hoe een nepagent 322.800 euro wist te stelen uit nijmegen
Nijmegen, zondag, 1 maart 2026.
In Nijmegen werd Kees (69) het slachtoffer van een brutale oplichting door een nepagent die zich voordeed als rechercheur Johan. Over maanden tijd gaf hij 322.800 euro uit via 89 pinautomaattransacties, allemaal onder dwang van de imposter. Zijn broer Wim bemerkte de fraude en waarschuwde de echte politie. Bij een laatste telefoongesprek met de dader zat Kees in zijn flat, omgeven door undercoveragenten. Terwijl hij “ja, ja, ik ben alleen” zei, luisterden tientallen agenten mee. Het gesprek werd gevoerd met een simkaart uit het buitenland. Hoewel de operatie massaal was, wist de dader te ontkomen. De zaak blijft lopen.
how the scam began
The fraud against Kees started when a criminal calling himself ‘agent Johan’ contacted him by phone. The caller claimed there were burglars in the area targeting elderly people through corrupt bank employees. He said Kees’s money was unsafe and needed to be moved to a secure police vault. This story gained trust quickly because it played on real fears. The impersonator used official language and even sent legal-looking documents to justify actions. Kees believed he was protecting his assets [1]. The fake agent communicated via Signal, using a hacked photo of a real officer to appear legitimate [2].
methodical manipulation and withdrawals
Once trust was established, the fraudster guided Kees through increasing his daily withdrawal limits. Normally, Kees withdrew no more than fifty euros for small expenses like cleaning help [3]. Under pressure from the impostor, he began withdrawing five thousand euros nearly every day. These transactions occurred across multiple banks including ING and Van Lanschot Kempenaar [3]. There were eighty-nine such withdrawals total, amounting to €322,800 [1]. During each transaction, Kees kept the phone call active with the fraudster who gave step-by-step instructions. This control prevented outside intervention until suspicion grew [2].
bank warnings failed to stop the fraud
Both ING and Van Lanschot Kempenaar noticed unusual activity on Kees’s accounts. ING staff called to warn him directly about potential fraud [3]. They also invited him for an in-person meeting regarding suspicious behavior [3]. However, since Kees confirmed each transaction, the bank felt legally unable to block further payments. “As a payment service provider, we must execute customer transactions,” stated an ING spokesperson [3]. Even after raising red flags, the bank could not freeze the account without violating financial protocols. Their duty to protect clients clashed with obligations to honor verified transfers [3].
family intervenes but damage already done
Wim, Kees’s brother, became alarmed after hearing a conversation between Kees and the supposed agent Johan. Something about the terminology felt off despite polite speech patterns [2]. When Wim questioned the situation, the caller dismissed concerns and insisted everything was under control. After realizing his sibling might be victimized, Wim reported the issue to law enforcement on February 27, 2026 [2]. By then, most of the €322,800 had already been withdrawn through repeated ATM visits [1]. Despite quick action, recovery seemed unlikely due to completed transfers [2].
police trap fails despite massive operation
On March 1, 2026, authorities prepared a sting operation at Kees’s apartment in Nijmegen [1]. Real agents filled the unit, ready to trace a scheduled callback from the suspect known as Johan [1]. Drones monitored nearby streets while plainclothes officers waited inside and around the building [1]. When the call came, Kees answered calmly saying, ‘Yes, yes, I am alone,’ fooling the perpetrator [1]. The line originated from a UK-based SIM card, complicating tracking efforts [1]. Though evidence was gathered, no arrests resulted immediately from this attempt [1].
financial impact and average loss per transaction
The total stolen amount reached €322,800 distributed over 89 separate withdrawals [1]. Calculating the average sum taken per transaction shows how large individual losses were [GPT]. 3626.966 reveals approximately €3,626.97 extracted each time Kees visited an ATM [1]. Most victims rarely notice such deviations if confidence exists in the process [GPT]. Since Kees approved each transfer verbally during calls, stopping them mid-process fell beyond banking safeguards [3]. This case highlights systemic vulnerabilities exploited systematically [3].
ongoing investigation and broader implications
Authorities continue investigating whether other suspects assisted the main fraudster [1]. On March 1, three individuals were briefly detained near Amsterdam following surveillance leads [1]. Among them was a young woman described as a victim herself rather than a participant [1]. Two males remain held for questioning related to identity theft and exploitation charges [1]. While some connections exist to prior cases involving similar tactics—such as a recent scam in Oosterbeek—the links remain speculative [4]. Public awareness campaigns now stress verifying unexpected contacts claiming to represent institutions [4].