<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity &#8211; Evening Report</title>
	<atom:link href="https://eveningreport.nz/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://eveningreport.nz</link>
	<description>Independent Analysis and Reportage</description>
	<lastBuildDate>Wed, 12 Nov 2025 02:19:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Israel thanks Fiji and PNG for opening Jerusalem embassies, UN support</title>
		<link>https://eveningreport.nz/2025/11/12/israel-thanks-fiji-and-png-for-opening-jerusalem-embassies-un-support/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Wed, 12 Nov 2025 02:19:41 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Asia Report]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Decolonisation]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Elbit Systems]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Fiji]]></category>
		<category><![CDATA[Gaza genocide]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Indigenous]]></category>
		<category><![CDATA[Israel in Pacific]]></category>
		<category><![CDATA[Israeli aid]]></category>
		<category><![CDATA[Israeli cybersecurity]]></category>
		<category><![CDATA[Israeli Defence Force]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific Media Watch]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Palestine]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sharren Haskel]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2025/11/12/israel-thanks-fiji-and-png-for-opening-jerusalem-embassies-un-support/</guid>

					<description><![CDATA[RNZ Pacific An Israeli minister touring the Pacific to discuss defence and cooperation says Fiji and Papua New Guinea are “great friends”. Israeli Deputy Foreign Minister Sharren Haskel recently visited the two countries and RNZ Pacific spoke with her during a brief stop in Auckland. She said the main goal of her trip was to ]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.rnz.co.nz/authors/rnz-pacific" rel="nofollow"><em>RNZ Pacific</em></a></p>
<p>An Israeli minister touring the Pacific to discuss defence and cooperation says Fiji and Papua New Guinea are “great friends”.</p>
<p>Israeli Deputy Foreign Minister <a href="https://asiapacificreport.nz/2025/10/24/psna-slams-israeli-politician-over-sneaking-into-nz-during-pacific-friendship-trip/" rel="nofollow">Sharren Haskel recently visited</a> the two countries and RNZ Pacific spoke with her during a brief stop in Auckland.</p>
<p>She said the <a href="https://www.rnz.co.nz/international/pacific-news/570759/israel-announces-official-visit-to-pacific-region-to-broaden-partnerships" rel="nofollow">main goal of her trip</a> was to thank PNG and Fiji for their support, including the <a href="https://www.rnz.co.nz/international/pacific-news/573421/brothers-netanyahu-and-rabuka-defy-criticism-to-open-fiji-s-embassy-in-jerusalem" rel="nofollow">opening of embassies in Jerusalem</a>.</p>
<p><em>Israeli Minister Haskel speaks to RNZ on Pacific visit     Video: RNZ</em></p>
<p>“It was an important message for our people and it was a great opportunity for me to thank them in person and to see how we can strengthen our friendship.”</p>
<p>The countries were “strategic allies” who worked together in the areas of agriculture, water technology and cybersecurity, Haskel said.</p>
<p>She pointed to the agricultural industry in PNG.</p>
<p>“They used to import almost all of their products, vegetables, fruits,” she said.</p>
<p><strong>Agricultural help</strong><br />“There are a few Israeli companies that went into the industry, developing a lot of the agricultural aspect of it to the point where all of the products they’re eating are local and they’re even exporting some of these products.”</p>
<div class="photo-captioned photo-captioned-half photo-right four_col">
<figure class="wp-caption alignnone"><figcaption class="wp-caption-text">Fiji Prime Minister Sitiveni Rabuka (left) and Israeli Prime Minister Benjamin Netanyahu in Jerusalem on 17 September 2025. Image: RNZ Pacific/Fiji govt</figcaption></figure>
</div>
<p>Israeli farms there had also helped with the growth of the local dairy industry, she said.</p>
<p>“This is part of the collaboration that we want to do,” she said. “I came with a delegation of businessmen coming from those industries to see how can continue and develop it, it’s a win-win situation.”</p>
<p>An agreement with Fiji has been expanded to see more <a href="https://www.rnz.co.nz/international/pacific-news/566413/solomon-islands-fijian-students-stranded-in-israel-return-home-safely" rel="nofollow">agricultural students sent to Israel</a> for an 11-month paid internship.</p>
<p>Also while in Fiji, Haskel signed a memorandum of understanding on cybersecurity.</p>
<p>She said that came after three hacking attacks on the Fiji government’s system.</p>
<p>“[The MOU] starts a dialogue between our cybersecurity agency and between the proper agencies in Fiji as well,” she said.</p>
<p><strong>Cybersecurity experience</strong><br />““This is something that they’re starting to build, we’ve got a lot of experience with it and I think the dialogue can give them and lot of advice and also to connect them to quite a few Israeli companies.”</p>
<div class="photo-captioned photo-captioned-full photo-cntr eight_col">
<figure class="wp-caption alignnone"><figcaption class="wp-caption-text">Israeli Deputy Foreign Minister Sharren Haskel . . . “We have a lot of cybersecurity systems so it’s a start of a building of a relationship.” Image: RNZ/Nick Monro</figcaption></figure>
</div>
<p>A representative from Israeli defence and security company Elbit was among the delegation.</p>
<p>“They have a lot of cybersecurity systems so it’s a start of a building of a relationship,” Haskel said.</p>
<p>Israel’s relationships with PNG and Fiji had been going for many decades, and were not about the amount of aid given, she said.</p>
<p>“Israel is not a major economic power that has a lot of money to spend, especially during times of war,” she said.</p>
<p>“It’s not about the amount of money that we can invest but the quality and the things and how it affects the people.”</p>
<p><strong>Commitments honoured</strong><br />Asked about aid projects that had been cancelled, Haskel said Israel had honoured any commitments it made. It was not responsible for changes to United States policy that had seen trilateral agreements cut, she said.</p>
<p>“There were many projects that were committed in many different countries, together Israel and the Americans, some are continuing and some are cancelled,” she said.</p>
<p>“This is part of [US President Donald] Trump’s policy. We can’t predict that.”</p>
<p>Haskel also met with people from indigenous, Christian and farming communities while in Fiji and PNG and she said Israel is also hoping to become and observer of the Pacific Islands Forum next year.</p>
<p>The PNG government said it continued to regard Israel as a valuable partner in advancing shared development goals.</p>
<p>Meanwhile, Fiji’s government said the “historic” visit between the nations would foster continued cooperation, innovation and friendship.</p>
<p><strong>‘Strategic step’</strong><br />Prime Minister Rabuka said the cybersecurity agreement was “a strategic step forward to strengthen Fiji’s security framework and promote deeper cooperation across sectors”.</p>
<p>Israel’s influence in the Pacific has been under the microscope recently, including around the <a href="https://www.rnz.co.nz/international/pacific-news/574687/pacific-nations-un-palestine-vote-goes-against-common-sense-expert" rel="nofollow">United Nations vote supporting Palestinian statehood</a>.</p>
<p>It follows years of wrangling between superpowers China and the United States over <a href="https://www.rnz.co.nz/international/pacific-news/576982/australia-outpaces-regional-neighbours-as-pacific-s-largest-donor" rel="nofollow">aid and influence in the region</a>.</p>
<p>Oliver Nobetau, a Papuan development expert at the Australian Lowy Institute, told RNZ Pacific that Israel wanted to lock in UN support for the future.</p>
<p>“I think they have demonstrated their support, but also may have an ability to sort of sway between votes,” he said.</p>
<p>“We’ve seen it, between the switching from recognition from China to Taiwan. And this can be another instance now where they can be persuaded to vote in a different way.”</p>
<p>On aid, Nobetau said there would now be a hope that Israel increased its aid to the region.</p>
<p>“I would say there’s an expectation on Israel to carry on or fill in that funding gap,” she said.</p>
<p>“The question now falls on the Pacific governments themselves, if this is something that’s worth pursuing . . .  they would prefer, if the USA are now is out of the picture, if Israel can continue to fill that.”</p>
<p>Nobetau expected Israel to look at bringing its military and intelligence services closer to the Pacific.</p>
<p>“From what I recall, when I was working with the government, there were institutional exchanges with the Mossad: internal capabilities to collect intelligence is something that’s that’s needed within Pacific countries,” he said.</p>
<p>“So I think that could be another area as well.”</p>
<p><em>This article is republished under a community partnership agreement with RNZ</em>.</p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &#038; Email"> </a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cook Islands govt fends off cyberattacks, passes bill to strengthen financial transparency</title>
		<link>https://eveningreport.nz/2024/12/13/cook-islands-govt-fends-off-cyberattacks-passes-bill-to-strengthen-financial-transparency/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Thu, 12 Dec 2024 23:17:38 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Cook Islands]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Digital currencies]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Mark Brown]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2024/12/13/cook-islands-govt-fends-off-cyberattacks-passes-bill-to-strengthen-financial-transparency/</guid>

					<description><![CDATA[Significant attempts were made from overseas to hack into the government’s central network a few weeks ago, Prime Minister Mark Brown has revealed. However, the Prime Minister said that the government’s robust firewall security systems were able to fend off these attempts. Brown revealed this while speaking in support of the Financial Transactions Reporting Amendment ]]></description>
										<content:encoded><![CDATA[<p>Significant attempts were made from overseas to hack into the government’s central network a few weeks ago, Prime Minister Mark Brown has revealed.</p>
<p>However, the Prime Minister said that the government’s robust firewall security systems were able to fend off these attempts.</p>
<p>Brown revealed this while speaking in support of the Financial Transactions Reporting Amendment Bill 2024, which was passed in Parliament last week.</p>
<p>The hacking attempts from overseas had, however, affected a couple of local companies in the hospitality industry in which their systems were compromised, he said.</p>
<p>“We were able to provide support to reduce any damage caused by these cyber security threats,” Brown said.</p>
<p>The Financial Transactions Reporting Amendment Bill’s primary purpose is to implement the recommended actions put forth by the Global Forum on Transparency and the Exchange of Information for Tax Purposes.</p>
<p>This Forum conducts peer reviews and assessments across over 130 jurisdictions in which Cook Islands is a member of. The aim of these reviews is to evaluate the country’s ability to cooperate effectively with established standards, Brown explained.</p>
<p><strong>‘Increasing collaboration’</strong><br />“The financial transactions reporting requirements that our country have signed up to is an example of the increasing collaboration among international jurisdictions to share information. Additionally, the need to protect the integrity of our financial centres and enhance our cybersecurity measures will only intensify as the world increasingly moves toward digital currencies.</p>
<p>“Our initial peer reviews took place in 2017, and the Cook Islands received a very positive rating for its capacity to exchange information.</p>
<p>“In light of the subsequent growth and improvements in both the quality and quantity of information exchanges, as well as enhancements to the standards themselves, a second round of assessment was initiated just last year. This latest round includes a legal framework assessment and peer reviews that also cover technical, operational, and information security aspects.”</p>
<p>Brown said that during this process several gaps in the legal framework were identified, and the Global Forum provided recommendations aimed at helping the country maintain a positive rating.</p>
<p>He said Cook Islands is required to address these recommendations by implementing the necessary legislative amendments by the 31st of this month in order to qualify for another round of onsite assessments and reviews in 2025.</p>
<p>The Prime Minister said the security of information is very important, and the security of tax information, in particular, is of significant importance to the Global Forum.</p>
<p>He added that some of the areas identified for improvement extend beyond legislative requirements.</p>
<p><strong>Security codes</strong><br />“For example, all doors in the RMD (Revenue Management Division) office that hold tax information must have security codes. The staff that work there must have proper identification cards with ID cards to swipe and allow access to these rooms,” Brown said.</p>
<p>“It is a big change from how our public service has operated for many years and maybe we do not see the actual need for this level of security. However, the Global Forum has its standards to maintain and we are obligated to maintain those standards, so we must follow suit.</p>
<p>“Not only that but now there’s also a requirement for proper due diligence to be conducted on employees or people who will work inside these departments. It is these sorts of requirements that compels us in our government agencies, many of them now to change the way we do things and to be mindful of increased security measures that are being imposed on our country. ”</p>
<p>Justice Minister Vaine “Mac” Mokoroa, who presented the Bill to Parliament, said: “The key concern here is to ensure that the Cook Islands continues to be a leader in the trust industry . . .  our International Trust Act has been at the forefront of the Cook Islands Offshore Financial Services Industry since its enactment 40 years ago, establishing the Cook Islands as a leader in wealth protection and preservation.”</p>
<p>“At that time, these laws were seen as innovative and ground-breaking, and their success is evident in the growth and development of the sector, as well as in the number of jurisdictions that have copied them, either in whole or in part.”</p>
<p>Mokoroa said that the Cook Islands Trust Companies Association, which comprises seven Trustee Companies licensed under the Trustee Companies Act, along with the Financial Supervisory Commission, conducted a thorough review of the International Trust Act and recommended necessary changes. These changes were reflected in the Financial Transactions Reporting Amendment Bill.</p>
<p><em>Republished from the <a href="https://www.cookislandsnews.com/" rel="nofollow">Cook Islands News</a> with permission.</em></p>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Out of the shadows: why making NZ’s security threat assessment public is timely</title>
		<link>https://eveningreport.nz/2023/08/13/out-of-the-shadows-why-making-nzs-security-threat-assessment-public-is-timely/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Sun, 13 Aug 2023 01:17:57 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Dissident groups]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[GCSB]]></category>
		<category><![CDATA[Government Communications Security Bureau]]></category>
		<category><![CDATA[Harassment]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[MFAT]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Ministry of Foreign Affairs and Trade]]></category>
		<category><![CDATA[National security strategy]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Political extremism]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Sabotage]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Intelligence Service]]></category>
		<category><![CDATA[SIS]]></category>
		<category><![CDATA[social trust]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2023/08/13/out-of-the-shadows-why-making-nzs-security-threat-assessment-public-is-timely/</guid>

