645
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Cybercriminal Networks and Operational Dynamics of Business Email Compromise (BEC) Scammers: Insights from the “Black Axe” Confraternity

ORCID Icon
Received 10 Nov 2023, Accepted 01 May 2024, Published online: 14 May 2024

References

  • Aborisade, R. A. 2023. “Yahoo Boys, Yahoo Parents? An Explorative and Qualitative Study of parents’ Disposition Towards children’s Involvement in Cybercrimes.” Deviant Behavior 44(7):1102–20. doi:10.1080/01639625.2022.2144779
  • Agunbiade, M. O., and T. Ayotunde. 2011. “Spirituality in Cybercrime (Yahoo Yahoo) Activities Among Youths in South West Nigeria.” Pp. 357–80 in Youth Culture and Net Culture: Online Social Practices, edited by E. Dunkel, G.-M. Franberg and C. Hallgren. Hershey: IGI Global.
  • Akanle, O. and B. R. Shadare. 2019. “Yahoo-Plus in Ibadan: Meaning, Characterization and Strategies.” International Journal of Cyber Criminology 13 (2): 343–357.
  • AML Intelligence. (2024). News: Irish Authorities Detain Suspected Leader of Black Axe Gang in Connection with Money Laundering Investigation. Retrieved from https://www.amlintelligence.com/2024/01/irish-authorities-detain-suspected-leader-of-black-axe-gang/#:~:text=Detectives%20from%20Irish%20authorities%20have,“person%20of%20major%20interest
  • Aransiola, J. O. and S. O. Asindemade. 2011. “Understanding Cybercrime Perpetrators and the Strategies They Employ in Nigeria.” Cyberpsychology, Behavior, and Social Networking 14(12):759–63. doi:10.1089/cyber.2010.0307
  • Australian Government, Department of Foreign Affairs and Trade (DFAT). (2020). DFAT Country Information Report: Nigeria. Retrieved from https://www.dfat.gov.au/sites/default/files/dfat-country-information-report-nigeria-3-december-2020.pdf
  • BBC (2020). Helen Oyibo. Nigeria’s Campus Cults: Buccaneers, Black Axe, and Other Feared Groups. Retrieved from https://www.bbc.co.uk/news/world-africa-52488922
  • BBC (2021a). Black Axe: Leaked Documents Shine Spotlight on Secretive Nigerian Gang. Retrieved from https://www.bbc.co.uk/news/world-africa-59630424
  • BBC (2021b).Hushpuppi: The Instagram Influencer and International Fraudster. Retrieved from https://www.youtube.com/watch?v=mXA7rcVBslU
  • Bloomberg (2021).“The Fall of the Billionaire Gucci Master,” Retrieved from https://www.bloomberg.com/features/2021-hushpuppi-gucci-influencer/
  • Braun, V. and V. Clarke. 2006. “Using Thematic Analysis in Psychology.” Qualitative Research in Psychology 3(2):77–101. doi:10.1191/1478088706qp063oa
  • Broadhurst, R., P. Grabosky, M. Alazab, B. Bouhours, and S. Chon. 2014. “Organizations and Cybercrime: An Analysis of the Nature of Groups Engaged in Cybercrime.” International Journal of Cyber Criminology 8(1):1–20. doi:10.2139/ssrn.2345525
  • Butler, S. 2022. “The Philosophy of Bitcoin and the Question of Money.” Theory, Culture & Society 39(5):81–102. doi:10.1177/02632764211049826
  • Button, M., B. Hock, and D. Shepherd. 2022. Economic Crime: From Conception to Response. London: Routledge.
  • Callon, M. 1986. “The Sociology of an Actor-Network: The Case of the Electric Vehicle.” Pp. 19–34 in Mapping the Dynamics of Science and Technology: Sociology of Science in the Real World, edited by M. Callon, J. Law, and A. Rip. London: Palgrave Macmillan UK.
