This post was originally published on this site.
US Attorney Jeanine Pirro Files Massive Charges Against Chinese Slave-Labor Scam Lords Operations in Burma and Cambodia
This post was originally published on this site.
U.S. Attorney Jeanine Pirro just announced a massive takedown of Chinese-run slave labor scam compounds in Burma and Cambodia, operations that trafficked, beat, and enslaved thousands of victims to steal billions from hard-working Americans.
According to the Department of Justice, these weren’t just scams, they were industrial-scale criminal enterprises built on human trafficking, torture, and deception.
Federal investigators say the Chinese-run compound in Burma functioned like a modern-day prison camp.
Victims, many lured with promises of high-paying jobs, had their passports confiscated and were forced under threat of violence to run online scams targeting Americans.
Inside these compounds:
- Workers were allegedly beaten, threatened, and held at gunpoint
- Forced to impersonate U.S. banks and even the NYPD
- Ordered to scam Americans, often elderly, out of their life savings
Authorities described the operation as one of the fastest-growing and most devastating forms of cybercrime, costing Americans billions.
The DOJ’s newly launched Scam Center Strike Force is already delivering results:
- $700 million in cryptocurrency seized tied to fraud operations
- 503 scam websites shut down
- A Telegram channel dismantled that was used to lure victims into forced labor camps
Federal agents also recovered thousands of devices used in the schemes, exposing the sheer scale of the operation.
HOLY CRAP! US Attorney Jeanine Pirro just charged Chinese bosses who ran a SCAM COMPOUND out of BURMA
“Thousands were trafficked, enslaved and forced to steal from Americans.”
“We’ve also seized a Telegram channel which lured workers into a compound in Cambodia and ordered… pic.twitter.com/4qYsdxrryE
— Eric Daugherty (@EricLDaugh) April 23, 2026
According to the DOJ:
Background: Cyber-Enabled and Cryptocurrency Investment Fraud in Southeast Asian Scam Centers
Cyber-enabled and cryptocurrency investment fraud (referred to by the scammers as “pig butchering”) is among the fastest growing and most financially devastating forms of cybercrime targeting Americans. In these schemes, victims are cultivated over time and deceived into depositing funds into fraudulent investment platforms that appear to show substantial returns. In reality, all victim funds flow directly to the scammers. The scam continues until the victim runs out of money or discovers the fraud, at which point the scammers cease contact.
According to the FBI’s Internet Crime Complaint Center (IC3), investment scams became the most commonly reported crime type in 2023, with cryptocurrency investment fraud comprising 83 percent of that category. Reported losses from these scams rose from $3.96 billion in 2023 to $5.8 billion in 2024. Reported losses rose 24 percent in 2025 to over $7.2 billion, according to IC3’s newly released 2025 annual report. Those figures, based largely on victim reports, are believed to significantly underrepresent actual losses, as most victims do not report to law enforcement. According to the United States Institute of Peace, a conservative estimate of the annual value of funds stolen by scam syndicates worldwide approached $64 billion as of the end of 2023.
Many of these schemes are run out of industrial-scale compounds along the Burma-Thailand border and in Cambodia. Criminal syndicates often lure workers to Thailand with promises of high-paying technical jobs, then seize their identification documents and traffic them to work in scam compounds. Within the compounds, trafficked workers are frequently forced to conduct fraud operations against victims in the United States and elsewhere under threat of violence. Public reporting on these compounds has documented beatings, electrocutions, and murder.
Criminal Charges: Shunda Compound, Min Let Pan, Burma
The Strike Force unsealed criminal complaints and arrest warrants against two Chinese nationals in connection with cryptocurrency investment fraud operations at the Shunda compound in Min Let Pan, Burma: two managers in the compound, Huang Xingshan, also known as “Ah Zhe,” and “Huang Xing Saan” and Jiang Wen Jie, also known as “Jiang Nan.” They are charged with wire fraud conspiracy.
Aerial surveillance photo of the Shunda compound in Burma, where forced-labor conducted fraud operations under threat of violence.
