
French Authorities Block Greenpeace Ship From Participating In UN Ocean Conference
Greenpeace International will write a formal letter of complaint to the United Nations, deploring the behaviour of the hosting French government. Civil society participation is a core element of the UN Ocean Conference.
The presence of the Arctic Sunrise in Nice would coincide with the 40th anniversary of the bombing of the Rainbow Warrior by French secret services in Auckland.
Greenpeace Aotearoa spokesperson Ellie Hooper says, "It's ironic that so close to the 40th anniversary of the French Government's attempt to silence Greenpeace here in Auckland by bombing the Rainbow Warrior, the French Government is again trying to shut us down by blocking our ship from entering Nice."
"But just like we were not silenced then, neither will we be silenced now. Climate change, ecosystem collapse, and accelerating species extinction pose an existential threat, and our work has never been more important."
The Arctic Sunrise had been invited by the French Ministry of Foreign Affairs to participate in the "One Ocean Science Congress" and in the Ocean wonders parade taking place right before the UN Ocean Conference.
Greenpeace International had intended to deliver the messages of three million people calling for a moratorium on deep sea mining to the politicians attending the conference. The ship's entry to Nice has now been blocked.
Mads Christensen, Greenpeace International's Executive Director, says, "The French authorities' attempt to silence fair criticism ahead of this UN Ocean Conference is clearly a political decision and is utterly unacceptable. Greenpeace and our ships have been working peacefully to protect the oceans for decades. The Arctic Sunrise highlighted the failure of the French government to properly protect its Marine Protected Areas - where bottom trawling is still permitted - and now we are being punished.
"France wants this to be a moment where they present themselves as saviours of the oceans, while they want to silence any criticism of their own failures in national waters. We will not be silenced. We believe the voices of the three million calling for a stop to deep sea mining must be heard in Nice. Greenpeace and the French government share the same objective to get a moratorium on deep sea mining, which makes the ban of the Arctic Sunrise from Nice even more absurd."
Millions of people around the world have joined Greenpeace's campaign to stop deep sea mining from starting. In 2023, the Arctic Sunrise crew took action at sea to bear witness to the threat of the deep sea mining industry. They peacefully protested against The Metals Company, which had been publicly accused of "environmental piracy" by the French government a few weeks ago, given their attempt to bypass international law by requesting an exploitation permit through President Trump's administration.
Right now, the Rainbow Warrior is in the Tasman Sea to expose the damage being done to ocean life there and will be in New Zealand to mark the anniversary of the bombing in Auckland on 10 July.
Onboard photographer Fernando Pereira died in the attack, which came soon after Operation Exodus, in which the Greenpeace flagship had evacuated victims of American nuclear tests on Rongelap Atoll and was preparing to oppose French nuclear tests on Mururoa Atoll.
Following the first-ever deep sea mining licence application by The Metals Company to the United States, Greenpeace says that now is the time to resist and stop this industry from starting.
