<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber attacks &#8211; Evening Report</title>
	<atom:link href="https://eveningreport.nz/category/cyber-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://eveningreport.nz</link>
	<description>Independent Analysis and Reportage</description>
	<lastBuildDate>Wed, 02 Jul 2025 06:19:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Tonga cybersecurity attack wake-up call for Pacific, warns expert</title>
		<link>https://eveningreport.nz/2025/07/02/tonga-cybersecurity-attack-wake-up-call-for-pacific-warns-expert/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 06:19:52 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Health Ministry]]></category>
		<category><![CDATA[Health systems]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Inc Ransomware]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[justice]]></category>
		<category><![CDATA[Medical data]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Online extortion]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Science-Technology]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tonga]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2025/07/02/tonga-cybersecurity-attack-wake-up-call-for-pacific-warns-expert/</guid>

					<description><![CDATA[By Teuila Fuatai, RNZ Pacific senior journalist A Tongan cybersecurity expert says the country’s health data hack is a “wake-up call” for the whole region. Siosaia Vaipuna, a former director of Tonga’s cybersecurity agency, spoke to RNZ Pacific in the wake of the June 15 cyberattack on the country’s Health Ministry. Vaipuna said Tonga and ]]></description>
										<content:encoded><![CDATA[<p><em>By <a href="https://www.rnz.co.nz/authors/teuila-fuatai" rel="nofollow">Teuila Fuatai</a>, <a href="https://www.rnz.co.nz/international/pacific-news/" rel="nofollow">RNZ Pacific</a> senior journalist</em></p>
<p>A Tongan cybersecurity expert says the country’s health data hack is a “wake-up call” for the whole region.</p>
<p>Siosaia Vaipuna, a former director of Tonga’s cybersecurity agency, spoke to RNZ Pacific in the wake of the June 15 cyberattack on the country’s Health Ministry.</p>
<p>Vaipuna said Tonga and other Pacific nations were vulnerable to data breaches due to the lack of awareness and cybersecurity systems in the region.</p>
<p>“There’s increasing digital connectivity in the region, and we’re sort of . . . the newcomers to the internet,” he said.</p>
<p>“I think the connectivity is moving faster than the online safety awareness activity [and] that makes not just Tonga, but the Pacific more vulnerable and targeted.”</p>
<p>Since the data breach, the Tongan government has said “a small amount” of information from the attack was published online. This included confidential information, it said in a statement.</p>
<p>Reporting on the attack has also attributed the breach to the group Inc Ransomware.</p>
<p>Vaipuna said the group was well-known and had previously focused on targeting organisations in Europe and the US.</p>
<p><strong>New Zealand attack</strong><br />However, earlier this month, it targeted the Waiwhetū health organisation in Aotearoa New Zealand. That attack reportedly included the theft of patient consent forms and education and training data.</p>
<p>“This type of criminal group usually employs a double-extortion tactic,” Vaipuna said.</p>
<p>It could encrypt data and then demand money to decrypt, he said.</p>
<p>“The other ransom is where they are demanding payment so that they don’t release the information that they hold to the public or sell it on to other cybercriminals.”</p>
<p>In the current Tonga cyberattack, media reports say that Inc Ransomware wanted a ransom of US$1 million for the information it accessed. The Tongan government has said it has not paid anything.</p>
<p>Vaipuna said more needed to be done to raise awareness in the region around cybersecurity and online safety systems, particularly among government departments.</p>
<p>“I think this is a wake-up call. The cyberattacks are not just happening in movies or on the news or somewhere else, they are actually happening right on our doorstep and impacting on our people.</p>
<p><strong>Extra vigilance warning</strong><br />“And the right attention and resources should rightfully be allocated to the organisations and to teams that are tasked with dealing with cybersecurity matters.”</p>
<p>The Tongan government has also warned people to be extra vigilant when online.</p>
<p>It said more information accessed in the cyberattack may be published online, and that may include patient information and medical records.</p>
<p>“Our biggest concern is for vulnerable groups of people who are most acutely impacted by information breaches of this kind,” the government said.</p>
<p>It said that it would contact these people directly.</p>
<p>The country’s ongoing response was also being aided by experts from Australia’s special cyberattack team.</p>
<p><em>This article is republished under a community partnership agreement with RNZ.</em></p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &#038; Email"> </a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cook Islands govt fends off cyberattacks, passes bill to strengthen financial transparency</title>
		<link>https://eveningreport.nz/2024/12/13/cook-islands-govt-fends-off-cyberattacks-passes-bill-to-strengthen-financial-transparency/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Thu, 12 Dec 2024 23:17:38 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Cook Islands]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Digital currencies]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Mark Brown]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2024/12/13/cook-islands-govt-fends-off-cyberattacks-passes-bill-to-strengthen-financial-transparency/</guid>

					<description><![CDATA[Significant attempts were made from overseas to hack into the government’s central network a few weeks ago, Prime Minister Mark Brown has revealed. However, the Prime Minister said that the government’s robust firewall security systems were able to fend off these attempts. Brown revealed this while speaking in support of the Financial Transactions Reporting Amendment ]]></description>
										<content:encoded><![CDATA[<p>Significant attempts were made from overseas to hack into the government’s central network a few weeks ago, Prime Minister Mark Brown has revealed.</p>
<p>However, the Prime Minister said that the government’s robust firewall security systems were able to fend off these attempts.</p>
<p>Brown revealed this while speaking in support of the Financial Transactions Reporting Amendment Bill 2024, which was passed in Parliament last week.</p>
<p>The hacking attempts from overseas had, however, affected a couple of local companies in the hospitality industry in which their systems were compromised, he said.</p>
<p>“We were able to provide support to reduce any damage caused by these cyber security threats,” Brown said.</p>
<p>The Financial Transactions Reporting Amendment Bill’s primary purpose is to implement the recommended actions put forth by the Global Forum on Transparency and the Exchange of Information for Tax Purposes.</p>
<p>This Forum conducts peer reviews and assessments across over 130 jurisdictions in which Cook Islands is a member of. The aim of these reviews is to evaluate the country’s ability to cooperate effectively with established standards, Brown explained.</p>
<p><strong>‘Increasing collaboration’</strong><br />“The financial transactions reporting requirements that our country have signed up to is an example of the increasing collaboration among international jurisdictions to share information. Additionally, the need to protect the integrity of our financial centres and enhance our cybersecurity measures will only intensify as the world increasingly moves toward digital currencies.</p>
<p>“Our initial peer reviews took place in 2017, and the Cook Islands received a very positive rating for its capacity to exchange information.</p>
<p>“In light of the subsequent growth and improvements in both the quality and quantity of information exchanges, as well as enhancements to the standards themselves, a second round of assessment was initiated just last year. This latest round includes a legal framework assessment and peer reviews that also cover technical, operational, and information security aspects.”</p>
<p>Brown said that during this process several gaps in the legal framework were identified, and the Global Forum provided recommendations aimed at helping the country maintain a positive rating.</p>
<p>He said Cook Islands is required to address these recommendations by implementing the necessary legislative amendments by the 31st of this month in order to qualify for another round of onsite assessments and reviews in 2025.</p>
<p>The Prime Minister said the security of information is very important, and the security of tax information, in particular, is of significant importance to the Global Forum.</p>
<p>He added that some of the areas identified for improvement extend beyond legislative requirements.</p>
<p><strong>Security codes</strong><br />“For example, all doors in the RMD (Revenue Management Division) office that hold tax information must have security codes. The staff that work there must have proper identification cards with ID cards to swipe and allow access to these rooms,” Brown said.</p>
<p>“It is a big change from how our public service has operated for many years and maybe we do not see the actual need for this level of security. However, the Global Forum has its standards to maintain and we are obligated to maintain those standards, so we must follow suit.</p>
<p>“Not only that but now there’s also a requirement for proper due diligence to be conducted on employees or people who will work inside these departments. It is these sorts of requirements that compels us in our government agencies, many of them now to change the way we do things and to be mindful of increased security measures that are being imposed on our country. ”</p>
<p>Justice Minister Vaine “Mac” Mokoroa, who presented the Bill to Parliament, said: “The key concern here is to ensure that the Cook Islands continues to be a leader in the trust industry . . .  our International Trust Act has been at the forefront of the Cook Islands Offshore Financial Services Industry since its enactment 40 years ago, establishing the Cook Islands as a leader in wealth protection and preservation.”</p>
<p>“At that time, these laws were seen as innovative and ground-breaking, and their success is evident in the growth and development of the sector, as well as in the number of jurisdictions that have copied them, either in whole or in part.”</p>
<p>Mokoroa said that the Cook Islands Trust Companies Association, which comprises seven Trustee Companies licensed under the Trustee Companies Act, along with the Financial Supervisory Commission, conducted a thorough review of the International Trust Act and recommended necessary changes. These changes were reflected in the Financial Transactions Reporting Amendment Bill.</p>
<p><em>Republished from the <a href="https://www.cookislandsnews.com/" rel="nofollow">Cook Islands News</a> with permission.</em></p>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Daily Blog hacked – NZ’s most important left media outlet silenced for a day</title>
		<link>https://eveningreport.nz/2024/05/28/the-daily-blog-hacked-nzs-most-important-left-media-outlet-silenced-for-a-day/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Tue, 28 May 2024 04:18:06 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber-censorship]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Leftwing media]]></category>
		<category><![CDATA[Martyn Bradbury]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Media Freedom]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific Media Watch]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[Progressive]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[The Daily Blog]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2024/05/28/the-daily-blog-hacked-nzs-most-important-left-media-outlet-silenced-for-a-day/</guid>

