How Is the FBI Tackling The Com’s Criminal Network?

I’m thrilled to sit down with Dominic Jainy, an IT professional whose deep expertise in artificial intelligence, machine learning, and blockchain gives him a unique perspective on the evolving landscape of cybercrime. Today, we’re diving into the alarming revelations from the FBI about The Com, a dangerous online criminal network also known as The Community. Our conversation explores the structure and reach of this group, the involvement of minors, the tactics used across its subgroups, and the critical steps families can take to stay safe in an increasingly connected world.

How did The Com, or The Community, come to the attention of the FBI, and what makes this online criminal network stand out in the world of cybercrime?

The Com first caught the FBI’s radar through a spike in coordinated cybercrimes and real-world incidents that shared similar patterns, like ransomware attacks and swatting, often traced back to online forums and gaming platforms. What makes this network unique is its loose, decentralized structure combined with a global reach. It’s not a single organization but a sprawling ecosystem of English-speaking individuals who collaborate across borders, often hiding behind anonymity. The FBI’s concern really ramped up when they saw how many of these participants are minors, which adds a whole new layer of complexity to tackling the issue.

Can you paint a picture of the scale of The Com in terms of its geographic spread and the number of people involved?

The scale is staggering. The Com operates worldwide, with members in multiple countries, making it a truly global problem rather than something confined to one region. While exact numbers are hard to pin down due to the network’s shadowy nature, the FBI estimates thousands of individuals are involved, ranging from casual participants to deeply embedded operatives. This wide net means they can strike anywhere, exploiting local vulnerabilities while coordinating through online platforms that transcend physical borders.

A surprising detail from the FBI’s report is the involvement of minors in The Com. What do you think draws young people into these criminal activities?

It’s heartbreaking, but not entirely surprising. Minors are often lured in by the promise of quick money, social status, or a sense of belonging that they might not find elsewhere. Many are at an age where they’re impressionable and seeking validation, and The Com exploits that through gaming platforms and social media, where peer influence is huge. Some are motivated by the thrill or the “cool” factor of hacking, while others might feel trapped once they’re in, coerced by threats or blackmail. It’s a mix of naivety and manipulation that pulls them into this dark world.

The FBI identified three main subgroups within The Com. Can you walk us through what each of these—Hacker Com, IRL Com, and Extortion Com—focuses on and how they operate?

Absolutely. Hacker Com is the tech-savvy arm, focusing on cybercrimes like ransomware, phishing, and cryptocurrency theft. They’re often behind sophisticated attacks, sometimes even running ransomware-as-a-service operations, and their impact can be financially devastating. IRL Com, which stands for In Real Life, takes things offline with violence-for-hire schemes, including kidnappings and shootings. They started in things like SIM swapping but evolved into physical intimidation, often advertising their services openly online. Then there’s Extortion Com, which preys on vulnerable individuals, especially young girls, using threats like doxing or swatting to force compliance. Each subgroup has a distinct focus, but their methods often bleed into one another, amplifying their threat.

Since these subgroups often overlap, can you share an example of how members might collaborate across Hacker Com, IRL Com, and Extortion Com to execute a single crime?

Sure, let’s imagine a coordinated extortion scheme. A Hacker Com member might start by breaching someone’s personal accounts or stealing sensitive data through phishing. They pass this info to Extortion Com, who then threatens the victim with doxing or other harm unless demands are met. If the victim resists, IRL Com could be brought in to escalate things with real-world intimidation, like swatting their home to instill fear. This kind of teamwork shows how interconnected these groups are—each plays a role, leveraging their specific skills to maximize pressure on the victim and ensure the crime pays off.

How does The Com leverage popular gaming and social media platforms to recruit members or plan their activities?

These platforms are like a hunting ground for The Com. They’re where young people spend a lot of time, often without much oversight, making them easy targets. Recruiters might infiltrate gaming communities or chat groups, posing as peers to build trust before introducing illicit opportunities. They use encrypted channels or private servers to coordinate, hiding behind the anonymity these platforms can offer. It’s insidious because these are spaces kids see as safe or fun, not realizing they’re being groomed for something much darker.

What role does monitoring children’s online activity play in protecting them from groups like The Com, and how can parents approach this without breaking trust?

Monitoring is crucial because it’s often the first line of defense against predators or recruiters who thrive on secrecy. Kids might not even realize they’re interacting with someone dangerous until it’s too late, so parents need to keep an eye on who they’re talking to and what platforms they’re active on. The key is balance—don’t make it feel like spying. Start with open conversations about online risks, maybe share stories of scams or dangers as cautionary tales. Set clear rules together, like using parental controls or keeping devices in shared spaces, and emphasize that it’s about safety, not distrust. Building that dialogue helps kids feel supported rather than policed.

Looking ahead, what is your forecast for the evolution of online criminal networks like The Com in the coming years?

I think we’re going to see these networks become even more sophisticated, leveraging emerging tech like AI to automate attacks or deepfakes for extortion. Their ability to adapt to law enforcement tactics will likely grow, with more decentralized structures that are harder to dismantle. At the same time, I expect recruitment to target even younger individuals as digital natives become a bigger demographic. On the flip side, I hope advancements in cybersecurity and public awareness can counter some of these threats, but it’s going to be a constant cat-and-mouse game. We’ll need global cooperation and smarter tech to stay ahead of groups like The Com.

Explore more

Hotels Must Rethink Recruitment to Attract Top Talent

With decades of experience guiding organizations through technological and cultural transformations, HRTech expert Ling-Yi Tsai has become a vital voice in the conversation around modern talent strategy. Specializing in the integration of analytics and technology across the entire employee lifecycle, she offers a sharp, data-driven perspective on why the hospitality industry’s traditional recruitment models are failing and what it takes

Trend Analysis: AI Disruption in Hiring

In a profound paradox of the modern era, the very artificial intelligence designed to connect and streamline our world is now systematically eroding the foundational trust of the hiring process. The advent of powerful generative AI has rendered traditional application materials, such as resumes and cover letters, into increasingly unreliable artifacts, compelling a fundamental and costly overhaul of recruitment methodologies.

Is AI Sparking a Hiring Race to the Bottom?

Submitting over 900 job applications only to face a wall of algorithmic silence has become an unsettlingly common narrative in the modern professional’s quest for employment. This staggering volume, once a sign of extreme dedication, now highlights a fundamental shift in the hiring landscape. The proliferation of Artificial Intelligence in recruitment, designed to streamline and simplify the process, has instead

Is Intel About to Reclaim the Laptop Crown?

A recently surfaced benchmark report has sent tremors through the tech industry, suggesting the long-established narrative of AMD’s mobile CPU dominance might be on the verge of a dramatic rewrite. For several product generations, the market has followed a predictable script: AMD’s Ryzen processors set the bar for performance and efficiency, while Intel worked diligently to close the gap. Now,

Trend Analysis: Hybrid Chiplet Processors

The long-reigning era of the monolithic chip, where a processor’s entire identity was etched into a single piece of silicon, is definitively drawing to a close, making way for a future built on modular, interconnected components. This fundamental shift toward hybrid chiplet technology represents more than just a new design philosophy; it is the industry’s strategic answer to the slowing