key: cord-0756337-9dlkd7j6 authors: Chen, Jinshi title: “You are in Trouble!”: A Discursive Psychological Analysis of Threatening Language in Chinese Cellphone Fraud Interactions date: 2020-08-25 journal: Int J Semiot Law DOI: 10.1007/s11196-020-09765-y sha: 7e4b8052ab78df9693a81c64e53f50f835780872 doc_id: 756337 cord_uid: 9dlkd7j6 Currently cellphone fraudsters often use language to threaten and bully victims. From discursive psychological perspective, the present study applies conversation analysis to discuss fraudsters’ threatening language in Chinese cellphone fraud conversations. The authentic data are collected from Chinese media which report legal news or conduct public legal education on the battle against cellphone frauds. Results of the study show that: (1) cellphone fraudsters construct their false identities through information gap and information sharing in their turn-taking designs, which brings victims into the threatening fraud interactions; (2) fraudsters use such conversational skills in a threatening tone as repetition, interruption, higher pitch, louder speech and so on to trigger victims’ psychological panic; (3) fraudsters’ discursive practices are situated for the threatening actions based on prepared and designed scripts. The findings of the study are expected to provide references for preventing cellphone fraud and fighting against fraudsters’ threats and bullies. Currently, telecom fraud has become an increasingly serious crime, which "affects social stability and the sense of security of the public" [49] . For the purpose of possessing other people's property illegally, criminals fabricate false discourse and set up scams through landline phone, cellphone or other Internet communication tools to commit remote frauds against victims, seriously infringing on the people's legitimate rights and interests. The scientific research on telecom frauds has achieved a lot since the end of last century. On the one hand, the early research achievements on telecom fraud was mainly as follows, the introduction to telecom fraud [32] , the categorization of telecom fraud [9] [10] [11] , causes and consequences of telecom fraud [23] , suitability of relevant laws and regulations [1] , and the technological development in banks and telecommunications companies for the prevention on telecom fraud [12] . On the other hand, with the development of internet and online communication, the research is increasingly focused on the novelty of telecom fraud, such as the approaches to the computer-aided identification of telecom frauds [42] , the improvement of relevant laws to promote the establishment of law enforcement system and administrative supervision system to prevent and combat telecom fraud [47] , the joint investigation and control mechanism among banks, judicial bodies and telecommunications companies [45] , the mechanism of international cooperation on the prevention and punishment and the judicial assistance mechanism [24] . Till now, the linguistic research on telecom fraud focuses remarkably on email frauds. Chiluwa [8] has made a computer-mediated analysis of discourse structures and functions of emails, which reveals that the email writers apply discourse/pragmatic strategies such as socio-cultural greeting formulas, self-identification, reassurance/confidence building, narrativity and action prompting strategies to sustain the receivers' interest. Freiermuth [18] has analyzed the scammers' intention behind each rhetorical move that exists in email messages. Onyebadi and Park [33] have examined the framing of email communications used in the frauds, with the findings indicating that the scammers used Realism as the main persuasive lexical characteristic in the messages. However, much more importance needs to be attached to the research on cellphone fraud discourse. Firstly, a great number of telecom frauds are implemented through cellphone interactions and false discourse information is always transmitted via cellphones in those crimes [27] . In the fraud interactions, language use has much deeper influence on fraudsters' identity construction [50] and language interpretation produces a certain social identity in communications [31] . Thus, it is necessary to explore how cellphone fraudsters shape their false identities through their language use and victims' language interpretation. Secondly, there are two major means of cellphone frauds, one is seductive deception and the other is threatening deception. It is emphasized that the process of "seduction" and "deception" cannot do without activities of speech communication [50] , but the process of "threatening" and "deception", especially threats constructed through discursive strategies in cellphone frauds, has not been touched in any studies. Thirdly, since asymmetrical roles or unequal positions exist between fraudsters and victims in telecom fraud interactions [49] , it is needed to investigate the roles fraudsters' threatening language plays in the distribution of power and control. Threat, from a social perspective, focuses extensively on speakers' communicative intentions to frighten victims and influence their behaviors [7] . Threat in some research has been regarded as a speech act performed in threatening discourse [40, 44] . Special attention has always been paid to direct threats and indirect ones [17, 20] , in which required conditions have been provided for defining the speech act of making a threat [44] . However, there is still no clear-cut between direct and indirect threats. Instead of the binary contrasts, Muschalik [30] has therefore proposed a scalar approach to illustrate the degree of different threats, which offers the possibility to do quantitative linguistic study of threat. From the interpersonal angle, Gales [19] has revealed threateners' convey of interpersonal meanings through rhetorical strategies and their stance-taking in threatening discourse. All the previous studies have provided references for the macro-analysis of threatening language in fraud interactions. Other studies concentrate on semantic meanings of threats [21, 48] or word choices [30] . The former research offers "the basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker." [21] , which