					<description><![CDATA[ANALYSIS: By Alexander Gillespie, University of Waikato The release of the threat assessment by the New Zealand Security Intelligence Service (SIS) this week is the final piece in a defence and security puzzle that marks a genuine shift towards more open and public discussion of these crucial policy areas. Together with July’s strategic foreign policy ]]></description>
										<content:encoded><![CDATA[<p><strong>ANALYSIS:</strong> <em>By <a href="https://theconversation.com/profiles/alexander-gillespie-721706" rel="nofollow">Alexander Gillespie</a>, <a href="https://theconversation.com/institutions/university-of-waikato-781" rel="nofollow">University of Waikato</a></em></p>
<p>The release of the <a href="https://www.nzsis.govt.nz/assets/NZSIS-Documents/New-Zealands-Security-Threat-Environment-2023.pdf" rel="nofollow">threat assessment</a> by the New Zealand Security Intelligence Service (SIS) this week is the final piece in a defence and security puzzle that marks a genuine shift towards more open and public discussion of these crucial policy areas.</p>
<p>Together with July’s <a href="https://www.mfat.govt.nz/en/media-and-resources/release-of-mfats-2023-strategic-foreign-policy-assessment-navigating-a-shifting-world-te-whakatere-i-tetahi-ao-hurihuri/" rel="nofollow">strategic foreign policy assessment</a> from the Ministry of Foreign Affairs, and the <a href="https://www.dpmc.govt.nz/publications/aotearoas-national-security-strategy-secure-together-tatou-korowai-manaaki" rel="nofollow">national security strategy</a> released last week, it rounds out the picture of New Zealand’s place in a fast-evolving geopolitical landscape.</p>
<p>From increased strategic competition between countries, to declining social trust within them, as well as rapid technological change, the overall message is clear: business as usual is no longer an option.</p>
<p>By releasing the strategy documents in this way, the government and its various agencies clearly hope to win public consent and support — ultimately, the greatest asset any country possesses to defend itself.</p>
<blockquote class="twitter-tweet" readability="8.3375796178344">
<p dir="ltr" lang="en" xml:lang="en">NZSIS’s first unclassified threat assessment targets competition, public trust, technology <a href="https://t.co/5wetaOL1oA" rel="nofollow">https://t.co/5wetaOL1oA</a></p>
<p>— RNZ News (@rnz_news) <a href="https://twitter.com/rnz_news/status/1689766535588626432?ref_src=twsrc%5Etfw" rel="nofollow">August 10, 2023</a></p>
</blockquote>
<p><strong>Low threat of violent extremism<br /></strong> If there is good news in the SIS assessment, it is that the threat of violent extremism is still considered “low”. That means no change since the threat level was reassessed last year, with a terror attack considered “possible” rather than “probable”.</p>
<p>It is a welcome development since the threat level was lifted to “high” in the<br />immediate aftermath of the Christchurch terror attack in 2019.</p>
<p>This was lowered to “medium” about a month later — where it sat in September 2021, when another extremist attacked people with a knife in an Auckland mall, seriously<br />wounding five.</p>
<p>The threat level stayed there during the escalating social tension resulting from the government’s covid response. This saw New Zealand’s <a href="https://www.rnz.co.nz/news/national/479858/graham-philip-receives-three-year-jail-term-for-acts-of-sabotage" rel="nofollow">first conviction for sabotage</a> and increasing threats to politicians, with the SIS and police intervening in at least one case to mitigate the risk.</p>
<p>After protesters were cleared from the grounds of Parliament in early 2022, it was<br />still feared an act of extremism by a small minority was likely.</p>
<p>These risks now seem to be receding. And while the threat assessment notes that the online world can provide havens for extremism, the vast majority of those expressing vitriolic rhetoric are deemed unlikely to carry through with violence in the real world.</p>
<p><strong>Changing patterns of extremism<br /></strong> Assessments like this are not a crystal ball; threats can emerge quickly and be near-invisible before they do. But right now, at least publicly, the SIS is not aware of any specific or credible attack planning.</p>
<figure id="attachment_91761" aria-describedby="caption-attachment-91761" class="wp-caption alignright"><img fetchpriority="high" decoding="async" class="wp-image-91761 size-full" src="https://asiapacificreport.nz/wp-content/uploads/2023/08/Security-report-NZSIS-300tall.png" alt="New Zealand's Security Threat Environment 2023 report" width="300" height="418" srcset="https://asiapacificreport.nz/wp-content/uploads/2023/08/Security-report-NZSIS-300tall.png 300w, https://asiapacificreport.nz/wp-content/uploads/2023/08/Security-report-NZSIS-300tall-215x300.png 215w" sizes="(max-width: 300px) 100vw, 300px"/><figcaption id="caption-attachment-91761" class="wp-caption-text">New Zealand’s Security Threat Environment 2023 report. Image: APR screenshot</figcaption></figure>
<p>Many extremists still fit well-defined categories. There are the politically motivated, potentially violent, anti-authority conspiracy theorists, of which there is a “small number”.</p>
<p>And there are those motivated by identity (with white supremacist extremism the dominant strand) or faith (such as support for Islamic State, a decreasing and “very small number”).</p>
<p>However, the SIS describes a noticeable increase in individuals who don’t fit within those traditional boundaries, but who hold mixed, unstable or unclear ideologies they may tailor to fit some other violent or extremist impulse.</p>
<p><strong>Espionage and cyber-security risks</strong></p>
<p>There also seems to be a revival of the espionage and spying cultures last seen during the Cold War. There is already the first <a href="https://www.nzherald.co.nz/nz/proceedings-relating-to-new-zealands-first-military-case-of-espionage-to-recommence-in-private/MT76QKKICZAUPJCC5T77LIIO6A/" rel="nofollow">military case of espionage</a> before the courts, and the SIS is aware of individuals on the margins of government being cultivated and offered financial and other incentives to provide sensitive information.</p>
<p>The SIS says espionage operations by foreign intelligence agencies against New Zealand, both at home and abroad, are persistent, opportunistic and increasingly wide ranging.</p>
<p>While the government remains the main target, corporations, research institutions and state contractors are now all potential sources of sensitive information. Because non-governmental agencies are often not prepared for such threats, they pose a significant security risk.</p>
<p>Cybersecurity remains a particular concern, although the Government Communications Security Bureau (GCSB) recorded 350 incidents in 2021-22, which was a decline from 404 incidents recorded in the previous 12-month period.</p>
<p>On the other hand, a growing proportion of cyber incidents affecting major New Zealand institutions can be linked to state-sponsored actors. Of the 350 reported major incidents, 118 were connected to foreign states (34 percent of the total, up from 28 percent the previous year).</p>
<blockquote class="twitter-tweet" readability="8.3375796178344">
<p dir="ltr" lang="en" xml:lang="en">NZSIS’s first unclassified threat assessment targets competition, public trust, technology <a href="https://t.co/5wetaOL1oA" rel="nofollow">https://t.co/5wetaOL1oA</a></p>
<p>— RNZ News (@rnz_news) <a href="https://twitter.com/rnz_news/status/1689766535588626432?ref_src=twsrc%5Etfw" rel="nofollow">August 10, 2023</a></p>
</blockquote>
<p><strong>Russia, Iran and China<br /></strong> Although the SIS recorded that only a “small number” of foreign states engaged in deceptive, corruptive or coercive attempts to exert political or social influence, the potential for harm is “significant”.</p>
<p>Some of the most insidious examples concern harassment of ethnic communities within New Zealand who speak out against the actions of a foreign government.</p>
<p>The SIS identifies Russia, Iran and China as the three offenders. Iran was recorded as reporting on Iranian communities and dissident groups in New Zealand. In addition, the assessment says:</p>
<blockquote readability="7">
<p>Most notable is the continued targeting of New Zealand’s diverse ethnic Chinese communities. We see these activities carried out by groups and individuals linked to the intelligence arm of the People’s Republic of China.</p>
</blockquote>
<p>Overall, the threat assessment makes for welcome – if at times unsettling – reading. Having such conversations in the open, rather than in whispers behind closed doors, demystifies aspects of national security.</p>
<p>Most importantly, it gives greater credibility to those state agencies that must increase their transparency in order to build public trust and support for their unique roles within a working democracy.<img decoding="async" loading="lazy" src="https://counter.theconversation.com/content/211183/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1"/></p>
<p><em>Dr <a href="https://theconversation.com/profiles/alexander-gillespie-721706" rel="nofollow">Alexander Gillespie</a>, Professor of Law, <em><a href="https://theconversation.com/institutions/university-of-waikato-781" rel="nofollow">University of Waikato.</a></em> This article is republished from <a href="https://theconversation.com" rel="nofollow">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/out-of-the-shadows-why-making-nzs-security-threat-assessment-public-for-the-first-time-is-the-right-move-211183" rel="nofollow">original article</a>.</em></p>
<blockquote class="twitter-tweet" readability="5.8074074074074">
<p dir="ltr" lang="en" xml:lang="en">MPs confront Iran’s Ambassador to New Zealand over protest crackdowns <a href="https://t.co/Mtqr5OLetS" rel="nofollow">https://t.co/Mtqr5OLetS</a></p>
<p>— RNZ News (@rnz_news) <a href="https://twitter.com/rnz_news/status/1686964962252754945?ref_src=twsrc%5Etfw" rel="nofollow">August 3, 2023</a></p>
</blockquote>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="pf-button-img" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PODCAST: Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All</title>
		<link>https://eveningreport.nz/2022/09/01/podcast-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/</link>
					<comments>https://eveningreport.nz/2022/09/01/podcast-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/#comments</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 02:14:18 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Militants]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Military attack]]></category>
		<category><![CDATA[Military Forces]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[Military Tactics]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1076833</guid>

