Professional Documents
Culture Documents
order to gain the confidence of their proactive steps we can take to protect
targets. They exploit this trust to exploit or teenagers from falling victim to their
harm the individuals emotionally, insidious traps. By working together, we
financially, or sexually. Their motivations can provide the guidance and support
can vary, but some online predators seek needed to empower teenagers and keep
power, control, or sexual gratification them safe in the vast expanse of the
through their actions. They take advantage internet.
of the anonymity and vast reach of the
internet to prey on unsuspecting Online Predators
individuals and exploit their Online predating seem to be the regular
vulnerabilities. It is important to educate normal in our society today. The internet is
one self and others about online safety, another world on its own where so many
privacy, and the risks associated with evil’s take place. 90% of our children and
interacting with strangers online. even adults get’s glued on the internet on a
Maintaining open communication with daily basis. People with evil and intentions,
children, setting clear boundaries, and surf the net too looking for naïve victims
monitoring their online activities can help that will fall easily to them. Online
protect them from online predators. predators are individuals who use the
Additionally, reporting any suspicious internet and digital platforms to target and
behavior or incidents to the appropriate exploit others, particularly vulnerable
authorities is crucial in combating online individuals, for their own gain or pleasure..
predation and ensuring the safety of A lot of teenagers has met their end from
individuals online. people they met on the internet who lured
This article aims to shed light on the topic them to secluded places and killed them
of online predators and provide valuable after extorting them. An encounter with an
insights into the strategies and measures online predator has gotten many people
that can be taken to safeguard teenagers robbed, raped, beaten, maimed and defiled
from internet sexual exploitation. By (in the case of an innocent child). Wale
raising awareness about the risks and Odunsi (2021) reported the activities of a
vulnerabilities associated with online gay online. The caption reads “EFCC
interactions, we can empower teenagers to arraigns alledged online gay predator for
navigate the digital landscape safely and $8 420 scam in Kaduna State” The report
confidently. Furthermore, we will explore is written below:
the roles of parents, educators, and law The Economic and Financial Crimes
enforcement agencies in ensuring the Commission (EFCC) on Monday
online safety of teenagers. By establishing arraigned Abdulrahim Dangana before
open lines of communication, fostering Justice Darius Khobo of the Kaduna State
digital literacy, and enforcing effective High Court.The defendant faces a one-
protective measures, we can create a count charge that borders on obtaining by
collective effort to combat online predators false pretence.The anti-graft commission
and create a secure online environment for told the court that the alleged internet
our youth. Together, let us delve into the fraudster targeted homosexuals online.An
complexities of internet sexual investigation revealed that Dangana
exploitation, uncover the dangers posed by registered a Gay/Bisexual hook-up App
online predators, and discover the called Grindr and A4A website, using the
pseudonyms: Ryan, Dave, Frank and
Eric.He allegedly used fake profiles to victims of the sharp practices of online
contrive romantic relationships with gay fraudsters”. He continued by noting the
individuals and lured them into sending need to educate the people on the financial
nude pictures.Dangana then used the fraud going on in the telecoms space, he
photos to blackmail and extort them also said that “the activities of the loan
through gift cards and bitcoins he sharks had caused a lot of people pain with
converted into naira using his bank many traders vulnerable to online
accounts and e-wallets. In the charge, fraudulent practices”. The internet is filled
Dangana, between January and with tales of tnese scammers who lure feed
September, collected the sum of $8,420 on the naivety of there victims to defraud,
from victims after falsely presenting kill or commit other more heinous crime
himself as a white homosexual man on on the unsuspecting victim. What could be
Grindr App.The defendant blackmailed the cause? Is our society going morally
them and threatened to “expose them to downward?
