<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Government Communications Security Bureau &#8211; Evening Report</title>
	<atom:link href="https://eveningreport.nz/category/asia-pacific-report/government-communications-security-bureau/feed/" rel="self" type="application/rss+xml" />
	<link>https://eveningreport.nz</link>
	<description>Independent Analysis and Reportage</description>
	<lastBuildDate>Wed, 27 Mar 2024 22:58:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Investigative author says GCSB-hosted spy system likely to be one used in capture-kill ops</title>
		<link>https://eveningreport.nz/2024/03/28/investigative-author-says-gcsb-hosted-spy-system-likely-to-be-one-used-in-capture-kill-ops/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Wed, 27 Mar 2024 19:17:56 +0000</pubDate>
				<category><![CDATA[APPARITION]]></category>
		<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Asia Report]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Five Eyes]]></category>
		<category><![CDATA[GCSB]]></category>
		<category><![CDATA[GHOSTHUNTER]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Government Communications Security Bureau]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Inspector-General of Intelligence and Security]]></category>
		<category><![CDATA[Investigative journalism]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Nicky Hager]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific Media Watch]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[RNZ News]]></category>
		<category><![CDATA[Secret Power]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spy agencies]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[US National Security Agency]]></category>
		<category><![CDATA[Waihopai]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2024/03/28/investigative-author-says-gcsb-hosted-spy-system-likely-to-be-one-used-in-capture-kill-ops/</guid>

					<description><![CDATA[Asia Pacific Report A New Zealand investigative journalist and author says the US spy system hosted by the Government Communications Security Bureau (GCSB) appears to be a controversial intelligence system used in global capture-kill operations. Writing a commentary for RNZ News today, Nicky Hager, author of Secret Power, a 1996 book on New Zealand’s role ]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.rnz.co.nz/news/" rel="nofollow"><em>Asia Pacific Report</em></a></p>
<figure id="attachment_1078524" aria-describedby="caption-attachment-1078524" style="width: 212px" class="wp-caption alignleft"><a href="https://eveningreport.nz/wp-content/uploads/2022/12/Nicky_Hager_2013_cropped.jpeg"><img fetchpriority="high" decoding="async" class="size-medium wp-image-1078524" src="https://eveningreport.nz/wp-content/uploads/2022/12/Nicky_Hager_2013_cropped-212x300.jpeg" alt="" width="212" height="300" srcset="https://eveningreport.nz/wp-content/uploads/2022/12/Nicky_Hager_2013_cropped-212x300.jpeg 212w, https://eveningreport.nz/wp-content/uploads/2022/12/Nicky_Hager_2013_cropped-297x420.jpeg 297w, https://eveningreport.nz/wp-content/uploads/2022/12/Nicky_Hager_2013_cropped.jpeg 608w" sizes="(max-width: 212px) 100vw, 212px" /></a><figcaption id="caption-attachment-1078524" class="wp-caption-text">Investigative Journalist, Nicky Hager. Image; Wikimedia.</figcaption></figure>
<p>A New Zealand investigative journalist and author says the US spy system hosted by the Government Communications Security Bureau (GCSB) appears to be a controversial intelligence system used in global capture-kill operations.</p>
<p>Writing a commentary for <a href="https://www.rnz.co.nz/news/on-the-inside/512851/hager-spy-system-hosted-by-gcsb-likely-to-be-one-used-in-capture-kill-operations" rel="nofollow">RNZ News today</a>, Nicky Hager, author of <em><a href="https://www.amazon.com.au/Secret-Power-Zealands-International-Network/dp/0908802358" rel="nofollow">Secret Power</a>,</em> a 1996 book on New Zealand’s role in global spy networks, said the controversial and unidentified foreign intelligence operation cited in a report by <a href="https://asiapacificreport.nz/2024/03/22/te-kuaka-calls-for-urgent-law-change-on-spy-agency-warns-over-pacific/" rel="nofollow">New Zealand’s Inspector-General of Intelligence and Security (IGIS) last week</a> appeared to be an “intelligence system with a ghostly codename”.</p>
<p>“The IGIS report said the GCSB decision to host a foreign system from 2012-2020 was ‘improper’ and that the GCSB ‘could not be sure the tasking of the capability was always in accordance with… New Zealand law’,” he wrote.</p>
<p>“The Inspector-General said: ‘I have found some of the GCSB’s explanations about how the capability operated and was tasked to be incongruous with information in GCSB records at the time’,” Hager wrote.</p>
