Snowden: New Zealand Spying on Pacific Islands

Prime Minister John Key says the security services act in the interests of New Zealand. Calls, emails and social media messages were being collected from Pacific nations, the New Zealand Herald said. The data was shared with other members of the "Five Eyes" network - the US, Australia, Britain and Canada.

Snowden leaked a large cache of classified NSA documents in 2013. The documents published on Thursday reveal that New Zealand's Government Communications Security Bureau (GCSB) used its Waihopai base in the South Island to spy on allies in the region. Targets included Fiji, Papua New Guinea, the Solomon Islands, Nauru, Samoa, Vanuatu, Kiribati, New Caledonia, Tonga and French Polynesia.

The files were among those leaked by NSA whistle-blower Edward Snowden. According to US website The Intercept, which published the documents in conjunction with the New Zealand Herald, the base was running "full take" interceptions, meaning it was retaining content and metadata of all communications rather than just of specific targets.

The data collected was then available to be accessed by analysts from the US's National Security Agency (NSA) via the agency's controversial XKeyscore computer programme, revealed during the original leak in 2013, the Herald reported.
New Zealand Prime Minister John Key said the reports contained errors and false assumptions, but did not elaborate.
He said the GCSB gathered "foreign intelligence that is in the best interests of New Zealand and protecting New Zealanders".
"If I was a New Zealander and the New Zealand prime minister got up and told me we had a foreign intelligence service that wasn't gathering some foreign intelligence, I'd ask him 'what the hell are we paying the money for? And what the hell are you doing?'" New Zealand's Stuff website quoted him as saying.

Andrew Little, leader of New Zealand's opposition Labour party, said that he accepted the need for security agencies to protect the country but was "stunned at the breadth of the information that's been collected".
Speaking to Radio New Zealand, Mr Little said GCSB seemed to be "hoovering" up information and "supplying it to the United States".

Ein News:     Huffpo:      MatthewAid   

 

« The CIA Has Been Hacking Your iPhone
The US State Department Email System Breached »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

Baxter Clewis Consulting

Baxter Clewis Consulting

Baxter Clewis are cyber security and compliance experts. We provide Security Consulting, IT Assurance, and Technical Security services.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

Dryad Global

Dryad Global

Dryad Global offers a comprehensive suite of maritime intelligence solutions, including a best-in-class situational awareness, planning and security system and industry-leading cyber protection tools.

Airbus Protect

Airbus Protect

Airbus Protect is an Airbus subsidiary bringing together the Company’s expertise in cybersecurity, safety and sustainability-related services.