  • Campana, P. 2016. “Explaining Criminal Networks: Strategies and Potential Pitfalls.” Methodological Innovations. 9:1–10. doi:10.1177/2059799115622748
  • Campana, P. and F. Varese. 2012. “Listening to the Wire: Criteria and Techniques for the Quantitative Analysis of Phone Intercepts.” Trends in Organized Crime 15(1):13–30. doi:10.1007/s12117-011-9131-3
  • Carter, E. 2021. “Distort, Extort, Deceive and Exploit: Exploring the Inner Workings of a Romance Fraud.” The British Journal of Criminology 61(2):283–302. doi:10.1093/bjc/azaa072
  • CBC News (2015). Romance Scam Victim ‘Bled dry’ As Con Artists Steal $1.3M, Retrieved from https://www.cbc.ca/news/canada/toronto/romance-scam-fbi-1.3284484
  • Cohen, C. 2023. “The “Nigerian mafia” Feedback Loop: European Police, Global Media and Nigerian Civil Society.” Trends Organised Crime 26(4):340–57. doi:10.1007/s12117-022-09471-0
  • Cretu-Adatte, C., J. W. Azi, O. Beaudet-Labrecque, H. Bunning, L. Brunoni, and R. Zbinden. 2024. “Unravelling the Organisation of Ivorian Cyberfraudsters: Criminal Networks or Organised Crime?” Journal of Economic Criminology 3:100056–59. doi:10.1016/j.jeconc.2024.100056
  • Cross, C. and R. Gillett. 2020. “Exploiting Trust for Financial Gain: An Overview of Business Email Compromise (BEC) Fraud.” Journal of Financial Crime 27(3):871–84. doi:10.1108/JFC-02-2020-0026
  • CrowdStrike (2018). Intelligence Report: CSIR – 18004 Nigerian Confraternities Emerge As Business Email Compromise Threat, Retrieved from https://www.crowdstrike.com/wpcontent/uploads/2020/03/NigerianReport.pdf
  • Cyware (2019). Cybercriminals Leverage Google Translate to Hide Their Phishing Sites. Retrieved from https://cyware.com/news/cybercriminals-leverage-google-translate-to-hide-their-phishing-sites-644caf13
  • Décary-Hétu, D. and B. Dupont. 2012. “The Social Network of Hackers.” Global Crime 13(3):160–75. doi:10.1080/17440572.2012.702523
  • Ellis, S. 2016. This Present Darkness: A History of Nigerian Organized Crime. Oxford: Oxford University Press.
  • Federal Bureau of Investigation, FBI, (2018). “Business Email Compromise Contributes to Large Scale Business Losses Nationwide,” Retrieved March 1, 2022, from https://www.ic3.gov/Media/Y2018/PSA180611
  • Foley, S., J. R. Karlsen, and T. J. Putniņš. 2019. “Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed Through Cryptocurrencies?” The Review of Financial Studies 32(5):1798–853. doi:10.1093/rfs/hhz015
  • Grabosky, P. N. 2001. “Virtual Criminality: Old Wine in New Bottles?” Social & Legal Studies 10(2):243–49. doi:10.1177/a017405
  • Granovetter, M. 1973. “The Strength of Weak Ties.” American Journal of Sociology 78(6):1360–80. doi:10.1086/225469
  • Granovetter, M. 1983. “The Strength of Weak Ties: A Network Theory Revisited.” Sociological Theory 1:201–33. doi:10.2307/202051
  • Hall, T., B. Sanders, M. Bah, O. King, and E. Wigley. 2021. “Economic Geographies of the Illegal: The Multiscalar Production of Cybercrime.” Trends in Organized Crime 24(2):282–307. doi:10.1007/s12117-020-09392-w
  • Hall, T. and V. Scalia. 2019. “Thinking Through Global Crime and Its Agendas.” in Pp. 1–10 in A Research Agenda for Global Crime, edited by T. Hall and V. Scalia. Northampton: Edward Elgar Publishing
  • Hall, T. and R, Yarwood. 2024. New geographies of crime? Cybercrime, southern criminology and diversifying research agendas. Progress in Human Geography. doi: 10.1177/03091325241246015.
  • Ibrahim, S. 2016. “Social and Contextual Taxonomy of Cybercrime: Socioeconomic Theory of Nigerian Cybercriminals.” International Journal of Law, Crime and Justice. 47:44–57. doi:10.1016/j.ijlcj.2016.07.002
  • Ibrahim, S. (2017). Causes of Socioeconomic Cybercrime in Nigeria. Paper presented at IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), Vancouver, BC, Canada, pp. 1–9. 10.1109/ICCCF.2016.7740439
  • Ibrahim, S. (2018). “The View That ‘419’ Makes Nigeria a Global Cybercrime Player Is Misplaced.” The Conversation, Retrieved from https://theconversation.com/the-view-that-419-makes-nigeria-a-global-cybercrime-player-is-misplaced-73791
  • Immigration and Refugee Board of Canada (2023). Black Axe. Retrieved from https://irb.gc.ca/en/country-information/rir/Pages/index.aspx?doc=458713&pls=1
  • Latour, B. (1997). On Actor-Network Theory. A Few Clarifications Plus More Than a Few Complications. Retrieved November 10, 2018, from http://www.bruno-latour.fr/sites/default/files/P-67,20
  • Latour, B. 2017. “On Actor-Network Theory. A Few Clarifications, Plus More Than a Few Complications.” Philosophical Literary Journal Logos 27(1):173–97. doi:10.22394/0869-5377-2017-1-173-197
  • Lavorgna, A. 2019. Cybercrimes: Critical Issues in a Global Context. London: Palgrave Macmillan.