is consistent with Sacks' [39] discussion on warning/threat as an initiating action in an adjacency pair. The latter categorizes the verbs used for threats into violent, ambiguous or non-violent, with four sub-types of violent verbs [30] . These studies demonstrate that threatening language can be investigated from lexical, syntactic and semantic aspects. In spite of the above-mentioned research on threats or the language used for making threats, the threatening language in cellphone fraud interactions has been touched in very few empirical studies so far. Taking the specific contexts in cellphone frauds into consideration, the meanings of threats may be constructed in different ways, which is of significance to explore from the linguistic aspect. In accordance with the literatures above, threatening language, as the working definition here, can be defined in such a broad sense as the discourse, utterance or speech used by speakers to perform direct or indirect threats to and impose psychological pressure on listeners for achieving certain communicative objectives. Threat can be defined that an action, detrimental to listeners, is constructed or performed through language used by speakers. For the purpose of more convenient distinction in the present study, victims' fully exposure to the threatening or bullying languages will be discussed as direct threat while indirect ones are constituted in implicitly stated threatening or bullying languages that still exert much pressure over victims. In cellphone frauds, threatening language is used by fraudsters in the fraud interactions, which constructs threat to victims and bring the victims with huge psychological pressure into the cellphone traps. Therefore, the present paper presents a discursive psychological analysis of Chinese cellphone fraud interactions, focusing on the ways in which fraudsters use threatening language to help carry out remote frauds. Discursive psychology (DP), different from traditional psychology that separate mental activities from external behaviors, is a perspective for studying discourse as social practice, with mental activities and external behaviors integrated [28] . The three core principles of DP are: discourse is both constructed and constructive, discourse is situated within a social context, and discourse is action-orientated [16, 46] . DP treats language, with cellphone fraudsters' discourse no exception, as constructed and constructive. DP takes a relativist, social constructionist stance to knowledge [46] . To say that cellphone fraudsters' discourse is constructed, it is necessary to analyze the way fraudsters speak to the victims and to explore how particular aspects of frauds as event are constructed and whether the fraud effects in cellphone interactions are achieved. Discourse is simultaneously constructive of a particular version of reality through the choice of "particular words formulations over others" [41] or "of different versions of the world, through the way in which we talk about people, events, actions and organizations ( [46] : 10)". Thus, DP can be employed to examine how fraudsters create false realities or build their certain false identities by their language use as a policeman, a bank clerk, or a gang member, and so on to threaten and entrap victims. In DP, discourse is situated within a social context in that DP is a theoretical and analytical approach that treats talk and text as social action rather than representation, and talk and text are argued to accomplish actions in the social world [46] . That is, discourse is action-oriented in an interactional context and the action orientation of language highlights how people use language to do things and to reach their certain purposes [4] or to get things done [35] . An example is a piece of cellphone talk between a fraudster and a victim, in which the fraudster's discourse performs an action as defrauding in the interaction. The fraudster's statement "Your son is with me." To respond with the question "What's your ransom demand?", the victim treats it as his son being kidnapped. The fraudster's statement relates to the performative nature of language, i.e. he does things with language [16] . A discursive psychological approach is also ethnomethodologically-oriented [15] . Firstly, DP was developed within psychology but is influenced by linguistics, philosophy, sociology, post-structuralism, ethnomethodology and conversation analysis (CA), in which psychology as an object to be analyzed for how it is made consequential in social interaction [46] . "Discursive psychologists examine the performative qualities of descriptions as part of action sequences in real life talk. This interest can be traced back directly to the influence of conversation analysts. Conversationanalytic studies demonstrate that what people do with language" ([29]: 2). Secondly, turns at talk in specific cellphone fraud contexts are to be understood by both fraudsters and victims within the sequence organizations, and "we can examine the situatedness of the talk in terms of the turn-by-turn interaction. ( [46] : 13)" Therefore, it is essential to investigate how fraudsters treat their turn-taking by applying the "next-turn proof procedure" ([25]: 15). Thirdly, DP research is mostly concerned with how such psychological concepts as desires or fears that underpin conversations and interactions, in various particular settings [15] . It is corresponding to the idea that ethnomethodology "aims to understand the methods, through which people make sense of each other's practices in everyday settings: how people make sense of what they are doing. ( [46] : 243)" In addition, since online spoken interaction as a form of talk in its own right needs much more attention [29] , DP has also been employed to study online discourse as a social practice [41] . Accordingly, DP offers a new methodological path in this study, for the exploration of cellphone fraud interactions, one form of online interactions. CA is an approach to analyzing natural discourse that examines sequential organizations and action-orientation of talk-in-interaction [46] . More specifically speaking, CA is concerned with every social conduct or action