{"id":72926,"date":"2024-03-04T15:21:28","date_gmt":"2024-03-04T15:21:28","guid":{"rendered":"https:\/\/rdnews.al\/?p=72926"},"modified":"2024-03-04T15:21:28","modified_gmt":"2024-03-04T15:21:28","slug":"arrestohet-ne-dubai-njeriu-i-ortakut-te-olsi-rames-tek-call-center-at-zhvati-50-milione-euro","status":"publish","type":"post","link":"https:\/\/rdnews.al\/index.php\/2024\/03\/04\/arrestohet-ne-dubai-njeriu-i-ortakut-te-olsi-rames-tek-call-center-at-zhvati-50-milione-euro\/","title":{"rendered":"Arrestohet n\u00eb Dubai njeriu i ortakut t\u00eb Olsi Ram\u00ebs tek &#8220;Call Center-at&#8221;, zhvati 50 milion\u00eb euro"},"content":{"rendered":"<p>Ky q\u00eb shihni n\u00eb k\u00ebt\u00eb foto \u00ebsht\u00eb 32-vje\u00e7ari Merxhan \u00c7eliku, i cili p\u00ebr 2 vite ishte n\u00eb k\u00ebrkim pasi dyshohet se ishte pjes\u00eb e nj\u00eb grupi kriminal, cili n\u00ebp\u00ebrmjet mashtrimit me an\u00eb t\u00eb call centrave kishte zhvatur mij\u00ebra euro qytetar\u00ebve evropian.<\/p>\n<p>Fal\u00eb shk\u00ebmbimit t\u00eb informacionit mes policis\u00eb shqiptare, Interpol dhe autoriteteve n\u00eb Abu Dhabi u b\u00eb i mundur arrestimi i tij me q\u00ebllim ekstradimin drejt vendit ton\u00eb.  Ky \u00ebsht\u00eb arrestimi i 3-t\u00eb brenda pak jav\u00ebsh n\u00eb k\u00ebt\u00eb vend pas arrestimit t\u00eb Juljan Mecajt dhe Denis Brajovic.<br \/>\nZbulimi i skem\u00ebs s\u00eb mashtrimit q\u00eb dyshohet se kishte shkaktuar nj\u00eb d\u00ebm ekonomik prej m\u00eb shum\u00eb se 50 milion\u00eb euro ndodhi n\u00eb n\u00ebntor t\u00eb vitit 2022 operacionit nd\u00ebrkomb\u00ebtar t\u00eb udh\u00ebhequr nga Eurojust, Europol dhe Guardia Civil spanjolle n\u00eb Bashk\u00ebpunim me SPAK<\/p>\n<p><strong>\u201cN\u00eb Sh\u00ebnjest\u00ebr\u201d<\/strong><br \/>\nAi \u00ebsht\u00eb sot nj\u00eb nga njer\u00ebzit m\u00eb t\u00eb k\u00ebrkuar n\u00eb Evrop\u00eb, personi q\u00eb krijoi nj\u00eb perandori financiare n\u00ebp\u00ebrmjet mashtrimit. Ai arriti t\u00eb zhvas\u00eb t\u00eb ardhurat e mij\u00ebra qytetar\u00ebve n\u00eb Evrop\u00eb, duke shfryt\u00ebzuar gjenialitetin dhe bashk\u00ebpunimin e tij t\u00eb pashembullt. Amant Josifi \u00ebsht\u00eb nj\u00eb nga ata persona q\u00eb studiohen p\u00ebr fenomenin e mashtrimit n\u00eb call centera dhe qendra telefonike, nj\u00eb problem i p\u00ebrhapur edhe n\u00eb Shqip\u00ebri.<\/p>\n<p>Ish-k\u00ebshilltari i ministres s\u00eb Mbrojtjes, Olta Xha\u00e7ka, dhe ish-ortaku n\u00eb biznes i v\u00ebllait t\u00eb kryeministrit Edi Rama, Olsi Rama, aktualisht jeton n\u00eb Dubai dhe p\u00ebrpiqet t\u00eb shp\u00ebtoj\u00eb nga ekstradimi n\u00eb Spanj\u00eb. N\u00eb periudh\u00ebn midis 2015-2022, bashk\u00eb me ortakun e tij, Mikheil Biniashvili, njohur si Mishka, ata nd\u00ebrtuan nj\u00eb platform\u00eb kibernetike p\u00ebr mashtrim, duke shfryt\u00ebzuar besimin e qytetar\u00ebve t\u00eb Evrop\u00ebs p\u00ebr t\u00eb p\u00ebrvet\u00ebsuar llogarit\u00eb e tyre.