<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Open Source Intelligence &#8211; Evening Report</title>
	<atom:link href="https://eveningreport.nz/category/asia-pacific-report/open-source-intelligence/feed/" rel="self" type="application/rss+xml" />
	<link>https://eveningreport.nz</link>
	<description>Independent Analysis and Reportage</description>
	<lastBuildDate>Sun, 01 Jan 2023 08:18:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>‘Lots of information isn’t secret, it’s just hard to find’ – Nicky Hager on one of NZ’s most famous whistleblowers</title>
		<link>https://eveningreport.nz/2023/01/01/lots-of-information-isnt-secret-its-just-hard-to-find-nicky-hager-on-one-of-nzs-most-famous-whistleblowers/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Sun, 01 Jan 2023 08:18:03 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Cold War]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Editor's Picks]]></category>
		<category><![CDATA[Environment]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Fiji]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Nicky Hager]]></category>
		<category><![CDATA[nuclear tests]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Open Source Intelligence]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Owen Wilkes]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific military]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific nuclear tests]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Palau-Belau]]></category>
		<category><![CDATA[Peace Movement Aotearoa]]></category>
		<category><![CDATA[Peace research]]></category>
		<category><![CDATA[Peace Researcher]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[publishing]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Reviews]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Space systems]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[whistleblowers]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2023/01/01/lots-of-information-isnt-secret-its-just-hard-to-find-nicky-hager-on-one-of-nzs-most-famous-whistleblowers/</guid>

					<description><![CDATA[BOOK CHAPTER: By Nicky Hager Whistleblower Owen Wilkes was a tireless and formidable researcher for the Pacific, peace and disarmament. Before the internet, he combed publicly available sources on weapons systems and defence strategy. In 1968, he revealed the secretive military function of a proposed satellite tracking station in the South Island, and while working ]]></description>
										<content:encoded><![CDATA[<p><strong>BOOK CHAPTER:</strong> <em>By Nicky Hager</em></p>
<p><em>Whistleblower <strong>Owen Wilkes</strong> was a tireless and formidable researcher for the Pacific, peace and disarmament. Before the internet, he combed publicly available sources on weapons systems and defence strategy.</em></p>
<p><em>In 1968, he revealed the secretive military function of a proposed satellite tracking station in the South Island, and while working in Sweden he was charged with espionage and deported after photographing intriguing but publicly visible installations.</em></p>
<p><em>In a new book about his life, Peacemonger, edited by May Bass and Mark Derby, <strong>Nicky Hager</strong> writes about Wilkes’ research techniques:</em></p>
<hr/>
<p>Owen Wilkes was an outstanding researcher, a role model of how someone can make a difference in the world by good research. But how did he actually do it? Owen managed to study complex subjects such as Cold War communications systems, secret intelligence facilities and foreign military activities in the Pacific.</p>
<p>There are many important and useful lessons we can learn from how he did this work. The world needs more public interest researchers, on militarism and other subjects. Owen’s self-taught research techniques are like a masterclass in how it is done.</p>
<p><strong>Lots of information isn’t secret, just hard to find<br /></strong> Owen worked for many years, sitting at his large desk at the Peace Movement office in Wellington, researching the military communications systems set up to launch and fight nuclear war. How was this possible?</p>
<p>We are a bit conditioned currently to imagine the only option would be leaked documents from a whistleblower. The first secret of Owen’s success is that he had learned that large amounts of information on these subjects can be found and pieced together from obscure but publicly available sources.</p>
<p>The heart of his research method was long hours spent poring over US government records and military industry magazines, gathering the precious crumbs of detail like someone panning for gold.</p>