					<description><![CDATA[In this episode, Buchanan and Manning take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to say, it’s a world few realise exists and few realise how it is effecting them. With the technologies that surround us, tech that we use every day, it has become easy to conduct indirect or non-attributable warfare using a variety of means.]]></description>
										<content:encoded><![CDATA[<p><iframe title="Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All" width="640" height="360" src="https://www.youtube.com/embed/iN3o8a1R8_I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar –</strong> In this podcast, political scientist Paul Buchanan and Selwyn Manning analyse the advent of new technologies and the rise of hybrid warfare.</p>
<p>In this episode, Buchanan and Manning take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to say, it’s a world few realise exists and few realise how it is effecting them.</p>
<p>With the technologies that surround us, tech that we use every day, it has become easy to conduct indirect or non-attributable warfare using a variety of means.</p>
<p>There’s the grey area phenomena where opponent states undermine adversaries from within, sowing distrust, or fear, where there should not be. The purpose is to weaken public trust and a population’s resolve to support their government.</p>
<p>In an extreme situation, this form of hostilities can escalate into hybrid warfare using indirect and direct means, from cyber offensives to firepower.</p>
<p>To illustrate the issue, we will draw on the build-up to the Russian invasion of Ukraine, and also evaluate other locations around the world where there is evidence of hybrid warfare.</p>
<p>It may surprise you to realise how close to home are real world examples of hybrid warfare.</p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="(max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/09/01/podcast-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/feed/</wfw:commentRss>
			<slash:comments>13</slash:comments>
		
		
			</item>
		<item>
		<title>LIVE@Midday Thurs Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All</title>
		<link>https://eveningreport.nz/2022/08/31/livemidday-thurs-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/</link>
					<comments>https://eveningreport.nz/2022/08/31/livemidday-thurs-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Wed, 31 Aug 2022 08:31:00 +0000</pubDate>
				<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[ER LIVE]]></category>
		<category><![CDATA[Geopolitics]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[liberal democracy]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[Military Forces]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[Military Tactics]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Peoples Republic of China]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russian aggression]]></category>
		<category><![CDATA[Russian Federation]]></category>
		<category><![CDATA[Russian military]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States of America]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1076810</guid>

					<description><![CDATA[A View from Afar – In this podcast, political scientist Paul Buchanan and Selwyn Manning will analyse the advent of new technologies and the rise of hybrid warfare. In this episode, we will take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to ]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Buchanan + Manning: How Hybrid Warfare and Hostile Tech Surrounds Us All" width="640" height="360" src="https://www.youtube.com/embed/iN3o8a1R8_I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar –</strong> In this podcast, political scientist Paul Buchanan and Selwyn Manning will analyse the advent of new technologies and the rise of hybrid warfare.</p>
<p>In this episode, we will take you on a journey into a world that exists all around us, no matter where we live. But, it’s fair to say, it’s a world few realise exists and few realise how it is effecting them.</p>
<p>With the technologies that surround us, tech that we use every day, it has become easy to conduct indirect or non-attributable warfare using a variety of means.</p>
<p>There’s the grey area phenomena where opponent states undermine adversaries from within, sowing distrust, or fear, where there should not be. The purpose is to weaken public trust and a population’s resolve to support their government.</p>
<p>In an extreme situation, this form of hostilities can escalate into hybrid warfare using indirect and direct means, from cyber offensives to firepower.</p>
<p>To illustrate the issue, we will draw on the build-up to the Russian invasion of Ukraine, and also evaluate other locations around the world where there is evidence of hybrid warfare.</p>
<p>It may surprise you to realise how close to home are real world examples of hybrid warfare.</p>
<p><strong>Join Paul and Selwyn for this LIVE recording of this podcast while they consider these big issues, and remember any comments you make while live can be included in this programme.</strong></p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a style="text-decoration: none;" href="https://www.podchaser.com/EveningReport?utm_source=Evening%20Report%7C1569927&amp;utm_medium=badge&amp;utm_content=TRCAP1569927" target="__blank" rel="noopener"><img decoding="async" class="aligncenter" style="width: 300px; max-width: 100%;" src="https://imagegen.podchaser.com/badge/TRCAP1569927.png" alt="Podchaser - Evening Report" width="300" height="auto" /></a></center><center><a style="display: inline-block; overflow: hidden; border-radius: 13px; width: 250px; height: 83px;" href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200"><img decoding="async" style="border-radius: 13px; width: 250px; height: 83px;" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center><center><a href="https://music.amazon.com.au/podcasts/3cc7eef8-5fb7-4ab9-ac68-1264839d82f0/EVENING-REPORT"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1068847" src="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png" alt="" width="300" height="73" srcset="https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-768x186.png 768w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X-696x169.png 696w, https://eveningreport.nz/wp-content/uploads/2021/08/US_ListenOn_AmazonMusic_button_black_RGB_5X.png 825w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></center><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0" data-mce-fragment="1"></iframe></center><center>***</center></p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/08/31/livemidday-thurs-buchanan-manning-how-hybrid-warfare-and-hostile-tech-surrounds-us-all/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>China documents threaten Pacific sovereignty, warns FSM president</title>
		<link>https://eveningreport.nz/2022/05/27/china-documents-threaten-pacific-sovereignty-warns-fsm-president/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Fri, 27 May 2022 01:17:57 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Asia Report]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[China-Taiwan rivalry]]></category>
		<category><![CDATA[China-US rivalry]]></category>
		<category><![CDATA[Chinese control]]></category>
		<category><![CDATA[Chinese Pacific Vision plan]]></category>
		<category><![CDATA[Climate]]></category>
		<category><![CDATA[Cold War]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[David Panuelo]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Environment]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Federated States of Micronesia]]></category>
		<category><![CDATA[Fiji]]></category>
		<category><![CDATA[fsm]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Indigenous]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific Islands Forum]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Pacific security]]></category>
		<category><![CDATA[Pacific sovereignty]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Socio-economic development]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[World War]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2022/05/27/china-documents-threaten-pacific-sovereignty-warns-fsm-president/</guid>

					<description><![CDATA[RNZ Pacific The President of the Federated States of Micronesia says he has serious concerns about the details of two leaked Chinese government documents to be tabled at a meeting next week. President David Panuelo warns the sovereignty of the Pacific Island countries is at stake, and that the outcome of one of the documents ]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.rnz.co.nz/international/pacific-news/" rel="nofollow"><em>RNZ Pacific</em></a></p>
<p>The President of the Federated States of Micronesia says he has serious concerns about the details of two leaked Chinese government documents to be tabled at a meeting next week.</p>
<p>President David Panuelo warns the sovereignty of the Pacific Island countries is at stake, and that the outcome of one of the documents could result in a cold war or even a world war.</p>
<p>Panuelo has written to 18 Pacific leaders — including New Zealand, Australia, and the Secretary-General of the Pacific Islands Forum — specifically about the China-Pacific Island Countries Common Development Vision.</p>
<p>The other document is a five-year plan to implement the outcomes into action.</p>
<p>In his letter he said the Common Development Vision and Monday’s meeting was a “smokescreen” for a larger agenda, and further warned that China was looking to exert more control over Pacific nations’ sovereignty and that this document threatened to bring at the very least a new Cold War era but in the worst-case scenario, a world war.</p>
<p>He has urged leaders in the region to look at it carefully before making any decisions.</p>
<p>In particular, Panuelo noted that the Vision sought to “fundamentally alter what used to be bilateral relations with China into multilateral issues”.</p>
<p><strong>Ensuring ‘Chinese control’</strong><br />The Vision he added sought to “… ensure Chinese control of ‘traditional and non-traditional security” of our islands, including through law enforcement training, supplying, and joint enforcement efforts, which can be used for the protection of Chinese assets and citizens.</p>
<p>It suggests “cooperation on network and governance” and “cybersecurity” and “equal emphasis on development and security”, and that there shall be “economic development and protection of national security and public interests”.</p>
<p>“The Common Development Vision seeks to ensure Chinese influence in government through ‘collaborative’ policy planning and political exchanges, including diplomatic training, in addition to an increase in Chinese media relationships in the Pacific …,” he said.</p>
<p>“The Common Development Vision seeks Chinese control and ownership of our communications infrastructure, as well as customs and quarantine infrastructure …. for the purpose of biodata collection and mass surveillance of those residing in, entering, and leaving our islands, ostensibly to occur in part through cybersecurity partnership.”</p>
<p>The Vision he said “… seeks Chinese control of our collective fisheries and extractive resource sectors, including free trade agreements, marine spatial planning, deep-sea mining, and extensive public and private sector loan-taking through the Belt and Road Initiative via the Asian Infrastructure Investment Bank.”</p>
<p>Panuelo said the proposed China-Pacific leaders meeting on Monday in Fiji was intended to “shift those of us with diplomatic relations with China very closely into Beijing’s orbit, intrinsically tying the whole of our countries and societies to them.</p>
<p>“The practical impacts, however, of Chinese control over our communications infrastructure, our ocean territory and the resources within them, and our security space, aside from impacts on our sovereignty is that it increases the chances of China getting into conflict with Australia, Japan, the United States, and New Zealand, on the day when Beijing decides to invade Taiwan.</p>
<p><strong>China’s goal – ‘take Taiwan’</strong><br />“To be clear, that’s China’s goal: to take Taiwan. Peacefully, if possible; through war, if necessary.”</p>
<p>Panuelo said the FSM would attend Monday’s meeting and would reject both documents “on the premise that we believe the proposed agreement needlessly heightens geopolitical tensions, and that the agreement threatens regional stability and security, including both my country’s Great Friendship with China and my country’s Enduring Partnership with the United States.”</p>
<p>He said the Vision and meeting were a “smokescreen for a larger agenda”.</p>
<p>“Despite our ceaseless and accurate howls that Climate Change represents the single-most existential security threat to our islands, the Common Development Vision threatens to bring a new Cold war era at best, and a World War at worst.”</p>
<p>He said the only way to maintain the relationship with Beijing was to focus exclusively on economic and technical cooperation.</p>
<p>Panuelo hoped that by alerting his Pacific colleagues of developments that “… we can collectively take the steps necessary to prevent any intensified conflict, and possible breakout of war, from ever happening in the first place”.</p>
<p>“I believe that Australia needs to take climate change more seriously and urgently. I believe that the United States should have a diplomatic presence in all sovereign Pacific Islands Countries, and step-up its assistance to all islands, to include its own states and territories in the Pacific.”</p>
<p><strong>Not a justification</strong><br />Panuelo summed up: “However, it is my view that the shortcomings of our allies are not a justification for condemning the leaders who succeed us in having to accept a war that we failed to recognise was coming and failed to prevent from occurring.</p>
<p>“We can only reassert the rightful focus on climate change as our region’s most existential threat by taking every single possible action to promote peace and harmony across our Blue Pacific Continent.”</p>
<p>Panuelo said his cabinet has suggested the FSM resist the objectives of the documents and the nation maintain its own bilateral agenda for development and engagement with China.</p>
<p>He also said the documents would open up Pacific countries to having phone calls and emails intercepted and overheard.</p>
<p>China’s Foreign Minister Wang Yi is currently visiting several Pacific countries.</p>
<p><em><em>This article is republished under a community partnership agreement with RNZ.</em></em></p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="c2" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Submission &#8211; Why New Zealand is a ‘sweet spot’ for DDoS attacks</title>
		<link>https://eveningreport.nz/2022/04/22/submission-why-new-zealand-is-a-sweet-spot-for-ddos-attacks/</link>
					<comments>https://eveningreport.nz/2022/04/22/submission-why-new-zealand-is-a-sweet-spot-for-ddos-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Evening Report]]></dc:creator>
		<pubDate>Thu, 21 Apr 2022 23:41:39 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Essays]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Submissions]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1074208</guid>

