Week 8: Knowledge-based policy

This week, we have been focusing on transferring the knowledge gained throughout the class into our final deliverable – a policy paper which we hope to present to decision makers in the field of DPRK sanction enforcement.

Why a policy paper:

“The government is slow to catch up on these things”

Former Treasury Expert

While there is a lot of subject-matter knowledge available through both classified and unclassified channels, throughout our journey we have touched upon a number of areas ranging from maritime interdiction, to traffic pattern mapping to tackling cryptocurrency-based money laundering schemes. We believe that all of them contribute towards our ability to exert maximum pressure on the North Korean Regime, and thus want to convey our gathered knowledge so that policymakers have a cross-spectrum grasp of actions that can be taken in the area.

Our Focus:

“North Korea’s stockpile of cryptocurrency is worth $700 Million, analysts say.”

United Press International

According to various estimates, this figure would place DPRK stockpile of cryptocurrency at ~3% of their GDP. This is a substantial amount, especially as with the evolution of the digital finance sector it becomes easier to use those funds for obtaining resources (such as refined petroleum, electronics or luxury goods) illegally. We have reasons to suspect that cryptocurrencies are also one of their main sources of fiat (hard) currency.

Paper outline:

  • Review of Applicable Sanctions Theory
  • Summary of North Korean Sanctions Environment
  • Description of cryptocurrency’s role in that space
  • Outline of potential avenues of disruption related to North Korean Cryptocurrency use
  • Recommendations related to how decision makers should be thinking about cryptocurrency tools and where responsibility for addressing the issue should lie

Intended presentation recipients:

Deployment:

As we’re preparing a policy-based solution, rather than a deployable software/hardware based product, we wouldn’t be following the traditional procurement approach or securing funding for setting up a company. However, for the purpose of familiarising the policymakers with our findings, we have created a proposed timeline of events if our proposals are to be implemented.


Same diagram as above with cost flows superimposed.

Interviews this week:

This week, we have focused on getting feedback on our suggested approach. We have talked to cryptocurrency investors, cybersecurity experts and Paul Syversant, the co-creator of TOR. Overall, the ultimate goal has been to obtain validation of the main ideas within our paper and fine-tuning some of the details of our approach.

Next Steps:

  • Finalize Final Presentation of Lessons Learned
  • Complete draft white paper and circulate for feedback
    • Week 10 validation focus on improving white paper
  • Seek buy-in for wide distribution
    • Leverage networks of previous interviewees, the H4D teaching team, and the greater Stanford and Hoover community

From 51% Attack to Tracking through Transaction Flooding

This week, we committed ourselves to looking more in depth into how North Korea uses the cryptocurrency it steals. We also pitched our shift in perspective with our sponsor. The OSD seemed to be interested in the idea, and put us in touch with Colonel Giordano, who works in the Cyber Command and has more familiarity with cryptocurrencies. What are in the process of setting up a time to chat with him and further contacts.

One of the MVPs that we presented last week, considered the possibility of performing a 51% attack that would “freeze” all anonymous coins (Monero, Zcash…), in order to make North Korea unable to do anything with the currencies it holds and that, unlike pseudonymous coins, are not traceable. We called this “Digital Asset Freeze”. This idea seemed to receive positive feedback from the teaching team, and as a consequence we decided to further develop it.

We had the opportunity to pitch the idea to academics, current and former government people (particularly, Department of Justice and Treasury), and practitioners in the field. Although the majority acknowledged it was “an interesting” perspective and a novel idea, the concerns they expressed some recurrent concerns with respect to feasibility:

“Treasury and White House would not allow messing with financial system, because collateral is way too big”

     Former Intelligence Officer

“Disruptive things like this look like the US government going to war with commercial industry, which they are going to be really hesitant to do”

  Ming Luo, In-Q-Tel

“It’s not really a realistic concept…They would never do that, going up against the tech community as a whole”

   Kayla Izenman, Royal United Service Institute

Although the likelihood that a 51% attack would be deployed seems very small, the assumption upon which this MVP rests – that untraceability of anonymous coins is the bulk of the problem – is fully validated.

A related learning we had this week is that North Korea likely exchanges cryptocurrency to access foreign currency. Consequently, we tried to map what the laundering of a stolen coin might look like:

After having stolen cryptocurrencies from insecure exchange, North Korea likely launders it and exchanges it to a fully anonymous coin, primarily Monero. They then exchange it back to Bitcoin, before turning it into hard currency. Although the stolen BitCoin is traceable, the US government loses track of it once it is converted into fully anonymous coins.