					<description><![CDATA[Pacific Media Watch The Daily Blog, New Zealand’s most important leftwing website of news, views and analyses at the heart of the country’s most conservative mediascape in years, has been hacked. It was silenced yesterday for several hours but is back up and running today. The Daily Blog editor and founder Martyn Bradbury launched the ]]></description>
										<content:encoded><![CDATA[<p><a href="https://asiapacificreport.nz/category/pacific-media-watch/" rel="nofollow"><em>Pacific Media Watch</em></a></p>
<p><a href="https://thedailyblog.co.nz/" rel="nofollow"><em>The Daily Blog</em></a>, New Zealand’s most important leftwing website of news, views and analyses at the heart of the country’s most conservative mediascape in years, has been hacked.</p>
<p>It was silenced yesterday for several hours but is back up and running today.</p>
<p><em>The Daily Blog</em> editor and founder Martyn Bradbury launched the website in 2013 with the primary objective of “widening political debate” in the lead up to the 2014 New Zealand election.</p>
<p>Since then, the website has united more than “42 of the country’s leading leftwing commentators and progressive opinion shapers to provide the other side of the story on today’s news, media and political agendas”.</p>
<p>It has 400,000 pageviews a month.</p>
<p>“These moments are always a mix of infuriation and terror”, <a href="https://thedailyblog.co.nz/2024/05/28/the-daily-blog-has-been-hacked/" rel="nofollow">admitted Bradbury in an editorial today</a> about the revived website and he raised several suspected nations for “cyber attack trends” such as “China, Israel and Russia”.</p>
<p>Bradbury, nicknamed “Bomber” by a former <em>Craccum</em> editor at Victoria University of Wellington, was once branded by the <em>NZ Listener</em> magazine as the “most opinionated man in New Zealand”</p>
<p>The website includes columns by such outspoken writers and critics as law professor Jane Kelsey, Green Party co-leader Marama Davidson, Palestinian human rights advocate and quality education critic John Minto, political scientist Dr Wayne Hope, social justice academic and former leftwing politician Sue Bradford, and political analyst Morgan Godfery.</p>
<p>It also hosts the popular live podcasts by The Working Group, which tonight features pre-budget <a href="https://thedailyblog.co.nz/2024/05/28/7-30pm-live-tonight-the-working-group-pre-budget-4-economists-of-the-apocalypse-special-hooton-damien-grant-brad-olson/" rel="nofollow">“Economists of the Apocalypse Special”</a> by Bradbury, with Matthew Hooton, Damien Grant and Brad Olson at 7.30pm on its revived website.</p>
<p><strong>‘Sophisticated and tricky’</strong><br />Explaining why <em>The Daily Blog</em> was displaying a “maintenance page” for most of the day, <a href="https://thedailyblog.co.nz/2024/05/28/the-daily-blog-has-been-hacked/" rel="nofollow">Bradbury said in his editorial</a>:</p>
<p><em>The hack was very sophisticated and very tricky.</em></p>
<p><em>Thank you to everyone who reached out, these moments are always a mix of infuriation and terror.</em></p>
<p><em>We can’t point the finger at who did it, but we can see trends.</em></p>
<p><em>Whenever we criticise China, we get cyber attacks.</em></p>
<p><em>Every time we criticise Israel, we get cyber attacks.</em></p>
<p><em>Every time we criticise Russia, we get cyber attacks.</em></p>
<p><em>Every time we post out how racist NZ is, we get stupid cyber attacks.</em></p>
<p><em>Every time we have a go at New Zealand First’s weird Qanon antivaxx culture war bullshit we get really dumb cyber attacks.</em></p>
<p><em>Every time we criticise woke overreach we get cancelled.</em></p>
<p><em>This hack on us yesterday was a lot more sophisticated and I would be surprised if it didn’t originate offshore.</em></p>
<p><em>We have a new page design up and running in the interim, there will be updates made to it for the rest of week as we iron out all the damage caused and tweak it for TDB readers.</em></p>
<p><em>You never know how important critical media voices are until you lose them!</em></p>
<p>Bradbury added that “obviously this all costs an arm and a leg being offline” and appealed to community donors to deposit into <em>The Daily Blog’s</em> bank account 12-3065-0133561-56.</p>
<p><em>The Daily Blog</em> can be <a href="mailto:editor@thedailyblog.co.nz" rel="nofollow">contacted here</a>.</p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="pf-button-img" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PODCAST: Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All</title>
		<link>https://eveningreport.nz/2022/09/01/podcast-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/</link>
					<comments>https://eveningreport.nz/2022/09/01/podcast-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/#comments</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 02:14:18 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Militants]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Military attack]]></category>
		<category><![CDATA[Military Forces]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[Military Tactics]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1076833</guid>

					<description><![CDATA[In this episode, Buchanan and Manning take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to say, it’s a world few realise exists and few realise how it is effecting them. With the technologies that surround us, tech that we use every day, it has become easy to conduct indirect or non-attributable warfare using a variety of means.]]></description>
										<content:encoded><![CDATA[<p><iframe title="Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All" width="640" height="360" src="https://www.youtube.com/embed/iN3o8a1R8_I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar –</strong> In this podcast, political scientist Paul Buchanan and Selwyn Manning analyse the advent of new technologies and the rise of hybrid warfare.</p>
<p>In this episode, Buchanan and Manning take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to say, it’s a world few realise exists and few realise how it is effecting them.</p>
<p>With the technologies that surround us, tech that we use every day, it has become easy to conduct indirect or non-attributable warfare using a variety of means.</p>
<p>There’s the grey area phenomena where opponent states undermine adversaries from within, sowing distrust, or fear, where there should not be. The purpose is to weaken public trust and a population’s resolve to support their government.</p>
<p>In an extreme situation, this form of hostilities can escalate into hybrid warfare using indirect and direct means, from cyber offensives to firepower.</p>
<p>To illustrate the issue, we will draw on the build-up to the Russian invasion of Ukraine, and also evaluate other locations around the world where there is evidence of hybrid warfare.</p>
<p>It may surprise you to realise how close to home are real world examples of hybrid warfare.</p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="(max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="(max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/09/01/podcast-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/feed/</wfw:commentRss>
			<slash:comments>13</slash:comments>
		
		
			</item>
		<item>
		<title>LIVE@Midday Thurs Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All</title>
		<link>https://eveningreport.nz/2022/08/31/livemidday-thurs-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/</link>
					<comments>https://eveningreport.nz/2022/08/31/livemidday-thurs-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Wed, 31 Aug 2022 08:31:00 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Geopolitics]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[liberal democracy]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Military Forces]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[Military Tactics]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Peoples Republic of China]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russian aggression]]></category>
		<category><![CDATA[Russian Federation]]></category>
		<category><![CDATA[Russian military]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States of America]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1076810</guid>