<\/p>\n<p>Amant Josifi dhe Mikheil Biniashvili krijuan jo vet\u00ebm nj\u00eb skem\u00eb t\u00eb gjer\u00eb mashtrimi nd\u00ebrkomb\u00ebtar, por edhe e shp\u00ebrndan\u00eb n\u00eb disa vende t\u00eb Evrop\u00ebs, duke filluar nga Ballkani Per\u00ebndimor deri n\u00eb Kaukaz. N\u00eb hetimeve t\u00eb institucioneve ligjzbatuese gjermane jan\u00eb p\u00ebrfshir\u00eb edhe personat e tjer\u00eb, p\u00ebrfshir\u00eb programuesit kompjuterik\u00eb, t\u00eb cil\u00ebt ishin n\u00eb dijeni t\u00eb k\u00ebtij mashtrimi. Autoritetet gjermane po hetojn\u00eb me seriozitet pas sinjalizimeve dhe denoncimeve t\u00eb pranuara nga qytetar\u00eb t\u00eb ndrysh\u00ebm, t\u00eb cil\u00ebt u shfryt\u00ebzuan dhe u d\u00ebmtuan nga k\u00ebto Call Center deri n\u00eb pik\u00ebn q\u00eb lan\u00eb t\u00eb gjith\u00eb pasurin\u00eb e tyre aty.<\/p>\n<p>Pas z\u00ebrave q\u00eb i ftonin n\u00ebp\u00ebrmjet softuer\u00ebve t\u00eb tyre, u krijua nj\u00eb industri e t\u00ebr\u00eb grabitje, e cila shprehet n\u00eb zbulimet e autoriteteve gjermane dhe t\u00eb tjera. Hetime q\u00eb filluan nga autoritetet spanjolle u zbuluan se grupi i organizuar kriminal kishte nisur aktivitetin e tyre n\u00ebp\u00ebrmjet kompanive q\u00eb operonin n\u00eb Call Center-at e Shqip\u00ebris\u00eb. Mashtrimi kompjuterik p\u00ebrhapet si gangren\u00eb n\u00eb Evrop\u00eb, duke shqet\u00ebsuar shtetet si Gjermania, Spanja dhe Suedia. Gjithnj\u00eb e m\u00eb shum\u00eb qytetar\u00eb denoncojn\u00eb k\u00ebt\u00eb sip\u00ebrmarrje kriminale.<\/p>\n<p><strong>Hetimet<\/strong><\/p>\n<p>SPAK ka d\u00ebrguar n\u00eb vitin 2021 k\u00ebrkes\u00ebn p\u00ebr procedim penal me t\u00eb pandehur shtetasit Adrian Korriku, Irisa Puca, Merxhan \u00c7eliku, Endri Bulku, Erlind \u00c7ekaj, t\u00eb cil\u00ebt akuzohen p\u00ebr kryerjen e vepr\u00ebs penale t\u00eb \u2018Mashtrimit kompjuterik\u2019, n\u00eb d\u00ebm t\u00eb shum\u00eb personave, n\u00eb kuad\u00ebr t\u00eb grupit t\u00eb strukturuar kriminal.<br \/>\nShqip\u00ebria u b\u00eb pjes\u00eb e grupit t\u00eb p\u00ebrbashk\u00ebt hetimor, n\u00eb p\u00ebrb\u00ebrje t\u00eb s\u00eb cil\u00ebs jan\u00eb autoritetet gjyq\u00ebsore t\u00eb Spanj\u00ebs, Gjermanis\u00eb, Suedis\u00eb, Finland\u00ebs, Letonis\u00eb, Ukrain\u00ebs, Gjeorgjis\u00eb, Maqedonis\u00eb s\u00eb Veriut, etj, pas zbulimit se nj\u00eb s\u00ebr\u00eb kompanish kan\u00eb kryer aktivitetin e \u2018call center\u2019, duke kryer dhe mashtrimet online. n\u00eb platforma mashtruese t\u00eb shtetasve europian\u00eb.<\/p>\n<p>Autoritetet gjermane dhe partner\u00ebt zbuluan shpejt se kompanit\u00eb, t\u00eb cilat kishin zgjeruar veprimtarin\u00eb e tyre mashtruese n\u00eb Shqip\u00ebri, Ukrain\u00eb, Gjeorgji dhe m\u00eb tej, ishin n\u00ebn drejtimin e \u2018Milton Group\u2019. Pronari i k\u00ebsaj kompanie u identifikua si shqiptari Amant Josifi, i cili sipas hetimeve t\u00eb SPAK n\u00eb bashk\u00ebpunim me \u2018Eurojust\u2019 dhe \u2018Europol\u2019, konsiderohej personi q\u00eb drejtonte gjasht\u00eb qendra t\u00eb mashtrimit telefonik n\u00eb Shqip\u00ebri, t\u00eb cilat ishin lidhur drejtp\u00ebrdrejt me \u2018Milton Group\u2019.<\/p>\n<p><strong>Hetimet<\/strong><\/p>\n<p>K\u00ebto kompani t\u00eb cilat drejtoheshin nga \u2018Milton Group\u2019, shpejt u lokalizuan n\u00eb disa shtete, si Shqip\u00ebria, Maqedonia e Veriut, Ukraina, Gjeorgjia etj.<br \/>\nNga t\u00eb dh\u00ebnat hetimore t\u00eb d\u00ebrguara nga Autoritetet Gjyq\u00ebsore Gjermane, del se kan\u00eb rezultuar lidhje t\u00eb shtetasve shqiptar\u00eb me kompanin\u00eb \u2018Milton Group\u2019 q\u00eb ka organizuar veprimtarin\u00eb kriminale t\u00eb mashtrimit kompjuterik online, n\u00eb mjaft shtete t\u00eb Europ\u00ebs Per\u00ebndimore.<br \/>\nNga autoritetet gjermane \u00ebsht\u00eb urdh\u00ebruar kontrolli i platformave mashtruese tregtare \u2018Absolut Global Markets\u2019, \u2018AurumPro\u2019 dhe \u2018Finaxis\u2019.<br \/>\nMegjithat\u00eb, sipas k\u00ebtyre autoriteteve, konsiderohet e sigurt se i nj\u00ebjti grup kriminal \u00ebsht\u00eb gjithashtu p\u00ebrgjegj\u00ebs p\u00ebr shum\u00eb platforma t\u00eb tjera tregtare, kryesisht identike, Kjo duket qart\u00eb nga hetimet financiare t\u00eb kryera ndaj kompanive, si dhe nga vler\u00ebsimet e gjurm\u00ebve t\u00eb ndryshme teknike, p\u00ebrfshir\u00eb IP me adresa identike.<\/p>\n<p>Le t\u00eb p\u00ebrqendrohemi n\u00eb d\u00ebmet e shkaktuara, rolin e personazheve kryesore t\u00eb k\u00ebsaj perandori mashtrimi, dhe impaktin e tyre n\u00eb historin\u00eb e k\u00ebsaj ngjarjeje. P\u00ebrve\u00e7 k\u00ebsaj, le t\u00eb analizojm\u00eb ve\u00e7an\u00ebrisht situat\u00ebn n\u00eb Gjermani, ku shum\u00eb qytetar\u00eb u mashtruan nga k\u00ebto platforma. Ata ran\u00eb pre e nj\u00eb sistemi t\u00eb sofistikuar, t\u00eb drejtuar nga mendje gati gjeniale, por t\u00eb ndyra.<\/p>\n<p><strong>Hetimet Gjermane<\/strong><\/p>\n<p>N\u00eb zyrat tona qendrore kibernetike n\u00eb Bavari, jan\u00eb dor\u00ebzuar af\u00ebrsisht 67 kall\u00ebzime penale, Sipas analiz\u00ebs q\u00eb kemi kryer d\u00ebmi i shkaktuar nga platformat \u2018AurumPro\u2019, \u2018Fianxis\u2019 dhe \u2018AGMarkets\u2019, llogaritet deri m\u00eb tani n\u00eb 1.8 milion\u00eb euro.