  • Lavorgna, A. 2020. “Organized Crime and Cybercrime.” in Pp. 117–34 in The Palgrave Handbook of International Cybercrime and Cyberdeviance, edited by T. Holt and A. Bossler. Cham: Palgrave Macmillan
  • Lavorgna, A. and A. Sergi. 2014. “Types of Organised Crime in Italy. The Multifaceted Spectrum of Italian Criminal Associations and Their Different Attitudes in the Financial Crisis and in the Use of Internet Technologies.” International Journal of Law, Crime and Justice 42(1):16–32. doi:10.1016/j.ijlcj.2013.11.002
  • Lavorgna, A. and A. Sergi. 2016. “Serious, Therefore Organised? A Critique of the Emerging “Cyber-Organised crime” Rhetoric in the United Kingdom.” International Journal of Cyber Criminology 10(2):170–87.
  • Lazarus, S. 2018. “Birds of a Feather Flock Together: The Nigerian Cyber Fraudsters (Yahoo Boys) and Hip Hop Artists.” Criminology, Criminal Justice, Law & Society 19(2):63–80.
  • Lazarus, S. 2019. “Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.” Religions 10(3):146. doi:10.3390/rel10030146
  • Lazarus, S. (2020). Establishing the Particularities of Cybercrime in Nigeria: Theoretical and Qualitative Treatments (Doctoral dissertation, University of Portsmouth).
  • Lazarus, S. 2021. “Demonstrating the Therapeutic Values of Poetry in Doctoral Research: Autoethnographic Steps from the Enchanted Forest to a PhD by Publication Path.” Methodological Innovations 14(2):1–11. doi:10.1177/20597991211022014
  • Lazarus, S. 2022. “Just Married: The Synergy Between Feminist Criminology and the Tripartite Cybercrime Framework.” International Social Science Journal 69(231):15–33. doi:10.1111/issj.12201
  • Lazarus, S. (2023). Social Media Users Compare Internet Fraudsters to Nigerian Politicians. Africa at LSE. Retrieved from https://blogs.lse.ac.uk/africaatlse/2023/02/02/social-media-users-compare-internet-fraudsters-to-nigerian-politicians/?_gl=1*1ysrg8j*_ga*MTc4NDYzMDk2My4xNjk4MTUwNzQw*_ga_LWTEVFESYX*MTcxMDc3MjkwOC4yNTIuMC4xNzEwNzcyOTEwLjU4LjAuMA
  • Lazarus, S. and M. Button. 2022. “Tweets and Reactions: Revealing the Geographies of Cybercrime Perpetrators and the North-South Divide.” Cyberpsychology, Behavior, and Social Networking 25(8):504–11. doi:10.1089/cyber.2021.0332
  • Lazarus, S., M. Button, and A. Adogame. 2022. “Advantageous Comparison: Using Twitter Responses to Understand Similarities Between Cybercriminals (“Yahoo Boys”) and Politicians (“Yahoo men”).” Heliyon 8(11):e11142. doi:10.1016/j.heliyon.2022.e11142
  • Lazarus, S. and G. U. Okolorie. 2019. “The Bifurcation of the Nigerian Cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) Agents.” Telematics and Informatics. 40:14–26. doi:10.1016/j.tele.2019.04.009
  • Lazarus, S., O. Olaigbe, A. Adeduntan, E. T. Dibiana, and G. U. Okolorie. 2023a. “Cheques or Dating Scams? Online Fraud Themes in Hip-Hop Songs Across Popular Music Apps.” Journal of Economic Criminology 2(100033):1–17. doi:10.1016/j.jeconc.2023.100033
  • Lazarus, S., J. M. Whittaker, M. R. McGuire, and L. Platt. 2023b. “What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).” Journal of Economic Criminology 2(100013):100013–17. doi:10.1016/j.jeconc.2023.100013
  • Leukfeldt, E. R. 2014. “Cybercrime and Social Ties.” Trends in Organized Crime. 17:231–49. doi:10.1007/s12117-014-9229-5
  • Leukfeldt, E R, and T J, Holt. 2020. Examining the Social Organization Practices of Cybercriminals in the Netherlands Online and Offline. Int J Offender Ther Comp Criminol 64(5):522–538. doi: 10.1177/0306624X19895886.