We heard from more than one interviewees that all coins have vulnerabilities that can be somehow exploited. While the tech sector would look at how those can be exploited for profit, the goals of the US government are obviously different. We tried to understand how the US can leverage said vulnerabilities to touch the issue we’re trying to solve. Because of the skeptical feedback we got on the possibility of a 51% Hold Attack, we started to look at an alternative option.

We have come across the potential of performing a tracking through transaction flooding.

This would technically work as follows:

Assuming a Monero transaction tx with one input tx.in containing six keys (tx.in = {pk1, pk2, pk3, pk4, pk5, pk6}), while one of the keys (e.g. pk4) represent the real coin being spent, the remaining three keys are being used as decoys to obfuscate the real key being used in the transaction. However, if five of the public keys (e.g. pk1, pk2, pk3, pk5 and pk6) are owned by the attacker, it becomes easy to find out which is real.

Source: https://eprint.iacr.org/2019/455.pdf

In short, having a large enough rolodex of keys, it would become increasingly easier to identify which ones are “decoy” and to track what is happening to cryptocurrency.

This process has already been described on a recently published paper, so we have supporting data showing its feasibility from a practical perspective. On a more utilitarian side, this solution presents less disadvantages from a 51% attack, as it would likely not cause the same extent of backlash in the cryptocurrency industry.

In order to deploy this product, however, we will have to perform some activities, such as test the algorithm in the Monero chain, create output gathering wallets and ramp up transactions to avoid detection. We will also have to ensure we have beneficiary support. So far, we found some evidence that the Department of Homeland Security (DHS) would support a similar project. In fact, a few months ago, they issues a solicitation request for tools for blockchain forensic analysis.

As we further explore this latter MVP, additional next steps for this week will be:

  • Pitch MVPs to sponsor, Treasury and possibly IC and adjust
  • Continue to flesh out deployment strategy by speaking with cyber/crypto analysts in the DoD, IC, and U.S. Treasury
  • Explore vulnerabilities in other anonymous coins

Interviewee List

  1. H.R. McMaster, Former National Security Advisor
  2. Intelligence Officer
  3. Will Rich, Dept. of Treasury
  4. Maurice Herlihy,  Professor of Computer Science
  5. Alex Pruden, Crypto Investor
  6. Kayla Izenman, Center for Financial Crime at RUSI
  7. Ming Luo, In-Q-Tel
  8. Herb Lin, Cyber Policy Expert
  9. Elizabeth Philip, Harvard Kennedy School
  10. Mehek Sethi, Harvard Kennedy School
  11. Michele Korver, Dept. of Justice Money Laundering Section
  12. Jessica Renier, Dept. of Treasury Office of Terrorist Financing
  13. John Giordano, CYBERCOM

Week 7: What can be done about North Korean Cryptocurrency use?

Last week we committed to focus the rest of our project on addressing North Korea’s use of cryptocurrency to evade sanctions.

After deciding this, we found ourselves in need of a map of North Korean cryptocurrency use. We began with a simple diagram of how North Korea attains, holds, and uses cryptocurrencies:

We discussed this mapping with several experts and its general framing seems to hold up. One key point of discussion, however was around the relative magnitudes of each of these buckets. Most people seem to think cryptocurrency mining is unlikely to be a major source of North Korean revenue as the mature coins require more and more processing power to produce marginal returns. Processing power, moreover, requires electricity, which in turn requires fuel. Being in short supply of the latter, mining is likely unfeasible for DPRK. Some cryptocurrencies, like Monero, are designed to reduce the specialized computing advantages of other coins but it still remains likely that mining is not a major source of North Korean revenue (although it can still be useful for laundering pseudonymous coins into more anonymous coins as discussed below).

Additionally, the universe of actors ready to spend or receive cryptocurrency on goods and services is relatively limited. One of our big questions going forward and one we’re not sure we’ll be able to answer is whether North Korea has developed partners willing to accept or send cryptocurrency in exchange for goods and services (such as refined petroleum being acquired through ship-to-ship transfers). More information on this subject would help us prioritize the levying of sanctions on entities facilitating these transactions and the eventual conversion of cryptocurrencies into fiat currencies that likely follows. (It is important to note that North Korea has also received cryptocurrencies in the past as part of ransomware attacks like WannaCry, but these attacks have so far resulted in little actual currency transfers despite their more significant economic damage).