<p>Behind the large desk were shelves and shelves of open-topped file boxes, each with a cryptic title. These boxes were full of photocopied documents and handwritten notes from his researching. This may all sound very pre-internet; indeed it was largely pre-digital.</p>
<figure id="attachment_81461" aria-describedby="caption-attachment-81461" class="wp-caption alignnone c2"><img fetchpriority="high" decoding="async" class="wp-image-81461 size-full" src="https://asiapacificreport.nz/wp-content/uploads/2022/12/Owen-Wilkes-Peacemonger-cover-680wide.png" alt="International peace researcher Owen Wilkes" width="680" height="655" srcset="https://asiapacificreport.nz/wp-content/uploads/2022/12/Owen-Wilkes-Peacemonger-cover-680wide.png 680w, https://asiapacificreport.nz/wp-content/uploads/2022/12/Owen-Wilkes-Peacemonger-cover-680wide-300x289.png 300w, https://asiapacificreport.nz/wp-content/uploads/2022/12/Owen-Wilkes-Peacemonger-cover-680wide-436x420.png 436w" sizes="(max-width: 680px) 100vw, 680px"/><figcaption id="caption-attachment-81461" class="wp-caption-text">International peace researcher Owen Wilkes . . . an inspirational resource person for a nuclear-free Pacific and many other disarmament issues. Image: Peacemonger screenshot</figcaption></figure>
<p>But what Owen was doing would today be called “open source” research and his work is far superior to that carried out by many people with Google and other digital tools at their fingertips. Probably his favourite source of all was a publicly available US defence magazine called <em>Aviation Week and Space Technology</em>. The magazine (now online) is written for military staff and arms manufacturers, keeping them informed about developments in weapons, aircraft and “C3I” systems, which stands for Command, Control, Communications and Intelligence systems: one of Owen’s main areas of speciality.</p>
<p>The magazine also covered Owen’s speciality of “space based” military systems, such as military communication and surveillance satellites. In Owen’s files, which can be viewed at the National Library in Wellington, <em>Aviation Week and Space Technology</em> appears often. In a file box called USA Space Systems is a clipping from 1983 about the US Air Force awarding a contract for a ballistic missile early warning system (nuclear war-fighting equipment). The article revealed that the early warning system would be based at air force bases in Alaska, Greenland and Fylingdales, England — three clues about US foreign military activities.</p>
<p>By reading and storing away details from numerous such articles, spanning many years, Owen built up a more and more detailed understanding of military and intelligence systems.</p>
<p>The other endlessly useful source Owen used was US Congress and Senate hearings and reports about the US military budget. This is where each year the US military spells out its military construction plans, new weapons, technology programmes and the rest; often with figures broken down to the level of individual countries and military bases.</p>
<p>Senior military officials appear at hearings to explain the threats and strategies that justify the spending. As with the military magazines, Owen systematically mined these reports year after year for interesting detail.</p>
<p>He was especially keen on the US Congress’ Committee on Appropriations, Subcommittee on Military Construction Appropriations. His files on US antisatellite weapons, for instance, contain a document from this subcommittee about new Anti-Satellite System Facilities (project number 11610) based at Langley Air Force base, Virginia. It had been approved by the president in the renewed Cold War of the mid-1980s to target Soviet satellites. Details like this were pieces in a 1000-piece jigsaw puzzle.</p>
<p>When he was based at the Peace Movement Aotearoa office in Wellington, from 1983 until about 1992, Owen spent long hours at the US Embassy library studying the Military Construction Appropriations and other US government documents. Each year the library received copies of the documents as microfiche (microphotos of each page on a film). Owen was a familiar visitor, hunched over the microfiche reader making notes and printing out interesting pages.</p>
