COMPUTER SECURITY SUBCOMMITTEE OF THE UNITED STATES INTELLIGENCE BOARD SECURITY COMMITTEE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP89B01354R000400550010-7
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
7
Document Creation Date:
December 27, 2016
Document Release Date:
July 23, 2013
Sequence Number:
10
Case Number:
Publication Date:
January 27, 1970
Content Type:
MEMO
File:
Attachment | Size |
---|---|
![]() | 333.27 KB |
Body:
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
IBSEC-CSS-M-18
27 January 1970
COMPUTER SECURITY SUBCOMMITTEE
OF THE
UNITED STATES INTELLIGENCE BOARD
SECURITY COMMITTEE
Minutes of Meeting
Held at CIA Headquarters
Langley, Virginia
27 January 1970
1. The eighteenth meeting of the Computer Security Sub-
committee was held on 27 January 1970 between 1330 and 1600
hours in Room 4E-64, CIA Headquarters. In attendance were:
Mr Ric-hard Kitterma-n State Member
Mr. Thomas A .Eccleston, Army Member
Mr. Robert B. Cameron, Navy Member
Mr William S Donaldson Air Force Alterrate
Mr. Raymond J. Brady, AEC Member
Mr. Donald R. Roderick, FBI Member
Mr. Alexander S. Chodakowski, State
Mr. Conrad S. Banner, FBI
2. The security level of the meeting was announced as Top
Secret COMINT.
STAT
STAT
STAT
STAT
STAT
Group 1
Excluded from automatic
downgrading and
SECRET declassification
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
S-E-C-R-E-T
3. Approval of Minutes: The minutes of the 13 January 1970
meeting were approved without amendment.
4. Security Labeling Standards: The Chairman reported
that a meeting had been held on 20 January of those involved in the
security labeling standards project. Copies of the Task Team's
report of this meeting, prepared by were distributed STAT
to members. The results of the 20 January meeting reflected
agreement to defer decision of the question raised by DIA as to
whether illegal security and dissemination "flags" should be included
in the Subcommittee's product of this effort. In the collection phase
of the project, a necessity was recognized for including all classifi-
cation and dissemination caveats utilized in the Community with the
exception of those limited to use within an individual agency. The
Task Team's meeting also reflected an approach to the collection
and compilation task.
5. The Chairman outlined this approach in requesting all
Subcommittee members to compile a listing of dissemination con-
trols and distribution indicators utilized within their separate
organizations. It was suggested that the Service representatives
coordinate their submissions with the DIA member.
6. It was agreed that the NSA member would compile and
provide the dissemination indicators utilized for COMINT,, sen'sitive
SIGINT, and cryptographic material. The Chairman will input the
control caveats utilized for TK and B material. The AEC member
was requested to furnish those applying to Restricted Data and other
AEC controlled material.
7. In discussion that followed the---Chairman suggested that
each agency submission not only list the caveats but also briefly
identify their meaning. Concerning specially controlled material,
the caveats should be annotated with reference to their classification.
Included in the listings would be any dissemination indicators or
special control systems not previously discussed at the Task Team
or Subcommittee level, including special indicators for SEATO,
NATO, etc.
-2-
S-E-C-R-E-T
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
8. In developing agency submissions, the following guidelines
were provided:
A. Exclude indicators peculiar to a single agency,
as material bearing such indicators is not
disseminated outside of that agency;
B. Include a brief definition for each indicator;
C. Show what "'clearances" are required for access
to material bearing each caveat;
D. Include synonyms used for indicators, where
applicable;
E. Emphasize that the Subcommittee is not studying
the problem of illegal caveats, but merely
attemptinggto develop standards for the trans-
lation of security "flags" used in the Community.
Members were requested to submit their replies on this project to
the Chairman on or before 24 February.
9. Incidental to the above discussion, members were furnished
a copy of IBSEC-PR./45 dated 16 January 1970, a joint memorandum
for all Security Committee and IHC members outlining the approach
being taken with reference to the problem of standards for security
classification and dissemination control indicators in Community data
bases.
10. Training Course Task Team: Mr. Cameron reported that
this Task Team had not met since the previous Computer Security Sub-
committee meeting; he advised that a meeting was planned before 6
February. The Army clarified the earlier report from the Army
Security Committee member with reference to Army participation
in a DoD Computer Security Course. Mr. Eccleston indicated that
the Department of Army is not participating in the developin4nt of
such a course, but along with other Service representatives had been
solicited for comments concerning the security training requirements
involved in the implementation of the National Military Command
Center. No dltplication of effort with Computer Security Subcommittee
plans to develop a computer security training course is indicated.
-3-
S-E-C-R-E-T
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
S-E-C-R-E-T
11. Multilevel Operations: The Chairman again reminded
the Army and Navy members that he had not yet received their
submissions for the proposed Subcommittee consolidated report on
key protection features useable in multilevel systems. The Navy
representative submitted an interim response at the instant meeting
indicating that a survey of Naval commands is in process, but not
yet completed with respect to this project.
12. The Chairman also reported that he had been invited to
a meeting scheduled for 11 February of the COINS Software Security
Panel which was scheduled to discuss a proposal for addressing the
"need-to-know" problem in the operation of that network.
