Part 2/7:
The method behind these nefarious operations involved equipping young Nigerian recruits with modern technology, including computers and mobile devices, to create fraudulent online identities. The EFCC revealed that the building was entirely outfitted with criminals’ tools, including various devices used in cybercrime.