User:Andre Castro/2/thesis/draft: Difference between revisions

From XPUB & Lens-Based wiki
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
=Outline=
==Question==
Is the reappearance of the same narrative on numerous spam messages a results of the writing methods employed to compose those messages or is repetition and redundancy so ingrained into our western culture, and into our expectations as audiences, that spam simply adopted it as a clever strategy to streamline spam's writing process capture our attention? 
==Discussion==
===analyze a body of spam in search for forms of repetition===
compare each form of repetition to an example from within  mass culture (James Bond novels, Superman comics, crime novel, Westerns, (soap-operas ?) )
* plot parts - Eco, Propp
* characters - ?????
* (use of redundancy to convey a message - Suleiman)
* (establishment of a game of opposites (light and shade) - Hirschman, Eco)
===potential causes of spam appropriation and consequent reoccurring narratives===
* efforts necessary to accomplish a suitable message - Blommaert
* expensive cost of internet access in poorer areas of the globe - Blommaert, Burrell, Heyd
* fear of failing to meet the right set of conventions in an online context; therefore safer to use something that seems to respect conventions and look effective – Burrell, Heyd 
* obvious copy-paste
=Introduction=
=Introduction=




==context==
==(context)==
Spam, once only a brand of spiced canned meat, turned into a synonym for unsolicited email, sent to large number of addresses, with the underlying intention of extorting money through a convincing narrative or sell products such as Rolex replicas or Viagra pills to their recipients. Spam is essential distasteful advertising that arrives in our mailboxes, in large quantities. It's electronic junk destined to receive a click from its the recycling-bin icon and vanish. That said the attention spam generates is way beyond what one would expect when finding spam clogging our email accounts. Spam takes online security experts, legislators, and computer scientist to work on preventing spam to reach its final destination, common individuals to form and feed online forums alerting against possible scams received by email, slightly less-common individuals to architect and apply elaborate plans to unmask spam schemes, anthropologists to investigate who, where, and under what conditions are at the origin of spam, linguists to speculate on the grammatical anomalies contained in spam, artist to make it a playground full of possibilities, and most of us, who rely on email to communicate, to become its readers, and respond with amusement, curiosity, boredom, or wonder.
Spam, once only a brand of spiced canned meat, turned into a synonym for unsolicited email, sent to large number of addresses, with the underlying intention of extorting money through a convincing narrative or sell products such as Rolex replicas or Viagra pills to their recipients. Spam is essential distasteful advertising that arrives in our mailboxes, in large quantities. It's electronic junk destined to receive a click from its the recycling-bin icon and vanish. But as much it is distasteful and unsolicited it also fascinating for many. Perhaps as result of its colossal volume, or its diversity, comprising sub-genres are as varied as medical spam (Barron 2006), hoaxes (Heyd 2008), spam lit(Gallix 2008), dating invitations, or fraud emails. And not to mention the mediums through which spam is communicate, ranging from email, blog comments (Thomason 2007), community websites like Craigslist (Craigslist 2012), and Wikipedia (Wikipedia 2013). The attention spam generates is far beyond what one would expect, specially after going through the tedious task of cleaning our email client of all its unsolicited emails. Spam takes online security experts, legislators, and computer scientist to work on preventing spam to reach its final destination, common individuals to form and feed online forums alerting against possible scams received by email, slightly less-common individuals to architect and apply elaborate plans to unmask spam schemes, anthropologists to investigate who, where, and under what conditions are at the origin of spam (Burell 2012), linguists to speculate on the grammatical anomalies contained in spam (Blommaert 2005, Barron 2006), artist to make it a playground full of possibilities, and most of us, who rely on email to communicate, to become its readers, and respond with amusement, curiosity, boredom, or wonder.  




==field of study==
==(field of study)==
Spam production at large seems too colossal and disperse to allow for any proper insights to be drawn within this essay. Therefore I am choosing to narrow my focus to a sub-genre of spam entitled ''419 fraud emails''. 419s derive their name from the Nigerian law code prohibiting the impersonation or state's officials. And given the initial origin of 419s in West African countries, this sub-genre of spam got its designation. These emails almost without exception involve a posing author proposing the recipient to take part in a highly lucrative and straightforward business. Invariably they given an account as to where does the money originates and why he or she cannot get hold of this sum, therefore the request for my cooperation.
It is my intention, to use this discussion to transmit the reader a detailed view on the sub-genre of spam entitled <i>419 fraud email</i>, and the repertoire of stories and characters that inhabit the 419s universe. 419s derive their name from the Nigerian law code prohibiting the impersonation of state's officials. As analog predecessors of current 419s - letters and faxes - came initially from Nigeria and employed the country's political figures as their posing authors, this sub-genre of spam got its current designation. In these emails the posing author proposes the recipient to take part in a highly lucrative business. Invariably they provide an explanation as for the money's origin and for their inability to get hold of it, therefore requesting the reader's cooperation. These are often rich, colorful, and often absurd stories, which mix promiscuously with reality. Not only I find them appealing stories, but even more fascinating as scam strategies. Isn't there a more direct way of stealing money from individuals than going through the efforts of writing transmitting a convincing story, in order to do so? Not to mention the constant and easily identifiable set of patterns present in 419s doesn't seem to provide the most effective scam strategy. Although reoccurrences happening between different 419s specimens might not be a very effective choice for fraud purposes, it definitely brings consistency and character of this para-literary genre. And I suspect that such repetitive quality might be one of the reasons behind the general interest and attention devoted to spam. Putting aside whether my suspicion is right or wrong, I would like to ask why is repetition so ubiquitous to spam? The straight-forward and easy answer would state that spam is a product of an incessant plagiary practice, which allows for a large number of messages to be constructed in a short amount of time. But couldn't it also be argued that reoccurrences, repetitions, and redundancies are so omnipresent and ingrained in western mass culture, that spam has simply incorporated them as an attention grabbing strategy? 
 
I have decided upon the 419s as an object of study as this form of spam appears to be crafted ''by hand''', rather than resulting from the substitution of variables on a prefab text. The narratives and proposition on them are extremely colorful, inventive, and on the verge of absurdity. Notwithstanding they are marked by a strong formulaic nature, perceptible in its structural organization, characters employed, and events described.


==(discussion)==
I will be discussing these two possible explanations for the high frequency of repetitions and redundancies that confronts us while reading 419 fraud emails. On the one hand I will establish a correlation between the forms of reocurrence detected on 419s fraud emails and those prevalent in popular culture products. On the other hand, I will put forward a more possible and down-to-earth explanation, based upon the restrictions and costly access to an Internet connection and a computer in some parts of the globe commonly associated with 419s, making the appropriation of an already existing, well-written, and convincing message a cheaper and safer choice. In order to construct my argument and defend each side I will rely upon works of literary criticism within the realms of structuralism and semiotics that investigate the repetitive aspects within product of mass-culture, such as Vladímir Propp's mapping of Russian fairy-tales into plot formulas, Umberto Eco's reading of James Bond novels, and John Cawelti analysis of crime novels; And works dedicated to 419s text analysis by Jan Blommaert and Harvey Glickman, as well the anthropological field-work developed by Jenna Burrell within the population of young spammers in Ghana's Accra. Lastly, as tangible evidence of the subject discussed I will use examples included in a database of 419 email, which I have been developing and compiling as a tool for my research. Once both sides have been properly explored I expect to be in position to assess whether repetition, redundancies and the formulaic nature are the side-product of time-saving mechanisms used to compose the 419s fraud message or whether its authors are cleverly exploring our desire to be told known and predictable stories.


