Published on CIA FOIA (foia.cia.gov) (https://www.cia.gov/readingroom)


UPDATE ON COMPUTER SECURITY LEGISLATION

Document Type: 
CREST [1]
Collection: 
General CIA Records [2]
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP87B00858R000400470016-4
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
13
Document Creation Date: 
December 22, 2016
Document Release Date: 
December 28, 2010
Sequence Number: 
16
Case Number: 
Publication Date: 
June 9, 1986
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP87B00858R000400470016-4.pdf [3]417.36 KB
Body: 
I Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 I OCA 86-1931 9 June 1986 Intelligence Law Division, OGC Legislation Division Office of Congressional Affairs SUBJECT: Update on Computer Security Legislation 1. On 4 June 1986, the House Science and Technology Committee marked up and unanimously reported out H.R. 2889, the Computer Security Act of 1986. The version adopted by Science and Technology was a substitute amendment offered by Congressman Glickman to the version originally reported out by a subcommittee of House Science and Technology. I have attached for your review a copy of the bill, an explanation of the Committee print of H.R. 2889, and statements for the record read by Congressmen Brown and Boehlert at the markup. The version adopted by Science and Technology must now be reconciled with the version of the bill adopted by the House Government Operations Committee. Following reconciliation of the different versions of the same bill, a clean bill may be introduced and sent to the House floor. 2. NSA continues to oppose the bill and is formulating a position paper to be given to the Armed Services Committee outlining the reasons why they should take a sequential referral. The prospects for a referral are not as bright as they were last December because the version of the bill reported out of Science and Technology has been modified enough that DOD equities are not as severely affected as they were under the House Government operations' version of the bill. NSA strategy continues to be one of delay in the hope that time will run out before Congress can enact this bill. 3. As you recall, the only part of the bill of possible concern to this Agency is Section 6. While that section does not have an explicit provision in it excluding Agency computers, the reference in the section to guidelines developed under the Federal Property and Administrative Services Act which we are exempt from should provide the legal reasoning for us to argue that we are exempt from this section as well. Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 4. My recommendation is to continue to let NSA take the lead in opposing the bill. While it would be "frosting on the cake" for the Agency to get an explicit exemption to Section 6, OMB has stated that they do not want the Agency to further improve the bill from the standpoint of the Intelligence Community for fear that it will then make it even more difficult for the Administration to oppose the bill in its entirety. I, therefore, do not believe we should attempt to get an explicit exemption for the Agency through a floor amendment. However, a Republican minority staff person, Maryanne Bach, on House Science and Technology has stated that they would be