Instead, we are proceeding on a rough assumption that North Korea is primarily attaining cryptocurrency through theft and primarily converting it to fiat currencies through exchanges. We will continue to evaluate both of these conclusions as we proceed.

Our next step was to hypothesize ways the US can interfere with North Korean cryptocurrency use, so we adapted our map:

We quickly received feedback from several interviews that trying to address the general cryptocurrency security practices that North Korea is exploiting is unlikely to be fruitful. Many of the exchanges and wallets North Korea is attacking have little incentive to prioritize security and some of them are engaged in shady practices themselves. While improvements in industry practices around security are important, we are unlikely to greatly influence them at any noticeable scale.

Instead, many of our interviewees directed us to looking at exchanges on the backend, where North Korea is likely exchanging cryptocurrency for fiat currency through some third party. These third parties are influenceable and this led us to our first idea for a potential MVP (and reviving a past MVP): creating a blacklist.

Unlike for our previous blacklist idea, we are not concerned about any run-away effects of legitimate businesses refusing to deal with North Korea in this space because it would be in US interests if North Korea was completely forced out of the cryptocurrency world and into fiat currency transactions for increased transparency. Thus, we propose developing and publishing a black list of exchanges found to have facilitated the exchange of North Korean cryptocurrency for fiat currency to disincentivize others from working with them.

There is an additional complication here, however, as there are multiple reports that North Korea has increasingly used more anonymous cryptocurrencies, like Monero, to launder Bitcoin and other pseudonymous coins to reduce their traceablility. This might undercut the ability of US actors to identify exchanges for listing, although we have heard conflicting things about the difficulty of tracking different cryptocurrencies. This is an area for further investigation.

We also developed an alternate MVP around the idea that US negotiators might find it useful to suddenly ratchet up pressure on North Korean cryptocurrency use at key moments in negotiation. We are still developing ideas around this theory but are considering something roughly like the following:

In order for such a plan to work, we would have to assume the following:

•Bitcoin and other pseudonymous cryptocurrencies are trackable by US Government actors, as long as Monero and more private coins are not usable for laundering transactions •Monero and quasi-anonymous cryptocurrencies are not reliably trackable •51% Attacks are possible at roughly fixed costs as set out here: https://www.crypto51.app/

There are serious disadvantages to initiating a plan like this, however:

•Likely massive public backlash from privacy/cryptocurrency community (mitigatable in part by not using a 51 hold on Bitcoin itself, at the cost of sending a weaker message) •Cost is reasonable for short time frames but susceptible to other actors increasing their mining to raise (mitigatable by publishing that the US gov’t is doing it and only maintaining holds for short, tactical timeframes) •Private actors in space will likely create workarounds and new coins, so effectiveness will be limited in repeated attempts

But we also see some serious potential upsides:

•Potential to completely halt and continuously cripple North Korea’s use of cryptocurrencies •Coordinated effort will likely have increased signaling impact that US is willing to use its capabilities in this sphere •As non-cryptocurrency avenues of restricting North Korean access to currency ratchet up the pressure, they may find themselves more and more reliant on cryptocurrency. Strategically freezing their entire ability to move cryptocurrency may have significant impact on their decision making

Ultimately we are still working on this potential plan of action for suddenly and broadly interfering with North Korean cryptocurrency use. We have heard serious skepticism about the wisdom of such a plan from practitioners in the crypto space, especially as related to the 51% holds. We definitely need to consider these concerns as we proceed.

Interviews this week:

We focused this week on learning from experts in cryptocurrency and cybersecurity about the general framework that underlies North Korea’s actions in this world.

  1. Dan Morehead, CEO Pantera Capital
  2. Donnie Hasseltine, Chief Security Officer, Xenon Ventures
  3. Marc Zlomek, USCG
  4. Chris Painter, Former US Coordinator for Cyber Issues
  5. Joe Grundfest, Professor at Stanford Law School
  6. Lenny Raymond, Partner at Volvox
  7. Adam Meyers, VP for Intelligence
  8. Steve Weinstein, Professor at Stanford University
  9. Jeff Ladish, Former CISO at Reserve
  10. Josh Bernstein, Crypto Investo

Key Learnings:

Learning #1: The theft, rather than mining, of cryptocurrencies has provided DPRK with $500M+ worth of cryptocurrency (mostly Bitcoin).
Learning #2: Insecure cryptocurrency exchanges in ASEAN countries facilitates these practices.
Learning #3: The private sector is unsure how the DPRK has or will convert cryptocurrency holdings to fiat currency or use cryptocurrency to procure resources, which implies the DPRK’s use is not public knowledge within the cryptocurrency community.