<br \/>\nPo k\u00ebshtu jan\u00eb dor\u00ebzuar 35 kall\u00ebzime p\u00ebr platform\u00ebn \u2018Centrobanc\u2019, ku d\u00ebmi n\u00eb total mendohet t\u00eb jet\u00eb 1.7 milion\u00eb euro.<br \/>\nNd\u00ebrsa 40 ankesa jan\u00eb p\u00ebr platform\u00ebn \u2018CapitalMarketsBanc\u2019, ku d\u00ebmi n\u00eb k\u00ebt\u00eb rast llogaritet t\u00eb jet\u00eb 1.6 milion\u00eb Euro.<br \/>\nDhe p\u00ebr platform\u00ebn \u2018Cryptokartal\u2019, 31 kall\u00ebzime, me nj\u00eb d\u00ebm n\u00eb total, prej 1 milion\u00eb euro.<\/p>\n<p>Sipas autoriteteve gjermane, Bavaria \u00ebsht\u00eb vet\u00ebm nj\u00eb nga shum\u00eb lande t\u00eb prekura nga ky fenomen n\u00eb Gjermani. Kall\u00ebzime t\u00eb ngjashme kan\u00eb ardhur edhe nga shum\u00eb lande t\u00eb tjera. Platformat e lidhura me kompanin\u00eb \u2018Milton Group\u2019, t\u00eb drejtuar nga Amant Josifi dhe ortaku i tij gjeorgjian, Mishka, kishin udh\u00ebheqjen e skem\u00ebs s\u00eb mashtrimit. Kjo situat\u00eb \u00e7oi n\u00eb nj\u00eb operacion t\u00eb p\u00ebrbashk\u00ebt t\u00eb shum\u00eb skuadrave hetimore n\u00eb fund t\u00eb vitit 2022. K\u00ebto skuadra hetimore kryenin kontroll t\u00eb befasish\u00ebm n\u00eb disa Call Center-a n\u00eb Shqip\u00ebri, ku mendohet se kishte filluar ky mashtrim me p\u00ebrmasa t\u00eb jasht\u00ebzakonshme.<\/p>\n<p><strong>Hetimet Gjermane<\/strong><\/p>\n<p>M\u00eb datat 8 dhe 9 N\u00ebntor 2022, u finalizua operacioni nd\u00ebrkomb\u00ebtar \u2018Frida-Refox\u2019, ku n\u00eb Shqip\u00ebri u kontrolluan disa qendra t\u00eb thirrjeve telefonike n\u00eb Tiran\u00eb, Elbasan dhe Vlor\u00eb.<br \/>\nKu u ndaluan 4 shtetas t\u00eb dyshuar si dhe u shpall\u00ebn n\u00eb k\u00ebrkim 6 t\u00eb tjer\u00eb.<br \/>\nAty ku krahas portofoleve n\u00eb kriptovalut\u00eb dhe parave n\u00eb cash u gjet\u00ebn edhe dokumente identifikimi t\u00eb shtetasve lituanez\u00eb dhe gjeorgjian\u00eb, karta banke lituaneze etj.<\/p>\n<p>Do t\u00eb ishte ky kontroll q\u00eb do t\u00eb identifikonte edhe personat kryesor\u00eb t\u00eb cil\u00ebt fshiheshin pas k\u00ebtyre platformave mashtruese, t\u00eb cil\u00ebt lidheshin me kompanin\u00eb \u2018Puma Ts\u2019, edhe kjo kompani n\u00eb pron\u00ebsi t\u00eb Amant Josifit dhe gjeorgjianit me pasaport\u00eb izraelite, Mishka.<\/p>\n<p><strong>Hetimet Gjermane<\/strong><\/p>\n<p>Gjat\u00eb vler\u00ebsimit t\u00eb nj\u00eb serveri u arrit\u00ebn t\u00eb identifikoheshin plot\u00ebsisht personat t\u00eb cil\u00ebt ishin t\u00eb lidhur me kompanin\u00eb e IT \u2018PumaTS\/ SMCompany\u2019.