October  2023
 Subject: Question about Svalbard and seedbank protection status quo.
 To: firmapost@sysselmesteren.no,
 Cc: Stefan Schmitz  @croptrust.org, Sigurd Lunde  @statsbygg.no , cab-breton   @ec.europa.eu

 Dear Lars Fause,

 Would you like to have a informal chat about why the protection of Svalbard government vital infrastructure and *probably also the seed bank, is still lacking some basic protection measures against espionage and sabotage?
 But more importantly how you personally can make sure that the Svalbard district under your supervision, does get its protection in decent order to prevent ongoing espionage and potential sabotage..
 This isn't a sales pitch, nor is it politically motivated. It's merely about findings from a long term research project, sharing useful findings information for the benefit of the population.

 It's not a pleasant subject of course, and in itself also a wasps-nest to even mention the subject.
 Especially since the 2010 news-media publications about Norway's DSS and Nasjonal sikkerhetsmyndighet and Other 'security services' clear failure to get their act together on infra protection, ..and the consequent blatant continuation of ostrich-politics which caused the problems to start with..
 Which brings us to 2023 (10+ years later) whereby it is publicly visible that Norway govt still has not managed to even implement several essential basic protection measures, but instead has continued (like gophers undermining the area) with adding more and more odd access options with internet connections which fail to even comply with known mandatory security standards, and.. still leaking a steady stream of sensitive internal information to the outside and thus also to hostile actors.

 The reason why the Norwegian security services, (just like many other governments), don't get their act together, to even enforce only 3 most essential very simple to implement security rules, ..is that there is a Catch-22 in their chosen method{*1}.
 Which in effect means that they rather turn a blind eye on ICT related projects which clearly are Not compliant with official security policies. This continues to happen large-scale because the individual functionaries don't want to make a fuzz about wrong/(even illegal) choices made by ivory tower style govt IT projects.
 * After all, those 'security' functionaries do Not get paid a cent more if they bother to have the courage to tell those (fellow govt employees) IT projects people to stop ignoring some of the security regulations. In contrary, those 'security' functionaries do risk getting their careers hampered as a result of "getting in the way" of prestigious IT related projects by those who make a very lucrative profit from those projects and the (backstabbing) power influence that comes with it. As you probably know ;-)

 So far a bit of background information on why Nasjonal sikkerhetsmyndighet/Departementenes sikkerhets- og serviceorganisasjon can't even decently protect their own classified data handling and control infrastructure, ..so they stand no chance of taking "care" of the State Vital Infrastructure, as has become rather obvious since 2010 and after.

 This next section contains only a few specific details which may be outside your field of knowledge. But by reading it all you do to get a bit of a picture about context and something specific to chat about with your colleagues.
 # A very simple and telling example has been added in the form of a picture of an access path to a govt system of which there are many with similar issues. A picture which shows a thing or two about how projection of systems like *prod.sysselmesteren.no and the rest of the infrastructure is done rather carelessly & lazy/incompetent.
 Simple fact is: That such an 'public' access path should never have been allowed by 'security' services, to even exists! And besides that, the system owners should not have been allowed to 'advertise' various bits of information about it and its structural flaws. Therefor "SMS724.sysselmannen.svalbard.no,S4ZX790" and others are visible.
 Since there is "no need" at all for it to be even approachable by hackers, curious students or those known hostile actors, who seem currently ''allowed'' to use all kinds to child's-play trickery to gain access without it ever being noticed by the owners of those back-end govt systems nor by those govt security services having a clue about what is going on outside their field of view under the radar. The extra Cloudflare 'security' -external- service in between, in fact makes it even more vulnerable because it obscures some key events from view, sadly.
 Especially, since making foolproof sure that only very specific authorized and identified people can have access, is in fact a simple matter of applying just 2 of the 3 rules, which makes absolutely sure that unwanted visitors can't even find ways to gain any form of access to those systems and data. [technical and procedural details can be shared in confidential conversation]

 Observation: Svalbard/Spitsbergen has a relatively small inhibited area, with few people and very little digital/computer infrastructure per square mile of the whole geolocation area. Most of the key digital infra is located remotely in Norway and some other countries far away.
 But Svalbard at the same time is a location where The seed bank is located, and also a prime target of .ru unwanted strategic attention the past years, it seems...

 Now for a more pleasant subject: a way forward.
 It is in fact rather simple to make absolutely sure that unwanted digital/cyber 'visitors' can not even get close to sensitive information and control systems.
 Not only those few systems and which are located locally, but also those located in mainland Norway.
 The only thing that actually needs to be done, is rigorously enforce 3 specific basic security rules! (which the 'security' services have clearly failed/neglected to do so the past 2 decades.)

 There is no need at all for any extra investments, or products, or services, or complex methods, or extra policies.
 ~ All that is actually needed, is factual strong "enforcement" of just 3 common sense rules.

 1. Keep IT simple s.... (KISS principle)
 2. "Need to know" principle
 3. "Integrity Safeguard" principle.
 Those 3 most elementary age old rules as stated above, are boiled down and paraphrased core values, which have been described in far too bureaucratic over-complex texts in most official security policies and standards like ISO27001, etc. So those core rules are not clearly visible nor emphasized in those far too bureaucratic current policies and standards, because the essence has been lost in the overwhelming listings of various sub-details and administrative focus which had derived from those more sensible core principles as far back as the 1980's as in "DoD 5200.28-STD aka Orange Book".

