In Litchfield Park, Arizona, USA, dozens of laptops are running day and night inside an unremarkable suburban home. On the surface, this is just the residence and studio of 49-year-old TikTok creator Christina Chapman; but in the eyes of U.S. law enforcement, it is a “laptop scam operation” assisting North Korean IT personnel in infiltrating American businesses and evading international sanctions.
The prosecution pointed out that Chapman acted as an intermediary between North Korea and the United States. She manipulated stolen identities of American victims and remotely controlled laptops from North Korean personnel to carry out telecommunications fraud against American citizens, and also deceived companies into hiring North Korean engineers for remote work. A recent investigation by Bloomberg revealed that North Korean authorities have established a meticulously organized infiltration operation, intentionally reaching out to social media creators like Chapman and their residences as cover identities and physical locations, leading several Fortune 500 American companies to unknowingly hire North Korean engineers. The FBI and relevant law enforcement agencies warned that this case may only be the tip of the iceberg, with similar operations potentially quietly occurring across the United States, and a large amount of activity yet to surface.
TikTok creator becomes an agent for North Korean engineers infiltrating American companies.
According to an investigation by the U.S. Department of Justice and Bloomberg News, Chapman assisted North Korean IT personnel in impersonating U.S. remote workers to infiltrate several well-known companies, generating millions of dollars in revenue for the North Korean government, with funds ultimately flowing into arms and weapons development programs.
According to the video introduction, Chapman is an American born in Korea, who loved to create and paint from a young age and has a deep affection for Korean Kpop and culture. However, her life did not go smoothly as an adult. Her mother was diagnosed with cancer, they faced financial difficulties, and their living environment even lacked running water at one point. Around the time of the COVID-19 outbreak in 2020, she urgently sought a stable income that would allow her to work from home to accompany her ill mother. One day, Chapman received a job invitation from LinkedIn, inviting her to become the “American Image Ambassador,” responsible for technical coordination and client communication. She admitted that her programming skills were limited, so she followed instructions and handed over the actual technical work to “overseas engineers.” Soon after, the laptops provided by the company began to arrive at her home, with the number quickly increasing from the initial three or four to over forty.
North Korea infiltrates U.S. companies through remote work vulnerabilities
Chapman set up computers and installed remote software according to the instructions from LinkedIn employers, allowing overseas personnel to log in and operate, making the corporate system show these employees “located in the United States.” Chapman handled checks, provided bank information, and even cashed funds for others. Some computers were later forwarded to places like China, the UAE, and Pakistan, with the border city of Dandong in China becoming an important relay station connecting to North Korea.
American identity stolen to defraud other citizens
The FBI tracked down Chapman's residence through shipping records, financial flows, and social media clues. During a raid, FBI agents discovered a large number of laptops labeled with the names of victims, some of which were still operational. After the IRS Criminal Investigation Division got involved, it confirmed that the identities of at least 70 American citizens had been repeatedly stolen, with some even receiving tax notices of up to $500,000.
Investigators pointed out that this is precisely the highly developed IT labor fraud model of North Korea in recent years. Trained North Korean engineers use forged or stolen American identities to secure high-paying remote jobs, assisted by intermediaries who help conceal their physical locations and the flow of funds. The victimized companies include several Fortune 500 firms, yet they are completely unaware that they are actually employing North Koreans.
Chapman played an indispensable role as the “North Korean agent” in the entire fraud scheme; without an agent like her based in the United States, the whole plan would have been nearly impossible to execute. Prosecutors estimate that her actions alone generated approximately $17 million in revenue. In 2023, Chapman was arrested and charged. She ultimately pleaded guilty to charges of telecom fraud and identity theft and was sentenced to 102 months in prison. Prosecutors emphasized that this was not just simple fraud, but an act related to national security.
Chapman's lawyer described her as “not a mastermind, just a pawn,” indicating that she is poor, isolated, and easily manipulated. Chapman herself stated in prison that she feels deep shame for all the victims, and this guilt will accompany her for life. The Chapman case is just the tip of the iceberg; similar fraudulent schemes may be spread across apartments and homes throughout the United States. This case reveals the significant vulnerabilities in national security and personal data protection that arise when remote work becomes the norm.
This article reveals from a Bloomberg survey: North Korea absorbs Americans to become “agents” operating scam operations at home, first appearing in Chain News ABMedia.