<br \/>\nQ\u00eb jan\u00eb t\u00eb pandehurit Irisa Puca, Endri Bulku, Erlind \u00c7ekaj dhe Adrian Korriku.Nd\u00ebrkoh\u00eb q\u00eb rezultoi se personi i pandehur Merxhan \u00c7eliku, kishte komunikime t\u00eb drejtp\u00ebrdejta me viktimat e mashtrimit n\u00eb Austri dhe Gjermani, n\u00ebp\u00ebrmjet k\u00ebtyre platformave.<br \/>\nKjo \u00ebsht\u00eb provuar plot\u00ebsisht n\u00ebp\u00ebrmjet adresave IP nga ku jan\u00eb b\u00ebr\u00eb komunikimet, si dhe l\u00ebvizjet e llogarive bankare dhe ato t\u00eb valutave n\u00eb modhedha virtuale, n\u00eb t\u00eb cilat kan\u00eb kaluar parat\u00eb e viktimave.<\/p>\n<p>Gjat\u00eb hetimit, u zbuluan lidhjet e Amant Josifit me kompanin\u00eb \u2018Milton Group\u2019 dhe kompanit\u00eb bija q\u00eb ai kishte krijuar p\u00ebr t\u00eb fshehur aktivitetin e tij kriminal. Po ashtu, u zbuluan edhe pasurit\u00eb e marramend\u00ebshme monetare q\u00eb ai kishte fituar nga ky aktivitet. Disa prej k\u00ebtyre pasurive ishin transferuar n\u00eb em\u00ebr t\u00eb familjar\u00ebve t\u00eb tij.<\/p>\n<p><strong>Hetimet Gjermane<\/strong><\/p>\n<p>N\u00eb vijim t\u00eb hetimeve, n\u00eb bashk\u00ebpunim me autoritetet spanjolle jan\u00eb gjendur dhe sekuestruar n\u00eb posedim t\u00eb shtetasit Amant Josifi, subjekte tregtare t\u00eb administruara nga ai, si dhe familjar\u00eb t\u00eb tij, si llogari bankare me shumat monetare n\u00eb total n\u00eb vler\u00ebn prej 2 225 868 66 euro dhe 2 844 936 37 lek\u00eb.<\/p>\n<p>Nd\u00ebrsa Amant Josifi po ndiqet penalisht nga autoritetet spanjolle dhe ka nj\u00eb k\u00ebrkes\u00eb ekstradimi drejtuar Emirateve t\u00eb Bashkuara Arabe, ku ai u arrestua n\u00eb Dubai disa muaj m\u00eb par\u00eb, nj\u00eb personazh tjet\u00ebr kryesor n\u00eb k\u00ebt\u00eb histori \u00ebsht\u00eb Mikheil Binashvili, i njohur ndryshe si Mishka.<\/p>\n<p>Ai konsiderohet si truri i operacionit t\u00eb mashtrimit me Call Center, duke u p\u00ebrfshir\u00eb n\u00eb nj\u00eb skem\u00eb q\u00eb n\u00eb periudh\u00ebn 2015-2022 ka mashtruar mij\u00ebra qytetar\u00eb n\u00eb Evrop\u00ebn Per\u00ebndimore dhe ka grabitur miliona euro. Binashvili ka punuar me ekspert\u00eb kompjuterik\u00eb shqiptar\u00eb p\u00ebr t\u00eb krijuar sisteme softuerike t\u00eb sofistikuara p\u00ebr mashtrim, duke p\u00ebrfshir\u00eb edhe krijimin e kompanive bija p\u00ebr t\u00eb fshehur aktivitetin kriminal.<\/p>\n<p>Ai ka hapur pika t\u00eb ngjashme n\u00eb vendet si Maqedonia e Veriut, Lituania dhe Gjeorgjia, me ndihm\u00ebn e inxhinier\u00ebve shqiptar\u00eb t\u00eb inxhinieris\u00eb kompjuterike. Autoritetet gjermane identifikuan fillimin dhe zbulimin e skem\u00ebs nga nj\u00eb shqiptar, Hysen Speci, i cili m\u00eb pas do t\u00eb ndihmoj\u00eb n\u00eb zbardhjen e lidhjeve t\u00eb tjera t\u00eb Mishka gjeorgjianit.