<p>But the Inspector-General could not reveal details of the system to the public because they were “highly classified”.</p>
<p>“The name and function of the foreign spy spying equipment, the identity of the ‘foreign partner agency’ and the location of the ‘GCSB facility’ where foreign equipment was hosted all remained secret,” Hager wrote.</p>
<p>Hager argued that the mystery spy equipment appeared strongly to be a top secret US surveillance system that had been installed at the GCSB’s Waihopai base at the same time as the equipment in the IGIS investigation was installed at a “GCSB facility”.</p>
<p><strong>25 years of investigations</strong><br />
Hager has worked as an investigative journalist for the past 25 years, and has been a New Zealand member of the International Consortium of Investigative Journalists for 20 of those years.</p>
<p>In 2018, he was part of a reference group established by the Inspector-General of Intelligence and Security.</p>
<p>Hager wrote that the top secret NSA spy equipment had the ghostly codename “APPARITION” and fitted with all the details presented in the IGIS report.</p>
<p>“APPARITION was owned by and controlled by the US National Security Agency — the world’s largest intelligence gathering agency and head of the Five Eyes intelligence alliance that includes the GCSB,” he wrote.</p>
<p>According to Hager, the NSA internal report, written after the launch of the APPARITION system in 2008, said that it “builds on the success of the GHOSTHUNTER prototype . . .  a tool that enabled a significant number of capture-kill operations against terrorists”.</p>
<p>“Capture-kill operations involve lethal attacks on targeted people using drones, bombs and special forces raids,” wrote Hager.</p>
<p>“Human rights organisations have documented numerous deaths of civilians during capture-kill operations — many of them ‘algorithmically targeted’ by electronic surveillance systems such as APPARITION.</p>
<p><strong>‘Extra-judicial killings’</strong><br />
“They are also criticised as being ‘extra-judicial killings’.”</p>
<p>For decades, protesters had been calling for the GCSB’s iconic radomes at Waihopai Valley spy base in rural Marlborough to be dismantled, saying that when that intelligence was shared with Five Eyes partners — the United States, the United Kingdom, Canada and Australia — it made New Zealand complicit in the military campaigns of those countries, among other criticisms.</p>
<p>However, Anti-Bases Campaign (ABC) organiser Murray Horton said at the time of news of the domes’ redundancy in 2021 was <a href="https://www.stuff.co.nz/national/126956759/end-of-domes-at-waihopai-valley-spy-base-nothing-to-celebrate" rel="nofollow">nothing to celebrate</a>, since the base itself would continue to operate at the site, “albeit without its most conspicuous physical features that stick out like dogs’ balls”.</p>
<p>The out-of-date domes were removed in 2022.</p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a title="Printer Friendly, PDF &amp; Email" href="#" rel="nofollow"><img decoding="async" class="pf-button-img" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email" /></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Te Kuaka calls for urgent law change on spy agency, warns over Pacific</title>
		<link>https://eveningreport.nz/2024/03/22/te-kuaka-calls-for-urgent-law-change-on-spy-agency-warns-over-pacific/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Thu, 21 Mar 2024 22:17:54 +0000</pubDate>
				<category><![CDATA[Andrew Little]]></category>
		<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Five Eyes]]></category>
		<category><![CDATA[GCSB]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Government Communications Security Bureau]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Indigenous]]></category>
		<category><![CDATA[Inspector-General of Intelligence and Security]]></category>
		<category><![CDATA[Marco de Jong]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Pacific security]]></category>
		<category><![CDATA[Pacific Voices]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spy agencies]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Te Kuaka]]></category>
		<category><![CDATA[USA]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2024/03/22/te-kuaka-calls-for-urgent-law-change-on-spy-agency-warns-over-pacific/</guid>

					<description><![CDATA[Asia Pacific Report Te Kuaka, an independent foreign policy advocacy group with a strong focus on the Pacific, has called for urgent changes to the law governing New Zealand’s security agency. “Pacific countries will be asking legitimate questions about whether . . . spying in the Pacific was happening out of NZ,” it said today. ]]></description>
										<content:encoded><![CDATA[<p><a href="https://asiapacificreport.nz/" rel="nofollow"><em>Asia Pacific Report</em></a></p>
