May 23, 2022
By: Chris Griner, Shannon Reaves, Tom Firestone, Christopher R. Brewster, Gregory Jaeger, Andrew J. Astuno, Erin Bruce Iacobucci
Big Risks Require Robust Compliance Programs
On May 16, the U.S. Department of State, Department of Treasury and Federal Bureau of Investigation (FBI) issued a joint advisory declaring that the Democratic People’s Republic of Korea (DPRK, a.k.a. North Korea) is using information technology (IT) workers to obtain sensitive foreign technology and generate revenue for North Korea’s Weapons of Mass Destruction (WMD) programs.[1]
The advisory draws on a series of reports by the UN Security Council 1718 Sanctions Committee,[2] and provides detailed information on how DPRK IT workers operate overseas. The advisory lists red flags to help companies identify DPRK IT workers and recommends various protective measures. Businesses that hire North Korean IT workers, even unknowingly, can face severe penalties, including large fines and, in the case of willful violations, criminal prosecution.
The Danger
According to the advisory, almost all DPRK IT workers are subordinate to, and generate revenue for, entities directly involved in the DPRK’s UN-prohibited WMD and ballistic missile programs, as well as its advanced conventional weapons development and trade sectors. As contractors, DPRK IT workers sometimes use their privileged access to steal data about critical infrastructure, procure WMD and ballistic missile-related items , enable malicious cyber intrusions, and assist with the DPRK’s money-laundering and virtual currency transfers. In some cases, these IT workers have even designed virtual currency exchanges and created analytic tools and applications for virtual currency trading (a common means of sanctions evasion). In one case, DPRK IT workers employed as developers by a U.S. company fraudulently charged the company’s payment account and stole over $50,000 in 30 small installments over a matter of months.
How DPRK IT Workers Gain Access
According to the advisory, DPRK IT workers often use online platforms to get freelance contracts in North America, Europe, and East Asia. They frequently rely on stolen or forged identity documents, virtual private networks (VPNs), virtual private servers (VPSs) and third-country IP addresses to conceal their nationality, often presenting themselves as South Korean, Chinese, Japanese, East European or U.S.-based teleworkers. In some cases, they find local, non-DPRK nationals to serve as the nominal heads of companies that are secretly controlled by North Koreans. In other cases, they pay a foreign company to provide them with ostensibly legitimate employment and hide their true identities. DPRK IT workers often acquire proxy accounts held by third parties to bid on, win, work on, and receive payment for, projects on freelance software developer websites.
Legal Risks of Employing DPRK IT Workers
Under a series of Executive Orders issued pursuant to the International Emergency Economic Powers Act (IEEPA)[3], U.S. persons are prohibited from engaging in transactions with the Government of North Korea and the Workers’ Party of Korea without authorization from the U.S. Treasury Department’s Office of Foreign Assets Control (“OFAC”). U.S persons that employ or support DPRK IT workers anywhere in the world and/or process related financial transactions may face severe civil and criminal penalties. Even unintentional and unknowing violations may result in substantial monetary penalties. Willful violations can result in imprisonment, substantial fines, and potential forfeiture of all funds involved in the illicit transactions.
Criminal prosecution is not just a theoretical possibility. For example, in 2020, the Department of Justice disclosed charges against 28 North Koreans and 5 Chinese citizens with laundering over $2.5 billion in assets through 250 shell companies around the world.[4] This is just one of many recent prosecutions related to North Korea. Others have involved cyberattacks, illegal imports and exports to/from North Korea, and ransomware extortion demands.[5]
In addition to the Justice Department’s enforcement authority, OFAC has the authority to impose financial sanctions on any U.S. person determined to have, among other things:
Foreign persons also can face criminal penalties for sanctions evasion schemes that have even a minimal U.S. nexus. Further, foreign financial institutions that have knowingly conducted or facilitated significant trade with the DPRK, or knowingly conducted or facilitated a significant transaction on behalf of a person designated under a DPRK-related Executive Order may lose the ability to maintain a correspondent or payable-through account in the United States.
