S. Korea Spy Agency Attempted To Rig Election

South Korea's spy agency has admitted that it had engaged in a far-reaching attempt to manipulate voters as it sought to help conservatives win parliamentary and presidential elections.

In-house investigators from the National Intelligence Service (NIS) confirmed that the agency's cyber warfare unit organised and operated up to 30 teams for more than two years in the run-up to the 2012 elections, the agency said in a statement late Thursday 3rd Aug.

They hired internet-savvy civilians and sought to sway voter opinions through postings on portals and Twitter.
"The teams were charged with spreading pro-government opinions and suppressing anti-government views, branding them as pro-North Korean forces' attempts to disturb state affairs", it said.

At the time the country was led by the conservative Lee Myung-Bak, and in the event the December 2012 presidential election was won by his now-disgraced colleague Park Geun-Hye, who defeated liberal Moon Jae-In. Moon won South Korea's presidential vote in May this year after Park was impeached and dismissed over corruption and abuse of power, and ordered an investigation.

He has vowed to reform the NIS to prevent it meddling in elections and make it focus on collecting and analysing intelligence on North Korea and foreign affairs. A spokesman for Park's party, now in opposition and renamed Liberty Korea, said Friday the inquiry was "politically motivated".
"The NIS says it will dissociate itself from politics but it is meddling in politics again by starting this probe," Kang Hyo-Sang said in a statement.

Former NIS chief Won Sei-Hoon is being tried for the second time for leading an online smear campaign against Moon, after his initial conviction was overturned on appeal.

But the NIS investigation results suggest the scale of the voter manipulation was far wider than previously thought.
The internal probe also found Won ordered the agency to muzzle the press, provide support for pro-government conservative civic groups and put some major opposition politicians under secret surveillance.

The modern-day NIS has been tainted by a series of scandals, including the forging of documents to build a false spying case against a former Seoul city official who had escaped to South Korea from the North in 2004.

Ein News

You Might  Also Read:

Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections:

Misinformation & Cyber Attacks During Montenegro Elections:

Information Warfare Isn’t Just Russian – It’s Also American As Apple Pie:

Hacking Elections Is Easy:

 

 

 

 

« Cyber Criminals Target Your Text
Briton Who Stopped WannaCry Arrested »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.