Week 6: Choosing the major. So, what’s normal?

Key Learning Moments

  1. The process of interagency coordination is actually very well structured. An interagency task force employs a unique model to coordinate all actors’ actions: private and public, foreign and domestic, strategic and operational.
  2. Illegal activity not linked to DPRK makes it harder to detect anomalies and generates a lot of (wasteful and costly) false positives.
  3. The seemingly only area that is not mapped well enough is DPRK’s illegal extraction, laundering and spending of cryptocurrencies (mainly Bitcoin).
  4. The operators on the ground distrust the intelligence passed down to them.

Our Major

Nothing on the sea meters if China opens another pipeline.

OSD Sponsor

Problem tackled:

The DPRK, faced with increased international pressure along their physical transportation routes (maritime and land) has reverted to circumventing the sanctions by:

  • Employing state-sponsored security professionals, including the Lazarus Group, refereed to commonly as APT (Advanced Persistent Threat) 38 to extract cryptocurrency from wallets, exchanges etc.
  • Rerouting the stolen currency through a mixture of commonly used (US-Based) and more obscure (mainly East-Asian) exchanges and clearing houses and gradually converting it to hard currency (USD, EUR, CNY)
  • Spending the illegally-obtained currency on luxury items, refined petroleum, industrial machines etc.

Currently, the sanction-enforcement authorities have little tools available to tackle this stream of DRPK financing.

If you are my private think tank, I want you to figure out a way to stop NK from making money using cyber tools. I want a mechanism that rivals in the cyberspace what we can already do in the physical space.

An individual experienced with the Interagency Task Force

Researching the policy vectors that could be applied along with the ways DPRK currently performs their operations will form the bedrock of the policy recommendations we will be presenting as our deliverable.

Experiment Results

While the previous lines of inquiry were largely focused on exploring the internal process of sanctions enforcement coordination, this week we have made significant findings that led us to believe that there is more potential in actual enforcement (upper part of the graph). Namely, we are focusing on better exploring the DPRK’s illegal activities in cyberspace as well as getting to know what does normal (legal and illegal) traffic look like in the East China Sea.

Where we stood and where we stand. How we chose our major.

Throughout the past weeks we have explored several different MVP ideas. Most of them have been abandoned, before we committed to the predictive modelling approach.

  • Improved blacklists have been proven to give negative value due to inability to fine-tune the pressure after inclusion on the list.
  • Flag state approval reform was ineffective as interdictions don’t actually happen (the US ships come close and photograph suspicious assets).
  • Process Improvement turns out to be ineffective due to the presence and efficiency of the interagency task force.
  • The Internal Wiki would overlap with solutions currently in existence.
  • Improved negotiation toolkit (providing better materials to negotiators) has proven to require access to information beyond our grasp.

Next Steps

Next week we’re intending to continue working to get a better understanding of the new problem space. We will be trying to learn:

  • What the most common vectors of cryptocurrency-related crime are in general and whether there are some distinguishing features DPRK employs.
  • How do nation-states currently regulate cryptocurrency security and if there are any mechanisms in use to tackle this kind of crimes.
  • Who are the individuals responsible for enforcement on the US side (and hopefully talk to them as well)

The key action items are listed below:

The main interviewees are going to be: Stanford Faculty, private sector security professionals, and people with relevant intelligence experience.

Interviews this week

This week’s interviews have been largely divided into three categories:

  • Military personnel and analysts who would validate our predictive modelling MVP
  • Specialists in cybercrime and cryptocurrencies-based money laundering who would help us better explore this new field
  • Process coordination insiders who helped us validate hypotheses from last week.

Week 5.5 – A Shift in Perspective: Keeping the Big Picture in Mind, While Identifying an Actionable Pinpoint

TL;DR:

Inspired by a conversation with Capt. Miller, we decided two things: a) commit to “zooming in” into the enforcement piece and understand how to make it easier for those who perform it daily (more details in our “Week 6” Blog Post)!; b) not to disregard our “zooming out”: keep the wealth of insights we gather, and crystalize it into a policy report, which will be produced alongside our final product.