<p>Te Kuaka, an independent foreign policy advocacy group with a strong focus on the Pacific, has called for urgent changes to the law governing New Zealand’s security agency.</p>
<p>“Pacific countries will be asking legitimate questions about whether . . . spying in the Pacific was happening out of NZ,” it said today.</p>
<p>This follows revelations that a secret foreign spy operation run out of NZ’s Government Communications Security Bureau (GCSB) for seven years without the knowledge or approval of the government or Parliament.</p>
<p><a href="https://www.rnz.co.nz/news/political/512379/gcsb-has-a-much-different-attitude-now-andrew-little-says-after-foreign-op-revealed" rel="nofollow">RNZ News reports</a> today that the former minister responsible for the GCSB, Andrew Little, has admitted that it may never be known whether the foreign spy operation was supporting military action against another country.</p>
<p>New Zealand’s intelligence watchdog the Inspector-General of Intelligence and Security <a href="https://www.rnz.co.nz/news/national/512310/foreign-agency-ran-spy-operation-out-of-gcsb-for-years" rel="nofollow">revealed its existence</a> on Thursday, noting that the system operated from 2013-2020 and had the potential to be used to support military action against targets.</p>
<p>The operation was used to intercept military communications and identify targets in the GCSB’s area of operation, which centres on the Pacific.</p>
<p>In 2012, the GCSB signed up to the agreement without telling the then director-general and let the system operate without safeguards including adequate training, record-keeping or auditing.</p>
<p>When Little found out about it he supported it being referred to the Inspector-General for investigation.</p>
<figure id="attachment_98642" aria-describedby="caption-attachment-98642" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-98642 size-full" src="https://asiapacificreport.nz/wp-content/uploads/2024/03/GCSB-rebued-NZH-680wide.jpg" alt="How the New Zealand Herald, NZ's largest newspaper, reported the news of the secret spy agency" width="680" height="404" srcset="https://asiapacificreport.nz/wp-content/uploads/2024/03/GCSB-rebued-NZH-680wide.jpg 680w, https://asiapacificreport.nz/wp-content/uploads/2024/03/GCSB-rebued-NZH-680wide-300x178.jpg 300w" sizes="auto, (max-width: 680px) 100vw, 680px"/><figcaption id="caption-attachment-98642" class="wp-caption-text">How the New Zealand Herald, NZ’s largest newspaper, reported the news of the secret spy agency today . . . “buried” on page A7. Image: NZH screenshot APR</figcaption></figure>
<p><strong>Refused to name country</strong><br />But he refused to say if he believed the covert operation was run by the United States although it was likely to be one of New Zealand’s Five Eyes partners, reports RNZ.</p>
<p><a href="https://www.nzalternative.org/about-us" rel="nofollow">Te Kuaka said in a statement today</a> the inquiry should prompt immediate law reform and widespread concern.</p>
<p>“This should be of major concern to all New Zealanders because we are not in control here”, said Te Kuaka member and constitutional lawyer Fuimaono Dylan Asafo.</p>
<p>“The inquiry reveals that our policies and laws are not fit for purpose, and that they do not cover the operation of foreign agencies within New Zealand.”</p>
<p>It appeared from the inquiry that even GCSB itself had lost track of the system and did not know its full purpose, Te Kuaka said.</p>
<p>It was “rediscovered” following concerns about another partner system hosted by GCSB.</p>
<p>While there have been suggestions the system was established under previously lax legislation, its operation continued through several agency and legislative reviews.</p>
<p>Ultimately, the inquiry found “that the Bureau could not be sure [its operation] was always in accordance with government intelligence requirements, New Zealand law and the provisions of the [Memorandum of Understanding establishing it]”.</p>
<p><strong>‘Unknowingly complicit’</strong><br />“We do not know what military activities were undertaken using New Zealand’s equipment and base, and this could make us unknowingly complicit in serious breaches of international law”, Fuimaono said.</p>
<p>“The law needs changing to explicitly prohibit what has occurred here.”</p>
<p>The foreign policy group has <a href="https://asiapacificreport.nz/2023/07/10/90580/" rel="nofollow">also raised the alarm that New Zealand’s involvement in the AUKUS</a> security pact could compound problems raised by this inquiry.</p>
<p>AUKUS is a trilateral security pact between Australia, the UK and the US that aims to contain China.</p>
<p>Pillar Two’s objective is to win the next generation arms race being shaped by new autonomous weapons platforms, electronic warfare systems, and hypersonic missiles.</p>
