Snowden: New Zealand Spying on Pacific Islands

Prime Minister John Key says the security services act in the interests of New Zealand. Calls, emails and social media messages were being collected from Pacific nations, the New Zealand Herald said. The data was shared with other members of the "Five Eyes" network - the US, Australia, Britain and Canada.

Snowden leaked a large cache of classified NSA documents in 2013. The documents published on Thursday reveal that New Zealand's Government Communications Security Bureau (GCSB) used its Waihopai base in the South Island to spy on allies in the region. Targets included Fiji, Papua New Guinea, the Solomon Islands, Nauru, Samoa, Vanuatu, Kiribati, New Caledonia, Tonga and French Polynesia.

The files were among those leaked by NSA whistle-blower Edward Snowden. According to US website The Intercept, which published the documents in conjunction with the New Zealand Herald, the base was running "full take" interceptions, meaning it was retaining content and metadata of all communications rather than just of specific targets.

The data collected was then available to be accessed by analysts from the US's National Security Agency (NSA) via the agency's controversial XKeyscore computer programme, revealed during the original leak in 2013, the Herald reported.
New Zealand Prime Minister John Key said the reports contained errors and false assumptions, but did not elaborate.
He said the GCSB gathered "foreign intelligence that is in the best interests of New Zealand and protecting New Zealanders".
"If I was a New Zealander and the New Zealand prime minister got up and told me we had a foreign intelligence service that wasn't gathering some foreign intelligence, I'd ask him 'what the hell are we paying the money for? And what the hell are you doing?'" New Zealand's Stuff website quoted him as saying.

Andrew Little, leader of New Zealand's opposition Labour party, said that he accepted the need for security agencies to protect the country but was "stunned at the breadth of the information that's been collected".
Speaking to Radio New Zealand, Mr Little said GCSB seemed to be "hoovering" up information and "supplying it to the United States".

Ein News:     Huffpo:      MatthewAid   

 

« The CIA Has Been Hacking Your iPhone
The US State Department Email System Breached »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Conference-Service.com

Conference-Service.com

Conference-Service.com provides a categorised calendar of conferences and events which includes Information Security.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

Hdiv Security

Hdiv Security

Hdiv Security is the first product in its class offering protection against Security Bugs and Business Logic Flaws throughout the Software Development Lifecycle (SDLC).

Turkish Accreditation Agency (TURKAK)

Turkish Accreditation Agency (TURKAK)

TURKAK is the national accreditation body for Turkey. The directory of members provides details of organisations offering certification services for ISO 27001.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

WEBGAP

WEBGAP

We are the developer of the WEBGAP browser isolation platform and a global provider of fully managed and fully hosted remote browsers.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.