72 Entities Without Operational Permits Potentially Disadvantages the People

By : Herry Barus And Aldo Bella Putra | Saturday, April 21 2018 - 12:00 IWST

Ilustrasi Investasi Bodong (Foto Dok Industry.co.id)
Ilustrasi Investasi Bodong (Foto Dok Industry.co.id)

INDUSTRY.co.id - Jakarta - The Task Force on the Suspension of Legal Action in the Field of Community Funds and Investment Management ensures that 72 entities are suspected of having undertaken unauthorized activities and potentially harming the public.

"This is only April but there are 72 entities that have been complained for allegedly conducting business without permission," said Task Force Investigative Chairman Tongam L Tobing in a press conference in Jakarta on Friday (20/4/2018).

Tongam said this amount is almost close to the number of entities reported by the community and does not have permission to market products based on investment throughout 2017 that is as much as 80 entities.

He added that most entities that should receive special attention from the community are engaged in Forex or Future Trading, Cyptocurrency, Multi Level Marketing and other investments that promise unfair returns or profits.

"They conduct activities to raise funds from the community with high yields without risk as well as attractive but unreasonable offerings," said Tongam.

Tongam asks the public to be vigilant and increase education on speculative-based investments and promise big profits in a short time, let alone most cases occur among urban communities.

"This is a recurring problem, so community participation is important to be convincing, so if there is a release from the Task Force related to the problem entity, please ask the entity not to be followed," he said.

He asserted that the list of these problem entities has been reported to the Police Criminal Investigation Unit to obtain further legal process and to the Ministry of Communications and Information Technology to block the site and the page of the entity.

However, he acknowledges the precautionary process should be repeated so that these different modes of investment with unreasonable returns do not recur and do not continue to harm the public.

"We may have closed the web by Kominfo, but the culprit is very cunning and publishes a new web, so there must be a firm step from the police," Tongam said.

News Comment

Today's Industry

Cyber Attack (Images by IDN Times Jabar)

Jumat, 21 Februari 2020 - 09:09 WIB

Cyber Attack Fears are Delaying Business Innovation

Survey conducted by bug bounty and pentesting platform, HackerOne, has revealed that IT projects are being stifled due to security concerns. More than 80% of UK CISOs and CTOs who were interviewed…

OnRobot (Images by Business Wire)

Kamis, 20 Februari 2020 - 15:33 WIB

OnRobot Expands Innovative Gecko Gripper Family with Compact Gecko Single-Pad Gripper

OnRobot, a global leader in robotic end-of-arm tooling, has launched a compact, single-pad version of its innovative Gecko no-mark adhesive gripper. The new Gecko Single Pad gripper brings the…

Synopsys, Inc. (Images by PR Newswire)

Kamis, 20 Februari 2020 - 15:13 WIB

Synopsys Announces First Application Security Testing Solution

Synopsys, Inc. Announced that it will release a major update to the Polaris Software Integrity Platform to extend its static application security testing and software composition analysis capabilities…

Coronavirus themed Malware (Images by Novel coronavirus COVID-19 FDA)

Kamis, 20 Februari 2020 - 14:46 WIB

Beware of the other virus, the spread of Coronavirus-themed Malware

While the world attempts to take control over the spread of the Coronavirus, and tries to contain, eliminate and prevent it from spreading, hackers around the globe have found the Coronavirus…

Synopsys Software Integrity Group (Images by BusinessNews Indonesia)

Kamis, 20 Februari 2020 - 14:07 WIB

How to Cyber Security, It’s all about developers, except when it’s not

To get security testing results in front of developers, who are in the best position to address them effectively, you need automation and integration. Product security is hard. The goal is to…