					<description><![CDATA[Essay by By Raymond Maisano, Head of Australia and New Zealand, Cloudflare. Aotearoa New Zealand makes up a small portion of the world’s population, yet the country is being hit by a relatively bigger share of cyber attacks. Chances are, you’re familiar with the term ‘distributed denial of service (DDoS) attack’. Not because your organisation ]]></description>
										<content:encoded><![CDATA[<p><em>Essay by By Raymond Maisano, Head of Australia and New Zealand, Cloudflare.</em></p>
<p>Aotearoa New Zealand makes up a small portion of the world’s population, yet the country is being hit by a relatively bigger share of cyber attacks.</p>
<p>Chances are, you’re familiar with the term ‘distributed denial of service (DDoS) attack’. Not because your organisation has been subjected to one, but instead, the recent numerous, high profile attacks on local and global businesses have captured your attention.</p>
<p>With cyber attacks ramping up across the globe and Aotearoa New Zealand an attractive target, every business—no matter the size—must put protections in place.</p>
<p><strong>What’s a DDoS attack?</strong></p>
<p>Designed to disrupt the normal function of a server, DDoS attacks harness compromised computers and hardware like<a href="https://www.cert.govt.nz/business/news-and-events/malware-attacks-and-tech-scam-calls-are-on-the-rise-according-to-newly-released-quarter-three-data-from-cert-nz-new-news-page/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/business/news-and-events/malware-attacks-and-tech-scam-calls-are-on-the-rise-according-to-newly-released-quarter-three-data-from-cert-nz-new-news-page/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw0jAAnCY9szkVi2lKs4WC0B"> Internet of Things (IoT) devices</a> to flood the target or its surrounding infrastructure with traffic. This influx can slow down or overwhelm a website or service, denying access to genuine traffic.</p>
<p>DDoS attacks are on the rise across the world, with attackers using different styles of malicious activity to take down websites and even using them as an attempt to extort money. Businesses from all industries were victims of ransom DDoS (RDDoS) attacks in 2021, and<a href="https://blog.cloudflare.com/ddos-attack-trends-for-2021-q4/" data-saferedirecturl="https://www.google.com/url?q=https://blog.cloudflare.com/ddos-attack-trends-for-2021-q4/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw3pQ4xXA9TzmT7bUxzDMGBF"> Q4 saw a 29% YoY and 177% QoQ increase</a>.</p>
<p><strong>New Zealand is a prime target</strong></p>
<p>Only<a href="https://www.submarinecablemap.com/country/new-zealand" data-saferedirecturl="https://www.google.com/url?q=https://www.submarinecablemap.com/country/new-zealand&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw2xWMuI7zMfVoteE9sEYfrD"> three active undersea submarine cables</a> connect Aotearoa New Zealand to the outside world. In comparison to the rest of the world, this relatively small number makes it easier for the country’s networks to be overwhelmed.</p>
<p>&nbsp;</p>
<p>In fact, the National Cyber Security Centre (NCSC) reported an increase in criminal or financially motivated actors with a significant national impact or potential to cause serious harm in its<a href="https://www.ncsc.govt.nz/assets/NCSC-Documents/2020-2021-NCSC-Cyber-Threat-Report.pdf" data-saferedirecturl="https://www.google.com/url?q=https://www.ncsc.govt.nz/assets/NCSC-Documents/2020-2021-NCSC-Cyber-Threat-Report.pdf&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw1urTBiP1tRxHXX3mArbPQO"> 2020-21 threat report</a> (27% compared to 14% the year prior).</p>
<p>A spate of high profile, local businesses experienced repeated DDoS attacks over the last 18 months—from <a href="https://www.reuters.com/technology/widespread-internet-outages-hits-users-across-new-zealand-2021-09-03/" data-saferedirecturl="https://www.google.com/url?q=https://www.reuters.com/technology/widespread-internet-outages-hits-users-across-new-zealand-2021-09-03/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw2smCmBHQWMB6iRzlyWdUem">Vocus</a> to<a href="https://www.nzherald.co.nz/business/live-cyber-attack-fears-kiwibank-anz-nz-post-metservice-back-online-after-cert-flags-cyber-attacks/KJMXHDACPES4BP3FZ465LESJFM/" data-saferedirecturl="https://www.google.com/url?q=https://www.nzherald.co.nz/business/live-cyber-attack-fears-kiwibank-anz-nz-post-metservice-back-online-after-cert-flags-cyber-attacks/KJMXHDACPES4BP3FZ465LESJFM/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw1XyNJ_M9ANluLS_cs1dZJR"> one coordinated attack</a> on NZ Post, MetService, Kiwibank, ANZ and Inland Revenue.</p>
<p>However, it is critical to note that organisations of any size can fall victim to a DDoS or RDDoS attack. No business is immune, and the impacts can be significant.</p>
<p><strong>How can businesses prevent these types of attacks?</strong></p>
<p>Most organisations in Aotearoa New Zealand are still trying to protect themselves using traditional security measures that are no match for a burgeoning tide of bots, ready to be mobilised against them in a few strokes of a keyboard.</p>
<p>While this might sound daunting, implementing good cyber security protections against DDoS attacks does not need to be.</p>
<ol>
<li><strong>Speak with your network provider </strong>to understand what DDoS mitigation services they offer and how much traffic they can mitigate before your organisation is affected. This is an added service for some providers, while others might charge surge pricing in the unlucky instance that your website is bombarded with traffic during a DDoS attack.</li>
<li><strong>Ramp up your front-line protection. </strong>Engage a provider with specially designed network equipment or a cloud-based protection service to mitigate your business from incoming threats. Here, it’s essential to consider the potential risk to your company and consider the scalability, flexibility, reliability and network size of potential providers. For example, large-scale attacks have the potential to take out on-site network infrastructure, while cloud-based solutions can scale when mitigating attacks.</li>
</ol>
<ol start="3">
<li><strong>Create a DDoS attack incident response plan.</strong> The overwhelming nature of a DDoS attack can take out multiple systems and services, not just your website. And in the moment, it’s easy for panic to set in. Be proactive, create a dedicated DDoS<a href="https://www.cert.govt.nz/business/guides/incident-response-plan/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/business/guides/incident-response-plan/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw3KdwMmLJCs9zjEFiL_gw7e"> incident response plan</a>, and conduct exercises to ensure its effectiveness.</li>
</ol>
<ol start="4">
<li><strong>Regularly</strong> <strong>patch your systems, software and hardware. </strong>Developers regularly release updates to decrease or eliminate vulnerabilities in software. Applying these patches to operating systems, applications, and all network-connected devices in real-time is the simplest way to mitigate a cyber security attack. There’s a reason why patching is<a href="https://www.cert.govt.nz/it-specialists/critical-controls/10-critical-controls/" data-saferedirecturl="https://www.google.com/url?q=https://www.cert.govt.nz/it-specialists/critical-controls/10-critical-controls/&amp;source=gmail&amp;ust=1650670213415000&amp;usg=AOvVaw3bpN0GoCeQqeUb3qjVHJiN"> CERT NZ’s top critical control</a> to protect organisations from being breached—don’t leave your business wide open.</li>
</ol>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2022/04/22/submission-why-new-zealand-is-a-sweet-spot-for-ddos-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PODCAST: Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare</title>
		<link>https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/</link>
					<comments>https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/#respond</comments>
		
		<dc:creator><![CDATA[Selwyn Manning]]></dc:creator>
		<pubDate>Thu, 29 Jul 2021 02:52:51 +0000</pubDate>
				<category><![CDATA[36th Parallel Assessments]]></category>
		<category><![CDATA[A View from Afar]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Evening Report]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Intelligence agencies]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Paul G Buchanan]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Private Spying]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security and Defense]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Selwyn Manning]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=1068174</guid>

					<description><![CDATA[Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar with a deep-dive into cyber-attacks and hybrid warfare - Especially how 2021 has witnessed a Cold War II styled stand-off between global powers.]]></description>
										<content:encoded><![CDATA[<p><iframe loading="lazy" title="Buchanan + Manning on Cyber-Attacks and the Evolution of Hybrid Warfare" width="640" height="360" src="https://www.youtube.com/embed/j2ZmyUav3n0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><strong>A View from Afar:</strong> Selwyn Manning and Paul Buchanan present this week’s podcast, A View from Afar with a deep-dive into cyber-attacks and hybrid warfare &#8211; Especially how 2021 has witnessed a Cold War II styled stand-off between global powers.</p>
<p>To re-cap, there has been:</p>
<ul>
<li>Allegations of a global-scale hack by the People’s Republic of China.</li>
<li>There’s the Pegasus spyware scandal, where Israel has exported deep-tracking and targeting spyware to despots and authoritarian governments.</li>
<li>Then there’s been the relatively silent mission-creep of Palantir as a Western-oriented Public Private Partnership-styled signals &#8220;facilitator&#8221;.</li>
</ul>
<p>Paul and Selwyn discuss how all of this sets 2021 apart and adds up to an evolution of hybrid warfare capabilities.</p>
<p>You can comment on this debate by clicking on one of these social media channels and interacting in the social media’s comment area. Here are the links:</p>
<ul>
<li><a href="https://www.facebook.com/selwyn.manning" target="_blank" rel="noopener noreferrer">Facebook.com/selwyn.manning</a></li>
<li><a href="https://www.youtube.com/channel/UC_Z9kwrTOD64QIkx32tY8yw" target="_blank" rel="noopener noreferrer">Youtube</a></li>
<li><a href="https://twitter.com/Selwyn_Manning" target="_blank" rel="noopener noreferrer">Twitter.com/Selwyn_Manning</a></li>
</ul>
<p>If you miss the LIVE Episode, you can see it as video-on-demand, and earlier episodes too, by checking out <a href="https://eveningreport.nz/">EveningReport.nz </a>or, subscribe to the <a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334" target="_blank" rel="noopener noreferrer">Evening Report podcast here</a>.</p>
<p>The <a href="https://milnz.co.nz/mil-public-webcasting-services/" target="_blank" rel="noopener">MIL Network’s</a> podcast <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> was Nominated as a Top  Defence Security Podcast by <a href="https://threat.technology/20-best-defence-security-podcasts-of-2021/" target="_blank" rel="noopener">Threat.Technology</a> – a London-based cyber security news publication.</p>
<p>Threat.Technology placed <a href="https://eveningreport.nz/er-podcasts/" target="_blank" rel="noopener">A View from Afar</a> at 9th in its 20 Best Defence Security Podcasts of 2021 category. You can follow A View from Afar via our affiliate syndicators.</p>
<p><center><a href="https://podcasts.apple.com/us/podcast/evening-report/id1542433334?itsct=podcast_box&amp;itscg=30200" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter" src="https://tools.applemediaservices.com/api/badges/listen-on-apple-podcasts/badge/en-US?size=250x83&amp;releaseDate=1606352220&amp;h=79ac0fbf02ad5db86494e28360c5d19f" alt="Listen on Apple Podcasts" width="165" height="40" /></a></center><center><a href="https://open.spotify.com/show/102eox6FyOzfp48pPTv8nX" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-871386 size-full" src="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png" sizes="auto, (max-width: 330px) 100vw, 330px" srcset="https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1.png 330w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-300x73.png 300w, https://eveningreport.nz/wp-content/uploads/2020/12/spotify-podcast-badge-blk-grn-330x80-1-324x80.png 324w" alt="" width="330" height="80" /></a></center>&nbsp;</p>
<p><center><iframe loading="lazy" src="https://www.iheart.com/podcast/269-evening-report-75161304/?embed=true" width="350" height="300" frameborder="0"></iframe></center><center></center><center></center><a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license"><img decoding="async" style="border-width: 0;" src="https://i.creativecommons.org/l/by-sa/4.0/88x31.png" alt="Creative Commons Licence" /></a><br />
A View from Afar by <a href="https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/" rel="cc:attributionURL">Paul G. Buchanan and Selwyn Manning</a> is licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license">Creative Commons Attribution-ShareAlike 4.0 International License</a>.<br />
Based on a work at <a href="https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/" rel="dct:source">https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://eveningreport.nz/2021/07/29/podcast-buchanan-manning-on-cyber-attacks-and-the-evolution-of-hybrid-warfare/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NZ cyber agency chief worried China hacks exploiting security weakness</title>
		<link>https://eveningreport.nz/2021/07/21/nz-cyber-agency-chief-worried-china-hacks-exploiting-security-weakness/</link>
		
