FINCast Ep. 19 - The DPRK Sanctions Program
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
Throughout 2024, the U.S. Department of the Treasury’s Office of Foreign Assets Control ("OFAC") published 12 enforcement actions regarding alleged sanctions violations by foreign and domestic persons and entities....more
As federal regulators have recently made clear, steamship lines, non-vessel-operating common carriers, indirect air carriers, freight forwarders, and others involved in the global movement of cargo must ensure that their...more
Executive Summary - The North Korean threat to the crypto ecosystem is the highest form of immediate risk to the crypto-economy driven by a regime that seeks to profit from its misuse to reinforce its regime and fuel all its...more
An inherent aspect of any new technology is that it doesn’t take long for bad actors to figure out how it can be weaponized for nefarious purposes. Cyber-related technologies represent an increasingly dangerous area of risk...more
Third-party petitions seeking to ban the importation of goods made with forced labor may affect global supply chains. Petitions are being filed with U.S. Custom and Border Protection seeking to ban the importation into the...more