in various natural communication contexts [34] . Historically, since its derivation from ethnomethodology and sociolinguistics, CA has been closer to DP in approach and regarded ethnomethodologically the sociology as a theoretical or methodological resource [35] . CA conventions have recently and increasingly been used for discursive psychological study of the natural interactions recorded and transcribed. Theoretically, CA focuses on the structures and organizations of talk and on how social actions are constructed through the careful language use. It is commonly known that CA starts with "talk in interaction". CA attends "to understand the mechanics of interaction ([46]: 36)" and "the ways in which participants' talk is oriented to the practical concerns of social interaction [3] ", such as how a conversation begins, how assessments are made, and how refusals or offers are completed, and "how descriptions, accounts, and categories in conversation are put together to perform specific actions [3] ." For example, since threats in adjacency pairs have largely been ignored in the conversation analytic literature for many years [21] , it is can be examined that fraudsters attend to their fraudulent gains and accountability in threatening fraud interactions. Methodologically, CA provides a useful analytical tool for DP. Turn-taking systems, sequence organizations, overall structural organization of the interaction, lexical choice, and so on have been identified as important domains of interactional phenomena [13, 22] . Firstly, as the fundamental units, turns are designed carefully or carelessly, intentionally or unintentionally in the sequence organizations. Repetition, interruption, selfcorrections, pause within a turn, and overlapping parts between turns are often analyzed in social interaction. Secondly, lexical choice is also important in the language use for the action achievements. Thirdly, it is typical in CA that suprasegmental elements and details in transcripts such as length of pauses, prolonged syllables, pitches, loudness and some other prosodic features have been widely accepted to be relevant parameters for conversation [3, 37] in that the information is conveyed about speakers' emotional states or "attitude toward the topic under discussion ([26]: 26)". "DP draws on many of the tools of CA, including focusing on turn-taking and sequential organization, but rather than starting with social actions, DP focuses first on a specific psychological issue or the production of categories in talk. ( [46] : 44)" Here, CA is employed as a useful analytical tool for the study of some cellphone fraud interactions, starting with fraudsters' and victims' different mental states. In this paper, 20 pieces of cellphone conversations in the authentic fraud cases are collected from Chinese media. To protect privacy, the police and telecommunications companies have just provided parts of those cellphone call recordings. The media have only released some typical audio clips for legal news reports or public legal education on the fight against telecom frauds, the mainstream news media including CCTV (China Central Television), Chinanews, Tencent, Sohu, Sina and so on. In these clips, there are 6340 seconds for fraudster-victim's conversation and 750 seconds for the police's and reporters' comments. Specifically speaking, the legal opinions on these cases have been included in the videos or audios, or in the corresponding hypertexts, warning people not to fall into the cellphone fraud or conducting legal education. The links of the videos or audios, and the corresponding news titles or hypertexts are listed in "Appendix 2" for the convenience of searching. To ensure validity and reliability, two raters have firstly confirmed fraudsters' threatening language in the authentic cellphone frauds. When the results do not match, the discrepancy has been resolved through negotiation. Secondly, the typical cases have been categorized to figure out fraudsters' false identities as policemen in 14 cases, procurator, telecom staff or gang leader in other 6 cases respectively. Thirdly, direct or indirect threats in the data have been classified and different conversation skills used in the threatening language are counted. Fourthly, threat clauses have been segmented with Praat 6.1.13 [6] , and the numbers of repetitions, interruptions and syllables with supersegmented features are also counted. At last, in these cases, some victims have been cheated and even transferred money to the fraudsters, others have recognized the frauds or been successfully stopped by the police from transferring their money. We have extracted and analyzed some pieces of the conversations between the fraudsters and the victims, in which their names or nicknames have been anonymized and the ID numbers or phone numbers involved have been omitted partially for privacy protection. The main aim of DP is to examine how psychological constructs are enacted and made relevant in interaction and the implications of these for social practices, while that of CA is to examine social actions and the sequential and organizational features of talk that accomplish these actions. Both DP and CA are predominantly used with video or audio recordings in social interactions. These issues could be tackled from a DP and CA perspective, specifically in relation to accountability and fact construction. For CA, the interaction itself needs "to be the focus of analysis", and "provides a rich source of data" ( [46] : 38) of fraudster-victim interaction. Therefore, the present study aims to venture into cellphone fraud discourse by analyzing how fraudsters use language to construct the actions of threat and examining how they employ discursive strategies to accomplish these actions in the Chinese cellphone fraud interactions. Based on the three fundamental principles of DP, i.e. discourse is constructed constructive, action-oriented, and situated, three questions will be answered in the present study: (1) How are fraudsters' false identities constructed in the threatening fraud interactions? (2) What conversational skills are used by fraudsters to trigger victims' psychological panic? (3) How are fraudsters' discursive