IHC CONFERENCE, 20-22 APRIL 1986
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP90G00993R000100270006-1
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
25
Document Creation Date:
December 23, 2016
Document Release Date:
August 24, 2012
Sequence Number:
6
Case Number:
Publication Date:
April 14, 1986
Content Type:
MEMO
File:
Attachment | Size |
---|---|
CIA-RDP90G00993R000100270006-1.pdf | 954.07 KB |
Body:
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
SE.eRET
25X1
25X1
25X1
25X1
DIRECTOR OF CENTRAL INTELLIGENCE
Intelligence Information Handling Committee
WASHINGTON, DC 20505
MEMORANDUM FOR: See Distribution
FROM:
Executive Secretary, IHC
SUBJECT: IHC Conference, 20-22 April 1986
(C5
IHC/MM 86-29 111,--
14 April 1986
Attached please find the conference agenda, conference guide which
focuses on speaker presentations and topic discussions, your transportation
arrangements and directions, and the DCI-approved open source exploitation
program report highlights.
Questions, call them to
(secure).
Attachments:
As stated
If you have any last minute changes or unanswered
This memo becomes UNCLASSIFIED
upon removal of attachments.
or myself
S RET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part- Sanitized Copy Approved forRelease2012/08/24 : CIA-RDP90G00993R000100270006-1
25X1
25X1
25X1
25X1
25X1
25X1
25X1
25X1 -
HX1
25X1
25X1
IHC 1986 Off-Site Conference
Agenda
Sunday, 20 April 1986
1730-1815 Cocktails
1815-1915 Dinner
1915-2015 Keynote Session
0700-0800 Breakfast
0800-0815 Admin/Security
0815-0830 Conference Introduction
0830-1000 Community Information
Requirements
Monday, 21 April 1986
Brief
Systems: Performance
and Objectives
COINS
COINS PM
DODIIS
11TA
CIRS
NSA
Open Source
Chmn/IHC
1000-1015
Break
1015-1025
Inter-Community Information Systems:
Introduction
Chmn/IHC
1025-1115 Statutory Constraints on Inter-Community
Mark S. Evans
Information Support
Justice
1115-1145
Patrick Tarr
Justice (DEPB)
1145-1200
Information Element
IHC
1200-1315
Lunch
1315-1345
NIU
1345-1415
DESIST
CONFI NTIAL
CIA
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part- Sanitized Copy Approved forRelease2012708/24 : CIA-RDP90G00993R000100270006-1
25X1
1415-1445
UU MIAL
Counter-Terrorism Intelligence Support:
Operational Experience and Requirements
NIO
1445-1500
Break
1500-1530
Special Operations Information System:
MAJ Robert Peden
Capabilities, Management Issues
HQS, JSOC
COL Duncan Briggs
HQDA (DAMI-AM)
1530-1630
Justice Department (FBI) Intelligence
TBD
Information Handling Support:
Plans and Programs
25X1
1630
1630-1730
Discussion: Management and Planning
Implications of Inter-Community
Information Handling Requirements
1730-1800
Cocktails
1800-1900
Dinner
25X1
1900-1920
COMPUSEC Program Status
IHC
25X1
1920-1940
COMPUSEC Threat Brief
IHC
25X1
1940-2010
National Computer Security Evaluation
Center: Near Term Programs and
NUJU
Objectives
2010-2030
DoD-DCI Computer Security Guidance
Dr. Robert Krell/
Initiatives
James Dyer
(OASD/CJI)
Tuesday, 22 April 1986
0700-0800
Breakfast
0800-0830
DCID 1/16 Revision Proposals Discussion
- Shortfalls of Current Policy
- Outline of Proposed Modifications
25X1
0830-1000
Open Source Initiative Overview
ICS/HUMINT
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
1000-1015 Break
25X1 1015-1100 FBIS Modernization Program
1100-1200
25X1
1200-1300
1300
1300-1500
Community Systems' (COINS, CIRS, et al)
Role in Open Source Support
Lunch
(First Flight for Washington Departs)
Discussion: Open Source Initiative
Development Strategy
CONFIDENTIAL
D/FBIS/CIA
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part -Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
S T
25X1
DCl/ICS 86-4070
IHC 1986 Off-site Conference Guide
Preface
The principal mission of the DCI's Intelligence Information Handling
Committee (IHC) and its permanent staff is to facilitate efficient interchange
among Intelligence Community organizations--and between the Community and
those it supports--of information necessary to the most effective performance
of their missions. While the primary instruments of this endeavor are
computer hardware and software, its most critical elements are people and
organizations, their perceptions, intentions, and resources with respect to
the jobs to be done. The development and operation of automated information
handling systems are properly reflections of the latter rather than ends in
themselves.