		<dc:creator><![CDATA[Asia Pacific Report]]></dc:creator>
		<pubDate>Tue, 20 Jul 2021 13:18:11 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[GCSB]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Government Communications Security Bureau]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Multimedia]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific]]></category>
		<category><![CDATA[Pacific news]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Syndicate]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2021/07/21/nz-cyber-agency-chief-worried-china-hacks-exploiting-security-weakness/</guid>

					<description><![CDATA[RNZ News New Zealand’s cyber security agency believes China has been behind numerous hack attacks spanning years. The government joined Western allies and Japan in calling out Beijing for so-called state-sponsored hacks, including a major incursion in February when Microsoft email servers were targeted. The US has charged four Chinese nationals — three security officials ]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.rnz.co.nz/national/programmes/checkpoint/" rel="nofollow"><em>RNZ News</em></a></p>
<p>New Zealand’s cyber security agency believes China has been behind numerous hack attacks spanning years.</p>
<p>The government joined Western allies and Japan in calling out Beijing for so-called state-sponsored hacks, including a major incursion in February when Microsoft email servers were targeted.</p>
<p>The US has <a href="https://www.aljazeera.com/economy/2021/7/19/us-uk-and-allies-tie-chinese-government-to-microsoft-hack" rel="nofollow">charged four Chinese nationals</a> — three security officials and one contract hacker — with targeting dozens of companies and government agencies in the United States and overseas under the cover of a tech company.</p>
<p>“What we do is when we see malicious cyber activity on New Zealand networks, that may be through our own capabilities that we have to help protect New Zealand networks or it may be something that’s reported to us, we look at the malware that’s used,” Government Communications Security Bureau Director-General Andrew Hampton told RNZ <em>Checkpoint</em>.</p>
<p>“We look at how the actor behaves. We look at who they might be targeting and what they do if they get onto a network.</p>
<p>“That allows us to build a bit of a picture of who the actor is. We then compare that with information that we receive, often from our intelligence partners who are also observing such activity.</p>
<p>“That allows us to make an assessment, and it’s always a probability assessment about who the actor is.</p>
<p><strong>The APT 40 group</strong><br />“In this case, because of the amount of information we’ve been able to access both from our own capabilities and from our partners, we’ve got a reasonably high level of confidence that the actor who we’ve seen undertaking this campaign over a number of years, and in particular, who was responsible for the Microsoft Exchange compromise, was the APT 40 group — Advanced Persistent Threat Group 40 — which has been identified as associated with the Chinese Ministry of State Security.</p>
<p><em>The RNZ National live stream.  Video: Checkpoint</em></p>
<p>“The actors here are state sponsored actors rather than what we would normally define as a criminal group. What we’re seeing here is a state sponsored actor likely to be motivated by a desire to steal information.”</p>
<p>Hampton said there was a blurring of lines between what a state agency does, and what a criminal group does.</p>
<p>“Some of the technical capabilities that previously only state organisations had, have now got into the hands of criminal groups.</p>
<p>“Also what we’ve seen in a range of countries is individuals who may work part-time in a government intelligence agency, and then may work part-time in a criminal enterprise. Or they may have previously worked in a state intelligence agency and are now out by themselves but still have links links back to the state.</p>
<p>“We don’t know the full detail of the nature of the relationship, but what we do know is the Ministry of State Security in China, for example, is a very large organisation with many thousands of of employees.</p>
<p>“So they are big organisations with people on their payroll but they also would have connections with other individuals and organisations.</p>
<p><strong>Information shared with criminals</strong><br />“Something else worth noting with regard to this most recent compromise involving the Microsoft Exchange, what we saw there is once the Ministry of State Security actors had identified the vulnerability and exploited it, they then shared that information with a range of other actors, including criminal groups, so they too could exploit it.</p>
<p>“This is obviously a real concern to see this type of behaviour occurring,” Hampton said.</p>
<p>All evidence showed the cyber attacks were all originating from mainland China, Hampton told <em>Checkpoint</em>.</p>
<p>He said such attacks would be aimed at stealing data or possibly positioning themselves on a system to be able to access information in the future.</p>
<p>“A common tactic we see, unfortunately, is there may be a vulnerability in a system,” Hampton said.</p>
<p>“It could be a generic vulnerability across all users of that particular system, and a malicious actor may become aware of that vulnerability, so they would use that to get onto the network.</p>
<p>“That doesn’t mean they will then start exfiltrating data from day one or something like that. They may just want to to sit there in the event that at some point in the future they may want to start doing that.</p>
<p><strong>Malicious actors</strong><br />“This exploitation of known vulnerabilities is a real concern. This is why all organisations need to keep their security patches up to date, because what can happen is you can have malicious actors use technology to scan whole countries to see who hasn’t updated their patches.</p>
<p>“They then use that vulnerability to get on the network and they may not do anything with it for some time. Or they might produce a list of all the organisations, say, in New Zealand who haven’t updated their patches.</p>
<p>“Then they make a decision – okay these are the four to five we want to further exploit.”</p>
<p><em><em>This article is republished under a community partnership agreement with RNZ.</em></em></p>
<div class="printfriendly pf-button pf-button-content pf-alignleft"><a href="#" rel="nofollow" onclick="window.print(); return false;" title="Printer Friendly, PDF &amp; Email"><img decoding="async" class="c2" src="https://cdn.printfriendly.com/buttons/printfriendly-pdf-button.png" alt="Print Friendly, PDF &amp; Email"/></a></div>
<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener">AsiaPacificReport.nz</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bryce Edwards&#8217; Political Roundup: Intense speculation on Budget leaking and hacking</title>
		<link>https://eveningreport.nz/2019/05/29/bryce-edwards-political-roundup-intense-speculation-on-budget-leaking-and-hacking/</link>
		
		<dc:creator><![CDATA[Bryce Edwards]]></dc:creator>
		<pubDate>Wed, 29 May 2019 11:16:41 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Bryce Edwards]]></category>
		<category><![CDATA[Budget]]></category>
		<category><![CDATA[Critical Politics]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Digital data]]></category>
		<category><![CDATA[Digital policy]]></category>
		<category><![CDATA[Editor's Picks]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Law enforcement]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Leaks]]></category>
		<category><![CDATA[Legislation]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Media law]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[National Party]]></category>
		<category><![CDATA[National Party Leader]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[New Zealand Government Communications Security Bureau]]></category>
		<category><![CDATA[New Zealand National Party]]></category>
		<category><![CDATA[News Media]]></category>
		<category><![CDATA[NZ Politics]]></category>
		<category><![CDATA[Political freedom]]></category>
		<category><![CDATA[Political Integrity]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Treasury]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=24358</guid>

					<description><![CDATA[The problem with scandals involving so much mystery is they naturally lead to plenty of speculation, some of which might be useful and some which might be completely wrong, or even highly-damaging. And while we are still in the midst of it all, it&#8217;s extremely difficult to sort out the useful from the damaging. For ]]></description>
										<content:encoded><![CDATA[<p><strong>The problem with scandals involving so much mystery is they naturally lead to plenty of speculation, some of which might be useful and some which might be completely wrong, or even highly-damaging. And while we are still in the midst of it all, it&#8217;s extremely difficult to sort out the useful from the damaging.</strong></p>
<p>For the best overall guide to what has happened in the Budget leak/hack scandal, see the just-published article by Henry Cooke: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=b75db47597&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">What we know and don&#8217;t know about the Budget &#8216;hack&#8217;</a>. Amongst his rundown on the background to the scandal and the theories offered so far, Cooke points out that, rather than being hacked, the Treasury website might simply have been scanned by Google, allowing a cache of pages to become available to someone who has handed them on to the National Party.</p>
<p>Another leading explanation for how the Treasury&#8217;s Budget information was released early to National comes down to a simple but obvious idea that parliamentary staffers looked for and found the information on the Treasury website. This would also explain how National leader Simon Bridges could be so categorical in his insistence that his scoops weren&#8217;t based on hacking or illegality.</p>
<p>According to this theory, National had one of its Parliamentary staffers monitoring the Treasury website in the days leading up to Budget Day, constantly using the frontpage search bar on the site to look for &#8220;Budget 2019&#8221;. The hope being that at some stage some Budget documents would be loaded onto the site momentarily, in anticipation of Thursday&#8217;s publication, before they were then locked away for safety.</p>
<p>The story goes that by searching every five minutes or so, the National staffer eventually hit the jackpot when documents or pages turned up with the goods. It might have taken hundreds or even thousands of searches over a couple of days.</p>
<p>In fact, National Party pollster and blogger David Farrar has outlined a similar scenario based on his previous experience as a parliamentary staffer: &#8220;when I worked for the Opposition in 2000 or 2001, I recall waiting for the Government to release the Police crime stats. They always put a positive spin on it. I went to the Police website and looked at last year&#8217;s stats. I also looked at the previous year. They had the same URL format. I changed the year to the current one, and hey presto I had the official crime states four hours before the Government was due to release them&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=8ae2c456cb&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">My guess as to what happened</a>.</p>
<p>Farrar argues that something similar may have happened, and it therefore wouldn&#8217;t constitute hacking: &#8220;So my guess is something similar has happened. That possibly the material was put up on a website of some sort and someone found it. Treasury are calling it hacking because they didn&#8217;t think it was open to the public. But there is a difference between hacking a secure computer system, and locating information that is on the Internet (even if hidden). Was there any cracking of passwords for example?&#8221;</p>
<p>But do such explanations fit with what Treasury are saying when they claim that their site has been &#8220;deliberately and systematically hacked&#8221;? It&#8217;s arguable either way. Certainly, some tech-specialists seem to think that something much more sophisticated must have happened – especially based on the fact that Treasury has called in the Police. For one of the most in-depth discussions of the potential hacking, see John Anthony&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=d1046a2bda&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Budget 2019: &#8216;They&#8217;ll remember it as the budget that got hacked&#8217;</a>.</p>
<p>Despite some tech specialists believing that a sophisticated hack has occurred, one expert believes a software application might have simply found the material on the Treasury website: &#8220;Kiwi cyber security consultancy Darkscope technical director Joerg Buss said a likely scenario was that someone used a &#8216;spider or crawler&#8217; program to find hidden content in the Treasury website. Such software may have uncovered Budget 2019 files which had not been protected properly, he said.&#8221;</p>
<p>It could also be as simple as using Google to search for the material, which is covered by Juha Saarinen in his article, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7a27c10082&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Conspiracy or cock-up? Strong evidence Treasury published Budget accidentally – rather than a hack</a>. He says that &#8220;screenshots of the results from a Google search for &#8216;estimates of appropriation 2019/2020&#8217; are circulating on Twitter suggest that the data was published accidentally.&#8221;</p>
<p>Of course, the fact that Treasury has called in the Police would suggest that the government department believes that something much more sinister or malevolent has occurred. However, care needs to be taken in reading too much into this – especially since the Police haven&#8217;t even confirmed that they have agreed to investigate, except to say that they are assessing Treasury&#8217;s request.</p>
<p>Furthermore, whenever governments and officials call in the police or make claims that criminal actions have occurred in the political sphere, we should always be very sceptical. It&#8217;s the oldest trick in the bureaucratic book – to divert attention or to impugn an opponent with charges that they are mixed up in criminal activity. That&#8217;s not necessarily the case over the controversial budget leaks – it&#8217;s still far too early to tell what has happened.</p>
<p>This is certainly the argument made today by leftwing blogger No Right Turn, who suggests that government officials have a tendency, when they&#8217;ve made mistakes, to try to point the finger elsewhere, often using rather draconian measures to do so – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=2a4a8d8605&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Treasury, &#8220;hacking&#8221;, and incentives</a>.</p>
<p>Here&#8217;s his main point about how politicians and officials are inclined to bring the police into politics: &#8220;Unfortunately the natural instincts of power in New Zealand are to double down rather than admit a mistake, and to call in the police when embarrassed – just look at the tea tape, or Dirty Politics. With those, we saw police raiding newsrooms and journalist&#8217;s homes. I&#8217;m wondering if we&#8217;re going to see police raiding the opposition this time. Which would be highly damaging to our democracy.&#8221;</p>
<p>The blogger says that &#8220;the bureaucratic incentive towards arse-covering and blame-avoidance pushes that to be reclassified as nefarious &#8216;hacking&#8217;, and that incentive gets stronger the higher up the chain (and the further away from IT knowledge) you get.&#8221;</p>
<p>Here&#8217;s his own explanation for the release of the information: &#8220;The most likely scenario is that Treasury f**ked up and left them lying around on their web-server for anyone to read, and National or one of its proxies noticed this and exploited it. Accessing unprotected data on a public web-server isn&#8217;t &#8216;hacking&#8217; in any sense of the word – it&#8217;s just browsing.&#8221;</p>
<p>The onus is therefore on the Treasury to be much more transparent about what has happened writes Danyl Mclauchlan, saying a &#8220;brief technical explanation about what the &#8216;hack&#8217; amounted to would be a lot more useful than all the bluster and nebulous waffle we&#8217;ve heard so far&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=c8c5337adc&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Budget hacking scandal: About time Treasury told us what actually happened</a>.</p>
<p>Mclauchlan says that if it turns out that the leak has simply come from information on the Treasury website, &#8220;then we&#8217;ll be talking about the resignation of the Treasury Secretary, rather than National Party leader.&#8221;</p>
<p>The No Right Turn blogger doesn&#8217;t see the Government delivering such transparency any time soon: &#8220;neither Treasury nor their Minister has any interest in that (Ministers are rarely interested in incompetence in their own agencies, because it makes them look bad for allowing it). As for us, the public, we&#8217;re the loser, stuck with an incompetent, arse-covering public agency which has just failed on one of its most important tasks&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=1bc4b3ad95&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Treasury owes us answers</a>.</p>
<p>He argues that the decision to go to the Police means that Treasury can now sidestep such accountability: &#8220;conveniently, by referring the matter to the police Treasury has ensured that they can never do that. It might prejudice the police investigation, you see. OIA requests can be refused to avoid prejudice to the maintenance of the law, and anyone who actually tells anyone anything can be prosecuted. Accountability of course goes out the window&#8221;.</p>
<p>That doesn&#8217;t get National off the hook, however, if the party has done something illegal in the way they have procured or used the Budget information. One lawyer who knows a lot about hacks is Steven Price, and he argues that the release by National of the information was not in &#8220;the public interest&#8221;, and that it appears to have &#8220;broken the law relating to Breach of Confidence&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=e918238eb2&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Budget leak: Nats&#8217; behaviour &#8220;entirely appropriate&#8221;?</a></p>
<p>Price says that he is &#8220;irritated at the sanctimoniousness of Simon Bridges&#8217; denial that the Nats had done &#8216;anything approaching&#8217; illegality.&#8221; He does admit however, that if National have obtained the Budget information &#8220;through some area of Treasury&#8217;s (or some other government) website that was technically publicly accessible, then that would at least raise arguments that it wasn&#8217;t confidential in the first place, because it was in the public domain.&#8221;</p>
<p>Herald political editor Audrey Young is also less than impressed with how Bridges has dealt with the matter today, saying: &#8220;Simon Bridges needed to do two things today when he fronted the news media about allegations of hacking Treasury and he did neither. He needed to say, at least in general terms, how he received the leak of Budget of documents. And he needed to say he had contacted the police to offer them any assistance they needed in their investigation&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=971d3b71b3&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Simon Bridges needed to do two things today and he did neither</a>.</p>
<p>But for another view on the politics of it all, and an explanation of why Bridges&#8217; manoeuvres have been smart, see Brigitte Morten&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=d787b5a3e1&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">National plays strong hand over politics jackpot</a>. She argues that it&#8217;s in the public interest for National to be able to dispute the Government&#8217;s narrative over Budget spending, and to be able to point out the &#8220;lower than expected spending&#8221; in areas such as health &#8220;that the government doesn&#8217;t want you to reflect on.&#8221;</p>
<p>Finally, for a recent minor – but extremely colourful – Treasury controversy, involving the use of a transformative wellbeing experiment for staff, see Danyl Mclauchlan&#8217;s must-read investigation: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=34ba2cdbc3&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Peace, Rest and the Monkey Emoji Moon: playing Heartwork cards at Treasury</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bryce Edwards&#8217; Political Roundup: Christchurch Calling: the clampdown on social media</title>
		<link>https://eveningreport.nz/2019/05/16/bryce-edwards-political-roundup-christchurch-calling-the-clampdown-on-social-media/</link>
		
