US soldier sentenced for helping North Korean IT workers
嗯,用户让我总结一篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得通读整篇文章,抓住主要信息。 文章讲的是美国地方法院判决了三名男子参与一个让朝鲜IT工作者冒用身份在美国公司工作的计划。其中一个是现役军人Travis,他从2019年到2022年参与其中,帮助朝鲜工人使用他的身份,甚至开了银行账户来收钱。他还提供了笔记本电脑,并安装了远程访问软件。他因此被判一年监禁和三年缓刑,并没收了部分资金。 另外两个人Salazar和Phagnasay也参与其中,分别赚了3450和4500美元,并被判处三年缓刑和没收资金。整个计划让朝鲜方面获得了130万美元的收入。检察官称这威胁到了国家安全。 用户的需求是简明扼要的总结,所以我要提炼出关键点:三名男子、冒用身份、帮助朝鲜IT工作者、涉及金额、判决结果以及对国家安全的影响。 然后控制在100字以内,确保信息准确且全面。可能需要合并一些细节,比如只提到Travis是军人,其他人的信息可以简化。 最后检查一下有没有遗漏的重要信息,比如计划的时间跨度、涉及的公司数量以及研究人员获取的内部文件等细节可能不需要包括在内,因为用户只要求总结主要内容。 </think> 一名美国地方法院法官判处三名男子因协助朝鲜IT工作者冒用身份在美国公司工作而入狱或缓刑。其中一名男子为现役军人,在参与计划期间提供身份和设备供朝鲜工人使用,并从中获利。三人被判没收非法所得并面临监禁或缓刑。该计划使朝鲜方面获得约130万美元收入,并对美国国家安全构成威胁。 2026-3-23 11:15:46 Author: therecord.media(查看原文) 阅读量:19 收藏

A District Court judge sentenced three men for their involvement in a scheme that allowed several North Korean IT workers to use their identities and gain employment at U.S. companies. 

One of the men, 35-year-old Alexander Paul Travis, was an active duty member of the U.S. Army and was stationed at Fort Gordon in Georgia while participating in the scheme from September 2019, until November 2022. 

Travis pleaded guilty to accusations that he allowed North Korean IT workers to use his identity on resumes and during employer vetting processes that involved interviews, drug tests and fingerprints. The North Korean IT workers also opened bank accounts in his name to receive payment from employers. 

Travis received a laptop from eight companies that thought they were hiring him and installed software that allowed North Korean workers to access the devices remotely.

For his role in the scheme, he received $51,397. Travis was sentenced to one year in prison and three years of supervised release. He was also ordered to forfeit $193,265 — the amount earned by North Koreans in his name.

Travis was sentenced alongside two other men — Jason Salazar, 30, of Clovis, California and Audricus Phagnasay, 25, of Fresno, California. All three men pleaded guilty to one count of wire fraud conspiracy. 

Salazar and Phagnasay similarly allowed North Koreans to use their identities and received company laptops. Prosecutors said Phagnasay was paid at least $3,450 and North Korean IT workers used his name to get hired at 10 U.S. companies from 2019 to 2021. The workers earned a collective $680,000. Salazar earned $4,500 and his name was used to earn more than $400,000 from September 2020 to October 2022. 

Salazar and Phagnasay were given three years of probation and were ordered to forfeit the amount of money earned in their names. 

Prosecutors said the scheme earned North Koreans a total of about $1.3 million in salary payments.

Margaret Heap, U.S. Attorney for the Southern District of Georgia, said the North Korean IT worker scheme presents a “significant challenge to our national security.”

“These men practically gave the keys to the online kingdom to likely North Korean overseas technology workers seeking to raise illicit revenue for the North Korean government – all in return for what to them seemed like easy money,” Heap said. 

U.S. law enforcement has slowly unraveled North Korea’s IT worker scheme over the past five years, disrupting laptop farms and arresting Americans that assisted in the campaign. North Korea’s government has earned hundreds of millions of dollars by illegally getting citizens hired at U.S. and European companies.

Researchers at Flare and IBM obtained a trove of internal messages and documents from North Korean IT workers revealing the internal structure of the IT worker scheme and the hierarchies within it.

IT workers attend prestigious universities in North Korea and go through a rigorous interview process themselves before joining the operation. Participants “are considered elite members of North Korean society and have become an indispensable part of the overall North Korean government’s strategic objectives.”

The report notes that many collaborators in the U.S. and Europe are recruited through LinkedIn and GitHub. Many either “willingly or unwillingly, provide their identities for use in the IT worker fraud scheme.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/us-soldier-sentencer-for-helping-nk-it-workers
如有侵权请联系:admin#unsafe.sh