<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber security &#8211; Evening Report</title>
	<atom:link href="https://eveningreport.nz/category/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://eveningreport.nz</link>
	<description>Independent Analysis and Reportage</description>
	<lastBuildDate>Wed, 02 Jul 2025 06:19:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Tonga cybersecurity attack wake-up call for Pacific, warns expert</title>
		<link>https://eveningreport.nz/2025/07/02/tonga-cybersecurity-attack-wake-up-call-for-pacific-warns-expert/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 06:19:52 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Health Ministry]]></category>
		<category><![CDATA[Health systems]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Inc Ransomware]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[justice]]></category>
		<category><![CDATA[Medical data]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Online extortion]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Science-Technology]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tonga]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2025/07/02/tonga-cybersecurity-attack-wake-up-call-for-pacific-warns-expert/</guid>

					<description><![CDATA[By Teuila Fuatai, RNZ Pacific senior journalist A Tongan cybersecurity expert says the country’s health data hack is a “wake-up call” for the whole region. Siosaia Vaipuna, a former director of Tonga’s cybersecurity agency, spoke to RNZ Pacific in the wake of the June 15 cyberattack on the country’s Health Ministry. Vaipuna said Tonga and ]]></description>
										<content:encoded><![CDATA[<p><em>By <a href="https://www.rnz.co.nz/authors/teuila-fuatai" rel="nofollow">Teuila Fuatai</a>, <a href="https://www.rnz.co.nz/international/pacific-news/" rel="nofollow">RNZ Pacific</a> senior journalist</em></p>
<p>A Tongan cybersecurity expert says the country’s health data hack is a “wake-up call” for the whole region.</p>
<p>Siosaia Vaipuna, a former director of Tonga’s cybersecurity agency, spoke to RNZ Pacific in the wake of the June 15 cyberattack on the country’s Health Ministry.</p>
<p>Vaipuna said Tonga and other Pacific nations were vulnerable to data breaches due to the lack of awareness and cybersecurity systems in the region.</p>
<p>“There’s increasing digital connectivity in the region, and we’re sort of . . . the newcomers to the internet,” he said.</p>
<p>“I think the connectivity is moving faster than the online safety awareness activity [and] that makes not just Tonga, but the Pacific more vulnerable and targeted.”</p>
<p>Since the data breach, the Tongan government has said “a small amount” of information from the attack was published online. This included confidential information, it said in a statement.</p>
<p>Reporting on the attack has also attributed the breach to the group Inc Ransomware.</p>
<p>Vaipuna said the group was well-known and had previously focused on targeting organisations in Europe and the US.</p>
<p><strong>New Zealand attack</strong><br />However, earlier this month, it targeted the Waiwhetū health organisation in Aotearoa New Zealand. That attack reportedly included the theft of patient consent forms and education and training data.</p>
<p>“This type of criminal group usually employs a double-extortion tactic,” Vaipuna said.</p>
<p>It could encrypt data and then demand money to decrypt, he said.</p>
<p>“The other ransom is where they are demanding payment so that they don’t release the information that they hold to the public or sell it on to other cybercriminals.”</p>
<p>In the current Tonga cyberattack, media reports say that Inc Ransomware wanted a ransom of US$1 million for the information it accessed. The Tongan government has said it has not paid anything.</p>
<p>Vaipuna said more needed to be done to raise awareness in the region around cybersecurity and online safety systems, particularly among government departments.</p>
<p>“I think this is a wake-up call. The cyberattacks are not just happening in movies or on the news or somewhere else, they are actually happening right on our doorstep and impacting on our people.</p>
<p><strong>Extra vigilance warning</strong><br />“And the right attention and resources should rightfully be allocated to the organisations and to teams that are tasked with dealing with cybersecurity matters.”</p>
<p>The Tongan government has also warned people to be extra vigilant when online.</p>
<p>It said more information accessed in the cyberattack may be published online, and that may include patient information and medical records.</p>
<p>“Our biggest concern is for vulnerable groups of people who are most acutely impacted by information breaches of this kind,” the government said.</p>
<p>It said that it would contact these people directly.</p>
<p>The country’s ongoing response was also being aided by experts from Australia’s special cyberattack team.</p>
<p><em>This article is republished under a community partnership agreement with RNZ.</em></p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &#038; Email"> </a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PODCAST: Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All</title>
		<link>https://eveningreport.nz/2022/09/01/podcast-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/</link>
					<comments>https://eveningreport.nz/2022/09/01/podcast-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/#comments</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 02:14:18 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Militants]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Military attack]]></category>
		<category><![CDATA[Military Forces]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[Military Tactics]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1076833</guid>

					<description><![CDATA[In this episode, Buchanan and Manning take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to say, it’s a world few realise exists and few realise how it is effecting them. With the technologies that surround us, tech that we use every day, it has become easy to conduct indirect or non-attributable warfare using a variety of means.]]></description>
										<content:encoded><![CDATA[<p><iframe title="Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All" width="640" height="360" src="https://www.youtube.com/embed/iN3o8a1R8_I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar –</strong> In this podcast, political scientist Paul Buchanan and Selwyn Manning analyse the advent of new technologies and the rise of hybrid warfare.</p>
<p>In this episode, Buchanan and Manning take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to say, it’s a world few realise exists and few realise how it is effecting them.</p>
<p>With the technologies that surround us, tech that we use every day, it has become easy to conduct indirect or non-attributable warfare using a variety of means.</p>
<p>There’s the grey area phenomena where opponent states undermine adversaries from within, sowing distrust, or fear, where there should not be. The purpose is to weaken public trust and a population’s resolve to support their government.</p>
<p>In an extreme situation, this form of hostilities can escalate into hybrid warfare using indirect and direct means, from cyber offensives to firepower.</p>
<p>To illustrate the issue, we will draw on the build-up to the Russian invasion of Ukraine, and also evaluate other locations around the world where there is evidence of hybrid warfare.</p>
<p>It may surprise you to realise how close to home are real world examples of hybrid warfare.</p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="(max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="(max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/09/01/podcast-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/feed/</wfw:commentRss>
			<slash:comments>13</slash:comments>
		
		
			</item>
		<item>
		<title>LIVE@Midday Thurs Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All</title>
		<link>https://eveningreport.nz/2022/08/31/livemidday-thurs-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/</link>
					<comments>https://eveningreport.nz/2022/08/31/livemidday-thurs-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Wed, 31 Aug 2022 08:31:00 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Geopolitics]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[liberal democracy]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Military Forces]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[Military Tactics]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Peoples Republic of China]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russian aggression]]></category>
		<category><![CDATA[Russian Federation]]></category>
		<category><![CDATA[Russian military]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States of America]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1076810</guid>

					<description><![CDATA[A View from Afar – In this podcast, political scientist Paul Buchanan and Selwyn Manning will analyse the advent of new technologies and the rise of hybrid warfare. In this episode, we will take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to ]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All" width="640" height="360" src="https://www.youtube.com/embed/iN3o8a1R8_I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar –</strong> In this podcast, political scientist Paul Buchanan and Selwyn Manning will analyse the advent of new technologies and the rise of hybrid warfare.</p>
<p>In this episode, we will take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to say, it’s a world few realise exists and few realise how it is effecting them.</p>
<p>With the technologies that surround us, tech that we use every day, it has become easy to conduct indirect or non-attributable warfare using a variety of means.</p>
<p>There’s the grey area phenomena where opponent states undermine adversaries from within, sowing distrust, or fear, where there should not be. The purpose is to weaken public trust and a population’s resolve to support their government.</p>
<p>In an extreme situation, this form of hostilities can escalate into hybrid warfare using indirect and direct means, from cyber offensives to firepower.</p>
<p>To illustrate the issue, we will draw on the build-up to the Russian invasion of Ukraine, and also evaluate other locations around the world where there is evidence of hybrid warfare.</p>
<p>It may surprise you to realise how close to home are real world examples of hybrid warfare.</p>
<p><strong>Join Paul and Selwyn for this LIVE recording of this podcast while they consider these big issues, and remember any comments you make while live can be included in this programme.</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/08/31/livemidday-thurs-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Submission &#8211; Why New Zealand is a ‘sweet spot’ for DDoS attacks</title>
		<link>https://eveningreport.nz/2022/04/22/submission-why-new-zealand-is-a-sweet-spot-for-ddos-attacks/</link>
					<comments>https://eveningreport.nz/2022/04/22/submission-why-new-zealand-is-a-sweet-spot-for-ddos-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Evening Report]]></dc:creator>
		<pubDate>Thu, 21 Apr 2022 23:41:39 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Essays]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Submissions]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1074208</guid>

