(LEAD) U.S. sanctions 6 individuals, 2 entities for roles in N. Korean IT worker 'fraud': Treasury Dept.

en.yna.co.kr·Song Sang-ho
View original article
0out of 100
Noticeable — persuasion techniques worth noting

This article uses quotes from a Treasury Secretary and relies on official government statements to convince you that North Korea is using cyber schemes to fund weapons, directly targeting and defrauding American businesses. It wants you to believe the U.S. government is effectively protecting businesses from these alleged threats, but doesn't offer specific examples of businesses or broader context about sanctions. It nudges you to support strong U.S. actions against North Korea and trust government agencies for protection.

FATE Analysis

Four dimensions of psychological manipulation: how content captures Focus, exploits Authority, triggers Tribal identity, and engineers Emotion.

Focus2/10Authority6/10Tribe4/10Emotion5/10
FFocus
0/10
AAuthority
0/10
TTribe
0/10
EEmotion
0/10

Focus signals

attention capture
"(ATTN: ADDS more info in paras 5-16)"

This administrative note, while common in news, serves to signal updated and potentially more comprehensive information, encouraging continued reading.

breaking framing
"The U.S. Treasury Department said Thursday it sanctioned six individuals and two entities for their roles in North Korea-orchestrated information technology (IT) worker schemes..."

The 'sanctioned' and 'orchestrated' immediate framing, coupled with the 'Thursday' timestamp, presents the news as a current, active development, capturing attention.

Authority signals

institutional authority
"The U.S. Treasury Department said Thursday it sanctioned six individuals and two entities..."

The article's primary source of information is directly attributed to a major U.S. government institution, lending significant weight and credibility to the claims made.

institutional authority
"The department's Office of Foreign Assets Control (OFAC) announced the measure, noting that the latest sanctions are part of the United States' 'whole-of-government' effort to counter Pyongyang's wide-ranging revenue generation schemes."

Naming OFAC and framing the actions as a 'whole-of-government' effort amplifies the perceived authoritative and unified nature of the claims.

expert appeal
"'The North Korean regime targets American companies through deceptive schemes carried out by its overseas IT operatives, who weaponize sensitive data and extort businesses for substantial payments,' Secretary of the Treasury Scott Bessent was quoted as saying."

Quoting the Secretary of the Treasury directly provides an authoritative voice from a high-ranking official, leveraging their position to underscore the gravity and validity of the information.

Tribe signals

us vs them
"The U.S. Treasury Department said Thursday it sanctioned six individuals and two entities for their roles in North Korea-orchestrated information technology (IT) worker schemes, which it accused of defrauding American businesses and generating revenue to fund Pyongyang's weapons programs."

This establishes a clear 'us' (American businesses, U.S.) versus 'them' (North Korea-orchestrated schemes, Pyongyang's weapons programs) dynamic, framing North Korea as an aggressor against American interests.

us vs them
"'Under President Trump's leadership, Treasury will continue to follow the money in order to protect U.S. businesses from these malicious activities and ensure those responsible are held accountable,' he added."

This quote reinforces the 'us' (U.S., its businesses) needing protection from 'them' (malicious activities, those responsible) and positions the Treasury as the protector, appealing to a sense of national unity against an external threat.

us vs them
"The DPRK government reportedly appropriates the majority of the wages earned by these overseas IT workers, generating hundreds of millions of dollars to support the regime's WMD and ballistic missile programs in violation of U.S. and U.N. sanctions"

This statement further solidifies the 'us vs. them' narrative by depicting North Korea's actions as a direct violation of international norms ('U.S. and U.N. sanctions') and a threat via 'WMD and ballistic missile programs', uniting readers against this perceived rogue state.

Emotion signals

fear engineering
"defrauding American businesses and generating revenue to fund Pyongyang's weapons programs."

This phrase elicits fear by linking financial fraud directly to the funding of dangerous 'weapons programs,' suggesting a direct threat to security and economic stability.

fear engineering
"'...its overseas IT operatives, who weaponize sensitive data and extort businesses for substantial payments,' Secretary of the Treasury Scott Bessent was quoted as saying."

