LETTER TO WILLIAM J. CASEY FROM JOHN BROOKS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP87M01152R001001290014-9
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
8
Document Creation Date: 
December 22, 2016
Document Release Date: 
May 21, 2010
Sequence Number: 
14
Case Number: 
Publication Date: 
July 5, 1985
Content Type: 
LETTER
File: 
AttachmentSize
PDF icon CIA-RDP87M01152R001001290014-9.pdf342.88 KB
Body: 
Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 Office of Legislative Liaison Routing Slip 1. D/OLL 4. Liaison 5. Legislate Date Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 EXECUTIVE SECRVTAfIAT ROUTING SLIP TO: ACTION INFO DATE INITIAL 1 DCI 2 DDCI X 3 EXDIR X 4 D/ICS x 5 DDI 6 DDA 7 DDO x 8 DDS&T 9 Chm/NIC 10 GC 11 IG 12 Compt 13 D/Pers D/OLL x 15 D/PAO 16 SA/IA 17 AO/DCI 18 C/IPD/OIS 19 C/SECOM x 20 D /01T X 21 122-1 1 SUSPENSE 18 Jul 85 Dote Please Prepare response for DCI signature. Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MOl 152RO01001290014-9 MAJORITY MEMBERS JACK BROOKS, TEXAS, CHAIRMAN DON FUQUA, FLORIDA JOHN CONYERS, JR., MICHIGAN CARDISS COLLINS, ILLINOIS GLENN ENGLISH, OKLAHOMA HENRY A. WAXMAN, CALIFORNIA TED WEISS, NEW YORK MIKE SYNAR, OKLAHOMA STEPHEN L. NEAL, NORTH CAROLINA DOUG BARNARD, JR., GEORGIA BARNEY FRANK, MASSACHUSETTS TOM LANTOS, CALIFORNIA ROBERT E. WISE JR., WEST VIRGINIA BARBARA BOXER, CALIFORNIA SANDER M. LEVIN, MICHIGAN MAJOR H. OWENS, NEW YORK EDOLPHUS TOWNS, NEW YORK JOHN M. SPRATT, JR., SOUTH CAROLINA JOE KOLTER, PENNSYLVANIA BEN ERDREICH, ALABAMA GERALD D. KLECZKA, WISCONSIN ALBERT G. BUSTAMANTE, TEXAS MATTHEW G. MARTINEZ, CALIFORNIA MINORITY MEMBERS FRANK HORTON, NEW YORK THOMAS N. KINDNESS. OHIO ROBERT S. WALKER, PENNSYLVANIA WILLIAM F. CLINGER, JR., PENNSYLVANIA ALFRED A (AL) MCCANDLESS, CALIFORNIA LARRY E. CRAIG, IDAHO HOWARD C. NIELSON, UTAH JIM SAXTON, NEW JERSEY PATRICK L. SWINDALL, GEORGIA THOMAS D. (TOM) DELAY, TEXAS DAVID S. MONSON, UTAH JOSEPH J. DIOGUARDI, NEW YORK JOHN G. ROWLAND, CONNECTICUT RICHARD K. ARMEY, TEXAS JIM LIGHTFOOT, IOWA JOHN R. MILLER, WASHINGTON 1Congrea of the Vniteb tateo Moue of Atepregentatibem; COMMITTEE ON GOVERNMENT OPERATIONS 2157 RAYBURN HOUSE OFFICE BUILDING WASHINGTON, DC 20515 July 5, 1985 Honorable William J. Casey Di rector Central Intelligence Agency Washington, DC 20505 The committee herewith submits to you the enclosed bill, H.R. ...... ........................., upon which the committee would appreciate a prompt reportg together with such comment as you may desire to make. Will you kindly transmit your reply in triplicate. Respectfully, Chairman, Enclosure. 11 MAJORITY-225-5051 MINORITY-225-5074 Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MOl 152RO01001290014-9 Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 99TH CONGRESS 1ST SESSION Ho .2889 To amend the Act establishing the National Bureau of Standards to provide for a computer security research program within such Bureau, and to provide for the training of Federal employees who are involved in the management, operation, and use of automated information processing systems. IN THE HOUSE OF REPRESENTATIVES JUNE 27, 1985 Mr. GLICKMAN (for himself, Mr. FUQUA, Mr. BROOKS, Mr. BROWN of California, Mr. WIRTH, Mr. WALGREN, Mr. NELSON of Florida, Mr. WYDEN, Mr. HUGHES, Mr. LEWIS of Florida, and Mr. HORTON) introduced the following bill; which was referred jointly to the Committees on Science and Technolo- gy and Government Operations A BILL To amend the Act establishing the National Bureau of Stand- ards to provide for a computer security research program within such Bureau, and to provide for the training of Federal employees who are involved in the management, operation, and use of automated information processing systems. 1 Be it enacted by the Senate and House of Representa- 2 tives of the United States of America in Congress assembled, 3 SECTION 1. SHORT TITLE. 4 This Act may be cited as the "Computer Security 5 Research and Training Act of 1985". Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 1 SEC. 2. FINDINGS. 