The IHC's 1986 Off-site Conference will seek to implement this recognition
in focusing on the Community's near term (roughly the next three years)
operational requirements and capability goals in four major areas of concern
and endeavor: Community Information Systems, Inter-Community Information
Systems, Computer Security, and Open Source Intelligence Support. All have
received significant investment, and are scheduled for continued emphasis
during the period in view. They are in various ways interrelated, insofar as
things done (or not done) in one area will affect one or more of the others.
A major objective of the Conference will be to explore such interactions,
actual and potential, to see how they might be used to further Community
operational interests and programs or, where bullets have to be bitten (as in
the case of computer security), to mitigate their impact on operations and
resources. Current agency and Community goals in these areas will also be
reviewed in the context of specific development programs, ongoing and planned,
briefed by their sponsoring organizations. Looking at specific programs and
capabilities from the less constrained vantage point of broader requirements
and resource availability can yield a different slant on possible development
approaches. While no grand strategy is likely to emerge, we will be seeking
recognition of opportunities for focused Community action in problem solving
and meeting mission performance requirements.
Community Systems
The Intelligence Community has made a very substantial investment in the
development of COINS, and proposes to continue its improvement and expansion.
At the same time, however, there appears to be insufficient appreciation of
the system's capabilities and potential, particularly at senior management
levels within the Community. Deployment of system access terminals, the
roster of data files maintained, as well as system usage reflect primary
orientation toward support of military intelligence production activities and
customers.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part -Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
SECRET
Activation of the Department of Defense Intelligence Information System
(DoDIIS) and its intended interconnection with COINS will expand user access
to the latter. Achievement of an initial operating capability for the
Community Information Retrieval System (CIRS) in 1986 will provide COINS users
high speed query and retrieval capability against in-depth files of finished
intelligence/end product reporting. The COINS PMO has developed a
sophisticated graphics terminal (FULCRUM) to expand the display capabilities
of COINS users, and is also planning to upgrade the standard COINS terminal
suite, an initiative that will be supported by FY 1988 DCI fiscal guidance.
[Conference briefers addressing the above-mentioned systems are asked to,
inter alia, review their current capabilities, established development plans,
as well as anticipated problems and constraintsj
Given the existence in COINS of a major operational information handling
capability, supported by a well-established technical base and a competent
PMO, should the Community adopt it as the base for its future wide-access
information support services, if only to reduce development costs and
technical risk? For example, would there be merit in building a parallel (but
separate) COINS network to operate at the SECRET level (or, perhaps,
UNCLASSIFIED) for support of users who cannot access the current SCI system?
Are there incremental technical improvements or added resource investments
that would significantly expand the utility and usage of COINS?
What is the impact of current security policy on the operation and
utilization of Community-wide access systems such as COINS? What would be the
effect of a policy change to permit multi-level secure systems? Are current
trends toward greater restriction and control of secondary dissemination of
intelligence reports a threat to further expansion of Community-wide access
systems?
Intercommunity Systems
Routine, active involvement of Intelligence Community assets in
non-traditional operations support, such as counterterrorism and interdiction
of narcotics trafficking, is still relatively new. The use in such support of
automated information handling networks in which both Community foreign
intelligence and domestic law enforcement elements participate encounters a
number of significant problems in the areas of protection of intelligence
sources and methods, operational use of intelligence data and conformity with
statutes dealing with legal discovery, privacy and freedom of information.
