He was a perfect hire — until a U.S. company exposed him as a likely North Korean operative

nbcnews.com·By Lisa Cavazuti
View original article
0out of 100
Noticeable — persuasion techniques worth noting

This article persuades you that North Korea's cyber schemes are a growing threat to the U.S. by heavily relying on claims from FBI officials and experts. It paints a picture of a clear 'us-versus-them' situation, focusing on the danger without fully exploring why North Korea uses these tactics or how past U.S. actions might play a role.

FATE Analysis

Four dimensions of psychological manipulation: how content captures Focus, exploits Authority, triggers Tribal identity, and engineers Emotion.

Focus4/10Authority7/10Tribe6/10Emotion6/10
FFocus
0/10
AAuthority
0/10
TTribe
0/10
EEmotion
0/10

Focus signals

novelty spike
"FBI officials say laptop farms are a crucial way North Korean IT teams trick U.S. companies into believing their remote workers are in the U.S. — providing both a physical address to mail laptops to and a U.S. internet connection."

This opens with a relatively novel, specific, and detailed method of deception, immediately drawing a reader's attention to a new or less-known threat.

attention capture
"In one instance, an American citizen, Kejia “Tony” Wang, traveled to China in 2023 to meet with co-conspirators and IT workers in Shenyang and Dandong, according to court documents."

The inclusion of a specific, named individual and details of their actions provides a concrete, narrative anchor that makes the abstract threat more tangible and attention-grabbing.

novelty spike
"What he saw was a hacking operator engaged in IT work, including placing other IT workers in jobs. The income from those jobs supported the hacking unit’s primary malware operations to commit computer intrusions against U.S., South Korean and Chinese government or technology victims.“It started off as revenue generation, but the lines are getting blurrier and blurrier. If the time comes, they’ve got chess pieces inside organizations all over the world — and they’ll start acting from the inside,” he said."

This presents a 'never before seen' or at least novel and evolving threat where IT outsourcing is directly linked to state-sponsored hacking, creating a sense of a new, more insidious danger.

Authority signals

institutional authority
"FBI officials say laptop farms are a crucial way North Korean IT teams trick U.S. companies into believing their remote workers are in the U.S."

Leverages the institutional weight of the FBI to lend credibility and urgency to the claims from the outset.

expert appeal
"“We believe there are many more hundreds of people out there who are participating in these schemes,” said Rozhavsky, the FBI assistant director."

Quotes an FBI assistant director, a high-ranking official, whose position implies privileged information and expertise, thus strengthening the scope of the perceived threat.

expert appeal
"“Every bad guy you can think of is using Chinese money launderers. Now, this is how money moves internationally,” said Nick Carlsen, senior investigator on the global investigations team at the blockchain analytics company TRM Labs and a former intelligence analyst at the FBI focused on North Korea."

Uses an expert with dual credentials (industry expert and former FBI intelligence analyst) to validate and generalize a claim about a broad criminal trend.

expert appeal
"Cybersecurity analysts say U.S. enforcement tools are struggling to keep pace with the scale and sophistication of Pyongyang’s cyberoperations."

Appeals to unnamed 'cybersecurity analysts' to support a critical assessment of U.S. capabilities, lending an aura of consensus among experts.

institutional authority
"The U.S. government has ramped up efforts to do that. On Thursday, the Treasury Department sanctioned six individuals and two entities for their roles in DPRK government-orchestrated IT worker schemes..."

Refers to actions taken by the Treasury Department, leveraging institutional actions as evidence of the problem's severity and the government's response.

expert appeal
"“Unless you have external information, you might not know they’re North Korean,” said Michael Barnhart, who leads nation-state threat intelligence at DTEX."

Cites a leader in nation-state threat intelligence, whose expertise validates the increasing stealth and complexity of the operation, making it seem harder for ordinary entities to detect.

institutional authority
"Barnhart helped investigate the hack alongside the FBI, and it was that case that made clear to him the ways in which North Korea’s malicious hacking teams sometimes cooperate with IT teams to support their missions, something that was not widely known at the time."

This highlights collaboration with the FBI, bolstering the credibility of Barnhart's insights through association with a major law enforcement agency.

Tribe signals

us vs them
"FBI officials say laptop farms are a crucial way North Korean IT teams trick U.S. companies into believing their remote workers are in the U.S."

