This is an HTML version of an attachment to the Official Information request 'RGL speech notes'.

From:
Tony Prompong
To:
Emma Miles-Buckler; Donna Williams-Stewart
Subject:
FW: Clean devices - Robbie Muir to China
Date:
Tuesday, 1 October 2019 12:37:38 p.m.
Attachments:
image001.png
 image002.png
Hi Emma,
Below email outlines what we can and cant offer regarding hardware and email access.
Also attached is travel advice.
I will be providing Robbie Muir with a new laptop, new connection and mobile early November so
he will be comfortable with the devices.  
1982
Thanks for the Mobile form ill get that processed soon.
Act 
Regards
Tony Prompong
Operations Advisor – IT Support 
IT Operations
E  [email address]
Wellington Office, Level 7, Radio New Zealand House, 155 The Terrace
Information 
PO Box 5501, Wellington 6145, New Zealand | T 04 462 4477 | M 027 271 8301
W  www.linz.govt.nz | data.linz.govt.nz
http://www.linz.govt.nz/sites/default/files/images/email-signature-v2.png
Official 
the 
From: Berny Fischer 
Sent: Wednesday, 25 September 2019 4:22 PM
under 
To: Donna Williams-Stewart <[email address]>; Tony Prompong
<[email address]>
Cc: Clive Eastwood <[email address]>; Francois Meyer <[email address]>
Subject: RE: Clean devices - Robbie Muir to China
HI All,
Released 
PSR has developed some pretty good documentation for this.
Attached is generic document for any government official travelling on business, it’s a few pages
long – I would be happy to summarize and brief Robbie on the important points before he goes if
that’s easier than reading it.
I have also attached a 2 pager on recommendations for electronic media.

We suggest he takes a clean laptop with VPN access to work and check email on (i.e. doesn’t not
use web mail or email on phone) and a clean/new burner mobile phone – with no email access on
it.
 
It might be useful if we sat down and came up with ‘LINZ staff travelling’ IT guide for future
scenarios like this as they probably aren’t that common and will help staff understand what they
need to do in advance etc. I say the royal ‘we’ as you guys will probably end up wearing the
‘clean’ device and ‘burner’ phone situation so needs to be something realistic for everyone.
 
Any questions – you know where I live.
 
Cheers,
 
1982
Berny
 
 
Act 
 
 
From: Donna Williams-Stewart 
Sent: Wednesday, 25 September 2019 2:10 PM
To: Francois Meyer <[email address]>; Clive Eastwood <[email address]>
Cc: Tony Prompong <[email address]>; Berny Fischer <[email address]>
Subject: FW: Clean devices - Robbie Muir to China
Information 
 
Hi,
 
Please be advised that Robbie Muir, DCE, Strategy and Stewardship will be travelling to China in
Official 
his role as Registrar General of Land to present at the World Bank conference.
 
the 
Tony Prompong and I met with Emma Miles-Buckler yesterday to discuss what Robbie will need in
terms of Security regarding the devices he will need while over in China.
 
Please advise what security guidance we will need to advise Robbie regarding access to LINZ
under 
information, whilst in China or any Security Clearance is required.
He will be leaving NZ 20th November 2019 and returning 24th November 2019.
 
Regards
Donna
  Released 
From: Emma Miles-Buckler <[email address]> 
Sent: Monday, 23 September 2019 2:22 PM
To: Donna Williams-Stewart <[email address]>
Subject: RE: Clean devices - Robbie Muir to China
 
Robbie has a LINZ mobile and physical device but he will need a clean one for China  - new device
and number please
 
Thanks

 
From: Donna Williams-Stewart 
Sent: Monday, 23 September 2019 2:20 PM
To: Emma Miles-Buckler <[email address]>; Chris Monteith
<[email address]>
Cc: Morwenna Grills <[email address]>
Subject: RE: Clean devices - Robbie Muir to China
 
Hi Emma,
 
We can definitely assist and have a laptop ready for Robbie before the time.  Also, in terms of a
mobile, we can arrange for Robbie  to have a  LINZ mobile number and number if he doesn’t have
one already.
1982
 
Ill set up a meeting with Tony Prompong, our IT Support  to discuss Robbies needs to access the
LINZ Network and how, and what the lead times are to have laptop and mobile ready and tested
Act 
for Robbie before the time.
 