Experience, thus far, would appear to indicate that these problems are
manageable, from the technical and procedural standpoint, provided that their
accommodation is planned for in the course of system design.
the Justice Department briefer is requested to address the foregoing,
including insights gained from the experience of agencies seeking to meet
statutory requirements, e.g. the 4C systemj
However, there exist a number of basic operational questions of great
importance to the ultimate effectiveness of the intercommunity support
2
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part -Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
SECRET
relationship. These have to do with the "cultural" differences between
the communities, in terms of the operational utility of intelligence support,
protection of sources and methods, etc. For an information handling
relationship to be effective, all parties to it must perceive its purpose and
modus operandi in the same way and operate accordingly. To the extent that
does not occur, automated information handling operations will be
dysfunctional or, at best, inefficient.
briefers in the narcotics interdiction and counterterrorism fields
are asked to review operational experience to date in intercommunity
intelligence activities, as well as plans and requirements. DESIST and SOIS
briefers are requested to focus, inter alia, on the functional requirements
and operating environments influencing their design and implementation (and
subsequent modification, if appropriate),7
The FBI has the most experience in intelligence support to law enforcement
on the national level. Given the Bureau's central functional responsibility
and its considerable efforts automated information handling, it is desirable
that NFIP-sponsored intercommunity information handling initiatives be
coordinated (and, where appropriate, integrated) with those of the Bureau.
(rhe FBI briefer is asked to describe the Bureau's ongoing and planned
automated intelligence support services, in particular those relevant to the
counterterrorism and narcotics interdiction efforts. Information on
mechanisms for interagency planning and development of information handling
capabilities within the law enforcement community is also reauested,7
The basic Conference objective in addressing intercommunity systems is to
share experience and lessons learned that might be of general use. The
apparent success of FLASHBOARD, for example, offers a useful insight
(previously demonstrated by NOIWON among others) into the utility of
convenient, informal and secure communication as an effective means for
bridging the perceptual gaps created by differing missions, organizational
structures, and operating constraints. The Joint Maritime Information Element
(JMIE) initiative, to be briefed at the Conference, illustrates a variant
approach to intercommunity, multi-mission intelligence support. Development
of a national-level, all-source narcotics interdiction intelligence center
represents yet another basic approach.
Lrhe Drug Enforcement Policy Board briefer is asked to address, inter
alia, the operational and organizational requirements and objectives
supporting establishment of an all-source intelligence center!?
Computer Security
The requirements of an effective Intelligence Community computer security
program are difficult and expensive and, unless carefully implemented, can
seriously disrupt ability to meet operational information handling
commitments. For these reasons, and because the technology required is, in
many cases, not yet available, partial and interim measures must be adopted to
3
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part -.Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
SECRET
gain as much added protection as possible, as soon as possible.
Unfortunately, the amalgam of near term, long term, procedural, and technical
initiatives has created a great deal of confusion and misunderstanding,
amplified by the large number of organizations involved. Perception of this
circumstance by the Congress has resulted in reduced funding for computer
security at a critical juncture.
Among the measures needed to cope with the foregoing is establishment of
an operating framework to provide a common perspective for the organizations
engaged in computer security development activities, both within the
Intelligence Community and in the broader spectrum of organizations
encompassed by the NTISSC. Envisioned as an understanding rather than as a
specific bureaucratic entity, the purpose of the framework would be, inter
alia, to provide a basis for coordinating development objectives and
timetables, rationalizing guidance to Community operating elements, and
avoiding unnecessary redundancy of effort in technical research and
development. At the same time, the understanding should provide individual
participating agencies a buffer against unrealistic impact on their internal
information handling operations and development programs.
