Feeds

Police cuff hundreds in £7.3 MILLION phone scam

Two plane-loads of crooks flown to China, amid suspicions of high-level Police corruption

SANS - Survey on application security programs

Police across South East Asia have swooped on an international telephone fraud gang, arresting over 480 people in eight countries after an investigation lasting six months.

The alleged gang members, most of whom are Chinese and Taiwanese, are suspected of conning their victims out of 73 million yuan (£7.3m), according to a Xinhua report.

Although all 510 suspected cases of fraud took place on the Chinese mainland, the suspects were rounded up nations around the region - Thailand, Malaysia, Indonesia, Cambodia, Sri Lanka, Fiji, China and Taiwan – and are said to have established money-laundering operations in Taiwan and Thailand.

Given the size of the group, two chartered planes were needed to fly the Chinese suspects back from Thailand and Malaysia to Beijing on Thursday, while separate planes were needed to transport the Taiwanese members back to their home country to be prosecuted.

China’s Ministry of Public Security led the investigation, which saw six groups of officers sent around the region earlier this month.

Liu Ancheng, Deputy Director of the ministry's Criminal Investigation Bureau, is quoted as saying that the case was unusual for mainland crime because of the large numbers of Taiwanese involved.

"The group mainly squeezed money from individuals or companies by calling them in the name of police or procuratorate staff and threatening to accuse them of money-laundering crimes," he reportedly added.

“Ringleaders from Taiwan were deterred by mainland police's stern crackdown on telecom scams, so they recruited locals in Taiwan to commit this crime.”

Cynical observers may suggest that the criminals’ modus operandi worked so well because of the high level of police corruption in China, which made their phone calls appear credible.

Phone fraud is on the rise in Asia, particularly in Japan where the elderly are often targeted. In fact, the problem is so bad there that Fujitsu recently unveiled technology designed to alert users when they are being scammed. ®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.