@aratohrnn: Valentine - Laufey (Aratohrn) #accoustic #ValentinesDay @laufey

Aratohrnn
Aratohrnn
Open In TikTok:
Region: ID
Tuesday 04 February 2025 16:42:17 GMT
697
6
0
0

Music

Download

Comments

There are no more comments for this video.
To see more videos from user @aratohrnn, please go to the Tikwm homepage.

Other Videos

International Chinese scammers reap long prison sentences as female convict cries for Papa AN UNSCRIPTED emotional drama unfolded at the Lusaka Magistrates Court yesterday as a female Chinese convicted for internet fraud wailed in  anguish and apparent while clasping on her criminal Boss who also going to jail along with 20 of his male compatriots for the same crime. As the only woman of the gang, a seven year jail term pronounced on Gu Tianjiao yesterday not only ends her freedom but also separates her from  partners in crime, thousands of kilometres away from home.
International Chinese scammers reap long prison sentences as female convict cries for Papa AN UNSCRIPTED emotional drama unfolded at the Lusaka Magistrates Court yesterday as a female Chinese convicted for internet fraud wailed in anguish and apparent while clasping on her criminal Boss who also going to jail along with 20 of his male compatriots for the same crime. As the only woman of the gang, a seven year jail term pronounced on Gu Tianjiao yesterday not only ends her freedom but also separates her from partners in crime, thousands of kilometres away from home. "Papa, Papa, Papa," wailed Gu Tianjiao as her Boss master Li Xianlin made his way to Kasalanga with a running engine to start his own jail stay of 11 years. The two are among the 21 Chinese nationals and a Cameroonian who in real life imitated the money hungry scammers in the movie ‘The Bee Keeper’ and wiped clean the accounts of people and wage earners through internet fraud. Li Xianlin imported 20 Chinese and a Cameroonian as his employees and enhanced his work force by employing 55 Zambians as call center agents to scam the masses under the umbrella of Golden Top Support Services Limited. Youthful Zambians had an easy way out of the fraudulent syndicate, as they by the DEC a condition that they assist with investigations. The convicts are identified as Li Xianlin Enxnin Bai, Gu Tianjiao , Jia Ye, Ding Wenyu, Shi Feng, Zhao Di, He Qiu, Yang Yingming, Zhou Lin, He Binhua, Yang Chuan, Sun Pan, Li Wenquiang, Tang Wei, Luo Zhiwen, Hu Dawei, Wang Jiding, Hou Jing, Dai Bing Deng Hu and Emmanuel Tangi Fogwe. They were charged with Computer related misrepresentation, identity related crime, and operating a network without a license. Not only did the International scammers steal from Zambians by duping them to send their mobile money details so that they could be beneficiaries of ‘impiya shabalanda, impiya sha CDF and Impiya sha debt restructuring’ , people from Singapore, Peru, the United Arab Emirates (UAE) also fell victim in the internet fraud. When taken to Court the 22 readily pleaded guilty to the crimes they committed, before Principal resident magistrate Sylvia Munyinya. Facts are that the DEC and ZICTA pounced on the accused’s premises in Kalundu area after being tipped by members of the public who saw employees frequenting the place which had no proper business definition. During the search 135 personal computers, 1 laptop, a Toyota Alphard registration number BAT 8373, 37000 SIM cards (both Local and International), one iPad, two pistols with 73 rounds of ammunition, MW 13, 143.00, $ 20.00 and 17,000 Dinars cash, 23 cell phones and 11 SIM boxes were recovered and seized. Investigations revealed that the convicts faked other people’s identities using a version of WhatsApp web which allows for the creation of multiple WhatsApp accounts on one device. The mobile numbers used in creating fake identities were not registered in the convicts’ names or under the names of Golden Top Limited's employees but were registered under other people's names and when some of the people whose identities were used were contacted, expressed ignorance over the registration and existence of those mobile numbers under their identities. The 22 falsified data with intentions that it may be acted upon as if it were authentic by unsuspecting members of the public. Chats were initiated using a script file called "Script.txt" which contained specific information that was to be shared with the targeted victims. The convicts would purport to be employees of multinational entities such as Google, Gemini and acting in these falsified capacities, they would assign their victims tasks of marketing places on google location. At the completion of the said tasks, the victims were be lured to Telegram, to get their payment for the task. The inputs on the fake proof of payment documents were electronically created using Photoshop to lure unsuspecting members of the public into thinking that the investments we

About