Public watchlist entries require official sanctions, law-enforcement, court, or equivalent public-source backing.
信頼ルール
国籍のみで判断しません。未検証の公開告発は扱いません。証拠は審査まで非公開です。
Reports enter a moderation queue and are not published until approved with sufficient evidence.
No nationality-only screening, ethnicity proxies, forced slogans, or political loyalty tests.
質問票
アクセス権限を増やす前に、観察された不正指標を確認します。
観察した事実だけを選択してください。結果はリスク分類であり、公的な告発ではありません。
運用文言は機械支援翻訳です。法務、制裁、雇用判断では英語原文と専門家の確認を優先してください。
ソフト面接質問
候補者自身の主張に結びつく場合だけ使ってください。
一貫性、ライブ本人性、検証可能な経歴を確認します。国籍テストではありません。
韓国背景を主張する場合
- 作業環境、勤務時間、通信手段、給与/KYC経路、端末受け取り方法を具体的に説明してもらいます。
- 学校や雇用主は候補者提供の連絡先だけでなく独立した連絡先で確認します。
ライブ一貫性確認
- ポリシー上可能ならカメラをオンにし、最近の作業サンプルを説明してもらいます。
- 服装や外見ではなく、同一人物性と主張の一貫性だけを確認します。
韓国語レビュー
- 韓国語の方言、語彙、専門用語は韓国ネイティブのレビューを使えます。
- アクセントだけで判断せず、他の記録と合わせて扱います。
Operational playbook
Useful in real hiring, vendor review, and incident response.
Before interview
Verify identity, education, employment, sanctions status, and vendor controls through independent channels.
Before equipment ships
Ship only to verified addresses, use MDM, block unauthorized remote access, and delay repository access.
Before production access
Use least privilege, watch for impossible travel, review payout mismatches, and log source-control activity.
If signals appear
Preserve evidence, pause access, involve counsel/compliance, and report through IC3 or the right authority.
非公開報告受付
報告は審査待ちになります。公的または検証可能な証拠なしに公開されません。
Need native South Korean review for Korean-language, dialect, vocabulary, or claimed-background consistency? Contact dev.koriel@gmail.com.
公的公開事例
公開項目は FBI、DOJ、OFAC などの公的情報に限定されます。
FBI wanted: fraudulent remote IT worker team tied to blockchain theft
DOJ says four DPRK nationals used false or stolen identities to obtain remote IT roles and allegedly stole more than $900,000 in virtual currency from two companies.
4 listed people/entities
- False or stolen identities
- Remote IT roles at crypto companies
- Smart contract/source-code access
- Tornado Cash laundering allegations
FBI wanted: multi-year remote IT worker fraud case
DOJ says the defendants and co-conspirators obtained work from at least 64 U.S. companies, generated at least $866,255 from 10 companies, and laundered proceeds through a Chinese bank account.
2 listed people/entities
- Forged and stolen identity documents
- Laptop farm facilitation
- U.S. company remote jobs
- Money laundering allegations
Fourteen DPRK nationals indicted in Yanbian Silverstar / Volasys Silverstar scheme
DOJ says the group worked for DPRK-controlled Yanbian Silverstar and Volasys Silverstar, using false, stolen, and borrowed identities to obtain remote IT work and launder revenue.
14 listed people/entities
- False, stolen, and borrowed identities
- Front companies
- Remote work contracts
- Revenue laundering allegations
OFAC sanctions: Chinyong Information Technology Cooperation Company and Kim Sang Man
OFAC sanctioned Chinyong and Kim Sang Man for roles tied to DPRK overseas IT worker delegations, revenue generation, and cryptocurrency payments.
2 listed people/entities
- DPRK IT worker delegations
- Russia and Laos operations
- Cryptocurrency payment flows
- Sanctions designation
DOJ charged Foreign Trade Bank representative Sim Hyon Sop in crypto laundering conspiracies
DOJ says Sim allegedly conspired with North Korean IT workers to launder proceeds from illegal IT development work at blockchain companies.
1 listed people/entities
- Blockchain development companies
- Stablecoin and virtual currency payments
- FTB-linked laundering allegations
- Sanctions evasion
OFAC 2026 sanctions: facilitators and entities tied to DPRK IT worker fraud
OFAC designated six individuals and two entities for roles in DPRK IT worker schemes, including currency conversion, IT worker coordination, and facilitation services.
8 listed people/entities
- Currency conversion
- IT worker coordination
- Freelance IT contracts
- Sanctions designation
DOJ sentencing: U.S.-based laptop farms that helped DPRK IT workers pose as U.S. residents
DOJ says the defendants operated laptop farms that helped North Korean remote IT workers pose as U.S. residents, use stolen identities, and obtain work from more than 100 U.S. companies.
2 listed people/entities
- Laptop farms
- Stolen identities
- U.S.-resident impersonation
- More than 100 victim companies
Christina Marie Chapman laptop farm scheme
DOJ says Chapman assisted DPRK IT workers posing as U.S. residents, helped them work at 309 U.S. companies, and generated more than $17 million in illicit revenue.
1 listed people/entities
- Laptop farm
- Stolen U.S. identities
- 309 U.S. companies
- Payroll and check laundering
U.S. facilitators who provided identities, hosted laptops, and passed vetting steps
DOJ says the defendants provided U.S. identities, hosted victim company laptops, installed remote access software, and helped overseas IT workers pass employer vetting.
3 listed people/entities
- Identity lending
- Laptop hosting
- Unauthorized remote access software
- Drug-test substitution
Oleksandr Didenko identity and account marketplace
DOJ says Didenko stole U.S. identities and sold them to overseas IT workers, including DPRK IT workers, so they could fraudulently gain employment at 40 U.S. companies.
1 listed people/entities
- Stolen identity marketplace
- Freelance platform accounts
- Money-service accounts
- 40 U.S. companies
Taggcar and facilitator indictment tied to 64-company remote IT worker scheme
DOJ says the facilitators helped obtain work for DPRK IT workers from more than 64 U.S. companies; Erick Ntekereze Prince later pleaded guilty to wire fraud conspiracy.
3 listed people/entities
- Staffing-vendor facilitation
- False and stolen identities
- Laptop farm
- 64 U.S. companies
OFAC Department 53 / Laos IT worker network
OFAC says Department 53 and front companies maintained DPRK IT worker delegations in Laos and used aliases to generate revenue from IT projects including crypto exchanges, web apps, and mobile apps.
6 listed people/entities
- Laos IT worker delegations
- Aliases with clients
- Crypto exchange development
- Equipment supply network
OFAC Korea Sobaeksu IT worker and procurement network
OFAC says Sobaeksu and associated individuals helped evade sanctions and generate revenue through fraudulent IT worker schemes and related procurement activity.
4 listed people/entities
- IT worker deployment
- Vietnam-linked revenue activity
- Cryptocurrency and financial coordination
- Sanctions evasion
OFAC Chinyong-linked payment and front-company network
OFAC says Andreyev and Kim Ung Sun facilitated hundreds of thousands of dollars in transfers for Chinyong, while Shenyang Geumpungri and Sinjin supported DPRK IT worker revenue generation.
4 listed people/entities
- Crypto-to-cash conversion
- Chinyong-linked front company
- DPRK IT worker delegation
- Sanctions designation
OFAC bankers and KMCTC IT delegation network
OFAC says DPRK bankers helped manage cryptocurrency funds and that KMCTC operated IT worker delegations from Shenyang and Dandong using banking proxies.
5 listed people/entities
- Cryptocurrency fund management
- IT worker delegations in China
- Banking proxies
- Sanctions designation
出典