					<description><![CDATA[A View from Afar – In this podcast, political scientist Paul Buchanan and Selwyn Manning will analyse the advent of new technologies and the rise of hybrid warfare. In this episode, we will take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to ]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All" width="640" height="360" src="https://www.youtube.com/embed/iN3o8a1R8_I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar –</strong> In this podcast, political scientist Paul Buchanan and Selwyn Manning will analyse the advent of new technologies and the rise of hybrid warfare.</p>
<p>In this episode, we will take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to say, it’s a world few realise exists and few realise how it is effecting them.</p>
<p>With the technologies that surround us, tech that we use every day, it has become easy to conduct indirect or non-attributable warfare using a variety of means.</p>
<p>There’s the grey area phenomena where opponent states undermine adversaries from within, sowing distrust, or fear, where there should not be. The purpose is to weaken public trust and a population’s resolve to support their government.</p>
<p>In an extreme situation, this form of hostilities can escalate into hybrid warfare using indirect and direct means, from cyber offensives to firepower.</p>
<p>To illustrate the issue, we will draw on the build-up to the Russian invasion of Ukraine, and also evaluate other locations around the world where there is evidence of hybrid warfare.</p>
<p>It may surprise you to realise how close to home are real world examples of hybrid warfare.</p>
<p><strong>Join Paul and Selwyn for this LIVE recording of this podcast while they consider these big issues, and remember any comments you make while live can be included in this programme.</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/08/31/livemidday-thurs-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Submission &#8211; Why New Zealand is a ‘sweet spot’ for DDoS attacks</title>
		<link>https://eveningreport.nz/2022/04/22/submission-why-new-zealand-is-a-sweet-spot-for-ddos-attacks/</link>
					<comments>https://eveningreport.nz/2022/04/22/submission-why-new-zealand-is-a-sweet-spot-for-ddos-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Evening Report]]></dc:creator>
		<pubDate>Thu, 21 Apr 2022 23:41:39 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Essays]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Submissions]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1074208</guid>

					<description><![CDATA[Essay by By Raymond Maisano, Head of Australia and New Zealand, Cloudflare. Aotearoa New Zealand makes up a small portion of the world’s population, yet the country is being hit by a relatively bigger share of cyber attacks. Chances are, you’re familiar with the term ‘distributed denial of service (DDoS) attack’. Not because your organisation ]]></description>
										<content:encoded><![CDATA[<p><em>Essay by By Raymond Maisano, Head of Australia and New Zealand, Cloudflare.</em></p>
<p>Aotearoa New Zealand makes up a small portion of the world’s population, yet the country is being hit by a relatively bigger share of cyber attacks.</p>
<p>Chances are, you’re familiar with the term ‘distributed denial of service (DDoS) attack’. Not because your organisation has been subjected to one, but instead, the recent numerous, high profile attacks on local and global businesses have captured your attention.</p>
<p>With cyber attacks ramping up across the globe and Aotearoa New Zealand an attractive target, every business—no matter the size—must put protections in place.</p>
<p><strong>What’s a DDoS attack?</strong></p>
<p>Designed to disrupt the normal function of a server, DDoS attacks harness compromised computers and hardware like<a href="https://www.cert.govt.nz/business/news-and-events/malware-attacks-and-tech-scam-calls-are-on-the-rise-according-to-newly-released-quarter-three-data-from-cert-nz-new-news-page/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/business/news-and-events/malware-attacks-and-tech-scam-calls-are-on-the-rise-according-to-newly-released-quarter-three-data-from-cert-nz-new-news-page/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw0jAAnCY9szkVi2lKs4WC0B"> Internet of Things (IoT) devices</a> to flood the target or its surrounding infrastructure with traffic. This influx can slow down or overwhelm a website or service, denying access to genuine traffic.</p>
<p>DDoS attacks are on the rise across the world, with attackers using different styles of malicious activity to take down websites and even using them as an attempt to extort money. Businesses from all industries were victims of ransom DDoS (RDDoS) attacks in 2021, and<a href="https://blog.cloudflare.com/ddos-attack-trends-for-2021-q4/" data-saferedirecturl="https://www.google.com/url?q=https://blog.cloudflare.com/ddos-attack-trends-for-2021-q4/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw3pQ4xXA9TzmT7bUxzDMGBF"> Q4 saw a 29% YoY and 177% QoQ increase</a>.</p>
<p><strong>New Zealand is a prime target</strong></p>
<p>Only<a href="https://www.submarinecablemap.com/country/new-zealand" data-saferedirecturl="https://www.google.com/url?q=https://www.submarinecablemap.com/country/new-zealand&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw2xWMuI7zMfVoteE9sEYfrD"> three active undersea submarine cables</a> connect Aotearoa New Zealand to the outside world. In comparison to the rest of the world, this relatively small number makes it easier for the country’s networks to be overwhelmed.</p>
<p>&nbsp;</p>
<p>In fact, the National Cyber Security Centre (NCSC) reported an increase in criminal or financially motivated actors with a significant national impact or potential to cause serious harm in its<a href="https://www.ncsc.govt.nz/assets/NCSC-Documents/2020-2021-NCSC-Cyber-Threat-Report.pdf" data-saferedirecturl="https://www.google.com/url?q=https://www.ncsc.govt.nz/assets/NCSC-Documents/2020-2021-NCSC-Cyber-Threat-Report.pdf&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw1urTBiP1tRxHXX3mArbPQO"> 2020-21 threat report</a> (27% compared to 14% the year prior).</p>
<p>A spate of high profile, local businesses experienced repeated DDoS attacks over the last 18 months—from <a href="https://www.reuters.com/technology/widespread-internet-outages-hits-users-across-new-zealand-2021-09-03/" data-saferedirecturl="https://www.google.com/url?q=https://www.reuters.com/technology/widespread-internet-outages-hits-users-across-new-zealand-2021-09-03/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw2smCmBHQWMB6iRzlyWdUem">Vocus</a> to<a href="https://www.nzherald.co.nz/business/live-cyber-attack-fears-kiwibank-anz-nz-post-metservice-back-online-after-cert-flags-cyber-attacks/KJMXHDACPES4BP3FZ465LESJFM/" data-saferedirecturl="https://www.google.com/url?q=https://www.nzherald.co.nz/business/live-cyber-attack-fears-kiwibank-anz-nz-post-metservice-back-online-after-cert-flags-cyber-attacks/KJMXHDACPES4BP3FZ465LESJFM/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw1XyNJ_M9ANluLS_cs1dZJR"> one coordinated attack</a> on NZ Post, MetService, Kiwibank, ANZ and Inland Revenue.</p>
<p>However, it is critical to note that organisations of any size can fall victim to a DDoS or RDDoS attack. No business is immune, and the impacts can be significant.</p>
<p><strong>How can businesses prevent these types of attacks?</strong></p>
<p>Most organisations in Aotearoa New Zealand are still trying to protect themselves using traditional security measures that are no match for a burgeoning tide of bots, ready to be mobilised against them in a few strokes of a keyboard.</p>
<p>While this might sound daunting, implementing good cyber security protections against DDoS attacks does not need to be.</p>
<ol>
<li><strong>Speak with your network provider </strong>to understand what DDoS mitigation services they offer and how much traffic they can mitigate before your organisation is affected. This is an added service for some providers, while others might charge surge pricing in the unlucky instance that your website is bombarded with traffic during a DDoS attack.</li>
<li><strong>Ramp up your front-line protection. </strong>Engage a provider with specially designed network equipment or a cloud-based protection service to mitigate your business from incoming threats. Here, it’s essential to consider the potential risk to your company and consider the scalability, flexibility, reliability and network size of potential providers. For example, large-scale attacks have the potential to take out on-site network infrastructure, while cloud-based solutions can scale when mitigating attacks.</li>
</ol>
<ol start="3">
<li><strong>Create a DDoS attack incident response plan.</strong> The overwhelming nature of a DDoS attack can take out multiple systems and services, not just your website. And in the moment, it’s easy for panic to set in. Be proactive, create a dedicated DDoS<a href="https://www.cert.govt.nz/business/guides/incident-response-plan/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/business/guides/incident-response-plan/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw3KdwMmLJCs9zjEFiL_gw7e"> incident response plan</a>, and conduct exercises to ensure its effectiveness.</li>
</ol>
<ol start="4">
<li><strong>Regularly</strong> <strong>patch your systems, software and hardware. </strong>Developers regularly release updates to decrease or eliminate vulnerabilities in software. Applying these patches to operating systems, applications, and all network-connected devices in real-time is the simplest way to mitigate a cyber security attack. There’s a reason why patching is<a href="https://www.cert.govt.nz/it-specialists/critical-controls/10-critical-controls/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/it-specialists/critical-controls/10-critical-controls/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw3bpN0GoCeQqeUb3qjVHJiN"> CERT NZ’s top critical control</a> to protect organisations from being breached—don’t leave your business wide open.</li>
</ol>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/04/22/submission-why-new-zealand-is-a-sweet-spot-for-ddos-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LIVE@MIDDAY: Buchanan and Manning Consider the Global Issues that Define 2021</title>
		<link>https://eveningreport.nz/2021/12/01/livemidday-buchanan-and-manning-consider-the-global-issues-that-define-2021/</link>
					<comments>https://eveningreport.nz/2021/12/01/livemidday-buchanan-and-manning-consider-the-global-issues-that-define-2021/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Wed, 01 Dec 2021 02:58:54 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[AUKUS]]></category>
		<category><![CDATA[Authoritarianism]]></category>
		<category><![CDATA[Autonomous Weapons]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[covid19]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Geopolitics]]></category>
		<category><![CDATA[Indo-Pacific]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific politics]]></category>
		<category><![CDATA[Pacific security]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Peoples Republic of China]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Russian Federation]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[United States of America]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1071075</guid>

