COMPUTER SECURITY ACT OF 1986

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP87B00858R000400480025-3
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
39
Document Creation Date: 
December 22, 2016
Document Release Date: 
March 15, 2011
Sequence Number: 
25
Case Number: 
Publication Date: 
August 6, 1986
Content Type: 
OPEN SOURCE
File: 
AttachmentSize
PDF icon CIA-RDP87B00858R000400480025-3.pdf2.55 MB
Body: 
Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 99TH CONGRESS REPT. 99-753 2d Session I HOUSE OF REPRESENTATIVES I Part 1 Mr. FUQUA, from the Committee on Science and Technology, submitted the following REPORT together with ADDITIONAL AND DISSENTING VIEWS [To accompany H.R. 2889 which on June 27, 1985, was referred jointly to the Com- mittee on Science and Technology and the Committee on Government Operations] [Including cost estimate of the Congressional Budget Office] The Committee on Science and Technology, to whom was re- ferred the bill (H.R. 2889) to amend the Act establishing the Na- tional Bureau of Standards to provide for a computer security re- search program within such Bureau, and to provide for the train- ing of Federal employees who are involved in the management, op- eration, and use of automated information processing systems, having considered the same, report favorably thereon with amend- ments and recommend that the bill as amended do pass. The amendments are as follows: Strike out all after the enacting clause and insert in lieu thereof the following: SECTION 1. SHORT TITLE. This Act may be cited as the "Computer Security Act of 1986". SEC. 2. PURPOSE. (a) IN GENERAL.-The Congress declares that improving the security and privacy of sensitive information in Federal computer systems is in the public interest, anc. hereby creates a means for establishing minimum acceptable security practices for such systems, without limiting the scope of security measures already planned or in use. (b) SPECIFIC PURPOSES.-The purposes of this Act are- (1) to assign to the National Bureau of Standards responsibility for developing standards and guidelines for Federal computer systems, including standards and guidelines needed to assure the cost-effective security and privacy of sensi- 71-0060 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 tive information in Federal computer systems, by amending the Act of March 3, 1901; (2) to provide for promulgation of such standards and guidelines by amending section 111(f) of the Federal Property and Administrative Services Act of 1949; (3) to require establishment of security plans by all operators of Federal com- puter systems that contain sensitive information; and (4) to require mandatory periodic training for all persons involved in manage- ment, use, or operation of Federal computer systems that contain sensitive in- formation. SEC. 3. ESTABLISHMENT OF COMPUTER STANDARDS PROGRAM. The Act of March 3, 1901 (15 U.S.C. 271-278h), is amended- (1) in section 2(f), by striking out "and" at the end of paragraph (18), by strik- ing out the period at the end of paragraph (19) and inserting in lieu thereof a semicolon, and by inserting after such paragraph the following: "(20) the study of equipment, procedures, and systems for automatic acquisi- tion, storage, manipulation, display, and transmission of information, and its use to control machinery and processes."; (2) by redesignating section 18 as section 20, and by inserting after section 17 the following new sections: "SEC. 18. (a) The National Bureau of Standards shall- "(1) have the mission of developing standards, guidelines, and associated methods and techniques for computer systems; "(2) except as described in paragraph (3) of this subsection (relating to securi- ty standards), develop uniform standards and guidelines for Federal computer systems, except those systems excluded by section 2315 of title 10, United States Code, or section 3502(2) of title 44, United States Code; "(3) have responsibility within the Federal Government for developing techni- cal, management, physical, and administrative standards and guidelines for the cost-effective security and privacy of sensitive information in Federal computer systems except- "(A) those systems excluded by section 2315 of title 10, United States Code, or section 3502(2) of title 44, United States Code; and "(B) those systems which are protected at all times by procedures estab- lished for information which has been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy, the primary purpose of which standards and guidelines shall be to control loss and unauthorized modification or disclosure of sensitive information in such systems and to prevent computer-related fraud and misuse; "(4) submit standards and guidelines developed pursuant to paragraphs (2) and (3) of this subsection, along with recommendations as to the extent to which these should be made compulsory and binding, to the Secretary of Commerce, for promulgation under section 111 of the Federal Property and Administrative Services Act of 1949; "(5) develop guidelines for use by operators of Federal computer systems that contain sensitive information in training their employees in security awareness and accepted security practice, as required by section 5 