willing to insert some legislative history in the Minority Statement on the bill defining the scope of Section 6. Ms. Bach has requested that the Agency draft the legislative history and provide it to her in the next couple of days. Attached is a draft of the legislative history that I prepared. The only possible drawback of providing this legislative history to her is that the Majority Staff may draft counter-legislative history to ensure that CIA is covered by the section. Unless this legislative history is carefully inserted into the record, our attempts to clarify the scope of the bill could boomrang. I welcome the views of ILD on whether, from OGC's perspective, we should attempt to further clarify the scope of Section 6. I will also continue to monitor progress of the bill to ensure that any compromise between Science and Technology and Government Operations will not impact on the Agency. Attachments as stated Distribution: Original - Addressee 1 - D/OCA 1 - ECO/0CA 1 - OCA Registry 1 - DMP/Signer 1 - OCA/LEG Subject File: Cmi uter Fraud 0CA/LE)G pap (9 June 1986) Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Explanation of Committee Print of H.R. 2889 - Computer Security Act of 1986 The following explanation was prepared by Committee staff after staff completed its discussions following the actions of the TAM and SRT Subcommittees. The revised version reflects the following overall concepts: 1. establish a civilian authority for developing computer security standards relating to unclassified information; 2. institute a program of mandatory training for federal employees in computer security awareness; 3. protect the ongoing missions of NBS by providing for a separate appropriation for computer security; and 4. affirm the Science Committee jurisdiction over NBS by including all functions to be conducted by NBS in an amendment to its basic Act and removing those functions from other portions of the bill. In drafting the bill to reflect these concepts and to simplify the language, 1. emphasis is placed on protecting information rather than computer systems in the sections relating to security; 2. the term "computer system" is used throughout to include data communications; 3. the term "federal computer system" is used to define the reach of the bill to include federal agencies, their contractors and others, such as state agencies, that process information for the federal government; 4. with regard to computer security standards, mandatory training and security plans, the bill applies only to sensitive (unclassified) information; 5. the bill exempts intelligence, crypotologic, command and control, and other systems critical to military missions (Warner amendment systems), both classified and unclassified; 6. with regard to computer standards, other than for security, the bill applies only to Brooks Act systems; 7. the bill amends the NBS Act to provide a statutory basis for its work in computers, generally; 8. the bill provides flexibility to NBS to recommend the extent to which computer standards should be made mandatory; Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 i Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 H.R. 2889 -- page two 9. the bill retains the Advisory Board as a means to generate visi- bility and greater awareness of computer security problems and to provide a civilian counterpart to the structure created by NSDD-145; 10. the bill places the responsibility for actual issuance of standards with the Secretary of Commerce; 11. the bill provides a mechanism for waiving standards when con- ditions justify such action. 