					<description><![CDATA[Essay by By Raymond Maisano, Head of Australia and New Zealand, Cloudflare. Aotearoa New Zealand makes up a small portion of the world’s population, yet the country is being hit by a relatively bigger share of cyber attacks. Chances are, you’re familiar with the term ‘distributed denial of service (DDoS) attack’. Not because your organisation ]]></description>
										<content:encoded><![CDATA[<p><em>Essay by By Raymond Maisano, Head of Australia and New Zealand, Cloudflare.</em></p>
<p>Aotearoa New Zealand makes up a small portion of the world’s population, yet the country is being hit by a relatively bigger share of cyber attacks.</p>
<p>Chances are, you’re familiar with the term ‘distributed denial of service (DDoS) attack’. Not because your organisation has been subjected to one, but instead, the recent numerous, high profile attacks on local and global businesses have captured your attention.</p>
<p>With cyber attacks ramping up across the globe and Aotearoa New Zealand an attractive target, every business—no matter the size—must put protections in place.</p>
<p><strong>What’s a DDoS attack?</strong></p>
<p>Designed to disrupt the normal function of a server, DDoS attacks harness compromised computers and hardware like<a href="https://www.cert.govt.nz/business/news-and-events/malware-attacks-and-tech-scam-calls-are-on-the-rise-according-to-newly-released-quarter-three-data-from-cert-nz-new-news-page/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/business/news-and-events/malware-attacks-and-tech-scam-calls-are-on-the-rise-according-to-newly-released-quarter-three-data-from-cert-nz-new-news-page/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw0jAAnCY9szkVi2lKs4WC0B"> Internet of Things (IoT) devices</a> to flood the target or its surrounding infrastructure with traffic. This influx can slow down or overwhelm a website or service, denying access to genuine traffic.</p>
<p>DDoS attacks are on the rise across the world, with attackers using different styles of malicious activity to take down websites and even using them as an attempt to extort money. Businesses from all industries were victims of ransom DDoS (RDDoS) attacks in 2021, and<a href="https://blog.cloudflare.com/ddos-attack-trends-for-2021-q4/" data-saferedirecturl="https://www.google.com/url?q=https://blog.cloudflare.com/ddos-attack-trends-for-2021-q4/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw3pQ4xXA9TzmT7bUxzDMGBF"> Q4 saw a 29% YoY and 177% QoQ increase</a>.</p>
<p><strong>New Zealand is a prime target</strong></p>
<p>Only<a href="https://www.submarinecablemap.com/country/new-zealand" data-saferedirecturl="https://www.google.com/url?q=https://www.submarinecablemap.com/country/new-zealand&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw2xWMuI7zMfVoteE9sEYfrD"> three active undersea submarine cables</a> connect Aotearoa New Zealand to the outside world. In comparison to the rest of the world, this relatively small number makes it easier for the country’s networks to be overwhelmed.</p>
<p>&nbsp;</p>
<p>In fact, the National Cyber Security Centre (NCSC) reported an increase in criminal or financially motivated actors with a significant national impact or potential to cause serious harm in its<a href="https://www.ncsc.govt.nz/assets/NCSC-Documents/2020-2021-NCSC-Cyber-Threat-Report.pdf" data-saferedirecturl="https://www.google.com/url?q=https://www.ncsc.govt.nz/assets/NCSC-Documents/2020-2021-NCSC-Cyber-Threat-Report.pdf&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw1urTBiP1tRxHXX3mArbPQO"> 2020-21 threat report</a> (27% compared to 14% the year prior).</p>
<p>A spate of high profile, local businesses experienced repeated DDoS attacks over the last 18 months—from <a href="https://www.reuters.com/technology/widespread-internet-outages-hits-users-across-new-zealand-2021-09-03/" data-saferedirecturl="https://www.google.com/url?q=https://www.reuters.com/technology/widespread-internet-outages-hits-users-across-new-zealand-2021-09-03/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw2smCmBHQWMB6iRzlyWdUem">Vocus</a> to<a href="https://www.nzherald.co.nz/business/live-cyber-attack-fears-kiwibank-anz-nz-post-metservice-back-online-after-cert-flags-cyber-attacks/KJMXHDACPES4BP3FZ465LESJFM/" data-saferedirecturl="https://www.google.com/url?q=https://www.nzherald.co.nz/business/live-cyber-attack-fears-kiwibank-anz-nz-post-metservice-back-online-after-cert-flags-cyber-attacks/KJMXHDACPES4BP3FZ465LESJFM/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw1XyNJ_M9ANluLS_cs1dZJR"> one coordinated attack</a> on NZ Post, MetService, Kiwibank, ANZ and Inland Revenue.</p>
<p>However, it is critical to note that organisations of any size can fall victim to a DDoS or RDDoS attack. No business is immune, and the impacts can be significant.</p>
<p><strong>How can businesses prevent these types of attacks?</strong></p>
<p>Most organisations in Aotearoa New Zealand are still trying to protect themselves using traditional security measures that are no match for a burgeoning tide of bots, ready to be mobilised against them in a few strokes of a keyboard.</p>
<p>While this might sound daunting, implementing good cyber security protections against DDoS attacks does not need to be.</p>
<ol>
<li><strong>Speak with your network provider </strong>to understand what DDoS mitigation services they offer and how much traffic they can mitigate before your organisation is affected. This is an added service for some providers, while others might charge surge pricing in the unlucky instance that your website is bombarded with traffic during a DDoS attack.</li>
<li><strong>Ramp up your front-line protection. </strong>Engage a provider with specially designed network equipment or a cloud-based protection service to mitigate your business from incoming threats. Here, it’s essential to consider the potential risk to your company and consider the scalability, flexibility, reliability and network size of potential providers. For example, large-scale attacks have the potential to take out on-site network infrastructure, while cloud-based solutions can scale when mitigating attacks.</li>
</ol>
<ol start="3">
<li><strong>Create a DDoS attack incident response plan.</strong> The overwhelming nature of a DDoS attack can take out multiple systems and services, not just your website. And in the moment, it’s easy for panic to set in. Be proactive, create a dedicated DDoS<a href="https://www.cert.govt.nz/business/guides/incident-response-plan/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/business/guides/incident-response-plan/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw3KdwMmLJCs9zjEFiL_gw7e"> incident response plan</a>, and conduct exercises to ensure its effectiveness.</li>
</ol>
<ol start="4">
<li><strong>Regularly</strong> <strong>patch your systems, software and hardware. </strong>Developers regularly release updates to decrease or eliminate vulnerabilities in software. Applying these patches to operating systems, applications, and all network-connected devices in real-time is the simplest way to mitigate a cyber security attack. There’s a reason why patching is<a href="https://www.cert.govt.nz/it-specialists/critical-controls/10-critical-controls/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/it-specialists/critical-controls/10-critical-controls/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw3bpN0GoCeQqeUb3qjVHJiN"> CERT NZ’s top critical control</a> to protect organisations from being breached—don’t leave your business wide open.</li>
</ol>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/04/22/submission-why-new-zealand-is-a-sweet-spot-for-ddos-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Op-Ed: Employees are make or break to the Zero Trust journey</title>
		<link>https://eveningreport.nz/2022/04/12/op-ed-employees-are-make-or-break-to-the-zero-trust-journey/</link>
					<comments>https://eveningreport.nz/2022/04/12/op-ed-employees-are-make-or-break-to-the-zero-trust-journey/#respond</comments>
		
		<dc:creator><![CDATA[Evening Report]]></dc:creator>
		<pubDate>Tue, 12 Apr 2022 04:24:59 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Op-Ed]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1074016</guid>

