🌍 Feed

✍🏿 Compose

🎧 Podcast

Nigeria’s ‘Yahoo Boys’: Conmen Or Misplaced Potential?
I'm a Content Creator.  Mar 3, 2023
Nigeria’s ‘Yahoo Boys’: Conmen Or Misplaced Potential?

If you do not know who ‘yahoo boys’ are, then either you do not live in Nigeria or you are pretending. They derived their name from the popular internet company Yahoo!, whose e-mail accounts are sometimes used by fraudsters. Apart from being a national cause for concern, internet fraud is also widely seen as the only way to make money among young Nigerians. Cybercrime is glorified in many songs, memes, and movies as an effective way to ascend past the shackles of poverty. Most times, a young boy is depicted as having lived in abject poverty until a bad friend introduces him to internet fraud. Once he abandons his morals, he becomes an instant success financially, and if he faces consequences—which they seldom do—it would be simply an arrest or madness. If you are sane, you would be asking, "What’s simple about arrest?" You see, these criminals hardly spend up to a month in jail because in real life they are bailed out by a more senior player in the game. For individuals who know this, their fear of lawful repercussions dissipates.


Yahoo boys also have their sayings that act as motivational quotes for them. Here are a few:


"No throway your garri say your neighbor dey cook rice. Him gas fit finish"


"Na person who work for night go chop for morning"


"Rain wey beat us today go wash our Benz tomorrow. Aje!"


"Hot water wey dey make egg strong dey make yam soft. Be humble"


"Trust the process. Even traffic lights go red before green go show"


Despite being seen as a bad group by many, some individuals see them as a technological labor force for the African giant. One of such people is the President-Elect of the Federal Republic of Nigeria, Bola Ahmed Tinubu who stated during a campaign rally that he would create technology hubs for the Yahoo boys if elected. He vowed:


"I will convert Yahoo boys and make them useful by converting their talents and intellects to produce chips for industries."


My topic is not based on whether he meant it or not, but rather on the content of his statement. You cannot deny that the adoption of more technology solutions is a welcome development, but with the number of Yahoo boys around, we should understand that where there is technological advancement, preparation should be made for more intelligent forms of fraud. If these criminals can be rehabilitated and trained effectively, Nigeria can be a technological force in the league of India, China, and the United States. Yahoo boys have cast a shadow on every young Nigerian male with a laptop. The police have also been accused of framing and arresting young Nigerians for internet fraud wrongfully in order to appear hard-working. Cryptocurrency enthusiasts are also seen as scammers because they make money without needing to carry a file around. 


As a young child, I grew accustomed to the sound of gunshots and having to run at unexpected moments because of the militants in my neighborhood. Many of these individuals, who caused the deaths of hundreds, are now beneficiaries of amnesty programs. The question is, can there be an amnesty program for Yahoo boys too? Or is that too unimportant an issue to address?


The declension of this young generation is facilitated by the popularity cybercrime has gained. No matter what the baby boomers say, the need to gain wealth by any means necessary will remain a desire for many. The steps we take in securing our nation and preparing for the future depend on the decisions we make concerning our young people. Are they simply criminals that need to be punished, or a misguided work force for technological advancement? Give it a thought.

Top comments(0)

SEND

You may like this too...

Chioma Okeke

Cyberattacks put your money, data, and IT equipment at risk. If a hacker gains access to your network, they can inflict significant damage with what they find.


      It's important to protect your business from cyberattacks, but with the cyber landscape evolving all the time, it can be daunting to know where to start. Here’s a guide to help small businesses navigate the world of cyber threats.



1:Secure Your wifi-networks


Businesses can protect their Wi-Fi network from breaches by hackers by changing the name of their wireless access point or router, also known as the Service Set Identifier (SSID). They can use a complex Pre-shared Key (PSK) passphrase for additional security.


2:Guard against physical theft


While businesses need to be mindful of hackers trying to breach your network, they mustn't forget that  hardware can be stolen too. Unauthorized individuals should be prevented from gaining access to business devices such as laptops, PCs, scanners, and so on. This may include physically securing the device or adding a physical tracker to recover the device in case of loss or theft. Ensure all employees understand the importance of any data that might be stored on their cell phones or laptops when out and about.