<p>Many times this gave the first clue of construction somewhere in the world, pointing to that country hosting some new US military, nuclear or intelligence activity. The annual US military appropriation information is available to a researcher today. In fact it is now more easily accessed since it is online. But, if anything, Owen’s pre-digital techniques make it clearer how this research is done well. It’s a good reminder that the best sources of information are most often not in the first 10 or 20 hits of a Google search, the point where many people stop looking.</p>
<p><strong>Experience and persistence<br /></strong> An important ingredient in all these methods is persistence. The methods usually work best if, like Owen, a researcher sticks at them over time. Sticking at a subject means you start to recognise names and places in an otherwise boring document, appreciate the significance of some fragment of information and understand the big picture into which each piece of information fits.</p>
<p>Someone who reads deeply and studies a subject over a number of years can in effect become, like Owen, an expert. They may, like him, have no formal university qualifications. But they can know more about their subject than nearly anyone else, which is a good definition of an expert. They recognise the names and places and appreciate the significance of new evidence.</p>
<p>A textbook example of this was when Owen returned to New Zealand in the early 1980s and went to see a recently discovered secret military site near the beach settlement of Tangimoana in the Manawatu.</p>
<p>Owen, who had spent years studying secret bases around the world, was the New Zealander most likely to know what he was looking at. There, on one side of the base, was a large circle of antenna poles: a CDAA circularly-disposed antenna array. It instantly told him the Tangimoana facility was a signals intelligence base. It had the same equipment and was part of the same networks as the bases he had studied in Norway and Sweden.</p>
<p><strong>Ensuring his research was noticed<br /></strong> The purpose of Owen’s work was to make a difference to the issues he researched. A final and vital part of the work was getting attention for the findings of his research. Owen often spoke in the news and he wrote about the issues he was studying. Research, writing and speaking up are essential ingredients in political change. The part of this he probably enjoyed most was travelling and speaking in public to interested groups.</p>
<p>During the 1980s, he had major speaking tours to countries including Japan, the Philippines, Australia and Canada (and often around New Zealand). During these trips he would present information about military and intelligence activities in those countries. A 1985 trip to Canada, which he shared with prominent Palau leader Roman Bedor, was typical. He was in Canada for seven weeks, speaking in most parts of the country and numerous times on radio and television.</p>
<p>One of the things he emphasised was that Canadians, as residents of a Pacific country, should be thinking about what was going on in the Pacific. One of Owen’s recurrent themes was the importance of being aware of the Pacific.</p>
<p>The final ingredient of a good researcher is caring about the subjects they are working on. This can be heard clearly in everything Owen wrote about the Pacific. He described the Pacific being used for submarine-based nuclear weapons and facilities used to prepare for nuclear war. He talked about the big powers using the Pacific as the “backside of the globe”, epitomised by tiny Johnston Atoll west of Hawai’i where the US military does “anything too unpopular, too dangerous and too secret to do elsewhere”.</p>
<p>He talked about things that were getting better: French nuclear testing on the way out; chemical weapons being destroyed. But also the region being used as a site for great power rivalry; and, under multiple pressures, the small Pacific countries being at risk of becoming “more repressive, less democratic”. He cared, and that was at the heart of being a public-interest researcher for decades.</p>
<p>Many of the problems he described are still occurring today. More research, more good research, on these issues and many others is crying out to be done.</p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="pf-button-img c3" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PODCAST &#8211; Buchanan + Manning: NATO Expansion + CSTO Summit + Regional Security</title>
		<link>https://eveningreport.nz/2022/05/19/podcast-buchanan-manning-nato-expansion-csto-summit-regional-security/</link>