					<description><![CDATA[Op-Ed by Raymond Maisano, Head of Australia and New Zealand, Cloudflare It’s been over ten years since Forrester initially coined the term ‘Zero Trust’. The cybersecurity concept has surged in popularity in recent years, becoming the choice approach to protecting remote and hybrid workers from the growing cyber threats and data breaches brought on by ]]></description>
										<content:encoded><![CDATA[<p><em>Op-Ed by Raymond Maisano, Head of Australia and New Zealand, Cloudflare</em></p>
<p><strong>It’s been over ten years since Forrester initially coined the term ‘Zero Trust’.</strong> The cybersecurity concept has surged in popularity in recent years, becoming the choice approach to protecting remote and hybrid workers from the growing cyber threats and data breaches brought on by the pandemic.</p>
<p>The National Cyber Security Centre recorded a 15% increase in attacks towards Aotearoa New Zealand’s nationally significant organisations in its <a href="https://www.ncsc.govt.nz/assets/NCSC-Documents/2020-2021-NCSC-Cyber-Threat-Report.pdf" data-saferedirecturl="https://www.google.com/url?q=https://www.ncsc.govt.nz/assets/NCSC-Documents/2020-2021-NCSC-Cyber-Threat-Report.pdf&amp;source=gmail&amp;ust=1649820880437000&amp;usg=AOvVaw2OOYLC8IsSzZZG9gjCgSvj">2020-21 threat report</a>, including major banking and financial organisations and healthcare providers.</p>
<p>This is an upward trend that is common across the region. According to <a href="https://www.cloudflare.com/lp/apac-zt-survey/" data-saferedirecturl="https://www.google.com/url?q=https://www.cloudflare.com/lp/apac-zt-survey/&amp;source=gmail&amp;ust=1649820880437000&amp;usg=AOvVaw2B_R_STufFc0DdB5fOfSbF">recent Cloudflare research</a>, 44% of IT and security leaders in APAC said the pandemic had a significant impact on how their organisation approached IT security, leading them to increase their investment in IT security measures like Zero Trust. For 77% of respondents, IT security was one of the core areas “keeping them awake at night”.</p>
<p>The study further revealed a majority (86%) of organisations are aware of Zero Trust. In fact, 66% of respondents had implemented a Zero Trust strategy, and of those without, 58% planned to implement such an approach within the next 12 months.</p>
<p>However, while local IT and security leaders are clearly seeing the benefits of the Zero Trust approach, challenges in getting employees’ buy-in often prevent successful implementation. To overcome this hurdle, there are several steps organisations can take to enlist employees on the Zero Trust journey.</p>
<p><strong>No longer just a concept—what does Zero Trust mean in 2022?</strong></p>
<p>Zero Trust is a security model based on the principle of maintaining strict access controls and not trusting any user by default, including those already inside the network perimeter. If a malicious actor managed to gain access from the outside of an organisation, or a current or ex-employee with access posed an insider threat, with traditional IT network security measures, they would be free to move laterally and wreak havoc from the inside. However, Zero Trust frameworks assume there are attackers both within and outside of the network, so no users or machines are automatically trusted.</p>
<p>This inherent lack of trust is effective in safeguarding an organisation against ransomware attacks that have rattled Aotearoa New Zealand organisations of late, like the <a href="https://www.stuff.co.nz/national/health/126898520/waikato-dhb-cyber-attack-old-software-susceptible-to-malware-was-being-used-by-some-staff" data-saferedirecturl="https://www.google.com/url?q=https://www.stuff.co.nz/national/health/126898520/waikato-dhb-cyber-attack-old-software-susceptible-to-malware-was-being-used-by-some-staff&amp;source=gmail&amp;ust=1649820880437000&amp;usg=AOvVaw0J9Dptk-VlP834aFBxbm9T">Waikato District Health Board</a>, and unauthorised access and malware attacks, which increased by <a href="https://www.cert.govt.nz/about/quarterly-report/quarter-three-report-2021/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/about/quarterly-report/quarter-three-report-2021/&amp;source=gmail&amp;ust=1649820880437000&amp;usg=AOvVaw0HlqLulQ8jm40z5kkG17wk">32% and 372% in Q3 2021 respectively</a>.</p>
<p>Employing values and practises from <a href="https://www.cert.govt.nz/it-specialists/critical-controls/10-critical-controls/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/it-specialists/critical-controls/10-critical-controls/&amp;source=gmail&amp;ust=1649820880437000&amp;usg=AOvVaw0rNbjw5EIFKcQHfHUxyTy4">CERT NZ’s list of top critical controls</a>, like multi-factor authentication, micro-segmentation and least-privilege access only grant access once the identity, context, and policy adherence of each specific request is verified. Logins and connections time out periodically once established, forcing users and devices to be continuously re-verified.</p>
<p>While the security benefits are clear and proven, it is possible to take a Zero Trust approach too far and isolate workforces. If employees aren’t educated on its purpose, they might begin to view such frameworks as indications that their organisations cannot or will not trust them. Or, perhaps, they might see the related protocols as inconvenient processes that prevent productivity. Such sentiment risks disengaging employees from the Zero Trust journey, opening an organisation up to vulnerabilities.</p>
<p><strong>How can businesses enlist employees on the Zero Trust journey?</strong></p>
<p>First, engage employees in Zero Trust from the beginning. Not only does onboarding talent present the first opportunity to get effective role-based access control in place, but it also provides the chance to set expectations, answer questions, and establish best practices around employee engagement with the organisation’s security approach.</p>
<p>Day one adoption is particularly essential as 85% of APAC enterprises’ IT and cybersecurity decision-makers agreed workforces would be more mobile in the future. Moreover, amid staffing shortages, the ‘Great Resignation’ and increased turnover, a Zero Trust approach to offboarding with clear expectations is far smoother for all involved.</p>
<p>Cyber attacks are becoming increasingly costly for businesses of all sizes—with Aotearoa New Zealand organisations losing, on average, <a href="https://www.cert.govt.nz/about/quarterly-report/quarter-three-report-2021/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/about/quarterly-report/quarter-three-report-2021/&amp;source=gmail&amp;ust=1649820880437000&amp;usg=AOvVaw0HlqLulQ8jm40z5kkG17wk">$4.1 million</a> every three months. No longer can cyber security only be seen as the IT team’s problem; it must be recognised as a critical function that all employees at all levels are responsible for. Continued and accessible education is paramount. An effective Zero Trust experience works for and empowers every employee.</p>
<p>The industry needs to get comfortable with the idea that trust and education must be extended beyond the IT and security team to include the actual constituents we are trying to support and secure. This means that all employees should be continuously educated on the rationale behind Zero Trust security measures. Explaining that the measures taken are to protect, rather than monitor, means employees are less likely to feel distrust and instead be empowered to work with them.</p>
<p>Shifting to Zero Trust access for every application is the only way to secure today’s human and network resources. Zero Trust is a journey, and while our research indicates that the intent is there, many Aotearoa New Zealand and APAC organisations have only just begun to roll out this approach to IT security.</p>
<p>To progress on this journey, businesses must first overcome the challenges in getting employees’ buy-in and commitment to Zero Trust frameworks through continual engagement and education.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/04/12/op-ed-employees-are-make-or-break-to-the-zero-trust-journey/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LIVE@MIDDAY: Buchanan and Manning Consider the Global Issues that Define 2021</title>
		<link>https://eveningreport.nz/2021/12/01/livemidday-buchanan-and-manning-consider-the-global-issues-that-define-2021/</link>
					<comments>https://eveningreport.nz/2021/12/01/livemidday-buchanan-and-manning-consider-the-global-issues-that-define-2021/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Wed, 01 Dec 2021 02:58:54 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[AUKUS]]></category>
		<category><![CDATA[Authoritarianism]]></category>
		<category><![CDATA[Autonomous Weapons]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[covid19]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Geopolitics]]></category>
		<category><![CDATA[Indo-Pacific]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific politics]]></category>
		<category><![CDATA[Pacific security]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Peoples Republic of China]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Russian Federation]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[United States of America]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1071075</guid>

					<description><![CDATA[A View from Afar – In this podcast, political scientist Paul Buchanan and Selwyn Manning will consider and analyse the most significant global issues that define 2021. The topics will include: - Leadership: Trump, Putin, Xi, Biden; - Pandemic: Impact of Covid-19 &#038; variants on global security; - Security: Afghanistan, AUKUS, Autonomous Weapons, Cyber-Hackers/Attackers.]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Thurs@Midday: Buchanan and Manning Consider the Global Issues that Define 2021" width="640" height="360" src="https://www.youtube.com/embed/uzsGLRNnnEE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar</strong> – In this podcast, political scientist Paul Buchanan and Selwyn Manning will consider and analyse the most significant global issues that define 2021. The topics will include:</p>
<p><span class="s1">&#8211; Leadership: Trump, Putin, Xi, Biden,</span></p>
<p><span class="s1">&#8211; Pandemic: Impact of Covid-19 &amp; variants on global security</span></p>
<p><span class="s1">&#8211; Security: Afghanistan, AUKUS, Autonomous Weapons, Cyber-Hackers/Attackers.</span></p>
<p><strong>Join Paul and Selwyn for this LIVE recording of this podcast while they consider these big issues, and remember any comments you make while live can be included in this programme.</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2021/12/01/livemidday-buchanan-and-manning-consider-the-global-issues-that-define-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PODCAST: Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare</title>
		<link>https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/</link>
					<comments>https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Thu, 29 Jul 2021 02:52:51 +0000</pubDate>
				<category><![CDATA[36th Parallel Assessments]]></category>
		<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Evening Report]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Intelligence agencies]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Private Spying]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1068174</guid>

					<description><![CDATA[Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar with a deep-dive into cyber-attacks and hybrid warfare - Especially how 2021 has witnessed a Cold War II styled stand-off between global powers.]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare" width="640" height="360" src="https://www.youtube.com/embed/j2ZmyUav3n0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar:</strong> Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar with a deep-dive into cyber-attacks and hybrid warfare &#8211; Especially how 2021 has witnessed a Cold War II styled stand-off between global powers.</p>
<p>To re-cap, there has been:</p>
<ul>
<li>Allegations of a global-scale hack by the People’s Republic of China.</li>
<li>There’s the Pegasus spyware scandal, where Israel has exported deep-tracking and targeting spyware to despots and authoritarian governments.</li>
<li>Then there’s been the relatively silent mission-creep of Palantir as a Western-oriented Public Private Partnership-styled signals &#8220;facilitator&#8221;.</li>
</ul>
<p>Paul and Selwyn discuss how all of this sets 2021 apart and adds up to an evolution of hybrid warfare capabilities.</p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" width="165" height="40" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center>&nbsp;</p>
<p><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0"></iframe></center><center></center><center></center><a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license"><img decoding="async" style="border-width: 0;" src="https://i.creativecommons.org/l/by-sa/4.0/88x31.png" alt="Creative Commons Licence" /></a><br />
A View from Afar by <a href="https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/" rel="cc:attributionURL">Paul G. Buchanan and Selwyn Manning</a> is licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license">Creative Commons Attribution-ShareAlike 4.0 International License</a>.<br />
Based on a work at <a href="https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/" rel="dct:source">https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Scheduled LIVE: Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare</title>
		<link>https://eveningreport.nz/2021/07/28/scheduled-live-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/</link>
					<comments>https://eveningreport.nz/2021/07/28/scheduled-live-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Wed, 28 Jul 2021 03:59:12 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1068143</guid>

					<description><![CDATA[A View from Afar: Selwyn Manning and Paul Buchanan will present this week’s podcast, A View from Afar, LIVE at midday Thursday and will do a deep-dive into cyber-attacks and hybrid warfare &#8211; Especially how 2021 has witnessed a Cold War II styled stand-off between global powers. To re-cap, there has been: Allegations of a ]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare" width="640" height="360" src="https://www.youtube.com/embed/j2ZmyUav3n0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar:</strong> Selwyn Manning and Paul Buchanan will present this week’s podcast, A View from Afar, LIVE at midday Thursday and will do a deep-dive into cyber-attacks and hybrid warfare &#8211; Especially how 2021 has witnessed a Cold War II styled stand-off between global powers.</p>
<p>To re-cap, there has been:</p>
<ul>
<li>Allegations of a global-scale hack by the People’s Republic of China.</li>
<li>There’s the Pegasus spyware scandal, where Israel has exported deep-tracking and targeting spyware to despots and authoritarian governments.</li>
<li>Then there’s been the relatively silent mission-creep of Palantir as a Western-oriented Public Private Partnership-styled signals &#8220;facilitator&#8221;.</li>
</ul>
<p>Paul and Selwyn will discuss how all of this sets 2021 apart and adds up to an evolution of hybrid warfare capabilities.</p>
<p><strong>WE INVITE YOU TO PARTICIPATE WHILE WE ARE LIVE WITH COMMENTS AND QUESTIONS IN THE RECORDING OF THIS PODCAST:</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" width="165" height="40" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center>&nbsp;</p>
<p><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0"></iframe></center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2021/07/28/scheduled-live-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NZ cyber agency chief worried China hacks exploiting security weakness</title>
		<link>https://eveningreport.nz/2021/07/21/nz-cyber-agency-chief-worried-china-hacks-exploiting-security-weakness/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Tue, 20 Jul 2021 13:18:11 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[GCSB]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Government Communications Security Bureau]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Multimedia]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2021/07/21/nz-cyber-agency-chief-worried-china-hacks-exploiting-security-weakness/</guid>