<p>It also involves intelligence sharing with AI-driven targeting systems and nuclear-capable assets.</p>
<p><strong>‘Pacific questions’</strong><br />“Pacific countries will be asking legitimate questions about whether this revelation indicates that spying in the Pacific was happening out of NZ, without any knowledge of ministers”, said Te Kuaka co-director Marco de Jong.</p>
<p>“New Zealand’s involvement in AUKUS Pillar II could further threaten the trust that we have built with Pacific countries, and others may ask whether involvement in that pact — with closer ties to the US — will increase the risk that our intelligence agencies will become entangled in other countries’ operations, and other people’s wars, without proper oversight.”</p>
<p>Te Kuaka has previously spoken out about concerns over AUKUS Pillar II.</p>
<p>“We understand that there is some sensitivity in this matter, but the security and intelligence agencies should front up to ministers here in a public setting to explain how this was allowed to happen,” De Jong said.</p>
<p>He added that the agencies needed to assure the public that serious military or other operations were not conducted from NZ soil without democratic oversight.”</p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="pf-button-img" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Out of the shadows: why making NZ’s security threat assessment public is timely</title>
		<link>https://eveningreport.nz/2023/08/13/out-of-the-shadows-why-making-nzs-security-threat-assessment-public-is-timely/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Sun, 13 Aug 2023 01:17:57 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Dissident groups]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[GCSB]]></category>
		<category><![CDATA[Government Communications Security Bureau]]></category>
		<category><![CDATA[Harassment]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[MFAT]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Ministry of Foreign Affairs and Trade]]></category>
		<category><![CDATA[National security strategy]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Political extremism]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Sabotage]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Intelligence Service]]></category>
		<category><![CDATA[SIS]]></category>
		<category><![CDATA[social trust]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2023/08/13/out-of-the-shadows-why-making-nzs-security-threat-assessment-public-is-timely/</guid>

					<description><![CDATA[ANALYSIS: By Alexander Gillespie, University of Waikato The release of the threat assessment by the New Zealand Security Intelligence Service (SIS) this week is the final piece in a defence and security puzzle that marks a genuine shift towards more open and public discussion of these crucial policy areas. Together with July’s strategic foreign policy ]]></description>
										<content:encoded><![CDATA[<p><strong>ANALYSIS:</strong> <em>By <a href="https://theconversation.com/profiles/alexander-gillespie-721706" rel="nofollow">Alexander Gillespie</a>, <a href="https://theconversation.com/institutions/university-of-waikato-781" rel="nofollow">University of Waikato</a></em></p>
<p>The release of the <a href="https://www.nzsis.govt.nz/assets/NZSIS-Documents/New-Zealands-Security-Threat-Environment-2023.pdf" rel="nofollow">threat assessment</a> by the New Zealand Security Intelligence Service (SIS) this week is the final piece in a defence and security puzzle that marks a genuine shift towards more open and public discussion of these crucial policy areas.</p>
<p>Together with July’s <a href="https://www.mfat.govt.nz/en/media-and-resources/release-of-mfats-2023-strategic-foreign-policy-assessment-navigating-a-shifting-world-te-whakatere-i-tetahi-ao-hurihuri/" rel="nofollow">strategic foreign policy assessment</a> from the Ministry of Foreign Affairs, and the <a href="https://www.dpmc.govt.nz/publications/aotearoas-national-security-strategy-secure-together-tatou-korowai-manaaki" rel="nofollow">national security strategy</a> released last week, it rounds out the picture of New Zealand’s place in a fast-evolving geopolitical landscape.</p>
<p>From increased strategic competition between countries, to declining social trust within them, as well as rapid technological change, the overall message is clear: business as usual is no longer an option.</p>
<p>By releasing the strategy documents in this way, the government and its various agencies clearly hope to win public consent and support — ultimately, the greatest asset any country possesses to defend itself.</p>
<blockquote class="twitter-tweet" readability="8.3375796178344">
<p dir="ltr" lang="en" xml:lang="en">NZSIS’s first unclassified threat assessment targets competition, public trust, technology <a href="https://t.co/5wetaOL1oA" rel="nofollow">https://t.co/5wetaOL1oA</a></p>