==question==
=Methodology=
As one starts to look through a given number of 419s specimens one might be struck by the reoccurrences happening happening between its texts. I suspect that such repetitive quality might be one of the reasons behind the general interest and attention devoted to spam. Putting aside whether my suspicion is right or wrong, I would like to ask '''why is repetition so ubiquitous to spam?''' The straight-forward and easy answer would state that spam is a product of an incessant plagiary practice, which allows for a large number of messages to be constructed in a short amount of time. But couldn't it also be argued that reoccurrences, repetitions, and redundancies are so present and ingrained in western mass culture, that spam has simply adopted repetition as an attention grabbing strategy? 
==419s' archive==


Must of the email examples employed throughout this thesis will can be found at http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam . This URL holds a collection of 419s I have been collecting since November 2012. Beginning in December 2012, I have been compiling and organizing the collected emails under this archive. Although still in development, the archive has function as an important tool in my research process. Currently the archive holds a collection of circa 50 emails. Each email entry includes, the email body, author's name, email subject, unique url. Each entry is also provided with a color code meant to identify the different parts present within the email body, however a more detailed explanation will follow in the <i>repetition</i> section. The archive is organized around the stock character posing as the author of emails. Each of these archetypal figures is at the epicenter of a constellation of emails, so one can browse all the emails present in the collection which have been written by soldiers, or sick widows, or politicians. The process of assembling the emails that form part of the database begins with begins with the arrival of one email on to my email account, often via some friend aware of my interest in spam, or a legitimate spam. A quick reading allows me to identify if I am dealing with a 419, if that is the case I will look further on to whom poses as the author of the email, say it is a soldier, under then name David Joseph; The next move consist in making a Google search on the terms "419 fraud David Joseph" and invariably I end up in one of the fraud alert website such as 419scam.org, 419.bittenus.com, antifraudintl.org or scamdex.com and next to David Joseph email lay dozens of other email similar emails in which a British or American soldier proposes a highly lucrative deal. I then start adding those found emails to the database, identifying their posing author under the <i>soldier</i> category. When introducing an email to the archive I will try that the date refers to the moment when the email was originally received. I cases found email, like the previously described case, the assigned date will try to respect the date when the email originally arrived in its recipient's inbox.
==discussion==
I would like to discuss the probability of two explanations for the high level of repetitions and redundancies we are confronted when reading several 419 fraud email.
To try to answer this question I will, on the one hand try to establish a correlation between the forms of reocurrence detected on 419s fraud emails and those prevalent in popular culture products. In order to construct my argument I will rely on a body of circa NNN 419 emails, categorized and annotated, and on works of literary criticism, mostly within the realm of structuralism and semiotics, which depict the repetitive or formal aspects of popular texts, such as Vladímir Propp's mapping of Russian fairy-tales into plot formulas, Umberto Eco's reading of James Bond novels and Superman comic-strips, and John Cawelti analysis of crime novels. On the other hand, I will attempt to put forward some other possible, more down-to-earth explanations for the heavy employment repetitions and redundancies on spam. Basing my argumentation on the literature dedicated to 419s text analysis by Jan Blommaert and Harvey Glickman, as well as anthropological field-work developed by Jenna Burrell within the population of young spammers in Ghana's Accra. Some of my explanations will center on the restrictions and costly access to an Internet connection and a computer in some parts of the globe commonly associated with 419s. If we take into account such limitation, as well as the effort and time necessary to construct a grammatically correct and seductive email message, often in a language foreign to the author, and destined to an unknown audience, we might consider the appropriation of an already existing, well-written, and convincing message as a better-off choice. What might begin with a small swapping of names, and the change of a couple of locations, might give away to a drastic change of the initial narrative, while keeping still some characteristics faithful to its source.


[+ ON METHODOLOGY]


==conclusion==
With the exploration of these two arguments I expect to be able to assess whether repetition, redundancies and the formulaic nature, are the side-product of time-saving mechanisms used to compose the 419s fraud message or whether its authors are cleverly exploring our desire to be told known and predictable stories.
It is also my intention, to use this discussion to transmit the reader an overall image and detailed of this particular sub-genre of spam and the repertoire of stories and characters that inhabit such universe.
----


=Four-One-Nines=
=Four-One-Nines=


==anatomy of a 419==
==anatomy and origin of the 419s==
Harvey Glickman in the article ''The Nigerian "419" Advance Fee Fraud'' summarizes the 419s as emails, faxes, and letters that make reference to a large sum of money held in an African bank account or other safe location. The owner of this sum is without exception dead. Consequently, the sender asks for the recipient's collaboration in transferring the frozen funds to a foreign account, so that it can be accessed. As a reward for the recipient's collaboration a fraction of the total sum will be given to him or her (Glickman 2005, p.461).  [INSERT BLOEMMAERT REFERENCE narratives of dispair ].
Harvey Glickman (2005) in the article ''The Nigerian "419" Advance Fee Fraud'' summarizes 419s as emails, but also faxes, and letters that make reference to a large sum of money held in an African bank account or other safe location. The owner of this sum is often dead. The sender asks the recipient's collaboration in transferring the frozen funds to a foreign account, so that the money becomes accessible. As a reward for the recipient's collaboration a fraction of the total sum will be given to him. Victims who fall for this telltale are normally asked to provide their personal details, bank name and account number early on, such information is used in credit card applications or checks forgeries. If the recipient is eager to take part in the proposed deal he will, at later stage be requested to transfer money to the sender's account, under the excuse that a lawyer needs to be payed to do the necessary paper work, an official has to be bribed to set the process rolling, or identity marks be removed from banknotes. Victims, like gambles, struggle to admit they are loosing money, and go on complying with these requests, in hope that their guaranteed profit will appear. Even when convinced that they have fallen for a scam victims are deterred from denouncing it, as they are aware of the illegal contours of the business they joined (Glickman, pp.465-469).
Victims who fall for this tall tale are normally asked to provide their personal details, bank name, and account number early on in the scam, such information can be used for credit card applications or checks forgery. Eventually, if the recipient is eager to cooperate requests will ask for money transactions so that a lawyer is payed to do the necessary paper work, an official is bribed to set the process rolling, or identity marks are removed from the banknotes. Victims, like gambles, struggle to admit they are loosing the money they have invested, consequently they keep on feeding in more money in hope that their guaranteed profit will appear. And even when convinced they have been victim of a scam, they are deterred from denouncing the scam, as result of the illegality of the business they've joined (ibid, pp.465-469).
[INCLUDE FLOWCHART OF THE SCHEME BEHIND 419 ]


==origin of 419s==
The handle "419" comes from Nigerian Criminal Code preventing the impersonation of official entities for financial gains (Glickman 2005, p.461). Although this money extorting of narrative dates back a few centuries to what was called the "Spanish Prisoner" scheme. In this early scam a rich merchant would be told about the misfortunes of a sequestered child and his father, whom had been imprisoned in a Spanish prison. The fraud victim would be asked to pay for the release of these individuals, in which case he'd receive a larger sum as reward. Fast-forwarding to the Twentieth century, the same scheme was found to be gaining popularity during in the 1970s and 1980s Nigeria. Initial using letters, later faxes, it was only evident that the 1990's wide spread of internet and email communication would be adopted to launch 419s' schemes. 419s has its origin in Nigeria and started being sent from other African nations, and countries such as Singapore, Russia, and Honk-Kong(ibid pp.472-473).


In some of the narratives described in these emails, the money pertains to Nigeria's once state's officials. Such choice is not fortuitous, as Jenna Burrell indicates the scenarios described are based on the corrupt activities carried out by Nigeria's 1980s and 1990s military governments. They are meant to server as plausible evidence to the sincerity and seriousness of the business proposition (Burrell 2012, Loc 1178 ).  
===[distinguish from hoax]===
  [find one of these emails - ASSOCIATING MONEY TO NIGERIAN OFFICIALS]
A very similar spam genre is the email hoax ...
However spam is characterized for is ever-changing nature, always trying to circumvent security mechanisms and to be read credulously by recipients. As a result origins for money have to keep changing, but they are inevitably dead. Among the individuals described as the fund's sources we can find Saddam Hussein, Osama bin Laden, the Porsche tuning company's CEO, Uwe Gemballa, or Christian Eich, a German engineer victim of the Concorde crash on June 25th 2000 in Paris. As for the person who poses as author of the email, the repertoire includes bankers and insurance agents, British and American soldiers, relatives to deceased politicians, and rich but fatally ill widows.
  [define Email hoax - show how differs from 419s]


  [add another source to Spanish Prisoner tale]
   
[add another source to Nigerian political context ]


