ID :
187962
Sun, 06/12/2011 - 10:28
Auther :

Military has loopholes in information security: lawmaker

SEOUL, June 12 (Yonhap) -- South Korea's military has exposed serious loopholes in its information security management system, as its top organizations failed to share information on blacklisted figures, a ruling party lawmaker insisted Sunday.
Rep. Kim Hak-song of the ruling Grand National Party said that the Joint Chiefs of Staff (JCS) had allowed a South Korean man blacklisted by the Defense Security Command (DSC) to frequently visit JSC buildings to participate in the construction of an integrated military computer network.
The lawmaker, a member of the Assembly's defense committee, said that the 43-year-old man under prosecutors' investigation on charges of stealing military secrets from JCS computer networks was allowed to visit the JSC nine times even after the DSC classified him in March 2007 as "unqualified" to visit the top military installation due to his history of violating the National Security Law.
The suspect, identified only by his surname Kim, was employed in March 2005 by an unidentified computer system developer in charge of developing and managing computer programs for the government and private companies.
In December of the same year, he took part in the JCS's project to develop a system for sending real-time information on battlefield situations to military command centers but was suspended from his job in March last year on suspicion of leaking a large amount of confidential military information.
According to Rep. Kim, the JSC and the DSC never have shared information on blacklisted figures, noting the suspect Kim had also visited computer rooms of the JCS and the Defense Acquisition Program Administration 17 times over the past five years.
Prosecutors said that among the information allegedly leaked by the suspect was the JSC's written proposal for the new system and node IP addresses of key computers being used by the military.
He also had file folders named the JCS, the Financial Supervisory Service and the Supreme Prosecutors' Office in his computer, which was confiscated by the investigators, an indication that he stored the leaked information for possible transmission, according to the prosecutors.

X