Advertisement

Human Affairs

, Volume 23, Issue 4, pp 689–705 | Cite as

A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon

  • Oludayo TadeEmail author
Original Paper

Abstract

Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using Space Transition Theory of cybercrime, data were generated on yahoo boys and those involved in yahoo plus. The clampdown on Internet fraudsters by the Economic and Financial Crimes Commission (EFCC), in-group conflict among yahoo boys over social recognition, reduced victimisation and delayed success, and mass media enlightenment were reported factors influencing the fusion of spiritual elements in cyber crime. The methods used include ase or mayehun (incontrovertible order), charmed or magical rings (oruka-ere) and incisions made around the wrist, which are used to surf the net, while ijapa (tortoise) is used to navigate profitable sites. Unsuspecting victims fall under the spell of the ase via phone conversation where spiritual orders are made to the victims without their objecting.

Key words

yahoo plus fraud rituals Nigeria youths EFCC 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abiodun, R. (1994). Understanding Yoruba Art and Aesthetics: The Concept of Ase. African Arts 27(3), 68–78.CrossRefGoogle Scholar
  2. Adamski A. (1998) Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm Google Scholar
  3. Adeniran, A. (2008). The Internet and Emergence of Yahooboys sub-Culture in Nigeria. International Journal of Cyber Criminology (IJCC) 2 (2), 368–381.Google Scholar
  4. Adomi, E., Igun, S. E. (2008). Combating Crime in Nigeria. The Electronic Library 26, 716–725.CrossRefGoogle Scholar
  5. Alubo, O. (2011). The Public Space in Nigeria: Politics of Power, Gender and Exclusion. Africa Development XXXVI, 1, 75–95.Google Scholar
  6. Abimbola, W. (1975). In W. Abimbola (Ed.). Iwapele: The Concept of Good Character in Ifa Literary Corpus Yoruba Oral Tradition: Selections from the Papers Presented at the Seminar on Yoruba Oral Tradition: Poetry in Music, Dance and Drama, pp. 388–420. Ile Ife.Google Scholar
  7. Akiwowo, Akinsola A. (1983). Ajobi and Ajogbe: Variations on the Theme of Sociation. Ife: University of Ife Press.Google Scholar
  8. Atolagbe, A.M.O. (2011). Security consciousness in Indigenous Nigerian Houses: A Preliminary Survey of Yoruba Ethno-medical Devices. Ethno Med 5(1), 57–62.Google Scholar
  9. Awolalu, J. Omosade (1979). Yoruba Beliefs and Sacrificial Rites. Essex: Longman Group Ltd.Google Scholar
  10. Ayoade, J. A. A. (1978). The Concept of Inner Essence in Yoruba Traditional Medicine. In Z. Ademuwagun et al. African Therapeutic Systems, pp. 125–131. Waltham.Google Scholar
  11. Basden, G. T. (1921). Among the Igbo of Nigeria. Lagos: University Publishing.Google Scholar
  12. Bourdieu, P. (1986). The Forms of Capital. In J. G. Richardson (Ed.). Handbook of Theory and Research for the Sociology of Education, pp. 241–258. New York: Greenwood.Google Scholar
  13. Chriss, J.J. (2007). The Functions of the Social Bond. The Sociological Quarterly 48, 689–712.CrossRefGoogle Scholar
  14. Cohen, A. (1966). Politics of the Kola Trade: Some Processes of Tribal Community Formation among Migrants in West African Towns. Africa: Journal of the International African Institute 36(1), 18–36.CrossRefGoogle Scholar
  15. Coomson, J. (2009). Cyber Crimes in Ghana. Ghanaian Chronicle, 4 October 2006, from http://allafrica.com/stories/200610040856.html.Google Scholar
  16. Dalal, P. (2006). Wireless Security: Some Measures. Computer Crime Research Center. Retrieved June, 5, 2007, from http://www.crime-research.org/articles Google Scholar