their families and loved ones”.The Morality in the strictest sense of it has to
offence violates Section 1(1)(a) of the do with rightness or wrongness of any
Advance Fee Fraud and Other Fraud human action. As man is a moral agent he
Related Offences Act 2006 and is has the inherent abilities to choose between
punishable under Section 1(3) of the right and wrong. NIETZSCHE (2023) in
same Act. Dangana pleaded “not guilty” his writings titled “THE MORAL
to the charge when it was read to DECADENCE IN PHILOSOPHICAL
him.Nasiru Salelen, the prosecution WRITINGS” gave us an insight on actions
counsel, asked the court to fix a date for that could be termed morally wrong when
trial, while the defence counsel, Solomon he said:
Otuwaga, urged the court to release his There are certain actions which all of us
client on bail.Justice Khobo granted would condemn as morally wrong and
Dangana bail in the sum of N1 million ought not to be done by anybody. For
and one surety who must be resident in example, armed robbery embezzlement
Kaduna with valid means of of public funds, bribery and corruption,
identification. Khobo adjourned the case neglect of one’s duties dishonesty, and so
until December 2, 2021. on. In the other way, there are also certain
Kemi Olaitan in Ibadan (2023) also noted actions, which are fidelity to one’s duties,
that: “Nigerian Communications respect for human life, hospitality,
Commission (NCC) yesterday disclosed kindness, helping those in need, honesty
that no fewer than 20,000 Nigerians had and so on. Though according to
fallen victims of online financial frauds Frederich Nietzsche, it is not good to
while reiterating its commitment to work refer some of the above listed virtues as
assiduously to protect telecommunications right or good rather they are evil and
subscribers against what it described as could be seen among the inferior people.
loan sharks”. The question is , why our He said so in his explanation of master
people easily fall victims. NCC Head of morality and slave morality. Equally,
Consumers Affairs Bureau, Mr. Ayanbanji there are other kinds of actions above
Ojo (2023) in the same report noted that: which opinions differ. Some say it wrong
“the commission has received over 20,00 while others consider it as right. For
complaints of those who have fallen instance, such actions like abortion,
At this age of discovery, the individual Internet sexual exploitation, which is also
feels the need to explore and try out new known as online sexual exploitation, refers
just the same way adults around them are to various forms of sexual abuse or
doing. This is what usually lands them in exploitation that occur through the use of
trouble and also makes them easy prey’s to the internet. It involves the manipulation,
online predators. It is also worthy to note coercion, or exploitation of individuals,
that teenage years is also regarded as particularly children and vulnerable adults,
adolescent age. for the purpose of sexual gratification or
financial gain. Some common ways and
Sexual Exploitation contexts in which internet sexual
Immanuel Kant - In his “Groundwork of exploitation occurs can be seen below:
the Metaphysics of Morals" and a. Child Sexual Abuse Material (CSAM):
"Metaphysics of Morals" gave relevant The production, distribution, or possession
insights emphasizes the importance of of explicit material depicting children
treating others as ends in themselves rather engaged in sexual activities is a severe
than as mere means. He argues that using form of internet sexual exploitation. This
another person's body for sexual includes images, videos, or live-streamed
gratification without their consent is a content involving minors.
violation of their dignity and autonomy. He b. Online Grooming: Predators may use
was quoted by sanders (2020) that : “The various online platforms, such as social
desire which a man has for a woman is not media, chat rooms, or gaming platforms, to
directed toward her because she is a human establish trust and develop relationships
being, but because she is a woman; that she with minors. They often pretend to be
is a human being is of no concern to the someone they are not and gradually
man; only her sex is the object of his manipulate victims into engaging in sexual
desires”. Sanders (2020129-139:) went conversations or activities.
further to say that: c. Sextortion: This occurs when someone
Kant’s views on sexual morality are coerces an individual, often using explicit
traditional and con ser va tive. He images or videos obtained through
opposes every conceivable sexual deception or hacking, into providing more
practice except sexual intercourse explicit material or engaging in sexual acts.
between husband and wife. Whether all The perpetrator threatens to distribute the
of Kant’s views on sex actually follow material publicly if the victim does not
from his moral philosophy is less comply.
important than the underlying idea they d. Live-streamed Abuse: Perpetrators may
re" ect—that we do not own ourselves force victims, often children, to engage in
and are not at our own disposal. He sexual acts while live-streaming the abuse
objects to casual sex (by which he means to viewers who pay to watch. This happens
sex outside of marriage), however in hidden or private online spaces.
consensual, on the grounds that it is
degrading and objectifying to both e. Webcam Exploitation: Individuals,
partners. Casual sex is objectionable, he including children, may be coerced or
thinks, because it is all about the manipulated into performing sexual acts on
satisfaction of sexual desire, not about webcams, which are then recorded and
respect for the humanity of one’s partner distributed without their consent.