This UN Ocean Conference will be a key moment to galvanise support ahead of the July meeting of the International Seabed Authority, the UN regulator.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Scoop
19 hours ago
- Scoop
Minister Proud Of Potshots In Seabed Mine ‘Culture War'
The oceans and fisheries minister says Supreme Court judges and local body politicians have been cowed by fear in a culture war over seabed mining. Minister Shane Jones was in New Plymouth on Friday to deliver a stump speech for New Zealand First. Afterwards he said confrontation and fear had led to court rulings that blocked would-be seabed miners, and votes by local councils against the mine. 'The Supreme Court, when it got involved, it was confronted with a highly charged atmosphere which is still prevailing, which is what's driving fear in your local government to stand up against this belligerent, well-organised, rowdy bunch of activists,' said Jones. 'I think these natural resource debates have turned into a culture war.' Jones freely admitted taking shots from one side of the battle lines – including calling South Taranaki mana whenua 'pixie-like hapūs'. 'I am never, ever going to take a backward step to the well-drilled, highly-orchestrated, Greenpeace-orientated campaigners who probably operate out of the local iwi office anyway, such is the level of cross-contamination.' Opponents have fought the proposal to mine the seabed off Pātea since before the first official application in 2013, winning in the High Court, Court of Appeal and finally the Supreme Court in 2021. Spearheaded by Ngāti Ruanui, opposition spread to neighbouring Ngaa Rauru Kiitahi and hapū of Ngāruahine. In the Supreme Court tribes were joined by the Taranaki-Whanganui Conservation Board, the government's Environmental Protection Authority, Kiwis Against Seabed Mining, Greenpeace and Forest & Bird. Also party to the court challenge were Fisheries Inshore New Zealand, the New Zealand Federation of Commercial Fishermen, Southern Inshore Fisheries, Talley's Group, Cloudy Bay Clams and Te Ohu Kaimoana. Jones himself chaired Te Ohu Kaimoana before entering Parliament, controversially continuing to earn an annual fee of $70,000 as a director despite being an MP. Taranaki's eight Crown-mandated iwi agencies have collectively declared against the mine. District councils of South Taranaki, Whanganui and New Plymouth voted to oppose seabed mining after hearing from the miners and from community opponents. Jones claimed 'an enormous amount of brouhaha driven by misinformation' and couldn't think why councillors would stand against the mine – except out of fear as local elections loom. As during his last Taranaki visit, the Minister of Oceans and Fisheries, of Resources and of Regional Development demonstrated a loose grip on details – in spite of his repeated vocal support for the mine. He told his party's public meeting seabed mining was like dredging Port Taranaki – an argument made last month by New Plymouth councillor and former NZ First candidate Murray Chong, who was in the audience. 'Where do you put all the dredgings?' asked Jones. 'I'll tell you where you put them: You put them back into the host environment otherwise known as the coastline of Taranaki.' Over the past four years some three million tonnes of blacksand dredgings from Port Taranaki have been dumped in two approved zones near the shoreline, to keep the harbour clear and restore sand drift to New Plymouth beaches reduced by the port's breakwaters. The ongoing port dredging is less than two percent of the proposed seabed mine's waste: every four years Trans-Tasman Resources would discharge 180 million tonnes of seabed sediment – a recognised pollutant – into the abundant waters of the Pātea Shoals. Trans-Tasman's mining ship would take just 18 days to match four years of port dredging, and continue to do so for at least 20 years at the boundary of the 12-mile territorial limit. The subsidiary of Australian company Manuka Resources wants Fast-track approval to suck up 50 million tonnes of blacksand annually to extract iron, titanium and vanadium and then dump 45 million tonnes back into the marine environment. More mining ships are likely if the application sets a Fast-track precedent, with a second bid by Trans-Tasman's former chief financial officer on hold pending the results. Jones challenged the half-dozen journalists probing him about the mine. 'Don't you find this debate amongst yourselves tiresome?" he asked. 'I mean, haven't you got anything to talk about beyond this?'


NZ Herald
20 hours ago
- NZ Herald
French law reintroducing banned pesticide sparks million-signature petition
More than one million people in France have signed a petition opposing the reintroduction of a pesticide harmful to bees. Photo / 123RF Listening to articles is free for open-access content—explore other articles or learn more about text-to-speech. More than one million people in France have signed a petition opposing the reintroduction of a pesticide harmful to bees. Photo / 123RF More than a million people have signed a petition urging the French Government to ditch a law allowing the reintroduction of a banned pesticide experts say is deadly to bees. The so-called 'Duplomb law' has stirred public anger for permitting a return of acetamiprid – a chemical known to be toxic to pollinators such as bees and to ecosystems. It was adopted on July 8 but has not yet come into effect. A 23-year-old master's student launched the petition against the law on July 10, with support quickly snowballing with the backing of many, including actors and several left-wing lawmakers. More than 500,000 people signed it in 24 hours from Saturday and Sunday alone. The law's proponents however argue farmers face too much regulation in France as it is and allowing them to use acetamiprid again would help reduce the constraints they face. National Assembly Speaker Yael Braun-Pivet today ruled out abandoning the legislation, named after the conservative lawmaker who proposed it, as it would 'save a certain number of our farmers'.


