Content with status 'Current' only is displayed by default. Apply additional filters to include 'Superseded' and 'Not Current' content in your search.
Your search found 52 results
Filter search resultsStrengthening oversight of NZSIS and GCSB
PageEnsuring the agencies operate legally and properly and are held to account.Whistleblowing and protecting classified information
PageThis page discusses protected disclosures and offences for unauthorised disclosures.Cover and immunities
PageNew Zealand Security Intelligence Service (NZSIS) and Government Communications Security Bureau (GCSB) employees need to have the ability to acquire, use and maintain any identity information necessary to maintain the covert nature of their…Sharing information
PageIn order to support New Zealand’s national security, the Government Communications Security Bureau (GCSB) andNew Zealand Security Intelligence Service(NZSIS) need to access information held by public and private sector organisations and…Domestic information sharing
PageImproving information sharing between NZSIS and GCSB and others.Arrangements with foreign partners
PageThe sharing of information, technology and expertise with other countries.The National Assessments Bureau
PageThe National Assessments Bureau is New Zealand's lead agency for intelligence assessment.Case studies
PageIn this section are some examples of how the New Zealand Security Intelligence Service (NZSIS) and Government Communications Security Bureau (GCSB) have used intelligence to keep New Zealand safe from espionage, terrorist activity, and…Counter-terrorism: the role of GCSB and NZSIS
PageCounter-terrorism is an important part of the work of the New Zealand Intelligence Community.Investigating a suspected terrorist
PageThis is a declassified case study on how the New Zealand Security Intelligence Service (NZSIS) conducts a security intelligence investigation.Counter-espionage
PageEspionage is the attempt to obtain secret or confidential information by covert means.Cyber security in action
PageThe internet has enriched the lives of New Zealanders but it has also increased our vulnerability. People with malicious intent now target New Zealand from afar through the same communications infrastructure that New Zealanders, government and business…Resources
PageCabinet papers, and the Regulatory Impact Statement, for the Intelligence and Security Act 2017.New Zealand's Cyber Security Strategy 2011
Publication or ResourceIssue date:June 2011New Zealand's Cyber Security Strategy
Publication or ResourceIssue date:A refreshed New Zealand Cyber Security Strategy, accompanying Action Plan, and a National Plan to Address Cybercrime, were released on 10 December 2015 and replace New Zealand's 2011 Cyber Security Strategy.GCSB and Oversight Legislation briefing document
Publication or ResourceIssue date:GCSB and Oversight Legislation Briefing DocumentSpeech notes for New Zealand Information Security Forum: Cybersecurity: Why it matters for New Zealand
Publication or ResourceIssue date:Speech notes for New Zealand Information Security Forum: Cybersecurity: Why it matters for New Zealand 11 April 2013David Henry's review into the security of sensitive information at DPMC
Publication or ResourceIssue date:June 2006Introduction of SPECIAL HANDLING REQUIRED Endorsement
Publication or ResourceIssue date:Addition to “Security in the Government Sector” - Introduction of SPECIAL HANDLING REQUIRED Endorsement Following the 2006 external review by David Henry and subsequent consultation by the Interdepartmental Committee on Security, on 6 AMaritime Patrol Review
Publication or ResourceIssue date:February 2001