3: Ensure third parties who deal with your Business are also secured.


Be wary of other businesses such as partners or suppliers who may be granted access to your systems. Make sure they are following similar practices to you. Don’t be afraid to check before you grant access to anybody.


4: Training Employees.


Invest in cyber security trainings for the employees,for instance they can be educated with the importance of strong password and how to spot phishing emails.And also educate  them on the different types of cyber attacks and how to avoid and navigate them.


5: Deploy Anti-virus software.


Choose softwares that can protect business devices from viruses.keep antivirus updated to avoid latest cyber threats.

Businesses can also employ the service of cyber security experts to help the business remain secured.


6:Back up business files regularly.


When you cyber attacks occur,files and data can be compromised or lost/deleted.But if the business has been current in backing up it's files and data it might avoid the end of the business due to loss of important files or data .

Also choose a program that gives you the ability to schedule or automate the backup progress.


7:Limit access to sensitive data.


Restrict the number  of people in a business  environment with access to critical data to a minimum.so as to avoid the impact of bad faith actors in the business.set up strategies that will help assign important task to individuals or groups that are identifiable and can be held responsible and accountable.


    Cyber threats aren't just a problem for big corporations and governments – small businesses can be targets too. In fact, there is evidence that small businesses are more vulnerable to cyberattacks, not least because they sometimes lack the resources to protect themselves effectively.



Jun 17, 2023

Josh Strong

Cryptocurrency adoption has continued to ride and thrive like a moving train, despite the hurdles that have stood in front of the industry. On a continent that was once believed to be an ancient relic of a primitive time, cryptocurrency has turned out to be of great interest to young Africans. In Nigeria, for instance, there are different perceptions of the industry. Some believe anything that has cryptocurrency in it is a scam, while others believe it is simply a get-rich-quick scheme. Thanks to various organizations and companies that have dedicated their time to organizing events to cure myopia among the African populace, we are getting a better idea of what the industry really is about. Before we get into the topic of the day, let's know what cryptocurrency wallets are.


What Are Cryptocurrency Wallets?


Cryptocurrency wallets are digital wallets used to store digital assets like Bitcoin and Ethereum securely. According to the Coinbase website, "crypto wallets keep your private keys—the passwords that give you access to your cryptocurrencies—safe and accessible, allowing you to send and receive cryptocurrencies like Bitcoin and Ethereum. They come in many forms, from hardware wallets like Ledger (which looks like a USB stick) to mobile apps like Coinbase Wallet, which makes using crypto as easy as shopping with a credit card online."


 Cryptocurrency wallets are not like traditional wallets. Unlike a physical wallet that can be stolen or lost, a crypto wallet is a digital asset that can be easily accessed by hackers if not secured properly. They are computer or mobile software programs that employ an internet connection to connect to the blockchain network of the cryptocurrency you're making use of. Cryptocurrencies aren't just kept anywhere. They are pieces of data saved in an organized database or ledger. These pieces of information are dispersed throughout the database; nevertheless, the wallet locates all the pieces connected to your public address and adds up the total for you via the app's UI.


Using these applications, sending and receiving cryptocurrency is incredibly simple. Several options are available for sending and receiving cryptocurrency from your wallet. The standard procedure is to enter the wallet address of the receiver, select an amount to transfer, sign the transaction using your private key, add funds to cover the transaction fee, and send it.


There are two types of wallets, custodial wallets and non-custodial wallets. Custodial wallets are hosted by a third party, which might be a company that offers high-level data security technologies used by companies to protect and safeguard their data. Some crypto exchanges offer these services to their customers. Non-custodial wallets are wallets where you are responsible for securing your keys. This is the type of wallet that most cryptocurrency wallets on devices use. There are also two categories of wallets: hot and cold. A hot wallet is one that has an internet connection, while a cold wallet does not.


Now that we have basic knowledge of what crypto wallets are, let's explore some of the best practices to keep your wallet safe.
 