		<dc:creator><![CDATA[Bryce Edwards]]></dc:creator>
		<pubDate>Thu, 16 May 2019 05:05:11 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Bryce Edwards]]></category>
		<category><![CDATA[Critical Politics]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Cyber Terrorism]]></category>
		<category><![CDATA[Cyber-censorship]]></category>
		<category><![CDATA[Cyber-crime laws]]></category>
		<category><![CDATA[cyberabuse]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Digital challenges]]></category>
		<category><![CDATA[Digital Media]]></category>
		<category><![CDATA[Digital policy]]></category>
		<category><![CDATA[Editor's Picks]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[internet censorship]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Law and order]]></category>
		<category><![CDATA[Law enforcement]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Media Intelligence]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[News Media]]></category>
		<category><![CDATA[NZ Politics]]></category>
		<category><![CDATA[Policy development]]></category>
		<category><![CDATA[Political Integrity]]></category>
		<category><![CDATA[Political Transition]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[social change]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Terrorist groups]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=23898</guid>

					<description><![CDATA[The world is changing fast, with digital technological innovation that is both liberating and disturbing. The threats and opportunities this presents requires a massive debate, and intervention, to ensure such changes are as healthy as possible for humanity. The online dimension of the Christchurch terrorist attacks is now provoking a sea change in attitudes towards ]]></description>
										<content:encoded><![CDATA[<figure id="attachment_13636" aria-describedby="caption-attachment-13636" style="width: 150px" class="wp-caption alignleft"><a href="https://eveningreport.nz/2019/04/28/bryce-edwards-political-roundup-simon-bridges-destabilised-leadership/bryce-edwards-1-2/" rel="attachment wp-att-13636"><img loading="lazy" decoding="async" class="size-thumbnail wp-image-13636" src="https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1-150x150.jpeg" alt="" width="150" height="150" srcset="https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1-150x150.jpeg 150w, https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1-300x300.jpeg 300w, https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1-65x65.jpeg 65w, https://eveningreport.nz/wp-content/uploads/2016/11/Bryce-Edwards-1-1.jpeg 400w" sizes="auto, (max-width: 150px) 100vw, 150px" /></a><figcaption id="caption-attachment-13636" class="wp-caption-text">Dr Bryce Edwards</figcaption></figure>
<p><strong>The world is changing fast, with digital technological innovation that is both liberating and disturbing. The threats and opportunities this presents requires a massive debate, and intervention, to ensure such changes are as healthy as possible for humanity. The online dimension of the Christchurch terrorist attacks is now provoking a sea change in attitudes towards social media.</strong></p>
<p><strong>Around the world</strong> we are now seeing attempts to rein in the tech giants with government regulations. There are blunt questions being asked about whether the likes of Facebook are &#8220;monetising hate&#8221;, and whether the dream of social media enhancing democracy and social connectedness is over.</p>
<p>Prime Minister Jacinda Ardern&#8217;s Christchurch Call to Action campaign is currently at the most visible end of this new momentum, and commentators have declared her trip to Paris a success. For example, this afternoon Henry Cooke has concluded:<a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=562efecc93&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer"> Jacinda Ardern&#8217;s big day in Paris ends with her getting what she wanted</a>.</p>
<p>Likewise, Gordon Campbell is impressed with how the final Paris manifesto has come together, apparently managing to satisfy all sides, including Facebook – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7b14bb0c56&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">On the Christchurch Call</a>.</p>
<p>But the campaign isn&#8217;t over yet. According to Kelsey Munro, a research fellow at Australia&#8217;s Lowy Institute, Ardern&#8217;s bid is still a difficult one – see:<a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=6fdfe1a361&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer"> Christchurch Call: Jacinda Ardern&#8217;s Paris pitch a sign of tech giants&#8217; power</a>.</p>
<p>Munro points out that attempts to regulate social media so far, have been fraught and dangerous: &#8220;Many nations around the world have concluded that the public sphere must reassert a regulatory role; the problem is how to do it within reasonable limits. No one wants anything resembling the Chinese model. Australia&#8217;s &#8216;knee-jerk&#8217; reaction has been widely criticised by the tech industry and lawyers as rushed and ill-defined.&#8221;</p>
<p>Clearly Ardern has been keen to keep away from some of the issues around free speech that are brought up by government regulation, as I explained in my previous column – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=0ecfe95ea9&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Ardern&#8217;s &#8220;Christchurch Call&#8221; might not be so simple</a>.</p>
<p>So is her campaign going to work? There are all sorts of risks with this sort of attempt at regulation. And this is best dealt with in Henry Cooke&#8217;s article, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=21d4a17509&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">The risks Jacinda Ardern faces with her &#8216;Christchurch Call&#8217; in Paris</a>. He outlines three broad threats: 1) Over-reach, 2) Under-reach, 3) Being used by Macron to launder his image.</p>
<p>In terms of those first two dangers, the Christchurch Call might end up being too strong or too weak. The third point is the idea that in collaborating so closely with the French President and other world leaders, Ardern is naively being exploited for their own electoral opportunism. Cooke suggests that Ardern might need to &#8220;make her disagreement with these other leaders clear&#8221;.</p>
<p>This is also the view of Newstalk ZB&#8217;s Barry Soper: &#8220;What is French President Emmanuel Macron playing at? The answer&#8217;s pretty obvious, he&#8217;s trying to boost his flagging popularity at home while at the same time trying to establish himself as a world leader on cleaning up the internet&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=a1b235e16d&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Jacinda Ardern being used by Emmanuel Macron to boost his image</a>.</p>
<p>Soper suggests that Macron has been rather disingenuous in his role: &#8220;If you needed any convincing that she&#8217;s being used, get a load of what happened as she was packing her designer bags for the French capital. Macron releases a 33-page report he&#8217;d commissioned&#8230; Why he couldn&#8217;t delay the release until this week&#8217;s summit is an insult to those attending. And what&#8217;s more, the investigation was only halfway through but Macron decided to make a song and dance about how well France is doing.&#8221;</p>
<p>The bigger problem is that Macron has a terrible record in terms of civil liberties, and is clearly no friend of free speech, which could taint the ongoing campaign to regulate social media. This is all very well explained by leftwing journalist Branko Marcetic who puts forward &#8220;a brief review of what Macron&#8217;s done while in power&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=1527e98279&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Jacinda Ardern must not let Emmanuel Macron co-opt the Christchurch Call</a>.</p>
<p>Marcetic then asks whether New Zealanders should be comfortable with such an alliance: &#8220;This is the man Ardern is teaming up with to figure out a way to regulate online spaces. Concerns over this shouldn&#8217;t be limited to the New Zealand right – with Macron at the helm, there are legitimate worries the outcome could threaten free speech, including for that of the liberals and left that are backing such measures right now.&#8221;</p>
<p>He concludes: &#8220;Ardern should be careful that Macron and any other embattled leaders in the G7 don&#8217;t use this meeting as an opportunity to push measures that harm not just journalism, but all of our civil liberties. But more importantly, the New Zealand public needs to hold her to account and make sure she doesn&#8217;t.&#8221;</p>
<p>And some are worried that the clampdown will inevitably intrude on the traditional media. Barry Soper criticises Ardern for &#8220;trying to reign in the mainstream media&#8217;s coverage of events to ensure it&#8217;s not gratuitous, and that for all of us should be worry. It&#8217;s not for the politicians to dictate how events should be covered&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=b3ba21eaeb&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">The media here is generally self regulatory</a>.</p>
<p>It&#8217;s clear that the task of social media regulation isn&#8217;t a simple one. And one of the best outlines of the pitfalls and best practices that Ardern and co should keep in mind can found in Dan Jerker B. Svantesson&#8217;s article, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=58ca9fd796&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">It&#8217;s vital we clamp down on online terrorism. But is Ardern&#8217;s &#8216;Christchurch Call&#8217; the answer?</a></p>
<p>He cautions against the &#8220;risk of hasty, excessive and uncoordinated responses&#8221; to social media problems and suggests that we are currently seeing a rush of politicians who all want to gain political capital from coming up with fast answers. He says &#8220;as part of this we must avoid hasty &#8216;solutions&#8217; that will only mask the issues in the long term, and potentially cause other problems such as excessive blocking of internet content.&#8221;</p>
<p>Svantesson&#8217;s own list of requirements for new regulations are the following: &#8220;Effective legal regulation of the internet must be clear, proportional (balanced for all involved), accountable (able to be monitored and checked) and offer procedural guarantees (open to appeals).&#8221;</p>
<p>Similarly, Jordan Carter and Konstantinos Komaitis, of Internet NZ and the Internet Society, have put forward their own suggestions of what needs to underpin any new rules and laws – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=0ca2f60fd4&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">How to regulate the internet without shackling its creativity</a>.</p>
<p>Former Prime Minister Helen Clark has also jumped into the debate this week with the launch of her own Foundation think tank report, titled &#8220;Anti-social Media&#8221;. This calls for a new body to be set up to regulate social media in this country in the same way that the New Zealand Media Council and Broadcasting Standards Authority does with traditional media. For an in-depth discussion of the report, see Thomas Coughlan&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=e34414356c&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">How to regulate social media</a>.</p>
<p>Clark has explained the thinking behind this, and how it&#8217;s partly based on her own personal experience: &#8220;What I&#8217;m concerned about is that the rising level of rhetoric on social media from people who think they can get away with just about anything&#8230; And let&#8217;s face it, they can. I have regularly reported very hateful content, and very often you just get these reports dismissed. So that&#8217;s why you now need what this report recommends, which is the statutory duty to self-regulate, and then you need the regulator overseeing that&#8221; – see 1News&#8217; <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=35619d7c00&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Changing hate speech laws would &#8216;not necessarily&#8217; have prevented Christchurch attacks – Helen Clark</a>.</p>
<p>For more on this, as well as other debates about regulation of social media in New Zealand, and what sort of agreement was expected from the Paris meetings, see Derek Cheng&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=e9d062adfc&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Christchurch Call summit: New rules must leave nowhere to hide</a>. In terms of the Paris agreement, he notes that &#8220;whether it will have any teeth will be a key issue, given it will be a voluntary framework.&#8221;</p>
<p>A new survey out shows that there&#8217;s a strong demand amongst New Zealanders for this problem to be sorted out: &#8220;More than half of New Zealanders want livestreaming stopped until platforms work out a way to immediately remove violent or other harmful content, a survey indicates. The online survey of 1134 adults carried out in the second half of April, found 54 per cent of those questioned wanted a halt to livestreaming in the meantime. In contrast, 29 per cent thought platforms should be given time to sort out a solution&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7c9a068c0b&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Most Kiwis want livestreaming halted until violent content can be curbed: survey</a>.</p>
<p>Much of the debate about the problems of online extremism and regulation comes back to The Matrix movie&#8217;s concept of being &#8220;red-pilled&#8221;, which is explained in today&#8217;s Christchurch Press editorial: &#8220;To be red-pilled is to have the shackles of delusion removed and to see things as they really are&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=140f3de07c&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Cleaning up the dark corners of the internet</a>. But if this sounds like a positive development, then for a bigger explanation of the problem, see Henry Cooke&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7c5febf360&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Christchurch Call could lead to work on &#8216;red-pilling&#8217; of online radicalisation</a>.</p>
<p>Despite the difficulties involved, there&#8217;s no doubt that the tide has turned, and there is now a significant public appetite for some sort of action to be taken that might deal with the tech giants. After all, their reach affects everything in society – including democracy and politics.</p>
<p>This is a point well made in a report released this week, &#8220;Digital Threats to Democracy&#8221;, which suggests that the way New Zealanders are interacting with information online &#8220;can lead to the rapid spread of incorrect information and hinder the discussion and debate of issues of public policy&#8221; – see Brittany Keogh&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=d4663c2a4b&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Social media influences New Zealanders&#8217; opinions on politics and hurts democracy, study says</a>.</p>
<p>Finally, there&#8217;s plenty of other disturbing evidence of the brave new world we are moving into. For one of the best recent accounts of this, see Danyl Mclauchlan&#8217;s book review, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=3d1861c735&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Big Google is watching you</a>. Looking at an important new book by Shoshana Zuboff, a professor of social psychology at Harvard Business School, called &#8220;The Age of Surveillance Capitalism: The Fight for the Future at the New Frontier of Power&#8221;, Mclauchlan explains why he feels so uncomfortable at the supermarket.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bryce Edwards&#8217; Political Roundup: Will the Government fix spying in the public service?</title>
		<link>https://eveningreport.nz/2019/01/17/bryce-edwards-political-roundup-will-the-government-fix-spying-in-the-public-service/</link>
		