practices situated to account for the threatening actions? DP is drawn upon to conduct a data-based qualitative analysis of the interactional features [41] of natural fraudster-victim talks. On the one hand, some extracts are taken as examples for discourse analysis to demonstrate fraudsters' false identity construction, conversational skills and discursive situations. On the other hand, we will make statistical analysis of fraudsters' different conversational skills used in specific situations. Data analysis starts with data transcript and data coding based on CA conventions (see "Appendix 1"). To answer the first question, we will explicate the way in which fraudsters bring victims into discursive sequence and psychological interactions through turn-taking design. For the second question, we will analyze the conversational features in fraudsters' threatening language such as stress, loudness, tempo, interruption and repetition. And the third question will be answered in the discussion of fraudsters' discursive practices at both micro-level and macro-level. Discourse is constructed in the social interactions in that in a certain sequential order turn-taking promotes discourse development from inner-sentence and inter-sentence levels to global-discourse level [14] . Through turn-taking design, cellphone fraudsters bring victims into discursive sequences in threatening fraud interactions. The fact that discourse is constructed is embodied through the way in which fraudsters speak to victims and the fraud effects on victims. As action is oriented, discourse is also constructive in the situated context. In the data, fraudsters' turn-taking design often intentionally constructs false identities with threatening language and entrap their preys, resulting from information gaps between victims and them in the interactions. For example, Case 07 is collected from CCTV News report on fraud with the title "遭遇匿名 电话威胁 实为电信诈骗新招 (Threatened by an Anonymous Phone Call A New Way for Telecom Fraud)". In Extract 1 of Case 07 (00:23-01:18), 1 the fraudster constructs the fearful and frightening events through the new information from Lines 1-3 in the first turn, in which he chooses the scary words like "黑道 (gangdom)", "砍掉 (cut off)" and "残 (disabled)" to make the direct threat in full function, i.e. a threatened future action detrimental to the victim [40] . However, the victim's response "我没得罪什么人啊? (I haven't offended anyone?)" shows that he is confused at the fraudster's words because the information gap between them has been created. In order to achieve his purpose effectively, the fraudster then changes the turn to tell the victim intentionally and sequentially about his fictional experiences in Lines 8-10, using such a clause with the frightening meaning as "干的就是刀 尖舔血的活 (what we do for living always depends on licking blood on the tip of the knife)". It is the new information of an indirect threat that results in the victim's nervousness, and even scare and panic. In the interaction, the information gap appears between the fraudster's information surplus and the victim's information vacancy [14] . The fraudster's false identity has been constructed as a gang leader in the adjacency pair in Lines 12-13, in which the victim's belief in the speaker's ability to act and intention to act [17] can be proved by the victim's "谢谢您,谢谢您! (Thank you, thank you!)". Fraudsters may often fabricate victims' criminal evidence to create information gaps, i.e. one of victims' bank cards involving financial crimes, so that the fictitious crime can get in touch with the bank card and pave the way for fraudsters to elicit victims' bank card information, balances, passwords, verification codes and so on. In Case 05, the cellphone fraudsters were caught and brought from Indonesia to China by Shanghai Police, reported on "澎湃新闻 (The Paper)". According to the report, those fraudsters have set a three-line cellphone working group in the whole fraud process. The phone team in the first line poses as "customer service", such as bank staff, water or gas company clerk, to inform their victims that they have overdue bills, conclude that the victims' identities have been illegally used, and then transfer the phone to the second line. In the second line fraudsters will play as "police" to inform the victims that they have been involved in some serious crimes, and the impersonated police then lead their victims to a third-line "prosecutor". The false prosecutor guides the victims to deposit the money into an account designated by them to complete the fraud. In Extract 2 of Case 05 (00:00-02:23), the fraudster takes money laundering as the main topic in the threatening discourse development. He constructs the turn that the victim's bank card is involved in a money laundering case in Lines 1-2, and then interrogates the victim "这到底是怎么一回事啊? (What the hell is going on?)" in a policeman's implicitly threatening voice. In that turn, the fraudster finishes two processes in turn-taking system, i.e. turn-construction component and turn-allocation component [38] . In the adjacency pair, the victim responds immediately to the fraudster's turn allocation to deny her crime with a high-speed expression ">我没有 呀 < (> I'm not <)" in Line 3. As a matter of fact, the new information about the socalled criminal case has frightened the victim and the information gap has brought her to the edge of the fraud trap because she has expressed her worry about the case and her willing to go to the police station in Lines 3-5. As the analysis shows, the victim's response seems to be predicted by the fraudster as he has made both direct and indirect threats in Lines 6-8 to impose much more psychological pressure on the victim and even to control her entirely. For the one point, the fraudster uses the clause "你人肯定是要过来的 (you are sure to come)" to construct an indirect threat in the specific situation alongside the victim's words; for the other reason, in the new turn the fraudster strengthens his false police identity as well as frightens the victim by the direct threat "…你现在的身份已经被列为嫌疑人了, 检察长都 要来逮捕你了 (…you have now been identified as a suspect, the chief procurator is coming to arrest you)". After the success of eliciting