The parties key to formulation of such an understanding are the DCI, the
ASD(C31) and the National Computer Security Evaluation Center (NCSEC). A
working group of their staff representatives has been meeting toward that end,
and the Conference will provide an informal forum for considering its
preliminary recommendations and providing guidance to ongoing efforts.
tple NCSEC briefer is asked to describe, inter alia, the Center's current
goals, operating strategy, and perception of its mission. An outline of
specific programs addressing Community computer security concerns is also
requested. The ASD(C31) briefer is asked to outline working group findings,
thus far, concerning development of agreed guidance to supplement the DCI
SAFEGUARDS and DoD Orange Bookj
DCID 1/16 is a major component of DCI policy guidance in the computer
security area. As such, it will be a major influence on formulation of the
operating framework envisioned above. However, the directive requires review
and update to bring it in line with contemporary technical, operational and
organizational conditions. The DCI Security Committee and the IHC will
jointly sponsor such an effort, to be initiated at the Conference with
consideration of strawman proposals for revision. The basic Conference
objective is to gain insight into the positions held by Community agencies on
current policy and prospective changes thereto as the basis for determining
how best to go about updating the DCID.
Open Source Initiative
The DDCI has approved a major, long term initiative designed to improve
the availability to Community analysts of timely data from unclassified
sources such as periodicals, books, broadcasts, and electronic data bases.
The program envisioned is extensive and multi-faceted, and is described in a
4
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
SECRET
separate document accompanying this guide. The IHC has been assigned the lead
responsibility for planning and coordinating those segments of the program
relating to the exchange of open source information and services and requiring
the use of improved automated information handling techniques.
It will be evident that the initiatives, for both budgetary and technical
reasons, cannot be all implemented at once. Given the Gramm-Rudman-Hollings
legislation, it is likely that the next several fiscal years (at least) will
yield particularly limited funding support. It is important, therefore, that
the Community develop an implementation strategy that makes most effective and
creative use of available resources, both funds and existing support
capabilities. Among strategic objectives to be considered, for example, are:
early activation of a meaningful improvement in open source support
as a demonstration of the potential of the larger program; and
incremental Community supplementation of ongoing agency programs to
maximize and advance the yield of resources already committed through
the latter.
LThe FBIS briefer is asked to describe his organization's modernization
program as concerns prospective facilities and services for provision of open
source information, implementation strategies, and timetables related thereto2
The Conference should also consider how best to organize and coordinate
the planning and subsequent implementation efforts for the open source
program, given the diverse organizational involvement and many technical
program components. Responsibilities should be appropriately delegated to
participating organizations to the maximum feasible extent. However, the
overall program must be coherently structured and coordinated if it is to
compete successfully for NFIP resources.
5
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
STAT
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
25X1
25X1
SE ET
DIRECTOR OF CENTRAL INTELLIGENCE
.1. HUMINT Committee
WASHINGTON, D.C. 20505
OFFICE OF THE CHAIRMAN
HC 86-055
11 March 1986
MEMORANDUM FOR: Acting Director of Central Intelligence
THROUGH:
FROM:
SUBJECT:
Director, Intelligence Community Staff
Deputy Director, Intelligence Community Staff
Chairman, HUMINT Committee
Open Source Exploitation Program
1. On behalf of the Executive Steering Group for the Exploitation
of Overt Information on Science and Technology, I take pleasure in
submitting the highlights of a comprehensive report which will soon be
published separately as a basic source of program guidance and reference
for the Intelligence Community's components charged with responsibilities
in this field.
2. As you will recall, the need to address this issue was flagged
in a 1983 report prepared by a joint Working Group of the HUMINT
Committee and the Scientific and Technical Intelligence Committee. At
that time I was commissioned to lead an Executive Steering Group to
examine how the HC/STIC report could be implemented. ?:Our conclusions
were presented to the DCI's Offsite Conference in September 1984, and the
Executive Steering Group was charged with managerial implementation with
respect not only to S&T information but political, economic, and
sociological information. For eight months during 1985 an intensive
25X1 series of meetings were held under the chairmanship of
which brought together for the first time all the Program Managers of the
various open source centers within the Intelligence Community. The
attached report distills the essence of this work and of the Executive
Steering Group's conclusions and recommendations.
3. The following salient features of the report warrant brief
mention:
25X1
This report marks the first time in 25 years that the
Program Managers of the Intelligence Community have
undertaken a comprehensive examination of this issue.