<p>— RNZ News (@rnz_news) <a href="https://twitter.com/rnz_news/status/1689766535588626432?ref_src=twsrc%5Etfw" rel="nofollow">August 10, 2023</a></p>
</blockquote>
<p><strong>Low threat of violent extremism<br /></strong> If there is good news in the SIS assessment, it is that the threat of violent extremism is still considered “low”. That means no change since the threat level was reassessed last year, with a terror attack considered “possible” rather than “probable”.</p>
<p>It is a welcome development since the threat level was lifted to “high” in the<br />immediate aftermath of the Christchurch terror attack in 2019.</p>
<p>This was lowered to “medium” about a month later — where it sat in September 2021, when another extremist attacked people with a knife in an Auckland mall, seriously<br />wounding five.</p>
<p>The threat level stayed there during the escalating social tension resulting from the government’s covid response. This saw New Zealand’s <a href="https://www.rnz.co.nz/news/national/479858/graham-philip-receives-three-year-jail-term-for-acts-of-sabotage" rel="nofollow">first conviction for sabotage</a> and increasing threats to politicians, with the SIS and police intervening in at least one case to mitigate the risk.</p>
<p>After protesters were cleared from the grounds of Parliament in early 2022, it was<br />still feared an act of extremism by a small minority was likely.</p>
<p>These risks now seem to be receding. And while the threat assessment notes that the online world can provide havens for extremism, the vast majority of those expressing vitriolic rhetoric are deemed unlikely to carry through with violence in the real world.</p>
<p><strong>Changing patterns of extremism<br /></strong> Assessments like this are not a crystal ball; threats can emerge quickly and be near-invisible before they do. But right now, at least publicly, the SIS is not aware of any specific or credible attack planning.</p>
<figure id="attachment_91761" aria-describedby="caption-attachment-91761" class="wp-caption alignright"><img decoding="async" class="wp-image-91761 size-full" src="https://asiapacificreport.nz/wp-content/uploads/2023/08/Security-report-NZSIS-300tall.png" alt="New Zealand's Security Threat Environment 2023 report" width="300" height="418" srcset="https://asiapacificreport.nz/wp-content/uploads/2023/08/Security-report-NZSIS-300tall.png 300w, https://asiapacificreport.nz/wp-content/uploads/2023/08/Security-report-NZSIS-300tall-215x300.png 215w" sizes="(max-width: 300px) 100vw, 300px"/><figcaption id="caption-attachment-91761" class="wp-caption-text">New Zealand’s Security Threat Environment 2023 report. Image: APR screenshot</figcaption></figure>
<p>Many extremists still fit well-defined categories. There are the politically motivated, potentially violent, anti-authority conspiracy theorists, of which there is a “small number”.</p>
<p>And there are those motivated by identity (with white supremacist extremism the dominant strand) or faith (such as support for Islamic State, a decreasing and “very small number”).</p>
<p>However, the SIS describes a noticeable increase in individuals who don’t fit within those traditional boundaries, but who hold mixed, unstable or unclear ideologies they may tailor to fit some other violent or extremist impulse.</p>
<p><strong>Espionage and cyber-security risks</strong></p>
<p>There also seems to be a revival of the espionage and spying cultures last seen during the Cold War. There is already the first <a href="https://www.nzherald.co.nz/nz/proceedings-relating-to-new-zealands-first-military-case-of-espionage-to-recommence-in-private/MT76QKKICZAUPJCC5T77LIIO6A/" rel="nofollow">military case of espionage</a> before the courts, and the SIS is aware of individuals on the margins of government being cultivated and offered financial and other incentives to provide sensitive information.</p>
<p>The SIS says espionage operations by foreign intelligence agencies against New Zealand, both at home and abroad, are persistent, opportunistic and increasingly wide ranging.</p>
<p>While the government remains the main target, corporations, research institutions and state contractors are now all potential sources of sensitive information. Because non-governmental agencies are often not prepared for such threats, they pose a significant security risk.</p>
<p>Cybersecurity remains a particular concern, although the Government Communications Security Bureau (GCSB) recorded 350 incidents in 2021-22, which was a decline from 404 incidents recorded in the previous 12-month period.</p>
<p>On the other hand, a growing proportion of cyber incidents affecting major New Zealand institutions can be linked to state-sponsored actors. Of the 350 reported major incidents, 118 were connected to foreign states (34 percent of the total, up from 28 percent the previous year).</p>