of the Computer Securi- ty Act of 1986; and "(6) develop validation procedures for, and evaluate the effectiveness of, standards and guidelines developed pursuant to paragraphs (1), (2), and (3) of this subsection through research and liaison with other government and private agencies. "(b) In fulfilling subsection (a) of this section, the National Bureau of Standards is authorized- "(1) to assist the private sector in using and applying the results of the pro- grams and activities under this section; "(2) to make recommendations, as appropriate, to the Administrator of Gener- al Services on policies and regulations proposed pursuant to section 111(f) of the Federal Property and Administrative Services Act of 1949; "(3) as requested, to provide to operators of Federal computer systems techni- cal assistance in implementing the standards and guidelines promulgated pur- suant to section 111(f) of the Federal Property and Administrative Services Act of 1949; "(4) to assist, as appropriate, the Office of Personnel Management in develop- ing regulations pertaining to training, as required by section 5 of the Computer Security Act of 1986; Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 "(5) to perform research and to conduct studies, as needed, to determine the nature and extent of the vulnerabilities of, and to devise techniques for the cost effective security and privacy of sensitive information in Federal computer sys- tems; and "(6) to coordinate closely with other agencies and offices (including, but not limited to, the Departments of Defense and Energy, the National Security Agency, the General Accounting Office, the Office of Technology Assessment, and the Office of Management and Budget)- "(A) to assure maximum use of all existing and planned programs, mate- rials, studies, and reports relating to computer systems security and priva- cy, in order to avoid unnecessary and costly duplication of effort; and "(B) to assure, to the maximum extent feasible, that standards developed pursuant to subsection (a) (3) and (5) are consistent and compatible with standards and procedures developed for the protection of information in Federal computer systems which is authorized under criteria established by Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy. "(c) As used in this section and section 19, the terms 'computer system', 'Federal computer system', 'operator of a Federal computer system', and 'sensitive informa- tion' have the meanings given in section 7 of the Computer Security Act of 1986. SEC. 19. (a) There is hereby established a Computer System Security and Privacy Advisory Board within the Department of Commerce. The Secretary of Commerce shall appoint the chairman of the Board. The Board shall be composed of twelve additional members appointed by the Secretary of Commerce as follows: "(1) four members from outside the Federal Government who are eminent in the computer or telecommunications industry, at least one of whom is repre- sentative of small or medium sized companies in such industry; "(2) four members from outside the Federal Government who are eminent in the fields of computer or telecommunications technology, or related disciplines, but who are not employed by or representative of a producer of computer or telecommunications equipment; and "(3) four members from the Federal Government who have computer systems management experience, including experience in computer systems security and privacy, at least one of whom shall be from the National Security Agency. "(b) The duties of the Board shall be- "(1) to identify emerging managerial, technical, administrative, and physical safeguard issues relative to computer systems security and privacy; "(2) to advise the Bureau of Standards and the Secretary of Commerce on se- curity and privacy issues pertaining to Federal computer systems; and "(3) to report its findings to the Secretary of Commerce, the Director of the Office of Management and Budget, the Director of the National Security Agency, and the appropriate committees of the Congress. "(c) The term of office of each member of the Board shall be four years, except that- "(1) of the initial members, three shall be appointed for terms of one year, three shall be appointed for terms of two years, three shall be appointed for terms of three years, and three shall be appointed for terms of four years; and "(2) any member appointed to fill a vacancy in the Board shall serve for the remainder of the term for which his predecessor was appointed. "(d) The Board shall not act in the absence of a quorum, which shall consist of seven members. "(e) Members of the Board, other than full-time employees of the Federal Govern- ment, while attending meetings of such committees or while otherwise performing duties at the request of the Board Chairman while away from their homes or a reg- ular place of business, may be allowed travel expenses in accordance with subchap- ter I of chapter 57 of title 5, United States Code. "(f) To provide the staff services necessary to assist the Board in carrying out its functions, the Board may utilize personnel from the National Bureau of Standards or any other agency of the Federal Government with the consent of the head of the agency."; and (3) by adding at the end thereof the following new section: "SEC. 21. This Act may be cited as the National Bureau of Standards Act.". SEC. 4. AMENDMENT TO BROOKS ACT. (a) AMENDMENT.