SE C..4 ET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
25X1
25X1
SE ET
SUBJECT: Open Source Exploitation Program
o Recent advances in information handling systems, as well as
technical developments on the immediate horizon, have made
it possible to provide major enhancements to the speed and
effectiveness of the processing tools which Community
analysts will have at their disposal.
o The discussions within the Executive Steering Group and the
Action Group Committees on information technology,
translation services, and collection have already served
the purposes of senior Community management in that they
have set in train a series of significant management
initiativesand enhancements by the key segments of the
Open Source Service Community.
o Strengthening links between providers and analysts and
modernizing the information technology available to
analysts can best take place by implementing the concept of
"distributed services" for the exchange of open source
information. This will, we believe, provide an effective
management framework within which many short-term
improvements are possible at relatively low cost.
o Implementing these recommendations will go far to meet
national needs for more economic as well as scientific and
technical information, a point stressed by the DDI during
the recently concluded Offsite Conferende.
3. The Executive Steering Group seeks your endorsement in principle
for the recommendations summarized in our report so that the processing
enhancements begun or envisioned may go forward within existing budgetary
restraints and in close coordination with the Community as a whole. The
Information Handling Committee, augmented in its membership as
appropriate, will assume the lead role within the Intelligence Community
Staff, while the Executive Steering Group would have a continuing
responsibility for policy oversight.
Attachment: Highlights on Processin
25X1 Overt S&T Information
CRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
SECRET
25X1
25X1
SUBJECT: Open Source Exploitation Program
APPROVED:
OV:1:Allikector of Central Intelligence
DISAPPROVED:
Acting Director of Central Intelligence
1 7 MAR 1986
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
L Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
S RET
25X1
25X1
HIGHLIGHTS ON PROCESSING OVERT S&T INFORMATION
KEY FINDINGS
? The primary organizations within the US Government that process and use
open-source information (herein referred to collectively as the Open
Source Service Community [OSSC]) are currently a loosely-knit collection
of autonomous or semi-autonomous units.
o Open Source information is processed in essentially two ways: either by
services of common concern, that support a variety of recipients both
inside and outside the Intelligence Community, or by dedicated services
that primarily support local users. The three principal organizations
which process information as services of common concern are:
the Foreign Broadcast Information Service (FBIS) of CIA, which is
responsible for monitoring foreign media and maintaining the
Automated Consolidated Translation Survey (ACTS) data base of
translations completed and in process within the government;
the Foreign Technology Division (FTD), executive agent for the CIRC
data base of references to S&T documents and to selected
translations; and
the State/INR/Publications Program (INR/P),
which coordinates
publications ordering and acquisition.
o Major users of open-source information within the US government include
intelligence analysts, laboratories, and contractors working for
intelligence or other agencies. The private sector also has a continuing
and specialized knowledge of foreign activities which make it both a
potentially lucrative source and consumer of open-source information.
o Total funding for open-source services is not presently known or easily
obtainable, but it is generally recognized as being small in comparison to
other activities funded within the NFIP. However, a substantial portion
of the infrastructure upon which the processing of open-source material is
dependent lies outside the NFIP.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part -,Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
SUBJECT: HIGHLIGHTS ON PROCESSING OVERT S&T INFORMATION
KEY JUDGMENTS
o Basic weaknesses of the current Open Source Service Community vary from
agency to agency but generally can be described as:
inadequate and unequal access to open-source processing services
across the spectrum of users;
inadequate knowledge or awareness of available acquisitions/
collection and processing services;
inadequate relationship between funding of open-source processing
services and needs;
inadequate use of organizations in the private sector that collect
and process open-source material of interest to the OSSC;
inadequate coordination and/or management mechanisms for
modernization of open-source processing services; and
inadequate training within career development paths for both
processors and analysts of open-source information within the US
Government.
o While these weaknesses are recognized as applying to the overall OSSC,
they are not necessarily characteristic of services provided by particular
segments of that Community.
o Any actions to correct these deficiencies in processing scientific and
technical information should be applicable to all open-source information
without regard to subject matter. They should be executed within the
assigned mission responsibilities of Community members. Practical
successes demonstrate the validity of emphasizing better processing and
use not only of S&T information, but also economic, political, military,
and sociology-related information.
2
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
ccr.nr.r
Declassified in Part -Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
?
