COINS LONG-RANGE PLAN PART III TECHNICAL SUPPORT PLAN (TSP) FY80 - FY86

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP83T00573R000100140001-8
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
185
Document Creation Date: 
December 15, 2016
Document Release Date: 
July 23, 2003
Sequence Number: 
1
Case Number: 
Publication Date: 
August 7, 1980
Content Type: 
REQ
File: 
AttachmentSize
PDF icon CIA-RDP83T00573R000100140001-8.pdf7.11 MB
Body: 
Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Community On-Line intelligence System Project Management Office National Security Agency Fort Georg. G. Mood*. Maryland. 20755 COINS LONG-RANGE PLAN PART III TECHNICAL SUPPORT PLAN (TSP) FY80 - FY86 Prepared by The MITRE Corporation 7 August 1980 25X1 Many individuals made significant contributions to the COINS Network Technical Support Plan. Specifically; H.A. Kinslow of H. Kinslow Associates, Inc. contributed Section 2, Background, and James P. Anderson of James P. Anderson Company contributed Annex D, COINS Network Security. The author is. indebted to the above named individuals who, together with ~d Richard W. Bates, con- sultant to Computer Sciences Corporation, spent many hours reviewing previous versions of this plan and made many valuable suggestions and provided much of the information needed to bring it to its present form. Any errors of omission or commission are the sole responsibility 2j5 1 oved- ase-2Oo 10&L4B-:~BRB-3TOOS-T3R000 ---- Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 TABLE. OF CONTENTS Page 1 1.1 Purpose 1.2 Organization 2.1 Current Status 6 2.2. Future Development 7 2.3 Background Summary 12 3.0 FACTORS INFLUENCING THE PLANS 3.1 Facts 13 3.2 Assumptions 14 4.0 SUMMARY OF TECHNICAL SUPPORT PLANS 4.1 COINS Network-Management 15' 4.2 COINS Network Resources 16 4.3 COINS Network Development 13 4.4 COINS Network Security 20 4.5 Resource Summary 22 LIST' OF ILLUSTPATIONS Figure Number P age 1 COINS II Ring Architecture Concept 5 2 COINS PM0 Controlled Resources 17 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 1.0 INTRODUCTION This is Part. III of the three-part COINS Long-Range Plan. Part I presented the COINS operations concepts as they are today, and. as they are projected. to be in 1985 and in 1990. Part II pre- sented the COINS architecture in a similar fashion-as it is today, and projected to 1985 and. 1990. Parts I-and II of the plan were developed to provide the reader with an understanding of how the COINS PMO perceived the evrolution of COINS during.. the 1980's, and to provide a. basis and direction for the COINS PMO.planning, program- wing and budgeting activities. Part III, Technical Support Plan, of the COINS Long-Range Plan presents the program plans, resources, and schedules to develop and maintain COINS for the current fiscal year and five years beyond. 1.1 Purpose The purposes of Part III of the COINS Long-Range Plan are: a. To support the COINS PMO planning, programming;, and budgeting activities and COINS-related planning, pro- gramming, and budgeting activities of the other organizations participating in COINS. . b. To describe, for the COINS community and other inter- ested organizations, the development and acquisition of new and improved COINS capabilities. c. To provide the planned development, procurement, and implementation schedules for use by COINS participating organizations in scheduling their planned development, procurement, and implementation actions that may be it pacted. by or impact on COINS. . d. Tc; prov.Lcs resource estimates to development and ma.int.ain COINS. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 I.Z. Organization Section 2 of Part Ill. provides a description of COINS. It contains much of the introductory material of Parts I and II of the Long-Range Plan and is included here to provide the readers who had not read either Part :1 or Part. II of the COINS Long-Range Plan with a basic understanding of COINS. Section 3 presents major factors that were considered in devel- oping the TSP. Section 4 is a summary of the planning activities and resources included in Annexes A, B, C, and D. Finally, the Annexes provide the Technical Support Plans. Annex A - COINS N'etwork.and Project Management Annex B --COINS Network Resources Annex C - COINS Network Development Annex D - COINS Network Security Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 2.0 BACKGROUND This section presents the history of COINS development since 1965", and projects its further development through the end of this decade. The objective of COINS is to serve the analysts of the intelli- gence community in retrieval.and analysis of intelligence data. It is operational as a communications medium between several of the data processing centers of the community and is in increasing use for-data retrieval from these centers. However, its utility as a service to intelligence analysts is limited in many ways. Much information which should be available via COINS is not available. Procedures for access are complex and there are many different procedures to be learned. Data processing services are very sparse. The COINS plan for development during the 1980's is to: ? Widen the base of the network by increasing its data resources ? Simplify, for-the analyst, the procedures of retrieving data ?? Provide assistance in processing of data once it is retrieved ? Provide network-wide user services such as electronic mail and teleconferencing This initial section presents the history of COINS, and describes the environment which bounds its development. The network originated in 1965 as an experimental, store-and-forward network, and became Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 operational in 1973. In ].974 it -began. a. process .to upgrade from a store-and-forward to a-packet-switched technology. The packet-switched network was declared operational as COINS II in 1977-. Since then it has continued to evolve in scope and in service. The COINS environment: is the community of analysts, the data base systems extant and projected, the methods and procedures which COINS must adapt to, and other DoD networks with which COINS will interact. Figure I presents a general description of COINS as a set of functional rings: ? The Communications; Ring is the basic data transmission facility. ? The Switching Rin, contains the COINS packet switching nodes.. ?, The Access Ring contains the devices which attach terminals and data processing systems to COINS, and through which COINS connects to other networks. ? The Service Ring contains the COINS host systems, processing systems; and services, and terminals including those in other networks. Each of the preceding rings contains a set of communications or ser- vice functions, supported by an inner ring, and supporting an outer ring. ? The User Ring. OLLtside the service ring are the users of COINS-the reason.the four inner rings exist. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 LEGEIID ' CC CO.MMU IUT1Oii3 C:`IT=3? (A1 P Ii1TE;Z: ACS tIMG= P "nC:SSG:t TAS TE M1;9AL ACCESS S'157:,,i HAS HOST ACCESS SYS i 1 HAS 1` FF' /O.;:C ACCESS SYST:7d ";. COINS P1.0 ZO.1If c CO; r c! TEZi,11;IALS ,. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 -Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 2.1. Current Status ::,Six computer systems are directly connected to the COINS II network--NSA RYE/TIPS, NPIC NDS, NSA SOLIS, the COINS PMO TAS, the COINS PMO Network Service Host, and the PACOM TAS (via the ARPANET Gateway). Only the TAS-based systems can access SOLIS. NSA RYE/TIPS, DIA DIAOLS, the processors at ADCOM and PACAF, and, in the future, the Network Service Host, function as both server and user hosts, i.e.,. they provide information retrieval services for COINS users, as-well. as link their own user terminals to COINS, SOLIS acts only as a server-host. The COINS PMO TAS, thePACOM TAS, the PACOM IDHSC SWITCH, and the processors at SAC and IPAC support user terminal connections to COINS but provide no services to COINS users.. NSA RYE/TIPS user-terminals cannot interact with remote inter- active hosts. The COINS II' accessible files of RYE/TIPS will be in stalled on the interactive PROJECTOR when they are to be moved to WINDMILL system; a Burroughs 7700 dual processor currently housing SOLIS. The NPIC New Data System (NDS) is connected to COINS by an adaptation of the TAS, called the Network Access System (NAS). Via the NAS, local NPIC terminals are currently able to work in batch mode with-other COINS II hosts as if they were TAS terminals, During the first year of NDS operation with COINS, COINS II users will access NDS in batch mode only, although interactive capability exists. By the end of calendar year 1980 NPIC will offer both batch and inter- active services to COINS. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Network services between COINS and IDHSC continue to be limited to batch. trans actions since the protocols and gateway software to handle interactive connect:ions between COINS II and IDHSC have not been defined. 2.2 Future Development .To date, development of COINS has concentrated on communications systems in order to providle an instrument for remote access from a single point of entry (terminal) to intelligence data at several centers of storage (data base systems). The access capability that now exists is constrained in some ways: ? Some of the community data bases are not accessible from COINS terminzls. Their host computers are not attached to COINS, or to a network which can be reached via COINS, or their security and need-to-know controls cannot be handled. by COINS. o. Access from some points is limited by the interface between user and COINS. For example, an analyst at an IDHS, terminal cannot access the SOLIS system. The necessary inte:ra,ztive protocols cannot be propa- gated through the gateway between IDHSC and. COINS, and in many instances the analyst does not have the proper remote terminal. Removal of these constraints is a. matter of resources and time. Most of them will disappear as older host systems are replaced, or as the present DoD network environment.evolves. Beyond mere access to data, the COINS:users need help in other areas: ? Learning procedures for data retrieval.. The COINS us:: r is z--trrently required to know where data is, and for each source of data, the language which must be used to extract: from it. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release. 2003/08/18 : CIA-RDP83T00573R000100140001-8 ?: Manipulation and formatting of data once extracted from the. file is done by the host computer on which the file is stored.. Having retrieved data, the analyst must then resort to pencil and paper to reduce it. to a form appropriate for the intended purpose. Present COINS provides little help in solution of these problems. It is projected that development of COINS during the 1980's will concentrate on the problem. of reconciling data formats and access languages. Some aspects of this problem are: ? Multiple Retrieval. Languages. In general, each data base is accessed by a language unique to that data. base. The user may require information from several data. bases, and is thus faced with the need to learn more than one language. ?. Host System Autonomy. COINS hosts are designed and operated to serve local needs. COINS has low priority relative to these local needs, and must work out methods of adapting to them. ?? Lack of Data Standards. There is no common methodology for data definition. Data is categorized, structured, and named in many different ways, depending upon who "owns" it.. To perform a complete search, the user must know all of the. terminologies by which day may be referenced. ? Community Turnover. The user population is dynamic. New users are constantly entering the community. There is a continuous and massive problem of training them in the nature of resources available, and the methods for their exploitation. ? Security. There is no system for support of multi- level security. Access via COINS is restricted to the SI/TR level. Most of the potential intelligence community users are thus excluded from COINS. ? Undefined Network Command Language. There is no agreed upon set of commands, or command "language", for ini- tiating and controlling network functions. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18.: CIA-RDP83T00573R000100140001-8 These problems have been under attack for some time. By the .mid-1980's useful techniques for their. solution should be implement- : second problem, lprovision of data manipulation services for the user, requires a better understanding of the analysts job and what tools would be helpful in performing it. Studies are being made. By the latter half of the decade COINS should be in a position to support the user with hardware and software which assists in analysis of data. once it has been retrieved. Development of functions within COINS will be influenced by expected changes in the COINS environment, among which may be cited: Cost of Components. Current equipment costs indicate that centralized processing for many functions is economical. However, if these costs continue to fall, it may become efficient to distribute function execu- tion throughout the network. w Advances in Security Methodology. COINS has been requested by ASD((:3I) to cooperate with DCA in development of a community standard, Secure Network Front-End. Project BLACKER is under development. The Kernelized Secure Operating System (KSOS) is also under development.. These efforts may have significant impact on the methodology of access to COINS. ? Projected Increase in Traffic. Present Access Systems have fairly low capacity with respect to number of physical attachments which can be supported ("ports") and throughput capacity. The projected traffic far exceeds these limitations. Increase of Access System capacity to meet traffic demand may force complete redesign of Access System structure and function as well as influence the future designs of the host sys- tems themselves. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 ? Network Access via Terminals. Most of the present COINS terminals are attached to hosts, and access the network through hosts. During the 1980's the trend will be to terminals which access hosts via a network. There will be a requirement for many Terminal Access Systems of very high capacity. ? Terminal Evolution. Many of the community systems presently support only line-oriented, hardcopy termi- nals. Newer systems employ CRT terminals, and increas- ingly, "intelligent" terminals. This trend to increasing terminal functionality will obviously impact the methodology of network access. The COINS environment: includes other networks to which COINS will be connected. COINS itself is designed and operated to support U.S. intelligence agencies in the Washington, D.C. area. It either is or will be connected via "gateways" to a number of other networks; i.e.. ? ARPANET ? PLATFORM ? IDHSC ? AUTODIN II ? IMPS Development of these projected internetwork connections will be governed by changes in the Defense Department network structure: ? AUTODIN II will become operational as the DoD long- haul communications facility. ? The present ARPANET will be significantly reduced.in size and retained as a research facility. Many of its present hosts will become hosts of AUTODIN II. Approved For Release 2003/08/18 : CIA-RDP83T00573R0001001,40001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 ? The DODIIS hosts. within the Washington,.D.C. area will become hosts of COINS. DODIIS hosts outside of Washington will use AUTODIN II. The impact of these changes on COINS development will be manifold; ? The COINS network will be expanded to support Washington, D.C. DODIIS hosts; specifically at DIA, NMIC, AFIS, and NAVINTCOM. ? New protocols such as File Transfer and Teleconferencing will be required. ? COINS may be required. to provide DODIIS interconnectivity during the transition of IDHSC to AUTODIN IT. ? The TETRAHEDRON communications system, which is the base of the COINS subnet, may require expansion to include Andrews AFB, Suitland, Maryland and Fort Detrick, Maryland, and to interface with AUTODIN II. ? Increased traffic against the more heavily used COINS hosts must be anticipated and provided'for. users will be replaced by AUTODIN II. ? COINS itself may be a carrier between facilities in adjacent networks. .The COINS network, and each of the five networks to which COINS will be connected, is providing operational service to a unique family of users. Each network, including COINS, has its own set of. established protocols and services. without considerable cost as well as These are not easily changed user hardship. that connection of COINS to another network will not: It is planned ? Result in disruption of service to users in either network ? Result in major changes in protocols and services in either network Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 ? Result in major software-reprogramming action in either network 2.3 Background Summary The COINS network is being developed as a tool for cooperative effort in intelligence da-ta.processing. It is a vehicle for support- ing the individual efforts-of some forty intelligence centers of the U.S. Government. These centers are autonomous. Each of than has its own criteria for type of data, method of processing, equipment for processing, security control, and every other conceivable parameter. COINS, which is the technological medium for interaction between them, must resolve the differences. It is obvious from preceding discussions that the data retrieval problems of the COINS environment are-not all solved, and that the solution in many cases may be a long time. coming, Much of the COINS effort in this decade will be expended on these problems. Beyond the problems associated with data retrieval there are services which the network can provide. These must be defined to fit the needs of the analyst. The network can become a system for data processing which taps all resources of the community, at the analyst's convenience, and provides him with the tools for effective use of them. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 3.0 FACTORS INFLUENCING THE PLANS The following factors were considered in the development of the Technical Support Plans (Annexes A, B, C, and D). 3.1 Facts COINS will continue to supply services beyond that of a conduit for data transmission to the COINS users. These include services .that can be provided more efficiently by COINS than by the separate participating agencies; e.g., network access control, common query language (ADAPT), user support systems; and information storage and manipulation services for those users homed on a TAS who cannot or do not have these services provided by their parent organizations. ASD(C31), Executive Agent for the COINS program, has directed a. The TCP4/IP4 Host-to-Host protocol be implemented in COINS II, IDHSC II, AUTODIN II, and ARPANET as a first step cowaLds achieving network interoperability. This will require modification to the IMP software and the Host Access System (HAS). b. AUTODIN II will be used as the long-haul communications facility by the mid-1980's, therefore, COINS II will be required to use AUTODIN II as the preferred conduit providing services outside the Washington, D.C. area vice ARPANET or IDHSC II. c. The COINS PMO will work with DCA in the development of a community standard front-end. The use of this front- end by COINS could have a significant impact on the COINS Access System. The expanded COINS plus existing high turnover rate in COINS users, p2.rt:icular7w in the military organizations, necessitates a continuing and it:creasing training work load. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 3.2 Assumptions The COINS will continue through the 1980's and be expanded to function as the local network for the Washington, D.C. area DODIIS host computers. DIA has informally designated COINS as the local Washington D.C. DODIIS network. It is assumed that this designation will be made formally, and. the host computers involved will be iden- tified along with procedures on how these hosts will be treated; i.e., like the existing COINS hosts or in some special ways. Until the designation is formalized and the hosts identified, etc., plan- ning for the expansion cannot be completed. Access to COINS should be expanded to the analysts with less than TS-SI/TK who need COINS accessible information. This requires improved security procedures to preclude unauthorized disclosure. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 4.0 SUMMARY OF TECENICAL SUPPORT PLANS The objective of the COINS PMO is to provide, within available resources and other imposed constraints, the highest quality, secure services to the users of COINS and to the organizations who are the sponsors of COINS accessible resources--presently file sponsors. 4.1 COINS Network Management To meet the objective, the COINS PMO must be aware of user and sponsor needs that are not: being satisfied adequately in order that unsatisfied requirements can be addressed in the COINS program plan- ning and budgeting. For this reason, resources have been programmed to acquire a network management system (hardware and software) that can monitor the status and performance of the hardware and software that comprise the COINS network and its accessible resources. Also, the management system will. collect and analyze information relative to the usage of COINS and its accessible resources, and data relative to user acceptance and satisfaction of COINS. The COINS Network Management System comprises: 9- The Network Monitoring Subsystem (NMSS) - To collect and analyze status and performance data for operations and management ? The Network Usage Information Subsystem (NUISS) - To collect and analyze data relative to resource usage ? The User Reporting Subsystem (URSS) - To collect and analyze data relative to user satisfaction of COINS. The Technical Support Plan for COINS Network Management is.presented Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 By the end of FY82 the Network-Monitoring Subsystem (NMSS) will be-operational in the BBN C/70 Network Control Computer (NCC) and the BBN C/70 Network Management Computer (NMC). Also, the Network Usage Information Subsystems (NUISS) will be implemented on the Net- work Management Computer. The evaluation of the pilot User Reporting Subsystem (URSS) is scheduled to be completed by the end of FY82. .FY83 through FY86 will produce enhancements to NMSS and UNISS, and the operational URSS will be developed and implemented. 4.2 COINS Network Resources The COINS-provided resources are the hardware and software in- cluded in the switching and access rings, and in COINS PMO-controlled service hosts computers in the service ring--see Figure :2. The switching ring includes the switches or Interface Message Processors (IMPs) that perform the message assembly and disassembly functions for the access systems and perform the packet switching and control functions in routing data from origin to destination. The access ring provides the points of entry to COINS. Host computer access is through a Host Access System (HAS); terminal access (for terminals not housed on a host computer) is through a Terminal Access System (TAS); access from other networks is through a Network Access System (NAS). Three COINS PMO DEC P`DP 11/70 server host computers presently are planned: the Network Service Host (NSH), the Technology Transfer Research Facility (TTRF) computer, and the User Support Information Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83TOO573RO00100140001-8 LEGEZID ' Eb1R i'iT.;t~ 3:. P:1E:5::ur P^.DCE55D.; TAI T'c^MINAL ACC?:S SYSTEM HAS r107f ACC'-!SS S"Sicil HAS NE7:7O^X ACC SS SYSTEM' I COiN5 P. ;0 ZO:IE OF CC-.,.'T,-,CL TS~~I1MALS COINS P:MO CONTROLLED RESOURCES 17 Approved For Release 2003/08/18 : CIA-RDP83TOO573ROO0100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 System. (USIS) computer. These three service hosts are also TASs in that they will also support access to COINS from attached terminals. In addition to the basic software for access system functions, many other COINS-provided resources are being developed to satisfy known user requirements. They include: TCP/IP - A COINS network uniform query language to provide an alternative to using the many separate query languages of the several server hosts. - User Support Information System, to provide on-line user training and user guides. - Network Virtual Terminal, to provide for a wide range of terminal types to access COINS host computers without the need to implement the many terminal handler routines in the host computers.. - Transmission Control Protocol/IP is the DoD standard host-to-host protocol and internet protocol. - File Transfer Protocol, to provide an efficient way to transfer large volumes of data between host computers. Priority/Precedence - To provide the mechanisms to assure that the users wlio have the most urgent need to access COINS during crisis situations will not be locked out by less urgent usage. c By the end of FY82 the present Honeywell H316 IMP will be re- placed with BBN C/30 Ills and TASs will be installed at NAVINTCOM, DIA, Lawrence Livermore Laboratories, and State. ADAPT-II will be operational and ADAPT-III will be implemented for evaluation at the end of FY82. Also, USIS will be under evaluation and TCP will be implemented. 18 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 By FY86 NASs will be installed for the IDHSCand PLATFORM networks, a.. HAS will be installed for the WINDMILL host computer, a Data Base Management System will be implemented in one or more of the COINS PM0 Service Hosts, ADAPT-III will be operational, USIS with a Computer Aided Instruction system will be available, TCP and NVT will be oper- ating, and Priority/Precedence will be implemented. 4.3 COINS Network Development Network development is, for the most part, technology transfer; i.e., evaluating existing or developing tools and techniques to deter- mine if they would make valuable additions to the COINS. Development within COINS will occur only if a critical need exists that cannot be satisfied by adopting or adapting an existing or developing resource from outside COINS. In either instance an evaluation of the capa- bility is made to determine its usefulness and to determine how the capability can be used or how it should be modified to make it useful. Presently planned development activities include: - Man-Machine Relationship Program, is being funded by ARPA. The COINS will be used as a. test bed to evaluate the evolving hardware and software planned over the next several years. - Rule-Directed Interactive Terminal Agent, is a system to develop "agents" to perform tasks for the users. The system was designed to allow for changes to be made to the agents by persons not knowledgeable in computer programming. GRAPH?CS - Is a development activity to determine if computer graphics is useful, and where and how it would be useful in the COINS user community. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Text Editing/ - Is a. development activity to determine if Word Processing and where these capabilities would be useful to the COINS user community. Preparing mes- sages for electronic mail, report (product) preparation, and preparing on-line user guides and training aids are potential appli- cations. Annex C is the Technical Support Plan for the COINS Network Development. By the end of FY82 the evaluation of the electronic desk (ED-1) of the M RP will be completed with recommendations relative to its future in the COINS community. By FY86 a computer will be installed at one of the intelligence schools to support technology transfer and development projects.and the MNlRP evaluations will have been. accomplished on many evolving capabilities. Also, the evaluations of RITA, GRAPHICS, and Text Editing/Word Processing will have been completed and recommendations made on if, where, and how they may be applied in the COINS user community. 4.4 COINS Network Security COINS Network Security including need-to-know controls is con- cerned with adapting and developing tools, techniques, and operating procedures to ensure that the data within COINS is protected from unauthorized disclosure. The following programs have been identified as potentially useful to enhance COINS security. KSOS - Kernelized Secure Operating System, is an approach to provide users access to a system without the need for all users to have system-high clearances. The COINS PMO is participating in the test and evaluation of KSOS. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 BLACKER - Is an NSA 'project?to provide for end-to-end encryption of data passed through a network. Initially, BLACKER is considering the user terminal. to a distant host portion?of the problem. Host-to-host will be accom- plished later. Multi-Jurisdiction Security Controls - Is a procedure where all users (internal and external to COINS) will be regis- tered on a COINS Access System. The registration will include the host systems, files, and other re- sources for which each user has been granted access. This procedure cannot be fully implemented until all COINS access is through either a TAS, HAS, or NAS. SNFE - Standard Secure Network Front End, is a Defense Com- munications Agency project to develop a standard front end for all DoD packet switched network host computers. ASDC3I has requested the COINS PMO to participate in the SNFE design and development. User I.D. Authentication - Is the constant assessment, evalua- tion, and where appropriate, the implementation of techniques to authenticate legitimate users. TAS/NAS Software Encryption - Is a project to determine how software encryption can improve security and how it should be implemented. File/Output Labeling - Is the development of procedures to assure that files and other output is properly labeled relative to security classification and compartments. Annex D is the Technical Support Plan for COINS Network Security. By the end of FY82 the evaluation of KSOS, BLACKER test, and TAS/NAS Software Encryption will be completed. The COINS Access System designs of 1984 and beyond will reflect-the integration of concepts embodied in BLACKER, KSOS, and other ongoing security/NTK developments. By the end of FY86 the BLACKER applications, Multi Jurisdiction Controls, and improved File/Output Labeling will have Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100:14000-1-8 been. implemented. The design of the SNFE will be completed and will have replaced the COINS HAS. Also, secure multi-level security access~:will be capable of being demonstrated. 4.5 Resource Summary The following tables summarize the funds for the COINS PMO main- tenance and development programs. The resources are shown for 0&M, Procurement, and RDT&E, by Annex for fiscal years 1980 through 1986. Summary tables present the funds for O&M, Procurement, and RDT&E for fiscal years 1980 through :1986 for all annexes followed by a summary table for all funds categories for Annexes A, B, C, and D for fiscal years 1980 through 1986. The last table presents the COINS PMO staff requirements.. FUNDING SUMMARY O&M FY80 FY81 FY82 FY83 FY84 FY85. FY86 A 195 270 350 370 430 430 430 B 345 505 978 .1.,268 1,323 1,323 1,323 C - - - - - - - D - - - - 50 50 50 TOTAL 540 775 .1,328 1,638 1,803 1,803 1,803 PROCUREMENT FY80 FY81 FY82 FY83 FY84 FY85 FY86 A -- 400 -- 50. -- - -- B 746 50 1,180? 75 -- -- -- C -- - -- -- -- - -- D 50 80 250 300 -- - - TOTAL 796 530 1,430 425 -- -- - Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83TOO573R000100140001-8 RDT&E FY80 FY81 FY82 FY83 7784 FY85 FY86 A 250 150 300 520 440 390 390 B 422 400 1,299 1,405 1,100 450 200 C -- 40 50 330 430 430 430 D 135 54:3 535 895 600 375 205 TOTAL' 807 1,13:3 2,134 3,150. 2,570 1,645 1,225 TOTAL BY FUNDS CATEGORY FY80 FY81 FY82 FY83 FY84 FY85 FY86 0&M 540. 775 1,328 1,638 1,803 1,803 1,803 PROCUREMENT 796 530 1,430 425 -- -- -" * RDT&E 807 1,133 2,184 3,150 2,570 1,645 1,225- GRAND TOTAL 2,143 2,438 4,942 5,213 4,373 3,448 3,028 ANNEX FY80 FY83. FY82 FY83 FY84 FY85 FY86 A 445 820 650 940 870 820 820 B 1,513 955 3,457 2,748 2,423 1,773 1,523 C -- 40 50 330 430 430 430 D 185 6'1.3 785 1,195 650 425 255 TOTAL 2,143 2,4:18 4,942 5,213 4,373 3,448 3,028 COINS PMO STAFF (STAFF-YEARS PER YEAR) FY80 FY81 FY82 FY83 FY84 FY85 FY86 MANAGEMENT 8 8 9 9 9 9 9 OPERATIONS 8 11 15 15 15 15 15 USER SUPPORT 6 8 12 15 15 15 12 GRAND TOTAL 22 27 36 39 39 39 36 i, 3y1ti/ 23 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08%18: CIA-RDP83TO0573R00010014000.1-8 GLOSSARY from-the combined annexes for: the long range plan.. 1922 BBN Report 1822, "The specification of the Interconnection of a Host and and IMP". The specification of interface between a host and the ARPANET. Access Authorization The permission to access a Coins element and. the constraints(if any) placed on the access. Examples of constraints include the familiar access to read only, access to excute, etc. Access authorization may be placed on any COINS object, application, file, program, or device. Access Control The tasks imposed on a network or any of its components, performed by hardware, software, administrative controls, to control usage of the system. Included are: monitoring system operation, insuring data integrity, user identification, recording system access and changes, and granting user access. Access Method . The technique and/or the program code in a computer, operating system that Provides input/output.servi.ces. Access Time 1. The time Interval-between the instant at which data are called for from a storage device and tree instant delivery begins. 2. The time interval between the instant at which data are requested to be stored and the instant at which storage is started. ACK A control bit (acknowledge) occupying no sequence space, which indicates that the acKnowledgement field of this segment specifies the next sequence number the sender of this segment is expecting to receive, hence acknowledging receipt of all previous sequence numbers. ACS I Assistant Chief of Staff Intelligence (Army/Air Force) Aerospace Defense Command, Colorado Springs. ADAPT . ARPA Data Base Access and Presentation Terminal system. A common query language (UDL) being developed in phases by Logicon. Inc. It will provide (in its later phases) a common language that can be used to query any file on COINS. Adapt (Phase I) is a feasibility demonstration of the UDL to target language transforms. ADCCP Advanced Data Communications Control Procedure developed by ANSI. It is a bit oriented protocol. ADP ADP System Security Includes all hardware/software functions, characteristics, and features operational procedures, accountability procedures, and access controls at the central computer facility, remote computer and terminal facilities and Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 200.3/08/18 : CIA-RDP,83T00513R000100:140001-8 and the management constraints, physical structures and devicesi personnel and communication controls needed to provide an acceptable level of protection for classified material, to be contained in the computer system. ADS State Department Automated Document. System. AFIN Air. Force Intelligence, Pentagon. AIRES Advanced Imagery Requirements and Exploitation System. Alternate Routing An alternative communication path used if the normal one is not available There may be one or more alternative paths. Analysis The methodical investigation of a problem, and the separation of the problem into smaller related un:lts for further detailed study. .An/Gyq-21 (V) _ A digital equipment corporation (DEC) PDP-ii-series minicomputer. Application A term. used to denote a COI14S data retreval system (e.g. ISS, TIPS, SOLIS...); The object to which users are connected in processing interactive queries.(This term is deliberatly chosen to maKe clear the separation of a host and the system(ar.olicatioris; now on the host. It is also intended to remind the user that a given set of hardware (a host e. g. NSH) may have two or more COINS aoplicat:ions (systems) (CNCC, ADAPT I, etc resident on it. Sometimes called a "system" (I55, SOLIS); sometimes referred to by the heat on which the application resides (RYE,DIAOLS). ARPA Advanced Research Projects Agency of the United States Department of Defense. Also DARPA. ARPANET The network set up by ARPA. A packet switching intercomputer network developed by ARPA. ARPANET is now managed by the Defense Communication Agency. ARPANET Message The unit of data transmission between a host and an IMP in the ARPANET. The maximum size is approximately 8096 bits. ARPANET Packet A unit of transmission used in the ARPANET between IMPS. The maximum size is approximately 100P. bits.. ASCII American Standard cede for Information Interchange. This is a seven-bit- plus parity code estabiisned by the American National Standards Institute (formerly American Standa:ds Association) to achieve compatibility between Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/.1:8.: CIA-RDP83T005_73R000.100140001-8 data services.. Also called.USASCII. Assistant Secretary of Defense for Intelligence, Now ASDC31-for Command Control Communications-and Intelligence Army-Standard System for Intelligence Support Terminals.- Analyst Terminal Support System. to access specific files or specific information in a file; in general the purposes for which a user has a right Authorization A representation of a users right 2.Pertaining to the sequential input of computer programs or data. 3.Loosely, the excution of computer programs serially.-- -- - switched network scheduled to replace Autodin I in the mid-19bP's. 'Batch Processing i.Pertaining to the technique of excutioc a set of computer programs such that each is completed before the next program of-tne set is started.. 77 AUtodin II ~...__ .. -` _ . . Automatic digital information networK(Dept of Defense). This is a packet BAUD A unit of signalling speed equal.to the number of discrete conditions or signal events per second. For example, one baud equals one-halt dot cycle_ per second in Morse code, one bit per second in a train of binary signals ,and one 3-bit value per second in a train of signals each of which can assume one of eight different states.- -- "' - Binary Synchronous Communicatios (BSC) - A uniform discipline, using a defined set of control characters and control character sequences, for synchronized transmission of binary coded data between stations in a data communications system. _ Rirddog - A device used in Platform to do error detection and retransmission at both ends of the communication line. between a directly connected "Bost" or "Front End" and an IMP._ Slacker Prototype secure communication system. A program to develop new security protection techniques on-packet switched networks. Buffer 1. A routine or storage used to compensate for a difference in rate of flow of data, or time of occurence of events, when transmitting data from one device to another. 2. An isolating circuit used to prevent a driven circuit from influencing the driving circuit. CATENET 26 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08118: CIA-RDP83T00573R000100140001-8'_ This term means roughly the collection of packet networks which are connected together. It is further defined as a confederation at. CAI Computer Assisted Instruction. CAMS Comirex Automated Management System. Capability Application Capability Application Component Capability A specification of the constraints on access. within the range of POSSIBLE modes of access for a Particular "object", if it defines what is Permitted. (Note that the application and component are application-defined. COINS II access systems consisting of NAS, HAS, or TAS. Channel The logical path connecting user to hosr, or host to host. Circuits may be multiplexed to support several channels- conversely, an channel may be distributed over several.-circuits. Circuit The basic physical path Circuit switching A method of communications where a dedicated channel or-circuit between calling and called stations is established on demand for exclusive use until, the connection is released. Each data path is estableshed between two nodes by switching a data circuit for the duration of the need. CMSS Communication Monitoring Sub-System. (NSA Deckroof program.) COI Community of interest. CNCC COINS Network Control Center. The installation and organization responsible for monitoring the current behavior of a network and initiating the repair of failed elements; primarily for failure reporting and accumulation of statistics. CLAMS' COINS Network Management System. A multi-faceted COINS program to develop and evaluate network usage and monitoring information. COINS Community on-line Intelligence System. COINS I This refers to the COINS Network which is continuation of the experimental COINS network that has been in operation for several years. COINS II COINS II is a upgraded COINS to provide needed improvements in COINS I 27 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 primarily to adapt the.ARPANET packet switch technology. COINS PMO COINS Project Management Office Commonality ? (DOD) A quality which applies to material or systems possessing like and interchangeable-characteristics enabling each to be utilized or operated and maintained my personnel trained on the others without additional specialized training; and/or having interchangeable repair marts and/or components; and applying to consumable items interchangeably equivalent without adjustment. Communications computer A computer that-acts as the Interface between. another computer or terminal and, a network, or a computer controlling data flow in a network. Communications control character A functional character intended to control or facilitate transmission over data networks. There are ten control characters specified in ASCII which form the basis for character-oriented communications control procedures See also control character. Compartmented Intelligence Intelligence material having special controls indicating restrictive handling for which systems of segregation or handling are formally established. Compatibility (DOD) Capability of two or more items or components-of equipment or material to exist or function in the same system or environment without mutual interferences. Computer Application That portion of an application which is performed by a computer. Computer Network An interconnection of assemblies of computer systems,terminals and communications facilities. Comsec Communications Security Connection Protocol A procedure for-establishing a communication path between two processes. Connect time A measure of system usage by a'user, usually the time interval during which the user terminal was connected to a process in a computer, i.e. between log on and log off. Connectivity Basic network communication and interconnection between processes. Achieved by backbone communications network as transport tacility, supoporting linkage protocols (standard), and the use of standard internetwork gateways to adapt differences in network technology or protocols to support communications between processes within different networks. CONTEXT A teleconferencing-system which is primarily devoted to document Approved For. Release 2003/08/18 CIA-RDP83T00573R000100140001-8 Approved for Release 2003/08/18 : CIA-RDP83T00573R000100140001-8- Control Character I... A character whose occurrence in'a particular context initiates modifies or stops a control function. 2.. In the ASCII Code, any of the 32 characters. in the first two columns of- the standard code taole. See also: Communications Control Character. Control Procedure The means used to control the orderly communication of information between stations on a data link. E Conversational Pertaining to a mode of processing that involves step-by-step interaction between a computer and the user at a terminal. r 'Conversational mode(also interactive mode) The interaction between a user and a specific system process in which an association, or connection, is maintained between the usere and the process for the entire duration of information interchange. The duration of the connection is referred to as a "session' and the exchange of information ceases when the session is terminated. CPU Central Processing Unit. CrosstalK The unwanted energy transferred from one circuit, called the "disturbing" circuit, to another circuit, called the "disturbed" circuit. CRT Cathode Ray Tube CUPA Coins Usage and Performance Analysis. CUSP COINS User Support Panel. DARPA Defense Advanced Research Project Agency. Data Rase 1. The entire collection of information available to a computer system. 2. A structured collection of information as an entity or collection of related files treated as an entity. Data base processing The storage of quantities of, information, in one or more forms, available to the network and its users. Data Communications The interchange of data from one point to another over communications channels. See Also : Data Transmissions. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For. Release .2003/08/18: CIA-RDP83T00573R000100140001-8 ..The-equipment-that provides.the functions required to establish,-maintain and terminate a connection, tne. signal, conversion, and coding required for communication between data terminal equipment and data circuit. The data communication equipment may or may not be an integral part of a computer;- e.g., a modem. . Datagram - . A pacKet of information which is carried to its destination without reference to any other pacKet, or prior establishment of a data path. An internet datagram is the unit of data exchanged between a pair of internet modules. Data Integerity A performance measure based on the rate of undetected errors. Data. Transmission The sending of data from one DATA COMMUNICATION. place for reception elsewhere. Compare with Director of Central Intelligence. DDCMp .Digital data communications message protocol. A uniform discipline for the transmission of data between stations in a point-to-point or multi-point data communication system. The method of physical data transfer used may be parallel, serial synchronous or serial asynchronous. (DEC) DIAOLS Defense Intelligence Agency On-line System. Also the name. of the retrieval language used on the system. DIS DIA Defense Intelligence DOD Department of Defense. DOD Intelligence information system (DODIIS) That confederation of defense organizations and activities employing manpower, automatic data processing equipment and techniques,- and associated telecommunications assets which support the U. S. Defense intelligence System. Duplex Channel A cnannel providing simultaneous transmission in both directions. Error Correction Unit. Also referred to as BIRODOG. End-to-end encryption Data encrypted at the originating node is not decrypted until It End to end protocol Denotes process(on one computer) to process (on another computer) communication via virtual circuit. Approved For Release 2603/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 EOL A control bit (End of letter) occupyinc no sequence space , indicating that this segment ends .a logical letter with the last data octet in. the segment.. It this end. of letter causes a. less than full buffer to be released to the user and the connection buffer-size is not one octet then the end-of-letter/buffer-size adjustment to the receive sequence number must be made.- Ethernet A high-speed communications system using a snared coaxial.cablew Developed by Xerox Palo Alto Research center. Eucom AIDES European command Analysts Intelligence Display and Exploitation System. FICPAC Fleet Intelligence Center Pacific, located at Makalapa, Hawaii. n of the Also the location of the IDMSC Pacom Switch. . Flow control (Across a connection) The function by whicn a unit: of data is accepted only when it can be transferred across the connection. Frequency Division Multiplexing (FDM) Dividing the available transmission frequency range into narrower bands each of which islused for a separate channel. Front-End Processor (FEP) A computer which, is used to interface between a host computer and the network. . Airforce System Command Foreign Technology Division in Dayton, Ohio. FTP File Transfer Protocol. The protocols necessary to transmit a entire tile from one host system to another. - Fundamental Protocols Concerned with the mechanics, of communication between network components. Multii-level structure for functional modularity. Isolate user level processes from communications details. Support base for the network security and network management. Gateway The pnysical ano logical interface between networks. The principle function of the gateway is the transformation between orotocols of different networks.In IDMSC It, the term 'Gateway' has a different meaning. Every interface to the 1DHSC II ROUTED is referred to as a gateway. The Honeywell 316(a corcuter currently used for IMPS). Hardware The physical equip:-ent or devices forming a computer and peripheral equipment. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 ef.: Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 c Harmonization (DOD) Tne process and for results of adjusting differences or inconsistencies to bring signiticant features into agreement. Header The-control information prefixed in a message text, e. q., source or destination code,priority, or message type. Heterogeneous (Computer) Network A network of dissimilar host computers , such as those of different manufacturers. At least one nodal processor has characteristics that are incompatible with those of the other nodes. Compare: Homogenous Network. Home-Host The host system through whicri, a user ordinarily enters the COINS network. For many. users, a TAS is their home-host; however, any computer system providing terminal user support in the COINS network is the home-host at those users "known" to it. Homogeneous (Computer) Network A network. of similar host computers such as those of one model of one manufacturer. All nodal. processors are directly compatible with regard to such characteristics as data transmission code, instruction set, and other factors which atfect the ability at nodes to share data, program files, etc. Most computer A computer attached to a network providing primarily services such as computation,data base access or special programs or programming languages. Host Interface The interface between a communication processor and a host computers requirements through the 1980's. ICA Information and Communications Applications Inc. IAIPS Integrated Automated Intelligence Processing System. IAIPS is a modernization program to integrate Navintcom systems in support of command Identification 1. The process characteristics or files or data. 2. The process characteristics or tiles or data. of providing personnel, equipmrnt, or organizational codes to gain access to computer programs, processes, equipmrnt, or organizational codes. to permit access to computer programs,processes, IDHS Intelligence Data Handling System IDHSC Intelligence Data Dandling Dystems -Communications. r!' Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08118: CIA-RDP83T00573R000100140001-8 The- store-and-forward network managed by DIA.which connects major DOD. intelligence organization computer systems., IDHSC It.. The. new- packet switcned IDHSC network which will include both batch and interactive protocol. IMP Interface Message Processor. The IMPS are used both as store and forward elements at the nodes of the communications network and as Interfaces between the network and the host computers. The original IMPS were Honeywell H516 computers, slightly modified. For economy, H316 computers were later used. A microprocessor version of the IMP is under development, The new IMP is based. on the BBN Microprogrammable building block(MBB). High performance PLUPIBUS IMPS are also in use. Information 1. An encompassing term including text, data, amd graphic images. 2. Data organized to convey knowledge. .Information interface A logical interface implemented at the application, or user information, level.. Information network A system of logically compatible information processing systems all interconnected by a communications network. Information processing The manipulation of information to produce the desired results. COINS Intelligence Network Interface. Front end processors used to Interface the batch UNIVAC 494's at NPIC and NSA to COINS II IMP. Initial Connection Protocol (ICP) The otfical Arpanet Initial Connection Protocol as specified In MIC Document Number 7101.. .State Department Intelligence and Research Division Information Handling System. Intelligence Intelligence is the product resulting from the collection, evaluation ,analysis, integration-, and interpretation of all information concerning one or more aspects of foreign countries or areas, which is immediately or potentially significant to the development. and execution of plans, , Policies and operations. Interactive Pertaining to exchange of information and control between a user and a computer process, or between computer processes. Interchangeability (DOD) A condition which exists when two or more items possess such functional and physical characteristics as to be equivalent in performance - - 33 Approved For Release 2003/08118: CIA-RDP83T00573R000100140001-8 Approved.For Release 2003/08/18.: CIA-RDP83T00573R000100140001-8 and-durability, and one capable of being exchanged one-for the other without alteration.of the items themselves or of adjoining items, except for adjustment, and without selection for fit and performance. Interconnection Interface (LOGICAL) 1.-Composed at a hierarchical set at protocols that are used to support communications between network processes. 2.. A logical. boundary between protocol layers. Interface 1. A shared boundary defined by common physical interconnection characteristics , signal characteristics,.and meanings of interchanged signals. 2. A device or equipment making possible interoperation between two systems, e.g., a hardware component or a common storage register. A physical interface. 3..A shared logical boundary between two software components. Interface-Layer The collection of specialized terminal access systems (TAS), COINS network front-ends, and server-hosts playing a home-host role for some users. The term arises from thinking of the network having a basic communication function (the "suanet" layer made up of the IMPS and communications lines), an interface layer (the TAS, CHAS, F#'s, etc.), and a service layer (the Service hosts, Windmill, NDS, etc..). Internetdatagram Protocol Defines control functions required to support?internetwork communications Interoperatability (DOD/NATO) The ability of systems , units or forces to provide services to and accept services from other systems, units or forces and to use the services so exchanged to enable them to operate effectively together. (DOD) The condition achieved among communications-electronics systems or items of communications-electronics equipment when information or services can be exchanged directly and satisfactorily between them and/or their users. The degree of interoperability should be defined when referring to specific cases. The COINS network identifier for the Intelligence Center Pacific IONS host computer. IOC Initial operational capability.y. IP Internet Protocol. This protocol provides a way for the TCP to send and receive variable-length segments of information enclosed in internet datagram "envelopes The internet datagram provides a means of addressing source and destination TCPs in different networks. Approved For,Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release. 2003/08/18 CIA-RDP83T00573R0001001.40001-8 C DIA Interactive Support Sytem... 1/0 Input/Output KWS Kiloword seconds, Letter A logical unit of data, in particular, the logical unit of data transmitted between processes using TCP. LH/DH Local Host/Distant Host IMP interfacing unit, LHMSS Local Host. Monitoring Subsystem. One of the projects included in the COINS NetworK Management System(CNMS). LINK .1. Any specified relationship between two nodes in a network. 2.. A communicationm path between two nodes. 3. A data link. Also: Line, Circuit, Virtual Circuit. Lorin (Logan) user access procedure to a system involving identification, access control and exchange of.networK information between user and system. Logout (Logoff) A user exit procedure from a system often providing usage statistics to the user. Lost The Lost system of COINS provides a measurement of the networks's performance in terms of completed messages and messages that are lost. LRP Long Range Plan. MOB IMP An MBB, including I/O board and microcode or IMP 1/0 functions, which emulates an-H316 IMP. Developed by BBN. Message 1. A communication mostly in words intended to be read by a person. 2. A message is a self-contained logical and physical unit of information Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 transmitted between a source and a destination. It may be- subdivided into blacks or packets. It has a-logical relevance to a source and destination. Messages are _analogous to a shipment of goods where packets or blocKS would represent the freight cars. Routing and other control information is contained within the message header and trailer data which is added at the origin and remains unaltered until it: reaches its destination. Multi-Level Security Mode A mode of operation under an operating systek supervisor or executive program) which provides a capability permitting various levels and categories or compartments of material to be concurrently stored and processed in an In)n System. In a remotely accessed resource-sharing system, the material can be selectively accessed and manipulated from variously controlled terminals by personnel having different security clearences and access aporovals. This mode of operation can accommodate the concurrent processing and storage of; A) 2 or more levels of classified data, or B) 1 or more levels of classified data with unclassified data depending upon the constraints placed on the systems by the Designated Approving Authority. (Section V.C, DOD Directive 5200.28). HAS/FE A host-COINS Access system. Navintcom Naval Intelligence Command. MCC Network Control Center. The installation and organization responsible for monitoring the current behavior of a network and initiating the repair of failed elements; primarily for failure reporting and accumulation of statistics. Currently the network control computer is a H316 which collects real time status information on the COINS II network. MITREBUS A high speed communications system using a. shared coaxial cable employing CATV technology. Developed by Mitre Corporation. MLS Multilevel Security. Approved For Release 2003108/18 :. CIA-RDP83T00573R000100140001-8 ?adem(MOdulator-Demodulator) A oevice that modulates and demodulates signals transmitted over communication facilities. Module An implementation, usually In softvare,of a protocol or other process. MMRP . Man machine Relationsnip Prollect. An ARPA sponsored program to improve human Interface to computers. MSL . Maximum Segment Lifetime, the time a TCP segment can exist in the internetwork system.. Arbitrarily defined to be 2 minutes. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved. For Releas& 2003/08/18: CIA-RDP83TU0573R000100140001-8:. C C Network Control. Program. THe program in a host which handles the link .to the IMP and controls. communications between processes in the Host and processes elsewhere in the network. I NCP NCS NSA National Crytological School. NDS NPIC New. Data System. The new NPIC COINS host. Ned A ert text editor developed by BBN under contract to the Rand Corporation .It is used with a CRT terminal to prepare and modify documents, letters, messages, and computer programs. .NEED TO KNOW (NTK) An informal ( up to each-individual user or agency to determine the requirements for disclosure) basis for determining whether or not authorized access to information to individuals whom are otherwise properly cleared. Network 1. An interconnected or interelated group of nodes. 2. in connection witn a disciplinary or problem oriented qualifier, the combination of material, documentation,'and human resources that are united by design to achieve certain objectives, e.g., a social science network, a science information network. Network Control Program (MCP) That module of an ocerating system in a host computer, which establishes and breaks logical connections, communicating with the network on one side, and with user processes within 'IAe host computer on the other side. Network Processinc The movement of i.-:f^rrnatizn anong information processing and data base processing components. Network Security The totality of measures taken to Protect a network from an unauthorised access, accidental or willful interference with normal operations, or destruction. This. includes protection of physical facilities, software, and Personnel security. See also: PRIVACY. Network Topology The geometric arrangement of links and nodes of a network. NIC 1. national Indication Center(obsolete-now merged with NMIC)> 2. Naval Intelligence Command. NIPSSA Naval Intelligence Processing System Support Activity. NMIC National Military lydications Center NMSS COINS Network Meniterrinq Subsystem. A replica of the ARPA Network Control center computer system and a component of the COINS Network 37 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18_: CIA-RDP83TQ0573R000100140001-8 Management System.. (CLAMS) An end point ot" any branch of a network, or more branches of a network.. NOSC Naval Ocean System center in San Diego.. or a junction common to two NOSIC Naval ocean surveillance Intelligence Center in Suitland, MD., National Photographic Interpretation Center Networks Project Management Office NSASAB NSA Scientific Advisory Board NSOC .NSA Sigint Operations Center. NUISS Network Usage Information Subsystem. Null Modem A device which is incoporat:ed into the line driver logic of each Coins II. IMP. This device provides the NCC with the capability for remotely turning the line around to allow verification of operation. NVT Network applications NVT. ONI Office of Virtual Terminal. Vhe "Standard " terminal as seen by on the network. Real terminals are mapped into and from the On-Line 1. Pertaining to equipment or devices under" control of the-central processing unit. 2. Pertaining to a user's ability to interact with a computer. 3. Directly in the line loop. In telegraph usage, transmitting directly onto the line rather than, for example, perforating a tape for later transmission.. open?System. The concept of openness that refers to a set of commonly agreed standards that make possible meaningful interactions between any combination at computing systems, data processing systems, or human operators which are 38 Approved For. Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 CIA-RDP83T00573R000100140001-8 Operating System(0/S) An integrated collection of service routines-for supervising the sequencing and processing of programs by acomputer. Operating systems control. the allocation of resources to users and their programs and play a central role in assuring the secure-operation of a computer system. Operating systems may perform deougging, input-output, accounting, resource allocation, compilation, storage assignment tasks, and other system related functions(Synonymous with Monitor, Executive, Control Program, and Supervisor). Options Field An option field may contain several options, and each option may be several octets in lencth. The options are used primarily in testing situations; for example , to carry timestamps. Both the Internet Protocol and TCP provide for options fields. PAC. . COINS network indentifier for the IDHSC Pacom Switch. PACOM Pacific Command Packet A group of bits including data and control elements which is switched and transmitted as a composite whole. The data and control elements and possible error control information are arranged in a specified format. May be suodivisions of a message eacn of which may be independently routed. It is the physical container into which messages are divided for transmission. Packet Switching A data transmission process, utilizing addresed packets, whereby a channel is occupied only for the duration of transmission of the packet. Note: In certain data communication networks the data may be formatted into a packet or divided and then formatted into a number of packets (either cy the data terminal equipment or by equipment within the network) for transmission and multiplexing purposes. This mode of operation requires an interface processor at each node of the network. An interface processor takes in.a message from its most processor in segments, forms these segments into packets, and ships these packets separately to the network. The destination interface processor reassembles the packets and delivers them in sequence to the receiving system which obtains them as a single unit (message). Each packet is individually routed through the network on a dynamic routing basis toward its destination. PACSWI - Jargon for the IDHSC PACOM switch. PAF COINS network identifier for the Pacific Airtorce (PACAF) IDHS host system. Parity Check Addition of non-information bits to data, making the number of ones in each grouping of bits either always odd or always even to permit single 39 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved. For. Release 2003108118 : CIA-RDP83TOO573R00010Q140001-8 Password - - A. string of characters that is recognizable to automatic means and that permits a user access to protected storage, tiles# or input or output devices. PIRL Photo Interpreter's Retrieval Language. The retrieval language used to interrogate the NPIC COINS files that were resident on the NPIC UNIVAC 494. Platform A cover name for an Arpanet technology based network designed to facilitate the movement of and access to data within NSA. PLATO Programmed Learning and-Teaching Operation. A computer-based education system developed at the Univ. of Illinois. Vended by Control Data Corp.(CDC) PLI Private Line Interface . Used by COINS II to encrypt data trunked through the ARPANET. Plot 10 . A general purpose graphics system. Pluribus High speed modular I4P. An Improved IMP based on the Lockheed SUE Computer. Privacy The right of an individual to control the release or availability of information about himself. Process 1. A systematic sequence of operations to produce a specified result= 2. A set of related procedures and data undergoing execution and manipulation by one or more computer processing units. 3_. The active elements of all host computers in a network 4.Programs in execution.. Projector -An application subsystem of windmill which supports access to the TIPS/RYE data files. Protocol A formal set of conventions governing the format and relative timing of data exchange between two communicating processes. An agreement on the way in which an inter-process communication is to be processed. Protocol Layering The idea of layering is to insulate functions from each other, and to establish standard interfaces between functions. A layer is a?set of related functions which meets 3 conditions. First, a layer must have a specific-hierarchical relationship with respect to other layers. Second,. it-must have well defined interfaces between itself and its adjacent layers. Finally it must be able to communicate with its 40 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 CIA=RDP83T00573R000100140001-8 peers in another host complex. Peer layers: are layers in two different host complexes which perform like functions. Real Time A real-time computer is one whose processing time requirements are governed by external influences. It must receive data, process them, and return the results sufficiently quickly to be useful by the receipient. Real Time System A system performinc.computation during the actual time the related physical process transpires, so that the results of the computation can be used in guiding the process. Registry Data Base USIS files defining user profiles, user guides for COINS tiles, languages, and Host systems, and training courses. Remote Job Entry 1. Suemission of jobs through an input device that has access to a computer through a communications link. 2. The mode of operation that allows input of a batch job by a card reader at a remote site and receipt of the output via a line printer or card puncn at.a remote site. Abbr: RJE. Response Time The elapsed time between the generation of the last character of a message at a terminal and the receipt of the first character of the reply. It includes terminal delay, network delay, and service node delay. This is the time the system takes to react to a given input. It. a message is keyed into a terminal.by an operator and the reply from the computer, when it comes, is typed at the same terminal, response time may be defined as the time interval between the operator pressing the last key and he terminal typing the first letter of the reply. For different types of terminals, response time may be defined simdrly. It is the interval between an event and the system's response to the event. Rule-directed interactive Transaction Agent previously known as Rand Intelligent Terminal Agent. A system designed for use by persons who are not computer sophisticates to develop agents(computer programs) to perform tasks in an automated fashion. It. is ubder development by Rand and is experimentally operational. Remote Job Entry Routing The assignment of the communications path by which a message or telephone call will reach its destination. Real Time Protocol. A host-to-host protocol for communication of time critical information. HYE/TIPS The iSA host system housing the NSA COINS file. SAFE Support to the Analyst's File Environment. A Joint CIA/DIA effort to develop new analyst automated support systems for both agencies. 41 Approved. For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Sc! Autodin II Single Channel Control Unit. SDI Selective Dissemination of Information Seawatch NOSIC's automated ocean surveillance.system. Security Administration The-process of deciding which individuals need access to classified information to perform tneir duties; the verfication of clearances and the entry and maintenance of the user/terminal on network and application access and authorization lists. Security Classifications The national classification system of Uncilassified, Confidential. Secret, Top Secret. "Server"Host A host which makes available a resource (hardware, software or data) to other hosts or users not connected directly to itself. Note, a host can be a "user" host or a "server " host or both. SIP. Autodin II Segment Interface Protocol. SNCS Secure Network Communication system. The communications.network portion of COINS II. Software- Computer programs, procedures, rules and associated documentation concerned with the operation of computers, e.g., compliers, monitors, editors, utility programs. SOLIS Sigint On Line Information System. Source 1. The point of entry of data in a network. 2. A data terminal installation that enters into Data entry may be under operator or machine control. Space Shuttle A diagnostic. system which is throughput. Special Purpose Gateway A gateway implementation protocol. .Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For. Release 2003/08/18 : CIA-RDP83T00573R0001-0014000178 A gateway implementation which is based. on a standard internetwork protocol(e.g.,TCP/IP). Subscriber-to-Transport Protocol. Detines network interface between subscriber(host) and transport facility..'. Support Progrdms Programs to assist in diagnostics, testing, data generation terminal simulations, etc. are support programs. The COINS network identifier for the Arlington Hall switch. TAC II Technical Assessment of the COINS II Program Ad Hoc Group of NSASAB. COINS II Unix-based Terminal Access System. TASMASTER A special user who operates and maintains TAS. T-Carrier AT&T all-digital transmission systems available at.various data rates - 1.544 mb/s (T-i), 6.312 mb/s (T-2), 45 mb/s (T-3) and 274 mb/s (T-4). TCP Transmission Control Protocol. A connection-oriented, end-to-end reliable protocol designed to fit into a layered hierarchy of protocols -which support multi-networK applications. Thesaurus Data Base Usis files containing cross reference to data values collected from various sources. These files contain data for military equipment , geographic locations, and intelligence category codes.. Tetrahedron A secure, digital communication network in the Washington, D.C. area which utilize wideband circuits. 1. Information consisting mostly of words that are readable by a person. 2. A sequence of characters torming part of a transmission which as- sent from the data source.to the data sink, and contains the information 43 Approved For Release 2003/08/18 : CIA-RDP83T00573R0001'00140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R0001.0,0140061-8 to be conveyed. It may be preceded by a.header and followed by an "End of Text" signal. 3. In. ASCII s communications? a sequence of characters, treated as an entity it preceded by a "Start of Text" and followed by an "End of Text" control character. TILE TIPS Interrogation Language. The retrieval language used to interrogate the NSA RYE/TIPS COINS files resident on the Univac 494. Time Sharing A method of operation in which a computer facility is shared by several users for different purposes at (apparently) the same time. Although the computer actually services each user in sequence, the high speed of the computer makes it appear that the users are all handled simultaneously. TIP Terminal Interface Processor., A Honeywell H316 computer acting both as an IMP and as a host computer to enable terminals to connect to the network without a seperate Host being involved(ARPA). The TIP software is one host but other Hosts may be connected to the network via the IMP portion of the TIP. TIPS Technical Information Processing System. That portion of RYE/TIPS which supports the nSA COINS files.. TOCOL Topics on COINS ON?Line. TOSS Terminal Oriented Support System.. Transaction Mode The interaction between a user and the system in which no connection is established between the user and the system process which is to provide the service. The request for the service, or Transaction, is accepted by the system and forwarded to the user service which satisfies the request ,. the results of which are retained by.the system for return to the user upon demand. Transparent Mode Transmission of binary data with the recognition of most control characters suppresed. In Binary Synchronous Communications, entry to and exit from the transparent ;node 1:; indicated by a sequence beginning with a special Data Link Escaoe(DLE) character. Transponder A diagnostic system which is used to test the COINS II Network Control Program and measure throughput. Transport -The telecommunications facility which moves pieces of information from one piaCe to another.(i.e., subnetwork, backbone, packet switching facility,. etc.) TTRF Approved For Release '2003/08/1.8 : CIA-RDP83T00573R000100140001-8 Approved. For Release 2003/08/18.: CIA-RDP83T00573R000100140001-8 Technology Transfer Reasearch-Facility.. A facility directed by the COINS PMO to test and evaluate programs, equipment and software that may improve the service. to COINS users.. Transport Protocols Subnet protocols used between transport facility packet switch nodes to handle transmission, error detection, correction, flow control, routing. Turnaround Time I. The elapsed time between submission of a job to a computing center and the return of the results. 2. In communications the actual time required to reverse the direction of. transmission from sender to receiver or vice versa when using a .two-way alternate circuit. Time is required by line. propagation effects, modem timing and computer reaction. UDL Uniform Data Language supported by ADAPT. The retrieval language used as the basis for ADAPT. UNIX Tradmark for a family of computer operating systems developed at Bell Telephone Laboratories to support time sharing on the PDP 11 computers. Unix was spawned from the Multics program in the late 060s". "User" Host A host which 'support user access to a server host. USISS User Support Information Sub-system. (Replaced by USIS)> Virtual Circuit (VC) A connection between a source and a sink in a network that may be realized by different circuit configurations.during transmission of a message. Windmill A host computer system (87700) on the COINS II Network which supports the SOLIS and PROJECTOR (TIPS/RYEE) applications. Also a host in Platforms. wwMCCS worldwide Military Command and Control. System. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Project Management Office National Security Agency Fait G.orq. G. M.ada, Maryland, 20755 COINS NETWORK MANAGEMENT SYSTEM ANNEX A TO COINS TECHNICAL SUPPORT PLAN Prepared by The MITRE Corporation 7 August 1980 Community On-Line intelligence System ved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Appro., d For Rs ease .2002i081R:.=A-RbP8STO05z3 n c OQ _8:_. TABLE OF CONTENTS B. CNMS Components 1. The Network Monitoring Subsystem (NMSS) 2. The On-Line Network Usage Information Subsystem (NUISS) 3. COINS User Reporting Subsystem 4. The Network Control Computer (NCC) 5. Network Management Computer (NMC) COINS Project Management Page A-1 A-1 A-1 A-5 A-5 A-6 A-7 A-7 II. LONG-RANGE OBJECTIVES A-9 III. JUSTIFICATIONS A-10 IV. FACTORS BEARING ON THE PLAN A-11 A. Facts A-11 B. Assumptions A-12 C.. Issues _ A-12 V. APPROACH A-13 A. Network Monitoring Subsystem (NMSS) A-13 B. lNetwork Usage Information Subsystem (NUISS) A-14 C. User Reporting Subsystem (URSS) A-15 VI. STATUS AND PLANS A-16 A. Network Monitoring; Support System (NMSS) A-16 B. Network Usage Information Subsystem (NUISS) A-16 C. User Reporting Subsystem (URSS) A-17 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 TABLE. OF CONTENTS (Concluded) C VII. RESOURCES & SCHEDULE A. Network Monitoring Subsystem B. Network Usage Information Subsystem (NUISS) C. User Reporting Subsystem D. Total COINS Network Management System E. COINS PMO Staffing Page A-17 A-18 A-19 A-20 A-20 A-21 A-22 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 I'._ DESCRIPTION This Annex includes 1) the COINS Network Management System (CNMS) which is perceived as a system of hardware, software, and procedures to operate, control, and manage the COINS; and 2) the human resources in the COINS PMO required to operate and manage the COINS project. COINS Project Management is presented in Section I and VII only. The COINS Network Management System has been conceived to pro- vide the data, processing, and display of information required to operate, control, and manage the COINS Network and its associated services. The system will support long-term management and planning as well as the day-to-day activities associated with network opera- . The focal point for the CNMS data collection, processing, and display is the COINS Network Control Center (CNCC). A. CNMS Components Three categories cf information have been identified to support the COINS Network Management: monitoring, usage, and user. The three susbsystems identified to collect, process, and display the collected information are the Network Monitoring Subsystem (NMSS), the Network Usage Information Subsystem (NUISS), and the User Reporting Subsystem (URSS). Two computers, the Network Control Computer. (NCC) and the Network Management Computer (NMC), have been identified to support those subsystems. '_. The Net-work Monitoring Subsystem (NMSS) Tae Network Monitoring Subsystem (NMSS) is the part of the CZNNS that coordinates and controls the network's performance activities. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 _ 88 pO,1Q0~annn~ Q _.. The Network. Monitoring Subsystem (NMSS) will collect all of the network monitoring activity into one subsystem. It includes what was formerly known as the Communications Monitoring Subsystem (CMSS), and the functions for moni- toring the local hosts. The components of the network to be monitored include: (1) Communications Processors (IMPs) (2) COINS Access Systems (CASs), i.e., Host Access Systems (HASs) Terminal Access Systems (TASs) Network Access Systems (NASs) (Gateways) (3) Host Processors (4) Communication circuits and associated equipment including COMSEC devices - The NMSS software now .is a. subset of the on-line Net- work Control Computer (NCC) software. The NCC (Honeywell 316) receives performance data from all IMPs on a timed periodic basis, and prepares status reports of communica- tion network status that are printed on-line on the Logger Model 33 Teletype attached to the NCC. The NCC also re- ceives diagnostic data from the network and produces re- ports on the Sumnary Model 33 Teletype attached to the NCC. The monitoring activity, currently limited to the IMPs, will be expanded to include the COINS Access Systems, the host processors, the status of interfaced networks, and the communications.. Monitoring the COINS Access Systems Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 will be accomplished directly with the NCC as with the Is, Monitoring the host processors and interfacing networks will be accomplished via the Host Access System (HAS.) and the Network Access System (NAS) respectively. The communi- cations monitoring will. be accomplished through: DECK. ROOF.. Monitoring will include reports of throughput data ds well as status :reports and error reports; e.g., transmission errors, retransmissions, and unusual delays. Figure 1 presents the general data flow for the COINS Network Management Systems. (a). Local host monitoring will monitor hardware, software, and communications facilities associated with a host. The monitoring will be performed in real-time, identifying faults and monitoring operational thresholds so that they can be quickly evaluated and corrected as needed. The purposes of the, local host monitoring activities are to keep a status on the host resources, and to de- tect malfunctions and to trigger corrective pro- cedures. The local host monitor functions will be accomplished by the NCC and Host Access System. Findings will be reported to the local host manager and to the COINS Network Control Center. (b) Communication Monitoring - DECK ROOF (or a successor) will be installed in COINS to monitor the Ti (TETRAHEDRON) network and COMSEC devices. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 THROUGHPUT: PACKETS (IMP-IMP) . (CIRCUITS) MESSAGES (IMP-CAS DOWN (# MINS) : CIRCUITS IMPS CASs HOSTS MONITORING DATA USAGE DATA NETWORK CONTROL COMPUTER - NCC REAL TIME NETWORK STATUS DISPLAYS THROUGHPUT DOWN BATCH: INTERROGATIONS (FILE, HOST, NETWORK MANAGEMENT NMSS NUISS URSS USER, TERMINAL) ABORTS (FILE, HOST, USER, TERMINAL) LOST (FILE, HOST, USER, TERMINAL) COINS NETWORK MANAGEMENT SYSTEM INFORMATION FLOW USER REPORTS USER COMMENT SURVEY RESPONSE INTERACTIVE: NUMBER CONNECTION MINUTES CONNECTED FAILED CONNECTION Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The design includes provision for special monitoring. information to be provided to the NMSS (on an exception basis) of any COINS-related mal- functions or other significant. events. :DECK ROOF was started in response to a re- quirement from the COINS PMO to NSA/T to develop a real-time capability to monitor all Ti. communi- cations facilities associated with COINS II and report problems. The project was expanded by NSA/T to include the monitoring of all NSA com- munications facilities including COINS. 2. The On-Line Network Usage Information Subsystem (NUISS) The On-Line Network Usage Information Subsystem (NUISS) collects and integrates system logs for each host and switch and tabulates information on usage, operating performance,. responsiveness, and reliability of COINS. 3. COINS User Reporting Subsystem The COINS User Reporting Subsystem will provide the mechanisms for users, managers, and system personnel to comment on their experiences with the COINS Network and its accessible resources, to suggest changes to the network and accessible resources, or to suggest new capabilities and services. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Included in the design concept is a mechanism to assure that all comments and suggestions are responded to by the responsible organizations. Another facet of the design concept is to support general and selective surveys to solicit comments. These surveys will be conducted-by the COINS PMO but. the impetus for such surveys may be provided by any organization re- lated to the COINS Network. 4. The Network Control Computer (NCC) The Network Control Computer (NCC) supports remote diagnosis and software maintenance. Diagnostic and statis- tical data from each of the IMPS are automatically reported to the NCC approximately every minute. When network deg- radation is reported, background programs can retain control of-the network, isolate equipment failures from communica- tions line trouible, and perform many kinds of recovery. From the Network Control Center, it is possible to reload D software throughout the entire network. It also per- forms and coordinates troubleshooting activities in COINS. At present, the NCC operators use three different consoles to perform their operations and control functions. It is planned to automate these functions while operating from one console. The obsolete NCC H316' Computer will be replaced by a BBN C/70 Processor.1 At the time of the C/70 implementation, The C/70 is a processor based on the BBN Microprogrammable Building Block (MBB) architecture.. The BBN C/30, also called the MBB IMP, will replace the H316 IMPS. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 CIA-RDP83T00573R000100140001-8 extensions to the monitoring system will be initiated to cover all COINS Network major components. Also, the moni- toring data will be transferred to the NMC for maintaining. a history file, developing trends, and providing management reports. Concurrently with the BBN C/70 installation, all network operations, diagnostics, tests, and corrective action- will be accomplished at a single integrated console. The console will include CRT displays (graphic and alpha- numeric) as well as hardcopy output. 5. Network Management Computer (NMC) With the upgrading of the NCC Computer, a second BBN C/70 processor will be installed to process the moni- toring and throughput information, to collect and process the usage data in support of NUISS, and to collect, process, and retain infoiration in support. of the User Reporting Subsystem. The NMC will also be used to develop, test, validate, and verify software for the NCC and NMC and will function as a backup for the NCC. B. COINS Project Management COINS project management is described as management, opera- tions,.and user support. The management activities are: Program Planning and Budgeting Cuatxacting; and Contract Monitoring ln_er-Agency Coordination Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Identifying User Requirements Configuration Management Serving on Various Community Committees-and Ad Hoc Working Groups Developing? Implementing, and Monitoring Appropriate Security Procedures The management activities are expected to change little in the next five years amd, therefore, the management staff will remain relatively static. The operations activities are: Operate and Arrange for Maintenance of the Equipment Located in the CNCC: IMPS, NCC, NMC, NSH, TTRF, and associated peripheral devices. Identify and Correct Network Faults. Maintain Accurate Status of the COINS Network and its Components. Coordinate Error Detection and Correction with Other COINS Participants. Maintain Physical Security of CNCC. Validate and Verify New or New Releases of Network Software and Hardware. Develop Procedures for All Aspects of Operations.. The COINS Network is now operating 17 hours per day (0600- 2300) Monday through Friday excluding holidays. It is planned to increase the operations staff and to extend the period of operations to 24 hours per day, seven days a week including holidays. The user support activities are: Develop Training Courses. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Conduct Training. Courses Assist Users in Accessing COINS Resources Determine Courses for User Problems and Taking Corrective Actions Informing Users of New and Changed Resources and User Guides Coordinating Training Requirements with Participating Agencies With the addition of new users brought about by the increased accessibility of COINS through TASs, new host computers (DODIIS) and interfacing networks, the work..load on the user support will increase dramatically over the next two-three years. The situa- tion will be worsened with the addition of new hosts and their attendant resources and different methods and procedures. The situation will change little until 1986 when person-to-person training will give way to the automated User Support Information System using Computer Aided Instruction (e.g., CDC PLATO). It is expected that the user support staff can be reduced at that time. II. LONG-RANGE OBJECTIVES The goal of the CNMS is to provide timely accurate information in a useful form to network managers: to perform the day-to-day management of the network, to maintain a data base of performance and usage data for trend analysis for short- and long-range planning of qualit:LZiv jln:i ;uantitative improvements, and to detect degener- ating conditions in the network. The long-range objective is to develop and implement a fully automated on-l.inp system for the collecting, editing, analyzing, and Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 reporting network information. This information will be used by the COINS PMO to monitor the network. operations and performance, and to assess the utility of the COINS II Network to the end users of the COINS accessible services?- Subsets of the information will be pro- vided to the agencies involved with the COINS PMO for their informa- tion, evaluation, and action, and to support their resource management and budgeting decisions. Further, it is an objective to automatically perform fault diagnosis and fault correction to the maximum extent practical. It is recognized that: this objective will not be achieved in a single giant step but rather will be achieved gradually over the years. It is also recognized that: while incremental improvements are being defined, developed, tested, and implemented, existing procedures and methods must be maintained. in an operational status. III. JUSTIFICATIONS Management is a priori requirement for a system as valuable and complex as the COINS network. The network is both complex in its operations and in the development of capabilities to satisfy the users' needs. To eliminate or at least minimize the false or misdirected starts in satisfying user needs, monitoring the qualitative aspects of COINS accessible services is just as important as the quantitative aspects. Timely and accurate information about the network, its accessible services and user satisfactions is required to do the cost-benefit analysis necessary to allocate scarce resources to improve existing services, to increase capacity of existing services, and to provide new services. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Failure to collect the needed information to present it in usable form, to analyze it, or to act on the acquired knowledge will result in the deterioration of the existing services, ignoring user needs by not improving or developing capabilities, or by providing inappropriate capabilities or inappropriate changes. The development program for the CNMS is in direct response to the ASD(I) Review Group Report. on the Evaluation of the COINS Experiment dated 1 February 1973. The review group recommended that: "Present COINS reporting procedures be modified to allow the collection of statistics more amenable to permitting evaluation of system usage, timeliness, and effectiveness. The COINS Project Manager should be directed to submit a plan for statistical reporting which would.(a) identify the objectives of such reporting (i.e., what must be learned about-the system), (b) the items of data to be collected to satisfy the objectives, and (c) the analysis _ to be performed on the data to provide the desired information." IV. FACTORS BEARING ON THE PLAN A. Facts 1. Most of the service host computers are not owned by the COINS PMOand, therefore, are not under the COINS PMO control..-.- As an alternative to the host reporting status data every n seconds (the preferred mode), the local host status data will be derived by sending appropriate messages to the host system and evaluating the responses. These monitoring ac- tivities will be accomplished by the NCC and the Host Access Systems and preclude the need to modify the host computer system to support COINS monitoring. A similar procedure may have to be adapted for interfacing networks. A-11 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 2... With regard to the monitoring of the TETRAHEDRON network and COMSEC devices which are being monitored by the DECK ROOF system currently under development, the NMSS must con- tent itself with that data which will be made available by these developers and managers of DECK ROOF. B. Assumptions 1. It is assumed that the DECK ROOF manager will provide the data necessary for NMSS to operate, control, isolate malfunction- ing components, and to inform users and managers of outages or pending outages of all COINS major network components. If this assumption proves false, a complete status of the COINS Network may not be available and.will reduce the fault isolation ability of the CNCC. 2. It is- assumed that the DODIIS hosts attached to the COINS Network will be attached, monitored, and require the collection of usage data the same as COINS hosts. If these host computers are to be treated-differently, the difference must be known to reflect them in the design of the CNMS. See ISSUES, para- graph IV.C. following. C. Issues The COINS Network has been designated (at least informally) by DIA to be the Washington, D.C. area network for DODIIS. As such, the DODIIS hosts in the area will be attached to the COINS Network in the same fashion as COINS hosts; i.e., through a Host Access System. It is not known at this time if the CNMS will be required to collect, Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 . process and store the same type of information for the DODIIS host systems as is planned for the COINS hosts. Also, it is not known how many DODIIS hosts will be attached to COINS. If this issue is not resolved, a choice must be made relative to how to treat the DODIIS hosts in the subsystems - the choice may be wrong necessitating redesign and reprogramming. V. APPROACH The approach to meeting the long term objectives of the CNMS will be evolutionary because current systems and procedures must be maintained in an operational mode as new hardware, software and procedures are de- veloped and implemented. A. Network Monitoring Subsystem (NMSS) With the delivery and installation check out of the NCC BBN C/70, the IMP monitoring functions now accomplished by the H316 will be converted to the BBN C/70. Following the H316 to C/70 conversion, the monitoring will be extended to include the COINS Access Systems (HAS,. NAS & TAS) and the server hosts that are attached to COINS with a Host Access System. Concurrently, arrangements will be made with DECK ROOF system to send communication and COMSEC status data to the NCC for integration with other network status data. Monitoring and throughput data collected by the NCC will be passed to the Network Management Computer (NMC) for storage and for analyses to determine if chronic problems exist or are de- veloping in any of the components, and to support trend analysis Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 of the components and sets of components.. In the ARPANET, processing of historical (longer than most recent 24 hours) monitoring data is accomplished in the DEC PDP 10 computer at BBN. These processes were never implemented in the COINS Net- work because of a shortage of computer resources. With the installation of the BEN C/70 as the NMC, the processing of historical monitoring data and traffic data will be initiated on the COINS Network., Also, the monitoring and traffic data will be correlated with usage data to determine if poor perfor- mance on any set of major components show positive correlation exists between usage and poor performance in order to determine and implement appropriate corrections. B. Network Usage Information Subsystem (NUISS) The first step in the evolution of the NUISS has been started, i.e., the network usage information processing is being moved from the IBM 370 system (not a COINS host) to the COINS Network Service Host (NSH), PDP 11/70. The system logs are still processed on the IBM 370, but some of the files extracted from the logs are manually transferred to the NSH to prepare the reports needed by the COINS PMO. This migration will continue until all processing is accom=plished on the NSH including the initial processing of the system logs. It is anticipated that all NUISS processing will be accomplished on the COINS NSH by the end of FY 1981. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The feasibility of collecting the system logs automatically from the COINS access systems has been demonstrated. The capa- bility will be implemented as the network hosts adopt the COINS II Host Access System (HAS) as their network interface. This transition will be completed by 1984. - Concurrently with the IBM 370 to NSH migration and implementation of automatic log collection, a BBN C/70 micro-programmable processor will be. installed (end FY81) to perform the collection, processing, storage and display for the CNMS including the NUISS. Beginning in FY82, the processing for NUISS being done on the NSH will migrate to the BBN C/70 NMCS computer. The software development for processing NUISS data on the NSH will be compatible with the BBN C/70 and can be transferred with little difficulty after the C/70 has been installed and checked out. C. User Reporting Subsystem (URSS) The User Reporting Subsystem does not exist in any structured way in COINS. A pilot system will be implemented during FY81 to evaluate the concept, establish the design characteristics of such a system, and to determine how it should be implemented. Assuming the pilot system evaluation results in a decision to provide a User- Reporting Subsystem, an initial capability will be developed and implemented on the CNQ!C BBN C/70 starting in FY83. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003%0 $"8ri~- VI. STATUS AND PLANS A. Network Monitoring Support-System (NMSS) Network monitoring is presently maintaining the status quo -.no development effort is ongoing. A capability specification is being prepared for extending the monitoring to the COINS Access Systems and the server host computers. Current plans call for BBN to design and program the extensions for the BBN C/70, and to deliver.. the monitoring software with the hardware late in FY81. Likewise, a capability specification for the processing of network monitoring data comparable to the capabilities provided by the DEC PDP 10 computer at the BBN ARPANET Control Center, will be presented to BBN so that the software to process historical status and traffic data will be delivered with the BBN C/70 late in FY81. Enhancements to the NMSS will be developed in FY82 through FY84 to provide the host monitoring functions and further enhance- ments if experience indicates their need. B. Network Usage Information Subsystem (NUISS) The processing of two major files, CUPA and LOST, have been transferred from the non-COINS UNIVAC 494 (RYE/TIPS) to the COINS Network Service Host (NSH). The host computer logs are collected manually and processed to extract the CUPA and LOST files which are then manually transported to the NSH where management reports are prepared and displayed for information and action. Approved For Release 2003/08/18 : CIA-RDP83TOO573ROO0100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The next step is to move the processing of the manually collected system logs to the NSH where they can be merged with automatically collected system logs from the COINS Access Systems. This processing of manually collected logs and implementation of the automatic collection of the CASs system logs will. be accomplished as the server host computers convert to using the COINS Host Access System (HAS). The conversion is planned for completion when WINDMILL attaches to a HAS in FY84. In E782, the NUISS will be transferred from the NSH to the NMC. During FY82 and F783, the NUISS management reports will be refined and expanded to take advantage of available graphics capabilities, available on the Network Service Host. During.FY84, the processing will be developed to correlate usage data with monitoring data. User Reporting Subsystem (URSS) The pilot User Reporting Subsystem will be implemented in one or,two Terminal Access Systems (TASs) in FY81 and be system evaluated throughout FY81 and into FY82. A capability specification for the URSS will be developed in FY82 and the system will be de- veloped for the BBN C/70 in FY83 and implemented starting in FY84. VII. RESOURCES & SCHEDULE The following tables show the funds that have been budgeted or programmed and, for the out years, planned to develop, implement and Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 maintain, the COINS Netweork Management- System. The funds are those required for procurement and contractor support. In-house resources are excluded. A. Network Monitoring Subsystem (NMSS) FY80 FY81 FY82 FY83 FY84 FY85 FY86 &M roeurement- T&E 175 --- -- 170 400 --- 250 --- 200 250 50- 200 250 --- 200 250 -- 150 250 150 TOTAL 175 570 450 500 450 400 400 1000 of Dollars TheFY80 and FY81 0&M funds are those required to maintain the hardware and software for the existing NCC H316. The O&M funds for FY82 through FY86 are to maintain the hardware and software for the NCC 13BN C/70 and the NMC BBN C/70. The FY83procurement funds are to purchase a console for the integrated display of-monitoring data in the CNCC. The procurement finds (FY81) are for the purchase of two BBN C/70 hardware and the network monitoring software for the NCC C/70, and the software to process the historical monitoring data for the NMC C/70. The RDT&E funds in FY83'through FY86 will support enhancements to the NMSS, develop software for the CNCC integrated display, and to develop automated diagnostic and Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For V el 2 fault correction routines and to develop validation and verifica- tion software for the CNCC. The RDT&E funds in FY82 are to develop software for correlating monitoring and usage data on the B. Network Usage Information Subsystem (NUISS) FY80 17Y81 FY82 FY83 FY84 FY85 FY86 &M Procurement RDT&E 20 --- 250 100- --- 150 100 -- 100 120 -- 120 120. -- 120 120 --- 120 120 120 TOTAL 270 250 200 240 240.: 240.: '. :240. 1000 of Dollars The O&M funds are to maintain the software for the NUISS. The RDT&E funds for FY80 and FY81 are to transfer the NUISS processing from the IBM 370 to the COINS Network Service Host (NSH) PDP 11/70 and to implement the automatic collect-ion of system logs from COINS Access System. RDT&E funds in FY82 will support the transfer of NUISS from the NSH to the COINS Network Management Computer (CNMC), BBN C/70. RDT&E funds for FY84 through FY86 will be for the development of reaction reporting on a real-time basis. A-19 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 C. User Reporting Subsystem- (t]RSS) FY80 FY81 FY82 FY83 FY84 FY85 FY86 SAS --- -- --- --- 60 60 60 Procurement --- --- -- - - -- T&E --- * * 200 120 120 120 TOTAL --- --- --- 200 1,90 180 180 1000 of Dollars * The development of a pilot URSS will be accomplished under the Man Machine Relationship Program which is funded by the DOD Advanced Research Project Agency (ARPA). See. Annex C, Network Development. The RDT&E funds'('FY83-FY86) are to develop, implement, and ehhance the operational UR3S follow ng the. pilot- systea_evaluation. D. .Total COINS Network 'Management System (CNMS) FY80 FY81 FY82 FY83 FY84 FY85 FY86 &M Procurement RDT&E 195 --- 250 270 400 150 350 --- 300 .370 50 520.. 430. -- 440 430 -- 390 430 390 TOTAL 445 820 650 940_ 970 ?820: :820: 1000 of Dollars Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 E. COINS PMO Staffing The resources for the COINS PMO are shown in terms of the in-house staff requirements rather than dollar resources. FY80 FY81 FY82 FY83 FY84 FY85 FY86 Management Operation User Support 8 8 6 8 11 8 9 15 12 9 15 15 9 15 15 9 15 15 9 15 12 TOTAL T 22 27 36 39 39 39 36 Staff Years per Year Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 FY80 FY81 FY82 FY83 FY84 FY85 FY86 NMSS ? Install 2 BBN C/70s .. -4 ? Test Hardware and Software for NCC &11MC ? Develop Correlation Routine for Monitoring and Usage Data ? Develop Enhancements for NCC & NMC NUISS ? Transfer Processing to NSH PDP 11/70 ? Implement Automatic Log Collection ? Transfer Processing from NSH to NMC BBN C/70 ? Develop NUISS Enhancements URSS ? Develop Pilot URSS ? Evaluate Pilot URSS ? Develop Operational URSS Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 FeRelease4003/0$I18 G1A-- Community On-Line Intelligence System Project Management Office National Security Agency Fort George G. Moods, Maryland, 20755 COINS NETWORK RESOURCES ANNEX B TO COINS TECHNICAL SUPPORT PLAN Prepared by The MITRE Corporation 7 August 1980 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 'TABLE OF CONTENTS Page I. DESCRIPTION B-1 A. Interface Message Processors (Iles) B-3 B. Host Interfaces B-4 C. COINS Access System (CAS) B-4 D. ADAPT B-4 E. User Support Information System (USIS) B-5 F.. Other User Services B-6 II. LONG-RANGE OBJECTIVES Interface Message Processor (IMPS) B-7 B. COINS Access System (CAS) B-7 C. Service Host B-8 D. ADAPT B-9 E. User Support Information Systems (USIS) B-9. F. New Protocols B-10 G. Network Virtual Terminal (NVT) B-11 H. Priority/Precedence B-12 III. JUSTIFICATION IV. FACTORS BEARING ON THE PLAN B-14 A. Factual B-14- B. Assumptions B-15 C. Issues B-16 A. Interface Message Processors (IMPS) B-17 B. COINS Access Systems (CASs) B-18 C. Service Hosts B-20 D. ADAPT B-21 E. User Support Information System (USIS) 8-22 F. New Protocols B-22 G. Network Virtual Terminal (NVT) B-24 H. Priority/Precedence B-25 VI. STATUS AND PLANS A. Interface Message Processors (IMPS) B-26 B. COINS Access Systems B-26 C. ADAPT II B-27 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 TABLE OF CONTENTS (Concluded) Page VI. STATUS AND PLANS (Continued) D. User Support Information System (USIS) B-27 E. Network Service Host (NSH) B-28 F.. New Protocols B-28 G. Network Virtual Terminal (NVT) B-29 H. Priority/Precedence B-30 VII. RESOURCES AND SCHEDULE B-31 A.. Interface Message Processor (IMP) B-31 B. COINS Access Systems (CASs) B-32 C. ADAPT B-33 D. User Support Information System _(USIS) B-34 E. ' Network Service Eost (NSH) B-34 F . New Protocols B-35 G. Network Virtual Terminal (NVT) B-36 H.. Priority/Precedence B-36 I.. Total COINS Network Resources B-37 LIST OF ILLUSTRATIONS Figure Number Page 1 Current COINS Host Computer Interface B-2 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 L. DESCRIPTION Resources.as used here include the hardware and software that are provided to the servers and users of COINS by the COINS PMO.- Included are the Interface Message Processors (IMPs), the interfaces between the IMPs and host computers, the Terminal Access Systems (TASs), the interfaces to other networks, and the software resident in the suite of hardware.. Presently the interfaces between the IMPS and host computers consist of an Intelligent Network Interface (INI) for the RYE system at NSA, a Front End Processor (FEP) for the SIGINT On-Line Information System (SOLIS) at. NSA and a Host Access System (HAS) for-the New Data System (NDS) at NPIC. See Figure 1. The INI and FEP use DEC PDP 11/40 computers with the ELF operating system. The HAS uses a. DEC PDP 11/70 computer with the UNIX operating system. It is planned that all host computer interfaces will be standardized on the DEC PDP 11/70 UNIX HAS architecture when the WINDMILL computer assumes the RYE and SOLIS functions. In addition to the preceding hardware, the COINS PMO provides Private Line Interfaces (PLIs) to allow the use of ARPANET as a back- bone communications network to gain access to the COINS network. A PLI is installed at IPAC and one has been purchased and is scheduled for Lawrence Livermore Laboratories (LLL) in FY81. The communications lines--TETRAHEDRON in Washington, D.C. area and leased or ARPANET elsewhere--are not provided by the COINS PMO. The hard wire communication between Iles and TASs, and between IMPs and host computer interfaces are provided by the COINS PMO. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 - ----------- Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 INTERFACE SYSTEM HOST COMPUTER NAME HARDWARE OPERATING SYSTEM RYE U-494 PDP 11/40 ELF SOLIS B 7700 PDP 11/40 ELF NDS U 1110 PDP 11/70 UNIX Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The software provided and maintained by COINS PMO includes those programs resident in the front ends, access systems, Ilk's, and PLIs that implement the basic services of those hardware devices and pro- grams to provide special services directly to the users. These special services as envisioned today include a common query language (presently ADAPT), a User Support Information System (USIS), a text editor, a data base management system to provide a home for data files of com- munity interest that cannot: be made available on another COINS host computer, mail and message services, teleconferencing, local personal file storage, and data manipulation capabilities. Some of these may be resident in one or more COINS host computers. Others may be made availab.Le in COINS Access Systems, or COINS PM0 sponsored host computers. Notable among the latter is the User Support Information System. A host computer to adopt homeless files could be provided by the COINS PMO or another participating agency if unused capacity were available on the host. Following are brief descriptions of the COINS PMO provided hard- ware and software resources. A. 'Interface Message: Processors (Des) The IMPs are the packet switches to internet the host com- puter and COINS Access Systems on the COINS network. The IMPS are owned and controlled by the COINS PMO as are the programs residing in the Ills. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 CIA-RDP83T00573R000100140001-8 B. Host Interfaces The Intelligent Network Interface (INI) and a. Front-End Processor (FEP)--both DEC PDP 11/40s with the ELF operating system-serve as the COINS Network interface for the NSA RYE and SOLIS systems respectively. The INI and FEP will be replaced with a COINS Host Access System (HAS) when the WINDMILL computer takes over the RYE computer functions. At that time, WINDMILL will house both RYE and SOLIS systems. C. COINS Access System (CAS) The CAS is an umbrella name for Host Access System (HAS) which is the interface between a host computer and COINS, Termi- nal Access System (TAS) which is the interface between terminals and COINS, and Network Access System (NAS) which is the inter- face (gateway) between another network and COINS. The CASs and most: of the resident programs are provided and controlled by the COINS PMO. All TAS software is under COINS PMO control, all HAS software including that part required to interface with the host computer is controlled by the COINS PMO, and the COINS half of the NAS is controlled by the COINS PMO. D. ADAPT ADAPT eliminates the requirement for users to learn and use the query language for each host computer system they have need to access by providing a common query language. The common common query language is transformed into the query language of the host computer being accessed and prepares the query response B-4 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 for display to the user. The user has the option to use the standard language or the target system language. Batch and interactive.modes>are:_ available through ADAPT. E. User Support Information System CUSIS) USIS is the central automated repository of all information concerning the resources on COINS that are available for users, and how these resources can be used. All user guides for files, query languages, and other resources (e.g., USIS, ADAPT, Text Editors, and host computers) will be available.in USIS and acces- sible via COINS for training and user reference. The key characteristics of USIS are user profiles, guides and training aids, authoring and a thesaurus. User profiles record, for each registered user, areas of interest relative to the resources available via COINS. The profiles are used to automatically inform the users of changes in various guides. The guides are the many on-line publications that provide infor- mation for accessing and using the available resources. The training aids provide sample uses (sample queries for example) of the resources, and provide lesson plans for training the user not familiar with a particular resource. Authoring provides the mechanisms for the responsible individuals to prepare the user guides on-line. The mechanisms are constructed such that the format of guides are standardized and, therefore, easier to understand when many guides must be learned. The thesaurus pro- vides a cross reference of data element names and codes as they B-5 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 CIA-RDP83T00573R000100140001-8 are used in the. many files of the sponsoring agencies. The thesaurus in this regard' is an interim measure to alleviate the problems brought about by the lack of data element standardiza- tion. F. Other User Services One or more text editors will provide the users with the capability to prepare and modify documents on-line. This.capa- bility, coupled with mail and teleconferencing, facilitates coordination and collaboration when the originators of an iiitelli- genceproduct must coordinate or collaborate with geographically dispersed participants. Using the COINS Network for product production is more efficient than the mails or travel. Local, personal file storage and data manipulation capabili- ties provided needed services to users who access COINS through a TAS-and must rely on COINS accessible resources for all such services. II'. LONG RANGE OBJECTIVES The long range objectives are to provide the servers and users needed hardware and software support that is more cost-effective for COINS PMO to provide than smother member organization. Further, the COINS PMO will endeavor to supply these resources in such a way so as to encourage the use of the valuable resources accessible on the COINS Network. The sponsoring agencies are encouraged to provide and maintain resources for COINS users when it is more cost-effective than can be Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA=RDP83T00573R000100140001-8 achieved-by the COINS PMO.. The provision of. text editing, for example, may be. better provided by all agency host computers and made available to COINS users. who need the service. However, no plans exist for the COINS member agencies. to extend text editing or other services, except for processing and responding to file queries, to users via the COINS Network. Many resources will be supplied by the COINS PMO because many COINS users access the host computers via TASs and the only com- puter resident resources available to them are those offered on the COINS Network. To achieve the long range objective of cost-effective?suppoit, the COINS PMO plans to provide standardized access system hardware and standardized protocols for gaining access to any resource available via COINS. Standardization will lead to cost-efficiency in resource acquisition and maintenance. A single access command language will allow a user to access any COINS resource. A. Interface Message Processor (IMPS) The IMPS will be upgraded from the current Honeywell H316 processors to the new BBN C/30 microprogrammable processor. The current H316 processors are obsolete and are becoming more diff i- cult and more costly to maintain. Software for the IMPS will be centrally maintained in the COINS Network Control Center and will be downstream loaded to the IMPs. B. COINS Access System (CAS) The network interfaces now being used for RYE and SOLIS at NSA and the IDHSC gateway at DIA will be replaced by Host Access C Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18_:.CIA-RDP83T00573R000100140001-8 Systems and a Network. Access' System respectively-, Standardizing .the COINS access also makes possible a. common mechanism to con- trol access to the COINS network and available resources. The long range. plan for. the COINS CAS is to limit their functionality (where practical) to providing and. controlling access to the COINS'Network. All CASs-Host Access (HAS), Termi- nal Access (TAS), and Network Access (NAS) will provide for bilateral communications between their respective components, for access controls required for COINS Network security and for a precedence/priority system for use when the COINS Network or an accessible resource becomes overburdened. The COINS PMO plans to achieve and maintain. uniformity of the COINS Access Systems and to provide