-Section 111(f) of the Federal Property and Administrative Serv- ices Act of 1949 (40 U.S.C. 759(f)) is amended to read as follows: Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 "(0(1) The Secretary of Commerce shall, on the basis of standards and guidelines developed by the National Bureau of Standards pursuant to section 18(a) (2) and (3) of the National Bureau of Standards Act, promulgate standards and guidelines per- taining to Federal computer systems, making such standards compulsory and bind- ing to the extent to which the Secretary determines necessary to improve the effi- ciency of operation or security and privacy of Federal computer systems. "(2) The head of a Federal agency may employ standards for the cost effective se- curity and privacy of sensitive information in a Federal computer system within or under the supervision of that agency that are more stringent than the standards promulgated by the Secretary of Commerce, if such standards contain, at a mini- mum, the provisions of those applicable standards made compulsory and binding by the Secretary of Commerce. "(3) The standards determined to be compulsory and binding may be waived by the Secretary of Commerce in writing upon a determination that compliance would adversely affect the accomplishment of the mission of an operator of a Federal com- puter system, or cause a major adverse financial impact on the operator which is not offset by government-wide savings. The Secretary may delegate to the head of one or more Federal agencies authority to waive such standards to the extent to which the Secretary determines such action to be necessary and desirable to allow for timely and effective implementation of Federal computer systems standards. The head of such agency may redelegate such authority only to a senior official designat- ed pursuant to section 3506(b) of title 44, United States Code. Notice of each such waiver and delegation shall be promptly transmitted to the Committee on Govern- ment Operations of the House of Representatives and the Committee on Govern- mental Affairs of the Senate. "(4) The Administrator shall ensure that such standards and guidelines are imple- mented within an integrated information resources management system (as re- quired by chapter 35 of title 44, United States Code) by- "(A) developing and implementing policies on Federal computer systems; and "(B) revising the Federal information resources managment regulations (41 CFR ch. 201) to implement such standards, guidelines, and policies. "(5) As used in this section, the terms 'computer system', 'operator of a Federal computer system', and 'Federal computer system' have the meanings given in sec- tion 7 of the Computer Security Act of 1986. '. (b) TECHNICAL AND CONFORMING AMENDMENTS.-Section 111 of such Act is further amended- (1) by striking out "automatic data processing equipment" and "automatic data processing systems" each place they appear and inserting in lieu thereof "computer systems"; and (2) by striking out "Automatic data processing equipment" and inserting in lieu thereof "Computer systems". SEC. 5. TRAINING BY OPERATORS OF FEDERAL COMPUTER SYSTEMS. (a) IN GENERAL.-Each operator of a Federal computer system that contains sensi- tive information shall provide mandatory periodic training in computer security awareness and accepted computer security practice. Such training shall be provided under the guidelines developed pursuant to section 18(aX5) of the National Bureau of Standards Act (as added by section 3 of this Act), and in accordance with the reg- ulations issued under subsection (c) of this section, for all employees who are in- volved with the management, use, or operation of computer systems. (b) TRAINING OBJECrIvES.-Training under this section shall be started within 60 days after the issuance of the regulations described in subsection (c). Such training shall be designed- (1) to enhance employees' awareness of the threats to and vulnerability of computer systems; and (2) to encourage the use of improved computer security practices. (c) REGuLATIoNS.-Within six months after the date of the enactment of this Act, the Director of the Office of Personnel Management shall issue regulations prescrib- ing the procedures and scope of the training to be provided under subsection (a) and the manner in which such training is to be carried out. SEC. 6. ADDITIONAL RESPONSIBILITIES FOR OPERATORS OF FEDERAL COMPUTER SYSTEM FOR COMPUTER SYSTEMS SECURITY AND PRIVACY. (a) IDENTIFICATION OF SYSTEMS THAT CONTAIN SENSITIVE INFORMATION.-Within 6 months after the date of enactment of this Act, each operator of a Federal computer system shall identify each computer system, and system under development, of that operator which contains sensitive information. In the case of a Federal contractor or Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 other organization (operating a Federal computer system), such identification shall be reviewed and approved by its supervising Federal agency. (b) SECURITY PLAN.