25X1
SUBJECT: HIGHLIGHTS ON PROCESSING OVERT S&T INFORMATION
NEAR-TERM RECOMMENDATIONS
o The Intelligence Community should sustain the momentum that has been
achieved during the past year in the exploitation of open-source
information. It should begin now to plan the future long-term program as
a framework for near-term improvements. It should coordinate and
implement the program efforts of Community members as integral parts of a
single concept, built upon stronger relationships between open-source
service providers and analysts. This effort should lead in modernizing
the information technology available to analysts by taking full advantage
of available and emerging new technology in the government and private
sector.
o In the area of information technology and communications, it is
recommended that:
Managers of user organizations share technology applications already
in being or under development in their organizations.
Program managers for the Exceptional Intelligence Analyst Program and
the Productivity Enhancement Initiatives Program encourage software
applications by soliciting proposals for them as part of the
analytical projects under these programs.
CIA/ORD serve as a focal point through symposia, monitoring the work
of other governmental agencies and of the private sector, and sharing
its R&D efforts in a special interest group involving user agencies.
o In the area of translation technology and expertise, it is recommended
that:
3
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part- Sanitized Copy Approved forRelease2012/08/24 : CIA-RDP90G00993R000100270006-1
JtUkt1
SUBJECT: HIGHLIGHTS ON PROCESSING OVERT S&T INFORMATION
FTD provide interim support for an index to translations while the
long-term ACTS upgrade is under way;
FBIS initiate quarterly meetings of senior professional translators
and managers to discuss the full scope of translation issues peculiar
to the OSSC; and
FTD, FBIS, and other OSSC agencies with significant translation
responsibilities share translation technologies and identify specific
resources in future budgets for career enhancement, training, and the
exchange of foreIgn language personnel.
o In the area of processing collection acquisition and deliveries more
effectively, it is recommended that:
A Steering Group be established within the existing Interagency Maps
and Publications Acquisitions Committee to develop and implement
managerial and practical improvements in processing in the earliest
stages of acquisition of maps and publications; to integrate and
coordinate economic and other governmental open-source collection
programs for better exploitation; to improve field functions; and to
monitor progress in making commercial electronic data bases more
suitable for Intelligence Community needs.
Intelligence Community production committees play a more active role
in representing open-source users by expressing their needs on topics
of current interest through both formal and informal mechanisms;
In remaining areas, it is recommended that:
Training and accompanying training materials be improved in the
specialty areas supporting open-source services and their
utilization. Key areas include: information management, information
technology tools and methods, and automated data base management and
usage; and
Rapid response mechanisms be established through which analysts can
acquire current high priority open-source information resident in the
private sector. The Intelligence Community, in partnership with the
Department of Commerce, should identify ways to improve such
collection through the private sector.
4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part -Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
?
SUBJECT: HIGHLIGHTS ON PROCESSING OVERT S&T INFORMATION
LONG-TERM RECOMMENDATIONS
The Community should establish as a long-term goal the creation of a
Community-wide Open-Source Exploitation Program. Such a program would
exploit automation and communications technologies currently available in
the government and the private sector to: a) improve cooperation and
cohesiveness among providers of open-source materials, and b) allow the
individual analyst more direct and convenient access to open-source
products as well as the capability to integrate open-source with
classified information. Wherever possible, this program would be
implemented via evolutionary improvements that draw upon existing computer
and communications systems. Functionally, the improvements would:
service all members of the Intelligence Community, especially its S&T
centers, with a timely flow of open-source material;
provide analysts with on-line access to each other;
- deliver materials in a way that is convenient for analysts at their
desks;
produce enhanced output from data bases by providing better access
for analysts, eliminating duplication among data bases before making
information available to analysts, and allowing the analysts to
manipulate the results of the searches;
? contain an on-line accessible, coordinated data base of publications
on order;
contain an accessible distributed data base of materials translated
and in process of translation with due dates;
Fri2FT
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
SUBJECT: HIGHLIGHTS ON PROCESSING OVERT S&T INFORMATION
=RIM
provide delivery of full-text information, including delivery in
hard-copy form in a timely manner; and
provide these services through networked computers that facilitate
access by multiple users in associated agencies.
o A phased implementation plan with a specific date for an initial
operational capability for the program improvements should be developed by
the Information Handling Committee through involvement of major providers
and users. Of the major providers, FTD and FBIS will play a central role,
i25X1 with participating where appropriate.
o The Executive Steering Group that was established to focus attention on
open-source exploitation will have a continuing responsibility for
overseeing all Open Source Service Community policy matters relating to
both the long- and near-term recommendations identified above.
