Snowden: New Zealand Spying on Pacific Islands

Prime Minister John Key says the security services act in the interests of New Zealand. Calls, emails and social media messages were being collected from Pacific nations, the New Zealand Herald said. The data was shared with other members of the "Five Eyes" network - the US, Australia, Britain and Canada.

Snowden leaked a large cache of classified NSA documents in 2013. The documents published on Thursday reveal that New Zealand's Government Communications Security Bureau (GCSB) used its Waihopai base in the South Island to spy on allies in the region. Targets included Fiji, Papua New Guinea, the Solomon Islands, Nauru, Samoa, Vanuatu, Kiribati, New Caledonia, Tonga and French Polynesia.

The files were among those leaked by NSA whistle-blower Edward Snowden. According to US website The Intercept, which published the documents in conjunction with the New Zealand Herald, the base was running "full take" interceptions, meaning it was retaining content and metadata of all communications rather than just of specific targets.

The data collected was then available to be accessed by analysts from the US's National Security Agency (NSA) via the agency's controversial XKeyscore computer programme, revealed during the original leak in 2013, the Herald reported.
New Zealand Prime Minister John Key said the reports contained errors and false assumptions, but did not elaborate.
He said the GCSB gathered "foreign intelligence that is in the best interests of New Zealand and protecting New Zealanders".
"If I was a New Zealander and the New Zealand prime minister got up and told me we had a foreign intelligence service that wasn't gathering some foreign intelligence, I'd ask him 'what the hell are we paying the money for? And what the hell are you doing?'" New Zealand's Stuff website quoted him as saying.

Andrew Little, leader of New Zealand's opposition Labour party, said that he accepted the need for security agencies to protect the country but was "stunned at the breadth of the information that's been collected".
Speaking to Radio New Zealand, Mr Little said GCSB seemed to be "hoovering" up information and "supplying it to the United States".

Ein News:     Huffpo:      MatthewAid   

 

« The CIA Has Been Hacking Your iPhone
The US State Department Email System Breached »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

ProjectDiscovery

ProjectDiscovery

ProjectDiscovery is an open-source, cybersecurity company that builds a range of software for security engineers and developers.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.