DOD TESTIMONY ON H.R. 2889, THE COMPUTER SECURITY RESEARCH AND TRAINING ACT OF 1985
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP87M01152R001101350046-6
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
8
Document Creation Date:
December 22, 2016
Document Release Date:
March 19, 2010
Sequence Number:
46
Case Number:
Publication Date:
September 16, 1985
Content Type:
MEMO
File:
Attachment | Size |
---|---|
![]() | 318.31 KB |
Body:
STAT
STAT
Office of Legislative Liaison
Rau"" 9NP
5. Legisla ion
Sanitized Copy Approved for Release 2010/04/06 : CIA-RDP87M0l 152R001101350046-6
Sanitized Copy Approved for Release 2010/04/06: CIA-RDP87M01152R001101350046-6
EXECUTIVE OFFICE OF THE PRESIDENT
OFFICE OF MANAGEMENT AND BUDGET
WASMINQYON. D.C.:0103
September 16, 1985
LEGISLATIVE REFERRAL MEMORANDUM
TO: Legislative Liaison Officer
Department of Cmulerce - Mike Levitt (377-3151)
General Services Administration ,T 1 Ebert (566-1250)
Central Intelligence Agency t/
SUBJECT: DOD testimony on H.R. 2889, the "Canpiter Security Research and
Training Act of 1985"
The Office of Management and Budget requests the views of your agency
on the above subject before advising on its relationship to the
program of the President, in accordance with OMB Circular A-19.
A response to this request for your views is needed no later than
NOON, TUESDAY, SEPTEMBER 17, 1985
Questions should be referred to Constance J. Bowers (395-3457), the
legislative analyst in this office.
Assistant Director for
Legislative Reference
Enclosures
cc: Ed Springer Kevin Sheid Russ Neely
Sanitized Copy Approved for Release 2010/04/06: CIA-RDP87M01152R001101350046-6
Copy Approved for Release 2010/04/06: CIA-RDP87MO1152RO01101350046-6 pp. Weaver
STATEMENT
BY
DONALD C. IATMAM
ASSISTANT SECRETARY OP DEFENSE
COMMAND, CONTROL. COMMUNICATIONS, AND INTELLIGENCE
AND
CHAIRMAN
NATIONAL TELECOMMUNICATIONS AND INFORMATION SYSTEMS SECURITY
COMMITTEE
i CONCERNING N.R. 2889
BEFORE THE
SUBCOMMITTEE
ON LEGISLATION AND NATIONAL SECURITY
COMMITTEE ON GOVERNMENT OPERATIONS
UNITED STATES HOUSE OF REPRESENTATIVES
SEPTEMBER 16, 1985
T00 T80 ON
Sanitized Copy Approved for Release 2010/04/06: CIA-RDP87MO1152RO01101350046-6
I
? l:hairm&n and members of the dubcosw-ittee $
to testify on H.R. 2889, known
nit
t
y
u
Thank you for this oppor
11985's-
the "Computer Security Research and Training Act Of
as security
This bill has the objectives of providing for a comp
research program within the National Bureau of Standards Who (s~sinvolved
training andf use Federal information
in also providing for the
is the e managements operation,
(AIS) systems. The efforts of this subcommittee are
as it carries out in its investigation of the importance of the
computer systems security pwith oa prsbsnsivsiremediesconsiders
a this
actions aimed at aL coming up
eOmplox issue.
Today, I would like to address myself first to the general
intent and overall purpose of the bill by providing perspectives,
in my dual roles as both the Assistant Secretary of Defense for
Command, Control and Commuunications and Chairman. National Tele-
communications and Information systems security Committee (NTISSC),
of the problemwe faces s
confusion inthe billdreLike quirin clarificationisoe
area of f potential
as ao not to impact adversely on existing Adminiirevision~to the
Finally, I hive included in my testimony suggested
bill for your careful review and action.
rirst, I wbolehSartedly supportnthe eneral inttenttof H.R. 2909
to provide for much needed support the of systems
security training and education. All to often this is an area sorely
overlooked and poorly funded because it is not glamorous. Also,
as you are all too aware, the computer system security problem is
extremely complex and solutions to the problem are made all the more
difficult by continuing rapid advances in the state-of-the-art.
The emerging use of supercomputers and the prolifati~ef local
that
area networks are but two examples of technology
computer systems security problem a challenge that must be faced
now. The problem is immense in scope and associated R&D in the
and
area is totally inadequate. The shortage system yns security aggravates the
trained d professionals in comp
problem. Any effort to try to assist in this endeavor is clearly
welcome.
