Settings

ⓕ font-size

  • -2
  • -1
  • 0
  • +1
  • +2

Major leak exposes S. Korean intelligence agents

  • Facebook share button
  • Twitter share button
  • Kakao share button
  • Mail share button
  • Link share button
gettyimagesbank

gettyimagesbank

By Kim Hyun-bin

Sensitive information concerning numerous South Korean intelligence agents has been leaked, casting a shadow over the Korea Defense Intelligence Command (KDIC) and its operations.

The incident has initiated a comprehensive investigation by the Military Counterintelligence Command, aiming to uncover the full extent of the breach and its implications.

According to reports Saturday, the leak, discovered about a month ago, involves confidential data such as the identities and personal information of agents known as "white agents," who operate under diplomatic cover, and "black agents," who conceal their connections to the South Korean government.

These agents play crucial roles in intelligence operations, particularly those related to North Korea. Authorities have detected indications that some of the leaked information has reached North Korea, heightening the gravity of the situation.

The focus of the investigation is a person identified as a former soldier who works as a civilian employee at the KDIC. Evidence suggests that classified materials were transferred from secure KDIC computers, which are protected against external hacking threats, to the former soldier's personal laptop. This has raised suspicions, as it is considered highly improbable that such a transfer could occur without his knowledge.

The leaked data found on his laptop was subsequently confirmed to have been disseminated externally, making his laptop a conduit for the breach. He has said that his laptop was hacked. However, the presence of classified information on a personal device, which is against protocol, raises serious questions.

Military authorities are examining all possible scenarios, including the notion that the data might have been intentionally placed on the laptop to facilitate a hack.

The former soldier is reported to have been part of the KDIC's overseas operations department, leading to speculation that he might have needed the information on his personal laptop for undercover missions, as military-issued laptops are not typically used in such operations.

The risk associated with storing classified information on a personal device would have been well-known to the KDIC employee, suggesting that there may have been intentional misconduct. This raises the possibility of internal or external accomplices aiding in the information leak.

The breach has had immediate and severe consequences. Some agents dispatched overseas have had to abruptly cease their activities and return to South Korea.

With their identities compromised, these agents cannot be redeployed, resulting in a significant setback for South Korea's intelligence network. The incident has caused substantial damage, undermining years of efforts in building and maintaining these covert operations.

This is not the first time the KDIC has faced such challenges. In 2018, a team leader was caught selling military secrets to foreign entities over several years. That incident, which took over five years to detect and address, exposed significant vulnerabilities in South Korea's counterintelligence measures.

The authorities are conducting a thorough investigation, considering all potential angles, including the former soldier's claim that his laptop was hacked. They are also investigating whether negligence or intentional actions led to the leak.

Kim Hyun-bin hyunbin@koreatimes.co.kr


X
CLOSE

Top 10 Stories

go top LETTER