-Within one year after the date of enactment of this Act, each such operator shall, consistent with the standards, guidelines, policies, and regula- tions prescribed pursuant to section 111(f) of the Federal Property and Administra- tive Services Act of 1949, establish a plan for the security and privacy of the com- puter systems identified pursuant to subsection (a). Copies of such plan shall be transmitted to the National Bureau of Standards and the National Security Agency for advice and comment. In the case of a Federal contractor or other organization (operating a Federal computer system), such plan shall be transmitted through its supervising Federal agency. Such plan shall be subject to disapproval by the Direc- tor of the Office of Management and Budget. SEC. 7. DEFINITIONS. As used in this Act, sections 18 and 19 of the National Bureau of Standards Act, and section 111 of the Federal Property and Administrative Services Act of 1949- (1) the term "computer system" means any equipment or interconnected col- lection of equipment, including- (A) ancillary equipment; (B) software and other procedures; (C) services; and (D) other resources, that are used in the automatic acquisition, storage, manipulation, or display, or in any associated electromagnetic transmission and reception, of information; (2) the term "Federal computer system" means a computer system operated by a Federal agency (as that term is defined in section 3(b) of the Federal Prop- erty and Administrative Services Act of 1949) or by a contractor of a Federal agency or other organization that processes information using a computer system on behalf of the Federal Government to accomplish a Federal Govern- ment function; (3) the term "operator of a Federal computer system" means a Federal agency (as that term is defined in section 3(b) of the Federal Property and Administra- tive Services Act of 1949), contractor of a Federal agency, or other organization that processes information using a computer system on behalf of the Federal Government to accomplish a Federal Government function; (4) the term "sensitive information" means any information, the loss, misuse, or unauthorized access or modification of which could adversely affect the na- tional interest or the conduct of Federal programs, or the privacy to which indi- viduals are entitled under section 552 of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy. SEC. 8. AUTHORIZATION OF APPROPRIATIONS. There are authorized to be appropriated to each Federal agency such sums as may be necessary for fiscal years 1987, 1988, and 1989 to carry out the computer systems security training program established by section 5 of this Act and the identification and planning requirements of section 6. Amend the title so as to read: A bill to amend the Act establishing the National Bureau of Standards to provide for a computer standards program within such Bureau, to provide for government- wide computer security, and to provide for the training in security matters of per- sons who are involved in the management, operation, and use of Federal computer systems. Page I. Background ............................................................................................................. 6 II. Issues raised during the hearings ...................................................................... 8 III. Need for legislation ............................................................................................... 15 IV. Explanation of the bill ......................................................................................... 15 V. Sectional analysis .................................................................................................. 22 VI. Effect of legislation on inflation ......................................................................... 27 VII. Oversight findings and recommendations, Committee on Science and Technology .......................................................................................................... 27 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 VIII. Oversight findings and recommendations, Committee on Government Operations ........................................................................................................... IX. Budget analysis and projection ........................................................................... X. Congressional Budget Office cost estimate ....................................................... XI. Changes in existing law ....................................................................................... XII. Committee recommendation ............................................................................... XIII. Additional views .................................................................................................... XIV. Dissenting views .................................................................................................... I. BACKGROUND Computers and information systems have so permeated today's society that there is virtually no sector which does not rely heavily on their use. This includes the Federal Government, which current- ly has over 17,000 medium- and large-scale computers and will have almost 500,000 microcomputers by 1990, according to a recent annual report by the