Annual reports

GCSB Annual Report 2025

This is the annual report of the Government Communications Security Bureau (GCSB) for the year ended 30 June 2025.

Assessment of operations

Part A: Implementing the Government’s priorities

The GCSB works to the New Zealand Government’s National Security Intelligence Priorities – Whakaarotau Marumaru Aotearoa (NSIPs). These define key areas of national security interest, assisting agencies with related roles to make informed, joined-up decisions.

Baseline savings

The GCSB’s baseline was reduced by $7.62 million in 2024/25 through the Budget 2024 Initial Baseline Exercise. We achieved the savings targets through efficiency savings that could be managed without having a significant impact on operational activity, for example, by reducing spend on contractors and consultants, training and development, travel, and reduced financial contingencies. 

Part B: Assessment of operations

Intelligence advantage

As New Zealand’s signals intelligence (SIGINT) agency, our role involves collecting and analysing electronic communications of relevance to our objectives to produce intelligence. We also get great value from intelligence sourced through our international partnerships.

We provide a range of intelligence products across all NSIPs under our function to contribute to the protection of New Zealand’s national security, international relationships, economic wellbeing and he safety and security of New Zealanders.

Our legislation enables us to seek authorisation to carry out a range of activities to obtain intelligence including intercepting communications, receiving intelligence from our international partners, and accessing information infrastructures to retrieve digital information directly from where it is stored or processed. We can also seek assistance from telecommunications network operators and services providers to give effect to our authorisations.

Strategic competition

The GCSB works closely with the NZSIS and the wider national security system to understand how New Zealand’s people and sovereign structures are at risk from national security issues including the foreign interference activities of other states. The NZSIS leads the NZIC’s efforts to identify and understand foreign interference activity by other governments.

Regional Security

What happens in the Pacific has a fundamental impact on New Zealand’s own national security, prosperity and identity. The GCSB provides intelligence reporting in relation to New Zealand’s interests in the South Pacific. This focuses on providing support to other government agencies whose responsibilities include responding to security issues in the Pacific region.

Transnational Serious Organised Crime

The GCSB provides intelligence and technical assistance to the New Zealand Customs Service (Customs) and New Zealand Police (NZP) to help counter Transnational Serious Organised Crime (TSOC). 

This interagency work strongly aligns with the GCSB’s key objectives, which include contributing to the protection of New Zealand’s national security and wellbeing, and supporting the safety and security of New Zealanders at home and abroad. 

Counter-terrorism

The GCSB’s counter-terrorism effort has both a foreign and a domestic focus, aimed at ensuring New Zealand, New Zealanders, and our interests overseas are protected from violent extremism. Internationally, we continue to make a unique and highly valued contribution to global counter-terrorism efforts. 

Violent extremist attacks worldwide continue to be inspired by online extremist rhetoric. The spread of extremist content and ideologies online remains a threat to New Zealand’s security.

Support to the New Zealand Defence Force

We contribute to NZDF efforts to detect and counter threats to New Zealand military personnel deployed overseas.  

Cyber Resilience

One of our core functions is to provide cyber security advice and assistance for all New Zealanders, which is delivered through our National Cyber Security Centre (NCSC). The NCSC was established in 2011 to support nationally significant organisations to improve their cyber security and resilience.

In July 2023, Cabinet determined New Zealand’s Computer Emergency Response Team (CERT NZ) would be integrated with the NCSC, strengthening the GCSB’s role as the New Zealand Government’s lead operational cyber security agency.

The formal integration programme was completed by 30 June 2025. This programme has unified our functions to consolidate our view of the operating environment, create a unified cyber security incident response service, and offer an authoritative voice from the New Zealand Government on cyber security. This is a positive step for New Zealanders, as it simplifies the process of getting help in response to cyber security concerns.

We recorded 5,995 cyber security incidents this reporting year, of which 331 had the potential to cause high impact at the national level. Of these, at least 25 percent indicated links to state-sponsored actors, while at least 41 percent were likely criminal or financially motivated. The motivations of the remaining 34 percent remained unclear at time of reporting, but could also be state-sponsored, or criminally/financially motivated.

We help raise New Zealand’s collective cyber resilience against incidents through three main approaches:

  • we support New Zealanders and New Zealand organisations to act on informed decisions
  • we work with key players to build a resilient cyber security ecosystem, and
  • we use our mandate and specialist capabilities to counter the most serious harms.

