{"id":55290,"date":"2015-03-16T12:00:31","date_gmt":"2015-03-16T12:00:31","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=55290"},"modified":"2015-05-05T21:25:57","modified_gmt":"2015-05-05T20:25:57","slug":"new-zealand-targets-trade-partners-hacks-computers-in-spy-operations","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/03\/new-zealand-targets-trade-partners-hacks-computers-in-spy-operations\/","title":{"rendered":"New Zealand Targets Trade Partners, Hacks Computers in Spy Operations"},"content":{"rendered":"<div id=\"attachment_55291\" style=\"width: 550px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/03\/New-Zealand-prime-minister-John-Key-Japan-prime-minister-Shinzo-Abe.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55291\" class=\"size-full wp-image-55291\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/03\/New-Zealand-prime-minister-John-Key-Japan-prime-minister-Shinzo-Abe.jpg\" alt=\"Photo of New Zealand\u2019s prime minister John Key, left, meeting with Japan\u2019s prime minister, Shinzo Abe, in 2014. (Greg Bowker\/AP)\" width=\"540\" height=\"367\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/03\/New-Zealand-prime-minister-John-Key-Japan-prime-minister-Shinzo-Abe.jpg 540w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/03\/New-Zealand-prime-minister-John-Key-Japan-prime-minister-Shinzo-Abe-300x204.jpg 300w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/a><p id=\"caption-attachment-55291\" class=\"wp-caption-text\">Photo of New Zealand\u2019s prime minister John Key, left, meeting with Japan\u2019s prime minister, Shinzo Abe, in 2014. (Greg Bowker\/AP)<\/p><\/div>\n<p><em>10 Mar 2015 &#8211; <\/em>New Zealand is conducting covert surveillance operations against some of its strongest trading partners and has obtained sophisticated malware to infect targeted computers and steal data, newly released documents reveal.<\/p>\n<p>The country\u2019s eavesdropping agency, Government Communications Security Bureau, or GCSB, is carrying out the surveillance across the Asia-Pacific region and beyond as part of its membership in the Five Eyes, a spying alliance that includes New Zealand as well as the United States, the United Kingdom, Canada, and Australia.<\/p>\n<p>The documents, <a target=\"_blank\" href=\"http:\/\/www.nzherald.co.nz\/nz\/news\/article.cfm?c_id=1&amp;objectid=11415172\" >revealed on Tuesday by the<em> New Zealand Herald<\/em><\/a> in collaboration with <em>The Intercept<\/em>, expose more details about the scope of New Zealand\u2019s involvement in the Five Eyes, and show that the agency\u2019s reach extends far beyond its <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2015\/03\/04\/new-zealand-gcsb-surveillance-waihopai-xkeyscore\/\" >previously reported eavesdropping<\/a> on at least ten small South Pacific nations and territories.<\/p>\n<p>According to secret files from the National Security Agency, obtained by <em>The Intercept<\/em> from whistleblower Edward Snowden, GCSB is targeting about 20 different nations and territories in total and sharing the intercepted data with the NSA. A top-secret document dated from April 2013 notes that the New Zealand agency \u201cprovides [the NSA with] collection on China, Japanese\/North Korean\/Vietnamese\/South American diplomatic communications, South Pacific Island nations, Pakistan, India, Iran, and Antarctica.\u201d<\/p>\n<p>Aside from eavesdropping on communications through traditional interception methods, such as by capturing signals as they are passing between satellites or phone cables, the New Zealand agency has also become directly involved in more aggressive methods of spying and cyberwar.<\/p>\n<p>The newly revealed documents show that it has obtained a malware tool that is part of a platform named WARRIORPRIDE, used by the NSA and other Five Eyes agencies to hack into computers and smartphones, infect them with a bug, and then steal data. The documents note that GCSB \u201chas a WARRIORPRIDE capability that can collect against an ASEAN target.\u201d ASEAN, or <a target=\"_blank\" href=\"http:\/\/www.asean.org\/asean\/asean-member-states\" >Association of Southeast Asian Nations<\/a>, may be a reference to New Zealand\u2019s operations targeting Vietnam.<\/p>\n<p>The surveillance being conducted by the GCSB shines light on a secret variant of New Zealand\u2019s foreign policy that contrasts with its official public foreign policy.<\/p>\n<p>Vietnam, for instance, has friendly relations with New Zealand and is a growing trading partner. The New Zealand government <a target=\"_blank\" href=\"http:\/\/www.mfat.govt.nz\/Countries\/Asia-South-and-Southeast\/Viet-Nam.php\" >describes<\/a> its relationship with Vietnam as having \u201cflourished in the last 15 years.\u201d The country poses no security or terrorist threat to New Zealand, the traditional explanation for GCSB operations given to the public. Yet its government is still on the GCSB spying list and its diplomatic communications have been eavsedropped on, likely in violation of the 1961 <a target=\"_blank\" href=\"http:\/\/legal.un.org\/ilc\/texts\/instruments\/english\/conventions\/9_1_1961.pdf\" >Vienna Convention of Diplomatic Relations<\/a>, an international treaty ratified by New Zealand that says diplomats\u2019 correspondence is \u201cinviolable.