TABLE OF CONTENTS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP83T00573R000100060006-2
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
15
Document Creation Date:
December 12, 2016
Document Release Date:
October 19, 2001
Sequence Number:
6
Case Number:
Publication Date:
May 9, 1978
Content Type:
SUMMARY
File:
Attachment | Size |
---|---|
![]() | 439.37 KB |
Body:
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
5 MAY 1978
I. INTRODUCTION
II. MISSIONS AND OBJECTIVES
III. DESCRIPTION OF CURRENT SYSTEM
IV. PROBLEMS WITH THE CURRENT SYSTEM
V. USER REQUIREMENTS
VI. ALTERNATIVES
VII. RECOMMENDATION
VIII. COST AND TIME REQUIREMENTS
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
This System Definition Study is in response to a
request from the Director of Logistics, for Office of
Data Processing(ODP) support on the Industrial Security
Program (SECOND). Included in this report is a description
of the current procedure, the problems with the current
procedure, an enumeration of the system requirements and
a recommendation to automate the Industrial Security
program.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
I. MISSIONS AND OBJECTIVES
1. The Office of Logistics, Security Staff, (OL/SS)
has been tasked with the responsibility of maintaining an
industrial security program. The industrial security program
was established to provide secure methods by which the
Central Intelligence Agency may procure supplies, equipment,
services, and conduct research and development outside the
Agency with the least risk of exposing the classified pur-
pose to unauthorized personnel.
2. OL/SS receives approximately eighty calls per
day from interested persons and offices both internal and
external to the Agency. In order to answer these inquiries
in a timely manner and provide support to all using Agency
components it is necessary to maintain manually a 3x5 card
STATINTIfile of approximately - cards. Approximately 50 of
the eighty calls per day require accessing the card file.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
III. DESCRIPTION OF CURRENT SYSTEM
1. The unique nature of the Agency's procurement
methods place different and unusual requirements on the
Agency's industrial security program. There are two areas
of classification in the Agency's procurement methods:
a. the relationship of the Agency to the
contractor, i.e., whether the identity
of the Agency as purchaser is classified;
b. the classification of the work and reports
of the end product.
2. When an Agency component levies a procurement
requirement upon OL, the requirement normally specifies the
classification of both the Agency contractor relationship
and the end product.. If either aspect is classified the
following takes place:
OL/SS makes a manual review of its records
to determine whether the specified vendor
has a current or prior classified relation-
ship with the Agency. If no prior relation-
ship exists the following steps are initiated;
1. the corporate officer's name
is run through Office of
Security indices;
2. the vendor will be contacted
in person, utilizing CIA
credentials;
3. the corporate officer will
be told of the Agency interest
in doing business with them;
4. requested to sign a secrecy
agreement; and
5. requested to provide sufficient
biographic data for security
processing purposes.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
b. If a prior relationship exists, the above
process, 1 through 5, is performed as
required to reinstate the contractor.
3.' Once the above steps are completed and the Office
of Security issues an approval the corporate officials are
visited once again, and requested to appoint a corporate
security officer who will be OL/SS referent for the term
of the contractual relationship. Thereafter, the bulk
of OL/SS contact is with the corporate security officer
who will have been approved and briefed. He will be
furnished with the Security Requirements for Contractors
(Green Book) or Standard Security Procedures for Contrac-
tors (White Book), a supply of Personal History Statements,
Request for Industrial Security Approval forms, and
codeword access, as appropriate. He will also have a
supply. of Form 670 (index cards) which will ultimately
comprise OL/SS records of Industrial Security Approval
(ISA).
4. Once the contractor furnishes OL/SS with the
required data to process an Industrial Security Approval
(ISA), the following takes place;
a. All documents are dated and forwarded to
Security for processing;
b. A Form 670 (3x5 card) is filed in the pend-
ing file;
c. if Security grants the Industrial Security
Approval:
1.
the
file
are
and
card is moved from the pending
to the active file, two copies
kept, one alphabetical by name
one by contractor and name.
2.
