Feeds

419 scammers plead guilty in US

20 years' prison time?

Reducing security risks from open source software

Three West African defendants pleaded guilty to federal charges of running an advance-fee scheme that targeted U.S. victims with promises of millions of dollars, including money from an estate and a lottery.

The guilty plea proceedings were held this week before US Magistrate Judge Ramon E. Reyes, Jr. at the federal courthouse in Brooklyn, New York.

Nnamdi Chizuba Anisiobi, Anthony Friday Ehis and Kesandu Egwuonwu were extradited from the Netherlands after police raids in February 2006. Following these arrests Dutch police started Operation Apollo to fight internet fraud scams operated by West Africans and notably Nigerians.

Using names such as Yellowman, Abdul Rahman, Michael Anderson, Edmund Walter, Nancy White, Jiggaman and Namo, the men sent spam emails to thousands of potential victims, in which they falsely claimed to control millions of dollars located abroad.

In one scenario, the defendants sent emails purporting to be from an individual suffering from terminal throat cancer who needed assistance distributing approximately $55m to charity.

A fourth defendant fled to Nigeria, but was later arrested by the Nigerian Economic & Financial Crimes Commission. He also will be extradited to the US. The maximum penalty for mail and wire fraud in North America is 20 years in prison.

So far, most Nigerian scammers arrested in Europe have been deported back to Nigeria or sentenced locally. However, assistant Attorney General Alice S. Fisher of the Criminal Division this week that online scam artists should be "on notice that we will continue to work closely with our international partners to ensure that there are no safe geographic boundaries for committing these crimes." ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.