
Ninety Laptops and a $17 Million Scam: How One US Woman Helped North Korea Infiltrate American Tech
When Christina Chapman answered a message on LinkedIn back in March 2020, she probably had no idea her life was about to spiral into an international scandal. The world was just settling into pandemic lockdowns, working from home became the norm, and somewhere in the midst of Zoom meetings and takeout lunches, Chapman stumbled into one of the wildest cyber schemes in recent history.
How did a woman from Arizona and Minnesota end up as the unexpected face of a global scam aiding North Korea? The story is equal parts tech thriller and cautionary tale about how gig work and remote employment have blurred the lines between who’s behind the screen—and what they’re really doing.
A LinkedIn Message That Changed Everything
Think about it—what would you do if someone messaged you out of the blue, offering a way out of a rough life? For Chapman, who’d grown up in a turbulent home and drifted through low-wage jobs, the offer must have sounded almost sensible. All she had to do, the stranger said, was help foreign IT workers get hired by US companies. She’d be the company’s “US face.” The real workers would do their jobs remotely. What could go wrong?
But those overseas workers weren’t just anyone. They were North Korean operatives—part of the North Korean government’s plan to send out thousands of skilled IT workers, hiding their real identities behind stolen names and fake locations. According to the US Justice Department, the whole thing was designed to funnel millions of dollars back to Pyongyang’s notorious nuclear weapons program.
Inside the Laptop Farm: An American Front for a North Korean Plot
As layoffs swept through the US and remote tech roles exploded, Chapman’s sideline turned into a full-fledged operation. She managed to get jobs for North Korean workers at hundreds of US companies, including industry giants like Nike, a top Silicon Valley tech firm, and even one of the biggest media brands in the world.
Here’s where it gets wild: Chapman didn’t just vouch for fake résumés. She ran what authorities later called “laptop farms.” If you walked into her home in Arizona, you might’ve seen racks filled with open laptops, each sporting a sticky note with a different name. These laptops would get shipped to Chapman and then, sometimes, sent overseas or kept running in her home for workers to connect to remotely. The companies hiring these workers thought they were onboarding Americans—they were actually granting access to North Korean programmers halfway around the world.
Oh, and she got paid for each machine she managed—sometimes $200 a pop. It’s not hard to see how things quickly spiraled out of control.
Real Jobs, Stolen Identities
The scheme wasn’t just some faceless internet fraud. Real people got hurt. Officials say Chapman helped the North Koreans use stolen identities from 68 individuals, whose personal info allowed the operatives to pass as locals. These victims later discovered unexpected tax bills or issues with their credit, a rude awakening that their identities had been burned for state-sponsored cybercrime.
Meanwhile, North Korean workers created elaborate fake profiles, even joining job interviews over Microsoft Teams—sometimes with Chapman pretending to be someone else or troubleshooting on the call. One North Korean “employee” was placed at a “top-five national television network” in New York, working as a video-streaming engineer. If an interviewer questioned why two devices were logged in, Chapman would spin a quick tech excuse—”Tell them your mic’s not working,” she’d advise.

Millions Funneled: The Numbers Behind the Scheme
Chapman’s operation wasn’t just big, it was massive. In three years, it generated an astonishing $17 million, split between Chapman and the North Korean government. To put that in perspective, some of the fraudulent hires received hundreds of thousands of dollars from a single company. The true extent? North Korean agents landed jobs at over 300 American firms, according to The Economic Times.
Not only were these companies unknowingly fueling a sanctioned adversary’s weapons development, they were also opening themselves up to potential cyberattacks. After all, why would North Korea just stop at earning money when they had access to the inner networks of Fortune 500 companies and high-profile media outlets?
Cracks in the System: How Remote Work Opened the Door
When the pandemic shuttered offices and moved jobs online, the whole hiring landscape changed overnight. Benjamin Racenberg from cybersecurity firm Nisos summed it up: once everything went remote, so did the risks. Companies suddenly realized they could tap global “talent”—but some of those faces behind the screens weren’t who they said they were. Cybercriminals, North Korean or otherwise, could now slip through cracks that hardly existed before.
Hiring managers often sent laptops by mail, rather than face-to-face. That made it much easier for operations like Chapman’s to thrive. Adam Meyers of CrowdStrike, whose team investigated the North Korean networks, puts it bluntly: “They find gig-economy workers stateside, pay them per laptop, and suddenly the whole operation goes global.”
