Scam networks across Southeast Asia have reportedly siphoned billions in stolen funds from victims worldwide, prompting United States law enforcement to act decisively against these operations. Authorities have issued warrants to seize Starlink satellite internet terminals, believed to be providing critical connectivity to cybercriminals. Two warrants and their respective affidavits, reviewed by WIRED, reveal how these devices are allegedly facilitating scam operations in Myanmar.
One warrant, signed by US magistrate judge G. Michael Harvey, allows for the seizure of nine Starlink terminals along with two accounts connected to scam operations located in Payathonzu, a town near the Myanmar-Thai border. The accompanying affidavit, authored by FBI agents, states that the Starlink devices are integral to a scheme involving money laundering and wire fraud targeting American citizens. It explicitly requests that the terminal’s parent company, SpaceX, disable their service to these devices. Furthermore, it notes the presence of at least 26 Starlink dishes atop buildings within the area known for scam activities.
The second warrant does not target Starlink directly but aims to shut down websites associated with scamming practices. This document claims that “at least” 79 Starlink terminals are evident at the infamous Tai Chang compound in Myanmar, which is operating under the control of the Democratic Karen Benevolent Army—a group that was recently sanctioned by the US government. This warrant was signed by US magistrate judge Matthew J. Sharbaugh.
Importantly, both legal documents refer to a WIRED investigation that highlighted the usage of Starlink for internet access within the scam compounds in Myanmar. Starlink, developed by Elon Musk’s SpaceX, delivers high-speed satellite internet services across over 150 nations.
This initiative forms part of a broader program introduced by the US government known as the District of Columbia Scam Center Strike Force. Announced by the Justice Department, FBI, and Secret Service, this task force aims to dismantle cryptocurrency scams specifically targeting American citizens. These fraudulent operations often arise from a concerted ecosystem of scams that have developed throughout multiple Southeast Asian countries and are frequently linked to organized crime syndicates based in China. The Strike Force has already reported the seizure of approximately $400 million in cryptocurrency associated with these scams.
Jeanine Pirro, the US attorney for the District of Columbia, emphasized the government’s resolve during a press conference, stating that the Department of Justice is committed to combating organized crime that exploits American citizens and undermines their investments. She noted that steps are being taken to seize websites used by these Southeast Asian scam operations and that warrants are actively being pursued to target satellite terminals and accounts utilized by the criminals for internet access.
In analyzing the tactics employed by these cybercriminals, one might consider the MITRE ATT&CK framework. Techniques such as initial access, where intruders gain a foothold in victims’ systems, and persistence, where they maintain their presence within the network, are likely at play. Additionally, privilege escalation may occur as scammers navigate the systems for greater access to resources.
The ramifications of such developments extend beyond immediate legal and financial concerns; they also evoke pressing questions about the cybersecurity landscape, particularly for business owners. Understanding the interconnectedness of these scams with larger criminal networks is critical in safeguarding against future vulnerabilities and threats.