General Services Administration, entitled "ADP Management of Information Systems," 1985. The Federal Government is the largest single user of computers in the world. Its investment in automated systems technology is so large that about 1.6 percent of the 1986 budget will be spent on automated data processing (ADP) equipment and services, or more than 15 billion dollars. This budget includes ADP for defense and national security, education, national energy programs, social wel- fare, and tax programs (to name just a few). As the role of the Federal Government has become broader, the need to automate and the corresponding need to secure data also has grown. In recent years, Congress and the executive agencies have directed their attention to Federal computer systems in a number of areas, including investigating and commenting on their integrity and security. Both Section 111(f) of the Federal Property and Administrative Services Act of 1949 (the Brooks Act of 1965) and the Paperwork Reduction Act of 1980 represented attempts by Congress to address the issues of automating information in Feder- al agencies and creating an efficient method of storing and dissemi- nating this information. In October 1984, Congress passed the first Federal computer crime legislation. This law, the Counterfeit Access Device and Computer Fraud Act of 1984 (P.L. 98-473), pro- hibits unauthorized access into a Federal computer system to modify, destroy, or disclose information; unauthorized access to in- formation to obtain financial or credit information protected by Federal financial privacy laws; and unauthorized access to obtain classified military intelligence information. Within the Federal Government several agencies have been charged with the responsibility for establishing computer security controls and standards. The Office of Management and Budget (OMB) has overall responsibility for computer security policy. The General Services Administration (GSA) also issues regulations for physical security of computer facilities, and ensures that security hardware and software meet certain technological and fiscal speci- fications. In defense and national security, the National Security Agency (NSA) has traditionally been responsible for the security of classified information, including that processed by and stored within computers. Recently, NSA has been given the responsibility to establish and maintain technical standards for secure, or "trust- ed," computers. NSA does this through its administration of the Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Department of Defense (DOD) National Computer Security Center. NSA also will work with industries at the DOD Computer Security Center to develop security standards for private sector use. At the Department of Commerce, the National Bureau of Stand- ards' (NBS') Institute of Computer Science and Technology (ICST) has developed computer and processing standards, such as the Data Encryption Standard (DES), which protects data transferred be- tween automated information systems. The Federal Information Processing Standards (FIPS) developed by the ICST provide specific codes, language, procedures, and techniques for Federal and pri- vate sector information systems managers. Also at the Department of Commerce, the National Telecommunications and Information Administration (NTIA) has the responsibility for analyzing, devel- oping, implementing and applying executive branch policy for tele- communications in the Federal Government. This mixture of laws, regulations, and responsible agencies has raised concern that Federal computer security policy is lacking di- rection and forcefulness in some areas, yet has created overlapping and duplication of effort in other areas. Recently, Federal regula- tions and directives have been issued and congressional legislation has been introduced to address the lack of coordination of Federal ADP systems. On March 15, 1985, OMB issued a draft circular intended "to provide a general framework of management of information re- sources." This circular combined and updated operative OMB circu- lars, including OMB Circular A-71 (originally issued in July 1978). A version of the draft circular was then included in a final OMB circular, A-130 (issued on December 12, 1985), in which Appendix III addressed Federal government computer security issues. Appen- dix III of A-130 is a very broad policy directive, outlining both in- traagency and interagency guidelines for computer security. Those responsible for implementation of this circular include the Depart- ment of Commerce, Department of Defense, General Services Ad- ministration, and the Office of Personnel Management, in addition to OMB. On September 17, 1984, the executive branch issued National Se- curity Decision Directive 145 (NSDD-145), "National Policy on Telecommunications and Automated Information Systems Securi- ty." This directive is aimed at safeguarding automated information systems with a special focus on protecting those Federal systems accessed via (and dependent on) network communications. NSDD- 145 creates a National Telecommunications and Information Sys- tems Security Committee (NTISSC), a panel of 22 voting represent- atives from 12 defense/intelligence agencies and 10 civilian agen- cies. An Assistant Secretary of Defense chairs NTISSC, and the Di- rector of the National Security Agency acts as the National Man- ager for implementing policy under NSDD-145. The NTISSC is em- powered to issue operating policies to assure the security of tele- communications and automated information systems that process and communicate both classified national security information and other sensitive government information. Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 On June 27, 1985, Representative Dan Glickman, then chairman of the Subcommittee on Transportation, Aviation, and Materials, House Committee on Science and Technology, introduced H.R. 2889, the Computer Security Research and Training Act of 1985. This legislation would establish the NBS as the focal point for de- veloping training guidelines for Federal employees who are in- volved in the management, operation, and use of automated infor- mation processing systems. This legislation was based in part on hearings which the subcommittee conducted in 1983 and a 1984 subcommittee report which had recommended increased ADP training and awareness in Federal agencies. II. ISSUES RAISED DURING THE HEARINGS The Subcommittee on Transportation, Aviation and Materials held a series of hearings which addressed computer and communi- cations privacy and security in the Federal Government on Sep- tember 24, 1984, June 27, 1985, and October 29 and jointly with the Subcommittee on Science, Research, and Technology on October 30, 1985. These hearings touched upon three major issues: (1) The cur- rent state of computer privacy and security in the Federal Govern- ment; (2) The major impact of NSDD-145 and the role of the NSA in setting Federal civilian computer security; (3) The role of the Federal Government in adequately training Federal employees and heightening awareness of computer security. FEDERAL COMPUTER CRIME AND SECURITY There has been a heightened awareness both inside and outside the Federal Government that current computer security measures are inadequate. This is an issue which has been discussed in con- gressional hearings since the mid-1970s, but it is only recently that several studies have attempted to quantify the extent of damage caused by computer fraud and abuse causes, as well as the demon- strated lack of computer preparedness and systems integrity in Federal ADP systems During the September 24, 1984 hearings, John Tompkins, chair- man of the Task Force on Computer Crime of the American Bar Association (ABA), commented on a survey conducted by the ABA on the state of computer crime in government and the private sector. The ABA report was one of the first extensive studies done on the number of "known and verifiable losses" which have result- ed from computer crimes, and the results of the survey included re- sponses from 13 Federal agencies and 28 State and local agencies. Although the results of the survey indicated a wide range of losses by respondents, several consistent factors emerged: that "insiders" having access to computer systems are the more likely perpetrators of fraud and abuse; that there is a proliferation of computers in government; that such security systems as currently exist do not facilitate detection of computer crimes; that security systems them- selves often are vulnerable and inadequate; and that a lack of awarness and concern by the public, as well as computer systems managers, are contributing to these problems. Mr. Tompkins noted that, although the ABA did not state any formal recommendations, the conclusions reached by the respondents to the ABA survey in- Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 dicated: the need for Federal computer crime legislation; the need to adequately train and supervise personnel in data processing; and the large overall cost and expense of computer fraud and abuse. Richard Kusserow, Inspector General for the Department of Health and Human Services, also testified on the nature of fraud and abuse in Federal computer systems. As Inspector General for the largest Federal civil agency, Mr. Kusserow's office has been in- volved with auditing computer systems, reducing costs, and insur- ing the integrity of HHS ADP systems. As Mr. Kusserow stated at the September 24 hearings: We must ensure that agency managers in overseeing programs that use computerized systems, do audit the sys- tems, do look and make sure that the controls are func- tioning, and that we in the inspector general community, using our auditors and investigators, follow up to make sure it's being done. I think that in all of these areas it has not been done nearly enough. Also, as chairman of the President's Council on Integrity and Ef- ficiency investigating computer crime in the Federal Government, Mr. Kusserow testified on September 24, 1984, and again on Octo- ber 29, 1985, on a study he directed which examined computer-re- lated fraud and abuse in general, and a subsequent study in which the Inspector General's office interviewed those who had been con- victed of Federal computer fraud and abuse. The results of these studies are consistent with the findings of the ABA study: that Fed- eral computer fraud and abuse is often committed by insiders within the