Establishes a clear 'us vs. them' dynamic between North Korean entities and U.S. companies, framing the issue as an adversarial conflict.

us vs them
"“Every bad guy you can think of is using Chinese money launderers. Now, this is how money moves internationally,” said Nick Carlsen, senior investigator on the global investigations team at the blockchain analytics company TRM Labs and a former intelligence analyst at the FBI focused on North Korea."

The term 'every bad guy' creates a generalized 'them' that is unified by shared illicit behavior, positioning 'us' (the reader, the U.S.) against a global network of adversaries, further amplified by later specific mentions of North Korea and China.

us vs them
"Since Kim Jong Un took power in 2011, North Korea has honed and expanded a portfolio of cybercrime operations beyond IT work — pulling in billions through cryptocurrency thefts including a record $1.5 billion heist last year, according to the FBI. Analysts say these operations have made Kim wealthier and more geopolitically relevant than ever before, validating his long-held view of cyberoperations as an “all-purpose sword.”"

This clearly delineates North Korea, personified by Kim Jong Un, as an adversary whose actions in cybercrime directly lead to their increased wealth and 'geopolitical relevance', framing their success as a threat to 'us'.

us vs them
"In 2021, as part of a wave of attacks on NASA and military bases, a North Korean hacking team infected a Kansas hospital’s computer systems with ransomware, crippling servers and demanding roughly $100,000 in bitcoin to restore their function."

By explicitly stating 'attacks on NASA and military bases' and then a 'Kansas hospital', it directly positions North Korean perpetrators against U.S. institutions and citizens, fostering an us-vs-them narrative of threat and victimhood.

Emotion signals

fear engineering
"FBI officials say laptop farms are a crucial way North Korean IT teams trick U.S. companies into believing their remote workers are in the U.S."

Instills a sense of unease and potential vulnerability by implying that U.S. companies are easily tricked and unknowingly harbor foreign adversaries.

fear engineering
"“We believe there are many more hundreds of people out there who are participating in these schemes,” said Rozhavsky, the FBI assistant director. “They could never pull this off if they didn’t have willing facilitators in the U.S. helping them.”"

Creates fear of an unseen, widespread threat and deepens apprehension by suggesting complicity by 'willing facilitators in the U.S.', implying an internal threat.

urgency
"“It’s a whack-a-mole game. It’s virtually impossible to fully disrupt this,” Carlsen said. “It’s just a never-ending process.”"

This evokes a sense of helplessness and ongoing, unresolvable threat, engineering a feeling of urgency to find new solutions or face permanent vulnerability.

fear engineering
"That expansion also means concerns that North Korean workers could cause real-world harm by jeopardizing lives, something Barnhart has seen up close.In 2021, as part of a wave of attacks on NASA and military bases, a North Korean hacking team infected a Kansas hospital’s computer systems with ransomware, crippling servers and demanding roughly $100,000 in bitcoin to restore their function. The hospital paid."

Directly links cyber activities to 'real-world harm' and 'jeopardizing lives' through the vivid example of a hospital ransomware attack, designed to evoke fear for personal safety and critical services.

fear engineering
"“Even if a company gets rid of them, we don’t know what backdoors they could have left for access in the future,” he said. “So it’s definitely a ticking time bomb that could have negative consequences down the line.”"

The phrase 'ticking time bomb' is a strong emotional trigger for fear and anxiety, suggesting an imminent and potentially catastrophic, unavoidable danger.

Narrative Analysis (PCP)

How the article reshapes thinking: Perception (what beliefs are targeted), Context (what information is shifted or omitted), and Permission (what behavior is being encouraged).

What it wants you to believe

The article aims to instill a belief that North Korea's cyber operations, facilitated by U.S. and Chinese networks, pose a significant and evolving threat to U.S. national security and economic interests, and that these operations are becoming increasingly sophisticated and hard to detect/disrupt. It also seeks to highlight connections between these IT schemes and broader cybercrime, and the potential for these workers to become internal threats ('ticking time bomb').

Context being shifted

The article shifts the context from isolated cybercrime incidents to a coordinated, state-sponsored 'all-purpose sword' operation with global reach, implying a more sinister, strategic threat beyond mere financial gain. The involvement of 'Chinese financial networks' shifts the context to a broader, interconnected geopolitical challenge that implicates multiple state and non-state actors.