					<description><![CDATA[RNZ News New Zealand’s cyber security agency believes China has been behind numerous hack attacks spanning years. The government joined Western allies and Japan in calling out Beijing for so-called state-sponsored hacks, including a major incursion in February when Microsoft email servers were targeted. The US has charged four Chinese nationals — three security officials ]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.rnz.co.nz/national/programmes/checkpoint/" rel="nofollow"><em>RNZ News</em></a></p>
<p>New Zealand’s cyber security agency believes China has been behind numerous hack attacks spanning years.</p>
<p>The government joined Western allies and Japan in calling out Beijing for so-called state-sponsored hacks, including a major incursion in February when Microsoft email servers were targeted.</p>
<p>The US has <a href="https://www.aljazeera.com/economy/2021/7/19/us-uk-and-allies-tie-chinese-government-to-microsoft-hack" rel="nofollow">charged four Chinese nationals</a> — three security officials and one contract hacker — with targeting dozens of companies and government agencies in the United States and overseas under the cover of a tech company.</p>
<p>“What we do is when we see malicious cyber activity on New Zealand networks, that may be through our own capabilities that we have to help protect New Zealand networks or it may be something that’s reported to us, we look at the malware that’s used,” Government Communications Security Bureau Director-General Andrew Hampton told RNZ <em>Checkpoint</em>.</p>
<p>“We look at how the actor behaves. We look at who they might be targeting and what they do if they get onto a network.</p>
<p>“That allows us to build a bit of a picture of who the actor is. We then compare that with information that we receive, often from our intelligence partners who are also observing such activity.</p>
<p>“That allows us to make an assessment, and it’s always a probability assessment about who the actor is.</p>
<p><strong>The APT 40 group</strong><br />“In this case, because of the amount of information we’ve been able to access both from our own capabilities and from our partners, we’ve got a reasonably high level of confidence that the actor who we’ve seen undertaking this campaign over a number of years, and in particular, who was responsible for the Microsoft Exchange compromise, was the APT 40 group — Advanced Persistent Threat Group 40 — which has been identified as associated with the Chinese Ministry of State Security.</p>
<p><em>The RNZ National live stream.  Video: Checkpoint</em></p>
<p>“The actors here are state sponsored actors rather than what we would normally define as a criminal group. What we’re seeing here is a state sponsored actor likely to be motivated by a desire to steal information.”</p>
<p>Hampton said there was a blurring of lines between what a state agency does, and what a criminal group does.</p>
<p>“Some of the technical capabilities that previously only state organisations had, have now got into the hands of criminal groups.</p>
<p>“Also what we’ve seen in a range of countries is individuals who may work part-time in a government intelligence agency, and then may work part-time in a criminal enterprise. Or they may have previously worked in a state intelligence agency and are now out by themselves but still have links links back to the state.</p>
<p>“We don’t know the full detail of the nature of the relationship, but what we do know is the Ministry of State Security in China, for example, is a very large organisation with many thousands of of employees.</p>
<p>“So they are big organisations with people on their payroll but they also would have connections with other individuals and organisations.</p>
<p><strong>Information shared with criminals</strong><br />“Something else worth noting with regard to this most recent compromise involving the Microsoft Exchange, what we saw there is once the Ministry of State Security actors had identified the vulnerability and exploited it, they then shared that information with a range of other actors, including criminal groups, so they too could exploit it.</p>
<p>“This is obviously a real concern to see this type of behaviour occurring,” Hampton said.</p>
<p>All evidence showed the cyber attacks were all originating from mainland China, Hampton told <em>Checkpoint</em>.</p>
<p>He said such attacks would be aimed at stealing data or possibly positioning themselves on a system to be able to access information in the future.</p>
<p>“A common tactic we see, unfortunately, is there may be a vulnerability in a system,” Hampton said.</p>
<p>“It could be a generic vulnerability across all users of that particular system, and a malicious actor may become aware of that vulnerability, so they would use that to get onto the network.</p>
<p>“That doesn’t mean they will then start exfiltrating data from day one or something like that. They may just want to to sit there in the event that at some point in the future they may want to start doing that.</p>
<p><strong>Malicious actors</strong><br />“This exploitation of known vulnerabilities is a real concern. This is why all organisations need to keep their security patches up to date, because what can happen is you can have malicious actors use technology to scan whole countries to see who hasn’t updated their patches.</p>
<p>“They then use that vulnerability to get on the network and they may not do anything with it for some time. Or they might produce a list of all the organisations, say, in New Zealand who haven’t updated their patches.</p>
<p>“Then they make a decision – okay these are the four to five we want to further exploit.”</p>
<p><em><em>This article is republished under a community partnership agreement with RNZ.</em></em></p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="c2" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PODCAST &#8211; Manning and Buchanan on NZ&#8217;s National Security Strategy &#8211; Also Peru Voters Go Left</title>
		<link>https://eveningreport.nz/2021/06/10/podcast-manning-and-buchanan-on-nzs-national-security-strategy-also-peru-voters-go-left/</link>
					<comments>https://eveningreport.nz/2021/06/10/podcast-manning-and-buchanan-on-nzs-national-security-strategy-also-peru-voters-go-left/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 02:38:50 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Evening Report]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[neoliberalism]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[New Zealand Defence Force]]></category>
		<category><![CDATA[New Zealand Government Communications Security Bureau]]></category>
		<category><![CDATA[New Zealand Security Intelligence Service]]></category>
		<category><![CDATA[NZ Politics]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Peru]]></category>
		<category><![CDATA[Peru Elections]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Political history]]></category>
		<category><![CDATA[Political Integrity]]></category>
		<category><![CDATA[Political Stability]]></category>
		<category><![CDATA[Political Strategy]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1067255</guid>

					<description><![CDATA[Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar, where they analyse New Zealand's national security strategy. How does NZ best position itself as a progressive independent Pacific Island state? Also, Peru voters go left. What does this mean for Peru, and neoliberalism, as Peru faces a pandemic where Covid-19 has raged causing the highest recorded death rates in the world.]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Manning and Buchanan on NZ&#039;s National Security Strategy - Also World Watch" width="640" height="360" src="https://www.youtube.com/embed/K13FshslWG8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar: </strong>Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar, where they analyse New Zealand&#8217;s national security strategy.</p>
<p>There has been no defence white paper since the John Key National-led governments and no comprehensive review of New Zealand&#8217;s strategic priorities, nor assessment of the region&#8217;s threat landscape both internal and external.</p>
<p>Now, with hybrid threats like cyberwarfare and terrorism adopting an &#8220;intermestic&#8221; (international and domestic) characteristic due to on-line recruitment and radicalisation, the perceived need is to develop a holistic national security strategy that addresses defence, security and intelligence needs of the 2020 decade.</p>
<p>But what does this all mean for New Zealand&#8217;s defence forces, intelligence community, and cyber-defence agencies?</p>
<p>ALSO: World Watch &#8211; The latest/recent round of elections in places like Peru, Mexico and Israel can be viewed as referendums on neoliberalism and national populism.</p>
<p>For example: You can see how Israel prime minister Benjamin Netanyahu has adopted Donald Trump-like rhetoric to describe his opponents.</p>
<p>A similar style has been used by the right wing in Peru as well as in Brazil.</p>
<p>The Peru election pits a socialist native Indian against Peru&#8217;s former dictator Fujimori&#8217;s daughter. She is a neoliberal conservative.</p>
<p>Both national populism and various socialist approaches have something in common: both ideologies reject neoliberal economic theory in principle and in fact.</p>
<p>With the left most likely to win the elections in Peru, and considering the challenges that Peru faces (<em>including a pandemic where Covid-19 has raged through its communities positioning Peru as having suffered the <a href="https://eveningreport.nz/2021/06/09/keith-rankin-chart-analysis-charts-on-excess-deaths-in-the-era-of-covid19/" target="_blank" rel="noopener">highest recorded death rates in the world</a></em>) the question begs, has neoliberalism run its course?</p>
<p><strong>WE INVITE YOU TO PARTICIPATE WHILE WE ARE LIVE WITH COMMENTS AND QUESTIONS IN THE RECORDING OF THIS PODCAST:</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" width="165" height="40" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center>&nbsp;</p>
<p><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0"></iframe></center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2021/06/10/podcast-manning-and-buchanan-on-nzs-national-security-strategy-also-peru-voters-go-left/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Myanmar’s junta plans draconian cyber-security law to stifle dissent</title>
		<link>https://eveningreport.nz/2021/02/13/myanmars-junta-plans-draconian-cyber-security-law-to-stifle-dissent/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Fri, 12 Feb 2021 11:18:11 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Asia Report]]></category>
		<category><![CDATA[Bloggers' data]]></category>
		<category><![CDATA[Blogging]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[confidentiality]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber-censorship]]></category>
		<category><![CDATA[Cyber-crime laws]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Junta]]></category>
		<category><![CDATA[justice]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Military coups]]></category>
		<category><![CDATA[Myanmar]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific Media Watch]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2021/02/13/myanmars-junta-plans-draconian-cyber-security-law-to-stifle-dissent/</guid>