					<comments>https://eveningreport.nz/2022/05/19/podcast-buchanan-manning-nato-expansion-csto-summit-regional-security/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Thu, 19 May 2022 02:39:38 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CSTO]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Finland]]></category>
		<category><![CDATA[Geopolitics]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Intelligence agencies]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military Alliances]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[Military Tactics]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Open Source Intelligence]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Republic of Turkey]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russian Federation]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Sweden]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States of America]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1074754</guid>

					<description><![CDATA[A View from Afar – In this podcast, political scientist Paul Buchanan and Selwyn Manning examine the Implications of the Russia-Ukrainian conflict and how it impacts on regional security architecture.]]></description>
										<content:encoded><![CDATA[<p><iframe title="Buchanan + Manning: NATO Expansion + CSTO Summit + Regional Security" width="640" height="360" src="https://www.youtube.com/embed/gkANpGaWTi8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar –</strong> In this podcast, political scientist Paul Buchanan and Selwyn Manning examine the Implications of the Russia-Ukrainian conflict and how it impacts on regional security architecture.</p>
<p>In particular, we assess Finland and Sweden’s move to become NATO members and whether Turkey will prevent this from occurring.</p>
<p>Also, this week, Russia’s Vladimir Putin hosted the leaders of Russia’s equivalent to NATO &#8211; the CSTO, which stands for the Collective Security Treaty Organization and includes: Armenia, Belarus, Kazakhstan, Kyrgyzstan, Russia, and Tajikistan.</p>
<p>Belarus’ authoritarian leader, Aleksandr Lukashenko, was the only leader of the CSTO to speak persuasively about Russia’s invasion of Ukraine.</p>
<p>Paul and I analyse the CSTO meeting and discuss its relevancy from a security and geopolitical perspective and what implications all this has on the East Asia region.</p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="(max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/05/19/podcast-buchanan-manning-nato-expansion-csto-summit-regional-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LIVE Thurs@Midday Buchanan + Manning: Signals+Tech Intel Ops and the Defence of Ukraine</title>
		<link>https://eveningreport.nz/2022/03/30/live-thursmidday-buchanan-manning-signalstech-intel-ops-and-the-defence-of-ukraine/</link>
					<comments>https://eveningreport.nz/2022/03/30/live-thursmidday-buchanan-manning-signalstech-intel-ops-and-the-defence-of-ukraine/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Wed, 30 Mar 2022 05:46:00 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Five Eyes]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Military Alliances]]></category>
		<category><![CDATA[Military Forces]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[Military Tactics]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[New Zealand Defence Force]]></category>
		<category><![CDATA[NZ Defence Force]]></category>
		<category><![CDATA[Open Source Intelligence]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Russian Federation]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[Ukraine invasion]]></category>
		<category><![CDATA[Ukraine War]]></category>
		<category><![CDATA[United Nations]]></category>
		<category><![CDATA[United States of America]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1073713</guid>

					<description><![CDATA[A View from Afar – In this podcast, political scientist Paul Buchanan and Selwyn Manning analyse how New Zealand and other nations are providing intelligence expertise in the defence of Ukraine. But are the SIGINT and TECHINT operations a part of the NATO partnership, or, a part of the Five Eyes intelligence network&#8217;s operations &#8211; ]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Buchanan + Manning: Signals+Tech Intel Ops and the Defence of Ukraine" width="640" height="360" src="https://www.youtube.com/embed/lQ2KVesyQug?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar</strong> – In this podcast, political scientist Paul Buchanan and Selwyn Manning <span class="s2"> analyse how New Zealand and other nations are providing intelligence expertise in the defence of Ukraine.</span></p>
