However, the perpetrators of such frauds are now adopting new methods and technologies to defraud the investors. He adds: "Telegram has become my primary news source." The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes. Although some channels have been removed, the curation process is considered opaque and insufficient by analysts. The SC urges the public to refer to the SC’s I nvestor Alert List before investing. The list contains details of unauthorised websites, investment products, companies and individuals. Members of the public who suspect that they have been approached by unauthorised firms or individuals offering schemes that promise unrealistic returns
from es