NZ Herald
3 days ago
- NZ Herald
Dozens of Russian spies exposed, UK imposes largest-ever sanctions
This is Britain's largest-ever set of sanctions against Russian intelligence services. Britain has announced its largest-ever sanctions against Russian intelligence, with the move supported by Nato allies. Photo / Getty Images Ed Bogan, a former CIA agent, told the Telegraph: 'Sanctioning these GRU units in particular is crucial, given the depth and breadth of their grey zone operations across numerous countries, which often go unseen or at best, only partially understood. More light on them is needed, but more importantly, more pressure and more action against them.' British efforts to expose the shadowy operations were supported by the US's FBI as well as intelligence services from across the Nato military alliance. Among the operatives named are Ivan Yermakov and Aleksey Lukashev, two senior members of GRU's Unit 26165 of elite hackers accused of targeting Yulia Skripal's devices before Moscow's botched attempt to murder her father. Authorities are keen to stress that cyber attacks not only disrupt key infrastructure but can also be used to facilitate physical attacks, such as the failed assassination attempt on Sergei Skripal. The former Russian spy and his daughter were poisoned in one of the most brazen uses of chemical weapons on British soil in March 2018. There remain concerns about the safety of the Skripals, although it is not thought Friday's disclosures are linked to any renewed imminent threat to their lives. British authorities later attributed the assassination attempts, using one of the deadliest man-made chemicals, to Russia's military intelligence. Yermakov and Lukashev also feature on an FBI wanted list for their alleged roles in interfering with the 2016 US presidential election, won by Donald Trump. Unit 26165 has also been named in investigations into alleged hacks around the French presidential elections and political interference in Germany. It was responsible for the creation of 'X-Agent', a malware used to hack Yulia Skripal's mobile phone. The GRU intelligence officers targeted her phone with 'malicious' malware known as X-Agent in 2013, five years before the assassination attempts in which an innocent British woman, Dawn Sturgess, was killed after she was poisoned with Novichok discarded by the GRU officers sent to kill Skripal. The US Justice Department charged six Russian GRU officers with hacking and using malware to attack other countries and help Russia. Photo / Getty Images X-Agent was developed by a Russian hacking gang known as Fancy Bear, which is linked to the GRU. It was first discovered by the West in 2015 and is used by Russia to infect Apple's iPhones and Android devices and can activate a device's microphone and record audio as well as harvest text messages, contact lists, photos and geolocation data. X-Agent has been used by Russia to pinpoint the movements of Ukrainian troops on the battlefield. Yulia Skripal, who lived in Moscow, was tracked to Britain on a visit to her father in Salisbury. Two GRU agents followed her to Britain and smeared Sergei Skripal's door handle with Novichok, a military-grade nerve agent. British officials are confident the country's voters would not be swayed by similar Russian disinformation attempts. In 2022, their same unit was said to be responsible for conducting online reconnaissance to help position Russian strikes against the Mariupol theatre in Ukraine, killing hundreds of women and children who were sheltering from Putin's invasion forces. Outside the building in the port city, those sheltering had written the word 'children' in giant Russian lettering. The theatre was later hit by Russian missiles, despite it obviously not being a military target. Russian forces bombed a theatre in Mariupol on March 16, 2022, during its invasion of Ukraine. Photo / Getty Images The same unit was credited with hacking internet surveillance cameras between 2022 and 2024 across Bulgaria, France, Germany, Greece, Italy, Moldova, Poland, Romania, Slovakia, Ukraine, the Czech Republic and the Netherlands to monitor military assistance being sent to Kyiv. GRU units 74455, 26165, 29155 were also hit with UK sanctions, which means businesses registered in Britain will not legally be allowed to provide them with services that could assist their sabotage campaigns. It is alleged the Russian spies are responsible for a series of hacks and attacks on European military support for Ukraine. British and European intelligence officers have found repeated examples of targeted attacks against port infrastructure, transport hubs, border control points and government infrastructure involved in aid shipments. British officials fear that the GRU has used the battlefields of Ukraine as a testing ground for further development of a range of cyber capabilities, which would one day be turned on Western countries. The spies were linked to hacking, bombings and arson to