Notify contractor.
d. If Industrial Security Approval is not
granted:
1. Notify contractor;
2. File disapproval notice.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
5. The contractor continues to supply data to OL/SS
as required by the regulations. If an employee leaves the
company, transfers to another project, or the contract is
completed, the Form 670 (3x5 card) is moved from the active
file to the termination file.
6. A liaison file is maintained for personnel in other
Federal Agencies and departments on whom security liaison
approvals requested by OL have been granted.
7. A Contact Approval file is maintained for personnel
who are contacted before a full Industrial Security Approval
is processed.
8. The information contained on Form 670 (3x5 card)
in the system consist of the following:
Name
Date of Birth
Place of Birth
SSN
Security File Number
Contractor Name
Contractor Address
Job/Title
DOD Clearance
Level
Date
Industrial Security Approval
Level
Approval Date
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
IV. PROBLEMS WITH THE CURRENT SYSTEM
1. Many problems can arise when handling a manual
card system of this size. With the Industrial Security
system the most prominent problems are the following:
a. Ad hoc questions often require hours of
searching cards, tallying and notekeeping,
and typing detail listings after the infor-
mation is collected.
b. The current method of updating the cards
is antiquated. Physical sorts are required,
in that cards must be matched and placed
into the correct position in the appropriate
file. As changes are processed the cards
must be physically moved from one file to
another.
c. Cards are stored in OL/SS. Care must
be taken that nothing happens to the cards;
a dropped file would take hours of manual
work to reconstruct.
d. There are no standards to assure cards are
not misfiled or lost.
e. There is no backup for the file.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
V. USER REQUIREMENTS
1. The present requirements for the Industrial
Security system are as follows:
a. Conversion of present card files (ISA
contractor personnel, pending file, term-
ination).
b. Provide the capability to query the data
on any data element, or combination of data
elements, within the database with an immediate
response. Typical queries are:
1. What is the level of the ISA for John
Doe?
2. What is John Doe's job title?
Has John Doe signed a
agreement?
How many people working for the ABC
Company in the Boston area have a
Top Secret clearance, three years old
or older?
What is the facility approval status
of the XYZ Company?
The ability to update a database, (add,
delete), approximately 700 transactions
month.
change,
a
d. Addition of five data elements:
1. date briefed;
2. date terminated;
3. security agreement;
4. facility approval status; and
5. facility approval level.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
e. Produce preformatted alphabetical printout
by individual names on request.
f. Produce preformatted alphabetical printout
by individual names within contractor on
request.
g. The ability to produce, on request, ad hoc
reports.
h. Provide a validation of all data recorded
in the system to ensure its accuracy.
i. Provide the capability for reporting all
deliquent security requests.
Provide a method of backup in the event of
primary data or system damage
2. System Elements:
A list of required elements are as follows;
a. NAME (Last, First, MI)
b. Social Security Number
C. Date of Birth
d. Place of Birth
e. Security File Number
f. Contractor Name
g. Contractor Address (Street, City, State, Zip)
h. Job Title
i. Work Location (Street, City, State, Zip)
j. DOD Clearance (Date, Level)
k. Industrial Security Approval (Date, Level)
1. Date Briefed
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
M. Date Terminated
n. Security Agreement Signed
Facility Approval Status
Facility Approval Level
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
VI. ALTERNATIVES
1. In order to meet all the requirements of the
customer, a database management system appears to be
the most desirable solution. The database management
system will permit the user to store, manipulate, retrieve
and display quantities of data.
2. There are three database management systems
currently used within the Office of Data Processing (ODP),
Rapid Access Management Information System (RAMIS),
National Information Processing System (NIPS), and
General Information Management System (GIMS).
3. In search of a system to meet the requirements
stated RAMIS and NIPS were rejected.
3.1 RAMIS was rejected primarily because it
has not yet proven itself in handling a
moderately sized (approximately
records) database.
3.2 The NIPS system was rejected from considera-
tion because it is strictly a batch system
and will not support the rapid query cap-
ability desired in the requirements. In
addition, NIPS does not support an inter-
file query capability. It should also
be noted that if the system is implemented
in a NIPS batch mode and the user require-
ments are not met, the system cannot be
converted from batch to on-line mode with
a minimal effort.