Background

Last week was probably one of the most important ones for Embargo.NK so far. Our learning curve was the steepest yet, as we went through a process of trying, failing, hitting a wall, retrying. As a recap, in week 4 we came up with three MVPs:

  • An internal sanctions wiki, which would allow different government agencies to have at their disposal various information regarding sanctioned entities, to speed up the démarche process;
  • A watchlist, which would be relied upon by private entities, as part of a due diligence process to ensure they are not trading with “bad actors”;
  • A “prioritization” tool that would help identify where to best deploy enforcement resources, in light of the strategic objectives the sanctions purports to accomplish.

After our rounds of interviews for week 5 and, particularly, after enlightening chats with Ambassadors Hill and Stephens, we reconsidered our perspective. We decided to zoom out, once again, and look at the bigger picture. We told ourselves the best way to address the issue was to empower the negotiators, and to affect the enforcement decision-making process by encouraging information sharing among the different parties involved.

This idea was, at best, idealistic. True, we got several signals from our interviews that “the process is broken” and that the negotiator needs a menu of option, a range of analytical and anecdotal evidence that they can leverage during the negotiations level. We learned that, sometimes, sanctions are more effective when un-or under-enforced, and that you want to make sure that you are equally able to lift them, as you’re able to apply them. However, if we want to have an impact in this process, and an immediately helpful one, zooming out is not the right option. We need to zoom in, and dig further, and assess our pinpoint.

We learned this the hard way – when we presented what we thought were our breakthrough learnings and, yet, could not come up with an actionable MVP. We thought we had figured out the whole picture, but were also looking at it through the wrong angle. Hitting this wall was crucial in our growth as a team, and in the development of our project.

Brainstorming & an Important Interview

We then had a major brainstorming session. We boiled down and mapped out this enormous quantity of information that we had been gathering in the previous weeks, concerning the actors involved, the process, and the strategic goals at play.

What we had investigated, up to this point, was the relationship between the “results” and the decision-making process. We did not have a clear MVP in mind, but we were thinking to help influence that process by providing a system, a process, or just more information on how the sanctions should align with our strategic goals.

Through our brainstorming session, however, we reached a different conclusion: regardless of our other findings, improving enforcement is valuable, as it is the central piece that connects decision and results.

The brainstorming session came right after an important conversation with Captain Jeffrey Miller, COMPACFLT Maritime Homeland Defense Office in Charge, Coast Guard Area Pacific. Capt. Miller shared with us what vessel monitoring operation looks like in the East China Sea. Miller has a target list of potential vessels that are trafficking with North Korea: the list is based on intelligence he receives from DC, as well as on an algorithm that detects routine people that have been caught performing similar operations. Although in most cases the interdiction operation cannot be performed, as it is not authorized, Miller’s team follows suspected vessels across the horizon, takes pictures and/or annotates the vessel’s number.

Based on Captain Miller’s description, and the cumulative knowledge we gathered from previous interviews, we plunged into the enforcement piece and developed the following diagram:

Captain Miller reiterated a common theme from DoD interviews, that illegal ship-to-ship transfers of refined petroleum are a key focus. Basically, vessels act like a gas station: another vessel can stop and get fuel from them. A key regional problem related to ship-to-ship transfers is that a lot of them happen in the East China Sea unrelated to North Korean sanctions evasion. But as, the latest report from the UN Panel of Experts highlights, North Korea’s use of these illegal transfers have increased exponentially in 2018. The techniques used for sanction circumvention range from less sophisticated, like painting their vessels and changing their names, to more professional ones, like using flags of convenience and spoofing AIS (Automatic Identification System).

Our interviewee reported that, in this process, what he and his team would benefit from is a model that tracks the “normal traffic” of ship-to-ship transfer in the East China Sea. Having a pattern that identifies the regular behavior during these transfers; ie. licit and not-North Korean related ones, will make it a lot easier to spot the outliers.

Inspired by this request, we decided two things:

a) commit to “zooming in” into the enforcement piece and understand how to make it easier for those who perform it daily (more details in our “Week 6” Blog Post)! ; b) not to disregard our “zooming out”: keep the wealth of insights we gather, and crystalize it into a policy report, which will be produced alongside our final product.

Week 5: Running our MVPs by the Ambassadors

Key Learning M0ments

  1. We found out that private companies already rely on more robust tools than the list we proposed to create. Given our previous week’s hesitation around IC concerns, we’ve decided to scrap the list MVP.
  2. Speaking to a number of former State Dept. folks didn’t yield the “grab it out of our hands” moment that we hoped regarding our internal wiki idea. While this isn’t necessarily an invalidation, it also isn’t support for the idea.
  3. Speaking to two former Ambassadors who were both involved in the Six-Party talks indicated that information coordination is a significant challenge within the enforcement ecosystem.