<p>But are the SIGINT and TECHINT operations a part of the NATO partnership, or, a part of the Five Eyes intelligence network&#8217;s operations &#8211; where the US, UK, Canada, Australia and New Zealand share resources to acquire and coordinate global and targeted intelligence.</p>
<p>Does confirmation from New Zealand Prime Minister Jacinda Ardern that <a href="https://foreignaffairs.co.nz/2022/03/28/mil-osi-new-zealand-nz-to-provide-more-military-assistance-to-ukraine/" target="_blank" rel="noopener">New Zealand has deployed seven Defence intelligence officers</a> to the United Kingdom and Belgium underscore a direct involvement against Russia and in defence of Ukraine by other independent nations like New Zealand?</p>
<div>Jacinda Ardern said the deployment would see New Zealand Defence personnel connect with their United Kingdom counterparts and assist with intelligence analysis and specifically geo-spacial analysis: &#8220;&#8230; to assist with the heightened demand for intelligence assessments. Some of our people will directly support intelligence work on the Ukraine war&#8230;&#8221; (<em>ref. <a href="https://foreignaffairs.co.nz/2022/03/28/mil-osi-new-zealand-nz-to-provide-more-military-assistance-to-ukraine/" target="_blank" rel="noopener">ForeignAffairs.co.nz</a></em>)</div>
<div></div>
<div>Ardern said: “One will work with the existing Defence Attaché and NZ military representative to NATO, and one will work within the UK’s Permanent Joint Headquarters.&#8221;</div>
<div></div>
<div>New Zealand has also secured extra communications equipment that will be sent to Ukraine.</div>
<div></div>
<div>QUESTIONS TO CONSIDER:</div>
<div></div>
<ul>
<li>What will the intelligence, including geo-spacial analysis, most likely be used for and how would it be derived and delivered?</li>
<li>How has western intelligence assisted Ukraine in this war and also in the targeting of Russian generals who were identified and killed during hostilities in Ukraine (<em>ref. <a href="https://www.washingtonpost.com/world/2022/03/26/ukraine-russan-generals-dead/" target="_blank" rel="noopener">Washington Post</a></em>)?</li>
<li>How significant has Open Source Intelligence been in the Russia Ukraine war (to date) including the use of citizen acquired video and data and its dissemination to offensive and defensive operations in the conflict?</li>
<li>And why is SIGINT and TECHINT proving to be more important than ever in this specific conflict?</li>
</ul>
<p><strong>Join Paul and Selwyn for this LIVE recording of this podcast while they consider these big issues, and remember any comments you make while live can be included in this programme.</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/03/30/live-thursmidday-buchanan-manning-signalstech-intel-ops-and-the-defence-of-ukraine/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NZ police had no dedicated team to scan internet before mosque attacks</title>
		<link>https://eveningreport.nz/2021/04/27/nz-police-had-no-dedicated-team-to-scan-internet-before-mosque-attacks/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Tue, 27 Apr 2021 06:18:09 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Domestic terrorism]]></category>
		<category><![CDATA[Extremism]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Internet searches]]></category>
		<category><![CDATA[justice]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Mosque attack]]></category>
		<category><![CDATA[Mosque massacre]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Open Source Intelligence]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Police inquiry]]></category>
		<category><![CDATA[Police powers]]></category>
		<category><![CDATA[Political extremism]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2021/04/27/nz-police-had-no-dedicated-team-to-scan-internet-before-mosque-attacks/</guid>

					<description><![CDATA[By Phil Pennington, RNZ News reporter It took seven months for the New Zealand police to set up their first team for scanning the internet after the mosque attacks – but it was almost immediately in danger of being shut down. An internal report released under the Official Information Act (OIA) said this was despite ]]></description>
										<content:encoded><![CDATA[<p><em>By <a href="https://www.rnz.co.nz/authors/phil-pennington" rel="nofollow">Phil Pennington</a>, <a href="https://www.rnz.co.nz/news/" rel="nofollow">RNZ News</a> reporter</em></p>
