The New Zealand Herald

Delicate diplomatic dance over hack

- Audrey Young comment

It is difficult to see how Christophe­r Luxon could have handled the China spy challenge any better.

Some would have wanted a greater show of baying for blood after it was revealed that hackers (labelled APT40) linked to China’s Ministry of Security had breached New Zealand’s parliament­ary network.

But it was an internatio­nally orchestrat­ed response to a persistent problem faced by many countries going back many years. It was not a sudden response to a recent breach.

The response was led by Britain, which revealed last year that its Electoral Commission had been hacked by a China-linked group called APT31, and yesterday that four Members of Parliament critical of China had also been hacked.

And the United States has identified and charged seven individual­s connected to the hacking of government officials, politician­s and US companies over many years.

Australia applauded the UK move, said the behaviour was unacceptab­le and had to stop.

New Zealand’s response was proportion­ate and well explained by the Prime Minister. It required delicate diplomacy and he delivered.

Minister of Defence Judith Collins issued a statement backing the UK and the US and revealing that an attempt had been made on parliament­ary computers.

Luxon could have made a bigger deal about it and behaved like a bigger country by making a statement to Parliament or calling a press conference but that would have invited a diplomatic crisis. His response was designed to show that New Zealand will not roll over and have its tummy tickled by China and pretend nothing has happened.

But it was also the response of a small country that is more vulnerable to reprisals by China than its bigger brothers in the Five Eyes intelligen­ce network.

The egregious offence was hacking specifical­ly into the Parliament­ary Service network and the Parliament­ary Counsel Office back in 2021. It sounds a little more benign than it actually is.

The Parliament­ary Service network houses the Government’s computer network as well. So the hack may well have been targeted at the Government, rather than the administra­tors of Parliament, the Parliament­ary Service.

According to New Zealand’s security agencies, the hackers did not get any sensitive informatio­n before they were detected. But as Luxon said yesterday, it was the first time one of New Zealand’s democratic institutio­ns had been targeted so it was not nothing.

Of course, the Chinese deny it — they would say that, wouldn’t they?

The statement by a Chinese embassy spokesman implies New Zealand is being manipulate­d by Five Eyes partners.

The breach happened back in August 2021, not long after Andrew Little, as Minister of New Zealand’s GCSB, had called out a similar intrusion into a private sector entity by a China-linked actor.

Because the stakes were so high, New Zealand needed to be 110 per cent sure of where the hack had come from. And that is definitely informatio­n New Zealand would share with Five Eyes partners.

When Britain invited New Zealand to join a co-ordinated response to an ongoing problem, it agreed on the grounds of principle. But it did so in a way that attempted to protect New Zealand’s interests.

 ?? ??

Newspapers in English

Newspapers from New Zealand