==my 419s' archive==
===[narratives genre]===
The previously mentioned information on the characters featured of 419s derives from spam email messages collected under a database located at http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/ . This repository, although still in development, holds a collection of NNN 419s. The emails are organized according the who happens to be the character posing as its writer, holding a number of emails under each character's placehorder. The characters repertoirs includes the banker, the relative of a states' person, the soldier, the rich but fatally ill widow. These characters are the face of what Jan Blommaert identifies as typology of spam email which he entitles ''narratives of experience and trust''. These include the ''dormant accounts'', in which a banker or assurance officer found unclaimed funds from a deceased client, and proposes a transaction to the addressee; ''Rescue operation'' where the reader is ask to assist in transferring the writer's capital from to a safe foreign account, as the posing author find himself in trouble at his home country. And ''charity'' emails written by a supposedly religious author, nearing his last days and wanting to give away his capital to charities.  
Jan Blommaert's article <i>Making Millions: English indexicality and fraud</i> (2005) is an example of the confusion between 419s and spam hoaxes. Although his article is dedicated exclusively to 419s, he classifies them as "e-mail spam hoax message[s]" (ibid, p.2). Despite this inconsistency Blommaert's provides a well informed sociolinguistic analysis of the 419s, and suggests a typology that I believe to be useful to understand the specificity of the 419s. Blommaert distinguishes two main groups: <i>administrative-formal genres</i> and <i>narrative genres</i>. The administrative genres comprises lottery reward messages, which inform the reader about his prize and are marked by a formal and administrative lingo. The narrative genres tend towards a more personal approach, involving the establishment of a bond between reader and writer (ibid, p.9). I have decided to relegate from my research the administrative genre, and opt only for the narrative one, as the later originates more elaborate texts, which seek to seduce of the reader, and, as previously mentioned, elaborate a story justifying the appearance of the money. Within the narrative genre Blommaert distinguishes three sub-categories: ''dormant accounts'', ''rescue operations'', and ''charity''. In all of them the addressee is asked to transfer money to a foreign bank account, what changes is the money origin and reason behind the writer's request. In ''dormant accounts'' a banker or assurance officer finds unclaimed funds from a deceased client; In the ''rescue operations'' the reader is asked to assist the posing writer, by rescuing his funds, since he has found himself in trouble in his home country; Lastly ''charity'' emails are written by a supposedly religious and wealthy author, nearing his last days and wanting to donate his capital to charity.
In each one of these sub-categories one or more characters are positioned as the writer. The character assigned that role is not only, as was already mentioned, the organizing principal behind the 419s database, but will also be subject of a later section of this thesis.




==[origin of 419s]==
The handle "419" comes from Nigerian Criminal Code preventing the impersonation of official entities for financial gains (Glickman 2005, p.461). Although this money extorting of narrative dates back a few centuries to what is known as the <i>Spanish Prisoner</i> scheme. In this early form of scam a rich merchant would be told about the misfortunes of a sequestered child and his father, whom had been imprisoned in a Spanish prison. The fraud victim would be asked to pay for their release, in which case he would receive a larger sum as reward. Fast-forwarding to the Twentieth Century, the same scheme was found to be gaining popularity during in the 1970s and 1980s Nigeria. Initial using letters, later faxes, email became the common medium, adopted to launch 419s. Although 419s had were initially came from Nigeria, and are still associated with this country, they are no longer confined to it. 419s production has been located in other African nations, and countries such as Singapore, Russia, and Honk-Kong (ibid pp.472-473). The origin of 419s in Nigeria is not fortuitous. As Jenna Burrell (2012) indicates the scenarios described are based on the corrupt activities carried out by Nigeria's 1980s and 1990s military governments. Still today one might receive an email from a Nigerian official. Such is the case with the former House of Representatives Speaker of Nigeria Dimeji Bankole, who according to BBC(2011) in 2011 was arrested under the accusation of deviating $65m of government funds, notwithstanding we might receive <i>his</i> emails, such as the following specimen:


within in this typology Blommaert distinguish two sub-categories. The first consisting of ''Lottery rewards'', these are marked by a formal and administrative language. The remaining three categories form what Blommaert entitles ''narratives of experience and trust''. Despite this division, and the employment of different narratives, moral frames, Blommaert denotes the uniformity and stability of the messages within these categories, gathered in the context of this article (pp. 4-9).
<pre>
From: "Hon. Dimeji Bankole" <info@dimejibankole.com>
Reply-To: hondimejibankole0@yahoo.com
Date: Sun, 08 Apr 2012 12:20:18 -0300
Subject: Business Proposal


Dear Sir,
I am the former speaker National House of Representative in the Federal
Republic of Nigeria and My Name is Hon. Dimeji Bankole. I am in position of
USD 12M which i intend to invest in Real Estate in your country. I am
looking for a reliable person or company that will help me to invest this
money on my behalf. Kindly update me if you can represent my interest in
your Country. Reply to my personal email address:
hondimejibankole0@yahoo.com
Thanks for your anticipated cooperation.
Best regards,
Hon. Dimeji Bankole
</pre>
(http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/102)


[ADD ANOTHER SOURCE TO SPANISH PRISONER TALE]
[ADD ANOTHER SOURCE TO NIGERIAN POLITICAL CONTEXT ]


The material gathering of emails of a particular character begins with the arrival of one email in my email account; While reading if I realize I am dealing with 419 I will look further on to whom poses as the author of the email, say its a soldier, under then name David Joseph; That prompts me to make a Google search on the terms "419 fraud David Joseph" and invariably I end up in one of the fraud alert website such as 419.bittenus.com, antifraudintl.org or scamdex.com and along with David Joseph email lay dozens of other email similar emails, in which a British or American soldier proposes a highly lucrative deal.


While using the aforementioned method to expand my database I was struck by a curious specimen, or are rather say a whole group of them. I came across an email whose author posed as Miss Kones, the daughter of Kipkalya Kiprono Kones Kenyan's former road minister whom died in plane accident. The story was a typical example of 419 ''rescue operation'' email. The young and seductive daughter teases the reader to help her transfer the funds destined to her in her father's will, before her mean step-mother takes control of all her late-husband's possessions. On searching for emails telling a similar story I was confronted not by similar stories, but the very same story, and the same posing character, but under a different first names. I found emails from Aminali, Cindy, Nora, Samira, Fatima, Susan, Amina, Fatima, Dalila, Esther, Joy, and Mercy. Quite a few daughters even for wealthy man. This incessant appropriation of the same story and characters made me look further into it. Although, appearing as the same text, there was still variations and differences among the emails. So that brought me to ask what is common to the majority of 419s.




=REPETITIONS=


=repetitions=
==(kones example)==
When I began working on expanding my database I was struck by a curious email, or are rather say, a series of them. I came across an email whose author posed as Miss Kones, the daughter of Kipkalya Kiprono Kones, Kenyan's former roads' minister who died in plane accident. The story was a typical example of 419 ''rescue operation'' email. The young and seductive daughter teases the reader to help her transfer the funds intended for her, according to her father's will, before her mean stepmother takes control of all her late-husband's possessions. On searching for emails telling a similar story I was confronted not by a similar, but the very same story, and the same posing character, but under a different first names. I found emails from Aminali, Cindy, Nora, Samira, Fatima, Susan, Amina, Fatima, Dalila, Esther, Joy, and Mercy. Quite a few daughters even for wealthy man. This incessant appropriation of the same story and characters made me look further into it. Although, appearing as the same text, there was still variations and differences among the emails. So that brought me to ask what is common to the majority of 419s.
[DEVELOP/EDIT, SO IT CROSSES-OVER TO CHARACTERS ]


==what forms of repetition?==
==(what forms of repetition?)==


Reoccurrences taking place in 419s can be detect at the level of the structural organization, the characters posing as the author of the message and the events described.
Reoccurrences taking place in 419s can be detect at the level of the structural organization, the characters posing as the author of the message and the events described.


===structure===
===characters===
In what concerns its structure, 419s seem to follow what Jan Blommaert describes as a generic blueprint, consisting of:
[TO BE WRITTEN]


i) Terms of address, where the posing writer salutes the reader.


ii) Apology and introduction, gives the reader an explanation for the contact on such secretive and personal matter through an impersonal channel as email, and reasons why has he been chosen to take part in such lucrative business.  
Being 419s characterized by their ever-changing nature, continuously trying to find new teasing narratives to lure, the sources of money keep on changing. However, a strong trend detected, in which has its origin in the fortunes of wealthy deceased person. Among the the many described sources we find Saddam Hussein, Osama bin Laden, the Porsche tuning company's CEO, Uwe Gemballa, or Christian Eich, a German engineer victim of the Concorde crash on June 25th 2000 in Paris. As for the person who poses as author of the email, the repertoire includes bankers and insurance agents, British and American soldiers, relatives to deceased politicians, and rich but fatally ill widows, which will  be given a more detailed description in the part dedicated to the 419s characters.  


iii) Micro-narrative about the origin of the money, elaborates on the money's origin, and why does the posing writer requires the readers cooperation. Some of these stories are related to recognizable contexts, such as recent wars, natural catastrophes, or accidents like plane crashes.


iv) Reassurances to convince the reader of the sincerity of the posing writer, and the secure nature of the operation.
The collection of 419s is organized according to characters featuring as the posing writer of the emails. This was mainly informed by the fixed number of characters that featured in the 419 that I received or found. I came across rich daughters, soldiers, banker and insurance officers, rich but ill widows, ''[++]''. It is surprising, given the large number of 419s in circulation, how small the number of characters given the role of writer can be found. Why am I not receiving any emails from plumbers or cooks - the common folk? They too might face complicated situations in their lives that require my assistance, they too might from time to time inherit a small fortune. Why are only these very SPECIFIC ''[? a better description]'' characters the ones who write the 419s?


v) Requests for confidentiality made to the reader, even if the proposition entails no risk. 
[FIND HOW CAN BE THE CHARACTERS CLASSIFIED]
[WHAT IS COMMON TO THEM]


vi) Closing formula.
[We have 2 constant elements: the structure and the character]
(2005 pp. 11-18).