<p>It took seven months for the New Zealand police to set up their first team for scanning the internet after the <a href="https://en.wikipedia.org/wiki/Christchurch_mosque_shootings" rel="nofollow">mosque attacks</a> – but it was almost immediately in danger of being shut down.</p>
<p>An internal report released under the Official Information Act (OIA) said this was despite the team already proving its worth “many times over” in countering violent extremists.</p>
<p>The unit still does not have dedicated funding, despite a warning last July it risked being “turned off”.</p>
<p>This is revealed in 170 pages of <a href="https://assets.documentcloud.org/documents/20690665/intel-doc.pdf" rel="nofollow">OIA documents charting police intelligence shortcomings</a> over the last decade, from pre-2011 extending through to mid-2020, and their attempts to overhaul the national system since 2018.</p>
<p>These show police had no dedicated team before 2019 to scan the internet for threats – what is called an OSINT team, for “Open Source Intelligence”.</p>
<p>“The OSINT team was stood up quickly last year with seconded staff to ensure… [an] appropriate emphasis on this new capability,” an internal report from July 2020 said.</p>
<p>In fact, police began the planning at the end of 2018, then “accelerated” it after the attacks, but it took till late October for the team to start, and training began in November 2019, a police statement to RNZ last week said.</p>
<p>This was all well after a January 2018 official assessment of the domestic terrorism threatscap said: “Open source reporting indicates the popularity of far right ideology has risen in the West since the early 2000s”.</p>
<p>When the police OSINT unit was finally set up, there was no guarantee it would last.</p>
<p>“This team is not permanent,” the July 2020 report said.</p>
<p>“This has meant uncertainty for staff and our intelligence customers.”</p>
<p><strong>‘Seriously compromises’<br /></strong> The team had no dedicated budget, and lacked trained staff.</p>
<p>It also was still looking for tools to “quickly capture and categorise online intelligence elements”.</p>
<p>“The lack of a strong OSINT capability seriously compromises our intelligence collection posture, especially in major events,” said the report last July.</p>
<p>This is the sort of scanning that can pick up threats on 4chan or other extremist sites.</p>
<p>Despite the shortcomings, the internet team’s worth had already been proven “many times over in recent months, particularly in the counterterrorism and Countering Violent Extremism space”, the report said.</p>
<p>Three people have faced extremist charges in the last year or so.</p>
<p><strong>‘Turned off’<br /></strong> An April 2019 report said police would begin recruiting for OSINT analytics and other specialists in April-May 2019.</p>
<p>Police had lacked a tool to search the dark web – where the truly egregious chat and trades take place on the internet – so bought one.</p>
<p>But last July’s report said “currently we run the risk” of OSINT “being turned off unless there is a dedicated budget”.</p>
<p>In a statement on Friday, police told RNZ: “The OSINT team has been funded as part of the overall allocation for intelligence since it was established.</p>
<p>“Maintaining this capability is a NZ Police priority, and dedicated funding is being sought as part of next year’s internal funding allocation process (note, this is funding from within Police’s existing baseline).</p>
<p>“Additional supplementary funding was also received in the last financial year to support the work of OSINT.”</p>
<div class="photo-captioned photo-captioned-full photo-cntr eight_col">
<figure class="wp-caption alignnone c2"><img decoding="async" loading="lazy" src="https://www.rnz.co.nz/assets/news_crops/121372/eight_col_Police_intel_June_2020_review_.png?1619420134" alt="An excerpt from the July 2020 Transforming Intelligence report " width="720" height="450"/><figcaption class="wp-caption-text">An excerpt from the July 2020 Transforming Intelligence report. Image: RNZ screenshot</figcaption></figure>
</div>
<p>They had known they needed the team, they said.</p>
<p>“Prior to March 15, New Zealand Police used some OSINT tools to support open source research of publicly available information and had identified the requirement to develop a dedicated capability.</p>
<p>“The development of this capability was accelerated by the events of March 15.”</p>
<p><strong>‘9/11 moment’<br /></strong> The OIA documents show the OSINT intelligence weakness was not an isolated example.</p>