b. Threats: This involves using threats of (commonly known as "419 scams") and
negative consequences to pressure online scams. These scams often involve
someone into complying with their email or online communications that
demands. For instance, they might threaten attempt to deceive individuals into
to expose personal information or spread providing money or personal information
damaging rumors if their target doesn't under false pretenses. The term ‘internet
comply. fraud’ (2021) refers to any type of fraud
c. Victim-playing: The individual may scheme that uses email, web sites, chat
portray themselves as the victim, rooms or message boards to present
exaggerating their suffering or distress to fraudulent solicitations to prospective
make the other person feel guilty and victims, to conduct fraudulent transactions
provide what they want. They might say or to transmit the proceeds of fraud to
things like, "I'm so miserable, and it's all financial institutions or to others connected
because of you. You're the only one who with the scheme”. According to Black's
can help me." Law Dictionary (2014) : "Fraud is an
d. Emotional manipulation: This includes intentional perversion of truth for the
tactics like gaslighting, where the person purpose of inducing another person or
distorts reality, undermines the other entity in reliance upon it to part with
person's perception, and makes them doubt something of value or to surrender a legal
their own feelings or thoughts. They might right”. In the definition provided by
say things like, "You're just overreacting. Black's Law Dictionary, it states that fraud
It's not a big deal. You always make is an intentional perversion of truth. This
everything about yourself." means that the person committing fraud
It's important to remember that emotional deliberately misrepresents or distorts the
blackmail is an abusive and unhealthy truth, either through statements, actions, or
behavior. If you find yourself on the other means. The purpose of this
receiving end of such tactics, it's crucial to intentional misrepresentation is to induce
set boundaries, communicate assertively, another person or entity to rely on that
and, if necessary, seek support from trusted false information. The reliance can be in
friends, family, or professionals. the form of believing the misrepresentation
to be true or acting based on that false
Fraudlent Acts information. As a result of this reliance, the
A fraudulent act refers to any deliberate deceived party may part with something of
and deceptive action or behavior intended value, such as money, goods, or services,
to deceive, manipulate, or defraud others or surrender a legal right. In simpler terms,
for personal gain or to cause harm. It this definition describes fraud as an act
involves misrepresenting facts, providing where someone intentionally lies or
false information, or engaging in dishonest distorts the truth to deceive others, causing
practices with the intent to deceive them to give up something valuable or
someone or gain an unfair advantage. forfeit a legal entitlement.
Fraudulent acts can occur in various It's important to note that this definition
contexts, such as business transactions, emphasizes the intentional nature of fraud,
financial dealings, online scams, or as it requires a deliberate act to deceive and
impersonation. induce reliance for personal gain or to
Nigeria has been associated with certain cause harm to others. The Association of
types of fraud, such as advance fee fraud
Certified Fraud Examiners (ACFE) (2020) suspicious activities or believe you have
defined fraud as any: intentional or been a victim of fraud, it's recommended to
deliberate act to deprive another of report the incident to the relevant
property or money by guile, deception, or authorities and seek legal advice.
other unfair means.
Here are a few examples of fraudulent that How to stop teenagers from being
teenagers engage themselves in Nigeria: victims of online predators
a. Identity Theft: When someone steals Protecting teenagers from online predators
another person's personal information, such is crucial for their safety and well-being.
as their name, Social Security number, or Here are some steps and tips to help
financial details, with the intent to commit prevent teenagers from becoming victims
fraud or engage in illegal activities using of online predators:
the stolen identity a. Communication and Education:
b. Ponzi Schemes: This is an investment Maintain open and ongoing
fraud where individuals are promised high communication with teenagers about
returns on their investments, but the returns online safety. Educate them about the
are actually generated from funds risks, potential dangers, and tactics used by
contributed by new investors rather than online predators. Encourage them to ask
legitimate profits. It relies on a continuous questions, share their concerns, and report
influx of new investors to sustain the any suspicious or uncomfortable online
scheme. interactions.
c. Credit Card Fraud: When someone uses b. Privacy Settings and Security: Teach
another person's credit card information teenagers about the importance of privacy
without their consent to make unauthorized settings on social media platforms and
purchases or transactions. other online accounts. Help them
d. Internet Scams: Various online scams understand how to protect their personal
exist, such as phishing emails, where information, including their full name,
individuals receive fraudulent emails address, phone number, and school details.
pretending to be from reputable Encourage them to use strong and unique
organizations to trick them into revealing passwords for their accounts.
sensitive information like passwords or c. Online Friendships and Social Media:
financial details. Advise teenagers to be cautious when
e. Insurance Fraud: When someone accepting friend requests or connections
intentionally provides false information or from unknown individuals online. Teach
exaggerates claims to an insurance them not to share personal information or
company to obtain benefits or engage in private conversations with
compensation to which they are not strangers. Encourage them to review and
entitled. adjust their social media privacy settings to
f. Forgery: This involves creating or limit who can see their posts and personal
altering documents, signatures, or financial information.