===structure===
In what concerns its structure, 419s seem to follow what Jan Blommaert (2005) describes as a generic blueprint, consisting of terms of address, apology and introduction, micro-narrative on the origin of the money, reassurances convincing the reader on the writer's sincerity, requests for the reader's confidentiality, and lastly the closing formula. This form of narrative structure dissection has a processor in the work of Russian folklorist Vladímir Propp. Intending to establish a morphology of Russian folktales, a sort of list of ingredients and the sequence in which they enter the elaboration of a Russian fairy-tale, Propp proposed a morphological analyses of Russian fairy tales according to "the functions of its dramatis personae"(1929 p.7). In other words, the study focuses on the ''what'' action is performed, and not on ''who'' performs it or ''how'' is performed, as different "characters of a tale, however varied they may be, often perform the same action. The actual means of the realization of functions can vary, and as such, it is a variable... But the function, as such, is a constant" (ibid p.8). Propp research revealed that, despite their diversity, Russian fairy-tales only entail thirty-one functions. Such system of fixed and finite elements, combined with interchangeable and numerous characters provides the tale with its "multiformity, picturesqueness, and color, and on the other hand, its no less striking uniformity, its repetition" (Propp 1926, p.8).


This form of narrative structure dissection has a processor in the work of Russian folklorist Vladímir Propp. Intending to establish a morphology of Russian folktales, a sort of list of ingredients and the sequence in which they enter the elaboration a Russian tale, Propp proposed a morphological analyses of Russian fairy tales according to ''"the functions of its dramatis personae"''(1929 p.7). In other words, the study focuses on the ''what'' action is performed, and not on ''who'' performs it or ''how'' is performed, as different "characters of a tale, however varied they may be, often perform the same action. The actual means of the realization of functions can vary, and as such, it is a variable... But the function, as such, is a constant" (ibid p.8). A function is a slot belonging to an action, that will be materialized by the character who undertakes it and way in which he undertakes it. The function forms a constant and stable unit, while the latter constitute its variables. It should also be noted that the acts performed within each function are interdependent, as in the function ''interdiction violated'', which will determine the form of violation performed by the character.
Blommaert argues this fixed structure, in his words ''blueprint'', endows the messages with structural stability, while opening up the possibility for the materialization of very diverse narratives (2005 pp. 11-18). When super-imposing Blommaert's described blueprint against the 419s I have collected has revealed to match, therefore I have adopted Blommart's blueprint to query the structure of the collected 419s, although making a slight changes in the terms. I have decided upon ''salutation'', ''writer's introduction'', ''reason why are you receiving this email'', ''the money narrative'', ''invitation for business'', ''request for confidentiality'', and ''closing'', so that they would become more self-explanatory, but the event taking place within each section is essentially the same. Each part is identified within the database through the color assigned to its background. In the majority of cases the 419s structure follows the sequence: ''salutation'', ''writer's introduction'', ''reason why are you receiving this email'', ''the money narrative'', ''invitation for business'', ''request for confidentiality'', and ''closing''. However the permutation of the ''writer's introduction'' for the ''reason why are you receiving this email'' is common. Usually following those two moments the ''writer's introduction'' marks a pivotal moment in the email, as who the writing character happens to be, will set both the stylistic conventions in which the email is written, as well as the money narrative that will follow.  
 
Like the banker from ABSA Bank in Johanessbourg who presents his contacts in the closing formular, as one would have expected from a bank official:
Such system of fixed and finite elements, combined with interchangeable and numerous characters gives the tale its "multiformity, picturesqueness, and color, and on the other hand, its no less striking uniformity, its repetition" (Propp 1926, p.8). And even when certain function are excluded from a tale, the sequence remains unaltered.
<pre>
 
Blommaert argues this fixed structure, in his words ''blueprint'', endows the messages with structural stability, while opening up the possibility for the materialization of very diverse narratives (2005 pp. 11-18). Imposing Blommaert's blueprint against the 419s I'd bee collected has revealed to match. I have changed the terms identify each section, ''salutation'', ''writer's introduction'', ''reason why are you receiving this email'', ''the money narrative'', ''invitation for business'', ''request for confidentiality'', and ''closing'', so that they would become more self-explanatory, but the event which takes place within each section is essentially the same. From this point onward I began discriminating these parts within the collected emails. These divisions made visible by the different background colors of each message.
 
In the majority of cases the 419s structure follows the sequence: ''salutation'', ''writer's introduction'', ''reason why are you receiving this email'', ''the money narrative'', ''invitation for business'', ''request for confidentiality'', and ''closing''. However the permutation of the ''writer's introduction'' and the ''reason why are you receiving this email'' position is also common. Usually following those two moments the ''writer's introduction'' marks a pivotal moment in the email, as whom the writing character happens to be, will set both the stylistic conventions in which the email is written, as well as the money narrative that will follow.  
Like the banker from ABSA Bank in Johanessbourg (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/63 ) who in his closing formular presents his contacts, as you'd expected from a bank official:
</pre>
Yours Faithfully,
Yours Faithfully,
Mr Peter Hayman
Mr Peter Hayman
Line 121: Line 105:
Tel+27832489498  
Tel+27832489498  
</pre>
</pre>
(http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/63 )


Or in the case of a rich but fatally ill Mrs Maria Johnson (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/41), who presents herself as a convert Christian, affirms the faith including numerous indexes throughout the email, such as "Greetings in the name of our Lord Jesus Christ", "Propagating the word of God and to ensure that the house of God is maintained", or "Yours in Christ". These, like the banker's contacts are what Jan Blommaert refers to ''indexically argumentative''. It consists of a strategy aimed at gaining the reader's trust through "the deployment of generic and stylistic features that lock into existing, recognizable and presupposable indexical values" (p.18).
Or in the case of a rich but fatally ill Mrs Maria Johnson (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/41), who presents herself as a converted Christian, and consequently affirms her faith numerous times in the email, such as "Greetings in the name of our Lord Jesus Christ", "Propagating the word of God and to ensure that the house of God is maintained", or "Yours in Christ". These, like the banker's contacts are what Jan Blommaert refers to indexical argumentation, a strategy aimed at gaining the reader's trust through "the deployment of generic and stylistic features that lock into existing, recognizable and presupposable indexical values" (2005 p.18).




Line 128: Line 113:




An ''invitation'' for business follows. This is another important moment, where the reader is enticed to take part in this profitable business. Aminali Kones writes "The amount is (€5.2 Euros) Five Million Two Hundred Thousand Euros ... You will also help me to place the money in a more profitable business venture in your Country ... It is my intention to compensate you with 30% of the total money for your services and the balance shall be my capital in your establishment. As soon as I receive your positive response showing your interest I will put things into action immediately". Often instructions are also given to the reader about how to proceed with the deal, such as Sgt. Barry Kirkland (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/100) indications to "contact Mr. Reuben Asiedu, a local farmer i met in Africa during one of our peace keeping missions, He is reliable/trust-worthy, He'll assist you legally set up a Charity in his country Ghana in your name and immediately this is done, you'll receive an anonymous payment of $47,000000.00 in three installments in the charity's account, 25% goes for the charity, 50% is to be wired to another account that will be provided you, 15% is your compensation and 10% for miscellaneous expenses through out the deal". The reader is often also reasured of the risk-free nature and liability of this deal, "I assure you that this transaction is 100% risks free.If you are really sure of your, Trust worthiness, Accountability and confidentiality on this transaction contact me" are the words of Morgan Ashante (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/64).
An ''invitation'' for business follows. This is another important moment, where the reader is enticed to take part in this profitable business. Aminali Kones writes  
 