  17. Danquah, P., Longe, O. B. (2011). Cyber Deception and Theft: An Ethnographic Study on Cyber Criminality from a Ghanaian Perspective. Journal of Information Technology Impact 11, No. 3, 169–182.Google Scholar
  18. Dana, D.A. (2001). Rethinking the Puzzle of Escalating Penalties for Repeat Offenders. Yale Law Journal 110, 733–783.CrossRefGoogle Scholar
  19. Durkin, Keith F., Craig J. Forsyth, and James F. Quinn (2006). Pathological Internet Communities: A New Direction for Sexual Deviance Research in the Postmodern Era. Sociological Spectrum 26,(6), 595–606.CrossRefGoogle Scholar
  20. Dyrud, M. A. (2005). I Brought You Good News: An Analysis of Nigerian 419 Letters. Proceedings of the 2005 Association for Business Communication Annual Convention, Irvine, CA, October.Google Scholar
  21. Fadipe N.A. (1987). The Sociology of the Yoruba. Ibadan: University PressGoogle Scholar
  22. Foster, G. M. (1976). Disease Etiologies in Non-Western Medical Systems. American Anthropologist 78, 773–82.CrossRefGoogle Scholar
  23. Gaviria, A., Raphael, S. (2001). School-Based Peer Effects and Juvenile Behavior. The Review of Economics and Statistics 83,(2), 257–268.CrossRefGoogle Scholar
  24. Harnischfeger, J. (2006). State Decline and the Return of Occult Powers: The Case of Prophet Eddy in Nigeria. Magic, Ritual, and Witchcraft (Summer 2006). University of Pennsylvania Press.Google Scholar
  25. Jaishankar, K. (2008), Space Transition Theory of Cyber Crimes, Crimes of the Internet, Pearson, ISBN-13:978-0-13-231886-0, pp. 283–299.Google Scholar
  26. Jaishankar, K. (2010). The Future of Cyber Criminology: Challenges and Opportunities. International Journal of Cyber Criminology 4, 26–31.Google Scholar
  27. Kshetri, N. (2006). The Simple Economics of Cybercrime. IEE Security and Privacy. Retrieved from www.computer.org/security.Google Scholar
  28. Longe, O. B., Chiemeke, S. C. (2008). Mediated Cyber-Crime: An Investigation of the Role of Internet Access Points in the Facilitation of Cyber Crime in Southwest Nigeria. European Journal of Social Sciences 6, 466–472.Google Scholar
  29. Mbiti, S. J. (1978). Introduction to African Religion. London: Heinemann.Google Scholar
  30. Melvin, A. O., Ayotunde, T. (2011). Spirituality in Cybercrime (Yahoo Yahoo). Activities among Youths in South West Nigeria. Google books.Google Scholar
  31. McCall, J. C. (2004). Juju and Justice at the Movies: Vigilantes in Nigerian Popular Video. African Studies Review 47, 51–67.Google Scholar
  32. McCusker, R. (2006). Transnational Organised Cyber Crime: Distinguishing Threat from Reality. Crime, Law and Social Change 46, no. 4–5, 257–273.Google Scholar
  33. McKenzie, S. (2000). Child Safety on the Internet: An Analysis of Victorian Schools and Households using the Routine Activity Approach. A Thesis submitted to the University of Melbourne, February, 2000. Retrieved on December 15 2006, from http://www.criminology.unimelb.edu.au/research/internet/childsafety/index.html Google Scholar
  34. Norton Study (2012). Consumer Cybercrime estimated at $110 billion annually. www.symantec.com/about/news/release/article.jsp?prid=20120.Google Scholar
  35. Nurth, M.S. (2008). Taking Advantage of New Techonologies: for and against Crime. Computer Law and Security Report 24(5), 437–446.CrossRefGoogle Scholar
  36. Nwolise, O.B.C. (2012). Spiritual Dimension of Human and National Security. Eighteenth Faculty Lecture Series, Faculty of the Social Sciences, University of Ibadan (April 26, 2012).Google Scholar