<p>These warned police needed to avoid “a ‘9/11’ moment” – a situation where police obtain information about a threat but do not understand it due to a failure to analyse how the dots join up, as happened to CIA and FBI before the terror attacks on New York in 2001.</p>
<p>The solution was to have “a complete intelligence picture”.</p>
<p>But the July 2020 report then laid out very clearly how police did not have this:</p>
<p>“Recent operational examples conclude there is no current ability to access all information in a timely and accurate manner,” it said.</p>
<p>“Currently there is no tool that can search across police holdings [databases] when undertaking analysis of investigations.</p>
<p>“We are still depending on manual searches.”</p>
<p><strong>‘Locked down or invisible’<br /></strong> “Sources are either locked down or invisible to analysts. Our intelligence picture is consequently incomplete.”</p>
<p>The 31-page, July 2020 report detailed the police’s ‘Transforming Intelligence’ programme, dubbed TI21, that was begun in December 2018 and meant to be complete by this December.</p>
<p>It indicated the right technology would not be in place – or in some cases even identified – for 6-18 months.</p>
<p>As things stood, “there are many single points of failure in our intelligence system”, the report said.</p>
<p>Threat information was broken up into silos, without a centralised document management system or powerful enough analytic and geospatial software to connect the threats.</p>
<p>A section of the 2020 report detailing problems within the police’s High-Risk Targeting Teams has been mostly blanked out.</p>
<p>The OIA documents describe what is and is not working, especially when it comes to national security and counterterrorism, but also around intelligence on gang and drug crime, family violence, combating child sex offending, and the like, at a point many months after both the mosque attacks and the beginning of the system overhaul.</p>
<p>The Royal Commission of Inquiry into the mosque attacks in late 2020 called police national security intelligence capabilities “degraded” – not just once but six times.</p>
<p>It showed weaknesses elsewhere when it came to OSINT: The Security Intelligence Service had just one fulltime officer doing Open Source Internet searching, and the Government Communications Security Bureau had few resources for this, too. It was not till June 2019 that the Government’s Counter-Terrorism Coordination Committee suggested “leveraging open-source intelligence capability”.</p>
<p>Police, unlike SIS, did not do an internal review of how they had performed in the lead-up to March 15.</p>
<p>They did get a review done of <a href="https://www.rnz.co.nz/national/programmes/checkpoint/audio/2018776471/police-commissioner-responds-to-operation-deans-terror-attack-report" rel="nofollow">how they did 48 hours after the attacks</a>, which praised their efforts.</p>
<p><strong>Tools missing</strong></p>
<p><strong>Among the key systems police have been lacking are:</strong></p>
<ul>
<li>A national security portal “to search across police holdings”</li>
<li>A national security person-of-interest tool</li>
<li>A child sex offender management tool</li>
<li>Cybercrime reporting systems – a “strategic demand” that “police intelligence is unable to effectively report on it”</li>
</ul>
<p>Police in a statement said they had now “achieved a number of milestones”.</p>
<p>Key among them was introducing a National Security Portal to manage persons of interest.</p>
<p>Also, they now had standardised ways of improving quality and a National Intelligence Operating Model to ensure a consistent approach.</p>
<p>“The OSINT team, a new case management tool and “refined intelligence support to major events… has increased the capability, capacity and resilience of Police Intelligence to reduce and respond to counter-terrorism risks”.</p>
<div class="photo-captioned photo-captioned-full photo-cntr eight_col">
<figure class="wp-caption alignnone c2"><img decoding="async" loading="lazy" src="https://www.rnz.co.nz/assets/news_crops/114653/eight_col_Mosque-Report-15.jpg?1607454063" alt="The Royal Commission of Inquiry's 800 page report into the response to the Christchurch terror attack." width="720" height="450"/><figcaption class="wp-caption-text">The Royal Commission of Inquiry into the mosque attacks in late 2020 called police national security intelligence capabilities “degraded”. Image: RNZ / Sam Rillstone</figcaption></figure>
</div>
<p>The “Transforming Intelligence” documents refer repeatedly to having three new Target Development Centres set up in Auckland, Wellington and Christchurch.</p>