1. Choose a Reputable Wallet Provider: The first step in securing your cryptocurrency wallet is to choose a reputable wallet provider. Do thorough research before selecting one, and find out which providers have a strong history of safe operations. Some popular wallet providers to consider include Trust Wallet, Ledger, Trezor, and MyEtherWallet, while you could also consider saving your funds with crypto exchanges like CoinW and Binance.
 
2. Use Two-Factor Authentication: Two-factor authentication adds an extra layer of security to your wallet. It requires you to enter a code generated by an app or sent to your phone before accessing your wallet. This can help protect your wallet against hacking attempts.
 
3. Keep Your Private Keys Safe: Your private key is like the password to your cryptocurrency wallet. If someone gets hold of it, they can easily access your funds. Never share or store your private key online. Instead, store it on an offline device like a hardware wallet or a paper wallet.
 
4. Use a Strong Password: A strong password should be complex and contain a mix of uppercase and lowercase letters, numbers, and symbols. Avoid using easy-to-guess passwords like your name or birthdate. Change your password regularly and do not use it on any other online accounts.
 
5. Keep Your Wallet Software Up-To-Date: Keeping your wallet software up-to-date is important because it ensures that any security loopholes are fixed. Developers often release updates to address any vulnerabilities identified in the previous version.
 
6. Backup Your Wallet Regularly: If you lose access to your wallet or forget your password, a backup can save you. It is important to store backups of your wallet on other devices in case your primary device is damaged or lost.
 
7. Be Cautious of Phishing Scams: Phishing scams are common in the cryptocurrency space. Fraudsters often send fake emails and messages asking for your private keys or other sensitive information. Always verify the authenticity of any email or message before responding.
 
In conclusion, securing your cryptocurrency wallet requires a bit of effort, but it is worth it to protect your assets. By following the best practices outlined above, you can help keep your crypto wallet safe from hackers and other types of security breaches.

Jun 15, 2023

Faith Atabo

Last month, I got a message from my friend and it states " Faith turn off your location on Twitter, you teach us  Cybersecurity but here you are making the same mistake " 🥴


Something as little as "turning off your location" when you post on your social media platforms can save you from potential threats


Turning off your location on your social media platform is a quick and easy step 


👉🏻 First, go to your profile page on your social media platform 

👉🏻click on settings

👉🏻select privacy and safty

👉🏻select location 

👉🏻select Disabled 


vula! you are all done. This procedure may varry from app to app, but it is really easy to navigate .

Go ahead and "turn off your location"


cheers!



Apr 11, 2023

Faith Atabo

As the popularity of Cryptocurrency increases - a new form of malware (malicious soft) has emerged called Cryptojacking.


What is Cryptocurrency? : They are digital currency (e.g. Bitcoin, Ethereum) that can be used in exchange for goods, services, and even real money. Cryptocurrency can be purchased or earned through “mining”.  


The term Mining, involves using a computer to solve complex, encrypted math equations in return for a piece of cryptocurrency.


What is Cryptojacking: Cryptojacking occurs when cybercriminals use a victim’s computer, tablet, or mobile device to mine for cryptocurrencies without their knowledge. Unlike most other types of malware, cryptojacking scripts do not normally cause damage to victims’ data.  However, Cryptojacking does slow down a victim’s computer and internet connection and can cause battery drain.



How Does Cryptojacking occurs?


  • Malicious Applications: Hackers trick victims into loading crypto-mining code onto their computers, through phishing-like tactics. Victims receive a legitimate-looking email that encourages them to click on a link that installs crypto mining software that runs in the background.
  • Malicious Websites (Drive-by cryptojacking): Victims visit a site that runs a malicious script or is hosting a malicious advertisement. The script can do one of two things:
    • If the website is open, the user’s computer can be used to actively “mine” for cryptocurrency. This "Drive-by" attack can compromise any device with a web browser.
    • The website can use a script to install a malicious application without your knowledge
  • Github: GitHub is a web-based platform for collaborative software development (software can use code shared on GitHub).  Some Hackers will take code that is shared and hide cryptojacking malware within a fork of the project.