The Shunda compound operated from at least January 2025 until approximately November 2025, when it was seized by the Karen National Liberation Army of Burma. The compound used scam websites and mobile applications disguised as legitimate investment platforms to defraud victims, including Americans. Workers within the compound were trafficked individuals who were held against their will and forced to defraud victims under the threat of violence and torture.
The FBI deployed personnel to Thailand following the compound’s seizure. Working with Thai authorities, FBI agents reviewed thousands of mobile devices and over 1,300 desktop computers recovered from Shunda. Agents also interviewed tens of former compound workers. That investigation identified a hierarchical organization of Chinese operators running the compound and supported the charges against the two defendants.
Phones seized from the Shunda compound.
According to the investigation, Huang served at Shunda as a high-level manager and enforcer and personally participated in the physical punishment of trafficked compound workers. Jiang served as a team leader directly supervising workers who specifically targeted American victims. Under Jiang’s supervision, one of the people under his command successfully defrauded a single American victim of over $3 million utilizing a fraudulent investment platform. The theft was celebrated within the organization as a paradigm of success.
The interior of one of the buildings in the Shunda compound in Burma.
After the Shunda compound was seized, Huang and Jiang relocated to another scam compound located in Cambodia where they attempted to continue their cryptocurrency investment fraud operation. In early 2026, Huang and Jiang decided to return to Burma, traveling through Thailand.
Huang and Jiang were arrested on immigration charges by Thai law enforcement in early 2026 in Thailand. The case is being investigated by FBI’s New York Field Office with substantial assistance from the FBI Legal Attaché in Bangkok and Thai authorities.
Telegram Channel Seizure
The Strike Force conducted a first-of-its-kind seizure of a Telegram channel with more than 6,000 followers that was used to recruit individuals to travel to Cambodia under false promises of high-paying employment. Once there, recruited workers were held against their will and forced to defraud victims, including Americans, as part of a sophisticated law enforcement impersonation scheme.
The Telegram channel included postings for jobs in Cambodia that were specifically for workers who spoke with “American” accents, would work a night shift (i.e., during U.S. daytime hours), and some specifically sought attractive female candidates. The Telegram channel was connected to a scam compound in rural Cambodia near the Thai border.
The Telegram channel that was used to recruit individuals to work in Cambodia.
A job post on the Telegram channel.
Once at the scam compound, the scam workers specifically targeted U.S. persons. In the fraud scheme, victims received cold calls from individuals posing as bank representatives, including impersonators of JPMorgan or other U.S. bank customer service agents, warning them that their bank accounts had been used to purchase firearms from an actual U.S. gun store website. Victims were then transferred to individuals posing as “NYPD detectives” or other supposed law enforcement, and later sent to the “New York Supreme Court” or other purported prosecutorial officials. Through sustained pressure conducted over WhatsApp and Microsoft Teams, victims were induced to disclose their bank account information and ultimately transfer their savings to the scammers.
Individuals posed as bank representatives, worked from a script, and told their intended victims that their bank accounts had been used to purchase firearms from a gun store website.
The Telegram seizure case is being handled by FBI’s Miami Field Office, USSS Headquarters, and investigators at the U.S. Attorney’s Office for the District of Columbia. As part of the Strike Forces’s efforts at public-private collaboration on the scam center threat, after being alerted by law enforcement, JPMorgan Chase, Microsoft, and Meta voluntarily took internal investigative measures to combat the fraud operating on their systems and occurring under their names.
503 Web Domain Seizures
The Strike Force announced the seizure of more than 503 .com web domains identified through the Operation Level Up initiative as having been used to defraud U.S. victims. The seized domains all were disguised as legitimate “investment platforms,” which victims reported to law enforcement were causing them to unknowingly deposit cryptocurrency funds and view supposed “returns” on what they believed were legitimate investments.