					<description><![CDATA[A View from Afar – In this podcast, political scientist Paul Buchanan and Selwyn Manning will consider and analyse the most significant global issues that define 2021. The topics will include: - Leadership: Trump, Putin, Xi, Biden; - Pandemic: Impact of Covid-19 &#038; variants on global security; - Security: Afghanistan, AUKUS, Autonomous Weapons, Cyber-Hackers/Attackers.]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Thurs@Midday: Buchanan and Manning Consider the Global Issues that Define 2021" width="640" height="360" src="https://www.youtube.com/embed/uzsGLRNnnEE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar</strong> – In this podcast, political scientist Paul Buchanan and Selwyn Manning will consider and analyse the most significant global issues that define 2021. The topics will include:</p>
<p><span class="s1">&#8211; Leadership: Trump, Putin, Xi, Biden,</span></p>
<p><span class="s1">&#8211; Pandemic: Impact of Covid-19 &amp; variants on global security</span></p>
<p><span class="s1">&#8211; Security: Afghanistan, AUKUS, Autonomous Weapons, Cyber-Hackers/Attackers.</span></p>
<p><strong>Join Paul and Selwyn for this LIVE recording of this podcast while they consider these big issues, and remember any comments you make while live can be included in this programme.</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2021/12/01/livemidday-buchanan-and-manning-consider-the-global-issues-that-define-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers hit PNG financial hub, fail in bid to hold state officials to ransom</title>
		<link>https://eveningreport.nz/2021/10/31/hackers-hit-png-financial-hub-fail-in-bid-to-hold-state-officials-to-ransom/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Sat, 30 Oct 2021 12:17:56 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Economics]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Finance]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Government IT]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Papua New Guinea]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[State finances]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Vulupindi Haus]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2021/10/31/hackers-hit-png-financial-hub-fail-in-bid-to-hold-state-officials-to-ransom/</guid>

					<description><![CDATA[By Gorethy Kenneth in Port Moresby The Papua New Guinea government’s financial hub was hit by computer hackers last week, holding state officials at ransom, reports have revealed. The ransomware attack on the Department of Finance’s Integrated Financial Management System (IFMS) happened last Thursday, locking out government workers who use the system to run the ]]></description>
										<content:encoded><![CDATA[<p><em>By Gorethy Kenneth in Port Moresby</em></p>
<p>The Papua New Guinea government’s financial hub was hit by computer hackers last week, holding state officials at ransom, reports have revealed.</p>
<p>The ransomware attack on the Department of Finance’s Integrated Financial Management System (IFMS) <a href="https://www.bnnbloomberg.ca/ransomware-hackers-freeze-millions-in-papua-new-guinea-aid-cash-1.1673088" rel="nofollow">happened last Thursday</a>, locking out government workers who use the system to run the country’s entire financial system.</p>
<p>The Acting Treasurer, Finance Minister Sir John Pundari, confirmed the hacking but told the <em>PNG Post-Courier</em> that the system had been restored and no ransom was paid.</p>
<p>Sir John said workers were using a temporary accounting system after the IFMS was hit last week but did not reveal the real extent of the damage, saying only that the hackers did not steal anything.</p>
<p>However, they had damaged a system that now puts PNG’s national security at risk.</p>
<p>This is the first time the country’s central financial hub has been hit to such an extent.</p>
<p>Ransomware is a collection of malicious software variants, including viruses, designed by hackers to cause extensive damage or gain unauthorised access to computer networks.</p>
<p><strong>‘Cyber-attack on core server’</strong><br />“The Government Financial System suffered a cyber-attack in the form of ransomware infiltrating our core server at 1am on Friday, 22 of October 2021,” Sir John said.</p>
<p>“As a result of the ransomware infiltration, the Department of Finance’s IT network was compromised. The department immediately took precautionary steps by closing down the network systems.</p>
<p>“The department has now managed to fully restore the system, however, because of the risk we are playing it safe by not allowing full usage of the affected network.</p>
<p>“While we progress cleaning up the server environment, we have put in temporary measures.</p>
<p>“These include all government departments and agencies having access to commit and process cheques using a controlled environment in Vulupindi Haus.</p>
<p>“All provinces and districts will also have access to commit funds, through a controlled temporary arrangement.</p>
<p><strong>‘Full restored’</strong><br />“The department is conscious of the security and integrity of its data, thus, restoration of services to all government agencies, including at the sub-national level will be done gradually, bearing in mind the security of individual networks, so as not to compromise or allow any further spread of this malware or other viruses.</p>
<p>“At this stage I wish to state clearly that the government financial system has been fully restored.</p>
<p>“Department of Finance did not pay any ransom to the hacker or any of its third party agents. We have managed to restore normalcy.</p>
<p>“The government and the people of Papua New Guinea can be assured that the government’s financial services will continue as usual.”</p>
<p><em>Gorethy Kenneth is a senior PNG Post-Courier journalist. Republished with permission.</em></p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="c2" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PODCAST: Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare</title>
		<link>https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/</link>
					<comments>https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Thu, 29 Jul 2021 02:52:51 +0000</pubDate>
				<category><![CDATA[36th Parallel Assessments]]></category>
		<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Evening Report]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Intelligence agencies]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Private Spying]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1068174</guid>

					<description><![CDATA[Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar with a deep-dive into cyber-attacks and hybrid warfare - Especially how 2021 has witnessed a Cold War II styled stand-off between global powers.]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare" width="640" height="360" src="https://www.youtube.com/embed/j2ZmyUav3n0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar:</strong> Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar with a deep-dive into cyber-attacks and hybrid warfare &#8211; Especially how 2021 has witnessed a Cold War II styled stand-off between global powers.</p>
<p>To re-cap, there has been:</p>
<ul>
<li>Allegations of a global-scale hack by the People’s Republic of China.</li>
<li>There’s the Pegasus spyware scandal, where Israel has exported deep-tracking and targeting spyware to despots and authoritarian governments.</li>
<li>Then there’s been the relatively silent mission-creep of Palantir as a Western-oriented Public Private Partnership-styled signals &#8220;facilitator&#8221;.</li>
</ul>
<p>Paul and Selwyn discuss how all of this sets 2021 apart and adds up to an evolution of hybrid warfare capabilities.</p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" width="165" height="40" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center>&nbsp;</p>
<p><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0"></iframe></center><center></center><center></center><a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license"><img decoding="async" style="border-width: 0;" src="https://i.creativecommons.org/l/by-sa/4.0/88x31.png" alt="Creative Commons Licence" /></a><br />
A View from Afar by <a href="https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/" rel="cc:attributionURL">Paul G. Buchanan and Selwyn Manning</a> is licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license">Creative Commons Attribution-ShareAlike 4.0 International License</a>.<br />
Based on a work at <a href="https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/" rel="dct:source">https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Scheduled LIVE: Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare</title>
		<link>https://eveningreport.nz/2021/07/28/scheduled-live-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/</link>
					<comments>https://eveningreport.nz/2021/07/28/scheduled-live-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Wed, 28 Jul 2021 03:59:12 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1068143</guid>