Look for Red Flags
To help reduce these risks, the advisory provides a detailed list of red flags that companies employing freelance developers should use to identify hidden DPRK IT workers:
The advisory also warns freelance work and payment platform companies to be aware of the following red flags that may indicate that DPRK IT workers are using their platforms for malicious purposes:
Enhanced Compliance Measures
Plainly, the national security risks presented by North Korean IT workers are substantial, and require a substantial response. The advisory provides a detailed list of compliance measures that companies should implement to reduce the risk of hiring DPRK IT workers. Specifically, the advisory recommends that freelance work and payment platform companies:
Hiring practices also come under scrutiny. The advisory recommends that companies hiring programmers and developers on freelance platforms:
Although vigilance is critical, it is also necessary to ensure that programs are developed and implemented in accordance with U.S. laws barring discrimination, including discrimination based on race, ethnicity, and national origin.
Conclusion
North Korea has been under U.S. trade sanctions for decades and remains a priority for U.S. enforcement authorities. This attention will increase as North Korea continues to develop its nuclear and intercontinental ballistic missile (ICBM) programs. Red flags matter. Significant risks require enhanced compliance programs. Therefore, companies, especially those in the IT industry, should closely review the advisory and, together with qualified counsel, ensure that they have controls in place to prevent and identify any potential violations.
[1] https://home.treasury.gov/system/files/126/20220516_dprk_it_worker_advisory.pdf.
[2] https://www.un.org/securitycouncil/sanctions/1718/panel_experts/reports.
[3] See https://home.treasury.gov/system/files/126/ieepa.pdf; https://home.treasury.gov/policy-issues/financial-sanctions/faqs/topic/1556; eCFR :: 31 CFR Part 510 -- North Korea Sanctions Regulations; nk_eo_20160316.pdf (treasury.gov); Federal Register :: Imposing Additional Sanctions With Respect to North Korea; Federal Register :: Additional Designation of North Korean Entities Pursuant to E.O. 13382.
[4] See United States v. Ko Chol Man (1:20-cr-00032-RC) D.D.C. 2018).
[5] See, e.g., Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe | OPA | Department of Justice; Department of Justice Announces Forfeiture of North Korean Cargo Vessel | OPA | Department of Justice; North Korean Regime-Backed Programmer Charged With Conspiracy to Conduct Multiple Cyber Attacks and Intrusions | OPA | Department of Justic.
May 23, 2022
By: Chris Griner, Shannon Reaves, Tom Firestone, Christopher R. Brewster, Gregory Jaeger, Andrew J. Astuno, Erin Bruce Iacobucci
Big Risks Require Robust Compliance Programs
On May 16, the U.S. Department of State, Department of Treasury and Federal Bureau of Investigation (FBI) issued a joint advisory declaring that the Democratic People’s Republic of Korea (DPRK, a.k.a. North Korea) is using information technology (IT) workers to obtain sensitive foreign technology and generate revenue for North Korea’s Weapons of Mass Destruction (WMD) programs.[1]
The advisory draws on a series of reports by the UN Security Council 1718 Sanctions Committee,[2] and provides detailed information on how DPRK IT workers operate overseas. The advisory lists red flags to help companies identify DPRK IT workers and recommends various protective measures. Businesses that hire North Korean IT workers, even unknowingly, can face severe penalties, including large fines and, in the case of willful violations, criminal prosecution.
The Danger
According to the advisory, almost all DPRK IT workers are subordinate to, and generate revenue for, entities directly involved in the DPRK’s UN-prohibited WMD and ballistic missile programs, as well as its advanced conventional weapons development and trade sectors. As contractors, DPRK IT workers sometimes use their privileged access to steal data about critical infrastructure, procure WMD and ballistic missile-related items , enable malicious cyber intrusions, and assist with the DPRK’s money-laundering and virtual currency transfers. In some cases, these IT workers have even designed virtual currency exchanges and created analytic tools and applications for virtual currency trading (a common means of sanctions evasion). In one case, DPRK IT workers employed as developers by a U.S. company fraudulently charged the company’s payment account and stole over $50,000 in 30 small installments over a matter of months.
How DPRK IT Workers Gain Access
According to the advisory, DPRK IT workers often use online platforms to get freelance contracts in North America, Europe, and East Asia. They frequently rely on stolen or forged identity documents, virtual private networks (VPNs), virtual private servers (VPSs) and third-country IP addresses to conceal their nationality, often presenting themselves as South Korean, Chinese, Japanese, East European or U.S.-based teleworkers. In some cases, they find local, non-DPRK nationals to serve as the nominal heads of companies that are secretly controlled by North Koreans. In other cases, they pay a foreign company to provide them with ostensibly legitimate employment and hide their true identities. DPRK IT workers often acquire proxy accounts held by third parties to bid on, win, work on, and receive payment for, projects on freelance software developer websites.
