Cyber Crime Hothouses In Myanmar

Three years ago in  2021,  a man named La Awng moved from his native Kachin State in Myanmar to Laukkai, the capital of the country’s autonomous Kokang region near the border with China, where he expected to take a new job  working in a casino.

In fact, he was cruelly misled by his expected new employers and found that he had been trafficked into a cyber crime business which is run by a group of Chinese criminals.

Like thousands of other workers in Laukkai, La Awng was held captive in a high-rise building and forced to defraud people in foreign countries using a scheme known as pig butchering. Named for the way scammers “fatten up” targets before their “slaughter”, it involves striking up online romances to lure people into fake cryptocurrency investment schemes.

This online fraud  industry has significantly increased across Southeast Asia since the COVID-19 pandemic and  by the end of 2023, crime syndicates in the region were using online fraud schemes to steal from people around the world of some $64bn annually, according to a report published by the United States Institute of Peace (USIP). Myanmar, where the rule of law has collapsed since the February 2021 military coup, has emerged as a major centre for this kind of criminality

USIP has found that criminal networks originating in China are exploiting hundreds of thousands of people from more than 60 countries to run their cimila operations, typically holding them in “prisonlike conditions” and sometimes using physical abuse and torture to keep them at work.

Suppressing the criminal networks investigated by USIP will take a large-scale  response that addresses their causes, effects, power, reach, and methods in a country-by-country approach to defeat by the criminal groups ability to move across borders and dodge law enforcement. 

AlJazeera   |   AlJazeera   |    USIP   |   Deutsche Welle   |    The Record  |    The Overspill   

Image: Ideogram

You Might Also Read: 

$3 Million Romance Fraudster Arrested:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« App Security Testing: Exploring The Pros & Cons Of Different Approaches 
Russian Cyberwar Methods Are Evolving »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

European Defence Agency (EDA)

European Defence Agency (EDA)

EDAs mission is to improve European defence capabilities. Programme areas include Cyber Defence.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Tech Nation

Tech Nation

Tech Nation is the UK’s first national scaleup programme for the cyber security sector, aimed at ambitious tech companies ready for growth, at home and abroad.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

Viakoo

Viakoo

Viakoo is an Enterprise IoT Applications Management company providing performance, security, and compliance. Viakoo enables you to be proactive in maintaining cyber hygiene and protecting your network

CyNam

CyNam

CyNam is a platform for enabling the growth and development of people and organisations within Cheltenham’s flourishing cyber technology ecosystem.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

DerSecur

DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. We offer R&D technology solutions in the field of SAST, DAST and SCA analysis.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.

Tausight

Tausight

Tausight is an AI-Powered patient data security startup with a mission of reducing healthcare cyber incidents using a more proactive, risk management philosophy.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.