Investigators allege the suspects used laptops, phones, and fake audio to trick victims into handing over personal data.

See Full Page