12. the bill provides a mechanism for agencies, employing computer security provisions that are more stringent than NBS' standards, to use those provisions in lieu of NBS standards. ACT/wm May 21, 1986 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 i Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 HONORABLE GEORGE E. BROWN, JR., CHAIRMAN SUBCOMMITTEE ON TRANSPORTATION, AVIATION AND MATERIALS COMMITTEE ON SCIENCE AND TECHNOLOGY JUNE 4, 1986 H.R. 2889, THE COMPUTER SECURITY RESEARCH & TRAINING ACT MR. CHAIRMAN. THE NEED FOR H.R. 2889 WAS IDENTIFIED IN HEARINGS, HELD JUST ABOUT ONE YEAR AND A HALF AGO BEFORE THE TRANSPOR- TATION, AVIATION AND MATERIALS SUBCOMMITTEE. AT THAT TIME, WE NOTED THAT THE FEDERAL GOVERNMENT HAD BECOME TOTALLY DEPENDENT ON AUTOMATED INFORMATION SYSTEMS TO PERFORM A MULTITUDE OF ESSENTIAL SERVICES. FURTHERMORE, THE INFORMATION STORED IN GOVERNMENT COM- PUTERS AND TRANSMITTED OVER VARIOUS COMMUNICATIONS NETWORKS IS VULNERABLE TO UNAUTHORIZED ACCESS AND DISCLOSURE, FRAUDULENT MANIPULATION, AND DISRUPTION. THE SITUATION WAS DESCRIBED AS THE ELECTRONIC EQUIVALENT OF LEAVING THE BANK DOOR UNLOCKED. YET, DESPITE THE POTENTIAL SERIOUS CONSEQUENCES OF THESE THREATS, WE FOUND LITTLE EVIDENCE OF AN OVERALL, SYSTEMATIC APPROACH TO COMPUTER AND COMMUNICATIONS SECURITY. Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 HON. GEORGE E. BROWN, JR. -- PAGE Two OF PARTICULAR CONCERN WAS THE LEVEL OF SECURITY AMONG PEOPLE WHO OPERATE, USE AND MANAGE COMPUTERS. SUCH PEOPLE ARE EXTREMELY IM- PORTANT IN A SECURITY SENSE BECAUSE, AS STUDIES HAVE SHOWN, THEY ARE THE GREATEST PROBLEM. IT IS NOT THE MUCH-PUBLICIZED HACKER, WORKING TO PENETRATE FROM THE OUTSIDE. RATHER, IT IS THE IN- SIDER, THE ONE WHO ALREADY HAS AUTHORIZED ACCESS, THAT CAUSES THE GREATEST DAMAGE, IN PRACTICE. YET, AS WE LEARNED FROM GAO's SURVEY OF 25 COMPUTER SYSTEMS, THERE IS VERY LITTLE FORMALIZED EFFORT MADE TO REACH THESE INDI- VIDUALS, TO MAKE THEM AWARE OF SYSTEM VULNERABILITIES AND THE IM- PORTANCE OF ENHANCING SECURITY. THE PURPOSE OF H.R. 2889, AS INTRODUCED, IS TO STRENGTHEN THIS WEAK LINK. IT DOES THIS BY ESTABLISHING A RESEARCH PROGRAM AT THE NATIONAL BUREAU OF STANDARDS AIMED AT DEVELOPING GUIDANCE FOR USE BY AGENCIES IN STRUCTURING COMPUTER SECURITY AWARENESS TRAIN- ING PROGRAMS FOR THEIR EMPLOYEES. IT ALSO MAKES IT MANDATORY THAT SUCH TRAINING BE GIVEN PERIODICALLY IN EACH AGENCY. THE BILL WAS REFERRED JOINTLY TO THE COMMITTEES ON SCIENCE AND TECHNOLOGY, AND GOVERNMENT OPERATIONS. GOVERNMENT OPERATIONS COMPLETED ITS MARKUP LAST FALL, MAKING SUBSTANTIAL CHANGES TO THE SCOPE OF THE BILL. Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 HON. GEORGE E. BROWN, JR. -- PAGE THREE To UNDERSTAND THOSE CHANGES, IT IS NECESSARY TO REVIEW BRIEFLY A RELATED, BUT SEPARATE ACTION -- KNOWN AS NATIONAL SECURITY DE- CISION DIRECTIVE 145 -- TAKEN BY THE PRESIDENT ABOUT A YEAR AND A HALF AGO. NSDD-145 IS A LONG-OVERDUE STEP TO CREATE A FOCUS FOR COMPUTER SECURITY IN THE FEDERAL GOVERNMENT. IT SETS UP AN INTERAGENCY COMMITTEE TO DEAL BROADLY WITH GOVERNMENT COMPUTER SECURITY PROBLEMS BY ISSUING STANDARDS AND GUIDELINES THAT WILL APPLY GOVERNMENT-WIDE. THE CONCEPT IS A GOOD ONE. VIRTUALLY EVERYONE RECOGNIZES THAT BETTER CENTRALIZED LEADERSHIP IS NEEDED. BUT THE PARTICULAR FOR- MULA IN NSDD-145, WHICH HEAVILY FAVORS THE MILITARY, IS VIEWED WITH CONCERN BY SOME CIVIL AGENCIES AND BY OTHERS WHO SEE A PO- TENTIAL THREAT TO OPENNESS IN GOVERNMENT. THESE CONCERNS WERE VOICED LAST SUMMER DURING OUR HEARING ON NSDD-145, AT WHICH MR. BROOKS WAS A WITNESS. SUBSEQUENTLY, THE GOVERNMENT OPERATIONS COMMITTEE BROADENED H.R. 2889 SUBSTANTIALLY TO PROVIDE A CIVIL ALTERNATIVE (HOUSED AT NBS) TO THE COMMITTEE CREATED BY NSDD-145. IT ALSO ADDED AN ADVISORY BOARD TO ASSURE THE VIEWS OF THE PRIVATE SECTOR ARE CONSIDERED BY NBS IN DEVELOPING COMPUTER SECURITY STANDARDS. Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 HON. GEORGE E. BROWN, JR. -- PAGE FOUR THE VERSION OF N.R. 2889 REPORTED BY TAM RETAINS THE TRAINING PROVISIONS OF THE ORIGINAL BILL AND THE ESSENTIAL FEATURES ADDED BY GOVERNMENT OPERATIONS. IN ADDITION, THE SUBCOMMITTEE ADDED SEVERAL AMENDMENTS TO CLARIFY THE NBS ROLE AND EXTEND THE COVER- AGE OF THE BILL TO INCLUDE ORGANIZATIONS THAT ADMINISTER FEDERAL PROGRAMS, SUCH AS STATE AGENCIES. EACH MEMBER HAS BEFORE HIM OR HER A COPY OF THE SUBCOMMITTEE RE- PORT WHICH EXPLAINS IN MORE DETAIL THE ADDITIONS MADE BY TAM. IF MEMBERS HAVE QUESTIONS ON THIS OR THE BILL, I SHALL BE GLAD TO TRY TO ANSWER THEM. Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 OPENING STATEMENT BY HON. SHERWOOD BOEHLERT (R-NY) JUNE 4, 1986 H.R. 2889, THE COMPUTER SECURITY ACT OF 1986 MR. CHAIRMAN: ON NOVEMBER 21, 1985, THE COMMITTEE MET TO MARKUP H.R. 2889, THE COMPUTER SECURITY ACT. AT THAT TIME, CONGRESSMAN LUJAN AND I RAISED SEVERAL ISSUES STILL UNRESOLVED IN THE LEGISLATION. THESE DIFFERENCES REFLECT CHANGES WHICH HAD OCCURED DURING THE GOVERNMENT OPERATIONS COMMITTEE CONSIDERATION OF THE BILL. THE PRODUCT OF THEIR MARKUP RESULTED IN LEGISLATION QUITE UNLIKE THAT ORIGINALLY INTRODUCED BY MR. GLICKMAN. AN AGREEMENT IN PRINCIPLE WAS MADE AT THE NOVEMBER 21 MARKUP THAT THE STAFF OF SRT, TAM, AND FULL COMMITTEE WOULD WORK TO RESOLVE THE DIFFERENCES BETWEEN THE RANKING REPUBLICAN MEMBERS AND THE MAJORITY. WHAT IS BEFORE US TODAY IS THE CULMINATION OF THAT AGREEMENT. THE SUBSTITUTE AMENDMENT (COMMITTEE PRINT) ASSIGNS TO THE NATIONAL BUREAU OF STANDARDS RESPONSIBILITY FOR ESTABLISHING STANDARDS AND GUIDELINES FOR FEDERAL COMPUTER SYSTEMS THAT FALL UNDER THE BROOKS ACT (I-E. THE FEDERAL PROPERTY AND Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 I ADMINISTRATIVE SERVICES ACT OF 1949, FOR AUTOMATIVE DATA PROCESSING SYSTEMS IN THE CIVILIAN AGENCIES). THERE ARE NUMEROUS COMPUTER SYSTEMS, HOWEVER, THAT ARE DESIGNATED AS "SENSITIVE" BUT NON CLASSIFIED. THIS IS HANDLED IN TWO WAYS UNDER THE SUBSTITUTE AMENDMENT. FIRST, SEC. 6 DEFINES THE TERM "SENSITIVE INFORMATION" FOR THE PURPOSES OF THIS BILL. SECONDLY, SEC. 4 GIVES AUTHORITY TO THE HEAD OF EACH FEDERAL AGENCY TO EMPLOY MORE STRINGENT STANDARDS THAN THOSE DEVELOPED BY NBS. THIS PROVISION ASSURES THAT AN AGENCY WOULD NOT BE BURDENED WITH TWO DIFFERENT SETS OF STANDARDS IF, IN FACT, THE AGENCY FELT STRICTER