COMPUTER SECURITY SUBCOMMITTEE OF THE UNITED STATES INTELLIGENCE BOARD SECURITY COMMITTEE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
05894563
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
4
Document Creation Date: 
March 9, 2023
Document Release Date: 
January 31, 2020
Sequence Number: 
Case Number: 
F-2019-01084
Publication Date: 
May 20, 1969
File: 
AttachmentSize
PDF icon COMPUTER SECURITY SUBCOMM[15779773].pdf152.56 KB
Body: 
Approved for Release: 2020/01/28 005894563 IBSEC-CSS-M-10 20 May 1969 COMPUTER SECURITY SUBCOMMITTEE OF THE UNITED STATES INTELLIGENCE BOARD SECURITY COMMITTEE Minutes of Meeting Held at CIA Headquarters Langley, Virginia 20 May 1969 1. The 10th meeting of the Computer Security Subcommittee of the USIB Security Committee was held on 20 May 1969 between 1330 and 1540 hours in Room 4E-64, CIA Headquarters Building. In attendance were: (b)(3) (b)(6) Mr. Louis J. Martin, Army Alternate Member Mr. Robert C. Allen, Navy Member Lt. Col. Charles V. Burns, Air Force Member (b)(3) (b)(6) Mr. Donald R. Roderick, FBI Member Mr. Richard F. Kitterman, State Member Mr. Raymond J. Brady, AEC Member (b)(3) (b)(6) Mr. Robert B. Cameron, Navy Mr. William S. Donaldson, Jr., Air Force Mr. Jack T. Peacock, Air Force Mr. Cleddie B. Lanier, State Mr. Conrad Banner, FBI Group 1 Excluded from automatic downgrading and declassification Approved for Release 2020/01/28 005894563 /....�\Approved for Release: 2020/01/28 005894563 - - - - - 2. The security level of the meeting was announced as Top Secret non-codeword. 3. Approval of Minutes: The minutes of the 24 March 1969 meeting were approved as written. 4. Disc Degaussing: The Chairman reported that subsequent to the previous Subcommittee meeting he had been afforded a briefing by NSA officials on its efforts in the degaussing problem area. This briefing also provided an opportunity for discussing the problem of downgrading computer storage media including computer disc packs. The Chairman pointed out that NSA has engaged in a research effort involving the retentive qualities of various media. 5. It was announced that a status report on these efforts will be furnished the Subcommittee in the near future and hopefully will include a direct briefing by NSA personnel of the Subcommittee on NSA efforts in this area of concern. 6. In view of the NSA efforts, the Chairman decided to defer any activity on the part of the ad;hoc task team appointed at the previous meeting until the NSA report had been received and reviewed by Subcom- mittee members. 7. During discussion at the instant meeting, the Air Force Technical Consultant expressed his view that the NSA efforts in this regard had principally been directed around thin-film memory techniques. Although the Chairman reported that NSA expressed confidence in the recoverability of data after overwriting procedures, the Air Force consultant expressed his belief that such retrievability was highly improbable, if proper degaussing/ overwrite techniques were employed. 8. The Chairman requested the Air Force consultant to furnish the Subcommittee with a report of his findings in this area. However, it was determined that no actual research had been conducted by the Air Force consultant and that a report of his activities was not currently available for release to the Subcommittee. 9. Further discussion of this issue was deferred pending NSA briefing of the Subcommittee. 10. Spring Joint Computer Conference: The Chairman reported that he had attended the 1969 Spring Joint Computer Conference held in Boston 2 S-E-C-R-E-T Approved for Release: 2020/01/28 005894563 Approved for Release: 2020/01/28 C0589456(3 0 3 S-E-C-R-E-T between 14 and 16 May. He reported that in a number of technical sessions, as well as during technical demonstrations or tours, individuals claimed that their computer systems had security or private protection features. However, in his judgment, such features did not appear too sophisticated, and in many instances details of such protection techniques were not pro- vided. 11. The Chairman also reported that during the conference he was afforded a tour of the manufacturing facilities of BASF Systems, Incorporated in Bedford, Massachusetts. This firm, a wholly owned subsidiary of a German Corporation, manufactures computer tapes, audio tapes and computer disc packs. The tour of the facility included brief descriptions of the various processes involved in the manufacture of these items. Of significance to the Subcommittee, a company representative quoted the following prices for replacing damaged platters in a disc pack: Type Purchase Price Lease Cost Platter Replacement 2314 $ 600.00 $17.00/month $35.00 per platter to a maximum of $150.00 2311 $ 300.00 $12.00/month $25.00 per platter to a maximum of $100.00 The company representative indicated that damaged platters are of no practical use to the manufacturer and may be removed from the pack by the customer. The pack (stripped if necessary) may be returned to the company for refurbishment and replacement of discs at the costs noted above. 12. Computer Professionals for Peace: The Chairman distributed several pieces of literature concerning an organization identified as the Computer Professionals for Peace. This organization conducted some demonstration activity at the Computer Conference in Boston and its literature, among other things, noted opposition to the Vietnam war, the Anti-Ballistic Missile Program and other political items. Copies of the literature were provided members for the information of the security components of the organizations represented on the Subcommittee. 3 S-E-C-R-E-T Approved for Release: 2020/01/28 005894563 Approved for Release: 2020/01/28 005894563 13. Multilevel Operations: During the instant meeting, the Chair- man placed on the agenda consideration of the problems involved in multi- level computer operations. To introduce consideration of these problems, he requested that members consider the following items for discussion at a future meeting: a. The acceptability of the concept of multilevel computer operations, i. e. whether individual agencies would consider operating in a multilevel environment if an acceptable degree of computer security can be developed. This consideration should be made under three types of circumstances: classified and unclassified operations, proprietary and community 'opera- tions, and hierarchically classified (collateral) and especially compartmented operations. b. Identification of key security protection features in current community systems. c. Determination of an acceptable degree of risk in the above type multilevel operations, io e. how good the security of a system must be to be adequate for such operations. 14. Other Business: a. It was announced during the meeting that the panel report of the Joint Command and Control and Intelligence Collocation Study Group had been published in "working paper" form on 30 April 1969. b. It was also announced that the pilot course in computer security under Defense Supply Agency sponsor- ship is scheduled to begin on 11 July. 15. The next meeting of the Subcommittee was scheduled for 1330 hours on 10 June 1969. The Chairman indicated that this meeting will probably be held at the code word level. (b)(3) (b)(6) Chairman Computer Security Subcommittee 4 S-E-C-R-E-T Approved for Release: 2020/01/28 005894563