					<description><![CDATA[Reporters Without Borders (RSF) has condemned a proposed cyber-security law in Myanmar that would organise online censorship and force social media platforms to share private information about their users when requested by the authorities. The draft law, which has just been leaked, is clearly designed to prevent pro-democracy activists from continuing to organise the demonstrations ]]></description>
										<content:encoded><![CDATA[<p>Reporters Without Borders (RSF) has condemned a proposed cyber-security law in Myanmar that would organise online censorship and force social media platforms to share private information about their users when requested by the authorities.</p>
<div readability="80.266086415915">
<p>The draft law, which has just been leaked, is clearly designed to prevent pro-democracy activists from continuing to organise the demonstrations that have been taking place every day in cities across Myanmar in response to the military coup on February 1.</p>
<p>The State Administration Council – as the new military junta euphemistically calls itself – sent a copy of the proposed law to internet access and online service providers on  February 9.</p>
<p>And the junta is expected to make it public on February 15.</p>
<p>The draft law, which RSF has seen, would require online platforms and service providers operating in Myanmar to keep all user data in a place designated by the government for three years.</p>
<p><strong>‘Causing hate, destabilisation’</strong><br />Article 29 would give the government the right to order an account’s “interception, removal, destruction or cessation” in the event of any content “causing hate or disrupting unity, stabilisation and peace,” any “disinformation,” or any comment going “against any existing law.”</p>
<p>This extremely vague wording would give the government considerable interpretative leeway and would in practice allow it to ban any content it disliked and to prosecute its author.</p>
<p>Article 30, on the other hand, is very specific about the data that online service providers must hand over to the government when requested: the user’s name, IP address, phone number, ID card number and physical address.</p>
<p>Any violation of the law would be punishable by up to three years in prison and a fine of 10 million kyats (6200 euros). Those convicted on more than one count would, of course, serve the corresponding jail terms consecutively.</p>
<p><strong>RSF submission<br /></strong> “The provisions of this cyber-security law pose a clear threat to the right of Myanmar’s citizens to reliable information and to the confidentiality of journalists’ and bloggers’ data,” said Daniel Bastard, the head of RSF Asia-Pacific desk.</p>
<p>“We urge digital actors operating in Myanmar, starting with Facebook, to refuse to comply with this shocking attempt to bring them to heel. This junta has absolutely no democratic legitimacy and it would be highly damaging for platforms to submit too its tyrannical impositions.”</p>
<p>Facebook has nearly 25 million users in Myanmar – 45 percent of the population. Three days after the February 1 coup, the junta suddenly blocked access to Facebook, Twitter and Instagram.</p>
<p>But many of the country’s citizens have been using VPNs (virtual private networks) to circumvent the censorship.</p>
<p>The proposed law’s leak has coincided with social media reports of the arrival of many Chinese technicians tasked with setting up an internet barrier and cybersurveillance system of the kind operating in China, which is an expert in this domain.</p>
<p>Earlier this week, <a href="https://rsf.org/en/news/press-freedom-set-back-ten-years-ten-days-after-coup-myanmar-0" rel="nofollow">RSF reported the comments of several journalists</a> who have been trying to cover the protests against the military coup, and who said that press freedom has been set back 10 years in the space of 10 days, back to where it was before the start of the democratisation process.</p>
<p>Myanmar is ranked 139th out of 180 countries in RSF’s 2020 <a href="https://rsf.org/en/ranking" rel="nofollow">World Press Freedom Index</a>.</p>
</div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>LIVE: Tech Now With Sarah Putt &#038; Selwyn Manning &#8211; DDOS Attacks + First Responder Comms + A Digital Success Story</title>
		<link>https://eveningreport.nz/2020/09/08/live-tech-now-with-sarah-putt-selwyn-manning-ddos-attacks-first-responder-comms-a-digital-success-story/</link>
					<comments>https://eveningreport.nz/2020/09/08/live-tech-now-with-sarah-putt-selwyn-manning-ddos-attacks-first-responder-comms-a-digital-success-story/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 08:00:08 +0000</pubDate>
				<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Live Stream]]></category>
		<category><![CDATA[Livestream]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Tech Now]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=261317</guid>

					<description><![CDATA[LIVE on Tech Now this week: How and why international cyber attackers have New Zealand organisations in their sights? There are BIG Changes looming to how our Emergency services communicate. Why is this change coming? What’s the cost? And, what will it mean for you, and for first responders? AND&#8230; Media Tech: Is print really ]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="LIVE: Evening Report&#039;s Tech Now with Selwyn Manning &amp; Sarah Putt - Ep: 4" width="640" height="360" src="https://www.youtube.com/embed/uIipPNvBfKs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe><br />
<strong>LIVE on Tech Now this week:</strong> How and why international cyber attackers have New Zealand organisations in their sights? There are BIG Changes looming to how our Emergency services communicate. Why is this change coming? What’s the cost? And, what will it mean for you, and for first responders? AND&#8230; Media Tech: Is print really dead? And, why is the New York Times a digital success story?</p>
<p>Click here to <a href="https://eveningreport.nz/2020/08/25/coming-up-live-evening-reports-tech-now-with-sarah-putt-and-selwyn-manning-episode-3/">view onsite</a>, or <a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a>  or <a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></p>
<p>&#8212;</p>
<p class="p1"><strong>Tonight, on Tech Now</strong> technology commentator Sarah Putt joins Selwyn Manning to check out what’s been happening in the tech world this week.</p>
<p class="p1">The show&#8217;s main points include:</p>
<p class="p1"><span class="s1"><b>What’s Happening in the Tech World?</b></span></p>
<ul class="ul1">
<li class="li2"><span class="s2">How and why international cyber attackers have New Zealand organisations in their sights?</span></li>
</ul>
<ul class="ul1">
<li class="li2"><span class="s2">There are BIG Changes looming to how our Emergency services communicate. Why is this change coming? What’s the cost? And, what will it mean for you, and for first responders?</span></li>
</ul>
<ul class="ul1">
<li class="li2"><span class="s2">Media Tech: Is print really dead? And, why is the New York Times a digital success story?</span></li>
</ul>
<p class="p1"><strong>INTERACTION:</strong> Remember, if you are joining us LIVE via social media (<em>SEE LINKS BELOW</em>), you can make comments and even put Sarah on the spot with a few questions. We will be able to see your interaction, and include this in the LIVE show.</p>
<p><strong>You can interact with the LIVE programme</strong> by joining these social media channels. Here are the links:</p>
<ul>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
</ul>
<p class="p1">And, you can see video-on-demand of this show, and earlier episodes too, by checking out EveningReport.nz</p>
<p>The programme is the latest effort by EveningReport as it rolls out its public service webcasting programmes, produced by ER&#8217;s parent company <a href="https://milnz.co.nz" target="_blank" rel="noopener noreferrer">Multimedia Investments Ltd</a>.</p>
<p>ER&#8217;s Tech Now programme explores the latest tech trends both here in New Zealand and globally.</p>
<p>The programme’s format examines the tech world in the present and post-Covid-19 world. It looks at new innovations, what they mean to us as we grapple with the &#8216;new normal&#8217;. Tech Now also looks at the policy settings to see if they are a hindrance to progress or part of the solutions.</p>
<p>Evening Report&#8217;s Tech Now also includes audience participation, where the programme’s social media audiences can make comment and issue questions. The best of these can be selected and webcast in the programme LIVE.</p>
<p>Once the programme has concluded, it will automatically switch to video on demand so that those who have missed the programme, can watch it at a time of their convenience.</p>
<p>So join us on Facebook, Twitter, and Youtube as we will promote Tech Now via our social media channels and via web partners. It will also webcast live and on demand on <a href="https://eveningreport.nz/" target="_blank" rel="noopener noreferrer">EveningReport.nz</a>, and other selected outlets.</p>
<p>Do bookmark <a href="https://eveningreport.nz/" target="_blank" rel="noopener noreferrer">EveningReport.nz</a> and we look forward to you taking part in some robust live debate.</p>
<p><strong>About Us: </strong>EveningReport.nz is based in Auckland city, New Zealand, is an associate member of the <a href="https://eveningreport.nz/member-of-the-new-zealand-press-council/">New Zealand Media Council</a>, and is part of the MIL-OSI network, owned by its parent company Multimedia Investments Ltd (MIL) (<a href="https://milnz.co.nz/">MILNZ.co.nz</a>).</p>
<p>EveningReport specialises in publishing independent analysis and features from a New Zealand juxtaposition, including global issues and geopolitics as it impacts on the countries and economies of Australasia and the Asia Pacific region.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2020/09/08/live-tech-now-with-sarah-putt-selwyn-manning-ddos-attacks-first-responder-comms-a-digital-success-story/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NZ’s cyber security centre warns more attacks likely after stock market outages</title>
		<link>https://eveningreport.nz/2020/09/02/nzs-cyber-security-centre-warns-more-attacks-likely-after-stock-market-outages/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Tue, 01 Sep 2020 23:18:03 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Bots]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber-crime laws]]></category>
		<category><![CDATA[Dark web]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Five Eyes]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Illegal streaming]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Science-Technology]]></category>
		<category><![CDATA[Stock exchange]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2020/09/02/nzs-cyber-security-centre-warns-more-attacks-likely-after-stock-market-outages/</guid>