Further information about our work under each of these approaches is outlined below.

Supporting New Zealanders and New Zealand organisations

We provide cyber security advice and education for all New Zealanders and New Zealand organisations. We focus on encouraging people to implement the most effective cyber security behaviours that would protect them from the vast majority of the cyber security threats they are likely to face. We also commission independent research to measure the uptake of these behaviours amongst individuals and small to medium enterprises, and we use this to tailor our engagement approach.

Our incident management function plays a vital role in safeguarding against cyber security threats that could impact our national security and wellbeing. We triage incidents according to their potential national impact, engage with victims to understand the scope of the activity, and provide targeted support throughout the incident’s lifecycle. For incidents with potential national level impact, this involves performing investigations and providing recommendations to support malicious activity containment, remediation, and recovery.

Key achievements

During 2024/25, we:

  • Responded to 5,995 cyber incidents
  • Ran a “Scamathon” campaign in this year’s annual Cyber Smart Week event (see page 17)
  • Launched BOSS – the Business Online Safety Series – to help small businesses start their cyber security journey
  • Published cyber security guidance for high-profile individuals1, and
  • Joined the Anti-scam Alliance, a group of government agencies and private sector organisations working to improve New Zealand’s ability to prevent and respond to online financial scams2

1 Producing this guidance for high profile individuals was one of the recommendations of a review undertaken into our practices and procedures for our response to cyber security incidents, following phishing activity targeting members of the Inter-Parliamentary Alliance on China.

2 As not all scams are cyber security issues, the GCSB’s work in relation to addressing online financial fraud is on cyber-dependant crime, rather than cyber-enabled crime. Our expertise and resources are focused on cyber security threats and vulnerabilities, as well as raising cyber security resilience in New Zealand. We continue to deliver a range of existing cyber security services that help individuals and organisations better protect themselves from cyber security threats.

Support to victims of cyber security incidents

This year we recorded 5,995 cyber incidents. To understand the impact of any one incident, we triage incidents into categories based on the severity of the compromise and the size of the impact, ranging from C1 (a national cyber emergency) to C6 (a minor incident). We did not record any C1 or C2 incidents this year, but did record eleven C3 incidents.

Our work in 2024/25
Case study

The Scamathon campaign

Context

Our annual Cyber Smart Week event took place in October 2024. For this year’s event, we created the “Scamathon” campaign.

While New Zealanders consider cyber security to be important, our research showed that many people are not proactively keeping themselves secure online. In particular, our research showed that New Zealanders are not implementing some of the most impactful cyber security behaviours:

  • Only 42 percent of New Zealanders feel vulnerable to cyber attacks
  • 32 percent do not use two-factor authentication
  • 30 percent admit to using weak passwords
  • 43 percent reuse passwords between different online accounts
What we did

To increase the uptake of these cyber security behaviours, we ran a “Scamathon” campaign to show New Zealanders that we are all vulnerable to cyber attacks and to highlight the importance of having strong, unique password practices, as well as two-factor authentication.

Our impact

Independent market research, commissioned by the NCSC, showed that 15 percent of New Zealanders saw the campaign within the first month, and that 62 percent of those people took action to improve their cyber security as a result of the campaign. Examples of actions were updating their passwords and enabling two-factor authentication. 

Over 1,300 businesses supported Cyber Smart Week – an increase from 1,200 last year. During the reporting period, research suggests the campaign reached a total of 1.97 million New Zealanders and had 9.2 million media impressions.

Building a resilient cyber security ecosystem

We work closely with key players in New Zealand’s IT and communications ecosystem to build the resilience of New Zealand’s cyber security ecosystem. These include government agencies, telecommunications network operators, critical infrastructure providers, and the digital supply chain. Decisions made by these key players have an outsized impact on the cyber security of all New Zealanders, and can also drive cyber security uplift in other areas of the economy.

Through our role as Government Chief Information Security Officer (GCISO), we provide system stewardship of information security for the public sector. We also provide national security advice to inform regulatory decision-making on technology investment in areas critical to New Zealand’s national security.

