NZIC / GCSB
bureaucrats, victim of their self-made ivory tower?



Date: Nov 2017 NZT
> Begin forwarded message:
> To: Rebecca Kitteridge <R.Kitteridge@nzsis.govt.nz>, info@nzsis.govt.nz
> CC: c.finlayson@parliament.govt.nz , S.Bridges@parliament.govt.nz
> CC:
Cheryl Gwyn <C.Gwyn@igis.govt.nz>, enquiries@igis.govt.nz
>
> Subject: Re: Spotlight on Security: Rebecca Kitteridge,   at Vic Uni.
> Ref: www.victoria.ac.nz/law/about/events/nz-centre-for-public-law/spotlight-on-security
>
> Dear Rebecca,
>
> Is NZIC (NZSIS, GCSB/NCSC/CERT, ...)  leadership aware enough that bureaucrats within the organisation structure created
> and still maintain several Catch-22's, which Prevent the NZIC from actually achieving several of its stated goals?
>
> For instance can you spot 2 (or more) Catch-22's in the statements from NZIC careers email{*1} below?
> Contradicting rules and requirements, which actually specifically prevent the type of person, which is described in job
> descriptions, from even being considered for those key positions. Because they would have to ignore/break several of the rules and
> also act in contradiction to elementary security guidelines, in order to be even considered by those who handle the job applications.
> ? Can you imagine which type of people do get selected instead of the described/required ones...
>
>
> Besides that, there are other structural paradox's visible.
> For instance in the fact that NZSIS & GCSB publish many statements with direct self-contradictions in them. Like: www.nzsis.govt.nz/about-this-site/#privacy
> Or the fact that NZSIS/GCSB is failing to even implement a functional Responsible Disclosure Procedure (RDP), in order to actually
> be able to deal with information offered by researchers/white-hats/ethical-hackers/students about potent structural
> vulnerabilities in the NZ Critical Infrastructure... Like for instance the continued use of inherently vulnerable (and sensitive
> information leaking) systems by GCSB and most other government sections, just because that's what the govt IT people are used
> to. Instead of putting a little effort into learning about (far simpler) systems, which are inherently not
> vulnerable at all(yes they do exist), which can also provide the needed services for the organisation.  
> In other words, the current structure still has what you describe as: "impenetrable exterior and isolation"
>
> Those are just a few simple examples from a rather lengthy list of visible issues within the NZIC current structure.
> Fundamental issues which radiate out into the NZ critical infrastructure companies like power supply, health and transport.
> Because your organisation is still setting a bad example and by doing so misinforming those organisations with misleading advice, it seems.
>
>
> There seems to be a "mind the gap!" difference between your presentation at Vic Uni last year, and how the NZIC is
> actually still operating at this moment in time.
> A gap which can be closed quickly with very little effort, without extra expenses. But only if leadership is willing to think/operate outside the square a bit more.
>
> So, we like to invite you for a rather informative chat about the subject, if you like?
>

>
> Kindest regards,
> *<you know..> 
>  "sed Quis Custodiet Ipsos Custodes?"

{*1}

 Careers NZIC <careers@nzic.govt.nz wrote:

 
  Good Morning,


 * Thank you for your email, to be considered for this vacancy you must include a fully completed application form.
    Without  this, we are unable to consider your applciaiton.  
 

Please submit a current CV, completed application form [DOCX, 78 KB] and covering letter outlining why you are interested in the role.
Full and complete applications can be sent to careers@nzic.govt.nz. Only completed applications will be progressed.
 
  Kind regards,
 
  NZIC Sourcing Team
  www.gcsb.govt.nz/ www.nzsis.govt.nz / www.nzic.govt.nz
 
 * The NZIC treats all applications for employment in the strictest confidence and we ask that you maintain a similar level of confidentiality.   
 * You are expected to exercise discretion during the recruitment process and throughout your career.
 
  --
 
 * This electronic message, together with any attachments, contains information that is provided in confidence and may be  subject to legal privilege.  
 * Any classification markings must be adhered to. If you are not the intended recipient, you must not peruse, disclose,   disseminate, copy or use the message in  any way.
  If you have received this message in error, please notify us immediately by return email and then destroy the original message.

The New Zealand Intelligence Community (NZIC) and the departments comprising the NZIC accepts no responsibility for changes to this e-mail, or to any attachments, after its transmission from NZIC.
This communication may be accessed or retained  for information assurance purposes.
Thank you.
 