					<description><![CDATA[ANALYSIS: By Dave Parry, Auckland University of Technology The Government Communications Security Bureau (GCSB) has issued a warning to all New Zealand businesses to be prepared for cyber attacks, following almost a week of daily attacks on the New Zealand stock exchange (NZX). The attacks have caused outages, sometimes for hours, of NZX’s public-facing website ]]></description>
										<content:encoded><![CDATA[<p><strong>ANALYSIS:</strong> <em>By <a href="https://theconversation.com/profiles/dave-parry-506974" rel="nofollow">Dave Parry</a>, <a href="https://theconversation.com/institutions/auckland-university-of-technology-1137" rel="nofollow"><em>Au</em>ckland University of Technology</a></em></p>
<p>The Government Communications Security Bureau (<a href="https://www.gcsb.govt.nz/" rel="nofollow">GCSB</a>) has <a href="https://www.ncsc.govt.nz/newsroom/general-security-advisory-ongoing-campaign-of-dos-attacks-affecting-new-zealand-entities/" rel="nofollow">issued a warning</a> to all New Zealand businesses to be prepared for cyber attacks, following almost a week of <a href="https://www.zdnet.com/article/ddos-extortionists-target-nzx-moneygram-braintree-and-other-financial-services/" rel="nofollow">daily attacks</a> on the New Zealand stock exchange (<a href="https://www.nzx.com/" rel="nofollow">NZX</a>).</p>
<p>The attacks have caused outages, sometimes for hours, of NZX’s public-facing website since Tuesday last week. This week, it <a href="https://www.nzherald.co.nz/business/news/article.cfm?c_id=3&amp;objectid=12360753" rel="nofollow">continued trading</a> under a new arrangement that allows it to post information to alternative platforms.</p>
<p>The attacks are part of <a href="https://www.digitalattackmap.com/#anim=1&amp;color=0&amp;country=ALL&amp;list=0&amp;time=18489&amp;view=map" rel="nofollow">worldwide malicious cyber activity</a> and the government will likely share information via Interpol and government-to-government links, including the intelligence alliance know as Five Eyes.</p>
<p>The type of attack is known as a Distributed Denial of Service (<a href="https://securityintelligence.com/articles/avoid-ddos-attacks/" rel="nofollow">DDoS</a>). The attacker infects large numbers, often thousands or even millions, of computers with a virus that allows the attacker to instruct the infected computer – known as a “bot” – to send thousands of requests for data to the target.</p>
<p>In effect, this means millions of attempts to access a website at the same time. The website being attacked cannot respond to each one quickly enough so either it simply stops responding or responds to some but not all data requests.</p>
<p>Some people get the most up-to-date page and others don’t.</p>
<p>This is particularly damaging for financial information sites such as a stock market. They have a legal duty to give equal access to different users. They would normally shut down and stop trading for a while rather than allow some people to get information before others.</p>
<p>These attacks are not designed to steal data or do insider trading. They are generally set up to demand ransom from the victims, usually asking for thousands of dollars paid in bitcoin or another cryptocurrency which is effectively untraceable. Governments, terrorist organisations, political groups and even pranksters have also been known to use these attacks.</p>
<p>DDoS software is available on the dark web but also not very difficult to write. In many cases the people owning the bots will not be aware anything strange is happening.</p>
<p><strong>The current attacks</strong><br />Multi-day attacks have been rare but are becoming more common. The size of these attacks, including how many bots are used and their capacity to send requests, has been increasing.</p>
<figure class="wp-caption alignnone c2"><img loading="lazy" decoding="async" src="https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="auto, (min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=348&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=348&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=348&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=437&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=437&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/355511/original/file-20200831-24-1h06wrh.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=437&amp;fit=crop&amp;dpr=3 2262w" alt="Global map of cyber attacks." width="600" height="348"/><figcaption class="wp-caption-text">This map shows the number of global attacks on August 15. Image: CC BY-SA</figcaption></figure>
<p>Such multi-day attacks are potentially risky for the attackers as the defence team will be <a href="https://www.sciencedirect.com/science/article/abs/pii/S092523121501053X" rel="nofollow">analysing the attacks</a>, often using <a href="https://link.springer.com/chapter/10.1007/978-981-15-0199-9_58" rel="nofollow">artificial intelligence tools</a>, and should be able to respond more quickly to block illegitimate requests.</p>
<p>The defence against such attacks is based on being able to cope with the large number of requests, either by moving the website to a cloud-based system that can increase capacity quickly, or identifying bot requests and filtering them out by setting up a “whitelist” of legitimate users and excluding others.</p>
<p>This is normally done by firewalls at the level of each attacked entity, the internet service provider or, as in the case of New Zealand, at a country’s electronic border (for example, the Southern Cross trans-Pacific network of communications cables).</p>
<p>If an attack is coming from inside New Zealand, security software on the bot computer can normally remove the infection with up-to-date anti-virus software. Internet service providers can also detect this activity and may warn users or disconnect the infected machine until it is cleaned. But in this case, the attacks are coming from outside New Zealand.</p>
<p>The covid-19 pandemic means millions of people are working from home around the world, outside their normal corporate security, often using the family computer. Some people may be less careful about downloading software, particularly on illegal streaming sites, and may be using free or unsecured wifi networks. This makes <a href="https://www.researchgate.net/publication/340443250_Corona_Virus_COVID-19_Pandemic_and_Work_from_Home_Challenges_of_Cybercrimes_and_Cybersecurity" rel="nofollow">infecting computers to turn them into bots</a> much easier.</p>
<p><strong>How to repond</strong><br />Assuming this is a criminal gang, financial institutes are an attractive target. They rely on availability of service and potentially have money to pay ransoms.</p>
<p>In New Zealand, disaster management and recovery has tended to focus on responses to natural hazards rather than criminal activity. New Zealand does not have local cloud providers and expanding capacity is more difficult.</p>
<p>Even if NZX won’t pay a ransom, this attack is “advertising” for the criminal gangs that may act as “subcontactors” to larger criminal organisations.</p>
<p>The government’s aim will not be to catch the perpetrators in the short term but to share information on how to block the attacks. Normally the response is effective, but it can take some time to analyse details.</p>
<p>At the same time, other attacks (for example phishing to steal data) may use the confusion caused by the DDoS attacks to target potential victims. Organisations should encourage people to update their security software and remain vigilant.</p>
<p>In the future, as the internet of things (IoT) becomes more widespread, many billions of new devices will be connected to the internet. Security standards and forensic capability (storing data to analyse attacks) are not universal and there is a danger that these attacks will become more common and larger in scale.</p>
<p><strong>Defence is possible</strong><br />But defence is possible and both technical and policy approaches are getting better. Artificial intelligence tools for rapidly analysing attacks are the focus of <a href="https://www.tandfonline.com/doi/abs/10.1080/19393555.2020.1717019?journalCode=uiss20" rel="nofollow">research</a>.</p>
<p>Support for governments in vulnerable areas is also increasing to enforce international agreements, clarify local law and share information between network providers. For example, Macau recently introduced a much tougher cyber security law which <a href="https://www2.deloitte.com/cn/en/pages/risk/articles/macau-cybersecurity-law.html" rel="nofollow">seems to have been very effective</a>.<img loading="lazy" decoding="async" class="c3" src="https://counter.theconversation.com/content/145320/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1"/></p>
<p><a href="https://theconversation.com/profiles/dave-parry-506974" rel="nofollow"><em>Dr Dave Parry</em></a> <em>is head of the Department of Computer Science, <a href="https://theconversation.com/institutions/auckland-university-of-technology-1137" rel="nofollow">Auckland University of Technology.</a> This article is republished from <a href="https://theconversation.com" rel="nofollow">The Conversation</a> under a Creative Commons licence. Read the <a href="https://theconversation.com/nzs-cyber-security-centre-warns-more-attacks-likely-following-stock-market-outages-145320" rel="nofollow">original article</a>.</em></p>
<div class="printfriendly pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="c4" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener noreferrer">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bryce Edwards&#8217; Political Roundup: Intense speculation on Budget leaking and hacking</title>
		<link>https://eveningreport.nz/2019/05/29/bryce-edwards-political-roundup-intense-speculation-on-budget-leaking-and-hacking/</link>
		
		<dc:creator><![CDATA[Bryce Edwards]]></dc:creator>
		<pubDate>Wed, 29 May 2019 11:16:41 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Bryce Edwards]]></category>
		<category><![CDATA[Budget]]></category>
		<category><![CDATA[Critical Politics]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Digital data]]></category>
		<category><![CDATA[Digital policy]]></category>
		<category><![CDATA[Editor's Picks]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Law enforcement]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Leaks]]></category>
		<category><![CDATA[Legislation]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Media law]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[National Party]]></category>
		<category><![CDATA[National Party Leader]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[New Zealand Government Communications Security Bureau]]></category>
		<category><![CDATA[New Zealand National Party]]></category>
		<category><![CDATA[News Media]]></category>
		<category><![CDATA[NZ Politics]]></category>
		<category><![CDATA[Political freedom]]></category>
		<category><![CDATA[Political Integrity]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Treasury]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=24358</guid>