The terms 'weaponize sensitive data' and 'extort businesses' are designed to trigger fear and alarm regarding cyber threats and economic vulnerability, portraying the actions as hostile and damaging.

outrage manufacturing
"The DPRK government reportedly appropriates the majority of the wages earned by these overseas IT workers, generating hundreds of millions of dollars to support the regime's WMD and ballistic missile programs in violation of U.S. and U.N. sanctions"

This aims to generate outrage by highlighting the 'appropriation' of wages and the use of these funds for 'WMD and ballistic missile programs,' framing it as an egregious act against both individual workers and global security.

fear engineering
"In certain instances, DPRK-affiliated workers have also covertly introduced malware into company networks to extract proprietary and sensitive information"

The mention of 'covertly introduced malware' and the extraction of 'proprietary and sensitive information' is a strong fear-inducing element, playing on anxieties about cyber security and corporate espionage.

Narrative Analysis (PCP)

How the article reshapes thinking: Perception (what beliefs are targeted), Context (what information is shifted or omitted), and Permission (what behavior is being encouraged).

What it wants you to believe

The article aims to instill the belief that North Korea is actively engaged in sophisticated, malicious, and financially significant cyber and IT schemes to fund its weapons programs, directly defrauding American businesses. It seeks to establish North Korea as a significant and tangible economic threat, not just a military one, and that the U.S. government is actively and effectively countering this threat.

Context being shifted

The article frames North Korea's IT schemes as primarily a 'defrauding' of American businesses and 'weaponization of sensitive data,' shifting the focus to economic harm and data security rather than broader geopolitical or humanitarian contexts. This framing makes the U.S. Treasury's sanctioning actions feel like a necessary defense against financial crime.

What it omits

The article omits broader international context regarding the effectiveness of sanctions against North Korea's weapons programs, the humanitarian impact of these sanctions on the North Korean populace, or the potential for these sanctions to escalate tensions. It also doesn't detail the specific nature or scale of the 'defrauded' American businesses, focusing instead on the alleged financial amounts and the 'weaponization' aspect without concrete examples or impact assessments.

Desired behavior

The reader is nudged to support and approve of stringent U.S. government actions, specifically sanctions, against North Korea and its alleged facilitators. It also encourages a perception of vulnerability among American businesses and a reliance on government agencies like the Treasury Department for protection from these 'malicious activities'.

SMRP Pattern

Four manipulation maintenance tactics: Socializing the idea as normal, Minimizing concerns, Rationalizing with logic, and Projecting blame.

-
Socializing
-
Minimizing
-
Rationalizing
-
Projecting

Red Flags

High-severity indicators: silencing dissent, coordinated messaging, or weaponizing identity to shut down debate.

-
Silencing indicator
!
Controlled release (spokesperson test)

"Under President Trump's leadership, Treasury will continue to follow the money in order to protect U.S. businesses from these malicious activities and ensure those responsible are held accountable."

-
Identity weaponization

Techniques Found(4)

Specific propaganda techniques identified using the SemEval-2023 academic taxonomy of 23 techniques across 6 categories.

Appeal to AuthorityJustification
"Under President Trump's leadership, Treasury will continue to follow the money in order to protect U.S. businesses from these malicious activities and ensure those responsible are held accountable"

This quote attributes the ongoing and future actions of the Treasury to President Trump's leadership. It uses the authority figure of the President to add weight and legitimacy to the Treasury's stated commitment, rather than focusing purely on the policy or evidence.

Loaded LanguageManipulative Wording
"weaponize sensitive data and extort businesses for substantial payments"

The word 'weaponize' is emotionally charged, framing the actions as aggressive and hostile. 'Extort' also carries a strong negative connotation, implying coercion and illegality, which pre-frames the North Korean IT schemes in a highly negative light, beyond a simple description of fraud.

SlogansCall
"whole-of-government"

This phrase is a commonly used political slogan to signify comprehensive and unified action across various government agencies, implying a powerful and resolved response without detailing specific coordination mechanisms.

Obfuscation/VaguenessManipulative Wording
"The DPRK government reportedly appropriates the majority of the wages earned by these overseas IT workers, generating hundreds of millions of dollars to support the regime's WMD and ballistic missile programs in violation of U.S. and U.N. sanctions"

The word 'reportedly' introduces vagueness, allowing the claim about appropriation and funding WMD programs to be presented as fact without specific, direct evidence or attribution to a primary source within the article. It creates an impression of truth without full accountability for the information.

Share this analysis