Categories: IntelligenceSecurity

ThinThread spy system secretly tested on New Zealand population

The author Tim Shorrock revealed that the US spy system ThinThread was tested on the unsuspecting population of New Zealand from 2000 to 2001

ThinThread is the name of a project that the National Security Agency conducted during the 1990s, the program was focused on sophisticated techniques for wiretapping and intelligence analysis. The program was discontinued after the September 11, 2001 attacks when Director of NSA Gen. Michael V. Hayden promoted a new system known as Trailblazer Project. For the project were awarded to a consortium led by Science Applications International Corporation around $280 million to develop Trailblazer in 2002.

User’s privacy once again menaced by a complex and secret system able to capture any activity from the victim’s machine, unfortunately, stories like this have become the order of the day. The main users of these malicious codes are precisely the governments that draw opponents, but also suspected subversives, through the IT tools, often trampling on the rights of Internet users.

ThinThread Secret Spy toolThinThread Secret Spy tool

This time we discuss about a singular case, a US surveillance tool able to analyzed communications without a warrant was sent to New Zealand for testing on the public.

The revelation has been done by an espionage expert, the tool dubbed ThinThread in able to perform massive automatic interception of principal communications over the phone and Internet, including the ability to peep user’s email.

ThinThread has an engine for the analysis of information gathered and is able to automatically build a detailed profile of targets drawing a complete overview of their contacts and their habits.

The revelation is shocking, ThinThread was sent by the US National Security Agency to New Zealand for testing from 2000 to 2001 and it was available for government organizations including the Government Communications Security Bureau (GCSB) according  Tim Shorrock, author of various essays on intelligence issues. Mr Shorrock declared that the “ThinThread prototype” was deployed by NSA in his listening posts at Fort Meade.

The Government Communications Security Bureau is an intelligence agency of the New Zealand government and is known also for the collaboration with US intelligence.

According official source the mission of the agency is “to contribute to the national security of New Zealand by: providing foreign signals intelligence to support and inform Government decision making; providing an all-hours foreign intelligence watch and warning service to Government; ensuring the integrity, availability and confidentiality of official information through information systems security services to Government; and assisting in the protection of the national critical infrastructure from information-borne threats.”

The GCSB agency has been suspected several times for illegal public massive surveillance, the case of ThinThread was the last episode debated in order of time..

Official GCSB refuses to comment on claims communications were intercepted by the ThinThread test, he  reiterated that the intelligence agency “won’t confirm or deny” the claim because it was an “operational” matter.

The silence fell on the matter, the authorities are narrow in the strictest of confidence, also a New Zeland Government spokeswoman for Prime Minister John Key refused to comment the events.

The story of ThinThread was described by Shorrock last month in a magazine in an article featured whistleblower William Binney,  a former high-ranking NSA official who designed ThinThread.

Mr Shorrock revealed that ThinThread operated in three distinct phases:

  • First phase: ThinThread intercepts all call conversation, email and internet traffic on a network and automatically focus analysis on specific targets using specific patterns of information.
  • Second phase: ThinThread automatically anonymize the collected data so the identities stayed hidden “until there was sufficient evidence to obtain a warrant”.
  • Third phase: ThinThread uses the raw data “to create graphs showing relationships and patterns that could tell analysts which targets they should look at and which calls should be heard.

What is really concerning is the diffusion of the agent, many other agencies and government requested its use as wrote in the article:

“In addition, several allied foreign intelligence agencies were given the program to conduct lawful surveillance in their own corners of the world. Those recipients included Canada, Germany, Britain, Australia and New Zealand.”

As written in the post published on The New Zeland Herald both governments of the US and New Zealand used a workaround to adopt the system declaring that ThinThread has the “ability to mask the identities of those whose information was being intercepted”

“The “lawful” aspect was due to the software’s ability to mask the identities of those whose information was being intercepted – a technical work around of the legal barrier which prohibits New Zealand and the US from spying on its own citizens.”

The Greens and Labor both have repeatedly  requested to GCSB to explain to the public whether it was spied on by ThinThread.

The fact that a large scale spying tool was deployed to spy on a foreign population is concerning and give us an idea of the value assigned by governments to citizen’s privacy, similar “experiments” are not acceptable.

Unfortunately, the list of massive systems monitoring is really long and situations like this are not an isolated case!

Pierluigi Paganini

(Security Affairs – Surveillance, ThinThread)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SK Telecom revealed that malware breach began in 2022

South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April…

3 hours ago

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…

14 hours ago

China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks

China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia.…

19 hours ago

UK’s Legal Aid Agency discloses a data breach following April cyber attack

The UK’s Legal Aid Agency suffered a cyberattack in April and has now confirmed that…

22 hours ago

Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang

Cybersecurity Observatory of the Unipegaso's malware lab published a detailed analysis of the Sarcoma ransomware.…

1 day ago

Mozilla fixed zero-days recently demonstrated at Pwn2Own Berlin 2025

Mozilla addressed two critical Firefox vulnerabilities that could be potentially exploited to access sensitive data…

2 days ago