
Imagine a prolific software developer, seemingly working from the American Midwest, contributing to top companies. Now, imagine that person is actually a North Korean operative named Anton Koh, living in a state-run dorm in China, stealing identities and earning millions for the Kim regime. This isn’t fiction; it’s a chilling reality exposed by defectors like Koh.
North Korea trains elite cyber operatives, dispatching them globally to infiltrate remote IT jobs. Their mission? Generate desperately needed cash for Pyongyang’s nuclear ambitions. They target high-paying U.S. companies, often paying Americans to host “laptop farms” – where company-issued computers are shipped, making it appear the work is done stateside. These agents can funnel up to $800 million annually to the regime, which then seizes up to 90% of their earnings.
Anton Koh, a defector, offers a rare glimpse into this clandestine world. He was a child prodigy, selected for software development, and sent overseas where he experienced luxuries unknown in North Korea – like steady electricity and free internet. But this “freedom” came at a cost: 16-hour days, constant surveillance, and immense pressure to meet quotas.
During his time abroad, Koh used his skills to bypass monitoring software and surfed the web. What he discovered about his “Dear Leader” and the truth about North Korea shattered his loyalty. The regime he was funding was built on deception, leading him to defect to South Korea.
The pandemic supercharged these operations, as remote work became standard and AI tools helped mask identities. While these operatives live a life unimaginable to most North Koreans, they are also victims, abused by a system that brands their forced contributions as “patriotic duty.” Koh’s story reminds us that behind every digital connection, there could be a hidden agenda, and a human story of struggle and revelation.