					<description><![CDATA[A View from Afar: Selwyn Manning and Paul Buchanan will present this week’s podcast, A View from Afar, LIVE at midday Thursday and will do a deep-dive into cyber-attacks and hybrid warfare &#8211; Especially how 2021 has witnessed a Cold War II styled stand-off between global powers. To re-cap, there has been: Allegations of a ]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare" width="640" height="360" src="https://www.youtube.com/embed/j2ZmyUav3n0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar:</strong> Selwyn Manning and Paul Buchanan will present this week’s podcast, A View from Afar, LIVE at midday Thursday and will do a deep-dive into cyber-attacks and hybrid warfare &#8211; Especially how 2021 has witnessed a Cold War II styled stand-off between global powers.</p>
<p>To re-cap, there has been:</p>
<ul>
<li>Allegations of a global-scale hack by the People’s Republic of China.</li>
<li>There’s the Pegasus spyware scandal, where Israel has exported deep-tracking and targeting spyware to despots and authoritarian governments.</li>
<li>Then there’s been the relatively silent mission-creep of Palantir as a Western-oriented Public Private Partnership-styled signals &#8220;facilitator&#8221;.</li>
</ul>
<p>Paul and Selwyn will discuss how all of this sets 2021 apart and adds up to an evolution of hybrid warfare capabilities.</p>
<p><strong>WE INVITE YOU TO PARTICIPATE WHILE WE ARE LIVE WITH COMMENTS AND QUESTIONS IN THE RECORDING OF THIS PODCAST:</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" width="165" height="40" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center>&nbsp;</p>
<p><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0"></iframe></center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2021/07/28/scheduled-live-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NZ cyber agency chief worried China hacks exploiting security weakness</title>
		<link>https://eveningreport.nz/2021/07/21/nz-cyber-agency-chief-worried-china-hacks-exploiting-security-weakness/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Tue, 20 Jul 2021 13:18:11 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[GCSB]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Government Communications Security Bureau]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Multimedia]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2021/07/21/nz-cyber-agency-chief-worried-china-hacks-exploiting-security-weakness/</guid>

					<description><![CDATA[RNZ News New Zealand’s cyber security agency believes China has been behind numerous hack attacks spanning years. The government joined Western allies and Japan in calling out Beijing for so-called state-sponsored hacks, including a major incursion in February when Microsoft email servers were targeted. The US has charged four Chinese nationals — three security officials ]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.rnz.co.nz/national/programmes/checkpoint/" rel="nofollow"><em>RNZ News</em></a></p>
<p>New Zealand’s cyber security agency believes China has been behind numerous hack attacks spanning years.</p>
<p>The government joined Western allies and Japan in calling out Beijing for so-called state-sponsored hacks, including a major incursion in February when Microsoft email servers were targeted.</p>
<p>The US has <a href="https://www.aljazeera.com/economy/2021/7/19/us-uk-and-allies-tie-chinese-government-to-microsoft-hack" rel="nofollow">charged four Chinese nationals</a> — three security officials and one contract hacker — with targeting dozens of companies and government agencies in the United States and overseas under the cover of a tech company.</p>
<p>“What we do is when we see malicious cyber activity on New Zealand networks, that may be through our own capabilities that we have to help protect New Zealand networks or it may be something that’s reported to us, we look at the malware that’s used,” Government Communications Security Bureau Director-General Andrew Hampton told RNZ <em>Checkpoint</em>.</p>
<p>“We look at how the actor behaves. We look at who they might be targeting and what they do if they get onto a network.</p>
<p>“That allows us to build a bit of a picture of who the actor is. We then compare that with information that we receive, often from our intelligence partners who are also observing such activity.</p>
<p>“That allows us to make an assessment, and it’s always a probability assessment about who the actor is.</p>
<p><strong>The APT 40 group</strong><br />“In this case, because of the amount of information we’ve been able to access both from our own capabilities and from our partners, we’ve got a reasonably high level of confidence that the actor who we’ve seen undertaking this campaign over a number of years, and in particular, who was responsible for the Microsoft Exchange compromise, was the APT 40 group — Advanced Persistent Threat Group 40 — which has been identified as associated with the Chinese Ministry of State Security.</p>
<p><em>The RNZ National live stream.  Video: Checkpoint</em></p>
<p>“The actors here are state sponsored actors rather than what we would normally define as a criminal group. What we’re seeing here is a state sponsored actor likely to be motivated by a desire to steal information.”</p>
<p>Hampton said there was a blurring of lines between what a state agency does, and what a criminal group does.</p>
<p>“Some of the technical capabilities that previously only state organisations had, have now got into the hands of criminal groups.</p>
<p>“Also what we’ve seen in a range of countries is individuals who may work part-time in a government intelligence agency, and then may work part-time in a criminal enterprise. Or they may have previously worked in a state intelligence agency and are now out by themselves but still have links links back to the state.</p>
<p>“We don’t know the full detail of the nature of the relationship, but what we do know is the Ministry of State Security in China, for example, is a very large organisation with many thousands of of employees.</p>
<p>“So they are big organisations with people on their payroll but they also would have connections with other individuals and organisations.</p>
<p><strong>Information shared with criminals</strong><br />“Something else worth noting with regard to this most recent compromise involving the Microsoft Exchange, what we saw there is once the Ministry of State Security actors had identified the vulnerability and exploited it, they then shared that information with a range of other actors, including criminal groups, so they too could exploit it.</p>
<p>“This is obviously a real concern to see this type of behaviour occurring,” Hampton said.</p>
<p>All evidence showed the cyber attacks were all originating from mainland China, Hampton told <em>Checkpoint</em>.</p>
<p>He said such attacks would be aimed at stealing data or possibly positioning themselves on a system to be able to access information in the future.</p>
<p>“A common tactic we see, unfortunately, is there may be a vulnerability in a system,” Hampton said.</p>
<p>“It could be a generic vulnerability across all users of that particular system, and a malicious actor may become aware of that vulnerability, so they would use that to get onto the network.</p>
<p>“That doesn’t mean they will then start exfiltrating data from day one or something like that. They may just want to to sit there in the event that at some point in the future they may want to start doing that.</p>
<p><strong>Malicious actors</strong><br />“This exploitation of known vulnerabilities is a real concern. This is why all organisations need to keep their security patches up to date, because what can happen is you can have malicious actors use technology to scan whole countries to see who hasn’t updated their patches.</p>
<p>“They then use that vulnerability to get on the network and they may not do anything with it for some time. Or they might produce a list of all the organisations, say, in New Zealand who haven’t updated their patches.</p>
<p>“Then they make a decision – okay these are the four to five we want to further exploit.”</p>
<p><em><em>This article is republished under a community partnership agreement with RNZ.</em></em></p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="c2" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PODCAST &#8211; Manning and Buchanan on NZ&#8217;s National Security Strategy &#8211; Also Peru Voters Go Left</title>
		<link>https://eveningreport.nz/2021/06/10/podcast-manning-and-buchanan-on-nzs-national-security-strategy-also-peru-voters-go-left/</link>
					<comments>https://eveningreport.nz/2021/06/10/podcast-manning-and-buchanan-on-nzs-national-security-strategy-also-peru-voters-go-left/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 02:38:50 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Evening Report]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[neoliberalism]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[New Zealand Defence Force]]></category>
		<category><![CDATA[New Zealand Government Communications Security Bureau]]></category>
		<category><![CDATA[New Zealand Security Intelligence Service]]></category>
		<category><![CDATA[NZ Politics]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Peru]]></category>
		<category><![CDATA[Peru Elections]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Political history]]></category>
		<category><![CDATA[Political Integrity]]></category>
		<category><![CDATA[Political Stability]]></category>
		<category><![CDATA[Political Strategy]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1067255</guid>

					<description><![CDATA[Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar, where they analyse New Zealand's national security strategy. How does NZ best position itself as a progressive independent Pacific Island state? Also, Peru voters go left. What does this mean for Peru, and neoliberalism, as Peru faces a pandemic where Covid-19 has raged causing the highest recorded death rates in the world.]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Manning and Buchanan on NZ&#039;s National Security Strategy - Also World Watch" width="640" height="360" src="https://www.youtube.com/embed/K13FshslWG8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar: </strong>Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar, where they analyse New Zealand&#8217;s national security strategy.</p>
<p>There has been no defence white paper since the John Key National-led governments and no comprehensive review of New Zealand&#8217;s strategic priorities, nor assessment of the region&#8217;s threat landscape both internal and external.</p>
<p>Now, with hybrid threats like cyberwarfare and terrorism adopting an &#8220;intermestic&#8221; (international and domestic) characteristic due to on-line recruitment and radicalisation, the perceived need is to develop a holistic national security strategy that addresses defence, security and intelligence needs of the 2020 decade.</p>
<p>But what does this all mean for New Zealand&#8217;s defence forces, intelligence community, and cyber-defence agencies?</p>
<p>ALSO: World Watch &#8211; The latest/recent round of elections in places like Peru, Mexico and Israel can be viewed as referendums on neoliberalism and national populism.</p>
<p>For example: You can see how Israel prime minister Benjamin Netanyahu has adopted Donald Trump-like rhetoric to describe his opponents.</p>
<p>A similar style has been used by the right wing in Peru as well as in Brazil.</p>
<p>The Peru election pits a socialist native Indian against Peru&#8217;s former dictator Fujimori&#8217;s daughter. She is a neoliberal conservative.</p>
<p>Both national populism and various socialist approaches have something in common: both ideologies reject neoliberal economic theory in principle and in fact.</p>
<p>With the left most likely to win the elections in Peru, and considering the challenges that Peru faces (<em>including a pandemic where Covid-19 has raged through its communities positioning Peru as having suffered the <a href="https://eveningreport.nz/2021/06/09/keith-rankin-chart-analysis-charts-on-excess-deaths-in-the-era-of-covid19/" target="_blank" rel="noopener">highest recorded death rates in the world</a></em>) the question begs, has neoliberalism run its course?</p>
<p><strong>WE INVITE YOU TO PARTICIPATE WHILE WE ARE LIVE WITH COMMENTS AND QUESTIONS IN THE RECORDING OF THIS PODCAST:</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" width="165" height="40" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center>&nbsp;</p>
<p><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0"></iframe></center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2021/06/10/podcast-manning-and-buchanan-on-nzs-national-security-strategy-also-peru-voters-go-left/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LIVE: Tech Now With Sarah Putt &#038; Selwyn Manning &#8211; DDOS Attacks + First Responder Comms + A Digital Success Story</title>
		<link>https://eveningreport.nz/2020/09/08/live-tech-now-with-sarah-putt-selwyn-manning-ddos-attacks-first-responder-comms-a-digital-success-story/</link>
					<comments>https://eveningreport.nz/2020/09/08/live-tech-now-with-sarah-putt-selwyn-manning-ddos-attacks-first-responder-comms-a-digital-success-story/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 08:00:08 +0000</pubDate>
				<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Live Stream]]></category>
		<category><![CDATA[Livestream]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Tech Now]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=261317</guid>

