Cyber Crime Hothouses In Myanmar

Three years ago in  2021,  a man named La Awng moved from his native Kachin State in Myanmar to Laukkai, the capital of the country’s autonomous Kokang region near the border with China, where he expected to take a new job  working in a casino.

In fact, he was cruelly misled by his expected new employers and found that he had been trafficked into a cyber crime business which is run by a group of Chinese criminals.

Like thousands of other workers in Laukkai, La Awng was held captive in a high-rise building and forced to defraud people in foreign countries using a scheme known as pig butchering. Named for the way scammers “fatten up” targets before their “slaughter”, it involves striking up online romances to lure people into fake cryptocurrency investment schemes.

This online fraud  industry has significantly increased across Southeast Asia since the COVID-19 pandemic and  by the end of 2023, crime syndicates in the region were using online fraud schemes to steal from people around the world of some $64bn annually, according to a report published by the United States Institute of Peace (USIP). Myanmar, where the rule of law has collapsed since the February 2021 military coup, has emerged as a major centre for this kind of criminality

USIP has found that criminal networks originating in China are exploiting hundreds of thousands of people from more than 60 countries to run their cimila operations, typically holding them in “prisonlike conditions” and sometimes using physical abuse and torture to keep them at work.

Suppressing the criminal networks investigated by USIP will take a large-scale  response that addresses their causes, effects, power, reach, and methods in a country-by-country approach to defeat by the criminal groups ability to move across borders and dodge law enforcement. 

AlJazeera   |   AlJazeera   |    USIP   |   Deutsche Welle   |    The Record  |    The Overspill   

Image: Ideogram

You Might Also Read: 

$3 Million Romance Fraudster Arrested:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« App Security Testing: Exploring The Pros & Cons Of Different Approaches 
Russian Cyberwar Methods Are Evolving »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

TitanHQ

TitanHQ

TitanHQ offers ultimate protection from internet based threats and powerful Web filtering functionalities to SMBs, Service Providers and Education sectors around the World.

National Cyber Security Centre (NCSC) - Ireland

National Cyber Security Centre (NCSC) - Ireland

The National Cyber Security Centre (NCSC) is the operational side of the Department of Communications in regard to network and information security in the Republic of Ireland.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.