1 00:00:00,120 --> 00:00:03,960 Speaker 1: A violent extremist attack in New Zealand is a realistic possibility. 2 00:00:04,000 --> 00:00:07,040 Speaker 1: This is according to the sas their latest security report says, 3 00:00:07,080 --> 00:00:10,119 Speaker 1: We're up against the most challenging national security environment in 4 00:00:10,160 --> 00:00:14,280 Speaker 1: recent times. Foreign espinage is happening here, likely happening here 5 00:00:14,440 --> 00:00:18,600 Speaker 1: without us even knowing, targeting sensitive information and critical infrastructure. 6 00:00:18,760 --> 00:00:22,639 Speaker 1: John Badisby is a Massi University Center of Center for 7 00:00:22,720 --> 00:00:25,480 Speaker 1: Defense and Security Studies with me this morning, John, Good morning, 8 00:00:26,040 --> 00:00:29,320 Speaker 1: Good morning to you. Do you find this alarming? 9 00:00:30,880 --> 00:00:33,080 Speaker 2: I don't know they find it alarming. I think I've 10 00:00:33,200 --> 00:00:35,440 Speaker 2: often been critical of New Zealand has been a little 11 00:00:35,440 --> 00:00:39,320 Speaker 2: bit complacent about security issues and that we really do 12 00:00:39,400 --> 00:00:40,880 Speaker 2: need to face up to the fact that the world 13 00:00:40,960 --> 00:00:43,680 Speaker 2: is changing and that there are new things happening out 14 00:00:43,720 --> 00:00:46,240 Speaker 2: there and they're not always good. So we do need 15 00:00:46,320 --> 00:00:48,600 Speaker 2: to be a lot more aware of the types of 16 00:00:48,640 --> 00:00:53,120 Speaker 2: security risks that exist. Now, whether I would say it's alarming, 17 00:00:53,159 --> 00:00:56,000 Speaker 2: I'm not too sure. I think a number of these 18 00:00:56,000 --> 00:00:59,040 Speaker 2: thinking all of these things are listed in this threat assessment, 19 00:00:59,520 --> 00:01:02,240 Speaker 2: have been sitting for a sitting with us for quite 20 00:01:02,280 --> 00:01:03,040 Speaker 2: some time. 21 00:01:02,920 --> 00:01:06,520 Speaker 1: Now, and there's no I mean, it's the sis. So 22 00:01:06,560 --> 00:01:08,840 Speaker 1: the how they're going to tell you all their workings 23 00:01:08,959 --> 00:01:11,480 Speaker 1: and exactly what they're thinking is right and where the 24 00:01:11,520 --> 00:01:14,480 Speaker 1: threats are and who they are. Is there enough detail 25 00:01:14,520 --> 00:01:17,160 Speaker 1: to go off for you to be confident in their assessment. 26 00:01:18,200 --> 00:01:23,360 Speaker 2: I think there's enough contextual detail to be to be 27 00:01:23,560 --> 00:01:29,160 Speaker 2: confident that, yes, those security risks exist with this type 28 00:01:29,200 --> 00:01:31,760 Speaker 2: of report. And as you say, there's just they don't 29 00:01:31,800 --> 00:01:34,000 Speaker 2: give a lot of detail. There is a fair bit 30 00:01:34,040 --> 00:01:38,160 Speaker 2: of glossy, large, large text in this, so they don't 31 00:01:38,200 --> 00:01:42,440 Speaker 2: really provide enough evidence to convince me that it's way 32 00:01:42,480 --> 00:01:44,440 Speaker 2: worse than it was last year. But then they know 33 00:01:44,600 --> 00:01:48,320 Speaker 2: things we don't, and it's sort of one little advantage 34 00:01:48,360 --> 00:01:52,480 Speaker 2: they have. It wouldn't surprise me if things have got 35 00:01:52,520 --> 00:01:56,400 Speaker 2: a little bit worse. The geostrategic situation the Pacific is changing. 36 00:01:56,520 --> 00:01:58,840 Speaker 2: There's a new contender on the block has been there 37 00:01:58,840 --> 00:02:02,080 Speaker 2: for a while. That's going to affect how the Pacific 38 00:02:02,200 --> 00:02:05,760 Speaker 2: is Online extremism, I can't see that it's ever going 39 00:02:05,800 --> 00:02:08,520 Speaker 2: to reduce year on year. It's just going to be 40 00:02:08,600 --> 00:02:11,520 Speaker 2: so more common each year, I think, so. I think 41 00:02:11,520 --> 00:02:14,919 Speaker 2: that's probably there. And espionage, that's something we've been a 42 00:02:14,960 --> 00:02:17,120 Speaker 2: slip to for a long time. That is happening here, 43 00:02:17,160 --> 00:02:19,639 Speaker 2: has been happening here on off I think for some time. 44 00:02:20,000 --> 00:02:23,000 Speaker 1: Is that like, do you mean a tax on infrastructure 45 00:02:23,240 --> 00:02:25,120 Speaker 1: cyber attacks that kind of thing, or do you mean 46 00:02:25,160 --> 00:02:27,280 Speaker 1: physical espionage spies? 47 00:02:29,040 --> 00:02:31,680 Speaker 2: Yeah, look, I would say both. And the actors that 48 00:02:31,720 --> 00:02:34,200 Speaker 2: are doing the cyber attack can be state based or 49 00:02:34,240 --> 00:02:37,720 Speaker 2: they can just be malicious actors, right, So that's not 50 00:02:37,840 --> 00:02:42,880 Speaker 2: becoming a less of a risk ever. And espionage, you know, 51 00:02:43,080 --> 00:02:45,920 Speaker 2: look right back into the Cold War. If there's a 52 00:02:45,960 --> 00:02:49,880 Speaker 2: soft option somewhere, there are states contending for influence in 53 00:02:50,160 --> 00:02:53,640 Speaker 2: geostrategic spaces, then yes, there will be a degree of 54 00:02:53,880 --> 00:02:55,399 Speaker 2: espionage going on here. 55 00:02:55,639 --> 00:02:58,560 Speaker 1: John, appreciate your time this morning, John Badisbury, Massive University 56 00:02:58,639 --> 00:03:02,079 Speaker 1: Center for Defense and Security Studies. For more from Early 57 00:03:02,240 --> 00:03:05,200 Speaker 1: Edition with Ryan Bridge, listen live to News Talks It 58 00:03:05,360 --> 00:03:08,560 Speaker 1: be from five am weekdays, or follow the podcast on 59 00:03:08,600 --> 00:03:09,359 Speaker 1: iHeartRadio