Through our Pacific Partnerships Team we work with Pacific states to help improve their cyber resilience. This reflects the importance of a secure and resilient Pacific, and the value of our partnerships with our Pacific neighbours. Our Pacific Partnership Programme supports institution building, workforce development and awareness raising and leads New Zealand’s engagement in regional cyber security. This includes co-chairing the workforce capability working group of the Pacific Cyber Security Operational Network (PACSON) and delivering its annual awareness raising campaign.

Key achievements
  • In October 2024, we launched the Vulnerability Insights Programme: a service that proactively scans for and notifies customers in the public sector about cyber security vulnerabilities affecting their systems. Since launch, we have expanded coverage to scan over 200,000 devices across 122 organisations. In addition to monthly vulnerability reports for these organisations, we issued 92 alerts for high-impact vulnerabilities within 24 hours of identification. We have observed organisations patching or disabling vulnerable services after receiving reports, with positive feedback from customers relating to the discovery of vulnerabilities previously unknown to their organisations.
  • We began consultation with government agencies on Minimum Cyber Security Standards, ahead of future publication. These standards will provide greater clarity for GCISO-mandated agencies about where to prioritise cyber security efforts. The standards are designed to focus on the basics, to create visibility of cyber security practices, and to drive an uplift. Reporting on the standards will provide system level insights; we will use this to improve our products and services.
  • We co-chair Security Information Exchanges to share cyber security insights and best practice specific to different sectors. This year, we established two new groups and co-chaired 29 such exchanges across eight sectors: energy, finance, government, network-providers, universities, and transport and logistics, water, and health. 
  • We published 15 advisories with our international partners to raise awareness of cyber security threats and provide information of value to cyber defenders to mitigate malicious cyber activity. This included co-publishing advice with the Australian Signals Directorate to help organisations prepare for and respond to denial-of-service attacks, after we observed New Zealand organisations being increasingly targeted by such attacks last year.
  • We continued to provide national security advice and risk assessments this year to inform regulatory decision-making on technology investment.
Our work in 2024/25
  2020/21 2021/22 2022/23 2023/24 2024/25
Number of network change proposal notifications received and processed under Telecommunications (Interception Capability and Security) Act 2013 141 179 159 143 122
Number of assessments of regulated space activities under the Outer Space and High-altitude Activities Act 2017 29 19 20 21 25
Number of assessments of regulated radio spectrum activities under the Radiocommunications Act 1989 Not recorded 55 45 74 65
Number of proposals for overseas investment that we provided advice on under the Overseas Investment Amendment Act 2021 69 42 42 39 46

Countering serious harms

We have the mandate, relationships and capability to understand and counter the most serious potential cyber security harms New Zealand faces. Where we have visibility, we can identify threats to New Zealand systems, and can block or remediate these threats before they can cause an impact. We also work with other government agencies to ensure that New Zealand’s classified information is protected.

Key achievements
  • Our cyber defence capabilities – including our CORTEX suite of detection services and flagship Malware Free Networks® (MFN®) threat detection and disruption service – continued to prevent harm to New Zealanders this year.
  • Our CORTEX suite of services prevented approximately NZ$47.9 million worth of worth of harm to New Zealanders in 2024/25.
  • A combined total of 473.4 million malicious cyber incidents have now been disrupted through MFN. This is a significant increase from last year’s cumulative 10 million disruptions, and 390,000 cumulative disruptions the year before. MFN helps New Zealanders avoid costly security incidents and makes a real difference to everyday New Zealanders’ lives. These figures reflect our efforts to automate the disruption of malicious cyber activities through MFN that have been detected through CORTEX. 
  • We help ensure New Zealand’s most sensitive communications are not intercepted or compromised. We carry out accreditation services to check that highly classified information systems and sites are safe and secure for use, and undertake inspections to counter the potential for hostile actors to intercept information through eavesdropping, video surveillance, or the collection of unintentional emanations signals from ICT equipment. 

Part C: Year-end performance information on appropriations

How we measure performance

Reporting entity

The GCSB is a New Zealand government department as defined by section 5 of the Public Service Act 2020. The relevant legislation governing our operations includes the Public Finance Act 1989, Public Service Act 2020 and Intelligence and Security Act 2017.

The GCSB is New Zealand’s lead agency for signals intelligence (SIGINT) and lead operational agency for cyber security. We do not operate to make a financial return, and we are a Public Benefit Entity (PBE) for performance reporting purposes.