 

______________________________________________________________________________
 
 * This email has been filtered by SMX cloud-based email.
  For more information visit http://smxemail.com
  ______________________________________________________________________________
      
 From: Careers NZIC <careers@nzic.govt.nz
 Return-Path: <careers@nzic.govt.nz
 Received: from out1101.nz.smxemail.com
  client-ip=203.84.134.32; envelope-from=careers@nzic.govt.nz
 DKIM-Signature: v=1; a=rsa-sha256; d=nz.smxemail.com; s=alpha; c=relaxed/relaxed;
 Received: from smtp.gcsb.govt.nz ([131.203.86.54]) by omr.nz.smxemail.com
     with ESMTP (using TLSv1.2 with cipher DHE-RSA-AES128-SHA  (128 bits)) id ....@mta1102.omr;
 Received: from 172.26.8.11 (EHLO Polaris.local.net) ([172.26.8.11])
           by seev3 (Liverton Technology Group - SmartGate) with ESMTP ID 2106337986
 Received: from Nightcrawler.local.net (Not Verified[172.26.10.11]) by Polaris.local.net with MailMarshal (v7,1,0,4874)
 Received: from WOLVERINE.local.net (172.26.2.16) by nightcrawler.local.net  (172.26.10.11) with Microsoft SMTP Server v14.2.347.0;
 Received: from WOLVERINE.local.net ([::1]) by Wolverine.local.net ([::1])  v14.02.0387.000


Note:

? Why can't NZIC / GCSB implement simple, standard, common sense, security measures to protect NZ against cyber attacks.
!? Why oh why.. is NZIC / GCSB still using those notoriously vulnerable products for crucial systems?

If you like to know why: just send us an email with that question ;-)

> Wikipedia:
> "Strictly speaking, a "Catch-22" is "a problematic situation for which the only solution is denied by a circumstance inherent in
> the problem or by a rule." For example, losing something is typically a conventional problem; to solve it, one looks for the lost
> item until one finds it. But if the thing lost is one's glasses, one can't see to look for them.
> - a Catch-22. The term "Catch-22" is also used more broadly to mean a no-win or absurd situation."
>
> "Ivory Tower: refers to intellectuals engaging in pursuits that are disconnected from the practical concerns of everyday life."

@Rebecca Kitteridge:
"I have been in my role as Director of Security for just over two years and I think this is a good point to stop and reflect on
 the organisation that I lead. In particular, I want to answer three main questions over the course of this lecture:
 ~ Firstly, what are the national security challenges that we face as a country and how are these changing?
 ~ Secondly, how well equipped is the NZSIS to meet these challenges? "

 "When I started as Director of Security two years ago, it was on the back of a State Services Commission sponsored Performance
 Improvement Framework report. I think a polite summary of the report was that the NZSIS, along with the wider New Zealand
 Intelligence Community, had many ‘challenges’. In reality the Performance Improvement Framework showed that this was an
 organisation that had major shortcomings.

 With the benefit of hindsight, the secrecy that the NZSIS had operated under
 since its inception had, in some respects,done it considerable damage.
 Because of its impenetrable exterior and isolation, I don’t think anybody was
 aware how far it had fallen behind over a period of decades, in terms of the
 systems, policies and procedures that one would find in any modern organisation.
 So the last two years have involved a significant series of internal
 improvements within the NZSIS. In almost every aspect, from strategy and planning to HR ...""
 /

> #---------------------------------------#
> On Tue, 21 Nov 2017
> From Vulnerable server: PSCAHT02.ps.ad.parliament.govt.nz (192.168.70.12) Microsoft Exchange Server 2010 Server (?last update sept 2015?), v14.03.0266.001;
> "C Finlayson (MIN)" <c.finlayson@parliament.govt.nz> wrote:
>   
> > On behalf of Hon Christopher Finlayson, thank you for your email. Please be assured that all correspondence is read and noted
> > by this office. Where the Minister has portfolio responsibilities for the issues raised, a response will be sent to you in due
> > course.
> >
> > While the Minister considers all correspondence to be important, if your email falls outside of his portfolio responsibilities,
> > or expresses a personal view, then your opinion will be noted and your correspondence may be transferred to another office or
> > there may be no further response to you.
> >
> >
> > Kind Regards
> >
> > Office of Hon Christopher Finlayson
> >
> > ________________________________
> >

 


 

 

Date: Sep 2017, 
To: s.bridges@ministers.govt.nz
Subject: NZ Govt cyber security projects seem to be failing? [Responsible Disclosure Procedure]