<p>However, this was jettisoned last year, while the overhaul did stick with introducing Precision Targeting Teams in August 2018, police said.</p>
<p>These teams aim to target “our most prolific offenders” early on “to reduce crimes such as burglary, robbery and other violent and high-volume offending”.</p>
<p><strong>Pressure on</strong><br />Police are plugging the holes in national intelligence while under pressure.</p>
<p>The volume of leads coming in had increased “considerably” since March 2019, the July 2020 report said.</p>
<p>“This has put increased strain on our people to manage cases of concern.”</p>
<p>The intelligence weaknesses have persisted under four police commissioners since the national intelligence system was set up in 2008.</p>
<p>Intelligence staff have been quitting at three times the average rate in the public sector, and the documents laid out urgent plans to improve career pathways and value the likes of field officers and collections staff more.</p>
<p>The July 2020 report said demand on workers at the Integrated Targeting and Operations Centre was “unsustainable”.</p>
<p>Deep-seated cultural problems across the police were recently uncovered by RNZ’s Ben Strang, whose reporting triggered an official investigation that found <a href="https://www.rnz.co.nz/news/national/437462/ipca-finds-significant-elements-of-bullying-within-police-workforce" rel="nofollow">40 percent of officers had been bullied or harassed</a>.</p>
<p>The Transforming Intelligence 2021 programme covers 10 areas: Intelligence Operating Model, National Security, Open Source, Child Protection Offender Register, Critical Command Information, Collections, Intelligence Systems, Performance, Training and Intelligence Support to major events.</p>
<p>There is a stark contrast between how the police leadership described their intelligence systems, and what other documents state.</p>
<div class="chart chart-17 photo-captioned">
<figure class="wp-caption alignnone c3"><img decoding="async" loading="lazy" src="https://www.rnz.co.nz/assets/charts/17/original_POLICE-INTEL-02.svg?1619131403" alt="Intelligence timeline" width="696" height="749" data-fallback="/assets/charts/17/large_POLICE-INTEL-02.png?1619131403"/><figcaption class="wp-caption-text">Timeline chart. Image: RNZ</figcaption></figure>
<p class="photo-captioned__information"><strong>Timeline</strong></p>
</div>
<p><strong>2003</strong></p>
<p>– The Government Audit Office underscores the importance of national security planning</p>
<p>– Police attempt to develop a national security plan deferred due to other priorities</p>
<p><strong>2006</strong></p>
<p>– Police appoint first national manager of intelligence – before this it was led at district level</p>
<p><strong>2008</strong></p>
<p>– New national intelligence model introduced, that lasts till 2019</p>
<p><strong>2011</strong></p>
<p>– March: Police national security intelligence review finds many gaps and recommends a slew of fixes</p>
<p><strong>2014</strong></p>
<p>– Police assess rightwing extremist threat nationally, the last time this happens before the end of 2018</p>
<p><strong>2015</strong></p>
<p>– Sept: Police review finds 2011’s shortcomings remain, recommends changes</p>
<p>– Police liaison officers begin work with SIS and GCSB</p>
<p><strong>2018</strong></p>
<p>– August: Precision Targeting Teams begin</p>
<p>– Nov/Dec: Police launch Transforming Intelligence overhaul, while praising the old model</p>
<p><strong>2019</strong></p>
<p>– March: Mosque terrorism attacks</p>
<p>– April: A report ramping up the intelligence overhaul celebrates the old model’s effectiveness</p>
<p>– Sept: Police approve high-level operating model for intelligence</p>
<p>– Oct: Police set up dedicated internet scanning team for first time</p>
<p>– Internet scanning team identifies counterterrorism threats</p>
<p>– Dec: Aim to set up professional development structure to reduce Intelligence staff attrition by 15 percent</p>
<p><strong>2020</strong></p>
<p>– National Intelligence Centre leadership team appointed</p>
<p>– Feb: Intelligence training plan in place; national workshops</p>
<p>– July: Stocktake of Intelligence overhaul finds many gaps</p>
<p>– Dec 2020-Dec 2021: Aim to identify new intelligence gathering and analysing tech, including a police-wide system</p>
<p><em>This article is republished under a community partnership agreement with RNZ.</em></p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="c4" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
