top of page

Beyond the Scam Call: Human Trafficking, Fear, and Forced Labor

Cybercrime Whistleblower – A Wake-Up Call Shared by Huntress

dark call center
Dark call center

I recently watched a 45-minute presentation created by Huntress, and it completely shifted how I think about the global scamming epidemic.

Like many of you, I was familiar with the "scambaiter" side of this world — the YouTubers who waste scammers' time or shut down their operations. Content like Mark Rober's "Glitter Bombs: Pranks Destroy Scam Callers" is entertaining and feels like justice being served. But this presentation revealed a far more complicated and deeply troubling reality beneath the surface.


The People Behind the Scams Aren't Who You Think


What I didn't know — and what stopped me in my tracks — is that many of the people carrying out these scams are themselves victims.


According to Andy Greenberg, journalist and author of Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency, there are over 100,000 human-trafficked individuals working inside these scam centers. They are controlled through violence, threats of bodily harm, and fear-based tactics. This is modern slavery operating behind the front of a legitimate business.


Mohammad Muzahir, a whistleblower and survivor who helped expose one of these compounds, shared his own story. He was recruited as an IT manager with a promised salary of $1,700/month — a role that seemed entirely legitimate at the time. He was never paid. Every day, management found new ways to withhold wages while forcing workers to meet daily quotas.


How the Scam Actually Works — The "Trust" Product


The product these operations sell to their victims isn't crypto or investment returns. It's manufactured trust.


Workers were given detailed playbooks and daily quotas. Their job was to become part of a victim's daily life — slow, real-time messages, good morning texts, selfies, personal notes. As Mohammad described it: "Familiarity creates trust."


Once a victim began sharing their dreams, financial struggles, or future plans, introducing money into the conversation became much easier. Workers were required to report personal details about their victims to supervisors daily — what they ate, what car they drove, what time they did yoga — to build increasingly convincing personas of wealthy, attractive, real people.


The goal was to create an experience so rich in detail that the victim would think: "There's no way this is a scam — there are just too many details."

Then came the ask: help them invest in crypto, a system that would supposedly lift them out of financial hardship.


What Tipped Victims Off


Interestingly, the scams began to unravel when victims asked simple questions — like "Why are we moving from one platform to another?" Inconsistencies in the story broke the illusion.


The hard truth: once money moves across borders, especially through crypto, it is extremely difficult to recover.


The Bigger Problem — No One Is Firmly in Control


Jen Easterly, former Director of the U.S. Cybersecurity and Infrastructure Security Agency, made it clear that neither Interpol nor U.S. government agencies have had a firm grip on these operations. The scale and sophistication has outpaced the response.


How People Are Recruited — The MICE Framework


These operations use a well-known manipulation framework to pull people in on both sides:

M — Money — Ideology C — Coercion E — Ego

What Can We Actually Do?


  • Make money laundering harder — this is where the infrastructure breaks

  • Build human awareness — the targets are people experiencing hope, financial strain, loneliness, or ambition. Recognizing those vulnerabilities in yourself and others is a first line of defense

  • Break the silence — these operations thrive in the dark


Watch the Full Presentation


This is essential viewing — especially if cybersecurity, human trafficking, or financial crime intersects with your world in any way.


Speakers:

  • Mohammad Muzahir — Whistleblower and survivor

  • Andy Greenberg — Journalist and author, Tracers in the Dark

  • Jen Easterly — Former Director, U.S. CISA

  • Kyle Hanslovan — CEO & Co-founder, Huntress; former NSA operative


At Ironjaw, we believe awareness is the first layer of protection.

Understanding the full picture of cybercrime — including who's behind it and how it operates — is where real protection starts.

Comments


bottom of page