  • Leukfeldt, E. R., E. R. Kleemans, and W. P. Stol. 2017a. “Cybercriminal Networks, Social Ties and Online Forums: Social Ties versus Digital Ties within Phishing and Malware Networks.” The British Journal of Criminology 57(3):704–22. doi:10.1093/bjc/azw009
  • Leukfeldt, E. R., E. R. Kleemans, and W. P. Stol. 2017b. “Origin, Growth and Criminal Capabilities of Cybercriminal Networks. An International Empirical Analysis.” Crime, Law and Social Change 67(1):39–53. doi:10.1007/s10611-016-9663-1
  • Leukfeldt, E. R., E. R. Kleemans, and W. P. Stol. 2017c. “A Typology of Cybercriminal Networks: From Low-Tech All-Rounders to High-Tech Specialists.” Crime, Law and Social Change 67(1):21–37. doi:10.1007/s10611-016-9662-2
  • Levi, M. 2008. “Organized Fraud and Organizing Frauds: Unpacking Research on Networks and Organization.” Criminology & Criminal Justice 8(4):389–419. doi:10.1177/1748895808096470
  • Levi, M. 2017. “Organized Fraud and Organizing Frauds: Unpacking Research on Networks and Organization.” Pp. 309–40 in Transnational Financial Crime, edited by Nikos, P. London: Routledge.
  • Longgreads. 2023. Inside the World of Nigerian “Yahoo Boys”. https://longreads.com/2023/07/11/inside-the-world-of-nigerian-yahoo-boys-atavist-excerpt/
  • Lusthaus, J., E. Kleemans, R. Leukfeldt, M. Levi, and T. Holt. 2023. “Cybercriminal Networks in the UK and Beyond: Network Structure, Criminal Cooperation and External Interactions.” Trends in Organized Crime. 1–24. doi:10.1007/s12117-022-09476-9
  • Marquart, J. W., and R., Alan Thompson. 2024. Exploring relation fraud, murder,and the Fraud Triangle. Journal of Economic Criminology 4: 100061. doi: 10.1016/j.jeconc.2024.100061.
  • Meyers, A. 2018. “Not Your Fairy-Tale Prince: The Nigerian Business Email Compromise Threat.” Computer Fraud & Security 2018(8):14–16. doi:10.1016/S1361-3723(18)30076-9
  • Neo Black Movement of Africa (NBM). 2022. NBM Disassociates Self from July 7 Celebration. Retrieved https://nbmofafrica.org/nbm-disassociates-self-from-july-7-celebration/
  • Nguyen, T. and H. T. Luong. 2021. “The Structure of Cybercrime Networks: Transnational Computer Fraud in Vietnam.” Journal of Crime and Justice 44(4):419–40. doi:10.1080/0735648X.2020.1818605
  • Ogunleye, Y. O., U. A. Ojedokun, and A. A. Aderinto. 2019. “Pathways and Motivations for Cyber Fraud Involvement Among Female Undergraduates of Selected Universities in South-West Nigeria.” International Journal of Cyber Criminology 13(2):309–25. doi:10.5281/zenodo.3702333
  • Okosun, O. and U. Ilo. 2022. “The Evolution of the Nigerian Prince Scam.” Journal of Financial Crime 30(6):1653–63. doi:10.1108/JFC-08-2022-0185
  • Okpa, J. T., B. O. Ajah, O. F. Nzeakor, E. Eshiotse, and T. A. Abang. 2022. “Business E-Mail Compromise Scam, Cyber Victimization, and Economic Sustainability of Corporate Organizations in Nigeria.” Security Journal 36(2):350–72. doi:10.1057/s41284-022-00342-5
  • The Register (2018). How to Make Your Very Own Google HQ for a Phishing Scam. Retrieved from https://www.theregister.com/2018/05/01/google_maps_url/
  • Reiner, R. 2010. The Politics of the Police. Oxford: Oxford University Press.
  • Reiner, R. 2016. Crime, the Mystery of the Common-Sense Concept. New York: John Wiley and Sons.
  • Harper’s Magazine. (2019). Sean Williams. The Black Axe: How a Pan-African Freedom Movement Lost Its Way. Retrieved from https://harpers.org/archive/2019/09/the-black-axe-nigeria-neo-black-movement-africa/
  • Sergi, A. 2013. “Structure Vs Activity: Two Models to Fight Organised Crime and Their Criticisms.” Policing: A Journal of Policy and Practice. doi:10.1093/police/pat033
  • Sergi, A. and L. Storti. 2021. “Shaping Space. A Conceptual Framework on the Connections Between Organised Crime Groups and Territories: An Introduction to the Special Issue on ‘Spaces of Organised Crime’.” Trends in Organized Crime 24(2):137–51. doi:10.1007/s12117-021-09415-0
  • Shaw, C. R. 2013. The Jack-Roller: A Delinquent Boy’s Own Story Original work published 1930. Chicago: University of Chicago Press.