the victim's some information and exercising mental control over the victim, the fraudster changes to another turn in Lines 9-12 to reinforce the fact that the victim's bank card is regarded as a money laundering tool under her name, with a large amount of money, i.e. 2.18 million RMB involved. However, the victim is still unwilling to give up her innocence in the next turn in Lines 13-16. The fraudster threatens the victim directly again by the four clauses in the following turn in Lines 17-18, which have resulted in the victim's extreme panic and her cry on the phone. In accordance with the "well-prepared and elaborately-designed 'phone script'" [49] , the information gap between the fraudster and the victim has constructed the fraudster's police identity successfully and tricked the victim's discourse smoothly and sequentially into the fraudulent discourse development, which has been demonstrated by the victim's "我相信你 (I believe you)" in Line 22. Except for the false identity construction through information gaps, fraudsters can also invoke their false identities based on information sharing with victims in the specific sequences, in which much pressure is exerted on victims although threats are always made indirectly. Fraudsters transmits victims' personal information gathered illegally to victims, sharing the fact information with them. It is the first key step for a cellphone fraud sequence that fraudsters possess victims' personal information and can speak out victims' names, ID numbers and home addresses accurately on the phone. Consequently, the victims are easy to trust the fraudsters so that the fraudsters may succeed in their false identities constructed with the indirect threatening language. For example, Case 08 has been reported on CCTV 13 and been confirmed as a cellphone fraud case, in which the fraudster uses the prepared fraud scripts to play a role as a gang leader and pretends that he can order his gang members to do something harmful to his victims. In Extract 3 from Case 08 (00:24-00:42), the fraudster in Line 2 has spoken of the victim's native place "衡水枣强 (Zaoqiang, Hengshui)" accurately and emphasized in Line 3 that the hometown is there, aiming to tell the victim that "I have got your detailed personal information based on our investigation". Then the fraudster says in a much more threatening clause in the new turn in Lines 4 and 5 to strengthen the sharing information above. The fraudster uses information sharing to construct his false identity as a gang leader, triggering the victim's fear. Sometimes fraudsters construct their false identities as staff in government departments to deceive victims. Case 20 is reported on Tencent and Sina as follows: on 3rd March 2020, Anti-fraud Center of Beijing Daxing District Public Security Bureau released a recording of a cellphone fraud related to the COVID-19 epidemic, in which a woman victim suddenly received a phone call about her illegal sales of masks and the fraudster gradually introduced her into a trap. In Line 1 of Extract 4 from Case 20 (00:02-00:55), the fraudster introduces his identity as a staff in Beijing Center for Disease Prevention and Control to gain the victim's trust. Following the fraudster's warning statement in the next turn about illegal sales of masks, the victim casts a little doubt with the turn "我不清楚 (I don't know)" on the fraudster's indirect threat. The fraudster then asks the victim to confirm the so-called buyer's personal information, i.e. whether 130*** is the victim's ID number. After the victim's confirmation and based on the sharing ID number, the fraudster changes to a new turn in Lines 7 and 8 about the victim's violation of " 《突发公共卫生事件应急条例》第52条的规定 (Article 52 of Regulation on the Urgent Handling of Public Health Emergencies)". It means that the woman should be investigated for criminal responsibility according to the law. Consequently, the woman victim begins to be panic, and the fraudster has reinforced his false identity and put the victim under much mental pressure. In summary, fraudsters, through turn-taking designs, make full use of information gaps or sharing information to construct false identities. In the process of fraudulent discourse development, fraudsters carry out direct or indirect threats to victims, and allows victims to enter their preset discursive sequences and psychological interactions. Repetition, one of conversational skills, bears emphasized or other rhetorical effect in conversations [43] . Thus, except for scary words or clauses for threatening victims directly, fraudsters use repetition to manipulate victims' speech, and even threaten victims directly or indirectly to trigger their panic. For example, In Extract 2, the fraudster repeats his threatening utterance to deal with the victim's three requests to go to the police station for the justification of her innocence. When the victim asks to go to the police station for the first time, the fraudster replies with the clause "检察长都要来逮捕你了 (the chief procurator is coming to arrest you)" in a direct threatening tone. For a second time, the fraudster tries to increase the pressure on the victim with a similar repetitive threatening expression "你是要被立马性地拘捕的 (you will be arrested immediately)" in a much louder sound. For a third time, when the victim mentions to go to the station with a crying sound, the fraudster uses a direct threat consisting of a future action [20] by himself "我现在叫人把你带到看守所 (I'll have you taken to jail now)" in a much louder and more terrible voice to further threaten the victim, and with the word " 现在 (now)" to construct a false immediate reality. The word choices also demonstrate that the fraudster's repetition skill has put increasing pressure on the victim and further constructed the fraudster's false police identity and the fact that the victim is involved in a money laundering case. The fraudster's repetition has achieved at least two communication goals, one is for the victim's trust in his police identity, the other is for his refusal of the victim's request. As another conversational skill, interruption may be used by fraudsters to restrict turn allocations to victims in the threatening fraud interactions. Sacks et al. [38] discussed