Operation Level Up, established in January 2024, by FBI and USSS is an ongoing proactive initiative to identify and notify victims of cryptocurrency investment fraud. As of March 2026: (i) Operation Level Up has notified 8,935 victims of cryptocurrency investment fraud; (ii) 77% of those victims were unaware they were being scammed; (iii) the estimated savings to victims is $562,726,245 of monies they otherwise would have sent to their scammers; and (iv) ninety-three victims have been referred to an FBI victim specialist for suicide intervention due to the devastating nature of these scams. Some victims have reported to law enforcement that—prior to being notified by the FBI about the scam—they were in the process of liquidating their 401K, selling their home, or obtaining a sizable loan. One elderly victim was surviving on disability pay; he had already paid the scammers $1,200 and would have cut into money he needed for food to pay more. Each of the 503 .com domains seized was identified by a victim contacted by Operation Level Up and involved in laundering that victim’s cryptocurrency funds.
Visitors to these domains are now informed on a splash page that it has been seized by law enforcement. The investigation was conducted by the Operation Level Up Initiative, with the FBI’s Detroit and Phoenix Field Offices handling the seizure with support from investigators at the U.S. Attorney’s Office for the District of Columbia and the U.S. Marshals Service.
Examples of the seized domains that were disguised as legitimate investment platforms, causing victims to unknowingly deposit funds.
Restraint of Cryptocurrency Involved in Money Laundering from Scams
The Scam Center Strike Force continues its work to identify, seize, and forfeit funds involved in money laundering related to scams, so that funds can be returned to victims whenever possible. Under leadership from the FBI and the USSS, more than $701,962,392.15 million in cryptocurrency has been identified as allegedly involved in laundering of funds stolen from victims of cryptocurrency investment fraud and restrained through voluntary actions of cryptocurrency providers, as well as U.S. legal process. The Strike Force is working tirelessly to forfeit funds with its goal of returning funds to victims, and it continues to support victims who have lost homes and life savings to these schemes. FBI San Francisco, San Diego, Washington, Seattle, Phoenix, Nashville, and Honolulu Field Offices, and the USSS Headquarters, San Francisco, Nashville, and Washington Field Offices investigated these matters and conducted associated seizures.
State Department Rewards and Actions Related to Tai Chang
Consistent with the Strike Force’s whole of government approach, in a coordinated action, the Department of State today announced a reward of up to $10 million for information leading to the seizure or recovery of proceeds from fraud and money laundering schemes associated with the Tai Chang scam centers in Burma’s Karen State.
The Strike Force also announced the seizure of the latest domain used by the Tai Chang scam centers, fortuneprimeglobalirts.com. The domain was a new iteration of the centers’ fraudulent investment platform and was launched after the Strike Force seized its predecessor domain, tickmilleas.com. The latest seized domain was designed and functioned similarly to its predecessor scam investment website. Visitors to the domain are now informed on a splash page that it has been seized by law enforcement, and victims are encouraged to submit complaints to the FBI. The Tai Chang scam centers were subject of web domain seizures by the Strike Force and designations by the Department of Treasury’s Office of Foreign Assets Control (OFAC) announced in November 2025.
FBI’s San Diego Field Office is investigating the case in conjuction with the FBI Law Enforcement Attaché in Bangkok. Tips should be sent to them at TaiChangTIPS@fbi.gov.
Treasury Department Sanctions
Also in a coordinated action, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) today announced new sanctions against individuals and entities perpetrating cryptocurrency investment fraud schemes against Americans using forced labor and violence in Cambodia. The sanctions target Cambodian Senator Kok An, Cambodian businessman Rithy Raksmei, several associates, and their respective business empires, including holding companies for scam center operations.
The post US Attorney Jeanine Pirro Files Massive Charges Against Chinese Slave-Labor Scam Lords Operations in Burma and Cambodia appeared first on The Gateway Pundit.
editor's pick
latest video
news via inbox
Nulla turp dis cursus. Integer liberos euismod pretium faucibua
Leave A Comment
You must be logged in to post a comment.


HOLY CRAP! US Attorney Jeanine Pirro just charged Chinese bosses who ran a SCAM COMPOUND out of BURMA







