
- software piracy (illegal reproduction and distribution of software applications Applications or Apps
An application (software), commonly referred to as an ‘app’ is a program on a computer, tablet, mobile phone or device. Apps are designed for specific tasks, including checking the weather, accessing the internet, looking at photos, playing media, mobile banking, etc.
Many apps can access the internet if needed and can be downloaded (used) either for a price or for free.
Apps are a major point of vulnerability on all devices. Some are designed to be malicious, such as logging keystrokes or activity, and others can even transport malware.
Always be careful about any app you are thinking about installing., games, and movies);
- malware dissemination,
- phishing (cloning of products and e-commerce sites/pages with the aim of defrauding unsuspecting victims);
- spoofing Spoofing occurs when a caller maliciously transmits false caller ID information to increase the likelihood that you'll answer. Scammers often spoof local numbers, private companies, government agencies and other institutions. It can also apply to pretending to be an email address, or through other media. (the process of having a computer on a network to operate like another, usually one with exceptional access rights, so as to access information on the other systems on the network);
- cyber plagiarism (stealing other peoples’ ideas via the Internet public domains);
- cyberstalking (in which the fraudster A Scammer or Fraudster is someone that engages in deception to obtain money or achieve another objective. They are criminals that attempt to deceive a victim into sending more or performing some other activity that benefits the scammer. does a follow-up on the unsuspecting victim by sharing emails and entering the chat rooms frequently with them);
- cyber defamation (in which the scam perpetrator sends e-mails containing defamatory contents to people related to the victim or posts such on a website);
- salami attack (a technique through which small amounts of assets are removed from a larger pool. The stolen assets are removed one slice at a time (Hassan et al, 2012, p. 627).
Of course, there is more, with romance scams A Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. and BEC scams having the highest priority and profitability.
What is this?
At certain times and places we come across special forms of language generated by some portion of a subset of society – kind of an anti-society; these we may call “anti-languages.” An anti-language serves to create and maintain social structure through conversation, just as an everyday language does; but the social structure is of a particular kind, in which certain elements are strongly foregrounded. This gives to the anti-language a special character in which metaphorical modes of expression are the norm; patterns of this kind appear at all levels, phonological, lexico grammatical, and semantic. The study of anti-languages offers further insights into the relation between language and social structure, and into the way in which text functions in the realization of social contexts
(Halliday, 1976: 1)
We provide this so that victims may be watchful for these terms in the course of their conversations with these criminals!
 This is a new phase in yahoo yahoo practice, following the stage of feces eating, the physical killing of human beings to boost ‘business’ by yahoo boys. From the information gathered, the pants and boxers stolen are used for voodoo or charms that boost yahoo business while the fellows whose pants/boxers are stolen die mysteriously.