transition relevance places (TRPs) in the turn-taking system, and interruption might occur, if a speaker does not produce his words at TRPs. Victims' speech may be interrupted and controlled by fraudsters and victims' psychological pressure and panic may be aggravated indirectly by the unbalanced and unequal discursive power. Take Case 01 from Chinanews website as an example, in which the fraudster is constantly changing means to deceive the victim into handing over money. In Extract 5 of Case 01 (00:33-01:01), the fraudster contacts the victim who transferred some money to him several days ago. In the first turn, the woman victim asks why she could not get through to the fraudster's cellphone the day before, and she tries to know how her money transferred last time helps deal with the criminal case involved her. But the fraudster continues in Lines 2-3 to deceive the victim that he was on duty to catch the accomplices involved. In the next turn in Line 4, the victim wants to get some information on her money, but her utterance "你是 (Are you)" has been interrupted by the fraudster. On the one hand, the interruption has disrupted the victim's thought about the inquiry of her money, resulting in the victim's repetition of her own expression "我说你抓到了没有嘛? (I said if you've caught them?)" in Line 6. On the other hand, the fraudster can take control of the victim again for his ongoing deception action or prepared threatening fraud scripts. Consequently, until the last turn in Line 8 can the victim get the chance to inquire about her money. As one of relevant acoustic parameters for conversation analysis, prosody includes suprasegmental elements of speech such as pitch, intensity, prolonged sounds, speech rate and so on [37] . Fraudsters talk on the phone to trigger victims' panic by prosodic designs in threatening fraud interactions. The acoustic analyses such as pitch or intensity for the present study are conducted with Praat 6.1.16 [6] . The cellphone conversation in Case 04 reported on the Kankanews has been collected by the police from one of the fraudsters' recording pens. The reporter uses the typical conversation to tell people how a phone caller, before whom there is only a phone, a piece of paper and a pen, becomes as a "a best actor or actress" as a phone fraudster and teach people how to take care of their own money bags. In Extract 6 of Case 04 (01:13-01:23), the victim doubts whether the money from her debit card will be transferred to a certain fraudster's account rather than to the police's, and the fraudster uses prosodic skill to control the victim. The two words "怎么 (How)" and "会 (could)" in the fraudster's question step sharply up to a higher pitch, with the pitch movements visualized in the frequency analysis in Fig. 1 . The rising pitch movements and the two pitch peaks serve as a cue to the emphasized meanings [37] , one is for questioning the victim rhetorically, the other for telling the victim an obvious answer "I am a policeman in the station". "Prominence is achieved through an increase in loudness and pitch ([37]: 6)", so the fraudster simultaneously raises his voice in uttering the two characters "(怎)么 (How)" and "会 (could)" with the intensities of "么" and "会" taking on the upward trend in Fig. 2 . In the speech, the fraudster attempts to express his angry in much louder voice for the same rhetorical purpose of putting the victim in fear. The fraudster's higher pitch and rising intensity create another type of indirect threat, which produce much more serious effect, as the victim immediately responds with a clause "是一样的号码 (Yeah, it's the same number)" for the interactional alignment with the fraudster. In Case 03, the cellphone fraud news reported on GRT Satellite Channel, a victim has been cheated of 500,000 RMB. Although the old method of impersonating a policeman has been used, it has also been integrated with new tricks by the fraudster. In Extract 7 of Case 03 (01:00-01:18), the "if-then" construction can be identified as a direct threat [21] , in which the fraudster also threatens the victim by means of rising intensity of some key words and syllables. It can be shown in Fig. 3 that the intensities of the five characters "及刑事拘捕 (arrested on a criminal charge)" take on five increasing peaks and a rising contour as a whole. This example of intensity matching occurs in the fraudulent sequence, in which the fraudster directly threatens the victim by raising his voice when the victim, in spite of nervousness, begins to doubt the fraudster's false police identity and hesitates to do as the fraudster asks. In the fraud process of Case 16, the news about impersonating the police reported on JSBC (Jiangsu Broadcasting Corporation), fraudsters expand all kinds of tricks to make their victims panic. But the purpose remains the same, to ask victims to transfer money. The news hostess suggests that all of us polish eyes when receiving a similar call, keep calm firstly, ignore kinds of threats, and directly call 110 to verify any possible question. "Time is realized in the form of duration, tempo, speech rate, rhythm and pause ( [37] : 3)". In Extract 8 of Case 16 (01:52-02:43), the fraudster firstly slows his speech to tell the victim that he is involved in a serious criminal case of drug trafficking and money laundering. In order to further the threat directly, the fraudster then uses an alternative question in a new turn "现在是你要自己来投案自 首, > 还是我们开警车去逮你啊? < (Now you come to the police to confess, > or we drive a police car to arrest you? <)". In the second part of the question, the sudden faster speech forces the victim to make a choice immediately. But it is difficult for the victim to respond because a typical alternative question needs a mutually exclusive answer [5] . Alternative questions boost some functional features in cognition, such as to introduce listeners' thinking about the answer, listeners' reflection on something or listeners' idea on something. Thus, no matter which one to choose, the victim is unwilling to face either of the two terrible situations, not to mention the action that the police come to arrest him. Thus, the victim's fear has been heightened. When the victim questions the fraudster's description with