and control the CASs and the software-for which the COINS PMO is responsible-for accomplishing the functions of the CASs. Uniformity of hardware and software will minimize the cost of software development and maintenance and provide for downstream loading of software from the COINS Network Control Center. Uni- formity is necessary for maintaining configuration control over the so tvara resident in the CASs. C. Service Host The COINS PMO service host computers in the long term will be attached to the network in the same fashion as other agency host computers; i.e., with a HAS. Where practical, the services now sipported by the TAS that are required. to support users who Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 CIA-RDP83T00573R0001001400.01-8 enter the network via a TAS. will be moved to one. or more COINS PMO service host computers or. the service host computers of other participating organizations. The COINS PMO Network Service Host (NSH) currently installed on the COINS Network. is being used for COINS PMO purposes--software development, TAS backup, software testing, and processing usage information. When the BBN C/70 processor-takes over usage data processing and the User Information Support System (USIS) is moved to a. USIS dedicated PDP 11/70 (end of FY82), the NSH will be used to supply services for users. D. ADAPT' . The development of ADAPT to provide a uniform information retrieval language is aimed at eliminating barriers to the use of the information available on. the many COINS host computers that result from the need to learn many retrieval languages. ADAPT will.. go through incremental improvement cycles based on user experience with each successive revision of ADAPT. E. User-Support Information System (USIS) USIS will, in the long term, become part of a computer-aided instruction system to provide COINS users with high quality instruction at their home work stations. At that time it is expected'that the courseware for COINS users will be prepared by professional instructors who are knowledgeable in the resources being covered. The instructors of the several intelligence Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 .schools are likely candidates for courseware development. The COINS PMO will be responsible for developing instruction programs to teach how the COINS Network is accessed and to teach the users how to use any unique services that are provided by the COINS PMO. The CAI version of USIS will maintain records of student achievements to measure the students' progress and to provide information for use In evaluating the effectiveness of the lessons and instructional material. F.. New Protocols The ASD(C3I) has directed all DoD computer networks based on the packet switch technology to adapt the standard DoD Transmis- sion Control. Protocol. (TCP) for host-to-host communication and the-standard Internet: Control Protocol (IP) for communications between computer networks. The COINS PMO plans to adopt these protocols after they are evaluated in a test bed environment to determine the impact they may have on throughput and to determine if other software should be modified to minimize any detrimental impact that the protocols may have. The need for a general File Transfer Protocol (FTPI will be investigated and if one is needed, it will be adapted from an existing FTP or a new one developed for implementation in COINS. The purpose of the FTP is to provide a mechanism for effective and efficient large volume data transfers from a host Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 to another host or to an.acaess system that provides file services. The purpose of an FTP is not to provide for repli- cating files or large: sections of files on various processors to satisfy users desires to have their private data bases. Clearly, this would defeat the reason for COINS inception; i.e., sharing information that is maintained by the single agency responsible for the completeness, accuracy, and timeli- ness of the information. G. Network Virtual Terminal (NVT) The COINS PMO will implement a Network Virtual Terminal to provide for handling a wide range of user terminals on the net- work. The NVT will translate the individual terminal character- istics into the NVT:representations at the processor closest to the terminal (e.g., TAS) and will translate from the NVT repre- sentation to the individual user terminal characteristics. At the server end of the communication (e..g., HAS) the NVT repre- sentation will be translated into terminal characteristics of a terminal type that-is serviced by the host computer system and vice versa. Using the NVT protocols, a wide range of terminal types can be used for accessing COINS resources without the need for each host to implement terminal handling software for each type of terminal. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 E. Priority/Precedence A priority/precedence system will be implemented in COINS to assure that users involved in-crisis situations are given the best possible. service: within the-COINS. Presently, all users have equal priority and precedence whether they be trainees or NMIC Watch Officers. The priority/precedence system will be implemented in the COINS Access Systems (CASs). In this way all network access to all resources on COINS can be controlled, however, the COINS priority/precedence system cannot govern user access that is made directly to the host computer. III. JUSTIFICATION The provision of the capabilities to share. intelligence informa- tion among the users within the intelligence community is the keystone of the COINS charter. These basic capabilities (resources) are pro- vided through an assemblage of Interface Message Processors (IMPs), the communications between. the IMPs, COINS Access Systems, and the procedures and software needed for their proper functioning. . To this basic set, resources of community interest have been added to support the efficient exchange and processing of-information, and to provide a system for COINS user support. The need-for these resources is not the consequence of a single agency's action, but is the consequence of all participating agencies collectively. For this reason, the User Support Information System and ADAPT are being Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 developed to address the global problems of COINS user training and the multiple query languages respectively... Likewise, a file transfer protocol, network virtual terminal, and priority/precedence are net- work-wide solutions to problems that are brought about (at least in part) by the network. A network-wide mail/message service and teleconferencing can be implemented in the several host computers, the COINS Access Systems or some of both. Implementation in the COINS Access Systems is planned whether. or not they are implemented elsewhere. It will be less costly because the services need only be developed once and replicated in the standard access systems. Implementation in the several host com- puters,. even if all affected agencies agreed, would require separate development, implementation and maintenance for each host. Further, the COINS PMO has provided and is planning on expanding, services to users who access COINS via a TAS. The storage, processing, manipulation, and display of retrieved information for this group of users is limited to the services provided on COINS by the COINS PMO or to. those that can be accomplished manually, unless the hardcopy of the retrieved data is entered into another computer available to the user that can process Top Secret SCI information. Since some COINS users who have need to access, retrieve, and process intelligence data are members of agencies outside the intelligence community and the Department of Defense, COINS is the only source for automated storage and processing of retrieved classified data. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Justification for the provision of a host computer and DBMS to make available data files of community interest that cannot be made available on another COINS host is dependent on the number of such files and the amount of interest in accessing the data. COINS PMO will only provide this service if the number of files and amount of interest justify their COINS accessibility, and no other COINS host has excess capacity. IV. FACTORS BEARING ON THE PLAN A. Factual 1. DIA has indicated that the COINS will be the Washington, D.C. area network for DODIIS. This will require a Host Access System for each DODIIS computer to be attached to COINS. The number of such hosts have not been determined, and therefore, program planning and budgeting cannot be accomplished. Also, it is not known to what extent the DODIIS system guides, file guides, etc. must be included in. USIS. 2. During the transition of IDHSC to AUTODIN II, a. gateway between IDHSC and AUTODIN II will not be developed. COINS will provide the cm=unication link for AUTODIN II sub- scribers to access IDHSC hosts and vice versa. COINS must provide sufficient capacity at both.gateways to handle the traffic until the transition of IDHSC to AUTODIN II is comp ~et.ed. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 3. The Network Control Protocol (NCP) currently being. used is COINS will be replaced with the DoD standard Transmission. Control Protocol. (TCP4), and the DoD standard Internet Pro- tocol (IP) will be implemented in COINS. The impact of these changes must be assessed to determine if other COINS software must be modified to accommodate the new protocols and maintain efficient operations. Initial indications are that a different version of the UNIX operating system may be required by the COINS Access Systems -TASs, HASs, and NASs. Also, the NCP of the ELF operating system based INI and FEP will not be changed to TCP4. A method must be developed to allow the coexistence of NCP and TCP4/IP in COINS. 4. There is no ;precedence/priority system in COINS. In the event of a crisis resulting in a heavy load on one or more COINS resource or host computer, there is no mechanism whereby the users who have the critical need for service can be given preferential treatment. B. Assumptions 1. The DODIIS computers to be attached to COINS will be COINS hosts; i.e.., be interfaced with a COINS Host Access System and use the COINS protocols. See paragraph IV A.l., preceding. If these hosts are not interfaced via a HAS or other protocols are implemented, special arrangements must be made for their attachment to COINS. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 2. Users who access.the COINS from a TAS will require COINS-provided special services for.the storage, processing,, and display of retrieved data. Also, services provided for universal use that can be provided more cost-effectively by COINS will be developed and implemented by the COINS If this assumption is false, development programs and. contracts must be curtailed depending on the inaccuracy of the assumption. C'. Issues The number of DO:DIIS hosts to be attached to COINS is not known. The number of hosts and the schedule for joining COINS must be established In order to plan, program,. and budget for the hardware and software acquisition. The delay in establishing the number and schedule could result in unacceptable delays in attaching the hosts to COINS and delay the transition of IDHSC to AUTODIN II. V. APPROACH The approach to meet the long term objectives of the COINS PMO is to evolve modularized hardware and software for the IMPs, COINS Access Systems, and COINS PMO Service hosts so that functions may be changed, added or deleted on any component easily with minimum impact on the component and other components in the network. The functional Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 description of the COINS p:resented in Part II, COINS Architecture, will provide the basis for modularization. This approach will provide for the addition, modification or deletion of functions on a universal basis (e.g., all access systems), a subset (e.g., all terminal access systems), or on a single component. (one access system). In this way components can be tailored to meet specific requirements without sacrificing the advantages of standardi- zation. As mentioned, the approach is evolutionary, and probably will not be completely implemented until the end of the 1980's. To accom- plish the degree of modularity required, hardware and software must be implemented whose architecture is supportive of modular implementa- tions of the required functions.. A. Interface Message Processors (IMPs) The functionality of the IMPS has remained static since the packet switching technology was adapted for-COINS. There are no plans to change the functions being performed by the IMPs. The Honeywell H316 processors will be replaced by BBN C/30 processors. The BBN C/30 is the smallest system available in the BBN micro- programmable Building Block line of computer systems. If the functions assigned to the IMP were increased, the C/30 capacity and capability could be easily enhanced to accommodate the increase. Approved For Release 2003/08/71CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RD.P83T00573R000100140001-8 B.- COINS Access Systems (CASs) Of all the components of COINS, the COINS Access Systems- will-benefit most from a modular/functional approach to accom- plish the delivery of COINS network services. The Terminal Access System (TAS) as presently configured, is a relatively large DEC PDP 11/70 system at approximately $250,000 per copy for hardware. The number of TASs will increase from two to six over the next two years and perhaps more in later years, but no firm .projections have been made. The current TAS is configured to provide many services beyond those required for terminal access and its configuration does not easily support tailoring each TAS to the needs of the organizations and individual users. Ideally, each service (or perhaps logical subset) would be main- tained in a standard configuration and provided to those access systems that have need for it. Likewise, any special hardware for a service would need to be part of the TAS only if the ser- vice was installed. The general purpose hardware, e.g., memory and processing power and terminal ports, would be sized for each TAS installation. The modular approach to network services will provide for structuring a minimum TAS (hardware and software) when only terminal access support is needed, and will provide for a TAS that looks more like a service host, if such is re- quired, without losing, control of the configuration of the hard- ware and software and still take advantage of reduced costs afforded by standard hardware and software acquisition and main-. tenance. Approved For Release 2003/08/1 1CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Even if hardware cost-becomes an insignificant part of the total cost, a.functional modular.-approach to the hardware- and software architecture will minimize the--impact of software. changes in one function on other functions, and will facilitate the changing of software to firmware and vice versa when de- sirable. The same advantages apply to the Host Access Systems (HASs) and Network Access Systems (NASs), but perhaps not to the same extent. To date, only one HAS has been installed and, although a.gateway exists between IDHSC and COINS, it is not a COINS standard. With suclr--little experience, the functions that may be optional for a HAS or NAS cannot be known with much confidence. In some instances, however, a HAS may also provide for terminals to access the COINS network through the HAS. This will require some of the TAS services and hardware to be installed in the HAS. Similar situations may prevail with the HAS. It is expected that the. need for a modular NAS will be clear if the envisioned local office networks with wide variations in their capabilities and protocols are attached to COINS via NASs. Some with a rich assortment of services will use a minimal NAS, with others the NAS may be the best location to provide needed services normally associated with a TAS. The NAS design in total requires collaboration with the gateway designers of the other network. It is not clear if the COINS PMO should be responsible for developing software to B-19 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 translate from COINS to-'what is expected by the other network or to translate from other into COINS, do both or neither. The assigned responsibilities (to COINS PMO and other networks) will most likely be different for different networks, The first steps :Ln.the evolution to a modular architecture for hardware and software will. be to upgrade all COINS host in- terfaces to standard Host Access Systems, to provide a functional description of the NAS, and to develop a design for the COINS half of the system. Many functions (at least at the less detailed levels) for all access systems are the same; for example, access control, monitoring and usage reporting.. For this reason, a functional description of each access system will be prepared in order to select a single hardware architecture to satisfy all COINS Access Systems. Once an architeci:u::e has been established and the basic design is developed, suppliers can be identified to provide the standardized, modular hardware and software. Further, if the downward trend of hardware cost continues, c the implementation of redundant CASs will be considered to improve reliability especially for hosts access systems and network access systems. C. Service Hosts she implementation of the User Support Information System (USIS) on a dedicated computer in FY82 and the transfer of the Network 3sage Information Subsystem (NUISS) to the Network Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Management-Computer inFY82, the Network Service Host (NSH will be free to offer services to users. The NSH will initially pro- vide the capabilities for users to keep personal files and per- form text editing functions on the personal files. As a follow-on, a Data Base Management System (DBMS) will be installed on the NSE for local file retrieval and data manipulations. In addition to the NSH, the installation of the CIA RECON host will provide for implementing files of community interest that are sponsored by agencies that do not sponsor a host on COINS. It is expected that the CIA RECON host will be installed in FY85 although a schedule has not been established. D. ADAPT ADAPT II will be ready for evaluation beginning in FY81.. It will be installed on one or more TASs for use by the persons supported by the TASand by COINS PMO personnel. The evaluation is expected to be done over a 12-month period. During the evalua- tion, minor changes will be made to enhance the utility of ADAPT II. During the evaluation a specification will be prepared for ADAPT III based on user experience with ADAPT II and identified additional capabilities. ADAPT II will continue to be used in an operational environment during the development of ADAPT III which will be evaluated in a fashion similar to ADAPT II, Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 E User Support Information System CUSIS) A USIS pilot system will be installed on DEC PDP 11/70 computer in the COINS PMO. The pilot system will be used during FY81 to assess its benefits and to develop a specification for a production model of USIS (USIS-I), assuming that the USIS benefits can justify the cost of its development. The develop- ment of the production. model will take place during FY82 and FY83. USIS-I will not include an on-line computer-aided instruc- tional (CAI) system. The incorporation of USIS into a CAI sys- tem will be considered, during the USIS-I evaluation when a suitable CAI system can be identified for use on the COINS. Network. At this time, it is not clear if USIS will be complemented by a relatively simple CAI system or if USIS will become one applica- tion on a.highly sophisticated system such as PLATO, F. New Protocols 1. Transmission Control Protocol and Internet Control Protocol (TCP/IP) The first step in adapting the DoD Standard TCP/IP is to develop a-test bed to assess the impact of the new pro- tocols on the throughput on the COINS Access Systems, and to identify any needed changes in other CAS resident soft- ware-notably the UNIX operating system. Concurrently with the design of the test bed, the throughput of the present Network Control Protocol (NCP) Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 access systems will be bencbmarked to provide a basis for the impact analysis. During FY81, tests will be run with TCP/IP and the version of UNIX presently being used in the COINS Access Systems to make throughput measurements and to identify any bottlenecks. The tests will be repeated with modifications in UNIX or other access system software to determine to what extent the throughput can be increased and the bottle- necks can be eliminated. Assuming acceptable throughput can be achieved, the TCP/IP protocols will be installed in the COINS Access Systems in the latter part of FY81. Associated with the TCP/IP impact analysis and installa- tion are an impact analysis using TCP/IP and the Kernel Secure Operating System (KSOS), and the development of a mechanism to provide for the coexistence of NCP and TCP in the COINS. These activities are presented in Annex C, COINS Network Development Summary. 2. File Transfer Protocol (FTP) A study will be performed to determine the requirements for an FTP. There is no recognized need for-an FTP to suppott users of COINS in the current mode of operations for COINS; i.e., query-response activity. However, the DODIIS hosts to be. added to COINS may have need to transfer large amounts of information to other DODIIS hosts. Also as COINS evolves to provide services beyond query-response, an FTP may be required. Approved For Release 2003/08/1 > _ JA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 An FTP is now operating in COINS, but it is limited to transfer between DEC PDP 11 processors.. If the study re- veals a need for an FTP for other COINS hosts, either an existing FTP (ARPANET FTP for example) or a new FTP will be developed. G.. Network Virtual Terminal (NVT) The different types of terminals that should be accommodated by the NVT and the characteristics of the NVT and where the translations from real terminal to virtual terminal and vice versa are under study. It is planned at: present to implement COINS NVT in the UNIX based COINS Access Systems. Implementation of NVT for all hosts then will not be completed until the WINDMILL computer uses a Host Access System to connect to COINS - now scheduled for mid-FY1984. NVT could be implemented in TASs and the Host Access System for NDS to provide a richer assortment of terminals to access NDS. However, the TAS terminals (other than TTY Model 40) could not access RYE, SOLIS or DIOALS because the NVT would not be recognized by the front ends or gateway respectively. This limited increase in flexibility for TAS users will not justify starting the development of a COINS NVT. The specification development for a COINS NVT will be undertaken .in FY83 with a phased implementation starting in the second half of 'FY84. By FY83, NVT developments for networks to which COINS will interface (PLATFORM. and.AUTODIN II for example) should be. far enough along so that: the COINS development can take advantage of the ongoing or completed developments. Also, the COINS NVT trans- lation requirements for other network NVTs will be known. Approved For Release 2003/08/18 3Glf-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 H.. Priority/Precedence The priority/precedence system will be defined for.-COINS. after similar systems resident on the other networks with which COINS will interface are studied and evaluated. To the extent that the COINS system differs from others, a translation must be made at the gateways for the other networks. The problems that may exist in assuring uniform treatment when multiple net- works are involved in the source-destination channel are not known. The procedures for the priority/precedence system will be spelled out and coordinated with all agencies involved before the system is designed and implemented. The system will-be implemented in the COINS Access Systems. This will assure uniform treatment. within COINS and will not involve. the host systems in the system development and implementa- tion..- Also,-the system need be developed once and replicated in all standard COINS Access Systems. VI. STATUS AND PLANS The status of the COINS Network Services range from completely operational. to undefined. COINS-II is an operational network and has completely replaced the central switch of COINS I. All traffic with- in COINS is now passed via one or more IMPs from origination to destination. The ARPANET-COINS interface experiment to determine the feasibility of using the ARPANET as the long haul communications net between PACOM and COINS is still considered to be. in a test phase. PACOM, however, is using the connection.to submit queries and receive responses in support of their operational needs. Approved For Release 2003/08-/18- CIA-RDP83T00573R000100140001-8 B-25 Approved For Release 2003/08/18 :_CIA-RDP83TO0573R000100140001-8 The- same techniques that are, employed in_ the PACOM-COINS" test C will be implemented to give Lawrence Livermore Laboratories (LLL) access to COINS in an operational mode. The LLL access is scheduled for mid-FY81. A. Interface Message Processors (IMPS) The Honeywell H316 Ills will be replaced by the BBN C/30 processors starting in mid-FY81 and phased to the end of FY83. A BBN C/30 has been installed in the COINS network and was shown to be plug-to-plug compatible with the H316. Five H316 COINS BTs are now operating-one at DIA, one at NPIC, one at NSA, and two at the COINS PMO, plus the BBN C/30 in the COINS PMO. In addition to replacing. the H316 IMPs, two new C/30 IMPs will be installed in mid-FY81-ane at NAVINTCOM and one at the State Department to support TASs. B. COINS Access SystAm The COINS Terminal Access System(TAS) has been operational since FY78. Three TASs are now operating-one at PACOM and two at the COINS PMO. During FY81, four more TASs will be installed- one each at NAVINTCOM, State Department, DIA, and LLL in that order. Presently,. one COINS Host Access System (HAS) is installed at NPIC to interface the NDS to COINS. The second HAS will be procured in FY82 and will be installed for the WINDMILL computer at NSr, in 778-. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 Three COINS Network Access, Systems (NASs) are planned for interfacing the IDES(:,. AUTODIN II,, and PLATFORM networks to COINS. The IDESC and PLATFORM NASs are planned for implementa- tion in. early FY84. Implementation of the NAS to interface AUTODIN II and IAIPS to COINS has not been scheduled, C. ADAPT II. ADAPT I was developed to demonstrate the feasibility of the approach taken to address the multi-retrieval problem. ADAPT II. is being developed and will be installed in early FY81. Following its installation the system will be evaluated relative to the user interface, the utility of provided capa- bilities to users, and the efficiency of operation. Based on this evaluation a specification will be-prepared during FY81 for development of. ADAPT III during FY82. ADAPT III is planned for delivery at the beginning of FY83 and will be. evaluated during FY83. D. User Support Information System (USIS) The pilot USIS will be implemented on COINS PMO DEC PDP 11/70 at the end. of FY80. An evaluation program to be undertaken during FY81 will culminate In a specification for USIS-I, which will be developed during FY82, and FY83. An investigation will be started in FY83 to determine if a computer-aided instruction (CAI) system would be a useful, cost-effective adjunct to USIS. If it is Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 determined that- a. CAI: system. should support USIS, a: development.-, effort to..incorporate. USIS in?a CAL system will be undertak E. Network Service Host (NSH) The PDP 11/70 currently designated as a network service host has been used to develop software and to support the COINS Network Management System (Annex A), and it will continue in these roles through F182. Beginning in FY83, the PDP 11/70 will- be-available to support users with an editing capability and provide for the storage of user files. These services can be supported by software currently available on the PDP 11/70. In FY83 a Data Base Management System (DBMS) will be selected and installed on the network service host. The selection will be based on an evaluation of how well the DBMS that are available for PDP11 systems satisfy the perceived needs of the users to be supported and the cost of acquisition and maintenance. F. New Protocols 1. Transmission Control Protocol and Internet Control Protocol (TCP/IP) The study to determine any detrimental effects of imple- menting the DoD standard TCP/IP in the UNIX based COINS Access System will be undertaken in FY81. The effort will start in FY80 with the preparation of a test bed design and a plan for accomplishing; the study. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R0001.00140001-8. Assuming; no major problems are encountered during the study, TCP will-be implemented in the UNIX based Access System in FY82. If major problems are discovered, implementation will- be: delayed until the problems are. solved. The delay will be determined by the nature of the problems and availability of resources to address them. 2T. File Transfer Protocol (FTP) A file transfer protocol, furnished by DEC for. PDP 11 computers, is being used by COINS to transfer system logs from the COINS Access Systems to the NSH computer. This PTP is only usable between two PDP 11 systems. The study to determine the need for a general FTP will be undertaken in FY83. If the study shows a generalized FTP is needed, a survey of available FTPs will be made to determine if an existing FTP can be used by COINS or adapted for COINS. If an FTP must be developed for COINS, it will take place in FY84. G. ' Network Virtual Terminal (NVT) An interim report on an NVT study was completed to November 1979. This study estimated the cost for developing a highly flexible NWT would range from $1.8 million to $2,7 million, Because an NVT would not be of significant value to COINS users until all resources were accessible using an NVT, the start of Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 and NVT- program will be-delayed until FY83. It is. expected that other NVT.developments now planned or in progress will be usable, at least in part, and will reduce the cost of a COINS NVT signifi- cantly. Also, the, NVTs now. being considered for IDHSC, AUTODIN II,,. and PLATFORM, will, be firm enough to provide a. firm specification for translating between the COINS NVT and other network NVTs. In FY83 the NVT for COINS TASs and HASs_will be specified. The development effort will take place in FY83 and FY84. Imple- mentation will be accomplished by the end of FY85. The NVT for COINS Network Access Systems (NASs) will be included in the designs for those gateways. The design for the IDHSC and PLATFORM NASs will start in FY83 and be implemented in FY84. The AUTODIN II NAS design is not scheduled. Presently, the TTY Model 40, teletype is a de facto -:NVT :it.. the COINS Network. The Delta Data terminals on NDS and other types of terminals on the NSH are made to appear as TTY Model 40 when they enter the COINS Network. The same approach is being taken for the HP 2645 terminals at NAVINTCOM. H. Priority/Precedence - The study of the priority/precedence systems used in the network that will interface COINS (AUTODIN II, IDHSC, and IAIPS) will take place in FY83. The functional description of the COINS priority/precedence system and the procedures for when the system will be envoked, treating traffic reaching COINS or in COINS, and treating the priorities/precedences of the interfacing net- works will be prepared in FY83. B-30 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The procedures will be- coordinated. with all agencies partite cipating in COINS (users and servers) early in.FY84. In antici- pation. of only minor changes during coordination,a design specification for the system will be developed concurrently with the, coordination. Development of the system will be completed and implemented early in FY85. VII. RESOURCES AND SCHEDULE The. following tables show the funds that have been budgeted, pro- grammed or planned to procure, develop, implement, and maintain the '-hardware and software associated with the COINS Network Resources. The funds shown are those required for procurement and for contractort support. In-house-resources are shown in Annex A, COINS Network_ Management System. A.. Interlace Message Processor (IMP) YY80 FY81 FY82 FY83 FY84 FY85 FY86 &M 85 85 165 165 165 165 165, PROCUREMENT --- 50 100 50- - - . - RDT&E - - -. -- -- -- - TOTAL 85 135 265" 215- 165 165 165 1000 of Dollars The O&M funds are; for the hardware and software maintenance of the present H316 IliPs in FY80, FY81 and FY82 and to maintain the BBN C/30 ZMes starting in FY81 and continuing through FY86. B-31 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 .may ~ Approved For Release 2003/08/18 CIA-RDP83T00573R000100140001-8 The procurement funds- FY81-FY83, are for the purchase of five BBN C/30 processors and their resident software. Not shown is the acquisition of two or three BBN C/30 IMPs to be provided by the PLATFORM project in exchange for a. COINS PMO owned BBN PLURIBUS IMP. B.- COINS Access Systems (CASs) FY80 FY81 _ FY82 FY83 FY84 FY85 FY86 0&M 260 420 813 1,078 1,078 1,078 1,078 PROCUREMENT 7461 -- 7802 -- -- - RDT&E 123 100 874 500 250 -- -- TOTAL 1,129 520' 2,467 1,578 1,328 1,078 1,078 1000 of Dollars Except for $28,000 in FY80 to upgrade the existing COINS PMO TAS, the 0&M funds are for hardware and software maintenance for Terminal Access Systems (TASs), Host Access Systems (HASs), and Net- work Access Systems (NASs). In FY80 three TASs, and one HAS are covered. Three additional TASs will be purchased in FY80 and main- tained starting in FY81. The TAS at LLL will be maintained under a separate LLL contract. The funds for maintaining the NAVINTCOM TAS will be transferred to COINS PMO via MIPR. Increases in FY82 and FY83 are for two MASs and two HASs that will be added to the mainte- nance requiremen-'s through FY86. 1$296 provided by COINS EM0; $225 provided by NAVINTCOM for one TAS; $225 provided by LLL for one TAS. 2lncludes funding for the purchase of: HAS for WINDMILL, NAS for.: PLATFORM, and a NAS for IDHSC. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 CIA-RDP83T00573R000100140001-8 The procurement funds in FY80 are for existing COINS PMO TAS upgrade ($71,000), for purchasing three TASs ($675,000) in FY80, and for purchasing two NASs and two HASs in FY82. The funds for the pur- chase of the LLL TAS and NAVINTCOM TAS will be transferred to the COINS PMO via MIPRs by the respective organizations. The RDT&E funds for FY80 and FY81 are for software enhancements to TAS and HAS software. The FY82 funds are for development of NAS software for the PLATFORM and IDHSC NASs and HAS software for the WINDMILL and CIA Host HASs. The NAS and HAS software development will continue into FY83. Also included in FY82 and FY83 are funds for expected CAS software enhancements. All FY84 funds are to de- velop expected CAS software enhancements. C. ADAPT FY80 FY81 FY82 FY83 FY84 FY85 FY86 O&M -- - -- 25 25 25 25 PROCUREMENT -- -- -- - - - RDT&E 123 150 150 50 0 0 0 TOTAL 123 150 150 75 25 25 25 1000 of Dol lars The RDT&E funds in 1780 are for the development and implementa- tion of ADAPT II. FY81 RDT&E funds will provide for the evaluation of ADAPT II, minor enhancements to ADAPT II and preparation of the ADAPT II specification. FY82 funds are to be used for developing ADAPT III which will be evaluated using FY83 funds. B-33 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Maintenance of ADAPT is planned to commence in FY83. D., User Support Information System (USIS) PROCUREMENT RDT&E TOTAL 1000 of Dollars c The RDT&E funds budgeted in FY80 will provide a USIS Pilot system that will be evaluated in FY80. FY82 and FY83 RDT&E funds will be used to develop USIS I. Also in FY83, the feasibility of complementing USIS with a Computer Aided Instruction (CAI) system will be determined. Assuming a USIS/CAI system is desirable, it will be developed in FY84 and FY85. Funds for USIS enhancements are planned in FY85 and FY86. Contractor maintenance for USIS will start in FY84. Purchase of the USIS Host Computer System will take place in FY82. E. Network Service Host (NSH) 1000 of Dollars Approved For Release 2003/08/18$ QI --RDP83T00573R000100140001-8 -34 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The O&M procurement and RDT&E funds are for the selection acqui- sition and implementation and maintenance of a data base management system for the COINS PMO network service host. F. New Protocols FY80 FY81 FY82 FY83 FY84 FY85 FY86 O&M PROCUREMENT RDT&E *80 100 25 45 150 -- -- TOTAL 80 100 25 45 150 1000 of Dollars "ftnds provided by ASDC3(I) The study - to -determines any detrimental-impact of replacing the Network Control Protocol (WCP).with TCP in the COINS Access Systems will start in FY80 and be completed in FY81. Assuming the replacement of NCP with TCP is desirable, it will be implemented in extant COINS Access Systems in FY81 and FY82. COINS Access Systems acquired after FY81 will have TCP. The RDT&E funds in FY83 are to determine the requirement for a FTP to survey existing protocols and to select and adapt an existing FTP for COINS. In the event a new FTP must be developed, the FY84 funds will be required. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 G... Network Virtual Terminal (.NVT) FY80 T781 FY82 FY83 FY84 FY85 FY86 &M PROCUREMENT RDT&E 350 250 200 100 TOTAL 350 250 200 100 1000 of Dollars Development on NVT for COINS is planned to start in FY83 with a Phase 1 operational capability to be implemented by.the end of FY84. A second version of NVT will be undertaken in FY85 and implemented in FY86. Installation of NVT will be limited to COINS Access Systems, and,-the maintenance of NVT is included in the 0&M funding plan for the COINS Access Systems. H. Priority/Precedence FY80 FY81- FY82. FY83 FY84 FY85 FY86 O&M PROCUREMENT RDT&E 150 200 50 TOTALS 150 200 50 1000 of Dol lars Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The RDT&E funds cover the study of the other network systems, developing procedures, and the design and implementation of the COINS priority/precedence system. Since the system will be installed in the CASs? O&M funds for maintenance are included in the CAS funding. . Total COINS Network Resources FY80 FY81 FY82 FY83 FY84 FY85 FY86 O&M 345 505 '978 1268 1323 1323 1323 PROCUREMENT 7461 50 1180 75, -- -- -- RDT&E 422 400 1299 1405 1100 450 200 TOTALS 1513 955 3457' 2748 2423 1773 1523 1000 of Do llars 1$296:provided_by COINS PMO for one TAS; $225 provided by NAVINTCOM for one TAS; $225 provided by LLL for one TAS. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 :CIA-RDP83T00573R00010?14004 FY80 FY81 FY82 FY83 FY84 FY85 FY86 IMP ? Purchase BBN C/30 A AL ? Install BBN C/30 NAVINTCOM ....1 State Dept. ? Replace H316 with C/30 CAS ? Purchase 3 TASs ? Install TASs NAVINTCOM DIA LLL State Dept. A ? Install TAS Enhance- ments ? Purchase -l HAS . I - - and 2 NASs - - - ? Develop HAS and NAS Software ? Implement Software for: PLATFORM NAS IDHSC NAS WINDMILL HAS ? Install CAS Enhance- ments -A A NSH S l --?- ? e ect DBMS - I l ? mp ement DBMS Approved For Release 2003/08/18 : Cl P83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 SMEDULE: (Continued) FY80 FY81 FY82 FY83 FY84 FY85 FY86 ADAPT ? Develop & Implement ADAPT II a Evaluate ADAPT II ? Prepare Specifi- cations for ADAPT: II ? Develop & Implement ADAPT III ? Evaluate ADAPT III USIS ? Develop & Implement. Pilot USIS ? Evaluate Pilot USIS ? Develop USIS Implement USIS ? - ? Evaluate CAI ? Develop USIS/CAI ? Implement USIS/CAI NEW PROTOCOLS ? Define TCP Test Bed ? Evaluate TCP A ? Implement TCP ? Determine FTP Requirements ? Adapt FTP for COINS -. NVT ? Develop NVT _AJ I l t NVT I ? emen mp C Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 SCMDDLE (Concluded) FY80 FY81 FY82 FY83 FY84 FY85 FY86 NVT (Cont'd) ? Enhance NVT ? Implement Enhanced NVT PRIORITY/PRECEDENCE ? Study Other Systems ? Develop Procedures ?- Coordinate Procedures ? Prepare Specification ? Develop System ? Implement System A S - Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 / ji oved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Project Management Office National Security Agency Fort George G. Meade, Maryland. 20755 COINS NETWORK DEVELOPMENT ANNEX C TO - COINS TECHNICAL SUPPORT PLAN Prepared by The MITRE Corporation 7 August 1980 Community On-Line Intelligence System Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Page I. DESCRIPTION C-1. II. LONG-RANGE OBJECTIVES C-3 III. JUSTIFICATION C-3 IV. FACTORS BEARING ON THE PLAN C-5 A. Facts C-5 B. Assumptions C-6 C.. Issues C-7' A. General Procedure C-9 B. Net. Development C-10 C. Training Management C-12 VII. RESOURCES AND SCHEDTrLES -14 A.. Man Machine Relationship Program (NMBP) C-14 B.. RITA C-15 C'. TEXT EDITING/WORD PROCESSING (NED) C-15 D. GRAPHICS C-15 E. ADAPT, MMRP AND RITA INTEGRATION C-15 F.. TOTAL NETWORK DEVELOPMENT C-16 APPENDIX: CAPABILITIES FOR EVALUATION 18 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 C I. DESCRIPTION This annex provides the long-range plans for new development,. evaluation, and testing of hardware and software necessary to provide and maintain high quality COINS services so that users will be encourv- aged to exploit the COINS accessible resources. The COINS PMO is not responsible for building better mouse traps, but for providing accessible easy-to-use paths to the door. In this regard the COINS PMO will continue to remove or reduce the barriers that exist between the information stores and the users' capability to make full use of the information. Many of these barriers have been. described in Section If COINS. Concept of Operations, and Section II, COINS Architecture. Notable are the need to use many retrieval lan- guages and the shortage of automated user tools to store, manipulate and otherwise process information from many sources after retrieval. Ways to remove or reduce these barriers is the object of COINS network development activities. The main thrust of COINS network development is technology trans- fer. The COINS PMO looks to existing capabilities or capabilities being developed (and funded) by other organizations and evaluate them to determine if they can be adopted or adapted for use in COINS. Para- mount of the technology transfer approach was the adaptation of ARPANET packet switching technology to COINS in order to improve the poor net- work performance and to decrease the vulnerability associated. with the central store and forward switch that preceded packet switching in COINS. Technology transfer continues in many other areas. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The development (COINS funding) route is chosen only when no other acquisition of'the. capability is satisfactory and the need for the resulting capability justifies the higher acquisition cost. Major among the developments are the COINS Access Systems-TAS, HAS, and In addition to the development and the evaluations associated with technology transfer, network development includes the testing of developed or modified capabilities prior to their achieving operational status in COINS. To support the COINS Network Development, test beds are needed for new development, evaluation, and testing. These test beds consist of general and special purpose hardware and software, and must be tailored to support the capability involved in the activity. The amalgam of these test beds is called the Technology Transfer and Research Facility (TTRF}. The TTRF will be a dynamic facility-changing, growing, and shrinking depending on the activities being supported. It may contain many test beds at one time, and a test bed may be geographi- cally distributed; i.e., the TTRF is not constrained to a single location. Although TTRF is primarily a research, test and evaluation facility, the technology transfer functions require extensive train- ing of users who will participate in the testing and evaluation of the new capabilities. To provide for realistic test and to accom- plish the necessary training, the TTRF must provide terminal access to the COINS network and associated host computers. For this reason, Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 it lends itself well for use as the main training facility to access the User-Support Information System CUSIS) to indoctrinate potential users of COINS and to train them in how to use the operational capa- bilities and data available: via the COINS network. The use of the TTRF to support operational. training will require only a small part of the computer and terminal time., and in many instances both research and training support can take place simultaneously. Using the TTRF to support operational training, therefore, will not adversely affect its primary function. II. LONG-RANGE OBJECTIVES The long-range objectives of the COINS Network Development are little, if any, different from the short term. The continuous assess- ment of the quality and quantity of COINS-provided services as des- cribed in Annex A, COINS Network Management System, will identify areas where more efficient or more effective support should be pro- vided to COINS users. Resource constraints as well as other external influences will dictate a priority for undertaking network improve- ments. The long-range objectives then are to provide as many needed improved or additional services as are possible within the constraints. The TTRF long-range objective is to locate at a TTRF computer at one (or more) of the intelligence schools (DIS, ISC or NCS) and provide terminal access to it from the other schools. In this way the schools can participate extensively (if desired) in the evalua- tion of new tools and techniques, and also have. access to USIS and all other COINS accessible resources for operational training. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 III.. JUSTIFICATION The network development activities are required to improve and maintain the effectiveness of COINS in supporting the users of its accessible resources. These activities include the adoption, adaption or development of needed hardware and software capabilities, the test and evaluation of new or new ,releases of software and user training. The ASD(C31) has directed all DoD packet switched networks to adopt the DoD standard Transmission Control Protocol and the Internet Control Protocl (TCP/IP). It is necessary to identify any adverse affects TCP/IP may have on the performance of the COINS Access Systems. The performance measurements will be made in the COINS Technology Transfer 'Research Facility. The justification for technology transfer stems from the belief that it is more cost-effective to adapt hardware and software for the COINS community of users than it is to expend resources on development of capabilities to satisfy perceived needs. Some capabilities are, and will be, the result of. research projects funded by the DoD. The technology transfer research activities provide vehicles not only to determine if operational capabilities are useful in the COINS community, but provide vehicles to influence development to improve the probability that a final piece of hardware or software package will be a cost-effective addition to the COINS-provided services. The ADAPT system, which provides a uniform data language interface to multiple query languages, and the Man-Machine Relationship Program Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For-Release 2003/08/18 : CIA-RDP83T00573ROO0100140001-8 (lMRP) are two examples of projects initiated by the DoD Advanced. Projects.Research Agency (DARPA) that are, or will be, using the COINS community via the TTRF to evaluate the prototype editions of the capabilities. This synergistic relationship provides DARPA with evaluations of the fruits of their efforts in an operational or operational-like environment and provides the COINS PMO with the. opportunity to in- fluence further developments. The funding for the development of the Kernelized Secure Operating System (KSOS) was arranged by ASD(C31). KSOS was developed to run on the DEC PDP-11 computer and emulates the UNIX operating system, The PDP-11 with the UNIX operating system is the base for the COINS Access System. Because of this and the potential of KSOS to improve COINS security, ASD(C3I) and COINS PMO have agreed to use the COINS Technology Transfer Research Facility to construct a test bed to evaluate the security features of KSOS and to do performance measurements on KSOS based COINS Access Systems. Within the TTRF is a COINS-II Terminal Access System (TAS) that will be complemented from time to time with the hardware and software capabilities to be evaluated. It is expected that the TTRF will not be always fully loaded in performing technology transfer research activities. For this reason, it will be used as a test bed to check out new software or new software releases for the TAS. These final tests will be accomplished in the TTRF without adversely effecting the operational use of the COINS-II network. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/081178 : CIA-RDP83T00573R000100140001-8 The:TAS in the TTRF will also function as the system to support the training of new COINS users in how to access the COINS network and the rich assortment of resources provided by the COINS host computers. IV. FACTORS BEARING ON THE: PLAN A. Facts l.. The COINS PN1O has agreed to use the TTRF to construct a test bed to evaluate capabilities being developed under the DARPA Man-Machine Relationship Program. This is a long-term program that will provide new hardware and software and iterative evaluation-improvement- cycles. The first version of the electronic desk was de- livered to the COINS PMO for evaluation in June 1980, 2. The second version of ADAPT (ADAPT II) was funded by the COINS PNO. ADAPT II must be evaluated in a realistic environment before making it available for operational use. ADAPT II will be delivered in October of 1980. B. Assumptions 1. COINS will be required to provide information handling services other than query-response. If this assumption is false, the network development activities will be much diminished, and the TTRF will be difficult to justify. 2. Remote access to the TTRF will be available using standard COINS terminals and other nonstandard equipment for Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/1.8 : CIA-RDP83T00573R000100140001-8 the purpose of engaging.in technology transfer research activities from remote sites;. e.g., the intelligence schools and Washington, D.C. area subscriber agencies. If. remote access is not available, then training activi- ties must be treated differently than planned. Also,. the approach to capability evaluation of involving users at their home stations will not be possible nor will contractor and COINS PMO personnel have the option of developing or presenting realistic demonstrations of capabilities at the intelligence schools or other sites. C. Issues 1. Access to computers other than the TTRF DEC PDP-11/70 has not been provided nor are there plans to do so,. If arrangements can be made to access computers on the COINS network and other networks Ce.g., ARPANET) to evaluate capa- bilities available on those computers, the technology trans- fer research activities would be much enhanced. The use of these computers in the entire capability evaluation process would be ideal. However, many technical and organizational problems inhibit or preclude this ideal solution. On the other end of the spectrum, a minimal use of these other com- puters is to do the preliminary evaluation to determine if additional resources should be expended to do further evalua- tions. A resolution of the issue that goes as far beyond the minimal use as practical is preferred. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83TO0573R000100140001-8 If. the status quo is maintained, the hands-on evaluation work will be limited to capabilities-that can be made to function on the DEC PDP-11/70.. The cut-off point for deter- mining if a capability has enough promise to warrant its implementation on the TTRF computer will be much higher because the cost of evaluation will be higher. The conse- quence is that fewer capabilities will be examined because the cost to install them on the TTRF computer for further evaluation cannot: be justified. 2. It is presently planned that the TTRF staff. initially will be contractor personnel. Most of the technology trans- fer research activities will require access to the substantive intelligence files. If, however, contractor personnel are restricted from accessing many of the substantive intelli- gence files as they now are, the staff will have to be drawn from in-house resources. V. APPROACH The approach to satisfying the long-term objectives of the COINS Network Development is to, find cost-effective ways to meet the quanti- tative and qualitative needs of the COINS .user and server communities. The first step in satisfying a requirement is for the COINS PMO to decide if it can be satisfied by using or modifying a resource available within COINS. Only those requirements that require the Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 introduction of a resource new to COINS or that require an. existing resource to be significantly changed will be considered Network Developments. If a.resource new to COINS is required, existing or developing resources external to COINS-will be evaluated to determine if they can be adopted or adapted to satisfy the requirement. New develop- ment will be considered only when it is the most cost-effective way to satisfy the requirements. New developments, once they are tested and ready for evaluation, will be treated in-a fashion similar to existing resources that are. being considered for transfer to COINS. Step a., in the following general procedure does not apply to new developments. A. General Procedure Evaluation of new resources will be conducted by a "tech- nology transfer manager" and his staff within the COINS PMO with assistance from the COINS user community. Once a resource has been designated for evaluation, the following general steps will be taken: a. The resource will-be installed for preliminary evaluation. b. For promising resources, demonstrations to show how the capability may be used in an operational environment will be developed. The demonstrations will use as realistic applications as are practical for a training environment. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 c. Potential users. of the resource who are to participate in the evaluations will be shown demonstrations and trained in using the new resource. d. A period of supervised use will be provided for the participants. e. Access to the capability will. be provided to selected users at their home stations, when this is practical, for their use and further evaluation in an operational environment., f. The evaluation will be concluded with a report prepared for the COINS PMO by the technology transfer manager with major contributions from the users. The report will. include a recommendation: to implement, to modify and implement, to select an alternative capability, to continue in an experimental mode, to do some com- bination of the preceding, or to discard the resource. B.. Network Development Management of the net development activities will be the responsibility of the COINS PMO with assistance from a coordina- tion group composed or representatives from the intelligence agencies--CIA, DIA, NPIC, and NSA and from the State Department and Department of Ene:cgy. The COINS PMO will identify resources for evaluation. To support the evaluation of resources, the COINS PHO will be re- sponsible for: Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 a. Developing evaluation plans. b.. Identifying any additional hardware and software needed for the evaluation. c. Acquiring any additional hardware and software. d. Coordinating the-installation of any additional hardware and software with participating organizations when required. e. Developing needed software when development is the most reasonable way to acquire the resource. f.. Coordinating the evaluation plans with the coordi- nation group. g..- Developing realistic demonstrations of the capa- bilities to be evaluated. h. Training. the resource user who are to participate in the evaluation.. i.. Conducting the evaluations. j.- Preparing the evaluation reports. k. Coordinating the evaluation reports with the coordination group. 1. Allocating capacity for use by individual users to develop, test and evaluate resources to address their substantive problems. