That era is over.
What has replaced it is something far more unsettling: a fully globalised, modular, professionalised criminal economy—one that looks, behaves, and scales like a multinational corporation, except without regulation, borders, or moral restraint. Cybercrime today is not a shadow industry. It is an economic superpower in waiting.
At its current growth rate, cybercrime already costs the global economy more than fifteen trillion dollars a year. By twenty twenty-six, that figure is projected to exceed twenty trillion dollars—placing it just behind the United States and China as one of the largest “economies” on Earth. The uncomfortable truth is that crime has become more efficient than governance.
The most dangerous innovation in modern crime is not artificial intelligence, deepfakes, or crypto. It is business simplification.
Cybercrime has been productised.
Today, you do not need to be intelligent, technical, or particularly motivated to become a fraudster. You can simply subscribe. Scam kits, phishing templates, SMS blasters, IMSI catchers, deepfake software, laundering services, and even customer support are available à la carte. The barrier to entry has collapsed.
This is “crime as a service”—a criminal supply chain where developers build tools, recruiters source labour, managers optimise operations, and low-level operators execute scripts. Just like a startup. Just without consequences.
Scam operations now resemble multinational enterprises. They have research and development. They test products. They recruit globally. They run human resources. They offer training. They track performance metrics. Some even offer technical support to criminals who struggle to use their tools.
This is not chaos. It is optimisation.
At the centre of this transformation sits a sprawling, decentralised, yet deeply interconnected ecosystem of Chinese organised crime. Not confined to one country, not limited to one activity, and no longer dependent on traditional triad structures, these networks have evolved into something more flexible and far harder to dismantle.
They operate scam compounds in Cambodia, Laos, Myanmar, and increasingly Africa. They deploy infrastructure in Europe. They launder money through offshore jurisdictions. They source equipment from Asia. They recruit talent globally. And when pressure mounts in one location, they move.
The question “Where is the crime?” no longer has a meaningful answer.
Victims might be in the United States. Servers might be in Taiwan or Nebraska. Operators might be in Nigeria. Developers might be in China. Equipment might be shipped via third countries. Jurisdiction fragments. Accountability dissolves.
Law enforcement, designed for geography, is chasing networks designed for nowhere.
One of the most alarming developments is the collapse of the line between cybercrime and espionage. The tools are now identical. The only difference is intent—and sometimes not even that.
IMSI catchers, once the domain of intelligence agencies, are now openly marketed online. Portable fake cell towers can be carried in backpacks, driven through cities, and used to intercept messages, steal data, or blast fraudulent texts to thousands of phones at once.
Criminals use spy tools. Spies outsource to criminals. Intelligence-trained operatives increasingly moonlight—or are recruited—by criminal syndicates. Techniques developed for national security are repurposed for profit.
When surveillance technology becomes rentable, sovereignty becomes theoretical.
The popular image of cybercriminals as lone geniuses or cynical opportunists misses a darker reality. Hundreds of thousands of people working inside scam compounds are victims themselves—trafficked, deceived, and coerced into committing fraud under threat of violence.
Estimates suggest between two hundred thousand and five hundred thousand individuals are trapped in forced criminality across Southeast Asia alone. Many were lured with promises of legitimate work. Once inside, passports confiscated, exits closed, escape punished.
Crime, here, eats its own workforce.
At the other end of the chain are victims whose lives are dismantled quietly: drained bank accounts, stolen identities, ruined retirements, lost homes. Romance scams powered by deepfake video calls do not just steal money; they weaponise loneliness.
The cruelty is industrialised.
Perhaps the most damning aspect of this ecosystem is how easily it integrates with respectable jurisdictions. Offshore hubs, regulatory gaps, investment incentives, and weak due diligence have allowed alleged criminal enterprises to operate in parallel with legitimate businesses.
Licences are purchased. Offices are opened. Jobs are promised. Capital flows in. Only later do questions emerge—often after money has moved, networks have entrenched, and accountability has evaporated.
This is not just a law enforcement failure. It is a governance failure.
When criminal enterprises can buy legitimacy faster than regulators can investigate, the system is not being exploited—it is being used exactly as designed.
Artificial intelligence has not invented fraud. It has industrialised it.
Deepfake tools remove the last human friction. AI coding assistants allow low-skilled operators to create convincing phishing infrastructure in hours. Automated systems scale outreach to millions. Personalisation increases success rates. Detection lags behind generation.
Crime no longer needs to succeed often. It only needs to succeed occasionally—at massive scale.
Sending millions of messages is cheap. One success pays for everything.
Governments are waking up, but late. Arrests happen. Raids occur. Assets are seized. Sanctions are announced. Yet the system regenerates faster than it can be dismantled.
The fundamental problem is asymmetry. Criminals innovate by default. States regulate by process. Criminals move instantly. Jurisdictions move slowly.
You cannot prosecute your way out of an ecosystem designed to be disposable.
Which leads to an uncomfortable conclusion: this is not just a policing problem. It is a societal one.
If cybercrime has taught us anything, it is that institutional protection is no longer sufficient. The attack surface now includes everyone, everywhere, all the time.
The uncomfortable truth is this: if users do not become harder targets, the system will continue to reward criminals.
Better detection. Better digital literacy. Better scepticism. Fewer reflex clicks. Fewer moments of trust handed to machines designed to deceive.
This is not victim-blaming. It is survival.
Because the modern criminal economy does not need to beat the system.
It only needs the system to keep behaving as if this is still a marginal problem.
It is not.
It is already one of the largest economies on Earth—just one that doesn’t pay taxes, follow laws, or ask permission.
And it is only getting started.