All three had arrived on a tourist flight, allegedly to pass unnoticed. But airport police noted that they were carrying computer and electronic equipment considered too sophisticated for a tourist's needs. They were taken aside and searched and according to police sources were found to be in possession of dummy slots for credit cards, keyboard panels for the cashpoints, a portable computer, blank cards and cables. One of the officers involved in the arrest said that the idea was to place the false keyboards on various cashpoints, preferably at weekends, when there was less vigilance. Unsuspecting users would mark their pin number, which the gang could then transfer to a blank card, making a perfect duplicate.
The victim would not realise the theft until some time later, by which time the gang would have vanished.
The false keyboards were described as a perfect and undetectable instrument, so much so that it would not be noticed by the victim.
The portable computer, thanks to a modern programme, would have enabled the gang not only to clone the credit cards, but also transmit the information via internet and operate in several countries at the same time. The Guardia Civil say that thanks to this operation, they have aborted a mass fraud which would have damaged the image of Majorca.
They say that the accused had planned to stay in a hotel in the Playa de Palma for a week, and were planning to operate in tourist areas, as their victims would not realise they were being robbed until they returned home, and the complaints process would be more complicated.
The content of comment is the opinion of users and netizens and not of mallorcadailybulletin.com.
Comments contrary to laws, which are libellous, illegal or harmful to others are not permitted');
mallorcadailybulletin.com - reserves the right to remove any inappropriate comments.
Please remember that you are responsible for everything that you write and that data which are legally required can be made available to the relevant public authorities and courts; these data being name, email, IP of your computer as well as information accessible through the systems.