Dear Simon, It seems like the NZ Govt 'cyber security' efforts focus mainly on symptom mitigation and bureaucracy. While ignoring a few age old fundamental protection rules like "Need to know" , "Keep it simple", "Independent verification" and Logic! ...Instead of focusing on tasks like ~simply~ removing the cyber attack foothold options. We kindly invite you to take a few minutes to get informed about an effective safeguard method. Simon, I would like to hear your personal opinion on the subject some time. Kind regards, * ---- One current example, to showcase how a government can keep spending millions on 'cyber security' and never get the desired result:
#At the moment NZ Govt ICT people seem to be run around without a leash, enjoying fooling around without much concern for what they are supposed to focus on. The reasons behind why they do things the way they do can be explained face to face some time.
The following tomfoolery nerd humour (referring to a 1987 computer game), is what one of the NZ govt public facing government servers shows the internet. {Note: the published Microsoft document types, should never be allowed to be published in that form, according to well known security guidelines from many government security departments around the globe} " ETag: "1c1da9-Ac2e-525581695b971 Content-Type: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet X-Powered-By: Whiskers and kittens Server: Wiz/Nifta X-cBK: Tis but a scratch X-cBK: I've had worse " Such tomfoolery is tolerated, while at the same time some servers provide very specific information to the internet about being outdated, unsupported and vulnerable. Indicating that there is a serious lack of focus by not only 'ICT experts', but also all those expensive so called 'security experts' who are supposed to also keep ICT people on a very short leash. The example above is only a somewhat amusing tip of a grim iceberg. There are many diverse issues, like legal pitfalls concerning hidden sensitive data sharing with notoriously privacy violating and convicted foreign commercial 3rd parties, in direct contradiction with the DPMC official privacy statements. And data leaks with information like govt network access user-id's and document tracking codes, and so on.. and so forth... ---In conclusion: There seems to be a significant gap between what the NCSC/GCSB & Co have painstakingly put in a rather large amount of spiffy looking Documents describing the "intentions", And , the factual current status.
A gap which becomes rather self-evident when one sees that even they first chose to us low-security (but for ICT people fun and games) 'solutions', and then "try" to protect that toy store a bit by paying 3rd parties top dollar to put 'security measures' in between those critical infra services and the big bad internet.
And by doing so, not only making the overall structure far too complex, but also leaking huge quantities of state sensitive information to foreign 3rd parties and the public..
Ref: www.dpmc.govt.nz/sites/default/files/2017-06/nzcss-action-plan-annual-report-2016.pdf "I expect that the establishment of CERT NZ will help us build a more comprehensive picture of the size and nature of the cyber security threat to New Zealand. "
* Simon, don't get your hopes up on that expectation. Other far more advanced and wealthier countries have failed to create an effective GovCERT or NCSC, as one can deduct from the steady endless flow of media reports about the cyber security breaches each and every year.
GovCERT's/NCSC's can only become effective WHEN they have the Correct Pro-Active Role to start with..
"GOAL TWO: Cyber Capability , ACTION 5" described in that document, will be rather Counter-productive! Because it will mainly motivate the market players (including academic science departments) even more to keep the honey/funds flowing, by overselling and under delivering and thus keeping the lucrative 'problem' alive as long as possible.
{we have plenty of hard evidence on how that ravenous game is played by the 'cyber security' industry} Ref: www.connectsmart.govt.nz/about/governments-cyber-security-strategy Ref: www.dpmc.govt.nz/our-programmes/national-security-and-intelligence-oversight/national-security-governance-structure/strategic-risk-and-resilience-panel Ref: www.dpmc.govt.nz/sites/default/files/2017-09/case-study-4-cyber-security-gcsb.pdf * We can also inform you about one intriguing catch-22 construction, which is embedded in the statements logic in that 2017 'case study' document.. ? How about just removing a root cause, and by doing so changing all those numbers below very close to "0" ? - "In a typical Month, GCSB: detects 7 cyber intrusions affecting one or more New Zealand organisations receives 12 new incident reports that are self-reported by the organisation dealing with them receives 5 requests for some form of concrete assistance (requests come from both the private and public sector)." * ? That's a grand total of approximately 300!? per year, according to those GCSB figures.
Of course excluding the hundreds of not-reported and even more not-noticed cyber espionage incidents. --=: The primary key is Simplification, by applying basic Logic. The secondary key is simple removal of Conflicts-of-interest within such structures, by using a (more than 2500 year old) strategic maneuver. The third key is ..., ...oh, we should leave something to talk about, shouldn't we?