Regards
Donna
 
From: Emma Miles-Buckler <[email address]> 
Sent: Monday, 23 September 2019 2:02 PM
Information 
To: Donna Williams-Stewart <[email address]>; Chris Monteith <[email address]>
Cc: Morwenna Grills <[email address]>
Subject: Clean devices - Robbie Muir to China
 
Official 
Hi – in the 3rd week in November Robbie will be going to China to present at a World Bank
conference and he will need clean devices to take in … at this stage he will need a laptop and a
the 
cell phone.
 
Not sure what the rules are around this but can we please either meet so you can you let me
know what your suggestion are – or an email is fine
under 
 
Thank you
 
Emma
  Released 
 
Emma Miles-Buckler
Executive Assistant to Robbie Muir
Registrar General of Land & Deputy Chief Executive, Strategy & Stewardship
 
E  [email address]
 | DDI 04 462 4452 |  M 022 306 9787
Wellington Office, Level 7, Radio New Zealand House, 155 The Terrace
PO Box 5501, Wellington 6145, New Zealand | T 04 460 0110   
W  www.linz.govt.nz | data.linz.govt.nz

 
 
1982
Act 
Information 
Official 
the 
under 
Released 


UNCLASSIFIED 
 
 
 
 
 
 
 
 
TRAVELLING OVERSEAS WITH ELECTRONIC DEVICES 
1982
 
Act 
Introduction 
The sophistication and versatility of modern mobile electronic devices means they are often 
used to extend office functionality outside the workspace and domestic spheres.  In terms of 
convenience, connectivity and increased productivity, the benefits of mobile devices are 
undeniable.  Their use does not however come without increasing risk and they should be 
used in strict compliance with agency policy and security requirements. 
As such, while mobile and electronic device security can be inconvenient, it is essential 
agencies and personnel actively consider and mitigate the risks of operating mobile and 
Information 
electronic devices overseas. 
All electronic devices, whether personal or work, are vulnerable to interception, manipulation 
and/or information extraction.  These risks are heightened overseas.  Even personal devices 
which have not been used to process official information hold a significant amount of 
Official 
information about you.  While the compromise of a personal device may not result in the 
compromise of official information it could still be used maliciously by a hostile agency or 
individual. 
the 
  Agencies should consider whether it is absolutely necessary for a staff member to 
take their work electronic devices overseas. 
  Agency personnel should consider whether it is absolutely necessary to take their 
personal electronic devices overseas. 
under 
If it decided that it is necessary then the guidelines below should be followed where possible. 
 
Personnel should consider taking a “clean” electronic mobile device overseas, that is, a 
newly purchased device to be used for the length of the trip only and which has not stored 
any information associated with the user. 
Released 
Protective Security Requirements 
UNCLASSIFIED 

UNCLASSIFIED 
Personal Devices 
Before traveling you should 
  Update the device with the necessary security and application patches. 
  Enable device security features such as access passwords and PINs. 
 
During travel you should 
  Never use your personal mobile or electronic device(s) for official business. 
  Maintain physical control of electronic devices at all times; if a device is taken out 
of your sight or physical control, treat it as compromised.  This includes storage in 
hotel safes and checked-in luggage. 
  Practice security awareness; do not allow strangers to access or handle any 
1982
electronic devices in your possession and be alert to any covert access to 
information stored on them, for example, onlookers attempting to read the screen. 
 