STANDARDS WERE NECESSARY, OR IF THE COMPUTER SYSTEM WAS USED FOR BOTH CLASSIFIED AND UNCLASSIFIED PURPOSES. ANOTHER IMPORTANT CHANGE MADE IN THE BILL IS THAT IT RECOGNIZES UNDER SEC. (2)(B)(1) THAT NBS, WHILE HAVING RESPONSIBILITY FOR THE PURPOSES OF THIS ACT, DOES NOT CONFLICT WITH THE ROLE OF THE NATIONAL SECURITY AGENCY, WHICH IS RESPONSIBLE FOR STANDARDS ON CLASSIFIED COMPUTER SYSTEMS. IN FACT, IT IS THE INTENT OF THIS LEGISLATION, AS DISCUSSED BY MEMBERS AND DURING MEETINGS OF THE SUBCOMMITTEES, THAT TO THE EXTENT APPROPRIATE, THESE TWO AGENCIES SHOULD KEEP ABREAST OF DEVELOPMENTS IN COMPUTER SECURITY STANDARDS EACH AGENCY IS WORKING ON- FINALLY, THE BILL DELEGATES TO THE OFFICE OF MANAGEMENT AND BUDGET (OMB), WITH THE ASSISTANCE OF NBS, THE ROLE OF DEVELOPING REGULATIONS PERTAINING TO THE TRAINING OF CIVILIAN FEDERAL Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 i Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 I AFTER LONG DELIBERATION, I BELIEVE GREAT PROGRESS HAS BEEN MADE TOWARD A BILL WHICH THE COMMITTEE CAN APPROVE TO BE REPORTED- I URGE MEMBERS TO SUPPORT THIS VERSION OF THE BILL AS THE BEST POSSIBLE PRODUCT. ONCE REPORTED, THE SCIENCE AND TECHNOLOGY COMMITTEE WILL STILL HAVE TO RESOLVE DIFFERENCES WITH THE GOVERNMENT OPERATIONS COMMITTEE BEFORE DEBATE ON THE FLOOR. IT IS MY HOPE THAT WE CAN WORK OUT AN ACCEPTABLE VEHICLE BEFORE THAT TIME AND THAT THE RULES COMMITTEE WILL LOOK FAVORABLY UPON THE SOUND RECOMMENDATIONS SET FORTH IN THE SCIENCE COMMITTEE SUBSTITUTE AMENDMENT TO H.R. 2889. THANK YOU. Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Draft Legislative History It is understood that section 6 of the bill requiring the submission of plans to protect computers that store sensitive data in accordance with guidelines prescribed by section 111(f) of the Federal Property and Administrative Services Act of 1949 only applies to computers subject to the provisions of that Act. Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4 [COMMITTEE PRINT] June 3, 1986 SUBSTITUTE AMENDMENT OFFERED BY MR. GLICKMAN FOR THE SUBCOMMITTEE AMENDMENT TO H.R. 2889 Strike out all after the enacting clause and insert in lieu thereof the following: 1 SECTION 1. SHORT TITLE. 2 This Act may be cited as the ''Computer Security Act of 3 1986. 4 SEC. 2. PURPOSE. 5 (a) IN GENERAL.--The Congress declares that improving the 6 security and privacy of sensitive information in Federal 7 computer systems is in the public interest, and hereby 8 creates a means for establishing minimum acceptable security 9 practices for such systems, without limiting the scope of 10 security measures already planned or in use. 11 (b) SPECIFIC PURPOSES.--The purposes of this Act are-- 12 (1) to assign to the National Bureau of Standards 13 responsibility for developing standards and guidelines 14 for Federal computer systems, including standards and 15 guidelines needed to assure the cost-effective security Sanitized Copy Approved for Release 2010/12/29: CIA-RDP87B00858R000400470016-4

Source URL: https://www.cia.gov/readingroom/document/cia-rdp87b00858r000400470016-4

Links
[1] https://www.cia.gov/readingroom/document-type/crest
[2] https://www.cia.gov/readingroom/collection/general-cia-records
[3] https://www.cia.gov/readingroom/docs/CIA-RDP87B00858R000400470016-4.pdf