6
SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
DIRECTOR OF CENTRAL INTELLIGENCE
Intelligence Information Handling Committee
WASHINGTON. DC 21)51)5
MEMORANDUM FOR: See Distribution
25X1 FROM:
Chairman, Intelligence Information
Handling Committee
IHC/MM 86-09
10 March 1986
SUBJECT: Intelligence Information Handling
Committee (IHC) 1986 Off-Site Conference
1. The Intelligence Community has developed, in COINS, a major automated
information resource with worldwide reach which is now entering an era of
major expansion and modernization. The Department of Defense Intelligence
Information System (DODIIS), which will greatly expand the availability of
COINS services to military commands around the world, has begun to come
online; and, in the spring of this year, the initial operating capability of
the Community Information Retrieval System (CIRS) will provide, via COINS and
DODIIS, rapid access to in-depth data bases of Community intelligence
product. In 1986, the Community will also begin design and planning attendant
to implementation of the DCI's initiative directed toward substantially
improving the availability to Community analysts of open source information.
2. These programs-are-clearly interrelated and, along with others
unmentioned, represent an immense resource for support of Community
operations. Their proper employment requires a level of integrative planning
capable of cutting across individual program lines and looking at support
requirements and the potential for meeting them in broader perspective. This
need extends to the burgeoning intelligence support relationship between the
25X1
4.0 .11
-
e -u'i f.1111 f
1.111 f?
.1 I e -
interdiction and counter-terrorism areas. The extension of Intelligence
Community information handling services into the law enforcement operating
environment has generated a range of new functional, legal, and security
issues that must be factored into Community system development and operating
strategies.
3. Overall, there is the challenge of computer security and the
management judgments that need to be made regarding acceptable level of risk
relative to operating restrictions that would have to be imposed in order to
minimize system security vulnerability. Trade-off issues of this nature are
particularly relevant to systems of the kind mentioned above, which involve
broadly based organizational networks, a large number of dispersed system
access points, and diverse data bases. In the current absence of effective
rANELftri AI
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part- Sanitized Copy Approved forRelease2012/08/24 : CIA-RDP90G00993R000100270006-1
UW LLJLI I n
technical means for totally eliminating system vulnerability to penetration,
continuing implementation of such systems requires recognition of the risks
involved and the adoption of interim technical and procedural measures to
contain them. These, in turn, need to be supported by realistic and useful
policy and resource guidance
4. Within the enntext outlined above. I propose to devote the 1986 IHC
25X1 Off-Site Conference 20-22 April, to a
goal-oriented consideration ot the course or Lommunity automated information
handling strategy. Our objectives will be: (1) to seek a consensual
formulation of Community goals regarding development of information handling
capabilities and support services in the next three years; (2) to review the
status of relevant information handling programs and planned additional
development; and (3) to explore, on a cross-program basis, strategies for
achieving the indicated capability and service goals, including
recommendations concerning DCI policy and fiscal guidance and potential joint
initiatives with the Secretary of Defense.
5. You are cordially invited to attend the conference, which will
commence with a reception and dinner on the evening of 20 April, followed by
an overview session on conference issues. The next day and a half will be
devoted to briefings and discussions focusing on the subjects and objectives
outlined above. A specific agenda and details concerning travel and
administrative arrangements will be provided later.
25X1 6. Please advise of your attendance plans by 21 March
25X1 .106. He can be reached at and can
answer-any-questions-you-might
have. The IHC staff and 'I look forward to
25X1 seeing you at the conference.
Declassified in Part - Sanitized Copy Approved for Release : CIA-RDP90G00993R000100270006-1
25X1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/24: CIA-RDP90G00993R000100270006-1