Legal Risks of Employing DPRK IT Workers
Under a series of Executive Orders issued pursuant to the International Emergency Economic Powers Act (IEEPA)[3], U.S. persons are prohibited from engaging in transactions with the Government of North Korea and the Workers’ Party of Korea without authorization from the U.S. Treasury Department’s Office of Foreign Assets Control (“OFAC”). U.S persons that employ or support DPRK IT workers anywhere in the world and/or process related financial transactions may face severe civil and criminal penalties. Even unintentional and unknowing violations may result in substantial monetary penalties. Willful violations can result in imprisonment, substantial fines, and potential forfeiture of all funds involved in the illicit transactions.
Criminal prosecution is not just a theoretical possibility. For example, in 2020, the Department of Justice disclosed charges against 28 North Koreans and 5 Chinese citizens with laundering over $2.5 billion in assets through 250 shell companies around the world.[4] This is just one of many recent prosecutions related to North Korea. Others have involved cyberattacks, illegal imports and exports to/from North Korea, and ransomware extortion demands.[5]
In addition to the Justice Department’s enforcement authority, OFAC has the authority to impose financial sanctions on any U.S. person determined to have, among other things:
Foreign persons also can face criminal penalties for sanctions evasion schemes that have even a minimal U.S. nexus. Further, foreign financial institutions that have knowingly conducted or facilitated significant trade with the DPRK, or knowingly conducted or facilitated a significant transaction on behalf of a person designated under a DPRK-related Executive Order may lose the ability to maintain a correspondent or payable-through account in the United States.
Look for Red Flags
To help reduce these risks, the advisory provides a detailed list of red flags that companies employing freelance developers should use to identify hidden DPRK IT workers:
The advisory also warns freelance work and payment platform companies to be aware of the following red flags that may indicate that DPRK IT workers are using their platforms for malicious purposes:
Enhanced Compliance Measures
Plainly, the national security risks presented by North Korean IT workers are substantial, and require a substantial response. The advisory provides a detailed list of compliance measures that companies should implement to reduce the risk of hiring DPRK IT workers. Specifically, the advisory recommends that freelance work and payment platform companies:
Hiring practices also come under scrutiny. The advisory recommends that companies hiring programmers and developers on freelance platforms:
Although vigilance is critical, it is also necessary to ensure that programs are developed and implemented in accordance with U.S. laws barring discrimination, including discrimination based on race, ethnicity, and national origin.
Conclusion
North Korea has been under U.S. trade sanctions for decades and remains a priority for U.S. enforcement authorities. This attention will increase as North Korea continues to develop its nuclear and intercontinental ballistic missile (ICBM) programs. Red flags matter. Significant risks require enhanced compliance programs. Therefore, companies, especially those in the IT industry, should closely review the advisory and, together with qualified counsel, ensure that they have controls in place to prevent and identify any potential violations.
[1] https://home.treasury.gov/system/files/126/20220516_dprk_it_worker_advisory.pdf.
[2] https://www.un.org/securitycouncil/sanctions/1718/panel_experts/reports.
[3] See https://home.treasury.gov/system/files/126/ieepa.pdf; https://home.treasury.gov/policy-issues/financial-sanctions/faqs/topic/1556; eCFR :: 31 CFR Part 510 -- North Korea Sanctions Regulations; nk_eo_20160316.pdf (treasury.gov); Federal Register :: Imposing Additional Sanctions With Respect to North Korea; Federal Register :: Additional Designation of North Korean Entities Pursuant to E.O. 13382.
[4] See United States v. Ko Chol Man (1:20-cr-00032-RC) D.D.C. 2018).
[5] See, e.g., Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe | OPA | Department of Justice; Department of Justice Announces Forfeiture of North Korean Cargo Vessel | OPA | Department of Justice; North Korean Regime-Backed Programmer Charged With Conspiracy to Conduct Multiple Cyber Attacks and Intrusions | OPA | Department of Justic.