Federal agency; that training for computer security and awareness of vulnerabilities in computer systems were lacking; and that internal controls for computer security need to be increased. The profile of Federal computer criminals shows that they are young, considered good employees, and often use co-conspirators, and that many who commit these crimes never think about the consequences of being caught, or if they consider the consequences, assess the risk of being caught as minimal. As Mr. Kusserow stated in the October 29 hearing: One of the most disturbing findings from this study is that the work environment provided the perpetrators with the opportunity to commit their crime. We asked the per- petrators about computer security where they had commit- ted their crime . . . Virtually all of them had been aware of security efforts but most said they had been weak. So, they made the judgment that, although there may have been security efforts in their agencies, they were weak and could not be counted upon to act as a deterrence for them to committing the crime. The General Accounting Office also testified during the hearings on June 27, 1985, and October 29 and 30, 1985. GAO has conducted several studies on computer crime and security in the Federal Gov- ernment, including a 1985 survey of 25 computer systems in 17 Federal civil agencies, to evaluate the state of computer security and integrity of these systems. This survey was conducted by GAO using two questionnaires and subsequent interviews, promising an- Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 onymity to the agencies so the systems could not be compromised after public disclosure. GAO indicated that: Generally, the results of our survey showed that each of the systems is vulnerable to abuse, destruction, error, fraud, and waste. Specifically we found that: key manage- ment responsibilities were missing. For example, many agencies do not use a risk management approach as part of implementing a security program; and actual safeguards needed to protect systems from potential threats were not always in place. For example, computerized techniques, such as passwords, allowing access to systems were not pe- riodically changed. GAO categorized Federal computer security methods into man- agement and three basic safeguard components: physical, technical, and administrative. No agency met all of the management respon- sibilities outlined in the questionnaire, and only five of the 25 sys- tems evaluated contained an element of physical, technical and ad- ministrative control. Only two of the systems provide what GAO described as adequate training for computer employees. GAO fur- ther characterized the systems as very vulnerable, and given the minimal oversight and coordination between agencies, GAO found that there is a lack of a balanced approach to security of Federal computer systems. The testimony by the ABA, the Inspector General's office of HHS, and GAO clearly indicated that Federal systems are in danger because of improper use and negligence. Other witnesses from both the public and private sector testified during the hear- ings that they also found computer security in general and Federal computer security specifically remains vulnerable and open to fraud and abuse, despite stated efforts by representatives of the Federal agencies to remedy this problem. With the introduction of NSDD-145, the prominent role of the NSA in establishing Federal computer security in civil agencies became a subject of debate among computer security experts. The Subcommittee on Transportation, Aviation, and Materials devoted an entire day of hearings to this subject on June 27, 1985, and the role of NSA under NSDD-145 was a topic mentioned during the hearings on October 29 and 30, 1985. Donald Latham, Chairman of the National Telecommunications and Information Systems Security Committee (NTISSC), Walter Deeley, Deputy Director for Communications Security, NSA, and Robert Brotzman, Director, DOD National Computer Security Center, testified on why NSDD-145 was necessary to coordinate Federal computer security. Citing a lack of overall coordination among Federal agencies, the high risk of compromising, losing or destroying Federal agency data, and the overall vulnerability of Federal computer security systems, they emphasized that the NSA had the experience and expertise to administer Federal computer security programs. As Mr. Latham stated: Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 We have provided cryptographic devices for protection of classified data, as Mr. Deeley will explain further. While we have done a reasonable job in some areas, there are still many areas that are left uncovered and there is more emphasis needed here. We have put in controls for tighter access to unclassified data through network access controls and things like this, so that the so-called hackers can't go in and just play havoc with our data. We are fostering very much a security awareness pro- gram. We are instituting training programs at the nation- al level as well as the local level, I'll say, within service schools and across the various agencies. And we are look- ing at more rigorous ways of clearing people who have access to computer systems and