Skip to main content

tv   Shift  Deutsche Welle  May 4, 2024 2:15pm-2:30pm CEST

2:15 pm
that's all for now. up next, thousands of cyber slaves in south east asia who are forced to scan people online. that's on shift. thanks for watching the conflicts of crises. every single connection mapped out shows the geophysical reality. the on the board is what makes things to the way they are mapped out. navigating a changing world now on youtube has caused about why does that mean? because like i'm lisa and the new host to join us for an exciting inspiration. and everything in between
2:16 pm
the most is a video and audio production by d w. i hope the video will tune in the wait, am i reading this? right? i can follow social media accounts and make over $260.00 in a day. well, it's a scam of course, but scans like this, a huge global business, and many scam us, even victims themselves. what topic on ship? this is aaron. he was taken to me um uh, under false pretences and forced to scam people online or via the phone. we'll show you ever the story in a moment, but what exactly is scamming? essentially things coming in a general form is, is really a way of deception right on this coming. anything in particular phones coming or on lines coming is
2:17 pm
a modern way of social engineering attacks where basically are exploiting individuals emotions or potentially weaknesses and trying to lose them and making some profit. ok, scam us, pray on our trust and often offer money. one of the 1st into those games were poorly with an email from the so called nigeria connection. for example, i receive money in my account which i then transfer in exchange for a reward. of course that isn't any and effectively longer to the money. but in today's world, it scans out on the rise using a software like chat, c, p t scam us can now translate, scam emails into any language with increasing accuracy, mistake free and tailored to each target group. one popular scam is the so called shock, called a scam, a pausing as a police officer, the mon space for a family member, allegedly involved in the crime of accident. but the scam took the most sinister
2:18 pm
turn recently. thanks to a i a such an option diesel um, i mean, cuz of the game in warehouse some cases in the west when mothers received calls from the doses alleged kidnappers throughout the year, a mother would hear her daughter's voice in the background saying, mom, my mom the hosting me and those quotes, the voice was a i generation caught you in the someone will have her quoted the daughter's voice somewhere else and used a all you to sound like how smooth color e. d 's a it, these are also, i'm just a snippet of a re, a conversation or voice mail is enough for the a i the takes too. that's a i generated videos of becoming an increasingly attractive posts cameras. microsoft are released a i model boss. one for example, can generate animations from a single photo from say, an instagram account. do some pushups,
2:19 pm
run up and down the stairs. any language can be lips inc. professionals with forensic tools may still be able to identify the face, but i meant to us on the other hand, might have difficulty spotting them, especially at 1st glance. the most important thing for scam us is not the technology, but gaining the trust of the victims via they are. yeah, as a mazda image for tom is very trusting, when someone gives us just a few pieces of information you mind, like the name of someone we know masonry, spoke that information is easily accessible on social media. things like that, who i am friends with, who i am in contact with. anyone could go and use the names, were often not so aware of that. and then we'll just manage cameras, work from west africa, south east asia or eastern europe and often target the richard global volume. really, people that targeted 1st like children and seniors,
2:20 pm
but also people who are lowly tricked by so called roman scam. us taking advantage of financially scamming has long been part of organized crime world wide in south east asia. the entire office complexes where hundreds of scams were side by side. but in many cases, the people in the so called scam factories, actually victims themselves, having been brought there under false pretences and forced to defraud of us are you and report shows the scale of this more than the form of slavery. a credible sources indicate that at least a 120000 people across me and my may be held in situations where they are forced to carry out online scans with estimates in cambodia. similarly, as a 100000 other states in the region including allow pedia, the philippines and thailand have all side being identified as mine,
2:21 pm
countries of destination or transit, where at least tens of thousands of people have been involved, run to was forced into scamming of those against as well for months, she spoke to the w about his experiences, his nightmare. begin on a trip to a job interview in bangkok, thailand. we were supposed to go to a hotel that is like maybe 10 minutes away from the airport. but we drove in a different direction. 10 minutes turned it to several hours. that's when we realized to be, i know going to button cold. i was so scared. 8 is hours before arrow and then the other victims reach that destination. they across the river more we and end up at the notorious game factory known as k, k park. it is here with thousands of people will take into
2:22 pm
force to default others in china, europe, all the was a one of the people behind the k, k pox. scam factory is broken, choose peas, believe to be the head of a chinese triad, according to the form of forced labor. as the factory is secured by a board, a god unit from northern myanmar, which in turn consists of form a rebels. the victims are not only from the region but like arrow and also from africa. for example, a k. k pock is professionalized even to the extent that the forest workers must study manuals with precise instructions on how to build trust and exploit weaknesses. they must meet certain targets, how many people they contact, and what they earn is tightly money to secure to us checking computers. seeing if we have d nodule, or plain punishments in the factory, audra aconia,