The Human Story Behind the Cybercrime
It’s easy to see Chapman as just another fraudster. But her own story adds a layer of tragedy to the case. At the time, she was looking after her sick mother, working odd jobs, and trying to keep her life together. Chapman knew the risks—she told her co-conspirators about the danger of forging federal documents. She even admitted, “I can go to FEDERAL PRISON for falsifying federal documents.” But by then, she was already in deep.
In June 2023, Chapman posted upbeat videos on social media, coffee in hand, with rows of laptops blinking behind her. She claimed she was crazy busy—clients clamoring for help—but the chaos had a darker side. In October, federal agents finally raided her home, seizing 90 laptops. The evidence was everywhere.
By February, Chapman pleaded guilty to wire fraud, identity theft, and laundering. The impact? She helped foreign agents steal millions, while dozens of victims picked up the pieces after their identities were abused.
The Fallout: Prison, Fines, and Life After Scam
Before her sentencing, Chapman wrote a letter to the court—part confession, part cry for help. She actually thanked the FBI for arresting her, saying she’d been “trying to get away from the guys [she] was working with for awhile” and wasn’t sure how to break free. To the people harmed, she apologized: “To the people who were harmed, I send my sincerest apologies. I am not someone who seeks to harm anyone.”
But apologies only go so far. US District Court Judge Randolph Moss handed her an eight-year sentence, plus hefty fines and orders to forfeit future payments. Her case wasn’t unique, either. According to the Arizona FOX affiliate, the feds recently charged several more people (including US and Mexican citizens) connected to similar North Korean efforts—some of which targeted at least 64 different companies.
What Can Companies—and Regular People—Learn?
This scandal, with its laptop farms and shadowy remote workers, isn’t just a bizarre episode in tech history. It’s a wake-up call. With so many companies relying on digital hiring and remote work, how do you know who’s really logging in?
Experts offer some advice: Don’t just accept résumés at face value. Try Googling the first few lines. If you find the same work history attached to three other names, something’s off. During interviews, listen for weird background noises or a refusal to turn off virtual backgrounds. Maybe ask new hires to show up in person to get their laptops. Old-school? Maybe. But as cybersecurity pros say, seeing someone face-to-face can stop a lot of trickery in its tracks.
Cybercriminals are only going to get smarter—many believe they’ll soon use AI to make their schemes even more convincing. (On that note, check out how AI is unlocking hidden secrets even outside of cybersecurity.)
Is Hybrid Work Here to Stay?
With some companies calling workers back to the office, others wonder: Would ditching remote work end threats like Chapman’s? It would help, sure, but the consensus is clear—remote and hybrid work are sticking around, especially in tech. The best hope is layered security, smarter hiring questions, and a bit of old-fashioned skepticism.
To dig deeper on how tech and work are constantly evolving, check out these stories on the global impact of XR technology, learn about the Android payments battle, and explore what the rise of AI means for humanity. If you’re curious about basic security, see our tips on biometric password protection on your phone.
Key Takeaways (and a Quick Table)
So, what’s the moral of this modern cyber-crime story? Here’s a snapshot of the facts, the warning signs for companies, and a few tips for staying safe in an age where clicking ‘remote job’ can have global consequences:
Key Aspect | Takeaway |
---|---|
Scale of Scam | 300+ companies infiltrated, $17 million stolen, 68 US identities used |
How It Worked | Stolen IDs, fake profiles, remote access via US-based “facilitator” |
Victims | Fortune 500 companies, regular citizens with stolen identities |
Red Flags | Repeated résumé text, refusal to do video calls without filters, strange payment arrangements |
Expert Advice | Open-source applicant research, require in-person laptop pickup, stay skeptical of remote applicants |
Long-Term Outlook | Remote work and AI will only make such scams harder to spot unless countermeasures improve |
The digital age has made hiring easier and cybercrime a whole lot sneakier. As we rely on technology for everything from working to staying safe, being alert—and a bit skeptical—might be the best tool of all.
For more on digital security and the evolving job market, dive into these detailed resources:
- Indian Express: $17 Million Job Scam Case
- Justice Department Official Statement
- Wisconsin Journal of Law: Legal Analysis
- Arizona FOX Affiliate: Case Coverage
- Economic Times: North Korean Infiltration
Looking for more tech insights? Visit Tech Daily Update for the latest in cybersecurity, AI, and remote work trends.