Act 
Work Devices 
In addition to the guidelines outlined for personal devices above, if taking and operating a 
work electronic device overseas, personnel should comply with the following measures. 
 
Before travel you should 
Information 
  Remove any official information stored on the device that is not required. 
 
During travel you should 

Official 
 
Not use work devices to access or process sensitive or official material in public 
locations, for example, in hotel lobbies, airports or while using public 
transportation. 
the 
  If the device is not being used, especially during classified conversations, consider 
disabling wireless and Bluetooth functions and powering the device off and/or 
removing the battery. 
  If your electronic device is taken out of your sight or physical control, treat the 
under 
device as compromised and cease to use it. 
  Use the device for work and/or official purposes only, not for personal purposes. 
 
After travel you should 
  Report any compromise of an electronic device – either suspected or actual – to 
Released 
the agency Chief Security Officer as soon as possible and have the device 
sanitised before it is used again. 
 
Protective Security Requirements 
UNCLASSIFIED 


1982
Act 
Information 
Official 
the 
Security Advice
under 
For New Z
Released 
ealand Government 
officials travelling overseas on business

What is the threat to 
New Zealand when you  
travel overseas?
When you travel overseas, foreign 
intelligence services may target you to 
get access to New Zealand Government 
1982
information. This threat is constant. Act 
Use this security advice to help protect 
yourself and New Zealand Government 
information while travelling overseas.
Information 
Official 
the 
under 
Released 

 Why would you be targeted?
Foreign intelligence services have the intent and capability to target  
New Zealand and our interests.
As a New Zealand Government official, your travel overseas gives foreign 
intelligence services many opportunities to collect intelligence. 
They may be interested in New Zealand Government officials for several 
reasons, including our:
1982
•  position on international issues and agreements such as trade
Act 
•  strategic perspective and intentions (including domestic policies)
•  defence and intelligence capabilities
•  innovations in science and technology
•  agriculture, energy, primary industries, and other sectors which 
attract significant foreign investment interest
Information 
•  alliance with the Five Eyes and other bilateral relationships.
Foreign intelligence services aren’t just interested in gaining access to 
Official 
protectively-marked or classified government information. They may also 
attempt to get access to privileged, public or private sector information, 
the 
including personal opinions and statements you’ve made. They may act 
on behalf of their government or be trying to fulfil their government’s 
obligations to third parties. 
under 
They’re also interested in collecting information about the identities 
of other New Zealand government personnel with access to sensitive 
information or people of influence. For example, your colleagues, 
managers, or key stak
Released 
eholders. 
Foreign intelligence services may use the information they gather  
for subsequent intelligence targeting either in their home country, in  
New Zealand, or in a third country. Even information that seems 
harmless on its own may be combined with other information to fill 
intelligence gaps or identify individuals for future targeting.

 How would you be targeted?
Foreign intelligence services may be alerted to your travel in advance. 
They could find out about your travel plans through visa applications, 
foreign ministries, and even flight manifest data provided by airlines.
They may use several methods to gain influence or access to 
information they can use to their advantage. Many of their approaches or 
interactions will seem like normal social networking opportunities. You 
may be completely unaware you’re speaking with intelligence officers.
1982
Methods foreign intelligence services may use to target you:
Act 
•  Talent spotting – attempting to build trust and rapport with you so 
they can assess whether you might give them information or have 
access to people of influence.
•  Eliciting – seeking to gain information of value through targeted 
conversation.
Information 
•  Eavesdropping – looking for opportunities to listen in when you and 
other government officials relax your personal security and discuss 
sensitive matters in public or social settings.
Official 
•  Intercepting public and priv
the ate Wi-Fi connections and phone 
networks.
•  Physically interfering with possessions such as documents and 
under 
electronic devices, including at airports and in hotel rooms.
•  Setting up surveillance, both physical and technical. For example, 
placing listening devices in hotel rooms and vehicles.
•  Using cyber exploitation 
Released 
– remotely accessing information on your 
electronic devices using techniques such as spear phishing email 
campaigns and by gifting exploited devices such as USB drives.
Be aware that you may be subject to ongoing targeting when you’re  
back in New Zealand.


