logo
Alternative Alert System 'Mothballed' Despite Benefits

Alternative Alert System 'Mothballed' Despite Benefits

Scoop7 days ago
The founder of an alternative emergency alert framework says officials never gave it a look-in when they were setting up the under-fire Emergency Mobile Alert system.
And he reckons his was better, proving its worth during the aftermath of the Christchurch quakes.
The National Emergency Management Agency (NEMA) is investigating glitches in the current system following the magnitude 8.8 earthquake off Russia on Wednesday.
Some Kiwis say they received up to 50 alerts, while some did not receive any at all.
Matthew Nolan founded an alternative system, Readynet, which was used during the Christchurch Earthquakes and to mobilise volunteers cleaning up the Rena oil spill.
"I think that the NEMA system - which costs them the best part of $20 million - has miscued for them, and it's certainly not the first time," he told Morning Report on Friday.
"There is a record of it waking people up at night for messages that were text messages only, and as well as circumstances where people did not get the alert that they should have got."
NEMA spokesperson John Price told Checkpoint on Thursday there were many reasons for the differences.
"It could be different providers and different cell towers. There's a lot of possibilities, but this is something we're working through. We'll look into it, absolutely."
Nolan criticised the NEMA system as being "one-way" only, and unable to tell if people had actually received the message as no information was sent back.
"Whereas other systems and a better system, and yes, our system was interactive, and we could see where the messages had been received.
"So for example, you send a message out into an area where there's a big river and cell towers have been wiped out. Our system would tell you that all the people in that river have not received the message - all the people in that river valley have not received the message. You can deduct from that, that in fact, the cell phone towers are out."
He claimed the Emergency Mobile Alert system "can't target messages".
"It's a modern equivalent of a World War 2 fire siren. It alerts people that something's happening and it gives them a brief message, but it can't target messages.
"So for example… people in Upper Hutt got no message. In Lower Hutt, lots of people got the message. So, you know, why is there a difference between one area and another?"
According to the NEMA website, the current system can "broadcast to all capable phones from targeted cell towers to areas affected by serious hazards".
"You may not receive an alert if you are out of mobile coverage, mobile phone towers are damaged, or there is a power outage."
Price said the variation in coverage "could be different providers and different cell towers, there's a lot of possibilities".
Nolan suggested the system was not working as well as it could because it was now owned by "a banking conglomerate out of New York".
New Zealand's system was provided by Dutch company one2many, which is now a division of Everbridge Public Warning, an American software company that specialises in alert systems.
"Now, those sorts of companies are chasing the big markets, the multi-million markets, and I think New Zealand is a very small end of that market," Nolan said. "There is no office of that organisation in Wellington to work alongside emergency services in New Zealand…
"I think that a New Zealand-owned, developed, supported, helpdesked system is the best, and that's what we had built, and our system is now mothballed."
He said he asked officials to look at using Readynet for the national system, but "they never ever fully examined what we had, even though it was used during Christchurch to communicate after the Christchurch earthquake, to communicate with all the residents and contractors left inside the cordons.
"And that was, information such as, well, 'The cordon will be open on the corner of such and such street at four o'clock this afternoon to allow people in and out for shopping there.' That's the sort of stuff you can't put on Facebook."
As of Friday morning, a tsunami advisory remained in place. Pacific nations emerged relatively unscathed.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Dosh partners with Visa & Pismo to build NZ digital banking
Dosh partners with Visa & Pismo to build NZ digital banking