Our performance framework (see page 10) sets out how we measure, track, and report on our strategic intentions and outcomes. We measure the services we provide to the Government, our customers, and the public that support us to achieve these outcomes. We measure our outputs across these outcomes.

We are funded through one appropriation, Vote Communications Security and Intelligence. The appropriation contains a group of output performance measures and standards to assess how well we deliver our services and activities.

The majority of our performance information is classified and cannot be released publicly. Where performance information is unclassified and can be released, it is set out in the following pages (pages 20-25).

Statement of Compliance

Our performance information is prepared in accordance with Tier 1 PBE accounting standards, which have been applied consistently throughout the 2024/25 financial year.

This includes compliance with the new PBE FRS 48 Service Performance Reporting standard. The standard sets principle-based requirements around the selection and presentation of performance information that is appropriate and meaningful to readers.

Critical reporting judgements, estimates, and assumptions

We use a framework of performance measures to help us achieve outcomes for New Zealand, contribute to Government priorities, improve outcomes for customers and deliver high-quality services. The measures included this year help assess our progress and results.

Our performance measures are reviewed each year. Performance measures are selected through consultation with subject matter experts with consideration for measures that best demonstrate performance against our key functions and activities, the availability of data and relevance to the result or outcome we are trying to achieve. We have discretion to select our measures and targets.

For comparability and consistency, we maintain a core set of performance measures each year. This allows us to compare performance from prior years and maintain visibility of critical performance areas over time.

Contextual information

We have included comparison of our 2024/25 performance measures against the results for 2023/24. The 2024/25 actual results in this section are audited. The 2023/24 comparative results are unaudited.

We provide additional information to explain any significant changes in performance or where standards have not been met.

Minister satisfaction surveys

In keeping with the Policy Quality Framework provided by the Department of the Prime Minister and Cabinet (DPMC) we survey our Minister each year to assess their satisfaction with the policy advice and ministerial servicing we provide (page 23). The survey measures our Minister’s satisfaction across four areas on a five-point scale. The survey is amended slightly from DPMC’s Ministerial Policy Satisfaction Survey to reflect the Minister’s role in signing intelligence warrants. The survey was completed by the Minister Responsible for the GCSB in July 2025.

How we performed against our output measures

Impact Standard 2025 Results 2024 Results
New Zealanders' ability to secure their information technology systems and infrastructures continuously improves There is a year-on-year increase in consumption of NCSC’s content and services (measured by web traffic, social media engagement, and advisory subscribers) Achieved Not achieved

Assessment of achievement

On average, there was a 4.47 percent increase in the consumption of NCSC’s content and services this year. This considers the following statistics:

  • Website visits increased by 15.10 percent
  • Twitter followers went down by 13.87 percent
  • Subscribers to four CERT NZ channels went up 12 percent.

In 2024, our content consumption was 86 percent, which was 7 percent lower than the previous year (93 percent). This was due to:

  • Heightened traffic in 2022/23 caused by national and international cybersecurity events that were not repeated in 2023/24
  • An increased cost in advertising, reducing the potential reach of our advertising, and
  • The reduced popularity of X (formerly Twitter) as a social media platform this year.

 

Impact Standard 2025 Results 2024 Results
Nationally Significant Organisations embrace technology responsibly and securely Regulatory responsibilities fulfilled in accordance with service agreements 95 percent of time.
95% of responses made to notifications made under section 48 of the Telecommunications (Interception Capability and Security) Act 2013 provided in 20 days or less 95% 99%
Percentage of national security risk assessments completed within 30 days of receiving an application under the Outer Space High-altitude Activities Act 2017 100% 100%
Percentage of national security risk assessments completed within 50 days of receiving an application under the Outer Space and High-altitude Activities Act 2017 100% 100%
Percentage of advice provided to the Overseas Investment Office within 10 working days of receiving notification of the transaction 98% 97%

Notes:

The purpose of the Telecommunications (Interception Capability and Security) Act 2013 (TICSA) in relation to network security is to prevent, mitigate, or remove security risks arising from the design, build, and operation of public telecommunications networks, or from the interconnection of public telecommunications networks to networks in New Zealand or overseas.

The TICSA established obligations for New Zealand’s telecommunications network operators regarding network security. The Director-General of the GCSB has a regulatory role for network security under Part 3 of the TICSA. Part 3 of the TICSA also established a framework under which telecommunications network operators are required to engage with the GCSB about network changes or developments to their networks in areas of security interest. Many of these changes are currently driven by cloud adoption, increased demand for remote working, the rollout and expanded capacity of fibre optic cabling, and the transition to 5G services.