<\/p>\n<p><strong>Hetimet Gjermane<\/strong><\/p>\n<p>Pas hetimeve t\u00eb kryera \u00ebsht\u00eb provuar se pas k\u00ebtyre platformave q\u00ebndron nj\u00eb grup i nivelit t\u00eb lart\u00eb t\u00eb lidhur me krimin, q\u00eb klasifikohet n\u00eb kategorin\u00eb e krimit t\u00eb organizuar.<br \/>\nGrup kriminal q\u00eb vitet e fundit dispononte, qendra thirrjesh t\u00eb quajtura \u2018Call Center\u2019 n\u00eb shtete si Gjeorgjia, Shqip\u00ebria dhe Maqedonia e Veriut.<br \/>\nKu b\u00ebjn\u00eb pjes\u00eb edhe shqiptar\u00eb, tashm\u00eb t\u00eb identifikuar p\u00ebr rolin e tyre.<br \/>\nNd\u00ebr k\u00ebta persona ata q\u00eb cil\u00ebsohen si m\u00eb t\u00eb r\u00ebnd\u00ebsish\u00ebm n\u00eb rolin e tyre jan\u00eb shtetasit shqiptar Irisa Puca dhe Adrian Korriku.<br \/>\nT\u00eb cil\u00ebt kan\u00eb lidhje me \u2018Milton Group\u2019, ku nd\u00ebr t\u00eb tjera p\u00ebrmenden edhe \u2018Spot MT\u2019 dhe \u2018Puma TS\u2019.<\/p>\n<p>Si\u00e7 tham\u00eb, personi kryesor n\u00eb k\u00ebt\u00eb sip\u00ebrmarrje kriminale \u00ebsht\u00eb gjeorgjiani Mikheil Biniashvili, i cili ka pranuar para hetuesve gjerman\u00eb, p\u00ebrmes avokatit t\u00eb tij mbrojt\u00ebs, se ishte pronari i Call Center-it \u2018Spot MT\u2019 n\u00eb Shqip\u00ebri, si dhe pas softuerit \u2018Puma TS\u2019.<\/p>\n<p><strong>Hetimet Gjermane<\/strong><\/p>\n<p>Si fillim pagesa ishte kryer mbi baz\u00ebn e nj\u00eb komisioni, por m\u00eb von\u00eb ishte kaluar n\u00eb nj\u00eb pages\u00eb me norm\u00eb fikse. Biniashvili, nuk e ka kund\u00ebrshtuar faktin se ai ishte n\u00eb dijeni t\u00eb xhirove n\u00eb lidhje me brandet. Firma \u2018Spot MT\u2019 u themelua m\u00eb 3 Shkurt 2014 me seli n\u00eb Tiran\u00eb, ku si aktivitet u p\u00ebrcaktua \u2018Call Center\u2019.<\/p>\n<p>Po k\u00ebt\u00eb vit, m\u00eb dat\u00eb 22 Dhjetor, kompania \u2018Terminal Investment Management\u2019 i kaloi n\u00eb pron\u00ebsi Mikhael Beniminit, ku b\u00ebhet fjal\u00eb p\u00ebr shtetasin gjeorgjian Mikheil Biniashvili, i cili e bleu k\u00ebt\u00eb firm\u00eb duke paraqitur nj\u00eb pasaport\u00eb izraelite, ku vet\u00ebm 12 dit\u00eb m\u00eb pas, m\u00eb dat\u00eb 24 Dhjetor 2014, kompania \u2018Termimal Investments Management LLC\u2019 u em\u00ebrtua \u2018Spot MT LLC\u2019.<\/p>\n<p>N\u00eb vitin 2018, rezulton se Biniashvili ia shiti kompanin\u00eb shtetasit Andri Kalaus, por q\u00eb besohet se Biniashvili e shiti kompanin\u00eb vet\u00ebm me letra, pasi ai vazhdonte t\u00eb merrte t\u00eb gjitha vendimet e m\u00ebtejshme sip\u00ebrmarr\u00ebse.