S. Korea Spy Agency Attempted To Rig Election

South Korea's spy agency has admitted that it had engaged in a far-reaching attempt to manipulate voters as it sought to help conservatives win parliamentary and presidential elections.

In-house investigators from the National Intelligence Service (NIS) confirmed that the agency's cyber warfare unit organised and operated up to 30 teams for more than two years in the run-up to the 2012 elections, the agency said in a statement late Thursday 3rd Aug.

They hired internet-savvy civilians and sought to sway voter opinions through postings on portals and Twitter.
"The teams were charged with spreading pro-government opinions and suppressing anti-government views, branding them as pro-North Korean forces' attempts to disturb state affairs", it said.

At the time the country was led by the conservative Lee Myung-Bak, and in the event the December 2012 presidential election was won by his now-disgraced colleague Park Geun-Hye, who defeated liberal Moon Jae-In. Moon won South Korea's presidential vote in May this year after Park was impeached and dismissed over corruption and abuse of power, and ordered an investigation.

He has vowed to reform the NIS to prevent it meddling in elections and make it focus on collecting and analysing intelligence on North Korea and foreign affairs. A spokesman for Park's party, now in opposition and renamed Liberty Korea, said Friday the inquiry was "politically motivated".
"The NIS says it will dissociate itself from politics but it is meddling in politics again by starting this probe," Kang Hyo-Sang said in a statement.

Former NIS chief Won Sei-Hoon is being tried for the second time for leading an online smear campaign against Moon, after his initial conviction was overturned on appeal.

But the NIS investigation results suggest the scale of the voter manipulation was far wider than previously thought.
The internal probe also found Won ordered the agency to muzzle the press, provide support for pro-government conservative civic groups and put some major opposition politicians under secret surveillance.

The modern-day NIS has been tainted by a series of scandals, including the forging of documents to build a false spying case against a former Seoul city official who had escaped to South Korea from the North in 2004.

Ein News

You Might  Also Read:

Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections:

Misinformation & Cyber Attacks During Montenegro Elections:

Information Warfare Isn’t Just Russian – It’s Also American As Apple Pie:

Hacking Elections Is Easy:

 

 

 

 

« Cyber Criminals Target Your Text
Briton Who Stopped WannaCry Arrested »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.

Acuvity

Acuvity

Acuvity is the most comprehensive AI security and governance platform for your employees and applications. Secure your GenAI adoption with confidence.

IBN Technologies

IBN Technologies

IBN Technologies offerings include customized, high-end Cloud Managed Services and Cyber Security Solutions tailored to companies with critical Internet components.