In a shocking revelation that exposes how America’s remote-work revolution is being weaponized by a hostile foreign power, Amazon has detailed how it blocked more than 1,800 job applications from suspected North Korean agents trying to infiltrate its payroll and funnel U.S. tech salaries directly to Kim Jong Un’s nuclear weapons program.
According to Amazon Chief Security Officer Stephen Schmidt, the operatives use stolen or fake identities to apply for remote IT jobs with one “straightforward” goal: “get hired, get paid, and funnel wages back to fund the regime’s weapons programs.” Schmidt warned that this is not an isolated threat but a massive, state-backed industrial espionage campaign “likely happening at scale across the industry,” targeting hundreds of U.S. companies.

The ‘Laptop Farm’ Infiltration Strategy
The scheme relies on sophisticated “laptop farms”—clusters of computers physically based in the United States but controlled remotely from North Korea. These farms allow operatives to bypass location checks and appear as domestic applicants. They often hijack dormant LinkedIn accounts of real software engineers using leaked credentials to build credible profiles.
The U.S. Department of Justice has been actively dismantling these operations. In June, it uncovered 29 illegal laptop farms across the country and indicted U.S. brokers who helped place the workers. In July, an Arizona woman was sentenced to more than eight years in prison for running a farm that helped North Korean IT workers land remote jobs at over 300 U.S. companies, generating more than $17 million in illicit gains for herself and the Pyongyang regime.
Amazon’s AI Counter-Offensive
Faced with a nearly one-third increase in these fraudulent applications over the past year, Amazon deployed a dual defense: artificial intelligence models to flag anomalies and human investigators to verify identities. Red flags include incorrectly formatted phone numbers, mismatched education histories, and subtle technical clues—like a 110-millisecond keystroke lag detected on a corporate laptop, revealing remote overseas access.
Schmidt urged all companies to be vigilant and report suspicious applications, stating the fraudsters’ strategies “have become more sophisticated.” The campaign represents a new front in cyber warfare, where the battlefield is the American job market and the prize is not just data, but a steady stream of hard currency to fund ballistic missiles.
Why This Is More Than a Hiring Headache
This is a direct assault on American economic and national security. Every successfully placed North Korean IT worker represents a dual theft: a job stolen from a qualified American candidate and a paycheck converted into foreign currency for a regime under crippling sanctions.
The implications are staggering. If a single operation could net $17 million from infiltrating 300 companies, the scale of earnings from a nationwide campaign could reach hundreds of millions—funds that directly subsidize the development of nuclear warheads and ICBMs designed to threaten the United States and its allies.
Amazon’s public disclosure is a warning siren to corporate America: the remote job you post today could be the next brick in North Korea’s nuclear arsenal. The line between HR and homeland security has vanished.
