		<dc:creator><![CDATA[Bryce Edwards]]></dc:creator>
		<pubDate>Thu, 17 Jan 2019 04:43:39 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Analysis Assessment]]></category>
		<category><![CDATA[Bryce Edwards]]></category>
		<category><![CDATA[Critical Politics]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data mining]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Digital activism]]></category>
		<category><![CDATA[Digital data]]></category>
		<category><![CDATA[Digital policy]]></category>
		<category><![CDATA[Editor's Picks]]></category>
		<category><![CDATA[GCSB]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Intelligence agencies]]></category>
		<category><![CDATA[Labour]]></category>
		<category><![CDATA[Labour Party]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Law enforcement]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Legal issues]]></category>
		<category><![CDATA[Legislation]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Media Intelligence]]></category>
		<category><![CDATA[MIL Syndication]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[New Zealand Government Communications Security Bureau]]></category>
		<category><![CDATA[New Zealand Security Intelligence Service]]></category>
		<category><![CDATA[News Media]]></category>
		<category><![CDATA[NZ Politics]]></category>
		<category><![CDATA[Political freedom]]></category>
		<category><![CDATA[Political Integrity]]></category>
		<category><![CDATA[political protest]]></category>
		<category><![CDATA[Political rights]]></category>
		<category><![CDATA[Political Stability]]></category>
		<category><![CDATA[Political Transition]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Secret agents]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/?p=20016</guid>

