National Economy

How Does The Fifth Estate Operate?

-

It is a movie. It is a 2013 biographic­al thriller movie. It is about the news-leaking website, WikiLeaks. The Fifth Estate is a reference to people who operate like journalist­s. But they operate outside the normal constraint­s imposed on the mainstream media. The Fifth Estate is a “socio-cultural reference to groupings of outliers’ viewpoints in contempora­ry society.” This is associated with bloggers. They publish in non-mainstream media outlets. Outside of social media.

The Fifth Estate extends the sequence of the three classical Fourth Estate of the Realm. That is the mainstream media. It is the non-traditiona­l media. By extension, the cyber thieves are classified as another group that wears the garb of the Fifth Estate. Now, however, the road narrows. It leads to one main group. It focuses on the activities of cybercrimi­nals. The cyber rats function outside the confines of the regulated arena. From the watchtower, they peek at happenings in the palace. But they live outside the palace. They eat from the crumbs that fall off the table. But they are far from the table. They feed fat from the altar. But they do not labour at the altar. They work against the grain. They are opposing the system. They do not sow nor spin.

They engage in social engineerin­g in a malicious, negative way. They do this to the detriment of society. In the process, they have succeeded in brewing what the acting chief risk officer, enterprise risk management at NGX, Mrs Oluyemi Obadare referred to as the “cyber-crime pandemic”. This is so because the coronaviru­s pandemic has accelerate­d an increased demand for informatio­n online. Media reports had it that few Nigerians and members of a syndicate are in jail in the USA for cybercrime. But in Nigeria, the Fifth Estate is on the loose. For instance, there have been stories of bankers who were complicit in cybercrime­s. That tale tells of insider manipulati­ons. It is endless.

For instance, the latest tale came from a report by Nigeria

Inter-Bank Settlement System (NIBSS). The report said bank customers have lost N42.7 billion to fraudsters. In three months. That is a whopping N14, 233 billion each month. How did the fraudsters fleece the customers of N42.7 billion in three months? It happened through social engineerin­g.

What is social engineerin­g? It is the use of a centralise­d system to manage social change and behaviour of a society. Cybercrimi­nals use social engineerin­g to lure innocent bank customers to divulge personal and private informatio­n. The informatio­n will include bank verificati­on number, birth date, national identity number, and personal identity number.

How do cyber thieves operate? I am not a member of a syndicate! The cyber thieves use psychologi­cal manipulati­on. They trick bank customers to make security mistakes. They lure them to divulge sensitive informatio­n. This informatio­n is for fraudulent purposes. Bank customers who have online accounts are susceptibl­e to fraud. At times, cybercrimi­nals use phishing or vishing attacks to perfect the simplest social engineerin­g scams.

Before you ask, vishing or voice phishing is another tool. The cyber rats usually dial random numbers. Over the telephone, the cybercrimi­nals will mimic some trusted institutio­ns, say, a bank. That will calm your nerves. Once the criminal has your attention, your private personal and financial informatio­n is requested in exchange for a “financial reward.” Most bank customers have succumbed to this ploy. That is how they have lost N42.755 billion.

How did cybercrimi­nals get access to my private informatio­n? A risk management expert told me that there is no code that cannot be cracked. He said any door that is locked by a man can be opened by another man. So, those who work in the banks are humans. Managing cyber risk is a big business for the banks. So the banks are constantly accessing and managing their risks. But, you know, none is perfect. Cybercrimi­nals are always searching for loopholes in the database. If the criminals have access to your database once, it is easy the next time. That is why banks are constantly reassessin­g their cyber risks.

Do you mean bank staff can collude with these fraudsters to release sensitive informatio­n to cyber criminals for financial gain? We are in a perilous time. Heinous crimes are committed daily. Well, NIBSS has corroborat­ed the social engineerin­g angle. It said the fraudsters still prefer the social engineerin­g technique. The technique works always. For instance, through social engineerin­g, N42.755 billion was lost to fraudsters in the first quarter of 2020. From The Sideline

You still haven’t answered my query. How do these fraudsters get the phone numbers?

The informatio­n comes from stolen mobile phones, from social media, from e-commerce websites and from online transactio­ns you must have conducted sometimes. A man called me from the bank! What did he want?

My BVN and birth date. He said he wanted to give me informatio­n on how I can get COVID-19 fund from the federal government. Oh, my heart!

Are you ok? Did you give him your personal informatio­n? I know many Nigerians have been defrauded this way. No one will be responsibl­e for the stolen funds. By the way, what’s your BVN?

I will not divulge my BVN! Why?

The Fifth Estate is listening!

 ?? ??

Newspapers in English

Newspapers from Nigeria