In this regard. I view H.R. 2889 as a positive step to achieve
consensus on the need for additional resources. The Ntatcenterional of
Bureau of standards has for some time been an Importan security.
It i expertise in certain therefore that the BBS be tapped to takes on
entirely aPPopP
additional responsibilities and funding in research and related
activities as reiterated in the Bill. Let me quickly caveat my
comments by saying that, to be truly effective, these additional
BB8 efforts must be further focused in the context of on-going ?
efforts such as those Which fall under National Security Decision
ress this ) isso to avoid costl sue in some detail duplication of effort.
Directive
I will add
Sanitized Copy Approved for Release 2010/04/06: CIA-RDP87MO1152RO01101350046-6
As Chairman of the 11TI8BC, I view as one of my key responsi-
bilities making sure the problem of computer systems security is
recognised by the public at-large as an important national issue.
We have not done as good a job as we might have done in the past
because we were not properly organised. The NTISSC structure now
in being provides that organisation and we are moving ahead with an
aggressive awareness program in concert with similar initiatives
being carried out by the N18.
At its last meeting on 4 September 1985, the Subcommittee on
Automated Information Systems security(BAIBS). one
euof t to two
major subcommittees of the NTISSC, approved
MTISBC a proposal to require education and training of federal
departments and agencies. expect the IITISSC to take up this
proposal and make it a National Policy. In this regard, the
National Computer Security Center (NCSC) at the National Security
Agency (NSA) has begun development of training courses in AIS
systems security for a DoD-sponsored awareness program. The MCSC
will provide materials to other governmente depart entsa ndnaagencies
for awareness training. Of
resoutcea rax+ains a proDlem.
Let on focus just a moment on some other DoD education and
training efforts. We are developing guidelines which will make it
easier to determine and specify the level of security that a system
needs when generating requests for procurements or acquisitions.
Also, we are in the process of issuing a Standard entitled. "DoD
Trusted Computer System =valuation Criteria , hereafter referred to
as the Criteria, to assist in evaluating the effectiveness of safe-
guards for Defense applications. By the way* the SAISS adopted use
of the Criteria on an interim one-year trial basis. Finally, the
-DOD is undertaking an ambitious computer vulnerability reporting
program aimed at correcting security weaknesses in DoD computer
systems. This effort should also be very useful for designing a
national reporting program.
In my testimony for Mr. Glickman. Chairman of the subcommittee
on Transportation. Aviation and Materials. Committee on Science and
Technology# on 27 June 1985, I indicated that a high priority item
was trying to provide a working definition for what constitutes
"sensitive" information. Since that time, the SAISS has approved
for issuance to the NTI88C a proposal for defining sensitive infor-
mation. Specifically, it separates unclassified but sensitive
information into two categoriess sensitive national security-related;
and sensitive non-national security-related. The SDD
145 is only for the former category
non-national security-related is the concern of the civilian sector
with 155 playing a major role.
Let me reiterate that NSDD-145 does not cover unclassified but
sensitive non-national security-related information and therefore,
it in no way restricts, controls, or manages the activities of other
federal departments or agencies who have responsibilities in non-
national security-related areas. In order to maintain this clear
elm
Sanitized Copy Approved for Release 2010/04/06 CIA-RDP87MO1152R001101350046-6 `bt 1/60
A
aemaroation line, language in H.R. 2889 making reference to "sensi-
tive" information should be amended to reflect that "unclassified
but sensitive non-national securityrsiated" data is the subject
data in question.
On the matter of research and development (R&D) responsibilities,
the MBS has a well-developed program in the area of computer systems
security. The MRS derives its responsibilities from the Brooks Act
of 1965 (P.L. 89-306). , the Privacy Act of 1974 (P.L. 93-579), and
the Paperwork Reduction Act of 1980 (P.L. 96-511). We view these
responsibilities as distinct both in intent and focus from those
cited in MBDD-145. Again, MBDD-145 addresses only unclassified but
sensitive national security-related and does not cover unclassified
but sensitive non-national security-related i ormation. more
directly, privacy information, information on fraud, waste, and
abuse, or proprietary data held by an agency is not covered by
=DD-145 dictates.
Let me quickly add that we don't intend to meddle in MBS
authorities or responsibilities in these areas. Rather, we see
the MRS efforts and those of other federal agencies under MBDD-145
as complementary and supportive of each other. Clearly, technical
measures and techniques can apply squally well in many circumstances
and technical interaction must be encouraged.
Indicative of the strong current relationship between the MBB
and the DoD, is the high-level of cooperation between the NBS and
the National Computer security Center at NSA Which is already
impressive and growing. Specifically, they have jointly sponsored
for the past eight years a National Computer security Conference.
