Evil Treaty Break Insurance Manipulation of Pensioners Pensioners
Jakarta – Police have arrested two people with the initials EC, 28, and IP (35), who cheated on behalf of Pt Taspen, though not. Police explained how the perpetrators deceived their victims by manipulating them with the mode of the offenders. “The perpetrators at the beginning will greet the victims. In this case, he will declare Halo Good Morning, noon, in the noon, it is true that I am connected to Mrs. Drive (the name of the victim) mentioned,” Kasubdit IV ditressiber Metro Jaya Police Commissioner, Herman Eco Tampubolon, Thursday (6/5/2025) said. The offender then claimed to be an officer of Pt Taspen, although it was not. Then he said he wanted to confirm data from potential victims. Browse to continue our content “We (the perpetrator) wants to see again whether the existing data has been updated, so that the payout of retirement allowance for the mother/father in the future is not problematic. So the words that are always transferred to the victims,” he explained. The offenders will then ask whether or not the number of prospective victims is linked to the WhatsApp application. If so, the offenders said they would send data into the system. “The (data) is in the form of PDF data whose content is identity rather than victims, and also attached links that will be directed to download the false bag application used by the perpetrators,” he explained. The offender then sent a PDF file and instructed the victim to download it. After the PDF has been downloaded by the victim, the perpetrator will ask the victim to make a video call for the purpose of verifying the face. “Furthermore, the offenders will ask to share the screen, in the WhatsApp application there is a menu to share the screen with the reason to facilitate its verification,” he explained. Thereafter, the offenders instructed the victim to download the bag application. Direct to enter the settings to give the application access to all the features on the phone. “Then the offenders will instruct the victim to make a username and password from the application using a username and password that is usually often, made the mother or father (the victim) not to forget,” he added. At that time, spontaneous victims usually make user names and keywords usually used by them. One is because retirees are usually old. “Then the perpetrators will also send notifications with the current letter now after the victim clicks on the menu in the application, the offenders may already have access to all the functions on the victim’s cellphone,” he said. “Here are ways or how the offenders can take over all the functions and accounting accounts of the victims, then the offenders will convey all the content of the account of the victim they identified,” he continued. (Rdh/mea) HOEGENG Awards 2025 Read the inspiring story of the exemplary police candidate here