the turn in Line 7, the fraudster has changed the topic to a so-called more complicated matter in the next turn in Lines 9-10, i.e. the victim's possible personal information leakage and definite identity as a criminal suspect. So, in Line 11, the fraudster then tells the victim that he has to cooperate with the police. At the end of this turn in Line 12, the fraudster suddenly raises his pitch (see Fig. 4 ) to order the victim to contact the so-called "国家银联管理中心 (National Unionpay Management Center)". Here the pitch contours of the Chinese characters "现在必须马上 (now must immediately)" are much higher than those preceding or following ones, in which "现在 (now)" and "马上 (immediately)" are used to urge the victim to take action without delay, and "必须 (must)" for the tone of an order. Here the fraudster aims to directly exert much more psychological pressure over the victim and further control of the victim's action. In summary, fraudsters often make timely choices of conversation skills such as repetition, interruption, louder voice, sudden pitch rising or speeding up utterance in threatening fraud interactions. And fraudsters attempt to cause victims' psychological panic in threatening tones, in which victims may thoroughly believe their troubles in crimes or may be forced into fraud traps. Since "in methodological terms, the discourse can be analyzed for how it is put together to perform activities [36] ", fraudsters show their unique discursive devices which have been prepared and designed scripts in preconceived situations. "DP is concerned with discourse in social interaction and how it is constructed to accomplish particular actions in specific contexts ( [46] : 8)". The statistical analysis here has fully demonstrated that fraudsters use direct and indirect threats of clauses to have victims being forced to be entrapped. It can be seen in Table 1 that 266 threat clauses in the twenty audio clips are indirect ones, accounting for 79.4% of the total, and 69 direct ones, taking only up 20.6%. The categorization of threats has also revealed how those threatening languages work in the interaction (see examples in Table 1 ). Fraudsters always construct a disquieting situation through indirect threats especially at the beginning of cellphone conversation while they suppress victims with direct threats in a pinch, resulting in victims' psychological defense collapsed. According to the comments from CCTV news in Case 14, the 3-h cellphone fraud conversation is recorded by the fraudster herself simultaneously for use as a training book, following a carefully prepared script. Indirect threats are used at the first step to win victims' trust, and then fraudsters begin to terrify and control their victims in forceful, harsh and direct threatening tones. At the micro-level, the integrity of conversational skills is often used by fraudsters for trapping victims in prepared discursive sequences. Table 2 below shows the frequencies of four types of conversational skills used in fraudsters' threatening language, in which repetition and interruption are counted in clauses and In order to exert more and more pressure over victims, fraudsters use repetition or interruption skills with suprasegmental ones like loudness or higher pitches for stress (see Extract 2) . As for suprasegmental skills, higher pitches amount to 1065, taking up 26.9% of all the 3948 syllables; increasing intensities to 1333, accounting for 33.8%. Data analysis has found that higher pitch and increasing intensity have always been carried in same syllables, which shows that fraudsters try to reinforce the threat of those Chinese words (also see Extract 2). At the macro-level, fraudsters' threatening utterances collaboratively promote discourse development according to the prepared scripts in that language use exists in contexts but beyond materials in the discourse [2] . Smooth development of fraud discourse is embodied through fraudsters' prepared turn-taking system. Cellphone fraudsters do not work independently but in fraud groups, and their cellphone speeches are not uttered casually or spontaneously but in accordance with fraud scripts. In the threatening fraud interactions, fraudsters transmit prepared information through prepared turns to promote the discourse development as what they want. Prepared turns usually include such sharing information with victims as victims' names, identity card numbers, addresses and so on, and some new information like victims' guilt involved in criminal cases [50] . It is the combination information gaps and information sharing that help fraudsters bring victims' thoughts and discourse into fraudulent discourse development. Cellphone fraudsters' fictive actions bring victims into psychological vulnerability with power manipulation and position control in specific situations. DP examines "how and when identities shift discursively in face-to-face or online interaction" ( [46] : 63). In accordance with the data analyzed above and the legal opinions or legal education from the police and mainstream media, two points should be noted for preventing cellphone frauds. On the one hand, fraudsters always predesign several steps based on the specific fraud interaction, and employ discursive strategies to make victims' psychological change more deeply and bring victims into prepared sequence organizations. For example, people should pay much more attention to the five steps of cellphone frauds, in which fraudsters impersonate gang members. In Case 08, the fraudster gradually intensifies the victim's panic in four steps so that he has successfully controlled the victim with his discursive power. It is the first step that the fraudster informs the victim that he is being tracked through sharing the victim's personal information purchased online. The second step for the fraudster is to fabricate a story to initiate the threat to the victim in that the fraudster tells the victim that he has offended someone and the person who has paid the so-called gangdom for revenge on the victim. For the next step, the fraudster's utterances perform the function to verify whether the victim has entered the play and whether the victim hopes to pay for the elimination of the