How Can I  Prevent Cryptojacking Malware

  • Here are some helpful preventive measures 
    • Keep all your software and devices up-to-date with the latest patches and fixes. Many attacks exploit known vulnerabilities in existing software.
    • Only install software from trusted sources.
    • Avoid suspicious websites (e.g. torrentingshortened URLs) that can host these malicious scripts.

How Can I  Detect and Recover from Cryptojacking

  • Symptoms of cryptojacking can include unexpected high processor usage (indicated by sluggish or slow response times) overheating of your device, and poor battery performance
  • If you think you are victim of Cryptojacking close all of your browser windows to exit your browser, remove any browser extensions, and run an antivirus scan. If an NJIT owned PC, open the McAfee Endpoint Security application and select “Scan System”.   Otherwise, scan your computer using your installed virus protection.

Remember to always stay ALERT ‼️ 

Apr 3, 2023

Raphael Obike

Technology has truly improved humanity since its existence but an aspect of it that humanity is not ready for causes more harm than good.


Let's travel to Nigeria, in February 2022 the central bank passed a certain rule that will help eliminate the flow of cash and promote cashless society. This plan was rejected by her citizens, banks were closed down, it resulted in unrest in the country, and of course destruction of lives and properties followed.


It's very important to note that ignorance is a major hindrance to whatever you want to do. In some rural communities they can't even use the ATM machine, to even do a mobile transfer in the so-called urban areas is a big deal, as there might be an unstable network.

Imagine having these issues and you want to switch to a fully cashless society in a place where people are yet to fully understand the traditional way of doing things, it will yield disaster.


For this cashless society to be effective, there should be proper education of the public, and also we should be able to trust the system in the sense that it is transparent, can be held accountable and there should be zero or very minimal network glitches.

Without the aforementioned, this will not be possible, even though the government might want to force it on people but it won't really be effective.


A cashless society definitely has both positive and negative effects on people.

But for now, I guess we are not ready.

Mar 29, 2023

Faith Atabo

For my cyb ethusisast, Here are 9 soft ware you can install for free!

1.For Operating System- Kali Linux 


2. Email Security -Deshashed 


3.Web Hacking -Burp suite


4.Port Scan-Nmap


5.Training -Hack the box


6.Data Mordification-Cyber chef


7.Intrusion Detection System-Snort


8.Firewall/Router-Pfsense


9.Debugging-Ghidra 

Mar 28, 2023

Faith Atabo

Here are 8 possible ways you can be inviting a cyberattack 


1. Invisible systemic risk

Businesses, Organizations and Individuals make decisions every day that negatively impact their security readiness: for example, refusing to shut down a server for proper patching or choosing to keep working on old hardware and software to save budget. These unreported decisions lead to a false sense of security and increase the likelihood and severity of an incident.


2. Cultural disconnect

Non- IT folks still see Cybersecurity as something that is “just there,” like air or water. This means it isn’t considered a part of business decisions


3. Throwing money at the problem

You can’t buy your way out — no matter what you spend, you won’t be perfectly protected against cyberattacks. By trying to stop every risky activity, you will likely damage your organization’s ability to function.


4. Security as “defender”

If security officers are treated as (and act as) defenders of the organization, it creates a culture of no. For example, they might block the release of a critical application due to security concerns without considering the business outcomes the application supports.


5. Broken accountability

Accountability should mean that a decision to accept risk is defensible to key stakeholders. If accountability means that someone will get fired if something goes wrong, no one will engage.


6. Poorly formed risk appetite statements

Organizations create generic high-level statements about their risk appetite that don’t support good decision making. Avoid promising to only engage in low-risk activities, as this can create invisible systemic risk


7. Unrealistic social expectations

When a headline-grabbing security incident happens, society just wants heads to roll. While this isn’t fair, it’s the result of decades of treating security as a black box. No one understands how it really works and as a result, when an incident does occur, the assumption is that someone must have made a mistake.

However, society is not going to change until organizations and IT departments start treating and talking about security differently.