Just a few more  indicators:



 

Etc...



Date: Oct 2017
From: "S Bridges (MIN)" <S.Bridges@parliament.govt.nz>
/O=PARLIAMENT/OU=EXCHANGE ADMINISTRATIVE GROUP (FYDIBOHF23SPDLT)/CN=RECIPIENTS/CN=S BRIDGES276
Via: PSCAHT02.ps.ad.parliament.govt.nz (192.168.70.12) with Microsoft Server v14.03.0266.001 
Via: PSMAIL06.ps.ad.parliament.govt.nz (169.254.1.175with Microsoft  Server v14.03.0266.001
Via: PCVMEXHT01.ad.parliament.govt.nz (172.27.2.22) with Microsoft  Server v15.1.1034.26 via Frontend Transport
X-MS-Exchange-Organization-MessageSource: StoreDriver
X-MS-Exchange-Organization-MessageDirectionality: Originating
X-MS-Exchange-Forest-MessageScope: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-Organization-MessageScope: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-Organization-AuthSource: PSVMCAHT01.ps.ad.parliament.govt.nz
X-MS-Exchange-Organization-AuthAs: Internal
X-MS-Exchange-Organization-AuthMechanism: 03
X-MS-Exchange-Organization-MessageLatency: SRV=PSMAIL06.ps.ad.parliament.govt.nz
X-MS-Exchange-Organization-HygienePolicy: Standard
X-MS-Exchange-Organization-AVStamp-Mailbox: MSFTFF;1;0;0 0 0
X-MS-Exchange-Organization-Recipient-Limit-Verified: True
X-MS-Exchange-Inbox-Rules-Loop: S.Bridges@parliament.govt.nz

Subject:    Read: NZ Govt cyber security projects seem to be failing? [Responsible Disclosure Procedure]

On behalf of Hon Simon Bridges, thank you for your email.
If your message relates to a ministerial portfolio or constituent matter, your email will be placed before the Minister for his consideration and you may receive a response in due course.

Yours sincerely,

Office of Hon Simon Bridges
Minister for Economic Development | Minister of Transport | Minister for Communications
Leader of the House | Associate Minister of Finance | Member of Parliament for Tauranga

www.simonbridges.co.nz | www.facebook.com/simonbridgesmp
www.twitter.com/simonjbridges
| www.instagram.com/sbridgesnz

 

 

 



 

 

Incompetence:
 lack of physical or intellectual ability or qualifications

Ivory Tower:
 A state of privileged seclusion or separation from the facts and practicalities of the real world. ‘the ivory tower of academia’   

Nepotism:
 The practice among those with power or influence of favouring relatives or friends, especially by giving them jobs

Catch-22:
 A dilemma or difficult circumstance from which there seems no escape because of mutually conflicting or dependent conditions.

Paradox
:
 A seemingly absurd or contradictory statement or proposition which when investigated may prove to be well founded or true.

 

None of the following ''experts'' actually care to follow the fundamental protection guidelines.

Career bureaucrats
who

And by doing so,
create a false sense of security
with far reaching counterproductive concequences

 

 


> From: postmaster@FMS-Justice.net.nz>
>
> X-IronPort-AV: E=McAfee;i="5900,7806,8749"; a="22109166"
> X-IronPort-AV: E=Sophos;i="5.45,426,1508756400";  d="scan'208,217";a="22109166"
  Received: from (private information removed) by  with SMTP; 20 Dec 2017, If the problem continues, please contact your helpdesk.
>FMSWMOJEX03.Internet-Receive.FMS-Justice.net.nz (10.99.30.53) with Microsoft Server 2010 SP3 RU18 v14.3.361.1;
> Content-Disposition: inline


Confidentiality notice:
This email may contain information that is confidential or legally privileged. If you have received it by mistake, please:
(1) reply promptly to that effect, and remove this email and the reply from your system;
(2) do not act on this email in any other way.
Thank you.

-----------------------------

 




Why are the NZ 'intelligence'/'security' services allowing such Critical Infra maps to be published?


https://web.archive.org/web/20170406161925/http://www.freemanmedia.co.nz/sites/default/files/imagecache/full_width/screenshots/17/3/energy_infrastructure_map_freeman_media_2017_v656_web.jpg


Etc....
Etc......


If the problem continues,=
 please contact your helpdesk.