					<description><![CDATA[LIVE on Tech Now this week: How and why international cyber attackers have New Zealand organisations in their sights? There are BIG Changes looming to how our Emergency services communicate. Why is this change coming? What’s the cost? And, what will it mean for you, and for first responders? AND&#8230; Media Tech: Is print really ]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="LIVE: Evening Report&#039;s Tech Now with Selwyn Manning &amp; Sarah Putt - Ep: 4" width="640" height="360" src="https://www.youtube.com/embed/uIipPNvBfKs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe><br />
<strong>LIVE on Tech Now this week:</strong> How and why international cyber attackers have New Zealand organisations in their sights? There are BIG Changes looming to how our Emergency services communicate. Why is this change coming? What’s the cost? And, what will it mean for you, and for first responders? AND&#8230; Media Tech: Is print really dead? And, why is the New York Times a digital success story?</p>
<p>Click here to <a href="https://eveningreport.nz/2020/08/25/coming-up-live-evening-reports-tech-now-with-sarah-putt-and-selwyn-manning-episode-3/">view onsite</a>, or <a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a>  or <a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></p>
<p>&#8212;</p>
<p class="p1"><strong>Tonight, on Tech Now</strong> technology commentator Sarah Putt joins Selwyn Manning to check out what’s been happening in the tech world this week.</p>
<p class="p1">The show&#8217;s main points include:</p>
<p class="p1"><span class="s1"><b>What’s Happening in the Tech World?</b></span></p>
<ul class="ul1">
<li class="li2"><span class="s2">How and why international cyber attackers have New Zealand organisations in their sights?</span></li>
</ul>
<ul class="ul1">
<li class="li2"><span class="s2">There are BIG Changes looming to how our Emergency services communicate. Why is this change coming? What’s the cost? And, what will it mean for you, and for first responders?</span></li>
</ul>
<ul class="ul1">
<li class="li2"><span class="s2">Media Tech: Is print really dead? And, why is the New York Times a digital success story?</span></li>
</ul>
<p class="p1"><strong>INTERACTION:</strong> Remember, if you are joining us LIVE via social media (<em>SEE LINKS BELOW</em>), you can make comments and even put Sarah on the spot with a few questions. We will be able to see your interaction, and include this in the LIVE show.</p>
<p><strong>You can interact with the LIVE programme</strong> by joining these social media channels. Here are the links:</p>
<ul>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
</ul>
<p class="p1">And, you can see video-on-demand of this show, and earlier episodes too, by checking out EveningReport.nz</p>
<p>The programme is the latest effort by EveningReport as it rolls out its public service webcasting programmes, produced by ER&#8217;s parent company <a href="https://milnz.co.nz" target="_blank" rel="noopener noreferrer">Multimedia Investments Ltd</a>.</p>
<p>ER&#8217;s Tech Now programme explores the latest tech trends both here in New Zealand and globally.</p>
<p>The programme’s format examines the tech world in the present and post-Covid-19 world. It looks at new innovations, what they mean to us as we grapple with the &#8216;new normal&#8217;. Tech Now also looks at the policy settings to see if they are a hindrance to progress or part of the solutions.</p>
<p>Evening Report&#8217;s Tech Now also includes audience participation, where the programme’s social media audiences can make comment and issue questions. The best of these can be selected and webcast in the programme LIVE.</p>
<p>Once the programme has concluded, it will automatically switch to video on demand so that those who have missed the programme, can watch it at a time of their convenience.</p>
<p>So join us on Facebook, Twitter, and Youtube as we will promote Tech Now via our social media channels and via web partners. It will also webcast live and on demand on <a href="https://eveningreport.nz/" target="_blank" rel="noopener noreferrer">EveningReport.nz</a>, and other selected outlets.</p>
<p>Do bookmark <a href="https://eveningreport.nz/" target="_blank" rel="noopener noreferrer">EveningReport.nz</a> and we look forward to you taking part in some robust live debate.</p>
<p><strong>About Us: </strong>EveningReport.nz is based in Auckland city, New Zealand, is an associate member of the <a href="https://eveningreport.nz/member-of-the-new-zealand-press-council/">New Zealand Media Council</a>, and is part of the MIL-OSI network, owned by its parent company Multimedia Investments Ltd (MIL) (<a href="https://milnz.co.nz/">MILNZ.co.nz</a>).</p>
<p>EveningReport specialises in publishing independent analysis and features from a New Zealand juxtaposition, including global issues and geopolitics as it impacts on the countries and economies of Australasia and the Asia Pacific region.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2020/09/08/live-tech-now-with-sarah-putt-selwyn-manning-ddos-attacks-first-responder-comms-a-digital-success-story/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NZ’s cyber security centre warns more attacks likely after stock market outages</title>
		<link>https://eveningreport.nz/2020/09/02/nzs-cyber-security-centre-warns-more-attacks-likely-after-stock-market-outages/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Tue, 01 Sep 2020 23:18:03 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Bots]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber-crime laws]]></category>
		<category><![CDATA[Dark web]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Five Eyes]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Illegal streaming]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Science-Technology]]></category>
		<category><![CDATA[Stock exchange]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2020/09/02/nzs-cyber-security-centre-warns-more-attacks-likely-after-stock-market-outages/</guid>