disaster. In the fourth step, the fraudster reinforces the threat to further intimidate the victim in that the fraudster makes up a nickname that sounds tough enough and releases such cruel words as "刀尖上舔血 (licking blood on the tip of the knife)" and "白刀子进红刀子出 (white knife in, red knife out)". After the fraudster's four-step escalation of verbal violence, if the victim has been found in the tone of fear, the fraudster will carry out the fifth step to ask for money. On the other hand, it is the most important for people to improve information security awareness and enhance the ability to prevent frauds. It is suggested that the following reminders be remembered. Firstly, Bank card password or verification code is the last line of defense for capital security. Secondly, the public security authorities have never handled cases on the phone or video, have no so-called "safe account" and have never asked people to transfer money to it. Thirdly, the public security authorities have not realized direct communication with any other institution, department or company. Fourthly, it is a fraudulent action that someone frames your illegal sales of epidemic supplies. Fifthly, if there is an unfamiliar call asking for bills, dial the service hotline directly. Sixthly, if there is a threat from so-called gang members, call the police immediately. The present study describes fraudsters' false identity construction in the threatening fraud interactions, examines fraudsters' conversational skills and discursive strategies for their fraud purposes. The findings include: (1) fraudsters' predetermined false identities are constructed and invoked through information gap and information sharing in the threatening fraud interactions; (2) in the false identity construction process, different conversational skills are used by fraudsters to threaten and entrap victims; (3) fraudsters' discursive practices are situated for the threatening actions based on prepared and designed scripts. The present study not only conduces to the deep understanding of cellphone fraudsters' threatening language in the fraud interactions, but provides a discursive psychological pathway to explore cellphone fraud at both macro-level and micro-level. The findings of the study are expected to provide references for the people's fight against fraudsters' threats and bullies, and for the people's prevention of cellphone frauds. However, the study only focuses on the analysis of online audio or video data. As matter of a fact, it is necessary to carry out the interviews with fraudsters and victims for validity and reliability. In the future, with the help of public security authorities, face-to-face interviews with fraudsters and victims will be made for the in-depth empirical studies to support discursive psychological findings. Current Trends in Fraud and Its Detection Varieties of Discourse: On the Study of Organizations Through Discourse Analysis Discursive Psychological Approaches to Intergroup Communication How to Do Things with Words Alternative Questions Praat: Doing Phonetics by Computer Equivalence in Legal Translation: From a Sociosemiotic Perspective The discourse of digital deceptions and '419' emails Telecommunications Crime-Part 1 Telecommunications Crime-Part 2 Telecommunications Crime-Part 3 Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud Talk at Work Information Flow in Discourse Discursive Psychology Threatening Revisited. Forensic Linguistics (The International Journal of Speech Text, Lies and Electronic Bait: An Analysis of Email Fraud and the Decisions of the Unsuspecting Identifying Interpersonal Stance in Threatening Discourse: An Appraisal Analysis Threats: Power, Family Mealtimes, and Social Influence Conversation Analysis and Institutional Talk: Analyzing Distinctive Turn-Taking Systems Telecoms Fraud, The Gory Details The Cooperation on the Prevention and Punishment of Telecom Frauds in the Big-Data Era Conversation Analysis: Principles, Practices and Applications A Course in Phonetics An Analysis of Difficult Issues in Telecom Frauds Social Interaction and Teacher Cognition Discursive Psychology Threatening in English: A Mixed Method Approach. Amsterdam/Philadelphia Who are Chinese Citizens? A Legislative Language Inquiry Telecommunications Fraud. FBI Law Enforcement Bulletin Please Help Me': A Lexical Study of 4-1-9 International Advance Fee Fraud Email Communications. The International Communication Gazette Conversation Analysis: An Approach to the Study of social Action and Sense-making Practices Discourse and Social Psychology: Beyond Attitudes and Behaviour Prosodic Orientation in English Conversation A Simplest Systematics for the Organization of Turn-Taking for Conversation Pro-verbs; Performatives; Position Markers; Warnings (1966) Promises, Threats, and the Foundations of Speech Act Theory Monitoring Mobilization: A Discursive Psychological Analysis of Online Mobilizing Practices Use of Possibilistic Fuzzy C-means Clustering for Telecom Fraud Detection Talking Voices: Repetition, Dialogue, and Imagery in Conversational Discourse Scare Tactics On Idea Renewal and Mechanism Innovation of Fighting Against Telecom Frauds Discursive Psychology: Theory, Method and Applications The Development of Telefraud under the Background of "Internet +" and Its Prevention and Control On Indirect Threats Identity Construction of Suspects in Telecom and Internet Fraud Discourse: From a Sociosemiotic Perspective Research on Discourse Patterns and Speech Strategies in Telecom Fraud Cases Acknowledgements This paper is a part of the National Social Sciences Research Foundation entitled "A Corpus-based Study of the Identification of Telecom Fraud Discourse and its Application (No. 18BYY073)" and is funded by Guangdong Philosophy and Social Science Research Program (No. GD19CYY07). I am deeply grateful to Prof. Anne Wagner for her patience and support in the paper writing process. My sincere thanks is expressed to anonymous reviewers for their insightful comments and valuable suggestions. Higher pitch for emphasized syllable () Comments, reported speech or thought ▲▼ Interruption ::Prolonged syllable; the more colons, the more elongation (0.5)(2.6) Pause duration (0.5 or 2.6 s) (