We work closely with the NZSIS to conduct national security risk assessments for the growing space industry under the Outer Space and High-altitude Activities Act 2017 (OSHAA), and Radiocommunications Act 1989. This national security risk assessment advice is used to inform Ministers.

Foreign direct investment is regulated by the Overseas Investment Office within Land Information New Zealand. Overseas investments are broadly considered to provide positive outcomes for New Zealand. However, foreign investment occasionally involves risks, including national security risks.

Both the GCSB and NZSIS support the Overseas Investment Office by providing national security advice on transactions which have been referred or notified under the Overseas Investment Amendment Act 2021. We work with the NZSIS to provide assurance to decision makers, as well as ensuring that investment into some of New Zealand’s most important and sensitive assets is done in a way that considers national security.

Assessment of achievement

  • The GCSB received 122 notifications under TICSA. We responded to 95% within 20 working days or less.
  • The GCSB received 25 notifications under OSHAA. We responded to 100% within 30 working days and 100%within 50 working days.
  • The GCSB received 46 notifications from the Overseas Investment Office. We responded to 98% within 10 working days.

Impact Standard 2025 Results 2024 Results
The Minister responsible for the GCSB receives best possible advice The Minister Responsible for the GCSB rates GCSB’s advice at least 3.5 (average) on a 5-point scale. Achieved (4.46) Achieved (4.6)

We survey our Portfolio Minister each year to assess their satisfaction with the advice we provide. The survey measures Ministerial satisfaction across four areas: general satisfaction, quality of advice, warrants, and overall performance.

Outcome: Social licence from New Zealand’s public allows GCSB to operate effectively

Impact Standard 2025 Results 2024 Results
Oversight agencies are confident in GCSB's legal compliance The Inspector-General of Intelligence and Security (IGIS) rates GCSB's compliance performance at or above the well-developed level in at least four of the five headings in the IGIS Annual Report certification of compliance systems. Achieved Achieved

Notes

The IGIS rates the GCSB’s compliance across five categories, with a rating assigned from a four-level scale: strong, well-developed, under-developed, inadequate. 

To achieve this measure, the GCSB must be well-developed or strong in four of the five categories. 

Assessment of achievement

As at 30 June 2025, the IGIS provided the following ratings for the GCSB’s compliance performance. 

  • Operational policy and procedure: Under-developed
  • Internal compliance programmes: Well-developed 
  • Self-reporting and investigation of compliance incidents: Well-developed 
  • Training: Well-developed
  • Responsiveness to oversight: Well-developed

These ratings will be confirmed when the IGIS Annual Report is published following the Prime Minister’s presentation to the House. The IGIS notes the ratings are extremely unlikely to change.

 

Impact Standard 2025 Results 2024 Results
GCSB meets its legal obligations: Official Information Act 1982 100 percent of OIA requests are completed within the legislated timeframe Not achieved Achieved
More than 50 percent of Ombudsman complaints are resolved or found in favour of the GCSB Achieved Achieved

Assessment of achievement

The GCSB completed 68 OIA requests during the performance year, with a median response time of 20 working days. The GCSB responded to 98.5 percent of requests within the legislated timeframe, with one request responded to late.

The GCSB was notified of two complaints to the Office of the Ombudsman during the reporting period. Both complaints were resolved with the Ombudsman finding in the GCSB’s favour: one by 30 June 2025 and the other after 30 June 2025.

One complaint was resolved with the Ombudsman finding in the GCSB’s favour; the other was resolved in the GCSB’s favour outside of the reporting period.

 

Impact Standard 2025 Results 2024 Results
GCSB meets its legal obligations: Privacy Act 2020 100 percent of Privacy Act requests are completed within the legislated timeframe Achieved Achieved
More than 50 percent of investigations by the Office of the Privacy Commissioner found that GCSB did not breach the Privacy Act and cause the complainant  Achieved Achieved

Assessment of achievement

The GCSB completed 34 Privacy Act requests during the performance year, with a median response time of 12 working days. All requests were responded to within the legislated timeframe.

The GCSB was not notified of any complaints to the Office of the Privacy Commissioner during this period.