
North Korea is pocketing millions from U.S. companies and citizens through a sprawling fraud scheme that would make any honest American’s blood boil—while DC bureaucrats and Big Tech left the gates wide open for years.
At a Glance
- North Korea infiltrated 309 U.S. companies, including Fortune 500 giants, using stolen identities and fake remote workers.
- An Arizona woman, Christina Chapman, was sentenced for running a network that funneled $17 million to North Korea’s weapons program.
- The FBI and DOJ warn that North Korea’s IT worker fraud network is still raking in up to $600 million a year—funding enemy missiles.
- Corporate America and federal agencies failed to protect American jobs, money, and secrets from hostile foreign actors.
North Korea’s Billion-Dollar Scam: American Firms Fooled, Taxpayers Betrayed
For decades, Washington elites obsessed over border walls and foreign aid, but missed the enemy right under our noses—North Korea quietly scamming our companies and citizens out of millions, all while thumbing its nose at U.S. laws. The scheme came to light after Christina Chapman, an Arizona woman, was sentenced to over eight years in prison for masterminding an operation that allowed more than 3,000 North Korean IT operatives to impersonate Americans and land jobs with major U.S. firms. These weren’t small-time hacks; we’re talking about infiltrating 309 companies, including some of the largest names on the stock exchange, with a network of nearly 100 laptops and 68 stolen identities. The regime used the proceeds to fund its illegal weapons programs, all while the so-called “watchdogs” in tech and government failed to sound the alarm.
The scale of the fraud is staggering. Chapman’s operation generated at least $17 million in direct payouts to North Korea’s munitions department, and federal investigators found over $284,000 stashed in her accounts. And let’s be clear—this wasn’t some victimless cyber-prank. Real American citizens had their identities stolen, their reputations trashed, and businesses lost untold millions in intellectual property and trade secrets. All while tech sector HR departments, obsessed with “diversity hiring” and remote work, left the doors wide open for hostile foreign agents.
How Did We Get Here? The Road Paved by Remote Work and Lax Oversight
COVID-19 turbocharged the remote work revolution. Every leftist on cable news hailed it as “progress,” but it was an open invitation for fraudsters worldwide. North Korean operatives, trained by their regime and dispatched across China and Southeast Asia, used stolen or fake American identities to apply for remote IT jobs. They blended right in with legitimate applicants, thanks to shoddy background checks and the tech industry’s addiction to contract labor. Even after repeated FBI and DOJ warnings, companies failed to shore up their defenses, with some Fortune 500 HR departments more focused on pronouns than passports. The North Korean playbook included sophisticated phishing, identity theft, and even smuggling laptops between continents to evade detection. In October 2023, the DOJ seized over 90 laptops from Chapman’s Arizona home, but by then, dozens more had already been shipped to China and beyond, ready to be used in the next wave of attacks.
The consequences aren’t just financial. North Korea is now a cyber superpower, using stolen American dollars to bankroll missile programs and nuclear threats. And yet, the so-called “experts” in Washington and Silicon Valley still can’t agree on how many companies have truly been compromised or how many identities have been stolen. The only thing that’s certain? The problem is way bigger than anyone wants to admit.
National Security at Risk: Washington’s Wake-Up Call
The Department of Justice, under U.S. Attorney Jeanine Ferris Pirro, declared this infiltration a “code red” emergency. But to anyone with common sense, this sounds like a five-alarm fire that the prior administration ignored while chasing “equity” and open borders. Chapman’s sentencing is a win, but the DOJ and FBI both warn that North Korea’s IT worker networks are still active and evolving, generating up to $600 million a year. That’s money flowing straight into the pockets of a hostile regime building weapons aimed at the United States and its allies.
This is more than a cybersecurity issue—it’s a national security crisis. Every stolen identity, every hacked company, is another crack in our armor. Meanwhile, the same bureaucrats who let this happen are busy rolling out more “compliance training” and diversity seminars instead of backing real American workers and enforcing real standards. The tech sector, with its obsession over remote work and contractor convenience, put profits over patriotism—and now we’re all paying the price.
Where Do We Go from Here? Real Solutions, Not More Excuses
The Chapman case is just the tip of the iceberg. Experts at Chainalysis and Daily NK say North Korea’s tactics are getting more sophisticated by the day, exploiting every loophole our system offers. The DOJ, FBI, and cybersecurity analysts are demanding tighter verification for remote workers and stronger international cooperation, but so far, talk has been cheap. Companies need to start putting American security and jobs first—no more outsourcing, no more “move fast and break things” when it comes to hiring. It’s time for zero-tolerance on identity fraud, real background checks, and holding executives accountable when they let foreign agents in the door.
Sources:
FBI Public Service Announcement (2025-02-26)



