					<description><![CDATA[The problem with scandals involving so much mystery is they naturally lead to plenty of speculation, some of which might be useful and some which might be completely wrong, or even highly-damaging. And while we are still in the midst of it all, it&#8217;s extremely difficult to sort out the useful from the damaging. For ]]></description>
										<content:encoded><![CDATA[<p><strong>The problem with scandals involving so much mystery is they naturally lead to plenty of speculation, some of which might be useful and some which might be completely wrong, or even highly-damaging. And while we are still in the midst of it all, it&#8217;s extremely difficult to sort out the useful from the damaging.</strong></p>
<p>For the best overall guide to what has happened in the Budget leak/hack scandal, see the just-published article by Henry Cooke: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=b75db47597&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">What we know and don&#8217;t know about the Budget &#8216;hack&#8217;</a>. Amongst his rundown on the background to the scandal and the theories offered so far, Cooke points out that, rather than being hacked, the Treasury website might simply have been scanned by Google, allowing a cache of pages to become available to someone who has handed them on to the National Party.</p>
<p>Another leading explanation for how the Treasury&#8217;s Budget information was released early to National comes down to a simple but obvious idea that parliamentary staffers looked for and found the information on the Treasury website. This would also explain how National leader Simon Bridges could be so categorical in his insistence that his scoops weren&#8217;t based on hacking or illegality.</p>
<p>According to this theory, National had one of its Parliamentary staffers monitoring the Treasury website in the days leading up to Budget Day, constantly using the frontpage search bar on the site to look for &#8220;Budget 2019&#8221;. The hope being that at some stage some Budget documents would be loaded onto the site momentarily, in anticipation of Thursday&#8217;s publication, before they were then locked away for safety.</p>
<p>The story goes that by searching every five minutes or so, the National staffer eventually hit the jackpot when documents or pages turned up with the goods. It might have taken hundreds or even thousands of searches over a couple of days.</p>
<p>In fact, National Party pollster and blogger David Farrar has outlined a similar scenario based on his previous experience as a parliamentary staffer: &#8220;when I worked for the Opposition in 2000 or 2001, I recall waiting for the Government to release the Police crime stats. They always put a positive spin on it. I went to the Police website and looked at last year&#8217;s stats. I also looked at the previous year. They had the same URL format. I changed the year to the current one, and hey presto I had the official crime states four hours before the Government was due to release them&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=8ae2c456cb&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">My guess as to what happened</a>.</p>
<p>Farrar argues that something similar may have happened, and it therefore wouldn&#8217;t constitute hacking: &#8220;So my guess is something similar has happened. That possibly the material was put up on a website of some sort and someone found it. Treasury are calling it hacking because they didn&#8217;t think it was open to the public. But there is a difference between hacking a secure computer system, and locating information that is on the Internet (even if hidden). Was there any cracking of passwords for example?&#8221;</p>
<p>But do such explanations fit with what Treasury are saying when they claim that their site has been &#8220;deliberately and systematically hacked&#8221;? It&#8217;s arguable either way. Certainly, some tech-specialists seem to think that something much more sophisticated must have happened – especially based on the fact that Treasury has called in the Police. For one of the most in-depth discussions of the potential hacking, see John Anthony&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=d1046a2bda&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Budget 2019: &#8216;They&#8217;ll remember it as the budget that got hacked&#8217;</a>.</p>
<p>Despite some tech specialists believing that a sophisticated hack has occurred, one expert believes a software application might have simply found the material on the Treasury website: &#8220;Kiwi cyber security consultancy Darkscope technical director Joerg Buss said a likely scenario was that someone used a &#8216;spider or crawler&#8217; program to find hidden content in the Treasury website. Such software may have uncovered Budget 2019 files which had not been protected properly, he said.&#8221;</p>
<p>It could also be as simple as using Google to search for the material, which is covered by Juha Saarinen in his article, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7a27c10082&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Conspiracy or cock-up? Strong evidence Treasury published Budget accidentally – rather than a hack</a>. He says that &#8220;screenshots of the results from a Google search for &#8216;estimates of appropriation 2019/2020&#8217; are circulating on Twitter suggest that the data was published accidentally.&#8221;</p>
<p>Of course, the fact that Treasury has called in the Police would suggest that the government department believes that something much more sinister or malevolent has occurred. However, care needs to be taken in reading too much into this – especially since the Police haven&#8217;t even confirmed that they have agreed to investigate, except to say that they are assessing Treasury&#8217;s request.</p>
<p>Furthermore, whenever governments and officials call in the police or make claims that criminal actions have occurred in the political sphere, we should always be very sceptical. It&#8217;s the oldest trick in the bureaucratic book – to divert attention or to impugn an opponent with charges that they are mixed up in criminal activity. That&#8217;s not necessarily the case over the controversial budget leaks – it&#8217;s still far too early to tell what has happened.</p>
<p>This is certainly the argument made today by leftwing blogger No Right Turn, who suggests that government officials have a tendency, when they&#8217;ve made mistakes, to try to point the finger elsewhere, often using rather draconian measures to do so – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=2a4a8d8605&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Treasury, &#8220;hacking&#8221;, and incentives</a>.</p>
<p>Here&#8217;s his main point about how politicians and officials are inclined to bring the police into politics: &#8220;Unfortunately the natural instincts of power in New Zealand are to double down rather than admit a mistake, and to call in the police when embarrassed – just look at the tea tape, or Dirty Politics. With those, we saw police raiding newsrooms and journalist&#8217;s homes. I&#8217;m wondering if we&#8217;re going to see police raiding the opposition this time. Which would be highly damaging to our democracy.&#8221;</p>
<p>The blogger says that &#8220;the bureaucratic incentive towards arse-covering and blame-avoidance pushes that to be reclassified as nefarious &#8216;hacking&#8217;, and that incentive gets stronger the higher up the chain (and the further away from IT knowledge) you get.&#8221;</p>
<p>Here&#8217;s his own explanation for the release of the information: &#8220;The most likely scenario is that Treasury f**ked up and left them lying around on their web-server for anyone to read, and National or one of its proxies noticed this and exploited it. Accessing unprotected data on a public web-server isn&#8217;t &#8216;hacking&#8217; in any sense of the word – it&#8217;s just browsing.&#8221;</p>
<p>The onus is therefore on the Treasury to be much more transparent about what has happened writes Danyl Mclauchlan, saying a &#8220;brief technical explanation about what the &#8216;hack&#8217; amounted to would be a lot more useful than all the bluster and nebulous waffle we&#8217;ve heard so far&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=c8c5337adc&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Budget hacking scandal: About time Treasury told us what actually happened</a>.</p>
<p>Mclauchlan says that if it turns out that the leak has simply come from information on the Treasury website, &#8220;then we&#8217;ll be talking about the resignation of the Treasury Secretary, rather than National Party leader.&#8221;</p>
<p>The No Right Turn blogger doesn&#8217;t see the Government delivering such transparency any time soon: &#8220;neither Treasury nor their Minister has any interest in that (Ministers are rarely interested in incompetence in their own agencies, because it makes them look bad for allowing it). As for us, the public, we&#8217;re the loser, stuck with an incompetent, arse-covering public agency which has just failed on one of its most important tasks&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=1bc4b3ad95&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Treasury owes us answers</a>.</p>
<p>He argues that the decision to go to the Police means that Treasury can now sidestep such accountability: &#8220;conveniently, by referring the matter to the police Treasury has ensured that they can never do that. It might prejudice the police investigation, you see. OIA requests can be refused to avoid prejudice to the maintenance of the law, and anyone who actually tells anyone anything can be prosecuted. Accountability of course goes out the window&#8221;.</p>
<p>That doesn&#8217;t get National off the hook, however, if the party has done something illegal in the way they have procured or used the Budget information. One lawyer who knows a lot about hacks is Steven Price, and he argues that the release by National of the information was not in &#8220;the public interest&#8221;, and that it appears to have &#8220;broken the law relating to Breach of Confidence&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=e918238eb2&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Budget leak: Nats&#8217; behaviour &#8220;entirely appropriate&#8221;?</a></p>
<p>Price says that he is &#8220;irritated at the sanctimoniousness of Simon Bridges&#8217; denial that the Nats had done &#8216;anything approaching&#8217; illegality.&#8221; He does admit however, that if National have obtained the Budget information &#8220;through some area of Treasury&#8217;s (or some other government) website that was technically publicly accessible, then that would at least raise arguments that it wasn&#8217;t confidential in the first place, because it was in the public domain.&#8221;</p>
<p>Herald political editor Audrey Young is also less than impressed with how Bridges has dealt with the matter today, saying: &#8220;Simon Bridges needed to do two things today when he fronted the news media about allegations of hacking Treasury and he did neither. He needed to say, at least in general terms, how he received the leak of Budget of documents. And he needed to say he had contacted the police to offer them any assistance they needed in their investigation&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=971d3b71b3&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Simon Bridges needed to do two things today and he did neither</a>.</p>
<p>But for another view on the politics of it all, and an explanation of why Bridges&#8217; manoeuvres have been smart, see Brigitte Morten&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=d787b5a3e1&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">National plays strong hand over politics jackpot</a>. She argues that it&#8217;s in the public interest for National to be able to dispute the Government&#8217;s narrative over Budget spending, and to be able to point out the &#8220;lower than expected spending&#8221; in areas such as health &#8220;that the government doesn&#8217;t want you to reflect on.&#8221;</p>
<p>Finally, for a recent minor – but extremely colourful – Treasury controversy, involving the use of a transformative wellbeing experiment for staff, see Danyl Mclauchlan&#8217;s must-read investigation: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=34ba2cdbc3&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Peace, Rest and the Monkey Emoji Moon: playing Heartwork cards at Treasury</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bryce Edwards&#8217; Political Roundup: Christchurch Calling: the clampdown on social media</title>
		<link>https://eveningreport.nz/2019/05/16/bryce-edwards-political-roundup-christchurch-calling-the-clampdown-on-social-media/</link>
		
		<dc:creator><![CDATA[Bryce Edwards]]></dc:creator>
		<pubDate>Thu, 16 May 2019 05:05:11 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Bryce Edwards]]></category>
		<category><![CDATA[Critical Politics]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cyber-censorship]]></category>
		<category><![CDATA[Cyber-crime laws]]></category>
		<category><![CDATA[cyberabuse]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Digital challenges]]></category>
		<category><![CDATA[Digital Media]]></category>
		<category><![CDATA[Digital policy]]></category>
		<category><![CDATA[Editor's Picks]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[internet censorship]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Law and order]]></category>
		<category><![CDATA[Law enforcement]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Media Intelligence]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[News Media]]></category>
		<category><![CDATA[NZ Politics]]></category>
		<category><![CDATA[Policy development]]></category>
		<category><![CDATA[Political Integrity]]></category>
		<category><![CDATA[Political Transition]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[social change]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Terrorist groups]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=23898</guid>