disrupt support for Ukraine. Photo / Getty Images In Britain, three men were recently found guilty of an arson attack on an east London warehouse involved in shipping humanitarian aid and Elon Musk's Starlink satellite internet systems to Ukraine. Prosecutors said the attack could be linked to Russia's Wagner Group of mercenaries. British investigators were also probing whether Russian agents had sent an incendiary device through the post after it ignited at a DHL hub in Birmingham last year. A string of similar incidents has been reported across Europe, including warehouse fires and sabotage of train lines. GRU Unit 29155 has been enlisted by Russia's top decision-makers to mount a campaign of attempted assassinations, including that of the Skripals, in recent years. In the past decade, it has been blamed for explosions at weapons depots, where products destined for Ukraine were stored, in the Czech Republic and Bulgaria. It was also behind a Russian proxy campaign to hire young Afghans to advise and fund Taliban attacks against US-led coalition forces before the American withdrawal in 2022. David Lammy, Britain's Foreign Secretary, said: 'GRU spies are running a campaign to destabilise Europe, undermine Ukraine's sovereignty and threaten the safety of British citizens. 'The Kremlin should be in no doubt: we see what they are trying to do in the shadows and we won't tolerate it. That's why we're taking decisive action with sanctions against Russian spies. Protecting the UK from harm is fundamental to this Government's Plan for Change. 'Putin's hybrid threats and aggression will never break our resolve. The UK and our allies' support for Ukraine and Europe's security is ironclad.' Another group targeted is the 'Africa Initiative', which runs social media troll farms ultimately controlled by Putin's spies, accused of pushing fake news and trying to scupper life-saving global health initiatives. The Russian spies on the sanctions list will be hit with travel bans and asset freezes, as well as British-registered businesses being barred from assisting them in any form. Sir Gavin Williamson, the former Tory defence secretary, said the news shows how Britain needed to ramp up defence spending as soon as possible. 'This is incredibly serious, and it shows the ever-mounting threat that we have to face. It also underlines the fact that it's right to continue to increase the investment, not just in terms of our Armed Forces, but how essential it is for our security services as well,' Williamson said. 'It shows that the threats abroad are also threats at home. It shows that the urgency for the extra money is absolutely acute, because what you can guarantee is while these [spies] have been revealed, there'll be many more that continue to operate. 'We need to make sure our security services and our military have those resources to properly tackle them, and that needs to happen today and not tomorrow.' Williamson added: 'It shows how pervasive the tentacles of Russia really are. We saw that very starkly with the Skripal poisonings and the Salisbury attack. This was a foreign nation conducting a kill operation here in the United Kingdom. We shouldn't forget that, because it demonstrates how far that they will go to deliver on their aims.' Politicians says Britain must urgently strengthen its security services and military to confront growing threats. Photo / Getty Images US President Donald Trump joined Nato allies in condemning Russia, including for its war against Ukraine, in a statement issued by the alliance after Britain's sanctions were announced. 'These attributions and the continuous targeting of our critical infrastructure, with the harmful impacts caused across several sectors, illustrate the extent to which cyber and wider hybrid threats have become important tools in Russia's ongoing campaign to destabilise Nato allies and in Russia's brutal and unprovoked war of aggression against Ukraine,' the Nato statement said. Insiders hailed the statement as another sign of Trump's newfound support for Ukraine's efforts to defend itself against Russian aggression. The US President has previously vetoed statements blaming Moscow for Europe's largest conflict since World War II, including in a communique for the recent Nato summit in the Hague. The British Government made the announcement after mounting scandal over a leaked list of 24,000 Afghans, British spies and special forces soldiers, which has been covered up for years by super-injunctions. Exposed spies Aleksandr Vladimirovich Osadchuk has risen through the ranks of the Russian Ministry of Defence to become the head of the main directorate for innovative development – a key 'cyber-thinker' within the military hierarchy. A career military officer and longstanding GRU operative (Unit 26165), Osadchuk was accused by the FBI of orchestrating large-scale cyber operations targeting international entities, particularly during the 2016 US presidential election, focusing on