On April 23, 2026, three arms of the United States government moved against Southeast Asian scam infrastructure in what represented the most coordinated single-day action of its kind in history.
The Department of Justice’s Scam Center Strike Force filed criminal charges. The Treasury Department’s Office of Foreign Assets Control sanctioned a sitting Cambodian senator and 28 entities in his network. The State Department issued a $10 million reward. The FBI simultaneously seized a Telegram channel that had been recruiting human trafficking victims.
The actions were designed to target not just individual perpetrators but the entire architecture that sustains industrial-scale fraud: the compounds where workers are held, the financial networks that move stolen funds, the digital infrastructure that reaches victims, and the political corruption that provides protection.
The Criminal Charges: Two Chinese Nationals, One Myanmar Torture Compound
The DOJ charged Jiang Wen Jie (also known as Jiang Nan) and Huang Xingshan (also known as Ah Zhe) with federal wire fraud and money laundering charges in the Southern District of California.
Both men are alleged to have managed the Shunda scam compound in Min Let Pan, Myanmar — a facility that operated under conditions that prosecutors described as forced labor with torture. Workers recruited with false promises of legitimate employment were held against their will, forced to run cryptocurrency investment fraud operations targeting Americans, and subjected to violence if they failed to meet performance quotas.
The indictment alleges that Shunda processed hundreds of millions of dollars in fraudulent transfers from American victims. Prosecutors allege the defendants were also attempting to establish a new compound in Cambodia when the charges were filed.
The charges represent a significant escalation in the DOJ’s approach to compound operators. Previous enforcement actions primarily targeted the financial infrastructure around these operations — the money mule networks, the cryptocurrency exchanges, the laundering intermediaries. Charging the managers of specific compounds directly sends a signal about where the Strike Force’s prosecutorial strategy is heading.
The OFAC Action: Cambodian Senator Kok An
Simultaneously, the Treasury Department designated Kok An — a sitting Cambodian senator and one of the country’s most prominent businessmen — under the Global Magnitsky Act and counter-narcotics sanctions authorities.
The designation also targeted 28 individuals and entities linked to Kok An’s network, including companies that operated as fronts for scam compound infrastructure.
According to OFAC, Kok An’s flagship company Crown Resorts controls casinos, hotels, and properties in Poipet, Sihanoukville, Bavet, and other Cambodian cities that have been converted into scam compound facilities. His political position has allegedly provided a layer of protection for criminal organizations operating within his properties.
The pig butchering operations within Kok An’s network specifically targeted Americans through romance and investment fraud schemes — building false emotional or professional relationships before steering victims toward fake cryptocurrency platforms that vanished with their savings.
The designation means US persons are prohibited from transacting with Kok An or his designated entities, and any assets he holds in US jurisdiction are frozen. It also exposes any foreign financial institution that continues to process transactions for him to secondary sanctions risk.
Sanctioning a sitting senator of a foreign country is diplomatically significant. It signals that the US government is willing to escalate beyond criminal charges against operational-level actors to sanctions targeting the political protection layer that enables large compound networks to operate.
The State Department Reward: Tai Chang, Burma
While the DOJ and Treasury actions targeted Cambodia and Myanmar, the State Department focused specifically on the Tai Chang compound network in Burma’s Karen State.
Under the Transnational Organized Crime Rewards Program, the State Department announced a reward of up to $10 million for information leading to the seizure or financial disruption of money laundering operations tied to the Tai Chang facilities.
Tai Chang operates at least two major compound facilities — Tai Chang 1.0 (also known as Kyuakhat Casino or Ko Sai) — in territory controlled by ethnic armed organizations in Karen State. The compounds have generated hundreds of millions of dollars from cryptocurrency investment fraud targeting American victims.
The FBI supports the reward program and established a dedicated tip line: [email protected]. The $10 million figure places Tai Chang in the same reward tier as designated foreign terrorist organizations and major narcotics networks — reflecting the economic and human damage the operation inflicts.
The Telegram Seizure: The Recruitment Pipeline
One of the most tactically novel actions in the April 23 operation was the seizure of a Telegram channel with more than 6,000 followers that was used to recruit workers to scam compounds in Cambodia.
The channel advertised high-paying employment opportunities in Southeast Asia for workers with language skills and sales experience. Recruiters within the channel made contact with interested applicants, provided convincing details about compensation and working conditions, and arranged travel. Workers who accepted the offers frequently arrived to find themselves in compound facilities where their passports were confiscated and they were forced to work as fraud operators.
The seizure of a Telegram channel as evidence and disruption action is a legal first. The Stop Enabling Sex Traffickers Act (SESTA) and related authorities have been used to take down online trafficking recruitment infrastructure before, but the application to a cryptocurrency fraud compound recruitment channel represents an extension of that framework into financial crime.
The 6,000-follower channel represents one pipeline. Law enforcement acknowledges that dozens of similar channels operate on Telegram and other platforms, continuously recruiting workers who do not know the true nature of the employment they are accepting.
The 503 Domain Seizures
The Strike Force and FBI’s seizure of 503 fraudulent cryptocurrency investment websites represents the single largest domain takedown in the history of pig butchering enforcement.
Each of the 503 domains hosted fake investment platforms — credible-looking interfaces that showed victims’ balances growing and generating returns, but which were entirely fabricated and controlled by the criminal network. When victims attempted to withdraw funds, they were told they owed taxes, fees, or compliance deposits — each a final extraction before the platform disappeared.
The domain infrastructure used across these 503 sites connects to at least three criminal “companies” named in DOJ filings: Ko Thet Company, Sanduo Group, and Giant Company — each a branded fraud operation running multiple simultaneous platforms and victim relationships.
Seizing 503 domains disrupts ongoing fraud against current victims and destroys the brand value of those specific platforms. It does not stop operators from standing up new domains — which typically takes days — but it raises operational costs and signals that domain seizures will be a consistent enforcement tool.
Context: The Scale of the Problem
The April 23 actions are significant, but the DOJ’s own filings provide the context that frames them: the FBI’s Internet Crime Complaint Center reports that Americans lost an estimated $7.2 billion in 2025 to Southeast Asia-based cryptocurrency investment fraud schemes alone.
The 503 domain seizures, the charges against two compound managers, and the sanctions on one senator represent genuine progress — and genuine costs to criminal networks. But they are a fraction of an industry that generates billions annually and operates across dozens of countries with deep connections to local political and financial systems.
The Strike Force’s stated mission is to target the lifecycle of these operations comprehensively: the compounds, the financial networks, the digital infrastructure, and the protection arrangements. The April 23 coordinated action is the most complete execution of that strategy to date.
Victims of cryptocurrency investment fraud in the United States can file complaints at ic3.gov. The $10 million reward for Tai Chang information can be reported to [email protected]. Both channels feed into the investigation infrastructure that produced the April 23 actions.