\u201d<\/p>\n<p>Other targets, such as Japan and India, are publicly lauded as close and valued New Zealand partners. The New Zealand government <a target=\"_blank\" href=\"http:\/\/www.mfat.govt.nz\/Countries\/Asia-North\/Japan.php\" >says<\/a> that Japan is \u201ca major bilateral and regional partner of New Zealand\u201d and <a target=\"_blank\" href=\"http:\/\/www.mfat.govt.nz\/Countries\/Asia-South-and-Southeast\/India.php\" >describes<\/a> having \u201ca long-standing and warm relationship\u201d with India. But each of these countries, too, is still being targeted for surveillance.<\/p>\n<p>Another operation that sits uneasily with New Zealand\u2019s official policy is GCSB\u2019s monitoring of nations working in Antarctica. New Zealand is a signatory to the Antarctic Treaty; the country\u2019s trade ministry <a target=\"_blank\" href=\"http:\/\/mfat.govt.nz\/Foreign-Relations\/Antarctica\/1-New-Zealand-and-Antarctica\/index.php\" >says<\/a> \u201cinvolvement in Antarctica offers New Zealand the opportunity to play a constructive and influential role in a region \u2026 which is managed according to principles of international cooperation.\u201d<\/p>\n<p>The Antarctic eavesdropping takes place from New Zealand\u2019s <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2015\/03\/07\/new-zealand-ironsand-waihopai-nsa-gcsb\/\" >Waihopai base<\/a>, a surveillance station that can intercept Antarctic satellite links. More than 20 nations have year-round scientific research bases in Antarctica, most of which use the same few satellite links to communicate: Intelsat, Inmarsat and Iridium phones.<\/p>\n<p>A more predictable-sounding target is Iran, which has been a major target of American and British intelligence agencies for decades. However, in public, New Zealand has adopted a different long-term foreign policy with respect to Iran than has the United States and the United Kingdom.<\/p>\n<p>Iran is a valuable export market for New Zealand agricultural produce and New Zealand has not joined in sanctions or confrontation with the Tehran government. But the GCSB has carried out secret intelligence operations, monitoring Iran presumably on behalf of the Five Eyes allies.<\/p>\n<p>Similarly, China, which is New Zealand\u2019s top export destination for goods and services, has also been targeted. In 2012, John Key launched <a target=\"_blank\" href=\"http:\/\/www.nzcta.co.nz\/chinanow-strategy\/1497\/nz-govt-launches-china-strategy\/\" >a strategy<\/a> to bolster New Zealand\u2019s relationship with China and last year he praised the \u201cthe strength of the bilateral relationship between our two countries\u201d during <a target=\"_blank\" href=\"http:\/\/www.johnkey.co.nz\/archives\/1817-Speech-to-China-Agricultural-University,-Beijing.html\" >a speech<\/a> in Beijing.<\/p>\n<p>GCSB declined to comment on the latest revelations. In a statement issued to <em>The Intercept<\/em> and the <em>New Zealand Herald<\/em> late Monday, the agency\u2019s acting director, Una Jagose, said: \u201cThe GCSB exists to protect New Zealand and New Zealanders. We have a foreign intelligence mandate. We don\u2019t comment on speculation about matters that may or may not be operational. Everything we do is explicitly authorised and subject to independent oversight.\u201d<\/p>\n<p>A spokesman for prime minister Key said the government would not respond to \u201cclaims made from documents stolen by Edward Snowden.\u201d He added: \u201cNew Zealand\u2019s intelligence agencies have been, and continue to be, a significant contributor to our national security and the security of New Zealanders at home and abroad.\u201d<\/p>\n<p>NSA spokeswoman Vanee\u2019 Vines said in a statement that the agency would not comment \u201con specific, alleged foreign intelligence activities.\u201d Vines added: \u201cThe National Security Agency works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression. NSA\u2019s activities with foreign partners comply with U.S. laws and the applicable laws under which our partners operate.\u201d<\/p>\n<p>___________________________<\/p>\n<p><em>Email the author: <a href=\"mailto:ryan.gallagher@theintercept.com\">ryan.gallagher@theintercept.com<\/a><\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2015\/03\/10\/new-zealand-gcsb-spying-trade-partners-nsa\/\" >Go to Original \u2013 firstlook.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>10 Mar 2015 &#8211; New Zealand is conducting covert surveillance operations against some of its strongest trading partners and has obtained sophisticated malware to infect targeted computers and steal data, newly released documents reveal.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-55290","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/55290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=55290"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/55290\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=55290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=55290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=55290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}