hacking and document leaks. Yevgeniy Mikhaylovich Serebriakov, 44, is a seasoned cyber-operator assigned to the GRU's Main Directorate (Unit 26165). Serebriakov is officially linked to the 2018 cyber attack on the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands, which was disrupted by Dutch officials before hackers could breach it. According to the FBI, he specialises in covert operations abroad targeting anti-doping agencies and sporting federations, including during the 2016 Summer Olympics and Paralympics, which were held in Brazil. Serebriakov has been linked to high-profile incidents involving reconnaissance and targeted attacks, often operating under diplomatic cover, holding seven known aliases. Anatoliy Sergeyvich Kovalev embodies a range of GRU tactics: cyber, biological and covert operations. A high-profile GRU operative (Unit 26165), he is known for allegedly spearheading cyber attacks on US state and federal election systems, most notably in 2016, plus interference into critical infrastructure in Ukraine and French political organisations. He has been criminally indicted in Pennsylvania, US, alongside six GRU officers, facing charges for conspiracy to commit computer fraud, wire fraud and interference in critical infrastructure and democratic processes. Kovalev is also under investigation by the FBI for possible ties to Kremlin-directed nerve agent investigations. Ochichenko is a GRU operative associated with Unit 29155, involved in covert operations, including cyber espionage and sabotage. His role is thought to involve technical support or operational deployment of cyber tools used to infiltrate networks, disrupt communications, and gather intelligence. Artem Valeryvich Ochichenko is a GRU operative associated with Unit 29155, involved in covert operations, including cyber espionage and sabotage. His role is thought to involve technical support or operational deployment of cyber tools used to infiltrate networks, disrupt communications, and gather intelligence. Ochichenko joined Kovalev in being charged by a federal grand jury for targeting critical infrastructure in Ukraine and political organisations in France, as well as operations against Georgia. Vladislav Yevgenyevich Borovkov is a mid-ranking GRU officer implicated in cyber espionage and hacking campaigns targeting Western governments. The FBI has accused him of targeting and compromising critical infrastructure in dozens of Western countries. He is wanted by the FBI for alleged cyber attacks between December 2020 and August 2024. Unlike his colleagues, the spy agency does not know where Borovkov is located. The FBI has a US$10 million ($16.7m) reward for anyone who can provide information leading to his whereabouts. Nikolay Aleksandrovich Korchagin is another GRU operative within Unit 29155, involved in cyber operations targeting critical infrastructure and political entities. Like Borovkov, the FBI has accused him of criminal cyber activities between December 2020 and August 2024, and has a $10m reward for information on his whereabouts. He is known for his role in hacking campaigns aimed at stealing sensitive data and disrupting systems, with a focus on international targets. Yuriy Federovich Denisov, another GRU operative within Unit 29155, hacked campaigns targeting global infrastructure, focusing on espionage and data theft. Like Borovkov and Korchagin, he is accused of criminal cyber activities by the FBI between December 2020 and August 2024, and stands accused of targeting critical infrastructure across dozens of Western countries. Denisov is wanted by the FBI with a US$10m reward for information leading to his arrest. A senior GRU officer in Unit 26165, Ivan Sergeyevich Yermakov is known for orchestrating spear-phishing campaigns during the 2016 US presidential election. With Osadchuk, he was accused of stealing documents from US officials during the election before releasing them to interfere with its outcome. He was also accused of targeting anti-doping agencies during the 2016 Summer Olympics, with Serebriakov. Aliases include 'Kate S Milton', 'James McMorgans' and 'Karen W Millen', according to the FBI. Aleksey Viktorovich Lukashev has served as a senior lieutenant in Russia's GRU. Like many others on this list, he has been charged in the US for his part in the conspiracy to interfere with democracy during the 2016 US election, including by focusing on stealing and leaking sensitive documents. Aleksey Sergeyevich Morenets, an officer assigned to Unit 26165, is known for his involvement in the GRU's cyber activities targeting international organisations, particularly the 2018 cyber attack attempt against the OPCW in The Hague, with Serebriakov. The FBI has also accused him of targeting anti-doping agencies across the US and globally during the Summer Olympics and Paralympics in 2016, joining charges that were filed against Yermakov and Serebriakov. Sergey Aleksandrovich Morgachev is another GRU officer and a senior