					<description><![CDATA[ANALYSIS: By Dave Parry, Auckland University of Technology The Government Communications Security Bureau (GCSB) has issued a warning to all New Zealand businesses to be prepared for cyber attacks, following almost a week of daily attacks on the New Zealand stock exchange (NZX). The attacks have caused outages, sometimes for hours, of NZX’s public-facing website ]]></description>
										<content:encoded><![CDATA[<p><strong>ANALYSIS:</strong> <em>By <a href="https://theconversation.com/profiles/dave-parry-506974" rel="nofollow">Dave Parry</a>, <a href="https://theconversation.com/institutions/auckland-university-of-technology-1137" rel="nofollow"><em>Au</em>ckland University of Technology</a></em></p>
<p>The Government Communications Security Bureau (<a href="https://www.gcsb.govt.nz/" rel="nofollow">GCSB</a>) has <a href="https://www.ncsc.govt.nz/newsroom/general-security-advisory-ongoing-campaign-of-dos-attacks-affecting-new-zealand-entities/" rel="nofollow">issued a warning</a> to all New Zealand businesses to be prepared for cyber attacks, following almost a week of <a href="https://www.zdnet.com/article/ddos-extortionists-target-nzx-moneygram-braintree-and-other-financial-services/" rel="nofollow">daily attacks</a> on the New Zealand stock exchange (<a href="https://www.nzx.com/" rel="nofollow">NZX</a>).</p>
<p>The attacks have caused outages, sometimes for hours, of NZX’s public-facing website since Tuesday last week. This week, it <a href="https://www.nzherald.co.nz/business/news/article.cfm?c_id=3&amp;objectid=12360753" rel="nofollow">continued trading</a> under a new arrangement that allows it to post information to alternative platforms.</p>
<p>The attacks are part of <a href="https://www.digitalattackmap.com/#anim=1&amp;color=0&amp;country=ALL&amp;list=0&amp;time=18489&amp;view=map" rel="nofollow">worldwide malicious cyber activity</a> and the government will likely share information via Interpol and government-to-government links, including the intelligence alliance know as Five Eyes.</p>
<p>The type of attack is known as a Distributed Denial of Service (<a href="https://securityintelligence.com/articles/avoid-ddos-attacks/" rel="nofollow">DDoS</a>). The attacker infects large numbers, often thousands or even millions, of computers with a virus that allows the attacker to instruct the infected computer – known as a “bot” – to send thousands of requests for data to the target.</p>
<p>In effect, this means millions of attempts to access a website at the same time. The website being attacked cannot respond to each one quickly enough so either it simply stops responding or responds to some but not all data requests.</p>
<p>Some people get the most up-to-date page and others don’t.</p>
<p>This is particularly damaging for financial information sites such as a stock market. They have a legal duty to give equal access to different users. They would normally shut down and stop trading for a while rather than allow some people to get information before others.</p>
<p>These attacks are not designed to steal data or do insider trading. They are generally set up to demand ransom from the victims, usually asking for thousands of dollars paid in bitcoin or another cryptocurrency which is effectively untraceable. Governments, terrorist organisations, political groups and even pranksters have also been known to use these attacks.</p>
<p>DDoS software is available on the dark web but also not very difficult to write. In many cases the people owning the bots will not be aware anything strange is happening.</p>
<p><strong>The current attacks</strong><br />Multi-day attacks have been rare but are becoming more common. The size of these attacks, including how many bots are used and their capacity to send requests, has been increasing.</p>
<figure class="wp-caption alignnone c2"><img loading="lazy" decoding="async" src="https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="auto, (min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=348&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=348&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=348&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=437&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=437&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=437&amp;fit=crop&amp;dpr=3 2262w" alt="Global map of cyber attacks." width="600" height="348"/><figcaption class="wp-caption-text">This map shows the number of global attacks on August 15. Image: CC BY-SA</figcaption></figure>
<p>Such multi-day attacks are potentially risky for the attackers as the defence team will be <a href="https://www.sciencedirect.com/science/article/abs/pii/S092523121501053X" rel="nofollow">analysing the attacks</a>, often using <a href="https://link.springer.com/chapter/10.1007/978-981-15-0199-9_58" rel="nofollow">artificial intelligence tools</a>, and should be able to respond more quickly to block illegitimate requests.</p>
<p>The defence against such attacks is based on being able to cope with the large number of requests, either by moving the website to a cloud-based system that can increase capacity quickly, or identifying bot requests and filtering them out by setting up a “whitelist” of legitimate users and excluding others.</p>
<p>This is normally done by firewalls at the level of each attacked entity, the internet service provider or, as in the case of New Zealand, at a country’s electronic border (for example, the Southern Cross trans-Pacific network of communications cables).</p>
<p>If an attack is coming from inside New Zealand, security software on the bot computer can normally remove the infection with up-to-date anti-virus software. Internet service providers can also detect this activity and may warn users or disconnect the infected machine until it is cleaned. But in this case, the attacks are coming from outside New Zealand.</p>
<p>The covid-19 pandemic means millions of people are working from home around the world, outside their normal corporate security, often using the family computer. Some people may be less careful about downloading software, particularly on illegal streaming sites, and may be using free or unsecured wifi networks. This makes <a href="https://www.researchgate.net/publication/340443250_Corona_Virus_COVID-19_Pandemic_and_Work_from_Home_Challenges_of_Cybercrimes_and_Cybersecurity" rel="nofollow">infecting computers to turn them into bots</a> much easier.</p>
<p><strong>How to repond</strong><br />Assuming this is a criminal gang, financial institutes are an attractive target. They rely on availability of service and potentially have money to pay ransoms.</p>
<p>In New Zealand, disaster management and recovery has tended to focus on responses to natural hazards rather than criminal activity. New Zealand does not have local cloud providers and expanding capacity is more difficult.</p>
<p>Even if NZX won’t pay a ransom, this attack is “advertising” for the criminal gangs that may act as “subcontactors” to larger criminal organisations.</p>
<p>The government’s aim will not be to catch the perpetrators in the short term but to share information on how to block the attacks. Normally the response is effective, but it can take some time to analyse details.</p>
<p>At the same time, other attacks (for example phishing to steal data) may use the confusion caused by the DDoS attacks to target potential victims. Organisations should encourage people to update their security software and remain vigilant.</p>
<p>In the future, as the internet of things (IoT) becomes more widespread, many billions of new devices will be connected to the internet. Security standards and forensic capability (storing data to analyse attacks) are not universal and there is a danger that these attacks will become more common and larger in scale.</p>
<p><strong>Defence is possible</strong><br />But defence is possible and both technical and policy approaches are getting better. Artificial intelligence tools for rapidly analysing attacks are the focus of <a href="https://www.tandfonline.com/doi/abs/10.1080/19393555.2020.1717019?journalCode=uiss20" rel="nofollow">research</a>.</p>
<p>Support for governments in vulnerable areas is also increasing to enforce international agreements, clarify local law and share information between network providers. For example, Macau recently introduced a much tougher cyber security law which <a href="https://www2.deloitte.com/cn/en/pages/risk/articles/macau-cybersecurity-law.html" rel="nofollow">seems to have been very effective</a>.<img loading="lazy" decoding="async" class="c3" src="https://counter.theconversation.com/content/145320/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1"/></p>
<p><a href="https://theconversation.com/profiles/dave-parry-506974" rel="nofollow"><em>Dr Dave Parry</em></a> <em>is head of the Department of Computer Science, <a href="https://theconversation.com/institutions/auckland-university-of-technology-1137" rel="nofollow">Auckland University of Technology.</a> This article is republished from <a href="https://theconversation.com" rel="nofollow">The Conversation</a> under a Creative Commons licence. Read the <a href="https://theconversation.com/nzs-cyber-security-centre-warns-more-attacks-likely-following-stock-market-outages-145320" rel="nofollow">original article</a>.</em></p>
<div class="printfriendly pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="c4" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener noreferrer">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bryce Edwards&#8217; Political Roundup: Intense speculation on Budget leaking and hacking</title>
		<link>https://eveningreport.nz/2019/05/29/bryce-edwards-political-roundup-intense-speculation-on-budget-leaking-and-hacking/</link>
		
		<dc:creator><![CDATA[Bryce Edwards]]></dc:creator>
		<pubDate>Wed, 29 May 2019 11:16:41 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Bryce Edwards]]></category>
		<category><![CDATA[Budget]]></category>
		<category><![CDATA[Critical Politics]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Digital data]]></category>
		<category><![CDATA[Digital policy]]></category>
		<category><![CDATA[Editor's Picks]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Law enforcement]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Leaks]]></category>
		<category><![CDATA[Legislation]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Media law]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[National Party]]></category>
		<category><![CDATA[National Party Leader]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[New Zealand Government Communications Security Bureau]]></category>
		<category><![CDATA[New Zealand National Party]]></category>
		<category><![CDATA[News Media]]></category>
		<category><![CDATA[NZ Politics]]></category>
		<category><![CDATA[Political freedom]]></category>
		<category><![CDATA[Political Integrity]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Treasury]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=24358</guid>

