2-fromagoodfriend.tex 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168
  1. % Created 2020-08-30 dim. 13:15
  2. % Intended LaTeX compiler: pdflatex
  3. \documentclass[11pt]{article}
  4. \usepackage[utf8]{inputenc}
  5. \usepackage[T1]{fontenc}
  6. \usepackage{graphicx}
  7. \usepackage{grffile}
  8. \usepackage{longtable}
  9. \usepackage{wrapfig}
  10. \usepackage{rotating}
  11. \usepackage[normalem]{ulem}
  12. \usepackage{amsmath}
  13. \usepackage{textcomp}
  14. \usepackage{amssymb}
  15. \usepackage{capt-of}
  16. \usepackage{hyperref}
  17. \author{Vivien García}
  18. \date{\today}
  19. \title{News from a Dear Friend: Stuck in Africa}
  20. \hypersetup{
  21. pdfauthor={Vivien García},
  22. pdftitle={News from a Dear Friend: Stuck in Africa},
  23. pdfkeywords={},
  24. pdfsubject={},
  25. pdfcreator={Emacs 27.1 (Org mode 9.3.7)},
  26. pdflang={English}}
  27. \begin{document}
  28. \maketitle
  29. \tableofcontents
  30. Josephine turned on her shiny new tablet, a gift from her son Frank, to
  31. consult her email: for a long time now her day were beginning in this
  32. way, a sort of consolidated ritual since she retired. And since Frank
  33. had moved to the United States, the Internet had become the most
  34. convenient and cheapest way to communicate with her son.
  35. \vspace{\baselineskip}
  36. After some initial difficulties, Josephine had become familiar with the
  37. tablet and now she was perfectly at ease with these new objects that
  38. until a short time before gave her so much apprehension.
  39. The joy she felt in seeing her grandchildren on the other side of the Atlantic in
  40. real time led her to often wonder if she could have endured that
  41. distance without the help of these new technologies.
  42. But that day a message in her box caused her great concern. It had been
  43. sent to her by Jane, Frank’s wife. Although they had always enjoyed an
  44. excellent relationship, they had sent two or three emails at most in all
  45. those years.
  46. They preferred both face-to-face live video chats! The subject of the message had nothing reassuring: “VERY URGENT”. The
  47. content was alarming:
  48. \begin{quote}
  49. Good morning !
  50. Hope not to disturb you? I am traveling to Africa and I have had a problem. I really need your help is very urgent.
  51. Contact me soon by email.
  52. Jane
  53. \end{quote}
  54. As a matter of fact Jane was often abroad for work. Josephine felt a
  55. little embarrassed, wondering why her daughter-in-law had thought of
  56. contacting her instead of contacting someone else. She tried to contact
  57. Frank on his cell phone, but he didn’t answer. Nothing strange: in the
  58. United States it was still late at night.
  59. But since the stakes were really high, Josephine replied to that strange email to find out more.
  60. The answer was not long in coming:
  61. \begin{quote}
  62. Thanks for your answer, I am in a problematic situation. I wanted to talk to you, but I didn’t want you to tell someone else, because a very shameful thing happened to me. I will tell you in more detail when I return.
  63. I was the victim of a very serious attack yesterday, in a neighborhood where they said it was dangerous, it is true. All my personal belongings were stolen: credit cards, cash, telephone, documents. I have no more money and I cannot make a withdrawal, in this situation I need your financial help very much. Could you lend me 1,500? With that I can pay the whole hotel bill, but any amount will be fine, I am in great need.
  64. I contacted the embassy this morning but they haven’t helped me yet. I think they want to check the story, they are very cautious but I can’t wait for them, that’s why I’m contacting you to help me. For now I am not reachable, I connect to the Internet from the hotel.
  65. Please send me a deposit with XXX, a cash money transfer agency that has offices here and this agency is in the post offices. For the transfer, use the information below. I have no more documents and I will not be able to withdraw the money if you do it on my behalf. You have to get it addressed on behalf of a nice person who wants to help me, but isn’t rich enough to lend me the money.