<blockquote class="twitter-tweet" readability="8.3375796178344">
<p dir="ltr" lang="en" xml:lang="en">NZSIS’s first unclassified threat assessment targets competition, public trust, technology <a href="https://t.co/5wetaOL1oA" rel="nofollow">https://t.co/5wetaOL1oA</a></p>
<p>— RNZ News (@rnz_news) <a href="https://twitter.com/rnz_news/status/1689766535588626432?ref_src=twsrc%5Etfw" rel="nofollow">August 10, 2023</a></p>
</blockquote>
<p><strong>Russia, Iran and China<br /></strong> Although the SIS recorded that only a “small number” of foreign states engaged in deceptive, corruptive or coercive attempts to exert political or social influence, the potential for harm is “significant”.</p>
<p>Some of the most insidious examples concern harassment of ethnic communities within New Zealand who speak out against the actions of a foreign government.</p>
<p>The SIS identifies Russia, Iran and China as the three offenders. Iran was recorded as reporting on Iranian communities and dissident groups in New Zealand. In addition, the assessment says:</p>
<blockquote readability="7">
<p>Most notable is the continued targeting of New Zealand’s diverse ethnic Chinese communities. We see these activities carried out by groups and individuals linked to the intelligence arm of the People’s Republic of China.</p>
</blockquote>
<p>Overall, the threat assessment makes for welcome – if at times unsettling – reading. Having such conversations in the open, rather than in whispers behind closed doors, demystifies aspects of national security.</p>
<p>Most importantly, it gives greater credibility to those state agencies that must increase their transparency in order to build public trust and support for their unique roles within a working democracy.<img decoding="async" loading="lazy" src="https://counter.theconversation.com/content/211183/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1"/></p>
<p><em>Dr <a href="https://theconversation.com/profiles/alexander-gillespie-721706" rel="nofollow">Alexander Gillespie</a>, Professor of Law, <em><a href="https://theconversation.com/institutions/university-of-waikato-781" rel="nofollow">University of Waikato.</a></em> This article is republished from <a href="https://theconversation.com" rel="nofollow">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/out-of-the-shadows-why-making-nzs-security-threat-assessment-public-for-the-first-time-is-the-right-move-211183" rel="nofollow">original article</a>.</em></p>
<blockquote class="twitter-tweet" readability="5.8074074074074">
<p dir="ltr" lang="en" xml:lang="en">MPs confront Iran’s Ambassador to New Zealand over protest crackdowns <a href="https://t.co/Mtqr5OLetS" rel="nofollow">https://t.co/Mtqr5OLetS</a></p>
<p>— RNZ News (@rnz_news) <a href="https://twitter.com/rnz_news/status/1686964962252754945?ref_src=twsrc%5Etfw" rel="nofollow">August 3, 2023</a></p>
</blockquote>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="pf-button-img" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NZ cyber agency chief worried China hacks exploiting security weakness</title>
		<link>https://eveningreport.nz/2021/07/21/nz-cyber-agency-chief-worried-china-hacks-exploiting-security-weakness/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Tue, 20 Jul 2021 13:18:11 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[GCSB]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Government Communications Security Bureau]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Multimedia]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2021/07/21/nz-cyber-agency-chief-worried-china-hacks-exploiting-security-weakness/</guid>

					<description><![CDATA[RNZ News New Zealand’s cyber security agency believes China has been behind numerous hack attacks spanning years. The government joined Western allies and Japan in calling out Beijing for so-called state-sponsored hacks, including a major incursion in February when Microsoft email servers were targeted. The US has charged four Chinese nationals — three security officials ]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.rnz.co.nz/national/programmes/checkpoint/" rel="nofollow"><em>RNZ News</em></a></p>
<p>New Zealand’s cyber security agency believes China has been behind numerous hack attacks spanning years.</p>
<p>The government joined Western allies and Japan in calling out Beijing for so-called state-sponsored hacks, including a major incursion in February when Microsoft email servers were targeted.</p>
<p>The US has <a href="https://www.aljazeera.com/economy/2021/7/19/us-uk-and-allies-tie-chinese-government-to-microsoft-hack" rel="nofollow">charged four Chinese nationals</a> — three security officials and one contract hacker — with targeting dozens of companies and government agencies in the United States and overseas under the cover of a tech company.</p>