 So... focusing on just those 3 core rules, and enforcing them resolves the current cyber-vulnerabilities problem for just our vital cyber-infrastructure and also those connected physical restricted area access security systems.
 This may sound far too simple and easy, to believe that that is all it takes to ensure that hostile actors can no longer get access to those sensitive data handling systems and stop the ongoing blatant sensitive data leakage/breaches which the Norwegian govt has been unable to prevent due to a Catch-22 in its core management structure.
 Any "Egg of Columbus" solution can be substantiated just as easy, ..but as with the Egg story, it can only be understood "if" you are willing to witness how it the puzzle is solved, to see it for yourself and then grasp the full context of the initial problem context dilemma, and thus also its natural logic solution.
 It's not rocket science, its about simple common sense logic and thinking outside the box.

 So the key question is:
 Lars, do you as current Governor, want the Svalbard/Spitsbergen sensitive and classified data and infrastructure to be defended properly against hostile actors and stop the data leakage/breaches ?
 _ If not, why not?
 _ If so, lets meet in person and learn how it can be done, in order to put a very simple foolproof Safeguard structure actually in place. Then you can use that essential knowledge yourself to make things happen to ensure a more decent defense structure for the area under your supervision.

 Med venlig hilsen,

 Snr security officer and researcher.

 -------
 Soapbox, Post Scriptum:
 The 'security' and IT people who are 'responsible' for the infrastructure, will almost certainly have many plausible Sounding excuses and use various known forms of self-justification.
 But the bottom-line is: that they fail to actually live by sensible and govt mandatory known rules and regulations, because it is still more lucrative for them personally to ignore a few of those very simple rules, ...sadly.
 Perhaps a bit like some highly educated people who keep gobbling down sweets, even after the hospital specialists told and showed them that they already have type 2 diabetes and where in hospital because a few toes had to be amputated due to predicted body system failures. Just like the majority of state project people keep connecting key access systems and odd gateways to the big bad global Internet, without bothering to first making sure that they at least chose options with are proven to be actually "secure by design" and tested to be fully compliant with regulations.
 Sadly, Instead they still keep choosing/allowing various oddly popular products and methods which are notorious for being endlessly "vulnerable!" (due to needless over-complexity and/or known back-doors for espionage) like many of the systems chosen for the Svalbard.no and the rest of the Norge's state infrastructure. All that is clearly visible for those who bothered to have a look at the status quo.

 #{*1} # www.regjeringen.no/contentassets/c57a0733652f47688294934ffd93fc53/national-cyber-security-strategy-for-norway.pdf
 Sadly this key policy document is one of those many far too bureaucratic publications, which has been criticized by experts for the policy an Ivory Tower point of view on the subject, which is actually missing the core essence of How to implement a functional structure!
 Instead the policy creators keep hanging on to long known to be a dysfunctional dogmatic methodology. And they blatantly refuse to even openly debate the overload of hard evidence against their dogmatic outdated method, in order to become able to improve things. So they also chose to ignore their own published "improvement cycles" principle which they themselves advocate, know as (P.D.C.A. Cycles)
 => adding insult to self-injury, that document itself is leaking sensitive inside information to hostile actors and others. Which in itself is one of the far too many symptoms of the elitist carelessness of those ivory tower bureaucrats who keep being overpaid/Rewarded to produce such key "policies" for a state during a time of ongoing cyber- and physical-warfare.

 When looking at the foolish self-serving actions of those 'security' policy makers, there seem to be a lot of similarities with "Kejserens nye klæder" by Hans Christian Andersen 1837, Doesn't it !?

 --
 2010:
 "Dokumenter og brev som dette dukket opp flere steder – og tegnet et bilde som tydet på at detrett og slett var mye rot i DSS. Mange av brukerne – dvs enkeltdepartementene – klaget med
 jevne mellomrom."
 -
 "Eks. 4. Analyse av ekstern kommunikasjon i Depnett-UTil Finansdepartementet fra FAD 09/1314 200800247-/JFN 14. mai 2009Rapport - Analyse av
 ekstern kommunikasjon i DepnettU (417061).pdf
 Dette var ett av de viktigste dokumentene som kom frem i postjournal-søkene var
 knyttet til ”analyse av ekstern kommunikasjon”. Dokumentene var en del av
 brevveksling mellom FAD og Finansdepartementet, O ED og UD.
 Dokumentet refererte til en rapport som DSS hadde bestilt høsten 2 0 0 7 for ”å få et
 dypere innblikk i risikonivået knyttet til internettrafikken inn til regjeringsfellesskapet”.
 Dataskandalen i regjeringskvartalet"

 etc..
 etc...

 ---
 * www.sysselmannen.svalbard.no
 inetnum: 217.17.216.128 - 217.17.216.255
 netname: NO-NORGE-NET
 descr: the Gateway to the public sector in Norway
 mnt-by: KAPASITET-NO-HM-MNT
 route: 217.17.208.0/20
 descr: Sognenett AS
 origin: AS31169
 created: 2004-06-10T06:52:14Z
 last-modified: 2013-06-18T08:31:04Z
 etc..


NATO_spitsbergen.pdf