By Saron Obia
Seeking to overcome the many shortcomings of the theory of technological enabled crime and the triangular theory of crimes posit link between the power of the state, multinational organizations and security expert and consultant, specialist in cyber security, counter terrorism and jihadist tendencies.. When the state seeks to combat organized crimes, others use their power to secure certain individuals to extort foreign investors, which sparks a countervailing reaction on socio-economic and political order.
The theory is applicable for investigation related to company scam, where group solidarity (cybercriminals), technological advancement and inadequate cyber security training are challenges of the criminal justice system in some Sub Saharan African countries.
The proliferation of social networking sites, several startups and the availability of security software in the dark market, is a major cause for the geometric evolution of fictitious companies operated by cybercriminals. They advertise killer post of contracts, recruitment of workers in renowned companies (engage in website defacement) for international projects operating with forge letterhead of international companies.Information of profiled individuals (chief executive officers and ministers) is gotten from social networking sites (professional networking sites), which is use for the production of fake documents (business card, identity card, and even scan documents with signature), to apply for contracts.
Following a field survey, staff dishonesty and usurpation are major aspects for breach of contract, as well as unfinished state projects. Companies are created and forcibly engage in state projects, with no respect of international and national canons cooperate with financial institutions which issue bank statement in order to lobby for contracts.
An individual creates an account, and funds from another account is been transferred for a period of time to attest the financial stance (bank statement) of the person lobbying for the contract to dissuade the organization.
With the evolution of e-commerce, the scope of cybercriminals has changed. They now focus engage in company scam, operate virtual non-governmental organizations requesting for donors for certain projects like educational funds, internally displaced persons, and other basic necessities rural areas. They rent infrastructures in strategic locations to dissuade their clients, expose photos of real estate in a town, and propose a guide, as well as showcase their virtual agency abroad for reliability.
Registration required for the service solicited by an individual or multinational organization, which extend to an agreement between a representative of the company abroad via mail, with a receipt requesting for the name of the individual or enterprise, job description, phone number, resident area, and if payment will be effectuated via bank to bank, before they engage in criminal patterns (phishing, smishing and hack clients bank account) from the information gathered.
In conclusion, the theory appeals for proper state control in relation to foreign investment as well as intelligence on companies soliciting projects. Companies must verify tenders online and request for information from state institutions before submitting inquiry forms for projects posted on social networking sites. Multinational organizations should inquire about sub-contractors proposing services and verify it the company adhere to the principles of public contracts. The state should ensure that any organization lobby for any public contract must fulfill all requirements as per international and national laws.
(The Author is a security expert and consultant, specialist in cyber security, counter terrorism and jihadist tendencies)
The Lessons of War:Survival Classes Introduced in Ukraine’s Schools
Cybercrime in Nigeria:Inside a “hustle kingdom”
Weather Damage and Arson Attacks Are Challenges US Election Officials Facing
UN Security Council Meets on Threats to International Peace and Security
US Political History:Some of the Most Bizarre Moments
UN Security Council Hears Report on United Nations Interim Administration Mission in Kosovo
As Aid Access Blocked,Community Soup Kitchens Feed Sudan’s Starving
Are Religious Groups in Bangladesh Gaining Power?
Subscribe Our You Tube Channel
Fighting Fake News
Fighting Lies