  • Simmel, G. 1964. Conflict and the Web of Group-Affiliations. New York: The Free Press.
  • Surajo, A. Z. and A. H. M. Z. Karim. 2017. “An Assessment of Black Axe Confraternity Cult in Nigeria: Its Impact on the University Educational System.” South Asian Anthropologist 17(1):1–7.
  • Thomas, W. I. 1923. The Unadjusted Girl. Boston: Little Brown and Company.
  • Toronto Sun. 2018. Toronto Romance Scam Linked to Global Fraud Case. Retrieved from https://torontosun.com/2015/10/22/toronto-romance-scam-linked-to-global-fraud-case
  • Trend Micro and INTERPOL. 2017. ‘Cybercrime in West Africa: Poised for an Underground Market’. Retrieved from https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
  • Tropina, T. 2012. “The Evolving Structure of Online Criminality: How Cybercrime Is Getting Organised.” Eucrim - the European Criminal Law Associations’ Forum 4:158–65. Retrieved from https://www.corteidh.or.cr/tablas/r15111.pdf. doi:10.30709/eucrim-2012-022
  • United Nations. 2010. TRAFFICKING of NIGERIAN GIRLS in ITALY: The Data, the Stories, the Social Services Retrieved from https://documentation.lastradainternational.org/lsidocs/trafficking%20nigerian%20girls%20in%20italy.pdf
  • Valimail. 2023. BEC Scams Cost Companies $50 Billion in Losses. https://www.valimail.com/blog/bec-scams-cost-companies-50-billion-in-losses/
  • Vanguard. 2022. Evelyn Usman. We Kill Rivals, Cut off Their Hands for Rituals — Self-Confessed Cultist. Retrieved from https://www.vanguardngr.com/2022/08/we-kill-rivals-cut-off-their-hands-for-rituals-self-confessed-cultist/
  • Vice. 2015. Tamara Khandaker. The Notorious Black Axe Has Put Down Roots in Canada. Retrieved from https://www.vice.com/en/article/vb835b/the-notorious-black-axe-has-put-down-roots-in-canada#
  • Vicsek, L. M., G. Király, and H. Kónya. 2016. “Networks in the Social Sciences: Comparing Actor-Network Theory and Social Network Analysis.” Corvinus Journal of Sociology and Social Policy 7(2):77–102. doi:10.14267/CJSSP.2016.02.04
  • Wall, D. S. 2015. “Dis-Organised Crime: Towards a Distributed Model of the Organization of Cybercrime.” The European Review of Organised Crime 2(2):1–20. doi:10.2139/ssrn.2677113
  • Wall, D. S. 2021. “Cybercrime As a Transnational Organized Criminal Activity.” in Pp. 318–36 in Routledge Handbook of Transnational Organized Crime, edited by F Allum and S. Gilmour. London: Routledge
  • Wang, P., Su, M, and Wang, J. 2021. Organized crime in cyberspace: How traditional organized criminal groups exploit the online peer-to-peer lending market in China. The British Journal of Criminology 61(2): 303–324. doi: 10.1093/bjc/azaa064.
  • Wang, F. and V. Topalli. 2024. “The Cyber-Industrialization of Catfishing and Romance Fraud.” Computers in Human Behavior 154:108133. doi:10.1016/j.chb.2023.108133
  • Whittaker, J. M., S. Lazarus, and T. Corcoran. 2024. “Are Fraud Victims Nothing More Than Animals? Critiquing the Propagation of “Pig butchering” (Sha Zhu Pan, 杀猪盘).” Journal of Economic Criminology 3(100052):100052–58. doi:10.1016/j.jeconc.2024.100052
  • Yar, M. and K. F. Steinmetz. 2019. Cybercrime and Society. London: SAGE Publications Limited.
  • Zakari, M. B. and M. Button. 2022. “Confronting the Monolith: Insider Accounts of the Nature and Techniques of Corruption in Nigeria.” Journal of White Collar and Corporate Crime 3(2):100–08. doi:10.1177/2631309X211004567
  • Zeng, Y. and D. Buil-Gil. 2023. “Organizational and Organized Cybercrime.” Criminology & Criminal Justice. doi:10.1093/acrefore/9780190264079.013.798