Story image

GCSB welcomes Inspector-General's report on intelligence warrants

17 Dec 18

The Government Communications Security Bureau (GCSB) has welcomed the Inspector-General of Intelligence and Security’s report on how the NZ Security Intelligence Service and the GCSB use warrants to authorise information gathering activity.

The report states that an intelligence warrant can be issued in a range of situations. Activities can include surveillance, private communications interception, searches of physical places and things, seizure of communications, information and things, amongst other purposes

GCSB director-general Andrew Hampton says the GCSB has an important role in intelligence gathering that keeps New Zealanders safe, informs the government’s strategic decisions, and contributes to a stable and secure region.

The Inspector-General, Cheryl Gwyn, states that the GCSB has ‘legally compliant systems and processes’ and conducted itself appropriately. 

However there’s still work to be done around the interpretation of ‘Type 1’ and ‘Type 2’ warrants, because the GCSB and Inspector-General see things differently.

A Type 1 intelligence warrant can be issued to carry out ‘an otherwise unlawful activity for the purpose of collecting information’ about New Zealand citizens or permanent residents. Type 1 warrants are issued by the Minister Responsible for the GCSB and a Commissioner of Intelligence Warrants (a retired High Court Judge).

A Type 2 intelligence warrant authorises an otherwise unlawful activity for the purpose of collecting information about people who are not New Zealand citizens or permanent residents. Type 2 warrants are issued by the Minister responsible for the GCSB alone.

According to the Inspector-General’s report, 40 warrants have been issued this year. The NZSIS has been issued 12 Type 1 Warrants, 6 Type 2 warrants, and 3 ‘Practice’ warrants.

The GCSB has been issued 10 Type 1 Warrants, and 9 Type 2 Warrants.

No warrant applications were declined.

“Both the GCSB and the Inspector-General are still working to interpret, apply and implement the Intelligence and Security Act,” says Hampton. “Interpreting and applying any new piece of legislation is a complex process that must be carefully thought through.”

The Inspector-General also states in the report that both the GCSB and NZSIS don’t provide enough information when they apply for renewed warrants “on the value of previous agency activities against the targets”. 

“Both agencies have responded by accepting the concern, and undertaking to address this more comprehensively. In several cases since they have done so, yet there remains scope for them to be more consistent,” the report says.

Hampton says that when the law isn’t clear-cut, the GCSB relies on Crown Law for a definitive view, as all government departments must do.

“We have sought advice from Crown Law on this issue and will share it with the Inspector-General once it is ready,” comments Hampton.

“As the report notes, fully implementing the Intelligence and Security Act and developing the supporting policies, procedures, training and legal interpretations has been a significant effort,” he says.

“This work has had an impact on how quickly we have responded to the Inspector-General’s queries, but is now largely complete,” Hampton concludes.

Three things that will happen in 2019 – and one that will not
Commvault's Nigel Tozer reflects on the year that's been and the one ahead with three predictions of what will be and one that won't.
Huawei CEO goes public on CFO arrest & China security concerns
Ken Hu faced a press conference where he addressed all the elephants in the room and growing concerns around the company's future.
A10’s app delivery solution now on Azure Marketplace
With the Harmony Controller, organisations can automate deployment and operations of application services.
The pillars of ethical automation
"As the builders and users of autonomous systems, it’s important that we consider what ethical automation should look like."
Virtustream launches cloud automation and security capabilities
Virtustream Enterprise Cloud enhancements accelerate time-to-value for enterprises moving mission critical apps to the cloud.
TCS collaborates with Red Hat to build digital transformation solutions
“By leveraging TCS' technology skills to build more secure, intelligent and responsive solutions, we aim to deliver superior end-user experiences."
Twitter suspects state-sponsored ties to support forum breach
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.
How McAfee aims to curb enterprise data loss
McAfee DLP aims to help safeguard intellectual property and ensure compliance by protecting sensitive data.