8. Lack of transparency

Some boards and senior executives simply do not want to hear or acknowledge that security isn’t perfect. Board presentations are filled with good news about the progress that has been made in security, with little or no discussion about gaps and opportunities for improvement

Mar 21, 2023

Josh Strong

As the tentacles of the cryptocurrency and blockchain industries spread across Africa, a major concern among users is system security. Despite being hailed as a very secure system, several hacks have made it quite obvious that the blockchain can indeed be compromised. Hence, it has become necessary for researchers and experts to find sustainable security solutions to impede the operations of cyber attackers. As a person who has personally witnessed cryptocurrency exchanges run on blockchain technology decimated by hackers, I could not sit back and wait for the next shrapnel to leave me financially impaled. I spent my time searching for the next big lacuna in the system, and as expected, I found one. Thanks to the presence of quantum computers, it can be pointed out that blockchain systems may once again be vulnerable to security attacks. This is however due to the increased computational capability of these computers, which led me to ask the question.


What Are Quantum Computers?


Quantum computers are machines that utilize the fundamentals of quantum mechanics to perform transactions and store data. They can perform calculations at an exponential rate when compared to normal computers. This is because, where classical computers encode data in bits of os and 1s, quantum computers use quantum bits (qubit) as the basic unit of memory. Though advantageous on outstanding levels, they could render traditional encryption methods ineffective, and as such, they left a vacuum for another wave of hacks.


Then Came Quantum Encryption


According to a paper written by J. Aditya and P. Shankar Rao titled Quantum Cryptography, quantum encryption rests on two pillars of 20th century quantum mechanics: the Heisenberg uncertainty principle and photon polarization. In order to deliver encrypted data, these photons serve as a one-time pad. To put it another way, quantum encryption is a way to encrypt data utilizing the principles of quantum mechanics. This is currently thought to be unbreakable by users of quantum computers. The cornerstone of this encryption is the idea that a particle's properties are altered by any attempt to measure or observe it. This implies that if two parties use quantum encryption to convey information to one another, the message will be altered, and the parties will be aware of any wiretap attempt.


Key Benefits of Quantum Encryption in Blockchain Security

  • Quantum encryption can render it impossible for hackers with sufficient computational power to decrypt data or fabricate transactions on the blockchain.
  • Quantum encryption makes sure that, should a hacker attempt to monitor communication in a blockchain system, the information will be altered and the recipient informed of the breach.
  • In blockchain systems, quantum encryption offers secure key distribution techniques that enable parties to distribute keys in a way that ensures only those people who are permitted can access the data.
  • Blockchain systems can also benefit from increased scalability, which lowers the amount of computing power required to protect data.


Conclusion


Blockchain security will unquestionably benefit from quantum encryption technology. It provides a level of protection never before seen and is resistant to attacks that may use quantum computing. Acceptance and integration will build a more trust-inspiring crypto ecosystem. With this, I can finally take a much needed breather and enjoy the tropical rains that have already swung in.


How awesome is this? Kindly leave a like or comment below. I write lots of other articles right here on Wazoplus. You can also find me on Twitter or LinkedIn.

Mar 21, 2023

Chioma Okeke

 

         Currently in Africa there are so many e-commerce platforms or site's one can use in purchasing different types of products and services.

    There is need for those who want to make online purchases to know the most popular and best platforms to explore.So i will list out these platforms and the necessary knowledge  or things to know about them.


Major E-commerce Platforms in Africa


1.Jumia

     Launched in 2012 in Nigeria, the site has solidified a footprint in over 23 African countries, with a network of over half a million sellers since its inception. Jumia has managed to create a stellar reputation for being a hub for products and services spanning across the retail, food and hospitality, talent recruitment, concierge and the hotel and catering industries. Apart from servicing the needs of consumers and businesses, Jumia has also been upskilling and aiding employment for many Africans who are qualified in areas such as Engineering, IT and online marketing and web development.

         

      Jumia operates in over 10 African countries including Egypt, Tunisia, Uganda, Kenya, Nigeria, and more. It is one of the largest ecommerce companies in Africa. Products sold here such as décor items, groceries, clothes, electronics, books, health and beauty products must be new, legal, and of good quality.

       Jumia: Headquartered is in Nigeria, Jumia's average monthly website traffic is 32 million.