<\/p>\n<p>T\u00eb dh\u00ebnat e bashk\u00ebpunimit t\u00eb kompanis\u00eb \u2018Puma Ts\u2019 me \u2018Aurum Pro\u2019 u zbuluan n\u00eb nj\u00eb faz\u00eb m\u00eb t\u00eb vone t\u00eb hetimit gjerman, pas zbulimit t\u00eb nj\u00eb serveri q\u00eb sh\u00ebrbente p\u00ebr lidhjen e tyre. N\u00ebp\u00ebrmjet k\u00ebtij zbulimi, u zbuluan edhe shumat marramend\u00ebse q\u00eb kishin siguruar k\u00ebto kompani p\u00ebrmes mashtrimit.<\/p>\n<p>Kall\u00ebzime t\u00eb shumta erdh\u00ebn pas qindra padive q\u00eb qytetar\u00eb evropian\u00eb kishin dor\u00ebzuar n\u00eb autoritetet ligjzbatuese n\u00eb vendet e tyre. Gjithashtu, nj\u00eb shqiptar rr\u00ebfeu informacione q\u00eb ndihmuan n\u00eb identifikimin e emrave t\u00eb programuesve t\u00eb tjer\u00eb q\u00eb kishin ndihmuar Biniashvilin n\u00eb k\u00ebt\u00eb mashtrim.<\/p>\n<p><strong>Hetimet gjermane<\/strong><\/p>\n<p>M\u00eb 23 Gusht 2023, nga Zyra Kriminale e Landit t\u00eb Sachsen u mor n\u00eb pyetje si i akuzuar i pandehuri Hysen Speci.<br \/>\nAi tha se t\u00eb par\u00ebt q\u00eb shkuan n\u00eb Gjeorgji p\u00ebr t\u00eb ndihmuar Biniashvilin, ishin Irisa Puca dhe Erlind \u00c7ekaj, t\u00eb cil\u00ebt m\u00eb her\u00ebt ishin takuar me Mishk\u00ebn n\u00eb Gjeorgji.<br \/>\nSipas tij Irisa kishte p\u00ebr detyr\u00eb t\u00eb menaxhonte programist\u00ebt dhe se projekti quhej \u2018Puma TS\u2019.<br \/>\nSpeci tha se ata e dinin shum\u00eb mir\u00eb q\u00eb k\u00ebto programe po p\u00ebrdoreshin p\u00ebr mashtrimin e shtetasve t\u00eb ndrysh\u00ebm europian\u00eb.<br \/>\nDhe se b\u00ebhej fjal\u00eb q\u00eb n\u00ebp\u00ebrmjet sistemit t\u00eb p\u00ebrdorur \u2018MIT 4\u2019 personit t\u00eb d\u00ebmtuar t\u00eb mund t\u2019i krijohet iluzioni i humbjeve, q\u00eb n\u00eb t\u00eb v\u00ebrtet\u00eb nuk kan\u00eb ndodhur.<br \/>\nN\u00eb vend t\u00eb tyre parat\u00eb ark\u00ebtoheshin p\u00ebr q\u00ebllime mashtrimi.<\/p>\n<p>Autoritetet gjermane, pasi udh\u00ebtuan drejt Gjeorgjis\u00eb, arrit\u00ebn t\u00eb provojn\u00eb n\u00ebp\u00ebrmjet kontrolleve t\u00eb kryera n\u00eb disa Call Centera n\u00eb k\u00ebt\u00eb shtet, se n\u00eb serverin e firm\u00ebs \u2018Hetzner\u2019 u gjend\u00ebn regjistrat e kompanis\u00eb \u2018Puma TS\u2019.<\/p>\n<p>N\u00eb lidhje me k\u00ebt\u00eb platform\u00eb u regjistruan 24 padi penale, dhe d\u00ebmi p\u00ebrllogaritet t\u00eb jet\u00eb af\u00ebrsisht 697,633.94 euro. Nga k\u00ebto hetime, u identifikua Irisa Puca, e cila punon si menaxhere projekti n\u00eb firm\u00ebn \u2018Puma TS\u2019, duke p\u00ebrdorur pseudonimin Iris Stone. Po ashtu, u identifikua edhe Adrian Korriku, si nj\u00eb punonj\u00ebs i \u2018Puma TS\u2019.<\/p>\n<p><strong>Hetimet Gjermane<\/strong><\/p>\n<p>Irisa Puca, ka pseudonimin Iris Stone.<br \/>\nAjo ka studiuar p\u00ebr informatik\u00eb n\u00eb Universitetin e Tiran\u00ebs.