					<description><![CDATA[Political Roundup: Will the Government fix spying in the public service? by Dr Bryce Edwards The week before Christmas was dominated by what may actually have been the most important political issue of the year in New Zealand – revelations that government agencies have spied on New Zealanders through the use of private investigators. The ]]></description>
										<content:encoded><![CDATA[<p class="null"><strong>Political Roundup: Will the Government fix spying in the public service?</strong></p>
<p>by Dr Bryce Edwards</p>
<p><strong>The week before Christmas was dominated by what may actually have been the most important political issue of the year in New Zealand – revelations that government agencies have spied on New Zealanders through the use of private investigators. The matter ended up being somewhat buried in the end-of-year chaos, and perhaps conveniently forgotten about by politicians with an interest in the issue remaining unresolved.</strong></p>
<p><a href="https://eveningreport.nz/wp-content/uploads/2019/01/SecurityHacker.jpg"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-20017" src="https://eveningreport.nz/wp-content/uploads/2019/01/SecurityHacker.jpg" alt="" width="1000" height="450" srcset="https://eveningreport.nz/wp-content/uploads/2019/01/SecurityHacker.jpg 1000w, https://eveningreport.nz/wp-content/uploads/2019/01/SecurityHacker-300x135.jpg 300w, https://eveningreport.nz/wp-content/uploads/2019/01/SecurityHacker-768x346.jpg 768w, https://eveningreport.nz/wp-content/uploads/2019/01/SecurityHacker-696x313.jpg 696w, https://eveningreport.nz/wp-content/uploads/2019/01/SecurityHacker-933x420.jpg 933w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></a></p>
<p><strong>Yet the story isn&#8217;t going away.</strong> Today, the Herald published revelations about how the private investigations firm Thompson &amp; Clark was previously employed by government-owned Southern Response insurance to review Official Information Act answers about the use of the private investigations firm itself – see Lucy Bennett&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=b49ea8cec7&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Megan Woods seeks answers on Southern Response&#8217;s use of private investigators</a>.</p>
<p>Here&#8217;s the key part of the story: &#8220;In January 2017, when Woods was the opposition spokeswoman on the Christchurch quake recovery, Thompson &amp; Clark Investigations Ltd (TCIL) invoiced Southern Response $2070 for reviewing a response to an Official Information Act request from the Labour Party research unit on its use of TCIL.&#8221;</p>
<p>The article reports on how &#8220;TCIL also appears to advise Southern Response on how to circumvent public scrutiny.&#8221; For example, Thompson &amp; Clark gave the following advice to Southern Response&#8217;s chief executive: &#8220;to get around disclosure, privacy and OIA issues, we normally set up a discreet email address for you – in Gmail or similar &#8230; do you want us to set up a discreet email account for you – or do you want to?&#8221;</p>
<p><strong>The original &#8220;explosive&#8221; SSC report</strong></p>
<p>Despite the State Services Commission report being released during the busy period just prior to Christmas – leading to what some see as a lack of media coverage and scrutiny of the issues – there have been some excellent articles and columns published about it.</p>
<p>Andrea Vance produced some of the best coverage of the report and the aftermath. Her first report, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=d1f6f514c4&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Security firm spied on politicians, activists and earthquake victims</a>, detailed the full extent of what had been uncovered by the report into government agencies using private investigators. Overall, she said that the &#8220;explosive report details a slew of damning revelations&#8221;.</p>
<p>Vance followed this up with an in-depth article, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=96cf7940a2&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Public service bosses ignored warnings about Thompson &amp; Clark for years</a>, which revealed that &#8220;for a decade public service bosses ignored the warnings about Thompson &amp; Clark. Their tentacles were everywhere. Dozens of ministries and agencies used their services – and yet no-one in the upper echelons of the public service questioned their reach or influence.&#8221;</p>
<p>According to Vance, &#8220;officials became drunk on the power of the information offered up by security firms like Thompson &amp; Clark. It allowed them to keep tabs on their critics and stave off any reputational damage.&#8221; She also argues that &#8220;A cavalier attitude to personal and sensitive information, and a troubling disregard for the democratic right to protest, was allowed to flourish within the public service over 15 years and successive governments.&#8221;</p>
<p>Hamish Rutherford produced some excellent analysis, explaining: &#8220;In an age where the use of contractors is already under scrutiny, a string of government agencies have effectively outsourced snooping, in some cases for highly questionable reasons. In some cases this was done with a lack of clear contracts, creating a fertile atmosphere for mission creep&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=820dd50840&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Use of private investigators exposes carelessness about role of the government</a>.</p>
<p>Rutherford writes about how remarkable it is that public servants weren&#8217;t aware (according to the report) that what was going on was unacceptable. He therefore concludes: &#8220;we are reading about public servants who appeared to be seduced by private investigators, who decided to make their job easier without considering the implications for democratic rights, or the need to remain neutral. Weeding out improper behaviour may take work, but it seems the report exposes examples where public servants need to be told what their job involves, which would be a far more fundamental problem.&#8221;</p>
<p>RNZ&#8217;s Tim Watkin also has some strong analysis of what occurred, saying that the report on the state snooping &#8220;is a bit of a page-turner and a terrifying read for anyone who cares about the integrity of the public sector&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=655495f3e8&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Heart of Darkness in the public sector</a>.</p>
<p>According to Watkin, the situation is perplexing, given the risk-averse nature of the public service: &#8220;My concern is what this says about the culture at the heart of our public service. How did leaders who are by the very definition of their roles meant to be servants of the public decide that this level of covert surveillance was a good idea? Government agencies are typically so risk averse these days that they have multiple managers signing off press statements and an inability to make a decision on which pencils or toilet paper to buy without first clearing it with the minister&#8217;s office. Yet they are willing to subject those &#8216;ordinary New Zealanders&#8221; to secret surveillance.&#8221;</p>
<p>Possibly, Watkin says it&#8217;s the very risk-averse nature of the current public service that has caused them to be more open to snooping on citizens: &#8220;there seems to be a deep-seated sense of butt-covering and paranoia&#8221;. This is the very point made by Gordon Campbell in his blogpost, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=0c6220c60e&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">On why Thompson + Clark are just the tip of the iceberg</a>.</p>
<p>In recent years, according to Campbell, the public service has become politicised, meaning that public servants have become more sensitive to the political needs of their ministers rather than the public good. This means that snooping on citizens and protestors starts becoming sensible, and to dissent against breaches of ethics in the public service has become much more dangerous for your career.</p>
<p>Not surprisingly, some of the strongest condemnation of state snooping on citizens has come from those organisations known to be affected – especially environmental groups. Former Green co-leader, and now Greenpeace head, Russel Norman emphasises the anti-democratic nature of what has been going on: &#8220;The chilling effect of being under constant and intrusive surveillance for simply campaigning on important social issues, fundamentally corrodes what it means to live in a free and democratic society. We&#8217;ve learnt that under the previous government, no-one was safe from being spied on if they disagreed with government policy&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=3e4d9a5c20&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Rotten to the core: The chilling truth revealed by the SSC report</a>.</p>
<p>Norman concludes: &#8220;The State Services Commission (SSC) investigation may well be one of the most important examinations into the inner workings of the state that we&#8217;ve seen in New Zealand. I&#8217;d go as far as to call it our Watergate moment.&#8221;</p>
<p>If that sounds like the expected complaints of an activist, then it&#8217;s also worth reading what former United Future leader Peter Dunne had to say in his column, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=f52b8e2d23&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Only a first step in the data battle</a>.</p>
<p>Dunne explains what has occurred as being &#8220;a gross breach of that implicit covenant between the Government and its citizens&#8221;, and he raises serious questions about how much more privacy is being curtailed by government agencies. In particular: &#8220;Was any information provided, formally or informally, to the intelligence services by Thompson and Clark, and was any information gathered at the behest of the intelligence services?&#8221;</p>
<p>Newspaper editorials have also condemned what has been uncovered in the public service. The Otago Daily Times has a strongly-worded editorial about the dangers to democracy uncovered in the report: &#8220;It blasts a warning about the insidious nature of state power and the need for vigilance and protection. Those who would disregard civil liberties for what they might think is the greater good should think again. Big brother and big sister are an ever-present threat. This is even more so in the electronic age. It was first thought the internet might lead to more freedom and more opportunity for dissent. But the massive losses of privacy, the ease with which data is collected and modern data analysis all hand more potential power and surveillance ability to big business and big government&#8221; – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=f176cd0c01&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">An &#8216;affront to democracy&#8217;</a>.</p>
<p>In Christchurch, The Press has been asking important questions about what the report has revealed – see the editorial: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7e0a5013e8&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">More questions about spies and the public service</a>. Here are the concluding questions: &#8220;The public needs to know more about this scandal that is so contrary to the way we expect our public servants to behave on our behalf. The public wants to know who approved of this surveillance, why it was considered necessary in a democracy and, perhaps most important of all, how much was really known about it by the ministers in charge.&#8221;</p>
<p><strong>Will anything actually be done about the spying scandal?</strong></p>
<p>The biggest risk to arise out of the controversial investigation into government agencies&#8217; misuse of spying on citizens is that nothing further will now occur. So despite new stories being published about the state surveillance, there&#8217;s a danger that we are coming towards the end of the scandal, with no significant reform being offered to correct the problems.</p>
<p>Although the Thompson &amp; Clark firm has been discredited by the scandal, many are arguing that they are not actually the real problem. For example, Andrea Vance says: &#8220;although they took advantage, Thompson &amp; Clark aren&#8217;t responsible for public service culture and the undermining of democratic rights. That lies with Peter Hughes. For public confidence to be fully restored, the public service must demonstrate accountability and accept culpability, starting from the top down.&#8221;</p>
<p>Perhaps it&#8217;s time for a proper official and independent commission of inquiry into the spying problems in the public service. Security analyst Paul Buchanan has been arguing for this. And Gordon Campbell agrees: &#8220;given that the Thompson+ Clark problem is a by-product of the politicisation of the public service, security analyst Paul Buchanan is dead right in calling for a public inquiry. Only a wide-ranging investigation can address the attitudinal issues and power relationships between ministerial staff and public servants, of which Thompson + Clark are merely one of the end results.&#8221;</p>
<p>Tim Watkin has also argued that more needs to happen: &#8220;The proper response to this report is not a few hours of tut-tuting, the Prime Minister expressing formulaic concern that the spying was &#8220;disturbing&#8221; and the symbolic resignation of a single chair. No, the proper response is a change to the public sector culture. So who will lead that?&#8221;</p>
<p>Long-time political activist Murray Horton also proposes an inquiry – see: <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=ac31cbed0e&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Thompson &amp; Clark just tip of spyberg. Let&#8217;s have an inquiry into whole covert world of state spying</a>. Horton explains the significance of the latest changes in state surveillance of citizens, saying that there&#8217;s been two major changes: contracting the spying out (perhaps deliberately in order to escape rules), and expanding the targets beyond just activists.</p>
<p>Other activists – especially those affected by the state spying – put forward proposals for reform in Jessie Chiang&#8217;s article, <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=f414074b71&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Environmental groups call for change after security firm revelations</a>. For example, Russel Norman calls for prosecutions of those involved, and for the Ministry of Business, Innovation, and Employment to be broken up. And Kevin Hague from Forest and Bird says: &#8220;I&#8217;m encouraging state services to go back to [learning] how to operate as a state service&#8230; and your obligations to the public and not just to the government of the day&#8221;.</p>
<p>For more thorough reform suggestions, also see blogger No Right Turn&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=7878316f37&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">A private Stasi</a>. He says &#8220;Businesses like Thompson and Clark, whose service is explicitly anti-democratic, need to be made illegal and put out of business.&#8221;</p>
<p>Finally, there&#8217;s the issue of the breaches of rules by Crown Law when working for the Ministry of Social Development – which Andrea Vance has described as &#8220;one of the most shocking findings&#8221;. The chief executive of MSD at the time was Peter Hughes, who of course is now chief executive of the State Services Commission, and therefore in charge of the whole of the public service. There will therefore be suspicions of conflicts of interest in terms of resolving that issue, and Hughes has handed the ongoing task to his own deputy at the SSC. For the best discussion of all this, see Aaron Smale&#8217;s <a href="https://criticalpolitics.us16.list-manage.com/track/click?u=c73e3fe9e4a0d897f8fa2746e&amp;id=dcf8be88f2&amp;e=c5a5df3a97" target="_blank" rel="noopener noreferrer">Hypocrisy at the highest levels</a>.				</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NZ welcomes new Boe Pacific security plus climate declaration</title>
		<link>https://eveningreport.nz/2018/09/06/nz-welcomes-new-boe-pacific-security-plus-climate-declaration/</link>
		
		<dc:creator><![CDATA[Pacific Media Centre]]></dc:creator>
		<pubDate>Thu, 06 Sep 2018 00:02:08 +0000</pubDate>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Asia Pacific Report]]></category>
		<category><![CDATA[Boe Declaration]]></category>
		<category><![CDATA[Climate]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[MIL-OSI]]></category>
		<category><![CDATA[Nauru]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pacific Islands Forum]]></category>
		<category><![CDATA[Pacific Media Centre]]></category>
		<category><![CDATA[Pacific Region]]></category>
		<category><![CDATA[Pacific Report]]></category>
		<category><![CDATA[Pacific security]]></category>
		<category><![CDATA[PMC Reportage]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[RNZ Pacific]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Transnational crime]]></category>
		<category><![CDATA[APR]]></category>
		<guid isPermaLink="false">https://eveningreport.nz/2018/09/06/nz-welcomes-new-boe-pacific-security-plus-climate-declaration/</guid>

					<description><![CDATA[
				
				<![CDATA[]]>				]]></description>
										<content:encoded><![CDATA[<p>				<![CDATA[

<p><em>By <a href="https://www.radionz.co.nz/international/pacific-news/" rel="nofollow">RNZ Pacific</a><br /></em></p>




<p>New Zealand Prime Minister Jacinda Ardern is describing the newly signed Boe Declaration as the most significant statement on regional security by Pacific leaders in a generation.</p>




<p>“All Pacific leaders recognise the security issues we face in our region are ever-changing. The Pacific is also becoming increasingly complex and crowded,” Ardern said.</p>




<p>Ardern arrives back in New Zealand today after a one-day trip to Nauru for the Pacific Islands Forum leaders’ retreat.</p>


<a href="https://uploads.guim.co.uk/2018/09/05/1FINAL_49PIFLM_Communique_for_unofficial_release_rev.pdf" rel="nofollow"><img loading="lazy" decoding="async" class="wp-image-31573 size-full" src="https://asiapacificreport.nz/wp-content/uploads/2018/08/Forum-logo-300wide.jpg" alt="" width="300" height="169"/></a><a href="https://uploads.guim.co.uk/2018/09/05/1FINAL_49PIFLM_Communique_for_unofficial_release_rev.pdf" rel="nofollow"><strong>49th Pacific Islands Forum final communique</strong></a>


<p>She said the security declaration addresses new challenges for the region, including cybercrime and transnational crime.</p>




<p>“The prosperity of New Zealand is intrinsically linked to the security of our region, which is why this declaration is so important,” Ardern said.</p>




<p><strong>Climate change emphasis</strong><br />The declaration also places emphasis on climate change.</p>




<div class="td-a-rec td-a-rec-id-content_inlineleft td-rec-hide-on-m td-rec-hide-on-tl td-rec-hide-on-tp td-rec-hide-on-p">


<div class="c3">


<p class="c2"><small>-Partners-</small></p>


</div>


</div>




<p>“That is a new addition to the Boe Declaration. It hasn’t been present in security declarations before. But there is recognition from the members of this forum that if you are talking about threats to security climate change presents one of the most significant,” said Jacinda Ardern.</p>




<p>However, <a href="http://www.pacmediawatch.aut.ac.nz" rel="nofollow"><em>Pacific Media W</em>atch</a> reports that there was no significant response to Vanuatu’s call for the Forum to support its plan to submit the West Papua decolonisation issue to the United Nations next year.</p>




<p>The <a href="https://uploads.guim.co.uk/2018/09/05/1FINAL_49PIFLM_Communique_for_unofficial_release_rev.pdf" rel="nofollow">final communique</a> “recognised the constructive engagement by Forum countries with Indonesia with respect to elections and human rights” and called for further dialogue.</p>




<p><em>This article is republished under the Pacific Media Centre’s content partnership with Radio New Zealand.</em></p>


<img loading="lazy" decoding="async" class="size-full wp-image-31939" src="https://asiapacificreport.nz/wp-content/uploads/2018/09/Forum-leaders-2018.jpg" alt="" width="680" height="425" srcset="https://asiapacificreport.nz/wp-content/uploads/2018/09/Forum-leaders-2018.jpg 680w, https://asiapacificreport.nz/wp-content/uploads/2018/09/Forum-leaders-2018-300x188.jpg 300w, https://asiapacificreport.nz/wp-content/uploads/2018/09/Forum-leaders-2018-672x420.jpg 672w" sizes="auto, (max-width: 680px) 100vw, 680px"/>Pacific Islands Forum leaders gather for a group photo ahead of their retreat. Photo: Nauru Government

<p>Article by <a href="https://www.asiapacificreport.nz/" target="_blank" rel="nofollow noopener noreferrer">AsiaPacificReport.nz</a></p>

]]&gt;				</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