<pre>The amount is (€5.2 Euros) Five Million Two Hundred Thousand Euros ... You will also help me to place the money in a more profitable business venture in your Country ... It is my intention to compensate you with 30% of the total money for your services and the balance shall be my capital in your establishment. As soon as I receive your positive response showing your interest I will put things into action immediately.</pre>
 
Just preceding the email's ''closing'' the reader is given a ''request for confidentiality'', like Capt. Rafael Martinez (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/98) who asks the reader "be mindful of the fact that I would prefer that you keep this confidential as I am still in the service and I do not want to lose my Job". Other times such request seems to contradict what has been written previous on the legitimate nature of the operation [MISSING EXAMPLE]


At times there emails that deviate from this fixed structure, as in cases where all the functions are agglutinated into short form, a kind of a 419s synopsis, where the reader is still communicated the propositions, but doesn't need to read as much as in a usual message, this is the case of Alima Kipkalya Kones' message (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/75) or [ADD ANOTHER SHORT VERSION]
Often instructions are also given to the reader about how to proceed with the deal, such as Sgt. Barry Kirkland indications:
[ADD + DEVIATIONS]
<pre>contact Mr. Reuben Asiedu, a local farmer i met in Africa during one of our peace keeping missions, He is reliable/trust-worthy, He'll assist you legally set up a Charity in his country Ghana in your name and immediately this is done, you'll receive an anonymous payment of $47,000000.00 in three installments in the charity's account, 25% goes for the charity, 50% is to be wired to another account that will be provided you, 15% is your compensation and 10% for miscellaneous expenses through out the deal.</pre>(http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/100)


The reader is also often reassured of the risk-free nature and liability of this deal, "I assure you that this transaction is 100% risks free. If you are really sure of your, Trust worthiness, Accountability and confidentiality on this transaction contact me" are the words of Morgan Ashante (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/64).


This fixed structure of message parts might make spam author's writing work easier. It gives them a plan to follow, providing small slot on to which the story can more easily be written, and communicated. [ A WRITING MACHINE ] [MORE]


Another example of the employment of a stable macro-structure to generate artistic works has been depicted by Umberto Eco in Ian Flemming's James Bond novels (1982). Eco describes the Bond plot as a scheme which begins with M moving and giving Bond  a task, followed by the villain's move, appearing to Bond, which leads to Bond giving the first check to the Villain or the Villain to Bond. The scheme carries on, but from novel to novel it remains constant, presenting the same elements in every story, although the order can change, and events can appear more than once. Eco asks how can an inventive fiction-writer function within the limitations of such predetermined plot. He answers by stating that repetition is a characteristic of detective stories, and this unchangeable scheme allows the reader to recognize something he already knows and has grown found of. In other words the detective story  produces <b>redundancy</b>. While "pretending to arouse the reader, in fact it reconfirms him a sort of imaginative laziness, and creates escape not by narrating the unknown but the already known"(p.258). Going back to the game analogy Eco describes the reader's pleasure as finding himself in a game, where both elements and rules are known, and often also the outcome, Bond always win against the Villain and the free-world against tyranny of the Soviet Union.  
Just preceding the email's ''closing'' the reader is given a ''request for confidentiality'', like Capt. Rafael Martinez asking the reader "be mindful of the fact that I would prefer that you keep this confidential as I am still in the service and I do not want to lose my Job" (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/98). Other times such request seems to contradict what has been written previous on the legitimate nature of the operation
  [ADD EXAMPLE]


At times some 419 deviate from this structure, as in cases where all the functions are agglutinated into short form, a kind of synthesis of the previously mentioned stages, where the reader is still communicated the proposition, but doesn't need to read as much as in a usual message, this is the case of Alima Kipkalya Kones' message (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/75).
[ADD ANOTHER SHORT VERSION]
[ADD + DEVIATIONS]


===characters===


The collection of 419s is organized according to characters featuring as the posing writer of the emails. This was mainly informed by the fixed number of characters that featured in the 419 that I received or found. I came across rich daughters, soldiers, banker and insurance officers, rich but ill widows, [++]. It is surprising, comparatively to large numbers of 419s circulating, how small the number of characters playing the role of writer can be found. Why am i not receiving any emails from plumbers or cooks - the common folk? They too might face complicated situations in their lives that require my assistance, they too might from time to time inherit a small fortune, they too must have access to an internet connection and my email address. Why are only these very SPECIFIC [? a better description] characters the ones who write the 419s?
This fixed structure might make spam author's work easier. It provides them with a plan to follow, constituted by a number of slots on to which the story can more easily be written, and communicated.
 
[ A WRITING MACHINE ] [MORE]
[FIND HOW CAN BE THE CHARACTERS CLASSIFIED]
Another example of the employment of a stable macro-structure to generate artistic works has been depicted by Umberto Eco in Ian Flemming's James Bond novels (1982). Eco describes the Bond plot as a scheme which begins with M moving and giving Bond a task, followed by the villain's move, appearing to Bond, which leads to Bond giving the first check to the Villain or the Villain to Bond, and so forth until the end. From novel to novel this scheme remains constant. The same elements are presented in every story, although the order can change, and events can appear more than once. Eco asks how can an inventive fiction-writer function within the limitations of such predetermined plot. He answers by stating that repetition is a characteristic of detective stories, and this unchangeable scheme allows the reader to recognize something he already knows and has grown found of. In other words the detective story  produces <b>redundancy</b>. While "pretending to arouse the reader, in fact it reconfirms him a sort of imaginative laziness, and creates escape not by narrating the unknown but the already known"(Eco 1982, p.258). Eco describes the reader's pleasure as finding himself in a game, where both elements and rules are known, and often also the outcome, Bond always win against the Villain and the free-world against tyranny of the Soviet Union. 
[WHAT IS COMMON ABOUT THEM]
[ADD CALVINO NOTES ON FOLKTALES: often repeating, constantly varying]




Line 155: Line 141:
[  story level, in its characters, and events, and at the delivery level, in its structural organization. ]
[  story level, in its characters, and events, and at the delivery level, in its structural organization. ]


==explanations for the repetitions==
==explanations for the repetitions=


'''why are repetitions so ubiquitous to spam?'''  
'''why are repetitions so ubiquitous to spam?'''  
Line 178: Line 164:


=Bibliography=
=Bibliography=
* Barron, Anne 2006
* Barron, Anne 2006
* <i>BBC.co.uk </i>(2011) Nigerian politician Bankole pleads not guilty to fraud. 8 June 2011 <http://www.bbc.co.uk/news/world-africa-13699458> [Accessed 13 March 2013]
* Blommaert, J. (2005) Making Millions: English indexicality and fraud. King's College London, accessed 08 March 2013 <http://www.kcl.ac.uk/innovation/groups/ldc/publications/workingpapers/29.pdf>
* Blommaert, J. (2005) Making Millions: English indexicality and fraud. King's College London, accessed 08 March 2013 <http://www.kcl.ac.uk/innovation/groups/ldc/publications/workingpapers/29.pdf>
* Burrell, J. (2012) 'Invisible Users: Youth in the Internet Cafés of Urban Ghana'. MIT Press. Cambridge / London, accessed 10 March 2013 <http://monoskop.org/log/?p=6724>
* Burrell, J. (2012) Invisible Users: Youth in the Internet Cafés of Urban Ghana. MIT Press. Cambridge / London, accessed 10 March 2013 <http://monoskop.org/log/?p=6724>
* Craigslist (2012) Scams <http://www.craigslist.org/about/scams> [Accessed 14 March 2013]
* Eco, Umberto (1982) The Narrative Structure of Ian Fleming. In Waites, B., Bennett, T. and Martin, G. (ed.) ''Popular Culture: Past and Present''. Kent: The Open University. p.242-262
* Eco, Umberto (1982) The Narrative Structure of Ian Fleming. In Waites, B., Bennett, T. and Martin, G. (ed.) ''Popular Culture: Past and Present''. Kent: The Open University. p.242-262
* Gallix, Andrew (2008) Spam Lit: the silver lining of junk mail? <i>guardian.co.uk</i> 1 July 2008. <http://www.guardian.co.uk/books/booksblog/2008/jul/01/spampoetyrem> [Accessed 14 March 2013]
* Glickman, H. (2005) The Nigerian "419" Advance Fee Fraud. ''Canadian Journal of African Studies'' 39(3), pp. 460 - 489
* Glickman, H. (2005) The Nigerian "419" Advance Fee Fraud. ''Canadian Journal of African Studies'' 39(3), pp. 460 - 489
* Heyd, Theresa. 2008. 'Email Hoaxes: Form, function, genre ecology'. John Benjamins Publishing Company. Amsterdam / Philadelphia.
* Heyd, Theresa. 2008. 'Email Hoaxes: Form, function, genre ecology'. John Benjamins Publishing Company. Amsterdam / Philadelphia.
Line 189: Line 176:
* Propp, Vladímir. 1929. Morphology of the Folk Tale. The American Folklore Society and Indiana University.
* Propp, Vladímir. 1929. Morphology of the Folk Tale. The American Folklore Society and Indiana University.
* Suleiman, Susan (1980). Redundancy and the "Readable" Text. ''Poetics Today'' 1(3), pp.119-142
* Suleiman, Susan (1980). Redundancy and the "Readable" Text. ''Poetics Today'' 1(3), pp.119-142
* Thomason, A. (2007) Blog Spam: A Review. <i>Proceedings of the Fourth Conference on Email and Anti-Spam</i> <http://www.ceas.cc/2007/papers/papers/paper-85.pdf> [Accessed 14 March 2013]
* Wikipedia (2013) Wikipedia:Spam <http://en.wikipedia.org/wiki/Wikipedia:Spam> [Accessed 14 March 2013]