    Minimising the threat
What to consider when you’re travelling overseas:
•  Your potential value as a target — what information, knowledge and 
access do you have? Remember it won’t just be protectively-marked 
material foreign intelligence services are interested in.
•  Do you or your travelling companions have any potential 
1982
vulnerabilities which could be exploited? 
•  Have you noticed any suspicious computer activity or emails? 
Act   
They may be a sign that an upcoming event or visit is a cyber target.
Information 
Official 
the 
under 
Released 

  Checklist
Before you go
 
P Always consult your organisation’s security team to see  
if you need a security briefing.
 
P Share a detailed itinerary of your travel plans with your  
managers and/or colleagues.
1982
 
P Know your security responsibilities and meet Protective Security 
Requirements while you’re travelling. 
Act 
 
P Consider taking clean electronic devices with you – devices that 
have not been used and will not be used when you return. Your 
organisation may have clean devices you can use.
 
P Remove all non-essential data from your devices including any apps, 
Information 
accounts, contacts, emails, and files. 
 
P Clear your web browsing history before you travel and use private 
browsing mode during your trip.
Official 
 
P Know what to share, trade, and protect. That means knowing  
the 
your organisation’s official stance on relevant topics and issues,  
what information you can share, and what information is sensitive 
and protected.
under 
 
P Prepare responses for any tricky questions or sensitive issues that 
may come up.
 
P Register on MFAT’s safe travel website: www.safetravel.govt.nz
Released 

While you’re away
P  Make sure you only talk about sensitive or classified matters  
when you are in secure facilities within New Zealand posts.
P  Don’t give your personal email, social media accounts, or phone 
numbers to people you meet overseas. Only give out official contact 
details to your foreign business contacts.
P  Be mindful that foreign intelligence services may use surveillance 
1982
and eavesdropping techniques to listen to conversations you have 
in hotels, public or private vehicles, elevators, conference rooms, 
Act 
restaurants, and outdoor areas.
P  Maintain physical control of official documents and electronic 
devices at all times. Consider using tamper evident bags or 
envelopes.
Information 
P  Don’t open unsolicited emails, attachments, or messages from 
unknown sources.
P  Be wary of drinking alcohol and lowering your inhibitions at social 
Official 
events. These events give foreign intelligence services opportunities 
to learn more about you.
the 
P  Never carry electronic devices in your checked luggage. Don’t leave 
your devices unattended in hotel rooms, including in safes.
under 
P  Ensure you enable encryption on your electronic devices or ask your 
security team to do it for you. Set complex passwords for  
each device.
P  If you’re connecting t
Released 
o the internet, use a trusted data network rather 
than an open Wi-Fi network. 
P  Avoid using a charger that someone else offers you and don’t 
charge your electronic devices at public charging stations or via USB 
charging outlets.
P  Turn off GPS and location settings on all electronic devices.

When your return
 
P Report to your Chief Security Officer or your organisation’s  
security team any:
•  official or social contact that seems suspicious, ongoing, 
unusual, or persistent in any way
•  unusual incidents you experience
•  electronic devices you suspect may have been compromised
1982
•  protectively-marked material that is or may have been 
Act 
compromised. 
 
P Hand any gifted devices to your Chief Security Officer on your 
return. Don’t introduce gifted devices, including USB drives, 
memory storage devices, and compact discs to any New Zealand 
Government computer system or device.
Information 
 
Official 
the 
under 
Released 


1982
Act 
Information 
Official 
the 
under 
Released 


1982
Act 
For more information, go to:
www.protectivesecurity.govt.nz
[email address]
Information 
Official 
the 
under 
Released 
VERSION
 2
 / JUNE
 2
019