2.Konga E-commerce

       Konga is one of the best ecommerce site in Nigeria dealing in a wide range of products such as home décor, electronics, fashion and beauty products. As a seller on Konga, you decide your pricing, preferred shipping method, and the payment mode.


            Konga has come a long way since its humble beginnings in 2012 as a Lagos-only e-commerce site that specialised in baby and beauty care. The online platform has morphed into a major online retailer, often dubbed “The Amazon of Africa.” In 2015, Konga joined forces with leading Nigerian banks to launch KongaPay, a safe and convenient online payment method to tackle the issue of trust in Africa when it came to online payments.


The online marketplace was one of the first in Africa to create a system of payment that was integrated with world banks – an innovation that uses click system that eliminated the sharing of sensitive information during payments.


With a backing from the South African media giant, Naspers, Konga is now a major player in the e-commerce space. In 2014, Naspers, which has a 50% stake in Konga, invested US $50 million in the online store.


3.Kilimall

              Kilimall is one of the best ecommerce platforms that has gained popularity in Kenya, Uganda, and Nigeria. However, most of its traffic (79%) is from Kilimall in Kenya. Products for sell include phones, tablets, fashion, electronics, home appliances, baby products, and more.

       Kilimall, Based in Kenya, Kilimall's average monthly site visits is 500, 000.


4.Afrikrea

        Afrikrea is an online African marketplace dealing in African fashion, arts and crafts. The products available on the platform include fine art, fabrics, jewelry, bags, etc. It serves clients in over 100 countries globally and has over 5000 shops. Afrikrea online store has over 250,000 visitors every month.



5.Zando

Zando is a South African ecommerce platform where sellers can sell beauty products, fashion brands, homeware, etc. It receives around 3.5 million visitors every month.


6.TAKEALOT

       South Africa’s Takealot is the go-to online retailer for the shopper that seeks a convenient and simplified online buying and user experience. The site has been around for over a decade, having been established in the year 2002. Its broad catalogue and variety of products in entertainment gives it an impressionable edge. Customers can shop anything from books to games, computers and TVs.


Part of what makes Takealot an e-commerce success story is that the online retailer strives to provide its customers with the very latest products in the market, coupled with up-to-date product specification.


In April 2017, Takealot scored a significant investment of over US $69 million from Naspers, one of Africa’s biggest digital companies. This came after the online retailer received US $100 million investment from investment firm Tiger Global Management in 2014. Naspers boasts a 53,5% stake in Takealot, while Tiger Global owns about 34%.

       Takealot.com in South Africa


7.BIDORBUY

 


Established in 1999, South Africa’s online store Bidorbuy is one of the oldest online marketplaces in Africa. What makes the site unique is that buyers don’t only get to purchase what they want, but they can also make a bid for products, functioning as an online auction. The site provides a platform to facilitate trade between buyers and sellers. Previously owned items such as antiques and collectables are some of the most popular on Bidorbuy, making up 40% of all items sold. Other second-hand products shoppers prefer include high-end DSLR cameras and lenses, laptops, books, as well as video games.


Over the years, Bidorbuy has made several acquisitions of South African online businesses. These include popular sites such as online jobs portal, Jobs.co.za and e-commerce company uAfrica.com.


Takealot.com in South Africa


8.Souq in Egypt

 

     Souq was originally founded in 2005 by Syrian entrepreneur Ronaldo Mouchawar, as an eBay-style auction site. It transitioned to an Amazon-style ecommerce model from 2010 and became the largest ecommerce platform in the Arab world, serving the UAE, Saudi Arabia and Egypt. In 2017, Souq was acquired by Amazon.


Souq has been rebranded as Amazon in the UAE and Saudi Arabia but continues to use the Souq name in Egypt, where it has almost ten million visits per month. It sells a wide range of items including electronics, appliances, homewares, groceries, fashion, books, toys and fitness products. Souq is a retailer in its own right as well as a marketplace. The website currently retains the Souq design and branding, which is similar in style to Amazon.


