The term “scamming” is closely related to the criminological terminology of the advance fraud, but particularly includes many forms of online fraud. They both mean that the deceivers use false pretenses to try to persuade their victims into making a payment (“advance”). At the same time, they promise profits, inheritances, or slightly higher repayments.
Once criminals receive payment, contact is usually terminated immediately. A fulfillment of the aforementioned promise doesn’t follow, and the paid money is usually irretrievably lost. Making contact online generally happens via e-mail, but now contact can also be made through chat portals, messengers, social networks, and dating platforms. Scammers have even spread to online marketplaces for real estate, jobs, or used cars.
There have been scams by mail for centuries, but it was only in the 1980s that the approach became a mass phenomenon originating from Nigeria. In the course of the oil price decline, high inflation rates, and resulting poverty in Nigeria, some scammers sent massively falsified letters via post or fax to businessmen in western countries. They pretended to come from financial institutions which could deliver crude oil to the addressees – but only if an advance payment was made. The “Nigeria Connection” became the epitome of scamming. Many scamming mails still come from Nigeria and other West African countries today. The phenomenon became world-wide – victims and perpetrators sit at computers all around the globe.
But untrustworthy writing has become more professional: the documents often appear deceptively genuine, lead to elaborately fake logos, or try to appear more authentic when spying on a victim’s personal information. Websites, phone numbers, and entire networks of fake accounts were created to allow scammers to appear like real people. Public profiles on social networks provide criminals with the necessary data to underwrite letters with details about the professional or private life of their victim. Scamming mails sometimes also contain attachments with malware that search for data on the victim’s computer.