  66. Here is his personal data for sending money: Surname: XXXX, Name: XXXX, City: Lagos, Address: XXXX, Country: Nigeria
  67. Send me the references of the transfer as soon as possible (MTCN code, sender’s name, security question and answer and the amount sent) so I can collect the money.
  68. Thanks so much.
  69. \end{quote}
  70. Frightened by what she had just read, Josephine ran to the nearest post
  71. office to make the payment. Of course, she wasn’t rich but she couldn’t
  72. refuse Jane such help. As soon as she got home she received a call from
  73. her son, in panic.
  74. \vspace{\baselineskip}
  75. “What’s going on mom? I saw you called me in the middle of the night!”
  76. “It was for Jane, she’s in Africa, she wrote me that she was having
  77. problems.”
  78. “But what are you saying, mom! She’s having breakfast right here in front of my eyes!”
  79. \section*{To Understand, or How They Did It}
  80. \label{to-understand-or-how-they-did-it}
  81. Fraud 419 (also called scam 419 or Nigerian scam) was widespread on the
  82. Internet. The name 4-1-9 was derived from the article number of the
  83. Nigerian code which sanctioned this type of fraud.
  84. \vspace{\baselineskip}
  85. A “scam” usually came in the form of “spam” (message, email, and so on) in which a person
  86. claimed to have a large amount of money (millions of dollars in
  87. inheritance, bribes, money to launder, funds to be placed abroad as a
  88. result of a change in the political context and so on) and expressed the
  89. need to use an existing account to quickly transfer these alleged funds.
  90. The organizer of the scam asked the victim for help in transferring
  91. money. The victim therefore acted as figurehead for the operation, often
  92. presented as a good work in favor of persecuted politicians or people in
  93. difficulty in any case.
  94. The operation had a certain cost, which the victim was called to cover (which represented the amount defrauded),
  95. in exchange for a percentage of the money that would have been
  96. transferred. If the victim agreed, she/he was gradually asked to advance
  97. sums of money intended to cover imaginary expenses (notaries, security
  98. companies, bribes, bank transfer costs and whatever else…) before the
  99. transfer was successful.
  100. Obviously, the coveted transfer to the victim’s account never took
  101. place, while there were cases in which several payments were made to the
  102. fraudster.
  103. \vspace{\baselineskip}
  104. It was not difficult to find very common types of letters of scam 419. A
  105. typical model:
  106. \begin{quote}
  107. First of all, please keep this conversation private. We represent the top management of the Federal Government Contract Review Panel of Nigeria and we intend to safeguard some funds that have been trapped here in Nigeria. In order to assist us in the commercial negotiation, allow us to receive these funds from abroad otherwise they would be frozen…
  108. \end{quote}
  109. The many who took the hook also lost thousands of euros.
  110. \section*{The Word to the Historian}
  111. \label{the-word-to-the-historian}
  112. This kind of scam was certainly not born with the Internet.
  113. \vspace{\baselineskip}
  114. The oldest classic version of this scam is called \emph{the Spanish
  115. prisoner}. The most remote traces date back to the fourteenth century,
  116. the era of the Reconquista of the Iberian peninsula by the very Catholic
  117. Spain, then in the process of being formed.
  118. In this case, a letter was delivered to a nobleman in which the “Spanish prisoner” presented
  119. herself as a high-ranking girl kidnapped by the Moors. The nobleman was
  120. begged to deliver the ransom requested by the kidnappers to the bearer
  121. of the letter, who was obviously an accomplice in the scam. For this
  122. pious work, the nobleman was promised the hand of the prisoner…
  123. Similar versions exist in every age, among which the so-called \emph{Letters
  124. of Jerusalem} stand out, made known in the memoirs published in 1836 by
  125. the infamous Eugène-François de Vidocq, “ex” delinquent and convict in the
  126. Cayenne, who later became chief of the secret police in France in the years
  127. of the Restoration.
  128. \end{document}