Latest revision as of 00:19, 25 March 2013

Introduction

(context)

Spam, once only a brand of spiced canned meat, turned into a synonym for unsolicited email, sent to large number of addresses, with the underlying intention of extorting money through a convincing narrative or sell products such as Rolex replicas or Viagra pills to their recipients. Spam is essential distasteful advertising that arrives in our mailboxes, in large quantities. It's electronic junk destined to receive a click from its the recycling-bin icon and vanish. But as much it is distasteful and unsolicited it also fascinating for many. Perhaps as result of its colossal volume, or its diversity, comprising sub-genres are as varied as medical spam (Barron 2006), hoaxes (Heyd 2008), spam lit(Gallix 2008), dating invitations, or fraud emails. And not to mention the mediums through which spam is communicate, ranging from email, blog comments (Thomason 2007), community websites like Craigslist (Craigslist 2012), and Wikipedia (Wikipedia 2013). The attention spam generates is far beyond what one would expect, specially after going through the tedious task of cleaning our email client of all its unsolicited emails. Spam takes online security experts, legislators, and computer scientist to work on preventing spam to reach its final destination, common individuals to form and feed online forums alerting against possible scams received by email, slightly less-common individuals to architect and apply elaborate plans to unmask spam schemes, anthropologists to investigate who, where, and under what conditions are at the origin of spam (Burell 2012), linguists to speculate on the grammatical anomalies contained in spam (Blommaert 2005, Barron 2006), artist to make it a playground full of possibilities, and most of us, who rely on email to communicate, to become its readers, and respond with amusement, curiosity, boredom, or wonder.


(field of study)

It is my intention, to use this discussion to transmit the reader a detailed view on the sub-genre of spam entitled 419 fraud email, and the repertoire of stories and characters that inhabit the 419s universe. 419s derive their name from the Nigerian law code prohibiting the impersonation of state's officials. As analog predecessors of current 419s - letters and faxes - came initially from Nigeria and employed the country's political figures as their posing authors, this sub-genre of spam got its current designation. In these emails the posing author proposes the recipient to take part in a highly lucrative business. Invariably they provide an explanation as for the money's origin and for their inability to get hold of it, therefore requesting the reader's cooperation. These are often rich, colorful, and often absurd stories, which mix promiscuously with reality. Not only I find them appealing stories, but even more fascinating as scam strategies. Isn't there a more direct way of stealing money from individuals than going through the efforts of writing transmitting a convincing story, in order to do so? Not to mention the constant and easily identifiable set of patterns present in 419s doesn't seem to provide the most effective scam strategy. Although reoccurrences happening between different 419s specimens might not be a very effective choice for fraud purposes, it definitely brings consistency and character of this para-literary genre. And I suspect that such repetitive quality might be one of the reasons behind the general interest and attention devoted to spam. Putting aside whether my suspicion is right or wrong, I would like to ask why is repetition so ubiquitous to spam? The straight-forward and easy answer would state that spam is a product of an incessant plagiary practice, which allows for a large number of messages to be constructed in a short amount of time. But couldn't it also be argued that reoccurrences, repetitions, and redundancies are so omnipresent and ingrained in western mass culture, that spam has simply incorporated them as an attention grabbing strategy?


(discussion)

I will be discussing these two possible explanations for the high frequency of repetitions and redundancies that confronts us while reading 419 fraud emails. On the one hand I will establish a correlation between the forms of reocurrence detected on 419s fraud emails and those prevalent in popular culture products. On the other hand, I will put forward a more possible and down-to-earth explanation, based upon the restrictions and costly access to an Internet connection and a computer in some parts of the globe commonly associated with 419s, making the appropriation of an already existing, well-written, and convincing message a cheaper and safer choice. In order to construct my argument and defend each side I will rely upon works of literary criticism within the realms of structuralism and semiotics that investigate the repetitive aspects within product of mass-culture, such as Vladímir Propp's mapping of Russian fairy-tales into plot formulas, Umberto Eco's reading of James Bond novels, and John Cawelti analysis of crime novels; And works dedicated to 419s text analysis by Jan Blommaert and Harvey Glickman, as well the anthropological field-work developed by Jenna Burrell within the population of young spammers in Ghana's Accra. Lastly, as tangible evidence of the subject discussed I will use examples included in a database of 419 email, which I have been developing and compiling as a tool for my research. Once both sides have been properly explored I expect to be in position to assess whether repetition, redundancies and the formulaic nature are the side-product of time-saving mechanisms used to compose the 419s fraud message or whether its authors are cleverly exploring our desire to be told known and predictable stories.

Methodology

419s' archive

Must of the email examples employed throughout this thesis will can be found at http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam . This URL holds a collection of 419s I have been collecting since November 2012. Beginning in December 2012, I have been compiling and organizing the collected emails under this archive. Although still in development, the archive has function as an important tool in my research process. Currently the archive holds a collection of circa 50 emails. Each email entry includes, the email body, author's name, email subject, unique url. Each entry is also provided with a color code meant to identify the different parts present within the email body, however a more detailed explanation will follow in the repetition section. The archive is organized around the stock character posing as the author of emails. Each of these archetypal figures is at the epicenter of a constellation of emails, so one can browse all the emails present in the collection which have been written by soldiers, or sick widows, or politicians. The process of assembling the emails that form part of the database begins with begins with the arrival of one email on to my email account, often via some friend aware of my interest in spam, or a legitimate spam. A quick reading allows me to identify if I am dealing with a 419, if that is the case I will look further on to whom poses as the author of the email, say it is a soldier, under then name David Joseph; The next move consist in making a Google search on the terms "419 fraud David Joseph" and invariably I end up in one of the fraud alert website such as 419scam.org, 419.bittenus.com, antifraudintl.org or scamdex.com and next to David Joseph email lay dozens of other email similar emails in which a British or American soldier proposes a highly lucrative deal. I then start adding those found emails to the database, identifying their posing author under the soldier category. When introducing an email to the archive I will try that the date refers to the moment when the email was originally received. I cases found email, like the previously described case, the assigned date will try to respect the date when the email originally arrived in its recipient's inbox.

[+ ON METHODOLOGY]


Four-One-Nines

anatomy and origin of the 419s

Harvey Glickman (2005) in the article The Nigerian "419" Advance Fee Fraud summarizes 419s as emails, but also faxes, and letters that make reference to a large sum of money held in an African bank account or other safe location. The owner of this sum is often dead. The sender asks the recipient's collaboration in transferring the frozen funds to a foreign account, so that the money becomes accessible. As a reward for the recipient's collaboration a fraction of the total sum will be given to him. Victims who fall for this telltale are normally asked to provide their personal details, bank name and account number early on, such information is used in credit card applications or checks forgeries. If the recipient is eager to take part in the proposed deal he will, at later stage be requested to transfer money to the sender's account, under the excuse that a lawyer needs to be payed to do the necessary paper work, an official has to be bribed to set the process rolling, or identity marks be removed from banknotes. Victims, like gambles, struggle to admit they are loosing money, and go on complying with these requests, in hope that their guaranteed profit will appear. Even when convinced that they have fallen for a scam victims are deterred from denouncing it, as they are aware of the illegal contours of the business they joined (Glickman, pp.465-469).

