Arizona Woman Accused of Conspiring with North Korean Operatives in Remote Work Scheme
ICARO Media Group
In an alarming case, federal prosecutors have charged an Arizona woman, Christina Chapman, with conspiring with individuals connected to the North Korean government to illegally secure remote telework positions with American companies. Charging documents reveal that Chapman collaborated with North Korean IT workers Jiho Han, Chunji Jin, Haoran Xu, and others to steal the identities of more than 60 U.S. citizens. Their goal was to obtain employment at American corporations using these false identities, ultimately generating nearly $7 million for the North Korean government from over 300 U.S. companies.
According to the prosecutors, several Fortune 500 corporations, including a major TV network, a defense company, and a car maker, were among the targeted companies. To further their scheme, Chapman and her co-conspirators utilized laptop computers issued to them under false pretenses, making it appear as if they were physically present within the U.S. The government alleges that Chapman operated a "laptop farm" to assist in securing positions at U.S. government agencies, but this endeavor proved unsuccessful.
Chapman is also accused of enabling the overseas workers to remotely connect to their U.S.-based jobs using the provided laptops and receiving their paychecks at her home. These illicit funds were then allegedly laundered with the help of the North Korean operatives. Chapman's arrest in Phoenix on Thursday marks a significant development in the case.
Nicole M. Argentieri, the head of the Justice Department's Criminal Division, emphasized the gravity of these charges, stating, "The charges in this case should be a wakeup call for American companies and government agencies that employ remote IT workers." She further emphasized that these crimes not only provided a revenue stream for the North Korean government but also resulted in the theft of proprietary information by the co-conspirators.
Federal investigators have uncovered that the IT group had been working on this remote-work scheme since at least 2020, aiming to pass false identifying information to government agencies. The indictment reveals that in March 2020, an individual unknown to Chapman contacted her on LinkedIn, requesting her assistance as the "U.S. face" of their company. It was discovered that workers based in North Korea stored relevant resumes between August 2022 and November of the following year, utilizing an online background check system to target specific American citizens and steal their identities.
The complex nature of the scheme required the foreign workers to create fictitious personas and online profiles that matched the job requirements. Further, they submitted fake documents to the Homeland Security Department during the employment eligibility check process.
Conversations between Chapman and her co-conspirators, as revealed in messages, shed light on their efforts to transfer the funds earned through these fraudulent jobs. The charges against Chapman were announced concurrently with a criminal complaint lodged against a Ukrainian individual accused of engaging in a similar scheme, aiding North Korean individuals in marketing themselves as remote IT workers.
This case serves as a stark reminder to American companies and government agencies of the dangers associated with employing remote IT workers. It underscores the importance of thorough vetting procedures, cybersecurity measures, and diligent oversight to protect against such fraudulent activities that not only benefit hostile governments but also compromise sensitive proprietary information.
The investigation into this remote work scheme and its implications continues, raising concerns about the broader scope of such operations and their potential impact on national security and corporate integrity.