He was a perfect hire — until a U.S. company exposed him as a likely North Korean operative
Analysis Summary
This article persuades you that North Korea's cyber schemes are a growing threat to the U.S. by heavily relying on claims from FBI officials and experts. It paints a picture of a clear 'us-versus-them' situation, focusing on the danger without fully exploring why North Korea uses these tactics or how past U.S. actions might play a role.
Cross-Outlet PSYOP Detected
This article is part of a narrative being pushed across multiple outlets:
FATE Analysis
Four dimensions of psychological manipulation: how content captures Focus, exploits Authority, triggers Tribal identity, and engineers Emotion.
Focus signals
"FBI officials say laptop farms are a crucial way North Korean IT teams trick U.S. companies into believing their remote workers are in the U.S. — providing both a physical address to mail laptops to and a U.S. internet connection."
This opens with a relatively novel, specific, and detailed method of deception, immediately drawing a reader's attention to a new or less-known threat.
"In one instance, an American citizen, Kejia “Tony” Wang, traveled to China in 2023 to meet with co-conspirators and IT workers in Shenyang and Dandong, according to court documents."
The inclusion of a specific, named individual and details of their actions provides a concrete, narrative anchor that makes the abstract threat more tangible and attention-grabbing.
"What he saw was a hacking operator engaged in IT work, including placing other IT workers in jobs. The income from those jobs supported the hacking unit’s primary malware operations to commit computer intrusions against U.S., South Korean and Chinese government or technology victims.“It started off as revenue generation, but the lines are getting blurrier and blurrier. If the time comes, they’ve got chess pieces inside organizations all over the world — and they’ll start acting from the inside,” he said."
This presents a 'never before seen' or at least novel and evolving threat where IT outsourcing is directly linked to state-sponsored hacking, creating a sense of a new, more insidious danger.
Authority signals
"FBI officials say laptop farms are a crucial way North Korean IT teams trick U.S. companies into believing their remote workers are in the U.S."
Leverages the institutional weight of the FBI to lend credibility and urgency to the claims from the outset.
"“We believe there are many more hundreds of people out there who are participating in these schemes,” said Rozhavsky, the FBI assistant director."
Quotes an FBI assistant director, a high-ranking official, whose position implies privileged information and expertise, thus strengthening the scope of the perceived threat.
"“Every bad guy you can think of is using Chinese money launderers. Now, this is how money moves internationally,” said Nick Carlsen, senior investigator on the global investigations team at the blockchain analytics company TRM Labs and a former intelligence analyst at the FBI focused on North Korea."
Uses an expert with dual credentials (industry expert and former FBI intelligence analyst) to validate and generalize a claim about a broad criminal trend.
"Cybersecurity analysts say U.S. enforcement tools are struggling to keep pace with the scale and sophistication of Pyongyang’s cyberoperations."
Appeals to unnamed 'cybersecurity analysts' to support a critical assessment of U.S. capabilities, lending an aura of consensus among experts.
"The U.S. government has ramped up efforts to do that. On Thursday, the Treasury Department sanctioned six individuals and two entities for their roles in DPRK government-orchestrated IT worker schemes..."
Refers to actions taken by the Treasury Department, leveraging institutional actions as evidence of the problem's severity and the government's response.
"“Unless you have external information, you might not know they’re North Korean,” said Michael Barnhart, who leads nation-state threat intelligence at DTEX."
Cites a leader in nation-state threat intelligence, whose expertise validates the increasing stealth and complexity of the operation, making it seem harder for ordinary entities to detect.
"Barnhart helped investigate the hack alongside the FBI, and it was that case that made clear to him the ways in which North Korea’s malicious hacking teams sometimes cooperate with IT teams to support their missions, something that was not widely known at the time."
This highlights collaboration with the FBI, bolstering the credibility of Barnhart's insights through association with a major law enforcement agency.
Tribe signals
"FBI officials say laptop farms are a crucial way North Korean IT teams trick U.S. companies into believing their remote workers are in the U.S."