[INCLUDE FLOWCHART OF THE SCHEME BEHIND 419 ]


[distinguish from hoax]

A very similar spam genre is the email hoax ...

[define Email hoax - show how differs from 419s]


[narratives genre]

Jan Blommaert's article Making Millions: English indexicality and fraud (2005) is an example of the confusion between 419s and spam hoaxes. Although his article is dedicated exclusively to 419s, he classifies them as "e-mail spam hoax message[s]" (ibid, p.2). Despite this inconsistency Blommaert's provides a well informed sociolinguistic analysis of the 419s, and suggests a typology that I believe to be useful to understand the specificity of the 419s. Blommaert distinguishes two main groups: administrative-formal genres and narrative genres. The administrative genres comprises lottery reward messages, which inform the reader about his prize and are marked by a formal and administrative lingo. The narrative genres tend towards a more personal approach, involving the establishment of a bond between reader and writer (ibid, p.9). I have decided to relegate from my research the administrative genre, and opt only for the narrative one, as the later originates more elaborate texts, which seek to seduce of the reader, and, as previously mentioned, elaborate a story justifying the appearance of the money. Within the narrative genre Blommaert distinguishes three sub-categories: dormant accounts, rescue operations, and charity. In all of them the addressee is asked to transfer money to a foreign bank account, what changes is the money origin and reason behind the writer's request. In dormant accounts a banker or assurance officer finds unclaimed funds from a deceased client; In the rescue operations the reader is asked to assist the posing writer, by rescuing his funds, since he has found himself in trouble in his home country; Lastly charity emails are written by a supposedly religious and wealthy author, nearing his last days and wanting to donate his capital to charity. In each one of these sub-categories one or more characters are positioned as the writer. The character assigned that role is not only, as was already mentioned, the organizing principal behind the 419s database, but will also be subject of a later section of this thesis.


[origin of 419s]

The handle "419" comes from Nigerian Criminal Code preventing the impersonation of official entities for financial gains (Glickman 2005, p.461). Although this money extorting of narrative dates back a few centuries to what is known as the Spanish Prisoner scheme. In this early form of scam a rich merchant would be told about the misfortunes of a sequestered child and his father, whom had been imprisoned in a Spanish prison. The fraud victim would be asked to pay for their release, in which case he would receive a larger sum as reward. Fast-forwarding to the Twentieth Century, the same scheme was found to be gaining popularity during in the 1970s and 1980s Nigeria. Initial using letters, later faxes, email became the common medium, adopted to launch 419s. Although 419s had were initially came from Nigeria, and are still associated with this country, they are no longer confined to it. 419s production has been located in other African nations, and countries such as Singapore, Russia, and Honk-Kong (ibid pp.472-473). The origin of 419s in Nigeria is not fortuitous. As Jenna Burrell (2012) indicates the scenarios described are based on the corrupt activities carried out by Nigeria's 1980s and 1990s military governments. Still today one might receive an email from a Nigerian official. Such is the case with the former House of Representatives Speaker of Nigeria Dimeji Bankole, who according to BBC(2011) in 2011 was arrested under the accusation of deviating $65m of government funds, notwithstanding we might receive his emails, such as the following specimen:

From: "Hon. Dimeji Bankole" <info@dimejibankole.com>
Reply-To: hondimejibankole0@yahoo.com
Date: Sun, 08 Apr 2012 12:20:18 -0300
Subject: Business Proposal

Dear Sir,
I am the former speaker National House of Representative in the Federal
Republic of Nigeria and My Name is Hon. Dimeji Bankole. I am in position of
USD 12M which i intend to invest in Real Estate in your country. I am
looking for a reliable person or company that will help me to invest this
money on my behalf. Kindly update me if you can represent my interest in
your Country. Reply to my personal email address:
hondimejibankole0@yahoo.com
Thanks for your anticipated cooperation.
Best regards,
Hon. Dimeji Bankole

(http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/102)

[ADD ANOTHER SOURCE TO SPANISH PRISONER TALE] 
[ADD ANOTHER SOURCE TO NIGERIAN POLITICAL CONTEXT ] 



REPETITIONS

(kones example)

When I began working on expanding my database I was struck by a curious email, or are rather say, a series of them. I came across an email whose author posed as Miss Kones, the daughter of Kipkalya Kiprono Kones, Kenyan's former roads' minister who died in plane accident. The story was a typical example of 419 rescue operation email. The young and seductive daughter teases the reader to help her transfer the funds intended for her, according to her father's will, before her mean stepmother takes control of all her late-husband's possessions. On searching for emails telling a similar story I was confronted not by a similar, but the very same story, and the same posing character, but under a different first names. I found emails from Aminali, Cindy, Nora, Samira, Fatima, Susan, Amina, Fatima, Dalila, Esther, Joy, and Mercy. Quite a few daughters even for wealthy man. This incessant appropriation of the same story and characters made me look further into it. Although, appearing as the same text, there was still variations and differences among the emails. So that brought me to ask what is common to the majority of 419s.

[DEVELOP/EDIT, SO IT CROSSES-OVER TO CHARACTERS ] 

(what forms of repetition?)

Reoccurrences taking place in 419s can be detect at the level of the structural organization, the characters posing as the author of the message and the events described.

characters

[TO BE WRITTEN] 


Being 419s characterized by their ever-changing nature, continuously trying to find new teasing narratives to lure, the sources of money keep on changing. However, a strong trend detected, in which has its origin in the fortunes of wealthy deceased person. Among the the many described sources we find Saddam Hussein, Osama bin Laden, the Porsche tuning company's CEO, Uwe Gemballa, or Christian Eich, a German engineer victim of the Concorde crash on June 25th 2000 in Paris. As for the person who poses as author of the email, the repertoire includes bankers and insurance agents, British and American soldiers, relatives to deceased politicians, and rich but fatally ill widows, which will be given a more detailed description in the part dedicated to the 419s characters.


The collection of 419s is organized according to characters featuring as the posing writer of the emails. This was mainly informed by the fixed number of characters that featured in the 419 that I received or found. I came across rich daughters, soldiers, banker and insurance officers, rich but ill widows, [++]. It is surprising, given the large number of 419s in circulation, how small the number of characters given the role of writer can be found. Why am I not receiving any emails from plumbers or cooks - the common folk? They too might face complicated situations in their lives that require my assistance, they too might from time to time inherit a small fortune. Why are only these very SPECIFIC [? a better description] characters the ones who write the 419s?

[FIND HOW CAN BE THE CHARACTERS CLASSIFIED]
[WHAT IS COMMON TO THEM]
[We have 2 constant elements: the structure and the character]

structure

In what concerns its structure, 419s seem to follow what Jan Blommaert (2005) describes as a generic blueprint, consisting of terms of address, apology and introduction, micro-narrative on the origin of the money, reassurances convincing the reader on the writer's sincerity, requests for the reader's confidentiality, and lastly the closing formula. This form of narrative structure dissection has a processor in the work of Russian folklorist Vladímir Propp. Intending to establish a morphology of Russian folktales, a sort of list of ingredients and the sequence in which they enter the elaboration of a Russian fairy-tale, Propp proposed a morphological analyses of Russian fairy tales according to "the functions of its dramatis personae"(1929 p.7). In other words, the study focuses on the what action is performed, and not on who performs it or how is performed, as different "characters of a tale, however varied they may be, often perform the same action. The actual means of the realization of functions can vary, and as such, it is a variable... But the function, as such, is a constant" (ibid p.8). Propp research revealed that, despite their diversity, Russian fairy-tales only entail thirty-one functions. Such system of fixed and finite elements, combined with interchangeable and numerous characters provides the tale with its "multiformity, picturesqueness, and color, and on the other hand, its no less striking uniformity, its repetition" (Propp 1926, p.8).