4. GIMS is a database system that has a hierarchical
data storage philosophy. In addition to data storage
and retrieval, GIMS handles its own terminal communica-
tions, printers and input/output methods. The database
can be available in either a batch or an on-line mode.
The report facility uses Basic Automatic Report Format
(BARF) or special PL/I programs. An Industrial Security
system under GIMS could have the following structure:
STATINTL
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
a. A pending file which would contain basic
biographical data on personnel who have
industrial security approvals in process.
b. A cleared contractor file which would
contain biographical data on personnel
who have active industrial security
approvals.
c. A termination file which would contain
biographical data on personnel who have
at one time held an industrial security
approval.
d. A name index file which would contain
names (last, first) of personnel in the
cleared contractor file. This file would
provide the ability to query by name and
receive a quick response on personnel
who have an active approval.
e. A contractor file which would contain
data on the contractors who have personnel
with industrial security approvals.
f. The database would be available under the
MVS/JES3 system in either the batch or an
on-line mode.
g. In the batch mode, GIM statements to up-
date, query, and extract data would be
created in a file on the VM/370 system
and batched to the GIM system through a
Batchmon link. All output would then
be printed under the JES3 system.
h. In the on-line mode, data input would be.
accomplished directly through GIM supported
menus displayed at the terminal and read
by routines coded in the GIM procedure
language. Ad hoc queries could be formed
in GIM statements directly at the
terminal with an immediate response to
the same terminal. Copies of these queries
can be printed at a Texas Instruments
printer immediately connected to the
terminal or at a printer connected to
the computer running the GIM system.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
VII. RECOMMENDATION
1. It is recommended that the SECOND system be
implemented using the on-line GIMS database system for
the following reasons:
a. The on-line GIM system will offer the
user immediate updates through menu
input, and a prompt resolution of errors
b. Once the database is operational, the
primary activity will be queries. The
GIMS user language is English like and
will permit the user to access data
without knowing how or where the data
is stored.
c. The GIMS off-line batch system was re-
jected primarily because of the user
requirement for immediate response to
queries. Other considerations were,
database and listings are always out of
date because of projected frequent up-
dates, an incorrect query is not detected
until a listing is received, and ad hoc
reports on a batch database can be cum-
bersome.
d. Cost for the on-line and off-line systems
is relatively equal.
2. The GIM system has the capabili.ty to more
than adequately meet the requirements specified. How-
ever, the user should be aware that the level of know-
ledge needed by both the user and programmer to create
and maintain the system is very high. Learning the GIM
system is a non-trivial process and the user is required
to learn the GIM query language, GIM data extraction
process, and the basic VM commands. Use of ODP Training
courses and SAB personnel's expertise should provide
the-necessary skills for OL/SS to operate the system.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
3. GIMS had a bad track record prior to the re-
lease of the 360/195 computer. Since its implementation
on a 370/168 we have experienced an average availability
rate.of 9.2%. Response time is also currently acceptable.
4. In summary, GIMS seems to be the only ODP
database management system which has the capability
to satisfy the requirements of this particular system.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2
VIII. COST AND TIME REQUIREMENTS
1. It is estimated that this system will
require
8 months to develop and will cost approximately
A breakdown of cost is provided:
$34,510.
TIME
COST
MACHINE COST
Verify Data Elements
40 Hrs
$680
---
Prepare Menus
80
1360
$ 150
Develop Procedures and
Dictionaries
960
16,320
12,000
Develop BARF Reports
80
1360
150
User Testing and
Training
2. Once the system is developed it is estimated
that the conversion effort and full implementation will
require 10 man-months for OL/SS to input data. The
machine cost for conversion will be approximately $22,602.
If the system is accepted it is recommended that other
conversion methods be considered (i.e. IV Phase, key-
punching) which may reduce the time and cost.
3. The projected operating cost of this system
after implementation will be approximately $4,000 a
month.
Approved For Release 2002/01/08 : CIA-RDP83T00573R000100060006-2