Wait, am i reading this, right . I can follow social media accounts and make over 260. 00 in a day. Well, its a scam, of course, but scribes like this, a huge global business, and many scam us, even victims themselves. What topic option . This is aaron. He was taken to me, um, uh, under false pretences and for us to scam people online or via the phone, well show you ever the story at the moment. But what exactly is scanning . Essentially, things coming in a general form is, is really a way of deception, right . And its coming anything in particular phones coming or on lines coming is a modern way of social engineering attacks where basically are pointing individuals emotions or potentially weaknesses and trying to lose them and, and making some profit. Ok, scam us, pray on our trust and often offer money. One of the 1st entered those games with poorly, with an email from the so called nigeria connection. For example, i receive money in my account which i then transfer in exchange for a reward. Of course, there isnt any and effectively longer to the money, but in todays world, it scans out on the rise using a Software Like chat, c, p t scam us can now translate scam emails into any language with increasing accuracy. Just take free and tailor to each target group. One popular scam is the so called shock called a scam. A pausing is a police officer, do you mind space for a Family Member allegedly involved in the crime or accident. But the scam took a more send us a ton recently. Thanks to a i a such an option diesel. Um, i mean, cuz thats the game in warehouse. Some cases in the west when mothers received calls from the doses alleged kidnappers throughout logging down your mother would hear her daughters voice in the background saying, mom, my mom, the hosting mean . And of course, the voice was a i generation kind the goodness, someone will have her quoted the daughters voice somewhere. Thats what im used. Are you to sound like house music, car, e these a these are also, im just a snippet of a re, a conversation or voice mail is enough for the a i deep face to that say i generated videos of becoming increasingly attractive for scam us. Microsoft are released today, im a little boss. One for example, can generate animations from a single photo from say, an instagram account. Do some pushups, run up and down the stairs. Any language can be lips inc. Professionals with forensic tools may still be able to identify the face, but i meant to us on the other hand, might have difficulty spotting them, especially at 1st glance. The most important thing for scam us is not the technology but gaining the trust of the victims. We have a yeah, as a mazda image for tom is very trusting, when someone gives us just a few pieces of information in your mind, like the name of someone we know me front of the shows that information is easily accessible on social media, things like that. Who i am friends with, who i am in contact with. Anyone could go and use the names burleson. Im not so aware of that. And then well just manage cameras, work from west africa, southeast asia, or eastern europe, and often target the rich a global volume. Really, people that targeted 1st like children and seniors, but also people who are lowly tricked by so called roman scam. Us taking advantage of financially scamming has long been part of organized crime world wide in south east asia. The entire Office Complexes where hundreds of scams were side by side. But in many cases, the people in the so called scam factories, actually victims themselves having and brought the under false pretences and forced to defraud others. You end report shows the scale of this one on the form of slavery. Credible sources indicate that at least a 120000 people across me and my may be held in situations where they are forced to carry out online scans with estimates in cambodia. Similarly, as a 100000 other states in the region including allow pedia, the philippines and thailand have all side being identified as mine, countries of destination or transit, where at least tens of thousands of people have been involved, run to was forced into scamming of those against as well for months, she spoke to the w about his experiences, his nightmare beginning a trip to a Job Interview in bangkok, thailand we were suppose to go to a hotel that is like maybe 10 minutes away from the airport. But we drove in a different direction. 10 minutes turned it to several hours. Thats when we realized to be, i know going to button cold. I was so scared. 8 is hours before the arrow and then the other victims reach that destination. They cross the river more, we and end up at the notorious scam factory and known as k. K pock is here with thousands of people were taken to forced to default others in china, europe, all the was a one of the people behind the k, k pox. Scam factory is broken choose, hes believe, to be the head of a chinese triad. According to the form of forced labor, as the factory is secured by a border god unit from northern myanmar, which in turn consists of form a rebels. The, the victims are not only from the region, but like aaron also from africa. For example, k. K, pock is professionalized even to the extent that the forest workers must study manuals with precise instructions on how to build trust and exploit weaknesses. They must meet certain targets, how many people they contact, and what they earn is tightly money to secure to us checking computers. Seeing if we are doing our job or playing