<p>“What we do is when we see malicious cyber activity on New Zealand networks, that may be through our own capabilities that we have to help protect New Zealand networks or it may be something that’s reported to us, we look at the malware that’s used,” Government Communications Security Bureau Director-General Andrew Hampton told RNZ <em>Checkpoint</em>.</p>
<p>“We look at how the actor behaves. We look at who they might be targeting and what they do if they get onto a network.</p>
<p>“That allows us to build a bit of a picture of who the actor is. We then compare that with information that we receive, often from our intelligence partners who are also observing such activity.</p>
<p>“That allows us to make an assessment, and it’s always a probability assessment about who the actor is.</p>
<p><strong>The APT 40 group</strong><br />“In this case, because of the amount of information we’ve been able to access both from our own capabilities and from our partners, we’ve got a reasonably high level of confidence that the actor who we’ve seen undertaking this campaign over a number of years, and in particular, who was responsible for the Microsoft Exchange compromise, was the APT 40 group — Advanced Persistent Threat Group 40 — which has been identified as associated with the Chinese Ministry of State Security.</p>
<p><em>The RNZ National live stream.  Video: Checkpoint</em></p>
<p>“The actors here are state sponsored actors rather than what we would normally define as a criminal group. What we’re seeing here is a state sponsored actor likely to be motivated by a desire to steal information.”</p>
<p>Hampton said there was a blurring of lines between what a state agency does, and what a criminal group does.</p>
<p>“Some of the technical capabilities that previously only state organisations had, have now got into the hands of criminal groups.</p>
<p>“Also what we’ve seen in a range of countries is individuals who may work part-time in a government intelligence agency, and then may work part-time in a criminal enterprise. Or they may have previously worked in a state intelligence agency and are now out by themselves but still have links links back to the state.</p>
<p>“We don’t know the full detail of the nature of the relationship, but what we do know is the Ministry of State Security in China, for example, is a very large organisation with many thousands of of employees.</p>
<p>“So they are big organisations with people on their payroll but they also would have connections with other individuals and organisations.</p>
<p><strong>Information shared with criminals</strong><br />“Something else worth noting with regard to this most recent compromise involving the Microsoft Exchange, what we saw there is once the Ministry of State Security actors had identified the vulnerability and exploited it, they then shared that information with a range of other actors, including criminal groups, so they too could exploit it.</p>
<p>“This is obviously a real concern to see this type of behaviour occurring,” Hampton said.</p>
<p>All evidence showed the cyber attacks were all originating from mainland China, Hampton told <em>Checkpoint</em>.</p>
<p>He said such attacks would be aimed at stealing data or possibly positioning themselves on a system to be able to access information in the future.</p>
<p>“A common tactic we see, unfortunately, is there may be a vulnerability in a system,” Hampton said.</p>
<p>“It could be a generic vulnerability across all users of that particular system, and a malicious actor may become aware of that vulnerability, so they would use that to get onto the network.</p>
<p>“That doesn’t mean they will then start exfiltrating data from day one or something like that. They may just want to to sit there in the event that at some point in the future they may want to start doing that.</p>
<p><strong>Malicious actors</strong><br />“This exploitation of known vulnerabilities is a real concern. This is why all organisations need to keep their security patches up to date, because what can happen is you can have malicious actors use technology to scan whole countries to see who hasn’t updated their patches.</p>
<p>“They then use that vulnerability to get on the network and they may not do anything with it for some time. Or they might produce a list of all the organisations, say, in New Zealand who haven’t updated their patches.</p>
<p>“Then they make a decision – okay these are the four to five we want to further exploit.”</p>
<p><em><em>This article is republished under a community partnership agreement with RNZ.</em></em></p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="c2" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