Experiment Results

This week we used our MVPs to test three hypotheses with potential beneficiaries to a mixed result.

  1. The démarche process is overly complex and takes too much time for State Country Officers.
  2. Private companies unwittingly violate sanctions and a public list of suspected evaders would help these companies comply.
  3. Enforcement priorities are not driven by or responsive to the negotiation team.

Our interviews this week included a number of former State Department officials, including two former Ambassadors who were both involved in the Six-Party talks. We also talked to a number of academics and former Commerce Department officials.

As to the first hypothesis, we had hoped that talking to folks from the State Department about our idea to create an internal wiki for known sanctions evaders would result in the fabled “grab it out of our hands” moment. While the people we were able to talk to hadn’t worked directly on the démarche issue recently, none of them seemed to agree that it posed a significant challenge to State Department officials. No one told us directly that this MVP was a bad idea or would have negative consequences, but neither did they indicate that it would be a useful tool. As a team we have decided to continue trying to talk to people more directly involved in the démarche process while making sure that we respond appropriately to the feedback we have received. Essentially, we are putting this MVP on the back burner as we move forward with other ideas.

The MVP used to test the second hypothesis, the idea of creating a more robust list to help private companies with their due diligence regarding sanctions, was met with a much firmer negative response. We heard from some of our interviewees that not only did commercially available tools already exist that companies rely on, these companies also don’t normally use ignorance as a defense. Given that we as a team had previously had qualms with the idea that creating a list would have negative consequences for the intelligence community, we have decided to abandon this potential product. We all agreed that it would be better to start over with new ideas than to move forward with a product that our beneficiaries don’t need and that will negatively impact other actors in this space.

We discussed our third hypothesis with a number of our interviewees, notably Ambassadors Hill and Stephens. We have been getting the sense over the last few weeks that the major challenge in the sanctions enforcement space is not the availability of intelligence or the capacity to interdict when necessary, but that the tools of enforcement are not coordinated with the goals the drive the imposition of sanctions in the first place. An anecdote from the Ambassadors involved their experience during the six-party talks, when negotiations were abandoned by the North Koreans following enforcement actions against BDA, a financial institution used by the regime. In that case, the untimely enforcement of sanctions led to the opposite of the strategic intention of those sanctions, which was to cripple the North Korean regime sufficiently enough to force them to the negotiation table.

While we still haven’t been able to talk to the current negotiation team, talking to members of the six-party talk team was our closest approximation and we think that it continues to represent the present day challenges in this area.

Where We Stand

The result of our interviews this week have led us to graph last week’s potential MVPs on a spectrum of difficulty and value add.

We’ve decided to focus on the upper right hand corner of the graph as we move forward. We want to find ways to improve the process around how sanctions are prioritized and see if that process can be implemented with a greater focus on strategic goals. The first aspect which is to determine if we have accurately mapped out the process as it currently stands. This will be a major task for the coming week as we check our understanding against that of actors in this space. While there are a lot of actors involved and many different layers to this process, at the broadest level we think that the ecosystem can be displayed using this chart:

We need to fill in the gaps and run this by more interviewees in the coming week. Our tasks moving forward include:

Week 5: Customer Discovery

During week 5, we are seeking to test our hypotheses and potential MVPs by interviewing three categories of possible beneficiaries: state department officers involved or familiar with the démarche process; private companies – and in particular, risk manager officers – and OSD.

Our goal for the week is to further brainstorm our MVPs, understand their utility, and possibly narrow them down to one.

Weekly Hypotheses:

  1. The démarche process is lengthy and complex. An internal wiki or tool that would provide more easily accessible information, would speed up the process significantly (Possible MVP: Internal Wiki).
  2. Private companies often violate sanctions, by unwittingly trading with North Korean companies. A publicly available list of sanctioned entities would facilitate due diligence and prevent n0n-compliant transfers due to ignorance (Possible MVP: Public Bad Actor List).
  3. Not all sanctions are best when enforced. Sometimes a prioritized approach can lead to better strategic outcomes. The US needs a tool that analytically suggests what to devote resources to when enforcing (Possible MVP: Prioritization Tool).

Experiment(s)

We will conduct Customer Discovery interviews to test our hypotheses. We are looking forward to understanding which of the possible MVP has a potential for being useful, so that we could further elaborate on it.