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 The coordination group will be responsible for; a.. Reviewing the resources identified by the COINS PMO for evaluation, identifying additional resources to-be evaluated, and prioritizing the resources to be evaluated. b. Identifying the substantive intelligence problems that can use the resources to be evaluated and selecting one or more problems for use in the evaluation. c. Identifying personnel within each agency who will participate in the evaluations. d. Reviewing the evaluation plans and schedules prepared by the COINS PMO. e. Reviewing the progress.of the evaluations. f. Coordinating with the COINS PMO to address any interagency problems that may hamper the evaluations. g. Reviewing the evaluation reports prepared for the COINS PRO. h. Coordinating implementation actions when it is decided that a capability should be implemented, VI. STATUS AND PLANS The near-term plans call for the evaluation of ADAPT-II from October 1980 through June of 1981. The USIS evaluation will start in October of 1980 and run through September of 1981. The first phase Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 of the Man-Machine Relationship Program (10BP) will start in FY81. The MM evaluation will continue on an as-required basis for several years as additional capabilities. are developed. Also the TTRF will be used as the test bed to test and evaluate TCP4/IP and the Kernelized Secure Operating System (KSOS) in conjunction with COINS Access Sys- tems. TCP4/IP and KSOS testing will be accomplished during FY81 and FY82. The initial phase of the prototype BLACKER system test and evaluation will start in early FY81. During the mid-term (FY83 - FY84) application of computer-aided instruction (CAI) techniques to COINS training will be evaluated in the TTRF. This evaluation will be part of the User Support Informa- tion System (USIS). The evaluation of the standard secure network front-end (SNFE) will also involve the TTRF during the mid-term. The evaluations of RITA, NED, and the graphics package applica- tions to intelligence problems will start in FY83. It is possible, however, that other COINS-PM0 development efforts may find use for one or more of these resources prior to FY 83. The Network Usage Information System is a strong possibility for the graphics package and NED provides an easy-to-learn and easy-to-use editor for capturing and maintaining on-line user guides in support of the User Support Information System. A DEC PDP-11/70 will be delivered in December 1980 for the Technology Transfer Research Facility. The TTRF PDP-11/70 will house the prototype USIS and may be used for the KSOS and TCP4/IP evaluations, although the :KSOS and TCP4/IP evaluation will initially Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 use the Network Service-Host. in the test bed.. In FY83 USIS will be placed on a dedicated computer; freeing the TTRF PDP-11/70 of that work load. At that time the TTRF PDP-11/70 will be installed at one of the intelligence schools with a complement of terminals to support development and training and evaluation. Remote terminals will be installed at the other schools to support training and for evaluating new tools and techniques in a psuedo-operational environment. The BLACKER hardware and software was delivered in April 1980 and evaluations with NPIC/NDS should start by the end of FY80 and with NSA/SOLIS in FY81. BLACKER will go through'a multiphase test and evaluation program through FY84. See Annex D, COINS Network Security for more detail. VII. RESOURCES AND SCHEDULES The following tables show the funds budgeted, programmed and C planned to perfo:r+ the network development activities that are not included in the other annexes to the long range plan. -Annex B, COINS Network Resources presents the resources and schedules for ADAPT, USIS and the TCP4/IP evaluations. Annex D, COINS Network Security, presents the resources and schedules for the BLACKER, Kernalized Secure Operating; System (KSOS) and the Secure Network Front End (SNFE) evaluation. FY 79 funds were used to procure the DEC PDP-11/70 TTRF computer, and therefore are; not reflected on the following table. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 pproved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The funds shown on the following tables are for evaluating existing capabilities or capabilities being developed with project funds external to COINS. A. Man-Machine Relationship Program (NMRP) FY 80 81. 82 83 84 85 86 0&M PROCUREMENT RDT 40 50 100 100 100 100 TOTAL 40 50 100 100 100 100 1000 of Dollars FY 80 81 82 83 84 85 86 0&M PROCUREMENT RDT&E 75 TOTAL 75 1 1000 of. Dollars C. TEXT EDITING/WORD PROCESSING (NED) FY 80 81 82 83 84 85 86 O&M PROCUREMENT RDT&E 80 80 80 80 TOTAL 80 80 80 80 1000 o Dollars Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 FY 80 81 82 83 84 85 86 0&M PROCUREMENT RDT&E 75 75 75 75 TOTAL 75 75 75 75 1000 of Dollars E. ADAPT, MMRP AND RITA INTEGRATION FY 80 81 82 83 84 85 86 0&M PROCUREMENT RDT&E 175 175 175 TOTAL 175 175 175 1000 of Dollars The RDT&E funds in FY84 are to evaluate the integration RITA, ADAPT and the extant MMRP capabilities into an analyst work station. The FY85 funds are. to develop a demonstration of how the integrated capabilities can be used on a realistic analyst problem. F. TOTAL NETWORK DEVELOPMENT FY80 81 82 83 84 85 86 0&M PROCUREMENT RDT&E -- -- 40 - -- 50 - -- 330 - -- 430 - -- 430 - - 430 TOTAL 40 50 330 430- 430 430 1000 of Dollars C-16 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 SCHEDULE FY80 FY81 FY82 FY83 FY84 FY85 FY86 TTRF ? Install PDP 11/70 - COINS PMO ? Install PDP 11/70 - School ww-I ? Evaluate MMRP (ED 1) ? Prepare Evaluation __ 'Report IY1NRP-II, III, etc. Iterate MMRP-I Schedule ? RITA ? Evaluate RITA ? Prepare Evaluation. _ Report TEXT EDITING/WORD -PROCESSING (NED) ? Develop Pilot i ons Applicat alute Pilots E _ ?--A a-, v ? _ ? Prepare Report _ GRAPHICS PACKAGE ? Evalute Graphics ~--~ ? Prepare Evaluation Reports ? Evaluate Integration of ADAPT/M-fRP/RITA ? Prepare Report s-A ? Prepare Pilot. Demonstration _ ? Evaluate Pilot ort Re P e--~ p repare ? ----------- - C-17 Approved For Release 2003/08/18 : CIA-RDP83.T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 CAPABILITIES FOR EVALUATION Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The capabilities to be considered for evaluation in the network development activities are MMRP, RITA, the Text Editor (NED), and.a Graphics Package. A separate plan will be developed to cover the evaluation of 'each capability. The following paragraphs present brief descriptions of these capabilities, and some general applications for RITA, NED and the Graphics Package. These kinds of general applications will be used in addressing realistic problems in the evaluations. Man Machine Relationship Program (IMP) Description: The MMRP is a research and development project being funded by DARPA. It includes hardware and software development. The main thrust of the project is to determine the characteristics of a work station at various levels of endeavor; i.e., from analyst level through the policy making levels of government. The hardware and software are presently in their embryonic state. It is expected that many incremental improvements will be made over the next several years. Description: Rule-directed Interactive Transaction Agent - is a system designed for use by persons who are not computer sophisticates to develop agents (computer programs) to perform tasks in an automated fashion. It is under development by Rand and is experimentally operational. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Applications: ? Preparing-and maintaining human-machine interfaces tailored to individual analysts. ? Preparing and maintaining programs to perform simple repetitive analyst's tasks, e.g., monitoring data for abnormal or out-of-bounds activities. ? Updating stored queries to reflect changes in such things as date of coverage, area of coverage and VIPs of interest. ? Invoking queries based on the determination that an event occurred. Status: RITA is experimentally operational on the Network Service Host and will be operational on the TTRF in September 1980. Description: A CRT text editor developed by Bolt Beranek and Newman, Incorporated under contract to the Rand Corporation. It is used with a'CRT terminal to prepare and modify documents, letters, messages, and computer programs. Applications: ? Preparing periodic and ad hoc reports. ? Editing personal files, e.g., query responses. ?. I::~:._poratizib query responses into reports. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 ? Preparing queries for submission. ? Combining query responses from different files into a uniform format. ?, Introducing or suggesting changes on collaborative reports. ? Preparing messages for electronic or hard copy delivery. ? Preparing and maintaining briefings in a current fashion. ? Preparing and maintaining computer programs including RITA programs. Status: NED is currently operating on the NSH with both Ann Arbor 4080D CRT terminal and the Teletype Model 40 CRT terminal. NED will be made operational on the TTRF after it is installed. GRAPHICS PACKAGE Description: The set of PLOT 10 programs and a Hewlett Packard HP 2648 graphics terminal to provide a general purpose graphics capability for evaluation. Applications: ? Plotting aircraft and ship movements on-map backgrounds. ? Providing graphical representations of tabular data such as flight activity, - Ships operation out of area, - Long term trends in force changes. ? Preparing graphics for briefings. Status: PLOT 10 is operational on the Network Service Host. It will be made operational on the TTRF after it is installed. Approved For Release 2003/08.CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Community On-Line Intelligence System Project Management Office National Security Agency Fort George G. Meade, Maryland, 20755 II COINS NETWORK SECURITY ANNE D TO COINS TECHNICAL SUPPORT PLAN Prepared by James P. Anderson Co. 7 August 1980 pprove or a eafi se M7081* - ST00573R MOiTT t This paper provides the Technical Support Plan for the COINS Network Security. Readers who desire or need more information about. the COINS PMO plans for network security are referred to the COINS Network Security Development. Plan. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 TABLE OF CONTENTS- Page. A. Overview of CAS Security Architecture 1. Structured..Network Identifiers (SNI) 2. Access Authorization 3. Server-Host Authorization 4. Decentralized. Security Management II. LONG-RANGE OBJECTIVES III. JUSTIFICATION iii D-1 D-3 D-4 D-5 D-6 D-6 D-8 D-9 IV. FACTORS BEARING ON THE PLAN D-10 A.- Facts D-10 B.. Assumptions. D-11 1.. General Assumptions 2.- Technical Security Assumptions D-ll D-12 C.. Issues D-13 A. KSOS/TCP4 Applied to CAS/NAS D-19 B. Multi-Jurisdictional Security Protocols (Need-to-Know Controls) D-19 1.. Approach D-19 C. BLACKER D-21 D. BLACKER Applications D-22 E. Secure Network Front-End D-23 F. Improved User Identification and Authentication Techniques D-24 G. Software Encryption in TAS/CAS D-25 1. Encrypted Personal Files D-25 2. Encrypted Passwords D-25 3. Surrogate Log.-On Protection D-25 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 TABLK OF-CONTENTS CConclud`ed) C Page H.. File Output Labeling D-26 1. Network Access Control to COINS D.-27 J. Network Security Officer Support D-28 K. Network. Security Architecture D-29 A. KSOS/TCP4 D-30 B. Multi-Jurisdictional Security Protocols D-30 C. BLACKER D-30 D. BLACKER Applications D-30 E. Secure Network Front-End D-31 F. User Identification and Authentication Techniques D?-31 G. Software Encryption in TAS/CAS D-31 H. File Output Labeling D-32 I. Network Access Control to COINS D-32 J. NSO Support D-32 K. Network Security Architecture D-33 A. KSOS/TCP4 D-33 B. Multi-Jurisdictional. Security Protocols Dr34 C. BLACKER D-34 D. BLACKER Applications D-35 E. Secure Network Front-End D-35 F. Improved User Identification and Authentication D-36 G: Software Encryption D-37 H. File Output Labeling D-37 1. Network Access Control to COINS D-38 J. NSO Support D-38 K. Security Architecture D-39 SUMMARY OF COSTS D-3 9 SCHEDULE D-40 REFERENCES D-41 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 DESCRIPTION The COINS security plan is an integration of :a number of projects designed to provide maximum protection to Sensitive Compartmented Information (SCI) and other classified material handled in the network. The present state of COINS security is summarized below: a. The COINS network operates in a System High mode of TOP SECRET SI/TK., All COINS users are cleared TOP SECRET SI/TK. b.. All COINS users are transaction system users. There is no-user programming accessible through COINS-on any serverr host in the network.* c.- Batch operations follow TMA-3(l) security rules. d.- All COINS computer and terminal sites are cleared for TOP SECRET SI/TX operations. e. COINS security issues are handled by the COINS Network Security Officer (NSO) who is the chairman of an inter- agency committee known as the COINS Security Panel. f-. Formal security procedures for the COINS Terminal Access System (TAS) are being developed. These procedures will delineate the security duties and responsibilities of the TASMASTER, administrative users, and individual end-users. C *Since COINS exercises NO control over server-hosts, it is possible that a participating agency will provide programming access for its own users on the server-host upon which a COINS data base is homed. However, such pregxsrming access IS NOT available from the COINS network. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 C g. The original COINS Security Panel (CS?) charter is being updated and reissued. The new charter will identify CSP members as the ISSOs for the various participating agencies. The chairman of the panel will be the COINS Network Security Officer. The CSP will continue to advise the COINS Project Manager regarding security policy, implementation of security measures, and security research needs of the network. h. COINS has no independent security authority. It has no authority to impose security requirements on or police the enforcement of existing-security policy by either user or contributing agencies. As a designated community-wide service, COINS derives its security requirements from. DCID's 1/16, 1/7, and 1/14;(2, 3, 4) Executive Order 12036 (for-Privacy) (5) ; and USCSB 4-11 for policy on compromising emanations. (6) COINS does have both the authority and independent jurisdiction over the security of the COINS Network (i.e., the secure subnet and the interface layer of TASs and NAS). i. Each participating agency is responsible for insuring the safety of its segment of the system, including pro- cedures to protect access to files by authorized terminals or personnel and providing for proper security labels on system outputs. Each agency has also appointed a representative to the COINS Security Panel. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Although extensive security controls have. been designed into the COINS Access Systems (CAS) (see below), only about 10% of the COINS user population is currently homed on a CAS. k. Just as the CAS was seen to provide a standard and coherent interface to users, it also provides substan- tial security functionality as well. A substantial part of the technical COINS security development to date has been focused in the COINS Terminal Access System a 8 (TAS) 7' ' '). Since its development, the TAS has evolved into a generalized network interface and access system (CAS) which will per- form the functions of a network front-end and internet gateway as well. Because of the central role the CAS plays in the overall approach to providing COINS security, a review of the principal security fea- tures of the CAS is presented as a base from which additional devel- opments will be made. A.. Overview of CAS Security Architecture The CAS architecture is responsive to the diverse and dynamic nature of the COINS network. It provides the user a coherent interface to server-host computers of different manufacturer and to data base applications of widely varying design. It was conceived as a means of insulating its users from much of the differences that exist in the different server-host machines and the data base query languages. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For. Release 2003/08/18: CIA-RDP83T00573R000100140001-8 :The. CAS security architecture. has been designed to provide maximum protection. to the. sensitive data in the network while keeping the end-user's interface-as simple as possible. In addition, the CAS. security architecture has addressed. the problem of security administration. It. provides the user organizations with considerable flexibility in how security is managed. It also allows a single CAS.to support more than one organization, each of which can exercise full control over its own security management yet be isolated from. and non-interfering with other co-resident user organizations. The principal features of the CAS security architecture All CAS users are uniquely identified with an eight- character identifier of the form: TAAGGUUU where: T - is the user's home CAS AA. - is a designator representing the user's agency GG - is a group within an agency UUU - is the user within the grouping. (A number in the range 000-999) a. Structured Network Identifiers b.. User Access Authorization c. Server-Host Access Authorization d. Decentralized Security Management These topics are discussed in more detail below: 1. Structured Network. Identifiers (SNI) Approved For Release 2003/08/ CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The structured identifier uniquely identifies all. network. users entering through CAS and permits both activity and security logging of an. individual's network activity. A user requires an SNI and a password to log on to CAS. 2. Access Authorization Each user known to a. -CAS (i.e., who, has an SNI) has an access authorization record in the User-Host Access Authori- zation (AA) File (tTH/AAF). In addition, the record contains a list of the COINS application (e.g., RYETIP, SOLIS, DIAOLS, ADCOM, etc.) and, for those applications involving multiple files, a list of files authorized to the user by the user's home organization. The user's access authorization record also contains interactive systems log-on information (an identifier and password) in the form required by the particular interactive system. This information is used to perform a user-invisible log-on to the server-host supporting an interactive applica- tion. This. "surrogate. log-on" service of CAS insulates COINS end-users from the considerable variability in log-on protocols that exist among the computer systems of COINS. Application and file access controls are applied to terminals as well. Each terminal connected to CAS is logically identified by CAS and is'represented by an AA record defining which applications and files within the applications may be accessed by the terminal. Approved For Release 2003/08/18 : CIA-RDP83T0057.3R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 A "session security' level" is logically established at log-on based on the user's authorization and his terminal's authorizations. This (conceptual) level, controls what data may be accessed in a. session. The user and terminal AA files are used by CAS to imple- ment the major functions of TMA-3: ? Control of user access to a data base ? Verification that a user/terminal is cleared to receive a particular batch response 3. Server-Host Access Authorization When CAS was upgraded to include server-host functions in 1978, the access authorization function was expanded to include application access authorization data. 4. Decentralized Security Management The CAS security management design was influenced by the following major considerations: ? Each using agency would be responsible for managing the security information and access authorizations of its own users and applications (where appropriate). A large using agency may wish to delegate some of the security management to functional organi- zations within the agency. ? A single CAS may be shared by two or more inde- pendent agencies. To meet these somewhat diverse requirements, the CAS security architecture includes three kinds of users: Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 TASMASTER - a. single user who "owns" the CAS and who directly or indirectly (see Administrative User) creates all other users.. Administrative User - a user who has the delegated authority to create and administer a speci- fied set of ordinary users. Ordinary Users - users authorized to use CAS and the COINS network. An administrative user can add, modify, or delete users within the group that can be "named" with a single "SNI- prefix". That is, the up to 1,000 users who have the same TAAG (CAS, Agency, Group within the Agency) prefix in their Administrative users cannot affect any records other than those bearing the same SNI-prefix. The TASMASTER. establishes the basic access authoriza- tions for administrative users. The administrative user can further subdivide his access authorizations among users within his domain. He cannot give any user more privileges than he has himself. It is not necessary to give.an..~ad ministrative user all CAS or network privileges. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For., Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The objectives listed here are the security-related objectives for COINS itself. The objectives provide the targets to shoot for and. an independent basis of evaluating how well COINS meets the ob- jectives. Some objectives; require management/organizational initia- tives, while others are satisfied by technical research or development activities. The following are the. security objectives for COINS: a. Insure compliance with DCID 1/16 and 1/7.(2,3) Provide the standardized security markings of DCID 1/7(3) within the COINS network. b. To evolve with the use of the network, supporting the security interests of users and servers alike. c. Demonstrate the capability to perform multi-level secure handling and processing of information in the network. d. To provide better access to COINS, improve NTK controls, provide closed communities of interest (COIs), and misroute protection in COINS by continuing to develop and refine the ongoing BLACKER project. e. Improve the technical foundation for COINS security and provide support for some user programming in the network by applying KSOS to one or more network service hosts. f. To. support expanded usage of COINS for: ? Data base applications ? Development of special uses and other kinds of transaction systems Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140061-8 C g. To offer cost-effective solutions to security problems arising from internetworking. h. Provide the ability for the network to handle multi- jurisdictional security protocols for NTK. i. Integrate the capabilities of the UNIX-based CAS/NAS with the BLACKER and KSOS to produce a secure NFE suitable for use in COINS and other integrated service networks. III. JUSTIFICATION Aside from the obvious justification for providing security of sensitive information, the underlying reason for the elements of the COINS Security program is to improve the usability of the network. The usability of the network is closely tied to the ability of the network to provide security and need-to-know protection for the in- formation resources being handled on the network. Since the CASs have a role in providing local user services, they ought to be able to do so securely. At present, much of the CASs` security is derived from the limited user functionality they present. As we move through the 1980's, limitations on user functionality will severely hurt the network's development. Thus, both the KSOS/TCP4 and BLACKER programs are meant to provide a better technological foundation-for continued network growth. As more COINS Access Systems are installed as gateways, front-end and terminal access systems, server-hosts can be relieved of a sub- stantial administrative burden or keeping track of all of the users, Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 precluding some users from . accessing proprietary information and the like. At this moment, the full burden of protecting-a server's assets falls on the server-host's agency. In the very near future, to the extent and scope desired by the server agency, that burden can be shifted onto a-CAS front-ending. the server. The CAS will be able to enforce the security requirements and whatever need-to-know or proprietary access. .policy is desired by a server-host/application on users accessing the host from the network. Finally, a number of tasks described in this plan are included to improve the security management and security administration of the network. IV. FACTORS BEARING ON THE PLAN A. Facts - 1. COINS is currently operating at the TOP SECRET SI/TK level, providing support to approximately 2,400 users in 40 different organizations. The single security level (systems high) mode of operation restricts the use of the network to only those users with TS-SI/TK access authoriza- tions. 2. The UNIX-based CAS has built-in access and distribution security and need-to-know controls, This capability provides an important foundation upon which additional COINS network security can be built. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 3. ASD(C31) has tasked'COINS PMO.to work with DCA to develop a standard secure. network. front-end. CSNFE). A standard SNFE will reduce the costs of providing. secure networks, not only in COINS, but in other user communities. B. Assumptions 1. General Assumptions _ a. COINS will continue to operate in the Washington, DC, area . through. FY 1986 and will be expanded to: ? Provide service to intelligence analysts in all appropriate agencies ? Provide different types of information handling services, other than query-response (e.g., tele- conferencing, text editing, specialized planning systems, and the like) to intelligence community end-users ? Incorporate additional host processors and other applications Even if the assumption about COINS growth proves to be incorrect, most of the security elements outlined in this plan are still required. About the only part of the plan that-might, not. be required under the assumption of no further growth is. the part containing the elements leading to multi-level secure operations. b. COINS will have gateways to other networks. If this does not come to pass, then the segments of the security plan designed to cope with supporting users on other networks will not be required. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 c. COINS will come under increasing pressure to provide multi-level secure operation, not only to gain access at the appropriate level to data classified only SECRET or CONFIDENTIAL, but to support access to more and dif- ferent kinds of. SCI. In addition, COINS will have to show that it can control access, NTK and delivery of data to individual users and or terminals by name in order to meet the security requirements of the APEX system. d. There will be no relaxation of security constraints on COINS or other community systems. in the next five years. Some additional need-to-know approvals or origi- nator-controlled data requirements may be added during this time period. 2. Technical Security Assumptions a. The BLACKER prototype system will be sufficiently successful that it will be possible to incorporate BLACKER concepts and equipment in network security plans not later than FY 1985. The UNIX KSOS will be certified in 1980, such that the proposed TCP4/KSOS test bed can be established no later than the end of FY 1981. This assumption affects not only the objective of developing a multi-level secure network of COINS, but its failure or delay will affect the extension of BLACKER to other network elements. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 c.. The design and implementation of the CAS-will continue to be improved to permit responsive simul- taneous connection of at least 64 subscribers, under KSOS implementation. This assumption is an implied performance objective for KSOS. While it is not antici- patedthat the initial installation of KSOS will meet this objective, if it appears that the.objective can never be met, the entire concept of a multi-level secure COINS network will require serious reexamination. d. The results of the DARPA BCR project will continue to be available to COINS, particularly the work regarding multi-jurisdictional security administration. Since in some regards.the BCR project is a "shadow" BLACKER, it is important to COINS as a backup to the BLACKER project and as a possible means of providing the NTK and COI protection in the event of a .serious failure of BLACKER. - C. issues 1. There is a potential. for conflict regarding how to apply particular technological developments to achieve a desired capability for COINS. The potential arises from how one looks at the network--as a set of logical circuits (analoguous to wire) or as an integrated service to a community of users. These view:, lead to different interpretations of what is important.. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Failure to recognize this issue can lead to dilution of COINS to a mere.wire-works. While it is technologically possible to effect such connection(s), the question is whether or not the. purpose and function of COINS is served by doing so. If the issue is resolved in favor of the logical circuit view of the network, then much of the network security plan, and other "user services" designed to be integrated in the access ring is unnecessary. It will also result in a net- work where the burden of using the network will be substan- tial, and on the shoulders of the user alone. If the issue is resolved incfavox..of the value-added view of the network, then the BLACKER technology will have to be adapted (in some ways, substantially) in order to serve COINS needs. To a much lesser extent, there are similar trade-offs applicable to the KSOS if it is applied throughout the network. - The issue requires a careful understanding of the alter- natives, not only in the security sphere, but in the COINS PMO provided services as well. It does not appear that both views can coexist, therefore, a choice will have to be made as to which view will guide COINS development over the next decade. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 2.. Server-hosts supporting applications contributed to COINS or- providing terminal. support to users in their agencies may operate under different security regulations than COINS (e.g.,, a DoD-regulation implementing the Executive Order (5)--and the DCID 1/16(2). and DCID 1/7 ~~. Regardless, COINS, cannot enforce Department/Agency regular Lions beyond those specified in DCID 1/16 (2) and DCID 1/71. 3. Overall security in the current network will be con- siderably improved if: ? No user programming is permitted on any COINS_ server-host. ? All "local" users of any COINS server-host were homed on a CAS.