What it omits

The article largely omits the broader geopolitical context of U.S.-North Korea relations, including any historical factors or other policy decisions that might contribute to North Korea's reliance on illicit revenue generation. It also does not delve into the socio-economic conditions within North Korea that might drive individuals to participate in such schemes, or the effectiveness of past sanctions, which could offer alternative perspectives on the efficacy or ethics of current responses.

Desired behavior

The article nudges the reader toward accepting more aggressive counter-cyber measures, increased government surveillance cooperation with private industry, and supporting stricter sanctions against North Korea and its facilitators. It fosters a sense of urgency and concern regarding the pervasive and growing nature of this threat, implicitly granting permission for more robust, perhaps even novel, interventions by U.S. authorities.

SMRP Pattern

Four manipulation maintenance tactics: Socializing the idea as normal, Minimizing concerns, Rationalizing with logic, and Projecting blame.

-
Socializing
-
Minimizing
-
Rationalizing
!
Projecting

"North Korea, for its part, has denied any wrongdoing. North Korean leader Kim Jong Un participates in a photo session with soldiers in North Pyongan province on Feb. 1.Korean Central News Agency via Getty ImageLast year, following the Department of Justice’s indictment of several North Koreans for their alleged roles in the scheme, the country’s foreign minister condemned U.S. actions as “an absurd smear campaign” targeting the “non-existent ‘cyber threat’ from the DPRK,” the Korean Central News Agency reported.In response to questions about Chinese nationals’ involvement in the scheme, Chinese Embassy spokesperson Liu Pengyu said, “We oppose false allegations and smears which have no factual ground at all.”"

Red Flags

High-severity indicators: silencing dissent, coordinated messaging, or weaponizing identity to shut down debate.

-
Silencing indicator
!
Controlled release (spokesperson test)

""We believe there are many more hundreds of people out there who are participating in these schemes,” said Rozhavsky, the FBI assistant director. “They could never pull this off if they didn’t have willing facilitators in the U.S. helping them." and "Even if a company gets rid of them, we don’t know what backdoors they could have left for access in the future,” he said. “So it’s definitely a ticking time bomb that could have negative consequences down the line.""

-
Identity weaponization

Techniques Found(3)

Specific propaganda techniques identified using the SemEval-2023 academic taxonomy of 23 techniques across 6 categories.

Appeal to Fear/PrejudiceJustification
"North Korean IT teams are now subcontracting work to developers in Pakistan, Nigeria and India, expanding into fields like customer service, financial processing, insurance and translation services — roles far less scrutinized than software development.“Unless you have external information, you might not know they’re North Korean,” said Michael Barnhart, who leads nation-state threat intelligence at DTEX. “They’re trying to move themselves into middle management, and it’s working.”That expansion also means concerns that North Korean workers could cause real-world harm by jeopardizing lives, something Barnhart has seen up close.In 2021, as part of a wave of attacks on NASA and military bases, a North Korean hacking team infected a Kansas hospital’s computer systems with ransomware, crippling servers and demanding roughly $100,000 in bitcoin to restore their function. The hospital paid."

This segment highlights an example of potential physical harm caused by North Korean activities, specifically the ransomware attack on a hospital, followed by a statement that 'concerns that North Korean workers could cause real-world harm by jeopardizing lives'. This plays on the audience's fear of physical and health threats to create alarm about the presence of North Korean IT workers in various industries.

Exaggeration/MinimisationManipulative Wording
"So it’s definitely a ticking time bomb that could have negative consequences down the line.”"

The phrase 'ticking time bomb' is an exaggeration used to heighten a sense of impending danger and urgency regarding the potential for North Korean IT workers to leave backdoors in company systems, making it seem like an immediate and catastrophic threat rather than a potential, long-term risk.

Loaded LanguageManipulative Wording
"Most of these intermediaries operate across southern China and Southeast Asia including Myanmar, Hong Kong, Macao and China’s Fujian province — rapidly moving cryptocurrency across blockchains using so-called “mixers” that break stolen funds into smaller pieces to obscure their origin."

The term 'stolen funds' is loaded language used to describe the source of the cryptocurrency. While the article generally details illicit activities, framing all funds processed by 'mixers' as 'stolen' without specific evidence for every instance pre-frames the financial activities in a negative light.

Share this analysis