Souq Egypt retains its own seller registration system. All orders are shipped by Souq, not the seller, so businesses need to provide a warehouse or store address in Egypt where the courier can collect orders. Commission fees vary from 5-20%


Souq also offers a fulfillment service, called “Fulfilled by Souq”, which is very similar to Amazon FBA. Products that are fulfilled by Souq have a higher ranking in search, higher priority for the Buy Button, and qualify for customer pickup and international shipping. They can also participate in “White Friday”, Souq’s equivalent to Black Friday.


Souq is also covered in Online Marketplaces in the Middle East: It’s Only Just Getting Started.



         Conclusively,these different e-commerce sites or platforms are most popularly used in some  African countries more than others, and also most at times these platforms offer a particular commodity or services better than others.

    So the knowledge of these different e-commerce sites and platforms will help consumers and e-commerce vendors to know  which platform or site is better and more preferable for whatever purpose they want to use an e-commerce service.


  

Mar 19, 2023

Josh Strong

Barrister Fred Ajudua, who was supposedly one of the top fraudsters of the millennial years, is certainly unknown to Gen Z kids like me. The initial group of “yahoo boys” from the year 2000 was more interested in mailing phony messages requesting payment in order to claim lottery winnings. The second and third groups of yahoo boys from 2003 to 2007 dealt with online dating scams and preferred to maintain their anonymity over showing off their money like the current group does. The internet scammers we see now are the latest group of yahoo boys from 2010. Some of these youngsters have not only gone into comprising emerging technologies like blockchain and cryptocurrency, black magic, charms, and rituals have been added by some of them out of greed and desperation for money. But the man we are discussing today has been termed by the Sahara Reporters as a ‘serial fraudster’. Like the current group of cyber criminals, he took advantage of the technology that was available to him at the time in defrauding people of their money. In examining the existence of cyber crime in Nigeria, let’s trace the fruit back to one of its oldest branches. Say hello to Fred Ajudua, the man, the myth and the legend.


Many allegations of fraud and scamming have been brought against Nigerian barrister Fred Ajudua. Ajudua was born on June 14, 1961, in Oshimili North LGA of Delta State, Nigeria. His father, Chief Victor Ajudua, was a former member of the House of Representatives. In 1985, Ajudua was called to the Nigerian Bar after completing his legal studies at the University of Benin. He began his legal career in Lagos, where he soon established himself as a savvy and accomplished practitioner. Influential businessmen, politicians, and famous personalities were among his clients. But, he quickly got embroiled in a number of fraudulent activities that would damage his reputation and land him in jail multiple times. His most well-known scam was the "Advance Fee Scam," sometimes referred to as the "419 scam," in which he and his accomplices would demand victims pay up-front fees in exchange for a sizable sum of money that didn't exist.


R. Edward, an American businessman, was one of Ajudua's victims. Ajudua duped Edward out of $1.69 million by telling him he was heir to a portion of a $20 million inheritance from a deceased Russian oil merchant. In another scam, he and his accomplices scammed Lt.-Gen. Ishaya Bamaiyi, the former Chief of Army Staff, of $8.4 million while pretending to be working to have him released from custody.

Ajudua was initially detained in 2003 for his part in the 419 fraud and then released on bail. He was imprisoned for four years before being found not guilty in 2009 by the Lagos High Court. He was detained once more in 2013 and faced a 28-count charge that included forgery, impersonation, and conspiracy to obtain money under false pretenses. In what was known as the "Bamaiyi fraud case," he was accused of defrauding a former Chief of Army Staff of $1.69 million. In 2015, after being imprisoned once more, he was released on bond. The investigation is underway.


Barrister Fred Ajudua’s legal battles have been a source of controversy in Nigeria, with some arguing that he has been unfairly persecuted and denied justice. Others, however, see him as a symbol of the corrupt practices that have plagued Nigeria for many years. You may argue that he isn't a cybercriminal, but since he exploited the technology that was available at the time to defraud people, I believe that this classification is accurate.


Did you know Fred Ajudua before now? Join the conversation by leaving a comment below.  I write lots of other articles right here on Wazoplus. You can also find me on Twitteror LinkedIn

Mar 17, 2023
Home
Podcasts
Bookmarks
You