  37. Oumarou, M. (2007). Brainstorming Advanced Fee Fraud: ‘Faymania’—the Camerounian Experience. In N. Ribadu, I. Lamorde and D. W. Tukura (Eds.). Current Trends in Advance Fee Fraud in West Africa, pp. 33–34. Nigeria: EFCC.Google Scholar
  38. Oyenuga, A.S. Odunaike, B.A., Olaitan, M.F. (2012). Information Communication Technologies’ Time-Space Distanciation and Crime in Lagos. Nigerian Journal of Sociology and Anthropology 10, 151–163.Google Scholar
  39. Payne, N. (1992). Towards an Emancipatory Sociology: Abandoning Universality for the True Indigenization. International Sociology 3, 161–70.Google Scholar
  40. Parker, D. B. (1976). Crime by Computer. New York: Scribner.Google Scholar
  41. Ratliff, E. (2005). The Zombie Hunters: On the Trail of Cyber Extortionist. The New Yorker, (2005, October 10), pp. 44–49.Google Scholar
  42. Rogers, M. (2001). A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behaviour: An Exploratory Study. PhD Dissertation. University of Manitoba, Winnipeg Manitoba.Google Scholar
  43. Rubin, A. (1989). Art as Technology: The Arts of Africa, Oceania, Native America, Southern California. In A. Rubin and Z. Pearlstone (Eds.). Beverley Hills, CA, pp. 133–138.Google Scholar
  44. Simpson, G.E. (1980). Yoruba Religion and Medicine in Ibadan. Ibadan University PressGoogle Scholar
  45. Skinner, W. F., Fream, A.M. (1997). A Social Learning Theory Analysisof Computer Crime Among College Students. Journal of Research in Crime and Delinquency 34(4), 495–518.CrossRefGoogle Scholar
  46. Smith, D. J. (2007). A Culture of Corruption: Everyday Deception and Popular Discontent in Nigeria. Princeton: Princeton University Press.Google Scholar
  47. Tade, O. and Aliyu, I. (2011). Social Organisation of Cybercrime among University Undergraduates in Nigeria. International Journal of Cyber Criminology 5, 860–875.Google Scholar
  48. Talbot, P. A. (1923). Life in Southern Nigeria. London: Macmillan.Google Scholar
  49. Thompson, R. F. (1983). Flash of the Spirit. New York: Vintage.Google Scholar
  50. Warner, J. (2011). Understanding Cyber-Crime in Ghana: A View from Below. International Journal of Cyber-Criminology 5(1), 736–749.Google Scholar
  51. Wolff, N. H. (2000). The Use of Human Images in Yoruba Medicines. Ethnology 39,3, 205–224.CrossRefGoogle Scholar
  52. Yar, M. (2005). The Novelty of Cybercrime: An Assessment In Light Of Routine Activity Theory. European Journal of Criminology 2(4), 407–27CrossRefGoogle Scholar
  53. Vanguard (2012). Woman, 70, killed for alleged witchcraft. http://www.vanguardngr.com/2012/07/woman-70-killed-for-alleged-witchcraft/ Google Scholar
  54. Daily Post (2012) Suspected labour party thugs attack NURTW member, PDP Candidate escapes Death in irele, Ondo state. http://dailypost.com.ng/2012/07/31/suspected-labour-party-thugs-attack-nurtwmembers-pdp-governorship-candidate-escapes-death-irele-ondo-state/ Google Scholar
  55. People’s Daily (2011). Nigerian police arrest 133 suspected political thugs in northern state. Retrieved from: http://english.peopledaily.com.cn/90001/90777/90855/7364476.html Google Scholar
  56. Punch Newspapers (2012). EFCC convicts 288 Internet Fraudsters. April 17, 2012.Google Scholar
  57. PM News (2011). Police Parades 19 suspected political thugs. http://pmnewsnigeria.com/2011/03/29/policeparade-19-suspected-political-thugs/ Google Scholar

Copyright information

© Versita Warsaw and Springer-Verlag Wien 2013

Authors and Affiliations

  1. 1.Department of SociologyUniversity of IbadanIbadanNigeria

Personalised recommendations