					<description><![CDATA[The world is changing fast, with digital technological innovation that is both liberating and disturbing. The threats and opportunities this presents requires a massive debate, and intervention, to ensure such changes are as healthy as possible for humanity. The online dimension of the Christchurch terrorist attacks is now provoking a sea change in attitudes towards ]]></description>
										<content:encoded><![CDATA[<figure id="attachment_13636" aria-describedby="caption-attachment-13636" style="width: 150px" class="wp-caption alignleft"><a href="https://eveningreport.nz/2019/04/28/bryce-edwards-political-roundup-simon-bridges-destabilised-leadership/bryce-edwards-1-2/" rel="attachment wp-att-13636"><img loading="lazy" decoding="async" class="size-thumbnail wp-image-13636" src="https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1-150x150.jpeg" alt="" width="150" height="150" srcset="https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1-150x150.jpeg 150w, https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1-300x300.jpeg 300w, https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1-65x65.jpeg 65w, https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1.jpeg 400w" sizes="auto, (max-width: 150px) 100vw, 150px" /></a><figcaption id="caption-attachment-13636" class="wp-caption-text">Dr Bryce Edwards</figcaption></figure>
<p><strong>The world is changing fast, with digital technological innovation that is both liberating and disturbing. The threats and opportunities this presents requires a massive debate, and intervention, to ensure such changes are as healthy as possible for humanity. The online dimension of the Christchurch terrorist attacks is now provoking a sea change in attitudes towards social media.</strong></p>
<p><strong>Around the world</strong> we are now seeing attempts to rein in the tech giants with government regulations. There are blunt questions being asked about whether the likes of Facebook are &#8220;monetising hate&#8221;, and whether the dream of social media enhancing democracy and social connectedness is over.</p>
<p>Prime Minister Jacinda Ardern&#8217;s Christchurch Call to Action campaign is currently at the most visible end of this new momentum, and commentators have declared her trip to Paris a success. For example, this afternoon Henry Cooke has concluded:<a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=562efecc93&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer"> Jacinda Ardern&#8217;s big day in Paris ends with her getting what she wanted</a>.</p>
<p>Likewise, Gordon Campbell is impressed with how the final Paris manifesto has come together, apparently managing to satisfy all sides, including Facebook – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7b14bb0c56&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">On the Christchurch Call</a>.</p>
<p>But the campaign isn&#8217;t over yet. According to Kelsey Munro, a research fellow at Australia&#8217;s Lowy Institute, Ardern&#8217;s bid is still a difficult one – see:<a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=6fdfe1a361&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer"> Christchurch Call: Jacinda Ardern&#8217;s Paris pitch a sign of tech giants&#8217; power</a>.</p>
<p>Munro points out that attempts to regulate social media so far, have been fraught and dangerous: &#8220;Many nations around the world have concluded that the public sphere must reassert a regulatory role; the problem is how to do it within reasonable limits. No one wants anything resembling the Chinese model. Australia&#8217;s &#8216;knee-jerk&#8217; reaction has been widely criticised by the tech industry and lawyers as rushed and ill-defined.&#8221;</p>
<p>Clearly Ardern has been keen to keep away from some of the issues around free speech that are brought up by government regulation, as I explained in my previous column – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=0ecfe95ea9&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Ardern&#8217;s &#8220;Christchurch Call&#8221; might not be so simple</a>.</p>
<p>So is her campaign going to work? There are all sorts of risks with this sort of attempt at regulation. And this is best dealt with in Henry Cooke&#8217;s article, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=21d4a17509&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">The risks Jacinda Ardern faces with her &#8216;Christchurch Call&#8217; in Paris</a>. He outlines three broad threats: 1) Over-reach, 2) Under-reach, 3) Being used by Macron to launder his image.</p>
<p>In terms of those first two dangers, the Christchurch Call might end up being too strong or too weak. The third point is the idea that in collaborating so closely with the French President and other world leaders, Ardern is naively being exploited for their own electoral opportunism. Cooke suggests that Ardern might need to &#8220;make her disagreement with these other leaders clear&#8221;.</p>
<p>This is also the view of Newstalk ZB&#8217;s Barry Soper: &#8220;What is French President Emmanuel Macron playing at? The answer&#8217;s pretty obvious, he&#8217;s trying to boost his flagging popularity at home while at the same time trying to establish himself as a world leader on cleaning up the internet&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=a1b235e16d&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Jacinda Ardern being used by Emmanuel Macron to boost his image</a>.</p>
<p>Soper suggests that Macron has been rather disingenuous in his role: &#8220;If you needed any convincing that she&#8217;s being used, get a load of what happened as she was packing her designer bags for the French capital. Macron releases a 33-page report he&#8217;d commissioned&#8230; Why he couldn&#8217;t delay the release until this week&#8217;s summit is an insult to those attending. And what&#8217;s more, the investigation was only halfway through but Macron decided to make a song and dance about how well France is doing.&#8221;</p>
<p>The bigger problem is that Macron has a terrible record in terms of civil liberties, and is clearly no friend of free speech, which could taint the ongoing campaign to regulate social media. This is all very well explained by leftwing journalist Branko Marcetic who puts forward &#8220;a brief review of what Macron&#8217;s done while in power&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=1527e98279&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Jacinda Ardern must not let Emmanuel Macron co-opt the Christchurch Call</a>.</p>
<p>Marcetic then asks whether New Zealanders should be comfortable with such an alliance: &#8220;This is the man Ardern is teaming up with to figure out a way to regulate online spaces. Concerns over this shouldn&#8217;t be limited to the New Zealand right – with Macron at the helm, there are legitimate worries the outcome could threaten free speech, including for that of the liberals and left that are backing such measures right now.&#8221;</p>
<p>He concludes: &#8220;Ardern should be careful that Macron and any other embattled leaders in the G7 don&#8217;t use this meeting as an opportunity to push measures that harm not just journalism, but all of our civil liberties. But more importantly, the New Zealand public needs to hold her to account and make sure she doesn&#8217;t.&#8221;</p>
<p>And some are worried that the clampdown will inevitably intrude on the traditional media. Barry Soper criticises Ardern for &#8220;trying to reign in the mainstream media&#8217;s coverage of events to ensure it&#8217;s not gratuitous, and that for all of us should be worry. It&#8217;s not for the politicians to dictate how events should be covered&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=b3ba21eaeb&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">The media here is generally self regulatory</a>.</p>
<p>It&#8217;s clear that the task of social media regulation isn&#8217;t a simple one. And one of the best outlines of the pitfalls and best practices that Ardern and co should keep in mind can found in Dan Jerker B. Svantesson&#8217;s article, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=58ca9fd796&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">It&#8217;s vital we clamp down on online terrorism. But is Ardern&#8217;s &#8216;Christchurch Call&#8217; the answer?</a></p>
<p>He cautions against the &#8220;risk of hasty, excessive and uncoordinated responses&#8221; to social media problems and suggests that we are currently seeing a rush of politicians who all want to gain political capital from coming up with fast answers. He says &#8220;as part of this we must avoid hasty &#8216;solutions&#8217; that will only mask the issues in the long term, and potentially cause other problems such as excessive blocking of internet content.&#8221;</p>
<p>Svantesson&#8217;s own list of requirements for new regulations are the following: &#8220;Effective legal regulation of the internet must be clear, proportional (balanced for all involved), accountable (able to be monitored and checked) and offer procedural guarantees (open to appeals).&#8221;</p>
<p>Similarly, Jordan Carter and Konstantinos Komaitis, of Internet NZ and the Internet Society, have put forward their own suggestions of what needs to underpin any new rules and laws – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=0ca2f60fd4&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">How to regulate the internet without shackling its creativity</a>.</p>
<p>Former Prime Minister Helen Clark has also jumped into the debate this week with the launch of her own Foundation think tank report, titled &#8220;Anti-social Media&#8221;. This calls for a new body to be set up to regulate social media in this country in the same way that the New Zealand Media Council and Broadcasting Standards Authority does with traditional media. For an in-depth discussion of the report, see Thomas Coughlan&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=e34414356c&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">How to regulate social media</a>.</p>
<p>Clark has explained the thinking behind this, and how it&#8217;s partly based on her own personal experience: &#8220;What I&#8217;m concerned about is that the rising level of rhetoric on social media from people who think they can get away with just about anything&#8230; And let&#8217;s face it, they can. I have regularly reported very hateful content, and very often you just get these reports dismissed. So that&#8217;s why you now need what this report recommends, which is the statutory duty to self-regulate, and then you need the regulator overseeing that&#8221; – see 1News&#8217; <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=35619d7c00&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Changing hate speech laws would &#8216;not necessarily&#8217; have prevented Christchurch attacks – Helen Clark</a>.</p>
<p>For more on this, as well as other debates about regulation of social media in New Zealand, and what sort of agreement was expected from the Paris meetings, see Derek Cheng&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=e9d062adfc&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Christchurch Call summit: New rules must leave nowhere to hide</a>. In terms of the Paris agreement, he notes that &#8220;whether it will have any teeth will be a key issue, given it will be a voluntary framework.&#8221;</p>
<p>A new survey out shows that there&#8217;s a strong demand amongst New Zealanders for this problem to be sorted out: &#8220;More than half of New Zealanders want livestreaming stopped until platforms work out a way to immediately remove violent or other harmful content, a survey indicates. The online survey of 1134 adults carried out in the second half of April, found 54 per cent of those questioned wanted a halt to livestreaming in the meantime. In contrast, 29 per cent thought platforms should be given time to sort out a solution&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7c9a068c0b&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Most Kiwis want livestreaming halted until violent content can be curbed: survey</a>.</p>
<p>Much of the debate about the problems of online extremism and regulation comes back to The Matrix movie&#8217;s concept of being &#8220;red-pilled&#8221;, which is explained in today&#8217;s Christchurch Press editorial: &#8220;To be red-pilled is to have the shackles of delusion removed and to see things as they really are&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=140f3de07c&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Cleaning up the dark corners of the internet</a>. But if this sounds like a positive development, then for a bigger explanation of the problem, see Henry Cooke&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7c5febf360&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Christchurch Call could lead to work on &#8216;red-pilling&#8217; of online radicalisation</a>.</p>
<p>Despite the difficulties involved, there&#8217;s no doubt that the tide has turned, and there is now a significant public appetite for some sort of action to be taken that might deal with the tech giants. After all, their reach affects everything in society – including democracy and politics.</p>
<p>This is a point well made in a report released this week, &#8220;Digital Threats to Democracy&#8221;, which suggests that the way New Zealanders are interacting with information online &#8220;can lead to the rapid spread of incorrect information and hinder the discussion and debate of issues of public policy&#8221; – see Brittany Keogh&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=d4663c2a4b&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Social media influences New Zealanders&#8217; opinions on politics and hurts democracy, study says</a>.</p>
<p>Finally, there&#8217;s plenty of other disturbing evidence of the brave new world we are moving into. For one of the best recent accounts of this, see Danyl Mclauchlan&#8217;s book review, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=3d1861c735&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Big Google is watching you</a>. Looking at an important new book by Shoshana Zuboff, a professor of social psychology at Harvard Business School, called &#8220;The Age of Surveillance Capitalism: The Fight for the Future at the New Frontier of Power&#8221;, Mclauchlan explains why he feels so uncomfortable at the supermarket.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