2:23 pm
and you are denied food. if you don't have new customers by noon, and if you don't answer on time, you'll beeping or forced to stand for hours, 17 hour working days, no vacation, no break. this is what several of the victims told, dw report as those who want to leave all threatened with death or being sold to another factory. one of the methods k, k, park and others can factories force the workers to employ is using crypt double scams. convincing people to invest in non existent crypto currencies. nora stories taskbar trying to form new connections online. ready after a while, this guy, he says, we have this type of crypto currency. i want to to learn how to currency work. so and, and this person was so kind he said, i'm going to teach you, tripped up currency such as bid cannot populate as an investment. the risk is high and so other potential profits but crypto currencies up 40 regulated transactions,
2:24 pm
difficult to trace which also makes them highly attractive for organized crime. so i trust that this person and you know, i, i let him teach me if you invest in the website, you can see a funds there. you can take out the money. this guy must maintain contact with the victims for months, does waiting them to invest more as more money and over i thought the website was legitimate. she was convinced she was investing no savings. well, instead somebody flowed in to a crypt, a wallet, a kind of digital account and was at the hands of the fraud says i wanted to withdraw a couple of $1000.00 and i clicked on withdraw them. and this person was, was pushing me to invest more money into, into this crypto currency. then the website went offline,
2:25 pm
the sky mountain no longer replied and the money was gone. this form of online fraud is known as peek. butchering the frost of patents, the victim up before taking them to the slaughter house. and you are left wondering why is this person doing this to me? laura was looking for like minded people online, but this search ended up costing her a lot of money scans like that can often involve 5 vega sams. it'd be very traumatizing and embarrassing for the effected then finds it as of victims. awesome . don't tell anyone that's so ashamed in the worst case, those people even take their own lives because they feel so much shame name but sometimes rented. honeywell divide, defends, having lost so much money that's from the one home. it's an incredibly lucrative business for criminals in the us, for example, scam us the monumental $10000000000.00 from private individuals in 2023. and that's
2:26 pm
not even including scams against companies. so how can you protect yourself? scam us off and use false identities. posing us bank or postal service employees, if you suspect the scam, it is best to stop by checking the spelling of email addresses for websites. since the real addresses already taken skim, su slight variations to make the original. it could be just the highest and whether it was non or a letter from a different alphabet sob and roman scam us off and create fake profile, the reverse image. so that's going to help, for instance, with google. and so the invalid program. however, this method falls short for the face of say, call us stop. that's to give it to you to how to act. these is all you can do is make up a code word or a question and also a game. be all you really well the answer to this is yes, i have my own meal this morning for example. and not she was question with
2:27 pm
a very specific on a so often the part of the about in a guns wisdom to unfold come was most often use professional methods to manipulate the victims. they rely on flattery, sympathy, or time pressure, tall to make money. somebody would be choosing to, if you have drawings in the lightest suspicion of then you should end the conversation or chat as quickly as possible. at the order of listening. you should not reply to the email man, but also someone else not get involved in a conversation. and i know that is the best counter measure we have the best to get most number do the what about the people who are forced to work and scan factories? foreign investigators feel powerless. mazda legal system is often corrupt arrow and a few others will lucky aid work is on the tie side of the border menace to free them. why they were being transported to a novice scan factory via thailand. but transfers like this really happen and not
2:28 pm
every rescue goes to plan. scam us off with one step ahead of investigate as also because all 4 of these drago to co operate across national borders and the days as our growing and on the rise. as a i office cameras, new avenues for exportation, so we must continue to keep a close eye on them. thanks for watching and next time and stay vigilant. the of the kind of always in signature style
2:29 pm
of the sized run see with tonight i got saying always where it's 09. next on d w d big automobile companies play a role in the destruction of the rain forest the the, the full actually costs. awesome comes from illegal capital funds in the amazon. yes, the automobile industry doesn't care about the supply chains. profit old that much to illegal leather. in 45 minutes on the w. what secret lie behind these discovered new adventures and 360 degrees. and explore fascinating.
2:30 pm
both heritage side dw, world heritage, 360. now the body of work we see how british paints or at least the more uses her physique as a paint brush. a fairy tale destination in austria. why bod issue is worth a visit this year. and a cold dog for dessert, we find out how the german 3 counter avoidance is made and it's not in the oven fall this in more coming up on your own mac. the .