Inside Myanmar's Scam Factories: How Criminal Networks Industrialized Global Fraud
Corporate records and internal documents recovered from a seized office complex in war-torn Myanmar have revealed the systematic methods behind a multibillion-dollar global fraud operation. The materials, obtained after rebel forces captured Shunda Park earlier this year, expose how Chinese-run criminal networks have industrialized online deception, employing more than 3,500 fraudsters who targeted victims worldwide through carefully orchestrated romance and investment scams.
The trove of evidence—including detailed manuals, chat transcripts, and fake persona profiles—provides an unprecedented look into how modern fraud factories operate with the precision of legitimate corporations, complete with training programs, performance metrics, and sophisticated technology to deceive victims across continents.
Background and Context
Shunda Park emerged in Myanmar's conflict zones as part of a broader trend of scam complexes that have proliferated amid the country's political instability. According to investigative reporting by The New York Times, these operations have flourished in areas where central government control has weakened, often under the protection of local armed groups. The facilities function as production lines for fraud, with workers sometimes trafficked into the operations and forced to participate in schemes targeting victims primarily in Asia, North America, and Latin America.
Key Figures and Entities
The notebooks and manuals found at Shunda Park reveal elaborate fictional personas created to build trust with potential victims. One detailed profile describes "Chen Minchen," a supposedly wealthy Chinese businessman with manufactured details including his blood type (B), zodiac sign (Leo), ownership of a Mercedes-Benz, and a $1.2 million Hong Kong apartment. Another operation used the persona of "Vivian," a young Asian woman who simultaneously courted multiple American men—a truck driver from Kansas, a retired deputy sheriff in New Mexico, a large-animal veterinarian, and an electrical engineer—before introducing investment opportunities.
Victims identified by single names for privacy reasons include "David," a Mexican property broker, and "Oscar," an Ecuadorian computer technician, both of whom were contacted through Facebook by women promoting investments in a platform called Renaissance Technologies AI Supercomputing Hedge Capital Ltd. (RTAI). The platform claimed to operate from The Times Center in New York and featured supposed executives with finance degrees from Harvard—though verification efforts found no such company, no Harvard finance graduates among its leadership, and no presence at the claimed address.
Legal and Financial Mechanisms
The operation's methods follow a calculated timeline detailed in recovered manuals. For targets in Taiwan, for instance, days one to three focus on gathering basic information, days three to five involve "making up stories about childhood to appear relatable," and by days five to seven, romance elements are introduced, particularly during evening hours when women are deemed more receptive. The scripts instruct scammers to emphasize admiration for "internal beauty" while demanding respect for their "professional judgment" before introducing investment schemes.
Once victims are hooked, the fraud escalates through fake investment platforms like RTAI, which maintains a sophisticated web presence with apps and professional-looking websites. Victims receive initial returns to build confidence before being pressured to invest more. One recovered notebook chillingly concludes: "Induce the customer to add more money, until all her savings and loans are completely wiped out." The materials even include scripts for dealing with suspicious bank tellers, instructing victims to claim large withdrawals are for wedding expenses.
International Implications and Policy Response
The Shunda Park operation highlights the challenges of policing transnational digital fraud that operates across multiple jurisdictions and leverages political instability in host countries. The sophisticated nature of these enterprises—complete with corporate-style structures and technological capabilities—underscores growing gaps in international regulatory frameworks and law enforcement cooperation. While some countries have begun targeting the infrastructure supporting these operations, including cryptocurrency platforms and money laundering networks, the rapid evolution of tactics continues to challenge traditional enforcement models.
The case also reveals how legitimate business infrastructure—domain registrations, social media platforms, and financial systems—can be exploited by criminal networks. Even as The Times began contacting RTAI for comment, the operation simply migrated its activities to Telegram, where subscriber numbers continued growing, demonstrating the resilience of these enterprises when confronted with exposure.
Sources
This report draws on investigative reporting by The New York Times, internal documents recovered from Shunda Park, and interviews with victims conducted between 2023 and 2024. Additional verification efforts included corporate registry searches and domain registration analysis.