- All COINS users were homed on a CAS,. Even if everyone agreed to the correctness of these points, there is no `:way. to -effect the %.changes required since COINS does not own or control the essential assets (server-hosts, applications., etc.). At present, all that. can be done is to attempt to persuade the various entities to move to these positions. The development and integration of. multi-level secure processors. will remove the need for such restrictive :measures. 4. The internetworking of COINS with other networks (PLATFORM, IDHSC, etc.) creates multi-level networks (net- works of at least System High level in DCID 1/16(2) terms). Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The.DCID 1/162) "Compartmented Mode"'as defined provides less control than System High (as defined) unless the user's functionality is restricted in some way not specified in theDCID. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 V. APPROACH The security plan outlined here is directed to developing and applying various technical measures to COINS to achieve some or all of the objectives outlined in Section II.. In addition, the plan provides for the administration of COINS security through the COINS Network Security Officer. A number of items are for support of his effort(s). The plan presents short-term (one to three years into the future) and longer-term (three of five years and beyond) elements. To some extent, the plan is paced by the short-term objectives. Further, some of the longer-term objectives will be mediated by how the network evolves from its present form. The contribution of.the various elements of the plan to the objectives outlined in Section I are illustrated in Figure 1.. The principal approach to providing COINS security is to require that all users of COINS be registered (known) on some CAS (a TAS, HAS, or NAS) depending on where the end-user is located. With all network users registered and known on some network asset, it is then possible to enforce access controls at the various-COINS Access Systems. This, coupled with anticipated developments in KSOS and BLACKER to protect the access control mechanisms themselves, will provide flexible and efficient network security. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Program 34 Element 4J 41 U 0 00 to Ql 1 v+ 41 H "4 7 "4 _.C 1 C $4 0 , 04 0 i \ U a4 a W 04 o .. y 0 til 4W LL t 0 Objective tCn z I. Comply with DCID 1/7, X --- X 1/16 2. Support network evolution X X X X. X X X X X 3. Demonstrate multi-level X X capability 4. Improve NTK, COI controls X X X X X X s.. Improve technicalfounda- X X i tion of COINS security 6. Expand usage of COINS X X X X X X X X 7.. Provide internetworking X 8. Handle multi-jurisdictional X controls 9. Obtain a secure network X X - front-end for integrated networks FIGURE 1 Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 Contribution of Plan Elements to COINS Network Objectives Approved For Release 2003/08/18: CIA-RDP83T00573R000100140001-8 D-18 Approved For Release 2003/08/1.8 : CIA-RDP83T00573R000100140001-8 A.. KSOS/TCP4 Applied, to. CAS/NAS Problems to be. solved: a. Improved. technical foundation for COINS security b._ Support for TAS user programming c. Increased confidence in multi-jurisdictional security controls It. is planned to implement the CAS functions under a KSOS system operating in the computer, supporting the TTRF. This development will also address the TCP4 implementation, either directly or in the "torque-converter" mode of operation. B. Multi-Jurisdictional Security Protocols (Need-to-Know Controls) Problems to be solved: a. Need-to-know (disjoint compartments) b. Handling the :Large number of users (1,000-5,000).. anticipated in the next two to four years 1. Approach As soon as a sufficient number of CASs are deployed, each participating agency will be required to register all of their own COINS users in a CAS system. The registration will be as though the user is a CAS subscriber and will in- clude a description of all COINS accessible services author- ized for that user by the user's home agency: The registra- tion will be made by Cpersonnel under the supervision of) cn idez'iried Security Officer of-the participating agency (that is, the agency's ISSO). Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Agencies participating in COINS with (one or more) server-host system that also home some or all of the user population of that agency will. register their users of COINS on the. HAS used to front-end the host(s). TAS users are registered on their TAS. Other network COINS users are registered on the COINS part of NAS. All registered COINS users will be known by an SNI. SNI groups will The assigned to each participating agency and managed by that agency on an on-site CAS or a CAS as- signed by the COINS PMO. The ISSO of the CAS in a sponsoring agency is responsible for establishing and maintaining the Server-Host/Access Authorization File (SH/AAF) in the CAS which identifies which using organizations in the COINS network or other networks can have access to specific files or services available in the CAS, the host, or network behind the CAS. The SH/AAF will be used to build and maintain the NSO's Master Authorization File (MAAF) in the Master TAS in the COINS PMO. The MAAF will be built and maintained on-line at the Master TAS either, automatically or upon command of the NSO by retrieving a current copy of the SH/AAF from each CAS including the Master TAS. After the SH/AAF file has been received from each CAS, the MAAF is sorted by using organization and used by the NSO to establish the SH/AAF for each CAS. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 C. BLACKER Problems to be solved: a.. Closed Communities of Interest (COIs) in COINS. b. Misroute c. Malicious system software (not necessarily in COINS). The BLACKER development is directed to providing a unique end-to-end encryption between an individual user and a process on a distant host. The initial BLACKER system, installed in the COINS-II network in April, 1980, is a prototype system. The two agencies parti- cipating in this program are NSA and NPIC. This involves the installation of a special front-end device and the installation of a specially-designed BLACKER Terminal Access System. 1. Users operating from a remote terminal on the BLACKER terminal access system will be authenticated by a COMSEC system, and if properly authenticated, the user will be connected to the appropriate host in the network via a unique one-time secure communication path. Eventually,. a badge reader must be associated with each terminal for user identification. The badge which is used for controlling access to a building and compartments within a-building will be used to control access to COINS-II via a remote terminal. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 2. 1f - a: host misdirects an answer or response to a terminal, it cannot be read by the users at that terminal because they will not hold the key. 3. For routine purposes, the headings will be in the clear within a communications processor or TAS. The text will be encrypted and can be read only by the appropriate user/ terminal or system. The headers will be encrypted between communications systems; i.e., IMPS. D.. BLACKER Applications System studies are required to find the best approach to altering the BLACKER prototype or using the basic BLACKER crypto- graphic equipment to make it compatible with the COINS network philosophy and ultimately to integrate it into an SNFE (see E., below). Integration of BLACKER technology with the SNFE is treated under that program element. The principal potential application of BLACKER in COINS is in protecting the terminal to CAS link. While there is little or no requirement for such protection within the-COINS network, there is a substantial requirement for terminal-to-access ring protection, particularly if COINS subscribers are going to be homed on networks about which little if anything is known. Thus, use of BLACKER to encrypt from a terminal (user) to the user's home CAS provides considerable improvement in security for termi- nals homed on other networks. BLACKER is also expected to offer a more economical host-to-host secure connection than that cur- rently provided by the PLIs being used to link CASs through ARPANET. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 D-22 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 E. Secure Network Front-End There is a growing body of technology available to provide secure computing of various kinds; this includes the BLACKER work and KSOS. In COINS, a generalized server-host front-end has been developed around the UNIX-based TAS. This is called HAS. HAS houses all of the current TAS functionality and a host-specific interface. This provides considerable flexibility in how the HAS can be employed; the range is from a simple net- work interface (repository of network protocols) to a system that interfaces both the server-host and local terminals. to the network and to each other. In both modes, the HAS can (and does) perform access authorization functions and in general act as a coarse security filter for its server-host.* In view of the broad range of functions a HAS could perform, the problem of "merging features of BLACKER, KSOS, and HAS into a single SNFE" is substantial. To some extent, the plan to put TAS under KSOS will provide an excellent start for an SNFE. It will provide per-process isolation and demonstrated secure multi-level partitions. *It is important to note that the reason-HAS or any other similar system cannot perform a full security. filter function is because the detailed security decisions (e.g., access limited to a single file or limited to a specific set of tags) are bound into the server- host application (e.g., SOLIS) in a way that cannot be broken out to be resolved at the time access is attempted. In a.similar way, some security determination can only be done during the execution of a particular query. As a consequence, the HAS or any front-end can only screen out organizations/individuals who are not authorized any access to the application. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 The principal problem. to be solved in an SNFE design is how to partition the.designand integrate the BLACKER and KSOS technologies into a.system that can be used as an unintelligent SNFE.(i.e.,. one with. network protocols only) but which could become the base of a. more fully functional system such as a CAS by merely adding the additional. software modules. F. Improved-User Identification and Authentication Techniques Problems to be solved: a. Reduce the burden of users having to learn different identification and authentication protocols for systems and networks in the community. While COINS has eliminated the problem of having to learn or know five to eight (or more) different log on and authentica- tion protocols within the COINS network, the COINS approach does not help analysts who must use other networks and systems besides COINS, particularly if they do not access the systems through COINS. While there is not at this time a satisfactory universal unique personal identification method or scheme, the possible use of magnetic stripe badge readers (with agency identification badges), or some similar scheme, will be explored in conjunction with the BLACKER project. A cost-benefit analysis will be made of the schemes tested and will be used to initiate future pro- curement should the results be favorable. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 C G. Software Encryption in TAS/CAS a. Provides protection of passwords and personal. files from accidental disclosure b. Provides privacy of personal files/messages 1. Encrypted Personal Files Since TAS will continue to operate in a benign environ- ment for the foreseeable future, the encryption of personal files is more to provide user-controlled privacy than for security purposes. As in many aspects of system use, it should be possible to give the encryption capability selec- tively; i.e., some users can have it as a function, others cannot. 2. En rrpted Passwords The purpose of encrypted passwords is to prevent compro- mise of a user's TAS log-on password from. disclosure to TAS operations personnel. A traditional method of.providing this protection is to store in the user's log-on file a password transformed (encrypted) by a one-way function. Upon log on, the plain text password submitted by the user is subjected to the one-way transformation and the result compared with that stored in the user's record. 3. Surrozate jpj,-On Protection The requirement for surrogate log-on protection is simi- lar to that needed for protecting the TAS log-on password. It is desirable to prevent compromise from TAS operations personnel.. D-25 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 C Unlike. the TAS log-on password, the requirement is not met by a one-way transformation. A major question to be addressed, is whether the entire AA File record for an in- dividual is to be protected or whether just the surrogate log-on passwords for SOLIS, IDS, etc., must be protected. It appears at this juncture that it will.only be possible to protect the-Access Authorization Files (AAF) from TAS operations personnel if a protected cryptographic facility (e.g., BLACKER key generator or DES) were provided in the TASs and each host (or CAS). To implement a scheme of encrypted files (AAF) while providing. essentially the same functionality to the administrative user (to create and maintain individual. users) requires a host-to-terminal and host-to-host secure communications capability. The scheme and adaptation of the IBM key management model outlined in IBM Systems Journal, Vol. 17, No. 2 of 1978, would limit the exposure of AAF data in a TAS to the (single) individual who could set a Host Master (cryptographic) Key. This scheme would require both a crypto-facility (essentially a computer-controlled crypto-peripheral) and a KSOS foundation to provide adequate protection from TAS operations personnel. H. File Output Label.inpz Problems solved: a. Compliance with DCID 1/7.(3) D-2 6 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 C Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 At-present, the. COINS network carries security labels on the responses to batch queries. The security labels are used only to check the authority of the terminal and/or the user to receive the level of material contained in the answer. DCID 1/7(3) requires appropriate security labels to be applied to all classified materials. In order to comply with this requirement, it is necessary to provide security labels on all data bases and files in the COINS network. For those files associated with batch applications, the security labeling is provided by the server-host . in. compliance with TMA-3. In the case of SOLIS, security labeling is applied on a per-message/ record basis. Since SOLIS did not have a batch interface re- quirement, there was no reason to implement TMA--3. With respect to attempting to implement proper security labeling of output in compliance with DCID 1/7(3) for COINS, it is necessary to recognize the fact that TMA-3 is not an integral part of the interactive applications. I. Network Access Control to COINS Problems solved: a. Increased accessibility of COINS b. Reduced costs for connecting subscribers In general, it is assumed that the gateways will be on the host-to-host form (access layer) as opposed to internet level gateways alone. The host-to-host form is suitable if it is D-27 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Irk proved'F"or" le"~ ~2DO /08T~S' - 1. assumed that there is little or no requirement to provide end-to-end connections between subscribers homed on other net- works and a process on the COINS network. The proposals assume that a gateway-half concept (5) will be used. This form has a natural appeal and addresses the ownership of the gateway and the contained network access control mechanism properly. In addition, as a principle, the notion of each network providing its own access control. makes considerable sense. J. Network Security officer Support a. Provide automated aids for security officer surveillance of network use Currently, System Security Officers (SSOs), in those installa- tions having them, get abstracts from the computer accounting logs where all major normal and potentially abnormal activity (e.g., unsuccessful log ons) are recorded. The unsuccessful log ons are just about the only major information received from most computers, even though other data may also be available (e.g., unauthorized file access attempts). Aside from the fact that the data recorded is not primarily for security purposes, the primary value of security audit logs currently derived from accounting data is retrospective analysis of attempts at external penetration. The basic approach to Security Exception Reporting,is to establish on a per-user (or per-file, application, or other controlled resource) basis a "profile" that characterizes Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 "normal" use of the resource. The-profile can then. be matched against actual use of a resource to determine whether any user activity is "out-of-range" with respect to the profile. Such out-of-range. activity can. be reported as an exception requiring further investigation, or it can be the basis for detailed analysis of users' actions to determine whether the activity is authorized. A prototype system exists on a commercial network that could be the basis for a similar system for COINS. Development of such a system. will require much of the access ring in place to be effective. K. Network Security Architecture Problems solved: a. Continued long-range security planning b. Identification of network security needs. c. Tracking of security developments for application.to the COINS network During the history of COINS, there has been a requirement for a continued, long-term planning and study activity concerned with COINS security issues. A single, continuing task is involved to continue to survey the security needs of the network and make recommendations for the solution of security problems uncovered. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 early investigations will begin in 1981. System studies, integrating the results of the BLACKER evaluation and the re- quirements for internetworking will identify the best way of using BLACKER in COINS and suggested system alteration for BLACKER. E. Secure Network Front-End No work has been. initiated on this project. F. User Identification and Authentication Techniques The identification of a badge reader system has been made and it is expected that a reader will be acquired by early FY 1981 to integrate with the BLACKER test. The utility of the badge reader as an improvement in user identification and authenr. tication will be evaluated. G. Software Encryption in TAS/CAS No work. has been clone on encrypted personal files to date. The application of the Crypt function of UNIX7 will be evaluated in this role. No work has been done to implement encrypted passwords in COINS to date. It requires the development of an adequate 'one-way" transformation, and its integration in the log-on process. Some work has been done on this process in UNIX 0) Due to the uncertainties of BLACKER and KSOS deployment in COINS, no work is planned. for dealing with surrogate log-on protection at this time. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 -H. File Output Labeling In order. to determine the most effective, minimum-cost solution to this particular problem, it will be necessary to establish network standards. for labeling of output. Standards already exist in TMA-3 but these will have to be updated and possibly modified to accommodate systems that are intrinsically interactive but which may be treated as though they are batch. No work has been done on this task to date. I. Network Access Control to COINS At present, a tailored gateway to ARPANET is provided to interface the PACOM TAS. A "one-way" tailored gateway from PLATFORM to COINS is also being developed. A generalized gateway to COINS is planned using the concept developed by CSC of the gateway-half. (16) The development of the generalized gateway will focus on what kind and how much functionality to put into the gateway (e.g., security functions, register users, etc.). J. NSO Support There is no current development to support the NSO. Aspects of operating as the NSO and TASMASTER are being explored as part of a general TAS upgrade effort. The security surveillance system and monitoring tools will be de:fir_ed and evaluated starting FY 1982. The entire develop- ment shculd be complete by the end of FY 1984. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 K. Network Security Architecture This function is currently. being performed by one of the COINS PMO contractors in association with the NSO. It is planned to continue. this.function as long as the network requires it. VII. RESOURCES AND SCHEDULE The following tables show the funds budgeted, programmed or planned to procure, develop, implement, and maintain the hardware and software for COINS network security. A. KSOS/TCP4 FY80 FY81 FY82 FY83 FY84 FY85 FY86 O&M Procurement .RDT&E -- -- 60 -- - 200 -- - 80 -- 40 -- -- -- - TOTAL 60 2 00 80 40 -- F -- 1000 of Dol lars The RDT&E Funds for 1980 are for the impact study. Funds for FY81-82 are for partitioning of the TAS functions and for integrating KSOS and TAS. The FY83 funding is to evaluate the cost benefits of using the KSOS/TCP4 combination in COINS. D-33 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release* 2003/08/18 : CIA-RDP83T00573R000100140001-8 B. Multi-Jurisdictional Security Protocols FY80 FY81 FY82 FY83 FY84 FY85 FY86 O&M Procurement RDT&E - -- - - -- - - - - - - 100 - -- 50 - -- -- - -- TOTAL -- -- -- 100 50 - - 100 0 of Dollars The RDT&E funds for FY83-84 are to develop and install the software that collects the individual CASs, AAFs, and redistrib- utes the sorted access authorizations to all access ring systems. BLACKER FY80 FY81 FY82 FY83 FY84 FY85 FY86 O&M Procurement RDT&E - -- 25 - 80 108 - 250 50 - - - - - - - - - - - TOTAL 25 188 300 - -- - - 1000 of Dollars The RDT&E funds in FY80 through FY82 are to test the opera- tion and user acceptance of BLACKER. The procurement funds are to acquire another BLACKER front-end for SOLIS and additional personal identification and authentication hardware. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 D. BLACKER Application FY80 FY81 FY82 FY83 FY84 FY85 FY86 O&M Procurement RDT&E -- -? -- -- - 25- -- - 50 -- -- 75 -- - -- - - -- TOTAL - 25 50 75 - -- - 1000 of Doll ars The RDT&E funds over FY81-83 are for studies on how best to use or adapt BLACKER for COINS use. E. Secure Network Front-End FY80 FY81 FY82 FY83 FY84 FY85 FY86 0&M Procurement RDT&E -- - -- -- -- - - -- - -- - 180 - ? 350 - ? 300 -- -- 130 TOTAL -- - -- 180+ 350+ 300 130 1000 of Doll ars The FY83 RDT&E funds are for the development of comprehen- sive specifications for a front-end suitable for use in the several networks expected to be available in the mid- to late 1980's. A portion of the FY83 funds is expected to be used to identify a suitable candidate hardware to implement the result. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 During FY84, the RDT&E emphasis will be. on: studies and specifications: for partitioning the front-end functions and integrating BLACKER and KSOS. The funds for FY85 and FY86 are for the development of a prototype for demonstration and evaluation. An undetermined amount of funds for procuring a. suitable hardware base for the development will be required in FY84 and FY85. F. Improved User Identification and Authentication FY80 FY81 FY82 FY83 FY84 FY85 FY86 0&M Procurement RDT&E -- 50 -- -- -- 50 -- -- 25 -- -- 25 -- -- 25 -- 25_ 25 TOTAL 50 50 25 25 25 25 25 1000 of Dol lars . The procurement funds for FY80 are for a suitable badge reader. The RDT&E funds for FY81 are for interfacing it with BLACKER terminals. The balance of the RDT&E funds (FY82-86) are for-evaluation and low-level tracking of new technology applicable to the problem. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 ? Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 G. Software Encryption FY80 FY81 FY82 FY83 FY84 FY85 FY86 O&M Procurement RDT&E -- - - 60 - -- -- - -- TOTAL -- 60 _- 100 0 of Dollars The-RDT&E funds in.FY81 are for the testing and additional development of the Crypt function in ANIX7 and the one-way encryption algorithm,(s) for application to log-on protection. H. File Output Labeling FY80 FY81 FY82 FY83 FY84 FY85 FY86 0&M Procurement RDT&E - -- - 50 - 80 - 50 - - - - - - - - TOTAL -- L 50 80 50 - -- -- 100 0 of Dollars The FY81 RDT&E funds are for the system study of where the file output labeling is most effectively done (for all of the various possibilities in COINS) and a design of how to do it. In FY82 and 83, the design will be implemented and tested. D-37 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 t.,. Network Access Control to COINS FY80 FY81 FY82 FY83 FY84 FY85 FY85 O&M Procurement RDT&E -- - - -- -- 150 300 300 -- 100 -- -- -- TOTAL - - 150 600 100 -- -- 1000 of Dollars The FY82 RDT&E funds are for a detailed design of a gener- alized gateway suitable for use with PLATFORM, IDHSC, AUTODIN II, etc. The FY83 and.84 RDT&E funds are for the implementation and test of the design. The procurement funds are for the acquisition of a suitable gateway machine. J. NSO Support FY80 FY81 FY82 FY83 FY84 FY85 FY86 0&M Procurement RDT&E -- -- -- -- - -- -- - 50 -- 75 50 . 25 50 -- 50 -- TOTAL - - 50 .75 75 50 50 1000 of Dollars The RDT&E funds for FY82 through FY84 are to establish the aeta l.e3 requirements for an NSO monitoring and surveillance L Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 CIA-RDP83T00573R000100140001-8 system. Implement and test the system. The 0&M funds, FY84 through FY86, are for the development of additional NSO tools :`assist in the security monitoring of the network and its use. K. Security Architecture FY80 FY81 FY82 FY83 FY84 FY85 FY86 0&M Procurement RDT&E - -- 50 - -- 50 -- -- 50 - -- 50 -- -- 50 - -- 50 - -- 50 TOTAL 50 50 50 50 50 50 50 1000 of Dollars The RDT&E'funds shown are to provide continued contractor support over the period shown. FY80 FY81 FY82 FY83 FY84 FY85 FY86 0 Procurement RDT&E 50 135 80 543 250 535 300 895 50 -- 600 50 - 375 50 - 205 TOTAL 185 623 785 1195 650 425 255 X $1000 Approved For Release 2003/08/18 : CIA-RDR83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 SCHEDULE PROGRAM ELEMENT FY80 FY81 FY82 FY83 FY84- FY85 FY86 KSOS/TCP4 Multi-Jurisdictional Control Securit y BLACKER Test BLACKER lications A pp SNFE Improved User ID & ues Authentication Techni q TAS/NAS Software Encr tion yp File/Output- Labeling L-A Gateway Design (Network Access) Network Security Officer Support Architecture Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 REFERENCES 1. TMA-3 - 1971, "Dissemination Controls for COINS", April 1, 1971, COINS PMO. 2. DCID 1/16 - Security of Foreign Intelligence in Automated. Data . Processing Systems and Networks, June 6, 1978. 3. Security Markings - DCID 1/7 - Control of Dissemination of Foreign Intelligence? May 11, 1976. 4. Security - DCID 1/14 - Minimum Personnel Security Standards and Procedures Governing Eligibility- for Access to Sensitive Com- partmented Information, May 13, 1976. 5. Privacy - Executive Order.12036. 6. COMSEC - WSCSB 4-11 -- National policy on Control of Compromising R-nations, June 1, 1.976. 7. TAS Functional Specifications and User Command Language, J.P. Anderson Company, November 25, 1976. 8. Terminal-Access System, User's Manual, Logicon, Inc.,. 1979. 9. Terminal Access System, Access Authorization File Maintenance (AAFM) User's Manual, Logicon, Inc.,. 1979. 10.. "Password Security: A Case History", Morris, R., Thompson, K., Communications of the ACM, Vol 22, No. 11, November 1979, pp. 594-597. 11. COINS Network Security Issues, J.P. Anderson Company, July 31, 1976. 12. COINS-II Security Problems, Analysis and Implications, J.P. Anderson Company, March 7, 1978 (revised November, 1978). 13.. Problems Associated with Accommodating-Interactive Hosts in COINS-II (Interim Draft), ICA Corp., February 26, 1979. 14. Uniform Network Interactive Logon Sequence, Memorandum for the Record, R.A. Parke, January 19, 1978. 15. ADAPT I Final Functional and System Design Specification, Logicon, Inc.,. January 30, 1978. Approved For Release 2003/08/18 : CIA-RDP83T00573R0001'00140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 16. '.'Gateway Techniques for. Interconnection of Digital Networks", (draft) Report No..-CSC-SD-77/4132, Computer Sciences Corporation, December 16, 1977. 17. "Techniques for. Gateway'PLATFORM:with Other Digital Networks",. (draft) Final Report, Contract- MDA904-77-A00182, System Control Inc., December, 1977. 18. COINS-II: Which Way to Mecca?, J.P. Anderson Company, . November 21, 1.978. 19. USIB 9.1/20 - Physical Security Standards for Sensitive Compart- mented Information.. 20. ".Management of the COINS Experiment" 21. "Recommendations of the ASD(I)'s Review Group", February, 1933. Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 STAT Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8 Approved For Release 2003/08/18 : CIA-RDP83T00573R000100140001-8