					<description><![CDATA[The problem with scandals involving so much mystery is they naturally lead to plenty of speculation, some of which might be useful and some which might be completely wrong, or even highly-damaging. And while we are still in the midst of it all, it&#8217;s extremely difficult to sort out the useful from the damaging. For ]]></description>
										<content:encoded><![CDATA[<p><strong>The problem with scandals involving so much mystery is they naturally lead to plenty of speculation, some of which might be useful and some which might be completely wrong, or even highly-damaging. And while we are still in the midst of it all, it&#8217;s extremely difficult to sort out the useful from the damaging.</strong></p>
<p>For the best overall guide to what has happened in the Budget leak/hack scandal, see the just-published article by Henry Cooke: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=b75db47597&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">What we know and don&#8217;t know about the Budget &#8216;hack&#8217;</a>. Amongst his rundown on the background to the scandal and the theories offered so far, Cooke points out that, rather than being hacked, the Treasury website might simply have been scanned by Google, allowing a cache of pages to become available to someone who has handed them on to the National Party.</p>
<p>Another leading explanation for how the Treasury&#8217;s Budget information was released early to National comes down to a simple but obvious idea that parliamentary staffers looked for and found the information on the Treasury website. This would also explain how National leader Simon Bridges could be so categorical in his insistence that his scoops weren&#8217;t based on hacking or illegality.</p>
<p>According to this theory, National had one of its Parliamentary staffers monitoring the Treasury website in the days leading up to Budget Day, constantly using the frontpage search bar on the site to look for &#8220;Budget 2019&#8221;. The hope being that at some stage some Budget documents would be loaded onto the site momentarily, in anticipation of Thursday&#8217;s publication, before they were then locked away for safety.</p>
<p>The story goes that by searching every five minutes or so, the National staffer eventually hit the jackpot when documents or pages turned up with the goods. It might have taken hundreds or even thousands of searches over a couple of days.</p>
<p>In fact, National Party pollster and blogger David Farrar has outlined a similar scenario based on his previous experience as a parliamentary staffer: &#8220;when I worked for the Opposition in 2000 or 2001, I recall waiting for the Government to release the Police crime stats. They always put a positive spin on it. I went to the Police website and looked at last year&#8217;s stats. I also looked at the previous year. They had the same URL format. I changed the year to the current one, and hey presto I had the official crime states four hours before the Government was due to release them&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=8ae2c456cb&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">My guess as to what happened</a>.</p>
<p>Farrar argues that something similar may have happened, and it therefore wouldn&#8217;t constitute hacking: &#8220;So my guess is something similar has happened. That possibly the material was put up on a website of some sort and someone found it. Treasury are calling it hacking because they didn&#8217;t think it was open to the public. But there is a difference between hacking a secure computer system, and locating information that is on the Internet (even if hidden). Was there any cracking of passwords for example?&#8221;</p>
<p>But do such explanations fit with what Treasury are saying when they claim that their site has been &#8220;deliberately and systematically hacked&#8221;? It&#8217;s arguable either way. Certainly, some tech-specialists seem to think that something much more sophisticated must have happened – especially based on the fact that Treasury has called in the Police. For one of the most in-depth discussions of the potential hacking, see John Anthony&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=d1046a2bda&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Budget 2019: &#8216;They&#8217;ll remember it as the budget that got hacked&#8217;</a>.</p>
<p>Despite some tech specialists believing that a sophisticated hack has occurred, one expert believes a software application might have simply found the material on the Treasury website: &#8220;Kiwi cyber security consultancy Darkscope technical director Joerg Buss said a likely scenario was that someone used a &#8216;spider or crawler&#8217; program to find hidden content in the Treasury website. Such software may have uncovered Budget 2019 files which had not been protected properly, he said.&#8221;</p>
<p>It could also be as simple as using Google to search for the material, which is covered by Juha Saarinen in his article, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7a27c10082&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Conspiracy or cock-up? Strong evidence Treasury published Budget accidentally – rather than a hack</a>. He says that &#8220;screenshots of the results from a Google search for &#8216;estimates of appropriation 2019/2020&#8217; are circulating on Twitter suggest that the data was published accidentally.&#8221;</p>
<p>Of course, the fact that Treasury has called in the Police would suggest that the government department believes that something much more sinister or malevolent has occurred. However, care needs to be taken in reading too much into this – especially since the Police haven&#8217;t even confirmed that they have agreed to investigate, except to say that they are assessing Treasury&#8217;s request.</p>
<p>Furthermore, whenever governments and officials call in the police or make claims that criminal actions have occurred in the political sphere, we should always be very sceptical. It&#8217;s the oldest trick in the bureaucratic book – to divert attention or to impugn an opponent with charges that they are mixed up in criminal activity. That&#8217;s not necessarily the case over the controversial budget leaks – it&#8217;s still far too early to tell what has happened.</p>
<p>This is certainly the argument made today by leftwing blogger No Right Turn, who suggests that government officials have a tendency, when they&#8217;ve made mistakes, to try to point the finger elsewhere, often using rather draconian measures to do so – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=2a4a8d8605&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Treasury, &#8220;hacking&#8221;, and incentives</a>.</p>
<p>Here&#8217;s his main point about how politicians and officials are inclined to bring the police into politics: &#8220;Unfortunately the natural instincts of power in New Zealand are to double down rather than admit a mistake, and to call in the police when embarrassed – just look at the tea tape, or Dirty Politics. With those, we saw police raiding newsrooms and journalist&#8217;s homes. I&#8217;m wondering if we&#8217;re going to see police raiding the opposition this time. Which would be highly damaging to our democracy.&#8221;</p>
<p>The blogger says that &#8220;the bureaucratic incentive towards arse-covering and blame-avoidance pushes that to be reclassified as nefarious &#8216;hacking&#8217;, and that incentive gets stronger the higher up the chain (and the further away from IT knowledge) you get.&#8221;</p>
<p>Here&#8217;s his own explanation for the release of the information: &#8220;The most likely scenario is that Treasury f**ked up and left them lying around on their web-server for anyone to read, and National or one of its proxies noticed this and exploited it. Accessing unprotected data on a public web-server isn&#8217;t &#8216;hacking&#8217; in any sense of the word – it&#8217;s just browsing.&#8221;</p>
<p>The onus is therefore on the Treasury to be much more transparent about what has happened writes Danyl Mclauchlan, saying a &#8220;brief technical explanation about what the &#8216;hack&#8217; amounted to would be a lot more useful than all the bluster and nebulous waffle we&#8217;ve heard so far&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=c8c5337adc&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Budget hacking scandal: About time Treasury told us what actually happened</a>.</p>
<p>Mclauchlan says that if it turns out that the leak has simply come from information on the Treasury website, &#8220;then we&#8217;ll be talking about the resignation of the Treasury Secretary, rather than National Party leader.&#8221;</p>
<p>The No Right Turn blogger doesn&#8217;t see the Government delivering such transparency any time soon: &#8220;neither Treasury nor their Minister has any interest in that (Ministers are rarely interested in incompetence in their own agencies, because it makes them look bad for allowing it). As for us, the public, we&#8217;re the loser, stuck with an incompetent, arse-covering public agency which has just failed on one of its most important tasks&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=1bc4b3ad95&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Treasury owes us answers</a>.</p>
<p>He argues that the decision to go to the Police means that Treasury can now sidestep such accountability: &#8220;conveniently, by referring the matter to the police Treasury has ensured that they can never do that. It might prejudice the police investigation, you see. OIA requests can be refused to avoid prejudice to the maintenance of the law, and anyone who actually tells anyone anything can be prosecuted. Accountability of course goes out the window&#8221;.</p>
<p>That doesn&#8217;t get National off the hook, however, if the party has done something illegal in the way they have procured or used the Budget information. One lawyer who knows a lot about hacks is Steven Price, and he argues that the release by National of the information was not in &#8220;the public interest&#8221;, and that it appears to have &#8220;broken the law relating to Breach of Confidence&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=e918238eb2&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Budget leak: Nats&#8217; behaviour &#8220;entirely appropriate&#8221;?</a></p>
<p>Price says that he is &#8220;irritated at the sanctimoniousness of Simon Bridges&#8217; denial that the Nats had done &#8216;anything approaching&#8217; illegality.&#8221; He does admit however, that if National have obtained the Budget information &#8220;through some area of Treasury&#8217;s (or some other government) website that was technically publicly accessible, then that would at least raise arguments that it wasn&#8217;t confidential in the first place, because it was in the public domain.&#8221;</p>
<p>Herald political editor Audrey Young is also less than impressed with how Bridges has dealt with the matter today, saying: &#8220;Simon Bridges needed to do two things today when he fronted the news media about allegations of hacking Treasury and he did neither. He needed to say, at least in general terms, how he received the leak of Budget of documents. And he needed to say he had contacted the police to offer them any assistance they needed in their investigation&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=971d3b71b3&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Simon Bridges needed to do two things today and he did neither</a>.</p>
<p>But for another view on the politics of it all, and an explanation of why Bridges&#8217; manoeuvres have been smart, see Brigitte Morten&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=d787b5a3e1&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">National plays strong hand over politics jackpot</a>. She argues that it&#8217;s in the public interest for National to be able to dispute the Government&#8217;s narrative over Budget spending, and to be able to point out the &#8220;lower than expected spending&#8221; in areas such as health &#8220;that the government doesn&#8217;t want you to reflect on.&#8221;</p>
<p>Finally, for a recent minor – but extremely colourful – Treasury controversy, involving the use of a transformative wellbeing experiment for staff, see Danyl Mclauchlan&#8217;s must-read investigation: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=34ba2cdbc3&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Peace, Rest and the Monkey Emoji Moon: playing Heartwork cards at Treasury</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