Establishes a clear 'us vs. them' dynamic between North Korean entities and U.S. companies, framing the issue as an adversarial conflict.
"“Every bad guy you can think of is using Chinese money launderers. Now, this is how money moves internationally,” said Nick Carlsen, senior investigator on the global investigations team at the blockchain analytics company TRM Labs and a former intelligence analyst at the FBI focused on North Korea."
The term 'every bad guy' creates a generalized 'them' that is unified by shared illicit behavior, positioning 'us' (the reader, the U.S.) against a global network of adversaries, further amplified by later specific mentions of North Korea and China.
"Since Kim Jong Un took power in 2011, North Korea has honed and expanded a portfolio of cybercrime operations beyond IT work — pulling in billions through cryptocurrency thefts including a record $1.5 billion heist last year, according to the FBI. Analysts say these operations have made Kim wealthier and more geopolitically relevant than ever before, validating his long-held view of cyberoperations as an “all-purpose sword.”"
This clearly delineates North Korea, personified by Kim Jong Un, as an adversary whose actions in cybercrime directly lead to their increased wealth and 'geopolitical relevance', framing their success as a threat to 'us'.
"In 2021, as part of a wave of attacks on NASA and military bases, a North Korean hacking team infected a Kansas hospital’s computer systems with ransomware, crippling servers and demanding roughly $100,000 in bitcoin to restore their function."
By explicitly stating 'attacks on NASA and military bases' and then a 'Kansas hospital', it directly positions North Korean perpetrators against U.S. institutions and citizens, fostering an us-vs-them narrative of threat and victimhood.
Emotion signals
"FBI officials say laptop farms are a crucial way North Korean IT teams trick U.S. companies into believing their remote workers are in the U.S."
Instills a sense of unease and potential vulnerability by implying that U.S. companies are easily tricked and unknowingly harbor foreign adversaries.
"“We believe there are many more hundreds of people out there who are participating in these schemes,” said Rozhavsky, the FBI assistant director. “They could never pull this off if they didn’t have willing facilitators in the U.S. helping them.”"
Creates fear of an unseen, widespread threat and deepens apprehension by suggesting complicity by 'willing facilitators in the U.S.', implying an internal threat.
"“It’s a whack-a-mole game. It’s virtually impossible to fully disrupt this,” Carlsen said. “It’s just a never-ending process.”"
This evokes a sense of helplessness and ongoing, unresolvable threat, engineering a feeling of urgency to find new solutions or face permanent vulnerability.
"That expansion also means concerns that North Korean workers could cause real-world harm by jeopardizing lives, something Barnhart has seen up close.In 2021, as part of a wave of attacks on NASA and military bases, a North Korean hacking team infected a Kansas hospital’s computer systems with ransomware, crippling servers and demanding roughly $100,000 in bitcoin to restore their function. The hospital paid."
Directly links cyber activities to 'real-world harm' and 'jeopardizing lives' through the vivid example of a hospital ransomware attack, designed to evoke fear for personal safety and critical services.
"“Even if a company gets rid of them, we don’t know what backdoors they could have left for access in the future,” he said. “So it’s definitely a ticking time bomb that could have negative consequences down the line.”"
The phrase 'ticking time bomb' is a strong emotional trigger for fear and anxiety, suggesting an imminent and potentially catastrophic, unavoidable danger.
Narrative Analysis (PCP)
How the article reshapes thinking: Perception (what beliefs are targeted), Context (what information is shifted or omitted), and Permission (what behavior is being encouraged).
The article aims to instill a belief that North Korea's cyber operations, facilitated by U.S. and Chinese networks, pose a significant and evolving threat to U.S. national security and economic interests, and that these operations are becoming increasingly sophisticated and hard to detect/disrupt. It also seeks to highlight connections between these IT schemes and broader cybercrime, and the potential for these workers to become internal threats ('ticking time bomb').
The article shifts the context from isolated cybercrime incidents to a coordinated, state-sponsored 'all-purpose sword' operation with global reach, implying a more sinister, strategic threat beyond mere financial gain. The involvement of 'Chinese financial networks' shifts the context to a broader, interconnected geopolitical challenge that implicates multiple state and non-state actors.