This year's conference, scheduled from 29 September 1985 to 3
October 1985, will focus on mutual subjects of concern such as
secure networks, verification, labelling, a profile of "hackers",
and data base management security to name just a few. It will be
attended by business, academia and government and allows for
critical transfer of the results of the National Computer Security
Center research and the NBB research throughout government and the
private sector.
Important work is proceeding between MBS and the NCBC in the
area of personal computers and office automation. In this regard,
a Guideline on Password Management is being published by the NCSC
and will become an appendix to the NBB Password Usage Standard
already in existence. Additionally, the MBS has done impressive
work in micro-computer and mini-computer systems security Which
the NCSC is using. As a final example, MBS and the NCSC is sponsor-
ing a symposium on risk analysis to examine methodologies of mutual
benefit. Again, these efforts represent the high degree of inter-
action between these two centers of expertise.
This cooperation must continue. However, the federal audiences
for their respective services is different. The NCBC's target audi-
ence is the National Security Community while NBB services the
? t, VW 700 'ON SaVana Tb:bj
Sanitized Copy Approved for Release 2010/04/06: CIA-RDP87M01152R001101350046-6
civilian sector. While the staffs of both organisations are highly
onas
specialised, there is continuing reliance by NCC$Csst;fstaff
institute for Computer Sciences and Technology (ICS)
expertise and vice-versa. In fact,-two m" employees currently
) are working at MRS with the purpose of transfering expertise to
civilian users. This arrangement has worked remarkably well in
the past and must be preserved.
Lot we add that the US has taken an active role in the
subcommittee on Automated Information Systems Security (BAISS)
of the WTISSC. The l1BS member is the ICST Director, Mr. James
surrows. Mr. furrows has been instrumental in the promulgation
training anddtive
b the nformation S caof the tegories recent well issuance a the issuance on defining
i
education.
As a final point on the issue of l1SDD-145 and IIBS
responsibilities, l7SDD-145 requires that IBS submit for MTISSC
approval proposed computer systems security standards prior to their
issuance as a Federal Information Processing System (PIPE) standard,
once again, this applies only to proposed standards where national
security-related matters are concerned Standards unrelated to
national security are not Covered. In this regard, it is anti-
cipated that, Federal Information Processing Standard No. 112, Pass-
word Usage Standards, , will be the first such standard processed
under the unclassified PTIOSC structure because it has
classified processing environments, to both both
In accordance with the preceding, I would now like to turn
my attention to some of the areas in the bill that potentially
could cause confusion and Vhich. I fool, could benefit from addi-
tional clarification.
First, on page 2 of U.K. 2889, reference is made to "sensitive"
information. I suggest this be amended to read "sensitive unclassi-
fied non-national security-related." Also, for clarity, this
phrase should also be fee, modify the use of the term "informa-
tion" as used on page 3
Second, on page 3 of U.K. 2889, Section 18 (a) should be
amended to clearly sat forth that H.R. 2889 does not seek to impact
Administration efforts under NBDD-145. Therefore, Ia propose the
following be inserted as the last sentence of pa g p (c)s The
following bB8 program shall be undertaken in consonance with those
computer system security responsibilities delineated in National
Security Decision Directive 145, "National Policy on Telecommuni-
cations and Automated Information System Becurity?" This important
adjustment minimises overlap of responsibilities between the
Department of Commerce and the Department complementary Defense and recognises
that both programs
In closing, let me allay the fears of those who feel that
NSDD-145 does in some ways shape, or form restrict current bBS
Sanitized Copy Approved for Release 2010/04/06 CIA-RDP87MO1152RO0 11 01350046-6*4:bT
at for standards-sakinq efforts. rdDD-145
N sad pva1opme
base already
statutory
rams stemming from
~ntry
the !M Prog
tort
?'' asationed are acs~patible and comp
Computer systems security is & 'major challenge that needs
all the available brainpower and resources this nation can ouster.
As such, let's move ahead together in the spirit of harmony and
cooperation, not oospstition. I feel H.1. 2889, with the
recommended changes I proposed, is a positive step in fostering
this spirit of cooperation.
Accompanying me is Mr. Robert Rich, Deputy Director, 118A, who
will further describe the activities of the Computer security
Center and other programs now being carried out by 118A in the areas
of computer systems security awareness, education, training, and
research and development.
Mr. Chairman, this concludes sly prepared remarks. I would
be happy to answer any questions that you or the Subcommittee
have.
Cm" TOP *ON SM'VQOQ tv:VT 93/9T~
Sanitized Copy Approved for Release 2010/04/06: CIA-RDP87MO1152RO01101350046-6