<br \/>\nPuca dyshohet se ishte p\u00ebrgjegj\u00ebse p\u00ebr zhvillimin e sistemeve CRM, q\u00eb jan\u00eb p\u00ebrdorur p\u00ebr funksionimin e platformave mashtruese.<br \/>\nKu nga hetimet doli se t\u00eb dh\u00ebnat e klient\u00ebve ruhen n\u00eb k\u00ebto sisteme dhe pa k\u00ebto ruajtje dhe menaxhim t\u00eb t\u00eb dh\u00ebnave p\u00ebr klient\u00ebt nj\u00eb platform\u00eb e till\u00eb nuk mund t\u00eb funksionoj\u00eb ekonomikisht.<br \/>\nPo k\u00ebshtu provohet se Endri Bulku \u00ebsht\u00eb nj\u00eb nga zhvilluesit e softuer\u00ebve p\u00ebr \u2018Puma TS\u2019.<br \/>\nAshtu si edhe Erlind \u00c7ekaj q\u00eb punon si drejtues i ekipit t\u00eb zhvilluesve n\u00eb k\u00ebt\u00eb kompani.<br \/>\nNj\u00eb tjet\u00ebr person q\u00eb rezulton aktiv n\u00eb k\u00ebt\u00eb aktivitet del t\u00eb jet\u00eb edhe Adrian Korriku.<br \/>\nNd\u00ebrsa Merxhan \u00c7eliku rezulton t\u00eb ket\u00eb nj\u00eb llogari n\u00eb Paypal q\u00eb i atribuohen \u2018Milton Group\u2019.<br \/>\nK\u00ebto biznese, n\u00eb dukje t\u00eb ligjshme, n\u00eb t\u00eb v\u00ebrtet\u00eb kan\u00eb operuar n\u00eb aktivitetin e mashtrimit me platforma t\u00eb ndryshme.<br \/>\nNd\u00ebrsa k\u00ebta shtetas jan\u00eb organizator\u00ebt e grupit t\u00eb strukturuar kriminal ku persona t\u00eb p\u00ebrfshir\u00eb, t\u00eb lidhur me Shqip\u00ebrin\u00eb jan\u00eb shtetasit, Mikhail Binaishvili, etj.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ky q\u00eb shihni n\u00eb k\u00ebt\u00eb foto \u00ebsht\u00eb 32-vje\u00e7ari Merxhan \u00c7eliku, i cili p\u00ebr 2 vite ishte n\u00eb k\u00ebrkim pasi dyshohet se ishte pjes\u00eb e nj\u00eb grupi kriminal, cili n\u00ebp\u00ebrmjet mashtrimit me an\u00eb t\u00eb call centrave kishte zhvatur mij\u00ebra euro qytetar\u00ebve evropian. Fal\u00eb shk\u00ebmbimit t\u00eb informacionit mes policis\u00eb shqiptare, Interpol dhe autoriteteve n\u00eb Abu Dhabi u &hellip;<\/p>\n","protected":false},"author":3,"featured_media":72927,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":["post-72926","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-politike"],"_links":{"self":[{"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/posts\/72926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/comments?post=72926"}],"version-history":[{"count":0,"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/posts\/72926\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/media\/72927"}],"wp:attachment":[{"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/media?parent=72926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/categories?post=72926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rdnews.al\/index.php\/wp-json\/wp\/v2\/tags?post=72926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}