Sunday, February 17, 2008

SWA #6

Dr. Mallam Musa uses various signifiers to create a persuasive identity based upon the characteristics of legitimacy and a non-threatening mysteriousness. Musa’s identity is constructed in the e-mail by what is and what is not stated. It is in the best interest of a con artist to provide a decent amount of information to the potential target so as to avoid point blank rejection, and it is also imperative to leave information gaps thus using a target’s curiosity against them. There are three key signifiers present in the text of the e-mail and two more subtle signifiers.
The identity trait of legitimacy is signified to the con’s target (known as the dope from here on out) in three ways. The dope is immediately given the impression of veracity by the four line introductory heading. It introduces the con artist in a professional way. The professional heading is a signifier to the dope that the person writing the e-mail is trustworthy simply because of the fact that they are organized. Another signifier of legitimacy is the list of projects the company has performed. The list is not supposed to mean anything to the reader seeing as technical jargon is used such as “Turn around Maintenance.” A list of technical accomplishments is a signifier meant to leave the impression of legitimate business practice on the dope therefore, encouraging the dope to go along with the con artist’s request. The third signifier is the language used in this e-mail. There are a few grammatical issues in the e-mail but as a whole the e-mail is rather well written considering the use of varying sentence structure and a fairly large vocabulary. The con artist is attempting to confuse the reader by using confusing sentence structure, grammar, and somewhat incorrect grammar. Most people are too lazy to actually look up a new word or reread a confusing sentence more than twice. The con artist’s goal is to confuse the dope to the point they blindly accept the e-mail to be legitimate because of their own laziness.
There are two subtle, un-typed signifiers giving the constructed personality the quality of a non threatening mysteriousness. The reason why the dope is being offered this large lump of cash is never revealed. It makes the dope think, “Well why am I so special; why do I get this wonderful opportunity?” The con artist uses the dope’s own ego as a way to entice the dope to jump on the business deal. The combination of ego and curiosity (why is the dope worthy of this deal?) is not enough to con the dope and so one more signifier is needed. The only information asked for is a telephone or a fax number. This information is in no way threatening. Telephone numbers to private homes are listed in countless phone books all across the United States. The non threatening nature of the telephone number is the last signifier needed to con the dope because there is little danger in giving away a telephone number. The dope may be skeptical of the deal but does not feel threatened at all by this proposal. The dope then convinces himself that he should at least send his telephone number seeing as there is nothing to lose and potentially three million dollars to gain if this e-mail is the real deal.
These online identities are so successful in conning people because they carefully control what the dope feels and how the dope thinks by carefully playing with human nature. It is vitally important for the e-mail to be legitimate and mysterious in a non-threatening way. If the e-mail did not seem legitimate then the dope would not go for the bait and if the e-mail is threatening then the dope will be less willing to take the risk of giving away any information. The con artists are so successful at conning people because they control the conscious and the subconscious mind of a person through various signifiers.

No comments: