top of page

How Amazon Web Services (AWS) could stop CRYPTO CRIME by Fake Crypto Trading Platforms QUICKLY.

As I consider the last 10 years of my experience reviewing #crypto #crime enterprise architecture, I note that vast numbers of the #websites that pop up like whack-a-mole to dupe investment consumers out of their life savings were built on #AWSservices. This is well known.


ree

I have long argued from my time as a senior FinTech executive (who wrote END USER LICENSING AGREEMENTS), that a CUSTOMER DISPUTE RESOLUTION PROCESS would be sufficient to stop crime in its tracks.


This involves the simple idea that if an #AWS infrastructure customer (business) is reported to be committing an active crime by a consumer (customer of the business), the AWS account is expedited into a dispute resolution process while the complaint is formally investigated and evidence gathered from the cyber abuse complaint to determine if there is gross misconduct and grounds for freezing the account and handing the complaint to law enforcement if quickly unresolved. Take it seriously.


ree

In the case of a #criminalcomplaint being made, an offending AWS services commercial customer could be sent an immediate notice about the complaint and asked to respond within 48-hours or have the services paused on the offending #domain as per terms.


If not resolved within 72-hours, all services on all domains could be paused.

If no resolution occurs due to lack of communication, then put the account on hold and hand it over to #lawenforcement. Including PII of the account holder and KYC financial information.

ree

If this is included in the #EULA as a process for #disputeresolution, then you are explaining that #privacy is being breached only when a complaint is made and the dispute resolution process is activated.

In turn, the end user licensing agreement dispute resolution process would state that identity information will move from the dispute's resolution team to law enforcement after 5-business days of failure of the AWS customer to respond immediately to the cyber abuse or criminal complaint.
ree

Instead, what we have now is an archaic 1980's speed of #criminals being allowed safe harbour inside infrastructure. Therefore, able to perpetrate groundhog day, whack-a-mole pop up fake trading platforms all day long for years. Its a real pity that citizens can't sue infrastructure companies for the crimes their customers commit. A wake up call needed?


But it's not just AWS.


Cloudflare are very popular with criminal architecture.


The worst offender is Shanghai Meicheng Technology Information Development Co., Ltd. in China. The worst of the worst fake crypto trading platforms commonly besieged westerners using this architecture and infrastructure. Government intervention at the top level could have challenged the Chinese government to stop this company from allowing criminal financial terrorism against Americans. The American authorities missed the boat on this entirely and this architecture funnelled billions of U.S. consumer life savings. Resulting in suicides and killing Americans. THIS WAS (in my opinion and the opinion of victims) FINANCIAL TERRORISM against U.S. Citizens. Please explain to me the neglect?


ree

In the past this entity has been hauled over the coals by international internet regulatory bodies. As an ethical hacker I have (lawfully and responsibly) hacked into the publicly available source code of hundreds of #faketradingplatforms between 2015 and 2025. I have seen first hand how the chain of cyber forensic evidence tracks back to domain architecture in #China. I have also spoken to law enforcement frustrated by a failure of Iaas, PaaS and SaaS platforms to respond to notices, requests and subpoenas. In my experience a lot of people who work at a high level me be qualified, but they are also totally incompetent from a technological and infrastructure perspective. I had an debate with a head of cyber security who rubbished my claims that Flipper Zero's and ESP32 Marauder cards were being used for cyber crime in the UK. One week after I was ridiculed a local UK newspaper reported these devices were used in a burgulary.

ree

The mind boggles at how no one in #government has cottoned onto the idea that you can legislate to require #internet architecture to have a #cybercomplaints #cyberabuse and dispute process that STOPS CRIMINAL ENTERPRISE.


Why hasn't this happened?

Depsite all the noise that people make about #crimeprevention, they may metaphorically drive the #cybercrime prevention vehicle, but ask them how the engine works and they would be stranded on the side of the road. If you are not from #technology it is dificult to understand what actually needs to be done. Please learn. QUALIFICATIONS are a dime a dozen but if you don't genuinely understand technology you will miss important contexts about how technology is being deployed by criminals. Which is a pathway to learning how we then collaborate and unite to stop cyber crime at source. COMING in 2026... We are in a live battle with a new generation of agile, decentralised, enterprise criminals who are fundamentally AUTODIDACTIC (self taught) POLYMATHS (multi expertise) with interdiscipinary and multidisciplinary skills. This new breed of decentralised criminals are now developing IoT devices that make discovery much more difficult. Moving to off grid technologies like LoRa wireless networks on Meshtastic grids and repeater infrastructure that replaces traditional cellular and WiFi networks. I predicted Smishing and Cell Tower Emulation years ago. I also discovered inventors who could detect cell tower emulators, smishing and ESP32 frequencies. Meaning that law enforcement could add scanners to police vehicles NOW, network them and then form a detection grid to autolocate devices by frequency to prevent crime in action. Anyway, I have asked Santa to drop a note to Law Enforcement.

 
 

Powered by

SOCIAL

ARKHAM LOGO.png

DEANONYMIZING THE BLOCKCHAIN

OPEN SOURCE INTEL

AI SUPER-INTELLIGENCE

  • YouTube
  • LinkedIn
  • X
bottom of page