Library

 

SECURITY THREAT ANALYSIS OF COMPUTER OPERATIONS

Welcome to the new CIA Electronic Reading Room.  Be sure to bookmark this site, and note that our former URL will be decommissioned in the near future.
Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP79M00096A000100070006-3
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
6
Document Creation Date: 
December 15, 2016
Document Release Date: 
January 28, 2004
Sequence Number: 
6
Case Number: 
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP79M00096A000100070006-3.pdf223.84 KB
Body: 

Approved Fgelease 2004/02 ~~~0
DP79 M 000-000100070006-3
IBS>i:C-CSS-R-4
MF.,MORANDUM p'OR: Chairman, United States Intelligence Boar
Security Committee
ILLEGIB
SUL'JEGT Security Thr. ea.t Analysis of Computer Operations
1. Reference is made to the 19 ,7'anuaxy 1970 tasking of the
Computer Security Subcommittee to coxnduct an analysis of the security
threat posed by the possibility of hostile exploitation of weak points in