Blommaert argues this fixed structure, in his words blueprint, endows the messages with structural stability, while opening up the possibility for the materialization of very diverse narratives (2005 pp. 11-18). When super-imposing Blommaert's described blueprint against the 419s I have collected has revealed to match, therefore I have adopted Blommart's blueprint to query the structure of the collected 419s, although making a slight changes in the terms. I have decided upon salutation, writer's introduction, reason why are you receiving this email, the money narrative, invitation for business, request for confidentiality, and closing, so that they would become more self-explanatory, but the event taking place within each section is essentially the same. Each part is identified within the database through the color assigned to its background. In the majority of cases the 419s structure follows the sequence: salutation, writer's introduction, reason why are you receiving this email, the money narrative, invitation for business, request for confidentiality, and closing. However the permutation of the writer's introduction for the reason why are you receiving this email is common. Usually following those two moments the writer's introduction marks a pivotal moment in the email, as who the writing character happens to be, will set both the stylistic conventions in which the email is written, as well as the money narrative that will follow. Like the banker from ABSA Bank in Johanessbourg who presents his contacts in the closing formular, as one would have expected from a bank official:

Yours Faithfully,
Mr Peter Hayman
ABSA Bank
Johanessbourg,
South Africa.
Tel+27832489498 

(http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/63 )

Or in the case of a rich but fatally ill Mrs Maria Johnson (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/41), who presents herself as a converted Christian, and consequently affirms her faith numerous times in the email, such as "Greetings in the name of our Lord Jesus Christ", "Propagating the word of God and to ensure that the house of God is maintained", or "Yours in Christ". These, like the banker's contacts are what Jan Blommaert refers to indexical argumentation, a strategy aimed at gaining the reader's trust through "the deployment of generic and stylistic features that lock into existing, recognizable and presupposable indexical values" (2005 p.18).


The money narrative entails both an explanation to both the money origin, as for the impediment preventing the writer to get hold of the money. Such is the case of Sgt. John Samuel (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/71) who explains how "[s]ome money in various currencies were discovered in a room at a farm house near one of Osama Bin Laden's old house in Kabul-Afghanistan during a rescue operation", in which he took part. Now that both him and Col. William E. Cole decided to keep and share the money, which is not permitted, Sgt. John Samuel needs someone who is willing to keep in safe place that money. Or Aminali Kones (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/91) who father has died in plane crash, but before hand he has "deposited huge amount of money in one security company in Togo". Unfortunately Aminali finds out she can only checkout the money when "married or present a trustee who will help me and invest the money overseas". To make matter worse both Aminali stepmother and uncle conspired and sold he father's properties leaving nothing for her.


An invitation for business follows. This is another important moment, where the reader is enticed to take part in this profitable business. Aminali Kones writes

The amount is (€5.2 Euros) Five Million Two Hundred Thousand Euros ... You will also help me to place the money in a more profitable business venture in your Country ... It is my intention to compensate you with 30% of the total money for your services and the balance shall be my capital in your establishment. As soon as I receive your positive response showing your interest I will put things into action immediately.

Often instructions are also given to the reader about how to proceed with the deal, such as Sgt. Barry Kirkland indications:

contact Mr. Reuben Asiedu, a local farmer i met in Africa during one of our peace keeping missions, He is reliable/trust-worthy, He'll assist you legally set up a Charity in his country Ghana in your name and immediately this is done, you'll receive an anonymous payment of $47,000000.00 in three installments in the charity's account, 25% goes for the charity, 50% is to be wired to another account that will be provided you, 15% is your compensation and 10% for miscellaneous expenses through out the deal.

(http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/100)

The reader is also often reassured of the risk-free nature and liability of this deal, "I assure you that this transaction is 100% risks free. If you are really sure of your, Trust worthiness, Accountability and confidentiality on this transaction contact me" are the words of Morgan Ashante (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/64).


Just preceding the email's closing the reader is given a request for confidentiality, like Capt. Rafael Martinez asking the reader "be mindful of the fact that I would prefer that you keep this confidential as I am still in the service and I do not want to lose my Job" (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/98). Other times such request seems to contradict what has been written previous on the legitimate nature of the operation

[ADD EXAMPLE] 

At times some 419 deviate from this structure, as in cases where all the functions are agglutinated into short form, a kind of synthesis of the previously mentioned stages, where the reader is still communicated the proposition, but doesn't need to read as much as in a usual message, this is the case of Alima Kipkalya Kones' message (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/75).

[ADD ANOTHER SHORT VERSION]
[ADD + DEVIATIONS]


This fixed structure might make spam author's work easier. It provides them with a plan to follow, constituted by a number of slots on to which the story can more easily be written, and communicated.

[ A WRITING MACHINE ] [MORE]

Another example of the employment of a stable macro-structure to generate artistic works has been depicted by Umberto Eco in Ian Flemming's James Bond novels (1982). Eco describes the Bond plot as a scheme which begins with M moving and giving Bond a task, followed by the villain's move, appearing to Bond, which leads to Bond giving the first check to the Villain or the Villain to Bond, and so forth until the end. From novel to novel this scheme remains constant. The same elements are presented in every story, although the order can change, and events can appear more than once. Eco asks how can an inventive fiction-writer function within the limitations of such predetermined plot. He answers by stating that repetition is a characteristic of detective stories, and this unchangeable scheme allows the reader to recognize something he already knows and has grown found of. In other words the detective story produces redundancy. While "pretending to arouse the reader, in fact it reconfirms him a sort of imaginative laziness, and creates escape not by narrating the unknown but the already known"(Eco 1982, p.258). Eco describes the reader's pleasure as finding himself in a game, where both elements and rules are known, and often also the outcome, Bond always win against the Villain and the free-world against tyranny of the Soviet Union.

[ADD CALVINO NOTES ON FOLKTALES: often repeating, constantly varying]


events??

[ story level, in its characters, and events, and at the delivery level, in its structural organization. ]

=explanations for the repetitions

why are repetitions so ubiquitous to spam?


FIND LOCATION

  • fictitious nature of 419s' stories. - a desire to escape?

If I taken another look at the examples given to identify the 419s narrative structure formula I am struck by the unreal nature of these narrative. Like the story told by the banker Peter Hayman (http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/63), asking the reader to help in safe-guarding the funds from a deceased rich client, before they are claimed by the country's authorities. It seems quite unlikely that an outsider would is able to influence this sort of process more than a banker would. Or to receive an email from a soldier took part in Osama bin Laden's arrest. Yet, these narratives, despite they unreal nature don't seem to stick out from the rest of 419s stories, as all of them propose deals and present situations that are, at least, unlikely to be encountered by one of us. Since all its indexes indicate their fictional nature. It becomes hard to believe that anyone would take them as reality,

  • could it be that they provide the reader with a form of escape, not unlike detective novels, western movies, or other mass culture productions of a very formulaic nature?



  • economy principal - msgs produced with no effort (Heyd p.82)




Bibliography

  • Barron, Anne 2006
  • BBC.co.uk (2011) Nigerian politician Bankole pleads not guilty to fraud. 8 June 2011 <http://www.bbc.co.uk/news/world-africa-13699458> [Accessed 13 March 2013]
  • Blommaert, J. (2005) Making Millions: English indexicality and fraud. King's College London, accessed 08 March 2013 <http://www.kcl.ac.uk/innovation/groups/ldc/publications/workingpapers/29.pdf>
  • Burrell, J. (2012) Invisible Users: Youth in the Internet Cafés of Urban Ghana. MIT Press. Cambridge / London, accessed 10 March 2013 <http://monoskop.org/log/?p=6724>
  • Craigslist (2012) Scams <http://www.craigslist.org/about/scams> [Accessed 14 March 2013]
  • Eco, Umberto (1982) The Narrative Structure of Ian Fleming. In Waites, B., Bennett, T. and Martin, G. (ed.) Popular Culture: Past and Present. Kent: The Open University. p.242-262
  • Gallix, Andrew (2008) Spam Lit: the silver lining of junk mail? guardian.co.uk 1 July 2008. <http://www.guardian.co.uk/books/booksblog/2008/jul/01/spampoetyrem> [Accessed 14 March 2013]
  • Glickman, H. (2005) The Nigerian "419" Advance Fee Fraud. Canadian Journal of African Studies 39(3), pp. 460 - 489
  • Heyd, Theresa. 2008. 'Email Hoaxes: Form, function, genre ecology'. John Benjamins Publishing Company. Amsterdam / Philadelphia.
  • Hirschman, E. (1988) The Ideology of Consumption: A Structural-Syntactical Analysis of "Dallas" and "Dynasty". Journal of Consumer Research 15(3), pp. 344-359.
  • Propp, Vladímir. 1929. Morphology of the Folk Tale. The American Folklore Society and Indiana University.
  • Suleiman, Susan (1980). Redundancy and the "Readable" Text. Poetics Today 1(3), pp.119-142
  • Thomason, A. (2007) Blog Spam: A Review. Proceedings of the Fourth Conference on Email and Anti-Spam <http://www.ceas.cc/2007/papers/papers/paper-85.pdf> [Accessed 14 March 2013]
  • Wikipedia (2013) Wikipedia:Spam <http://en.wikipedia.org/wiki/Wikipedia:Spam> [Accessed 14 March 2013]