RSS
 Add News     Print  
Article List
Hackers attack NZ premier’s website ‘Unlikely US helped spy on reporter’

WELLINGTON, July 30, (Agencies): The “hacktivist” group Anonymous on Tuesday briefly crashed New Zealand Prime Minister John Key’s website in protest at plans to allow the country’s intelligence agency to spy on local residents. A group identifying itself as Anonymous NZ posted a clip on YouTube saying it had attacked Key’s website www.johnkey.co.nz and 12 others linked to the ruling National Party to show its opposition to “a despicable piece of legislation”. “John Key make no mistake the majority of New Zealanders oppose this bill,” it said. “Due to your own arrogance and your unwillingness to listen to the people we have decided to take direct action.” Key’s website was operating normally by Tuesday afternoon and the prime minister condemned the hackers. “(It’s) pretty juvenile behaviour in my view,” he told Radio New Zealand. “These people are obviously doing something that’s both illegal and inappropriate. They’re trying to make their own political point, but their point’s wrong.”


Barred
New Zealand’s intelligence service, the Government Communications Security Bureau (GCSB), is currently barred from spying on New Zealand citizens or residents.
Key argues the restriction should be removed so it can cooperate more closely with agencies such as the police and military in an increasingly complex cyber-security environment.
The bill is currently before parliament and expected to pass by a single vote, although groups ranging from the Law Society to Internet giants Facebook and Google have raised concerns about the proposal.
One of the strongest opponents is Megaupload founder Kim Dotcom, who received an apology from Key last year after revelations the GCSB illegally spied on him before armed police arrested him for alleged online piracy.
The Auckland-based German national took part in a street protest against the bill at the weekend but urged hackers not to attack the government, saying it was counterproductive.
“Dear Anonymous NZ, hacking National Party websites is just giving John Key a new excuse to pass the GCSB bill (cybercrime). Please stop it,” he tweeted.
A US official said Monday that the National Security Agency did not monitor phone conversations between a New Zealand journalist and his Afghan sources, following claims by the journalist that his reporting was monitored by the US intelligence programs revealed by NSA leaker Edward Snowden on behalf of New Zealand’s military.


Officials in the intelligence community and experts said if any surveillance was done, it was more likely that his phone calls were caught up by standard military intelligence monitoring of enemy communications in war zones.
The Obama administration brushed off new allegations of NSA surveillance overreach, this time focusing on freelance reporter Jon Stephenson, who was in Kabul, Afghanistan, working for American news service McClatchy and other media outlets when his phone records were reportedly seized.
It was the latest revelation, if greeted with less outrage, in the continuing debate over government snooping since NSA leaker Edward Snowden in June revealed two top secret US programs that monitor millions of Americans’ telephone and Internet communications each day.
In a short statement to The Associated Press, the US government official said NSA did not target Stephenson or collect his phone records. That could signal that surveillance of Stephenson’s calls was run by the Defense Intelligence Agency, which oversees war zone intelligence missions, according to a US intelligence official. Both officials spoke on condition of anonymity to discuss the secret program.
On Sunday, the Star-Times newspaper of New Zealand reported that the New Zealand military conspired with US spy agencies to monitor Stephenson’s communications with sources in Afghanistan. New Zealand officials denied the new allegations.


But experts and former intelligence officials said if Stephenson’s phone records were collected, they would have been gathered in a military intelligence sweep that is shared among allies — and has for years monitored most communications in war zones, where there is little expectation of privacy in the hunt for enemy combatants and suspected terrorists.
New Zealand withdrew its small contingent of roughly 150 troops from Afghanistan earlier this year. But the country’s Government Communications Security Bureau, which is New Zealand’s NSA equivalent, would have been included in an allied intelligence gathering and reporting system in Afghanistan, said Canadian intelligence expert Wesley Wark.
Wark said the New Zealand security bureau also would have been able to access a secret system once code-named “Stoneghost,” which allows it to share and draw from intelligence reports compiled from four other counties — the US, Britain, Canada, and Australia. Stoneghost was one portal through which the so-called Five Eyes allies, the US, U.K, Canada, Australia and New Zealand, shared data.
“It is entirely possible that New Zealand intelligence ran its own surveillance operation against Stephenson on the basis of access to a common allied intelligence pool in Afghanistan without necessarily requiring any direct US input or involvement,” said Wark, a national security professor at University of Ottawa.


He added: “It would not have been beyond the means of a small New Zealand contingent to do this on their own.”
New Zealand Prime Minister John Key said Monday it’s possible that reporters could get caught in surveillance nets when the US spies on enemy combatants. But generally, those nations do not spy on each other’s citizens and residents.
The NSA would not spy on citizens of another ally in that group, especially if it were to circumvent that ally’s own espionage laws, said former Michigan congressman and House intelligence committee chairman Pete Hoekstra.
What’s picked up in war zones is considered fair game, however, and such surveillance has been a priority in Afghanistan as American troops prepare to withdraw in 2014. NATO and US officials depend on the intelligence systems to detect and disrupt al-Qaeda and the Taleban plots against the Afghan government and foreign forces.


American troops who specialize in intelligence gathering routinely tap directly into local cellphone company servers, or conduct technical surveillance though a number of electronic listening devices that are placed on jets, drones, ships and satellites, according to a current US military official and a former one. Both spoke on condition of anonymity because they were not authorized to discuss the classified surveillance program.
Each branch of the US military has its own signals intelligence unit, including Task Force Odin, an Army aviation battalion created in Iraq to spot bomb makers, planters and plotters. The Odin unit’s skills and some of its personnel were moved to Afghanistan — but likely under a new name — after it helped military counterterrorism units to track al-Qaeda and other extremists.
In Iraq, where the war zone monitoring was first perfected, the cellphone metadata and an unknown number of phone calls were recorded and stored, said the former US military official. When a terrorist suspect was captured or killed, their cellphones and other possessions were examined. Any phone numbers that could be retrieved were run through a US telephone database, and relevant records and phone conversations retrieved.


US troops and contractors also are told their own satellite and internet communications likely will be intercepted by their own nation’s counterintelligence personnel, and checked for possible breaches of secrecy like the release of classified information, the officials said.
While the US could legally monitor a foreign national civilian in a war zone, it would be unlikely. Wark said that it’s possible that Washington nonetheless could have targeted Stephenson, given the breadth of US information-gathering abilities. But he called that “rare,” saying the US generally would have needed to have a direct national interest in Stephenson to devote assets against him.
But if Stephenson was calling Afghans who are suspected of ties to militants, and who in turn were being monitored by US or NATO spy services, that conversation could be recorded, transcribed and distributed. Usually, names of people who are not suspected of wrongdoing are deleted, according to one former administration official, and one former intelligence official.
The same practice applies to US journalists, if they are talking to foreigners being monitored by the NSA in the US, the officials said.

  



 

Read By: 1832
Comments: 0
Rated:

Comments
You must login to add comments ...
About Us   |   RSS   |   Contact Us   |   Feedback   |   Advertise With Us