2 The Congress finds that- 3 (1) in recent years the Federal Government has 4 become highly dependent on automated information 5 processing systems for carrying out many of its 6 missions; 7 (2) the Government operates about 20,000 8 medium- and large-scale mainframe computers, and by 9 the end of this decade it will also have approximately 10 half a million micro- and mini-computers; 11 (3) the information stored in Government comput- 12 ers and transmitted over the various communications 13 networks that connect them represent valued property 14 that is vulnerable to unauthorized access and disclo- 15 sure, fraudulent manipulation, and disruption; 16 (4) studies of computer-related fraud and abuse in 17 'Government agencies indicate a costly and widespread 18 problem of significant proportions; 19 (5) Government efforts to address the problems of 20 computer security have focused on developing hard- 21 ware and software systems to protect sensitive infor- 22 mation, ensuring that new computer systems are de- 23 signed to include security provisions, and requiring 24 agencies to implement security procedures; and 25 (6) these efforts must be supplemented if the prob- 26 lems are to be solved, since the weak link in protecting *HR 2889 1H Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 3 1 the information stored, processed, and transmitted by 2 Government computers remains the people who 3 manage, use, and operate them. 4 SEC. 3. ESTABLISHMENT OF COMPUTER SECURITY RESEARCH 5 PROGRAM. 6 The Act of March 3, 1901 (15 U.S.C. 271-278h), is 7 amended by redesignating section 18 as section 19, and by 8 inserting after section 17 the following new section: 9 "SEC. 18. (a) The National Bureau of Standards shall 10 establish and conduct a computer security research program 11 to address the problems of computer security in the Federal 12 Government, with primary emphasis upon the prevention of 13 computer-related fraud and abuse through the training of em- 14 ployees in computer security awareness and good security 15 practice. 16 "(b) The program shall- 17 "(1) perform research and conduct studies to de- 18 termine the nature and extent of computer security 19 vulnerability in Federal agencies and their contractors; 20 "(2) devise administrative, management, and tech- 21 nical procedures and practices designed to protect the 22 information stored, processed, and transmitted by 23 Government computers; and 24 "(3) develop guidelines for use by Federal agen- 25 cies in training their employees, and the employees of Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152R001001290014-9 Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 4 1 their contractors and of other organizations whose 2 computers interface with Government computers, in 3 computer security awareness and good security 4 practice.". 5 SEC. 4. TRAINING BY FEDERAL AGENCIES IN COMPUTER 6 SECURITY. 7 (a) IN GENERAL.-Each Federal agency shall provide 8 mandatory periodic training in computer security, under the 9 guidelines developed pursuant to section 18(b)(3) of the Act 10 of March 3, 1901 (as added by section 3 of this Act), and in 11 accordance with the regulations issued under subsection (c) of 12 this section, for all of its employees who are involved with 13 the management, use, or operation of computers or other 14 automated information systems and for all of the employees 15 and other personnel of its contractors who are involved with 16 the management, use, or operation of computers which inter- 17 face with Government computers. 18 (b) TRAINING OBJECTIVES.-Training under this sec- 19 tion shall begin within 60 days after the issuance of the regu- 20 lations described in subsection (c), and shall be designed- 21 (1) to enhance employees' awareness of the 22 threats to and vulnerability of computer and communi- 23 cations systems; and 24 (2) to encourage the use of improved computer 25 security practices at Government facilities. Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9 5 1 (C) REGULATIONS.-Within six months after the date of 2 the enactment of this Act, the Director of the Office of Per- 3 sonnel Management shall issue regulations prescribing in 4 detail the procedures and scope of the training to be provided 5 by Federal agencies under subsection (a) and the manner in 6 which such training is to be carried out. 7 SEC. 5. AUTHORIZATION OF APPROPRIATIONS. 8 There are hereby authorized to be appropriated to the 9 National Bureau of Standards for the fiscal year 1987, to 10 carry out the computer security research program under sec- 11 tion 18 of the Act of March 3, 1901 (as added by section 3 of 12 this Act), such sums as may be necessary. 0 Sanitized Copy Approved for Release 2010/06/29: CIA-RDP87MO1152RO01001290014-9