member of Unit 26165, holding the rank of lieutenant colonel. He is accused of hacking campaigns targeting political and governmental entities during the 2016 US presidential election. Artem Adreyevich Malyshev is another GRU officer and a senior lieutenant of Unit 26165. The FBI has accused him of hacking campaigns targeting political and government entities during the 2016 US presidential election. He was also charged with aggravated identity theft, false registration of a domain name, and conspiracy to commit money laundering during this period. Malyshev is also one of seven Russians to be accused of targeting anti-doping agencies during the 2016 Summer Olympics. Sergey Sergeyevich Vasyuk and Andrey Eduardovich Baranov are linked with Unit 29155, involved in cyber and covert operations. Suspected activities include hacking and espionage efforts targeting foreign infrastructure and political entities to support Russian intelligence. Vitaly Aleksandrovich Shevchenko, another member of Unit 29155, was one of three Russian nationals previously sanctioned by the Council of the European Union for carrying out 'malicious cyber activities' against Estonia. Yuriy Leonidovich Shikolenko is a GRU operative associated with Unit 29155. His activities include hacking and espionage efforts targeting foreign infrastructure and political organisations. Victor Borisovich Netyksho is one of the 12 GRU officers wanted by the FBI for interference in the 2016 presidential election. The FBI had photos of 11 officers but Netyksho remained faceless until a Ukrainian 'hacktivist' group intervened. The personal data and a photograph of Netyksho was published by 'Kiber Sprotyv', which translates to 'Cyber Resistance' in 2023. They managed to get hold of the information by hacking the email account of his wife, Oksana Serhiyivna Netyksho. He is thought to be a senior GRU officer and commander of Unit 26165. Dmitriy Aleksandrovich Mikhaylov is a GRU operative within Unit 29155, involved in cyber operations targeting global infrastructure. His activities focus on hacking and espionage, targeting political and governmental entities. Artyom Sergeevich Kureyev is a Russian individual associated with disinformation campaigns. As chief editor of the African Initiative, Kureyev is allegedly involved in creating and spreading false narratives to manipulate public perception. According to Bloomberg, he has had frequent contacts with around half a dozen European journalists, often arranging and covering their travel costs for some of them to visit occupied territories in Ukraine. Documents seen by the news outlet show he appears to have paid to plant news articles. African Initiative is a Russian media and influence organisation, masquerading as a news agency and information platform. It has sought to present itself as a Moscow-based news agency that covers events across the continent. But in reality, it is considered to be the 'main vehicle' for Russia's disinformation activities across the continent, according to a report by Viginum, a French agency which monitors foreign digital interference. This unit, known as Unit 29155 – which includes Ochichenko – is a covert Russian military intelligence facility under the GRU. It is tasked with training operatives in sabotage, assassination, and unconventional warfare. Unlike traditional cyber units, this secretive centre prepares agents for covert operations abroad, including targeted assassinations and subversion tactics. A masked officer cordons off a carpark in Salisbury, Britain, near the bench where Sergei Skripal was found in March 2018 after being poisoned with a nerve agent. Photo / Getty Images It has been linked to several high-profile incidents such as the poisoning of Sergei Skripal in Britain and the attempted assassination of defectors across Europe. Unit 26165, also known as the 85th Main Special Service Centre, is a key cyber warfare unit of the Russian GRU, based in Moscow. Led by Netyksho, it specialises in offensive cyber operations, including hacking, data theft and spear-phishing campaigns targeting government, political and private sector entities around the world. Unit 26165 is notorious for its role in high-profile cyber attacks, including the Democratic National Committee (DNC) email hack during the 2016 US presidential election. Unit 74455, known publicly as Sandworm, is another specialised division focusing on cyber operations, including the deployment of malware, hacking campaigns, and disinformation. The military unit is suspected of being behind a cyber attack against the Ukrainian power grid in 2015, interference into the French presidential election in 2017, and a cyber attack on the 2018 Winter Olympics opening ceremony. In August 2023, a joint report by the intelligence agencies in the US, Britain, Canada, Australia and New Zealand accused Sandworm of a new malware campaign. The malware, dubbed 'Infamous Chisel', targeted Android devices used by the Ukrainian military.