Menu
Spy's suicide adds to Hacking Team scandal in South Korea

Spy's suicide adds to Hacking Team scandal in South Korea

Worry that Hacking Team application was used to spy on public, politicians before election

A South Korean intelligence officer who used a controversial surveillance system from Italy's Hacking Team was found dead over the weekend in an apparent suicide as controversy swirls in the country over use of the software.

The officer, identified by local media only as Lim, was a 20-year cyber-security veteran of the country's National Intelligence Service (NIS) and ran the department that used the software, according to reports.

He was found dead on Saturday in a car south east of Seoul. Burnt coal was found in the car and an autopsy conducted a day after his death on Saturday found he died of asphyxiation, according to reports. Burning charcoal in a confined space is a relatively common method of committing suicide in South Korea and Japan.

Dealings between Hacking Team and the NIS were made public when a cache of the company's emails was recently published on the Internet.

The software, called "Remote Control System," allows users to target the computer or cellphones of people and install a spyware application that gives the user access to the target's communications. It is said to be resistant to attempts at removal and the leaked emails show Hacking Team sold and demonstrated the system to law enforcement agencies across the world.

In South Korea, the revelation has been politically explosive.

A distrust of the spy agency exists in the country after a string of scandals and allegations that it spied on citizens and attempted to influence public opinion in the run up to the 2012 national election.

The NIS bought the software in 2012.

As part of the Hacking Team leak, a log file of IP addresses was published that is said to include some at Korea Telecom, national broadcaster KBS, Seoul National University and major portal and instant messaging service Daum Kakao. One of the leaked emails notes that Hacking Team's South Korean customers are interested in gaining access to Kakao chat.

But Lim, in his suicide note, denied the Hacking Team software was used to spy on civilians.

"There was no spying on locals in relation to elections at all," the note said, according to Yonhap News.

Lim had been found to have deleted information related to use of the software, and the note called that decision "a mistake."

"I decided the NIS was more important than whatever impact [my action] would cause, and so I deleted information that created misunderstandings about our counter-terrorism and covert operations on North Korea," the note said, according to Yonhap. "It was a mistake on my part. But there is nothing to be worried about over any of my actions."

The NIS had previously told South Korea's parliament that its use of the Hacking Team software was for external surveillance purposes.

Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is martyn_williams@idg.com

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securitygovernmentHacking Team

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments