Cyber Crime Hothouses In Myanmar

Three years ago in  2021,  a man named La Awng moved from his native Kachin State in Myanmar to Laukkai, the capital of the country’s autonomous Kokang region near the border with China, where he expected to take a new job  working in a casino.

In fact, he was cruelly misled by his expected new employers and found that he had been trafficked into a cyber crime business which is run by a group of Chinese criminals.

Like thousands of other workers in Laukkai, La Awng was held captive in a high-rise building and forced to defraud people in foreign countries using a scheme known as pig butchering. Named for the way scammers “fatten up” targets before their “slaughter”, it involves striking up online romances to lure people into fake cryptocurrency investment schemes.

This online fraud  industry has significantly increased across Southeast Asia since the COVID-19 pandemic and  by the end of 2023, crime syndicates in the region were using online fraud schemes to steal from people around the world of some $64bn annually, according to a report published by the United States Institute of Peace (USIP). Myanmar, where the rule of law has collapsed since the February 2021 military coup, has emerged as a major centre for this kind of criminality

USIP has found that criminal networks originating in China are exploiting hundreds of thousands of people from more than 60 countries to run their cimila operations, typically holding them in “prisonlike conditions” and sometimes using physical abuse and torture to keep them at work.

Suppressing the criminal networks investigated by USIP will take a large-scale  response that addresses their causes, effects, power, reach, and methods in a country-by-country approach to defeat by the criminal groups ability to move across borders and dodge law enforcement. 

AlJazeera   |   AlJazeera   |    USIP   |   Deutsche Welle   |    The Record  |    The Overspill   

Image: Ideogram

You Might Also Read: 

$3 Million Romance Fraudster Arrested:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« App Security Testing: Exploring The Pros & Cons Of Different Approaches 
Russian Cyberwar Methods Are Evolving »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

AppRiver

AppRiver

AppRiver is a global provider of cloud-based email and web security solutions that protect businesses worldwide from today's ever-changing online threats.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.