The article largely omits the broader geopolitical context of U.S.-North Korea relations, including any historical factors or other policy decisions that might contribute to North Korea's reliance on illicit revenue generation. It also does not delve into the socio-economic conditions within North Korea that might drive individuals to participate in such schemes, or the effectiveness of past sanctions, which could offer alternative perspectives on the efficacy or ethics of current responses.
The article nudges the reader toward accepting more aggressive counter-cyber measures, increased government surveillance cooperation with private industry, and supporting stricter sanctions against North Korea and its facilitators. It fosters a sense of urgency and concern regarding the pervasive and growing nature of this threat, implicitly granting permission for more robust, perhaps even novel, interventions by U.S. authorities.
SMRP Pattern
Four manipulation maintenance tactics: Socializing the idea as normal, Minimizing concerns, Rationalizing with logic, and Projecting blame.
"North Korea, for its part, has denied any wrongdoing. North Korean leader Kim Jong Un participates in a photo session with soldiers in North Pyongan province on Feb. 1.Korean Central News Agency via Getty ImageLast year, following the Department of Justice’s indictment of several North Koreans for their alleged roles in the scheme, the country’s foreign minister condemned U.S. actions as “an absurd smear campaign” targeting the “non-existent ‘cyber threat’ from the DPRK,” the Korean Central News Agency reported.In response to questions about Chinese nationals’ involvement in the scheme, Chinese Embassy spokesperson Liu Pengyu said, “We oppose false allegations and smears which have no factual ground at all.”"
Red Flags
High-severity indicators: silencing dissent, coordinated messaging, or weaponizing identity to shut down debate.
""We believe there are many more hundreds of people out there who are participating in these schemes,” said Rozhavsky, the FBI assistant director. “They could never pull this off if they didn’t have willing facilitators in the U.S. helping them." and "Even if a company gets rid of them, we don’t know what backdoors they could have left for access in the future,” he said. “So it’s definitely a ticking time bomb that could have negative consequences down the line.""
Techniques Found(3)
Specific propaganda techniques identified using the SemEval-2023 academic taxonomy of 23 techniques across 6 categories.
"North Korean IT teams are now subcontracting work to developers in Pakistan, Nigeria and India, expanding into fields like customer service, financial processing, insurance and translation services — roles far less scrutinized than software development.“Unless you have external information, you might not know they’re North Korean,” said Michael Barnhart, who leads nation-state threat intelligence at DTEX. “They’re trying to move themselves into middle management, and it’s working.”That expansion also means concerns that North Korean workers could cause real-world harm by jeopardizing lives, something Barnhart has seen up close.In 2021, as part of a wave of attacks on NASA and military bases, a North Korean hacking team infected a Kansas hospital’s computer systems with ransomware, crippling servers and demanding roughly $100,000 in bitcoin to restore their function. The hospital paid."
This segment highlights an example of potential physical harm caused by North Korean activities, specifically the ransomware attack on a hospital, followed by a statement that 'concerns that North Korean workers could cause real-world harm by jeopardizing lives'. This plays on the audience's fear of physical and health threats to create alarm about the presence of North Korean IT workers in various industries.
"So it’s definitely a ticking time bomb that could have negative consequences down the line.”"
The phrase 'ticking time bomb' is an exaggeration used to heighten a sense of impending danger and urgency regarding the potential for North Korean IT workers to leave backdoors in company systems, making it seem like an immediate and catastrophic threat rather than a potential, long-term risk.
"Most of these intermediaries operate across southern China and Southeast Asia including Myanmar, Hong Kong, Macao and China’s Fujian province — rapidly moving cryptocurrency across blockchains using so-called “mixers” that break stolen funds into smaller pieces to obscure their origin."
The term 'stolen funds' is loaded language used to describe the source of the cryptocurrency. While the article generally details illicit activities, framing all funds processed by 'mixers' as 'stolen' without specific evidence for every instance pre-frames the financial activities in a negative light.