Techday NZ

time2 days ago

  • Techday NZ

Dosh partners with Visa & Pismo to build NZ digital banking

Dosh has announced a collaboration with Visa and Pismo aimed at developing its digital banking platform in New Zealand. The Auckland-based digital wallet provider, established in 2021, is progressing towards becoming a registered bank and says its partnership with Visa and Pismo will support this next phase of its business. The collaboration is set to allow Dosh to deliver digital banking services with greater speed, security, and scalability to customers throughout New Zealand. Partnership details Dosh will use Pismo's cloud-native core banking and payments platform, which Visa acquired in 2024, to underpin its expanding financial offerings. Currently, the digital wallet serves more than 40,000 accounts, all of which are expected to be migrated to the Pismo platform by May 2026. According to the company, the migration will be seamless with no service disruption for existing users. "Working with Visa and Pismo allows us to move faster and scale with confidence," said Shane Marsh, CEO of Dosh. "As we step into this exciting next chapter, our focus is on offering New Zealanders a modern banking experience that's smart, simple, and puts value back in their pockets. This collaboration is a key step in that journey." Pismo's platform will allow Dosh to consolidate spend, save, and borrow features within a single banking application, giving it the infrastructure required to broaden its digital services and scale its user base over the coming years. Strategic goals Dosh's stated ambition is to become New Zealand's first fully digital, locally owned registered bank, with an application currently underway at the Reserve Bank of New Zealand. By leveraging this new partnership, Dosh aims to offer solutions that it says are aligned to the needs and preferences of modern New Zealanders. Anthony Watson, Visa Country Manager for New Zealand and the Pacific Islands, said: "We want Kiwi fintechs to thrive, so we're proud to support Dosh in their mission to bring more innovation and choice to New Zealanders. Their vision aligns closely with Visa's ongoing commitment to digital innovation and financial inclusion." This partnership marks the first client engagement for Pismo in New Zealand. Vishal Dalal, CEO at Pismo, commented: "Dosh is known for delivering a simple and intuitive customer experience. We're excited to help enable that with a modern, scalable platform powering it behind the scenes. We're also proud to welcome Dosh as our first client in New Zealand." Local focus with global technology Dosh highlighted the importance of a local customer focus while leveraging the expertise and technologies of international partners. The collaboration intends to merge global payments infrastructure with local requirements. Marsh said: "Collaborating directly with Visa, a global leader in payments innovation, reinforces our ambition to bring world-class digital banking technology to Kiwis. Together, with Pismo, we're building the foundation for the future of banking in New Zealand." Dosh is positioning its model to streamline costs, adopt new technologies including artificial intelligence, and offer a service described as tailored for New Zealand customers as it seeks regulatory approval to operate as a digital-only bank. Follow us on: Share on:

Over 150 million NZ records for sale as cyber threats grow
Over 150 million NZ records for sale as cyber threats grow

Techday NZ

time2 days ago

  • Techday NZ

Over 150 million NZ records for sale as cyber threats grow

New research from nWebbed Intelligence has identified that over 150 million compromised records linked to New Zealand are accessible on the dark web, including thousands belonging to employees of government departments, local banks, and healthcare institutions. The nWebbed NZ Cybersecurity Study reviewed more than 30 billion breach records, revealing compromised credentials for more than 198,000 New Zealand businesses and entities. Specifically, the study found over 18,000 government worker logins, 3,200 banking staff credentials, and 2,000 healthcare accounts among those leaked online. Exposure at scale The passwords and emails discovered are authentic and currently being traded or given away on underground dark web forums, according to the company's analysis. These credentials, the study found, are particularly problematic for the core sectors of New Zealand society. "We are seeing widespread exposure of compromised credentials linked to core parts of the New Zealand economy, including health providers, government agencies, banks and large-scale businesses. "These are trusted institutions that Kiwis interact with every day, and they are real emails and passwords sitting in the wild. They're searchable, for sale and vulnerable to exploitation," he says. The study cross-referenced global breach records against local email domains to determine the specific exposure of New Zealand organisations. Impact and warning Julian Wendt, founder of nWebbed Intelligence, cautioned that many organisations are unaware their credentials have been exposed on the dark web and that the threat landscape is evolving swiftly. He emphasised that compromised accounts may still be vulnerable long after an initial breach and that the same credentials may appear across several unrelated data leaks. "It's not that someone was hacked once and that's it. In many cases, credentials from five or six separate breaches are still sitting out there, waiting to be exploited," he says. Wendt suggested that New Zealand needs to accelerate its cybersecurity response practices to mitigate this recurring threat. "You can't wait for the ransom note to start caring about where your data ends up. We need a preventative model, and that starts with visibility. "Most organisations are watching their perimeter, not what's already leaked. But if your staff credentials are out there, especially admin or technical roles, then attackers already have the keys," he says. He describes a situation where the volume of sensitive credentials on the dark web continues to grow at pace, with nWebbed's own database expanding by 2 billion credentials each month. Automated threats Attackers are acting more quickly than before, with some using automated tools to actively search for high-value credentials such as executive or technical staff logins within minutes of a data leak. "In some cases, we've seen attackers move within minutes of credentials appearing online. They're using automated tools to scan for executive logins, technical roles or access to critical systems. "What starts as a single leaked password can escalate into a live intrusion before an organisation even realises there's been a breach," he says. Wendt also noted that many New Zealand institutions continue to underestimate their appeal as targets, often seeing cybercrime as an overseas problem when, in his view, local entities are being used as potential entry points into international networks. "There's still this assumption in New Zealand that cybercrime is something that happens to big overseas companies. But in reality, our companies are being targeted every day, often because we're seen as a soft entry point into larger international networks. "Nearly half of the Fortune 500 companies worldwide have exposed employee credentials available online, and Kiwi companies are facing similar threats. Compromised credentials can be used to access corporate networks, bypass multi-factor authentication or launch phishing attacks," he says. He also referenced a tendency for firms to rely too much on past risk assessments, sometimes overlooking exposures their internal controls may not detect. "Even organisations with good internal cybersecurity practices are often shocked to discover what's floating around publicly. That includes old passwords, unpatched web portals or documents they thought were private. It's not about blaming anyone, it's about visibility," he says. Response and outlook In response to these findings, nWebbed has launched a new threat monitoring platform leveraging artificial intelligence to deliver real-time awareness and help organisations address exposures before they result in breaches. Wendt stressed the importance of awareness and proactive management of external risks by New Zealand businesses. "Most breaches happen because someone didn't know their login details were already out there. This is a solvable problem if you're willing to look," he says. Follow us on: Share on:

Thousands Of Leaked NZ Govt And Health Agency Credentials On Dark Web
Thousands Of Leaked NZ Govt And Health Agency Credentials On Dark Web

Scoop

time3 days ago

  • Scoop

Thousands Of Leaked NZ Govt And Health Agency Credentials On Dark Web

Press Release – nWebbed Julian Wendt, founder of Kiwi tech start-up nWebbed Intelligence, says the findings show New Zealand organisations are underestimating the scale and frequency of cyber risk. Thousands of leaked employee credentials from government departments, local banks and healthcare organisations are among more than 150 million compromised records tied to New Zealand accessible on the dark web, according to new research. The nWebbed NZ Cybersecurity Study, which analysed over 30 billion credentials available for sale on the dark web – a hidden part of the internet used as an illegal marketplace by criminals, has revealed an alarming level of vulnerability among Kiwi businesses, with compromised credentials linked to more than 198,000 New Zealand companies and entities. In addition, the usernames and passwords of more than 18,000 NZ Government workers, 3,200 banking staff and 2,000 healthcare organisation accounts with privileged access to sensitive information were also found in leaked databases on the dark web. The study analysed global breach records and cross-referenced them with local email domains to identify exposure. Julian Wendt, founder of Kiwi tech start-up nWebbed Intelligence, which has built the world's fastest-growing database of dark web credentials, says the findings show New Zealand organisations are underestimating the scale and frequency of cyber risk. He says an urgent review of cybersecurity protocols, credential management systems and third-party access controls across the country's sensitive institutions and corporations is needed to secure exposed systems and protect the privacy of consumers whose personal data is at risk. 'We are seeing widespread exposure of compromised credentials linked to core parts of the New Zealand economy, including health providers, government agencies, banks and large-scale businesses. 'These are trusted institutions that Kiwis interact with every day, and they are real emails and passwords sitting in the wild. They're searchable, for sale and vulnerable to exploitation,' he says. Wendt says many breaches are going undetected for months or even years, and the data is still circulating. 'It's not that someone was hacked once and that's it. In many cases, credentials from five or six separate breaches are still sitting out there, waiting to be exploited,' he says. Wendt says New Zealand urgently needs to shift away from reactive cybersecurity practices. 'You can't wait for the ransom note to start caring about where your data ends up. We need a preventative model, and that starts with visibility. 'Most organisations are watching their perimeter, not what's already leaked. But if your staff credentials are out there, especially admin or technical roles, then attackers already have the keys,' he says. Wendt says their database is growing by 2 billion credentials each month as the global rate of breaches accelerates. He says in response to the volume of sensitive credentials available online, nWebbed has launched a new threat monitoring platform that uses artificial intelligence to help organisations close critical security gaps in real time, enabling businesses to act before data is weaponised. Wendt says the time between a data leak and active exploitation is narrowing, particularly for high-value targets. 'In some cases, we've seen attackers move within minutes of credentials appearing online. They're using automated tools to scan for executive logins, technical roles or access to critical systems. 'What starts as a single leaked password can escalate into a live intrusion before an organisation even realises there's been a breach,' he says. Wendt says part of the problem is cultural. 'There's still this assumption in New Zealand that cybercrime is something that happens to big overseas companies. But in reality, our companies are being targeted every day, often because we're seen as a soft entry point into larger international networks. 'Nearly half of the Fortune 500 companies worldwide have exposed employee credentials available online, and Kiwi companies are facing similar threats. Compromised credentials can be used to access corporate networks, bypass multi-factor authentication or launch phishing attacks,' he says. Wendt says too many companies rely on outdated risk assessments and miss critical external vulnerabilities. 'Even organisations with good internal cybersecurity practices are often shocked to discover what's floating around publicly. That includes old passwords, unpatched web portals or documents they thought were private. It's not about blaming anyone, it's about visibility,' he says. Wendt says the next step is to raise awareness and get more Kiwi companies treating external digital hygiene as seriously as they do internal firewalls. 'Most breaches happen because someone didn't know their login details were already out there. This is a solvable problem if you're willing to look,' he says.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store