SpaceX disables more than 2,000 Starlink devices used in Myanmar scam compounds

SpaceX says it has disabled more than 2,000 Starlink devices connected to scam compounds in Myanmar after politicians and others called on the company to crack down on scammers using its kits for fast satellite internet. 

Lauren Dreyer, the vice-president of Starlink’s business operations, said in a post on X Tuesday night that the company “proactively identified and disabled over 2,500 Starlink Kits in the vicinity of suspected ‘scam centers’” in Myanmar. She cited the takedowns as an example of how the company takes action when it identifies a violation of its policies, “including working with law enforcement agencies around the world.” 

It was unclear when the devices were taken offline. SpaceX did not immediately respond to questions. 

Advocates fighting against human trafficking have accused the company for months of facilitating scamming operations by failing to crack down on Starlink’s use for cybercrime. A Wired review of cellphone connection data earlier this year found the technology was being used in at least eight compounds near the Thai border. In February, the Thai government cut off electricity and internet access to a handful of compounds across the border in an attempt to restrict criminals’ access to the tools needed to conduct scams. 

Starlink reportedly filled the void, however, leading a Thai politician to tweet at Elon Musk asking him to address the matter. 

In July, Senator Maggie Hassan (D-N.H.) also called on Musk and SpaceX to crack down on their illicit use. 

“SpaceX has a responsibility to acknowledge any role that Starlink has played in facilitating scams emanating from Southeast Asia, and to block these criminals from using the service to target Americans,” she wrote.

Dreyer’s post publicizing the Starlink takedowns followed an announcement on Monday by the Myanmar government that it had shut down a large scamming operation on the border with Thailand and had seized dozens of Starlink devices. Authorities detained more than 2,000 people in the raid on KK Park, a notorious cybercrime complex on the edge of Myawaddy. 

Myanmar has recently experienced a handful of high-profile raids at scam compounds which have garnered headlines and resulted in the arrest, and in some cases release, of thousands of workers. A crackdown earlier this year at another center near Mandalay resulted in the rescue of 7,000 people. Nonetheless, construction is booming within the compounds around Mandalay, even after raids, Agence France-Presse reported last week. 

Following a China-led crackdown on scam hubs in the Kokang region in 2023, a Chinese court in September sentenced 11 members of the Ming crime family to death for running operations. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

James Reddick

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.

 

Total
0
Shares
Previous Post

Cyber incidents in Texas, Tennessee and Indiana impacting critical government services

Next Post

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Related Posts

⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

This week showed just how fast things can go wrong when no one’s watching. Some attacks were silent and sneaky. Others used tools we trust every day — like AI, VPNs, or app stores — to cause damage without setting off alarms. It’s not just about hacking anymore. Criminals are building systems to make money, spy, or spread malware like it’s a business. And in some cases, they’re using the same
Read More

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024.  Government sector malicious activity spiked from 2% to 12.9%, while 1 in 7 Education sites show active compromise. Specific offenders: Google Tag Manager (8% of violations), Shopify (5%), Facebook Pixel (4%). Download the
Read More