[Editorial] The NIS isn’t investigating, but collecting data from mass surveillance

Posted on : 2016-03-29 15:49 KST Modified on : 2016-03-29 15:49 KST
Hankyoreh reporter Bang Jun-ho enters Mapo Police Station in Seoul after being summoned as part of the investigation into the seizing of his telecommunications data
Hankyoreh reporter Bang Jun-ho enters Mapo Police Station in Seoul after being summoned as part of the investigation into the seizing of his telecommunications data

The National Intelligence Service (NIS), prosecutors, and police have really covered a wide range of targets in their communications surveillance. Seeing the results gathered by the Hankyoreh on communications data provided for its own reporters, opposition party officials, and Korean Confederation of Trade Unions (KCTU) staffers is enough to leave us shocked and terrified. People who have nothing at all in common - let alone anything to talk on the phone about - had their data pulled en masse on the very same day. We can only wonder what the purpose of this personal information dragnet was.

It’s hard to believe this kind of indiscriminate gathering of data was for investigation reasons. The Hankyoreh‘s own investigation found that on Jan. 7, the NIS requested communications information on 28 people in six consecutively numbered documents. The list included six Hankyoreh reporters, 19 KCTU staffers, four opposition party officials, and the family member of a victim in the Apr. 2014 Sewol sinking. For other people, no information was yet available on whether communications data were provided, and with some documents almost certainly remaining to be checked, it’s possible that even more information was given. The NIS claims it checked up on people whose telephone numbers came up as having been in contact with the subjects of an internal investigation into National Security Law violations. But nothing in the duties, daily routines, or relationships of the people whose data were searched offers any kind of common threads connecting them either publicly or personally with specific investigation subjects. The fact that their personal information was provided all at once suggests it may have been intended less for investigative purposes than as sweeping surveillance of groups that have been critical of the administration.

There’s more to support that theory. Prosecutors and police checked up on communications data for editorial executives and writers at the Hankyoreh who never go out to cover stories and who have no reason to talk to sources. If the targets are people who don’t know anyone who is under investigation, the only possible explanation is surveillance. The same documents on the same date had prosecutors pulling information for reporters who separately cover the ruling and opposition parties and whose sources don‘t overlap. At this point, we have to wonder if they weren’t just poking into the entire communications base station near the National Assembly. Right around the same time that controversies were swirling over state history textbook issuance, the Nuri curriculum, and labor market reorganization, the reporters covering these areas had their communications data provided. It’s common sense to question whether this was a case of monitoring and surveillance of a news outlet that was helping to shape critical opinion toward administration policies. The same can be said for the decision to pull data for opposition lawmakers and party officials.

No one would have known about any of this, had the people in question not inquired as to whether their data had been passed along. To date, the NIS has been snatching up unlimited amounts of communications data from the South Korean public without any warrants, or even after-the-fact notification. It has also used this to gather more private information about people. The Constitution’s warrant requirement and personal information rights have been blithely ignored. Instead, citizens have lived under a totalitarian surveillance system where investigative organizations get to deem an unspecified majority “dangerous” and monitor them to their hearts’ content. We can’t afford to justify this away as “investigation secrecy” or ignore it as “common practice.” We need to find out exactly what this information was collected for and how it was used. We also need to amend the law to put this kind of communications data collection under strict judicial controls.

Please direct questions or comments to [english@hani.co.kr]

 

button that move to original korean article (클릭시 원문으로 이동하는 버튼)

Most viewed articles