instruments with the intent to deceive d. Critical Thinking and Skepticism: Teach
others, such as forging signatures on teenagers to think critically and question
checks or legal documents. It's important to the intentions of individuals they meet
be vigilant and cautious to protect yourself online. Encourage them to be skeptical
from fraudulent acts. If you encounter about requests for personal information,
financial assistance, or meetings with
online acquaintances. Remind them that knowledge about online safety, fostering
not everything they see or hear online may open dialogue, and teaching them to
be true. recognize potential risks and red flags will
e. Reporting and Blocking: Instruct go a long way in safeguarding their well-
teenagers on how to report and block being. Together, we can work towards
individuals who make them uncomfortable preventing and combating internet sexual
or engage in inappropriate behavior online. exploitation, ensuring that teenagers can
Help them understand the reporting navigate the online world with confidence
mechanisms available on social media and security.
platforms, chat apps, or gaming platforms.
f. Monitoring and Supervision: Maintain a References:
level of supervision over teenagers' online 1.https://dailypost.ng/2021/10/26/efcc-
activities without invading their privacy. arraigns-alleged-online-gay-predator-for-
Keep an eye on their online interactions, 8420-scam-in-kaduna accessed July /2023
monitor their social media accounts, and
know the websites they visit. Ensure they 2.https://www.thisdaylive.com/index.php/2
understand that your supervision is for 023/05/21/20000-fall-victims-of-online-
their protection and not an invasion of their financial-frauds-ncc-discloses accessed
privacy. July 08/2023
g. Online Safety Resources: Familiarize 3.https://iproject.com.ng/philosophy/the-
yourself and teenagers with online safety moral-decadence-in-nietzsches-
resources and organizations that provide philosophical-writings/index.html accessed
guidelines and support, such as the July/09/2023
National Center for Missing and Exploited 4. Okpokwasili, O.A (2021) “NUDITY,
Children (www.missingkids.org) or the WOMEN AND MORALITY IN A
Federal Trade Commission's website CONTEMPORARY NIGERIAN
(www.consumer.ftc.gov). SOCIETY: A PHILOSOPICAL
Remember, establishing trust and DISCOURSE”, Nnadiebube Journal of
maintaining open lines of communication Philosophy, Vol. 5(1), P:152
with teenagers is crucial. Encourage them 5.https://www.ncbi.nlm.nih.gov/pmc/articl
to come to you if they encounter any es/PMC5695926/accessed July 11 2923
suspicious or uncomfortable online 6. Michael J. Sandel (2020) , Justice:
situations. By combining education, What's the Right Thing to Do?, pp. 129-
awareness, and vigilance, you can help 139,
protect teenagers from online predators. 7. Karnani SR, Zelman DC. (2019)
Measurement of emotional blackmail in
Evaluation and Conclusion couple relationships in Hong Kong. Couple
Protecting teenagers from internet sexual and Family Psychology: Research and
exploitation and online predators is of Practice.;8(3):165.
utmost importance in today's digital age. It doi:10.1037/cfp0000126
requires a collaborative effort from parents, 8. ABBASPOUR Z, AMANELAHI A,
guardians, educators, and society as a Choubdari A. (2019) Evaluation of
whole. By prioritizing education, psychometric properties of the Emotional
communication, and proactive measures, Blackmail Scale (EB)..
we can create a safer online environment https://www.sid.ir/en/Journal/ViewPaper.a
for teenagers. Empowering teenagers with spx?ID=748210
9. Mills, Claudia, 1995, “Politics and 12. Garner, B. A. (Ed.). (2014). Black's
Manipulation”, Social Theory and Practice, Law Dictionary (10th ed.). Thomson
21(1): 97–112. Reuters.
doi:10.5840/soctheorpract199521120 13. Association of Certified Fraud
10. Hill, Thomas E. Jr.,( 1980), “Humanity Examiners. (2021). Report to the Nations:
as an End in Itself”, Ethics, 91(1): 84–99. 2020 Global Study on Occupational Fraud
doi:10.1086/292205 and Abuse. Retrieved from
11.https://www.police.act.gov.au/sites/defa https://www.acfe.com/report-to-the-
ult/files/PDF/bizsafe-internet-fraud- nations/2020/s
factsheet.pdf