Snowden: New Zealand Spying on Pacific Islands

Prime Minister John Key says the security services act in the interests of New Zealand. Calls, emails and social media messages were being collected from Pacific nations, the New Zealand Herald said. The data was shared with other members of the "Five Eyes" network - the US, Australia, Britain and Canada.

Snowden leaked a large cache of classified NSA documents in 2013. The documents published on Thursday reveal that New Zealand's Government Communications Security Bureau (GCSB) used its Waihopai base in the South Island to spy on allies in the region. Targets included Fiji, Papua New Guinea, the Solomon Islands, Nauru, Samoa, Vanuatu, Kiribati, New Caledonia, Tonga and French Polynesia.

The files were among those leaked by NSA whistle-blower Edward Snowden. According to US website The Intercept, which published the documents in conjunction with the New Zealand Herald, the base was running "full take" interceptions, meaning it was retaining content and metadata of all communications rather than just of specific targets.

The data collected was then available to be accessed by analysts from the US's National Security Agency (NSA) via the agency's controversial XKeyscore computer programme, revealed during the original leak in 2013, the Herald reported.
New Zealand Prime Minister John Key said the reports contained errors and false assumptions, but did not elaborate.
He said the GCSB gathered "foreign intelligence that is in the best interests of New Zealand and protecting New Zealanders".
"If I was a New Zealander and the New Zealand prime minister got up and told me we had a foreign intelligence service that wasn't gathering some foreign intelligence, I'd ask him 'what the hell are we paying the money for? And what the hell are you doing?'" New Zealand's Stuff website quoted him as saying.

Andrew Little, leader of New Zealand's opposition Labour party, said that he accepted the need for security agencies to protect the country but was "stunned at the breadth of the information that's been collected".
Speaking to Radio New Zealand, Mr Little said GCSB seemed to be "hoovering" up information and "supplying it to the United States".

Ein News:     Huffpo:      MatthewAid   

 

« The CIA Has Been Hacking Your iPhone
The US State Department Email System Breached »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Cyberint

Cyberint

Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Management to deliver maximum protection from external threats.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

GoVanguard

GoVanguard

GoVanguard is an boutique information security team delivering robust, business-focused information security solutions.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.