13. To permit the basis for later discussion, during the
instant meeting the Chairman presented some thoughts concerning
basic requirements for the operation of a multilevel computer system.
He opened these remarks with the personal comment that there
appeared to be hope for permitting the operation of a time sharing
computer system in a multilevel security environment provided that
this environment was "benign". In this context, a "benign" environ-
ment was defined as one where all personnel having access to the
time sharing system would hold Top Secret security clearances, and
the compartmentation problem for the multilevel operation was limited
to one of compartmentation of specially controlled groups of data. A
classic example of such an operation would be a system storing and
processing collateral and compartmented intelligence data in which
all personnel would hold Top Secret clearances, but not all would
have access approvals for the compartmented material.
14. Recognizing the problem as one of compartmentation,
the Chairman expressed his thinking that a few basic security factors
built into the operation of such a system might suffice to provide an
adequate assurance that compartmentation could be controlled by the
system itself. For discussion purposes, he proposed four basic tools
for controlling this compartmentation:
-4-
S-E-C-R-E-T
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
- - - 1
A. A software based user identification and authenti-
cation routine, in which each user would have a
unique authentication code, and by which a user
would be identified as being authorized for general
or limited system access and his identity authenti-
cated;
B. Keyword protection of files by which a capability
would exist to limit access to designated files to
those persons knowing a specific password, which
would be changed periodically;
C. Basic physical security and access control procedures
to protect the computer center itself and its remotely
located terminals as well as interconnecting links;
D. A working audit trail capability which would generate
a system log of all queries to the system, identify-
ing the user, the terminal involved, the time, the
files accessed, any incorrect or invalid query
attempts, etc.; this log would have to be reviewed
regularly both by the individual assigned the respon-
sibility for system security and by (in part) the moni-
tor of each terminal location, as a check to insure?
against unauthorized terminal access.
15. The Chairman emphasized that the four, features outlined
above were not meant to be comprehensive but rather basic require-
ments under which a given system could be approved to operate at
different security levels in a "benign" environment. Discussion that
followed recognized additional features, some of which might be con-
sidered as mandatory for multilevel operations, including read and/or
write protection, automatic log off procedures, etc.
16. No prolonged discussion on this topic was had at the instant
meeting. Nevertheless members were requested to give thought both
to the problem and to the specific concepts outlined, since the Sub-
committee will be addressing the overall multilevel problem in con-
siderable detail in the months ahead.
-5-
S-E-C-R-E-T
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09 : CIA-RDP89B01354R000400550010-7
S-E-G-R-E-T
,
17. Computer Security Threat Analysis: The Chairman
referenced the discussion at the 19 January 1970 Security-JCommittee
meeting predicated on the request of the Army member that it would
be appropriate to analyze and evaluate the threat posed by the
vulnerabilities of Community computer operations. The Security
Committee discussion of this issue reflected agreement that the
CI Staff of CIA be tasked to report any known cases where opposition
Services had attempted to exploit the vulnerabilities of computer
operations for intelligence purposes; in addition the Subcommittee
was tasked to study and report on the postulated threat in the computer
environment.
18. The Subcommittee Army member clarified the earlier
request presented to the Security Committee, indicating the Army's
desire to limit this threat analysis to the CI Staff action noted above.
Subcommittee members unanimously agreed that a study of the
postulated threat posed by the Community's use of modern computing
equipment was superfluous, since this threat is already well defined
and recognized both in the Security Community, the ADP technical
environment, and by the President's Foreign Intelligence Advisory
Board.
19. The Chairman announced that he had already initiated
action requesting information on known computer espionage cases
from the CI Staff of CIA. Members were requested to solicit the
same type of information from appropriate components of their own
organizations and to submit reports to the Chairman on or before
the 9 February Subcommittee meeting. It is anticipated that a con-
solidated report will be prepared for submission to the Security
Committee at its 16 February meeting.
20. Other Business:
A. Security Evaluation of Community Systems: The
Chairman introduced the necessity for the Sub-
committee's eventual consideration of the problem
Of evaluating the security protection features of
modern computer systems. He outlined the need
-6-
S-E-C-R-E-T
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7
for system evaluation in quantitative terms as a
basis for system security certification. Such
evaluation addresses the effectiveness of
security features in the hardware, software,
and basic physical and procedural security
aspects of system operations. As an intro-
duction to this topic, the Chairman announced
his plan to have a representative of CIA's
Office of Research and Development brief the
Subcommittee at a future meeting on a recently
completed contract to assess the security of the
hardware of a specific IBM system;
B. Change in Meeting Time: At the request of the
NSA and AEC members and with the unanimous
agreement of the Subcommittee, the time of
future Subcommittee meetings was changed to
Mondays at 0930 hours.
21. The next Subcommittee meeting was scheduled for 0930
hours on 9 February 1970.
C,hairman
Computer Security Subcommittee
-7-
STAT
S-E-C-R-E-T
Declassified in Part - Sanitized Copy Approved for Release 2013/08/09: CIA-RDP89B01354R000400550010-7