punishments in the factory. Audra aconia and you are denied food. If you dont have new customers by noon, and if you dont answer on time, youll beeping or forced to stand for hours, 17 hour of working days, no vacation, no break. This is what several of the victims told, dw report as those who want to leave all threatened with death or being sold to another factory. One of the methodists, k, k, park, and others can factories force their workers to employ is using crypt double scams. Convincing people to invest in non existent crypto currencies. Nora stories taskbar trying to form and you connections on line. Ready so while. Ready this guy, he says, we have this type of control currency. I want to to learn how to, to come and see what so. And, and this person was so kind. He said, im going to teach you tripped up currency such as big co, not popular as an investment. The risk is high and so the potential of profits, but crypto currencies up 40 regulated transactions difficult to trace, which also makes them highly attractive for organized crime. So i trust that this person and you know i, i let him teach me if you invest in the website, you can see your funds there. You can take out the money. This guy must maintain contact with the victims for months, does waiting them to invest more as more money. All right, so the website was legitimate. She was convinced she wasnt investing no savings. Well, instead of money flowed into a crypt, a wallet kind of digital account. And was at the hands of the process i wanted to withdraw a couple of 1000. 00, then i could then withdraw them. And this person was, was pushing me to invest more money into, into this crypto currency. Then the website went offline. The sky mountain no longer replied and the money was gone. This form of online fraud is known as peek. Butchering the fraud stuff, pattons the victim, up before taking them to the slaughter house. And your last wondering why is this person doing this to me . Laura was looking for like minded people online, but this search ended up costing her a lot of money. Scans like that can often involve 5 figures. Sams and be very traumatizing and embarrassing for the effected then finds it as oft nixtons awesome. Dont tell anyone thats so ashamed in the worst case, those people even take their own lives because they feel so much shame name, but sometimes rented home with outside defense having lost so much money as from the one home. Its an incredibly lucrative business for criminals in the us, for example, scam us the monumental 10000000000. 00 from private individuals in 2023. And thats not even including scams against companies. So how can you protect yourself . Scam us off and use false identities. Posing us bank or Postal Service employees, if you suspect the scam, it is best to stop by checking the spelling of email addresses for websites. Since the real addresses already taken scam us use slight variations to make the original. It could be just a high and whether it was non or a letter from a different alphabet job and roman scam us off and create fake profiles, the reverse image. So its going to help, for instance, with google and some of the invalid program. However, this method falls short for the face of say, call us stop. Thats to give it to you to how to act. These is all you can do is make up a code word or a question and on. So game must be all you really well. And the answer to this is yes, i have my own meal this morning for example. And not she was question with a very specific on a so often the part of the about in a guns wisdom to onboard come was scanned. Most often use professional methods to manipulate the victims. They rely on flattery, sympathy, or time pressure, tall to make money. Am i with the existing stuff . If you have drawings in the slightest suspicion of then you should end the conversation or chat as quickly as possible. Act order. As listening, you should not reply to the email man, but also someone else not get involved in a conversation. And i know that is the best counter measure. We have the best to get him off and on. But the, the, what about the people who are forced to work and scan factories . Foreign investigators, few powerless mazda legal system is often corrupt arrow and a few others will lucky aid work is on the tie side of the border menace to free them. Why they were being transported to a novice scan factory via thailand, but transfers like this really happen. And not every rescue goes to plan. Scam us off with one step ahead of investigate as also because all 4 of these drago to co operate across National Borders and the days as our growing and on the rise as a i office cameras, new avenues for exportation. So we must continue to keep a close eye on them. Thanks for watching and next time and stay vigilant. The of the he has hopes he could make it to europe. Buses didnt warehouse. Now, hobby is back in his home country of gambia, in west africa, trying to set up a business with us of an International Aid organization. But this capital one to know, sloan is this plan also destined to fail home again. Next on d, w, artistic freedom and freedom of expression came to an end in 1933 or later what followed was on precedent persecution. How could it come to the end . And what 2 young people to think about this barbaric destruction of culture in a 60 minute on d w. We got some hot tips for your package. The romantic code is spots affinities. Check on some great cultural memorials to boot dw travel regarding the