telecommunications net- work security devices. Other witnesses appearing before the subcommittee expressed concerns that NSDD-145 would hamper efforts to adequately ad- minister Federal computer security. One area of concern is that NSDD-145 will create conflict with other Federal security regula- tions, notably Transmittal Memorandum 1 to OMB Circular A-71 (which has since been embodied in OMB Circular A-130, published December 12, 1985). Although both NSDD-145 and the OMB circu- lar are broadly constructed, the emphasis in the OMB circular for planning and implementing Federal computer security rests with civil agencies, primarily with OMB and the Department of Com- merce. In NSDD-145, the Director of NSA and the Secretary of De- fense have primary roles. NSDD-145 does incorporate many of the lead Federal agencies on its NTISSC panel; but not all agencies are included. When Warren Reed, Director, Information Management and Technology Division, General Accounting Office, testified on the GAO survey on Federal computer security, he stated that the issuance of NSDD-145 might create confusion among the Federal agencies over which agency has jurisdiction over security functions. Mr. Reed stated that this could be a large or small problem, and may interfere with other Federal statutes and regulations which have given this jurisdiction to NBS. Raymond Wyrsch, Senior At- toney, Office of General Counsel at GAO, stated: * * * we do have laws on the books, the Brooks Act and the Paperwork Reduction Act, and there are very distinct responsibilities that have been placed on these agencies, namely OMB has been given the general oversight author- ity, if you will to set government policy. * * * And I don't know if anyone is really in the position to say with any degree of conclusiveness now, on what are the other agencies supposed to do if you have inconsistent or conflicting guidance that may be issued. There have been various pronouncements that have been made by the Secretary of Commerce over the years dealing with ADP standards. Another issue regarding NSDD-145 is that of the military setting ADP security priorities for civil agencies. NTISSC has established Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 three levels of classifying information: classified, unclassified, and unclassified but sensitive. What information NTISSC will choose to label "unclassified but sensitive" in Federal civilian agencies is un- known. Representative Jack Brooks, Chairman of the Subcommittee on Legislation and National Security of the House Government Oper- ations Committee, and author of the Brooks Act, highlighted these concerns during his testimony on NSDD-145: "NSA has a propensi- ty and a tendency to classify everything." GAO witnesses also ex- pressed concern that a lack of definition of "unclassified informa- tion considered sensitive" in civil agencies may be interpreted either broadly or narrowly, significantly affecting how agencies store and disseminate information contained in computer and tele- communications systems. However, Lt. Gen. Odom, Director of NSA, has stated in a letter to Chairman Fuqua on February 25, 1986: ". . . the Systems Steering Group, the senior governmental body created by NSDD-145 for information security matters, has concluded that each government department or agency must make its own determination as to what constitutes sensitive information to that department or agency mission or operation." Other witnesses, including representatives from the American Civil Liberties Union and the Institute of Electrical and Electronics Engineers, expressed similar concerns over the "unclassified but sensitive" categorization of computerized data and how that will affect citizens' access to public information or freedom to exchange scientific information. There has been some controversy over the review prc'cess for NSDD-145. Expressing concern that issuing National Security De- cision Directive 145 effectively circumvents the review process that OMB Circular A-71 went through, Subcommittee Chairman Glick- man noted during testimony given on June 27, that a document which ordinarily might be called a regulation, if labeled a national security directive, may avoid the Administrative Procedures Act, all public notification requirements, and Congressional oversight. Also, Mr. Richard P. Kusserow, Inspector General of HHS, stated at the October 29 hearing that "I haven't seen it, and I have not had any imput in the process". Still the review process spanned nearly a year and Dr. Robert E. Conley, who was chairman of the Subgroup on Telecommunications Security created under NSDD- 145 while he was with the Treasury Department, said at the same hearing that "we invited all of the government agencies to attend the meetings". Thus, although there is no question that Federal computer security is a vital national issue, use of NSDD-145 as an instrument for setting policy, without legislative or agency debate and review, has raised concerns in the Congress. Although NSA has a fine track record as the lead technical agency for securing ADP systems containing national security data, it is not clear that it is the appropriate lead agency for direct- ing civil agency computer security. Questions still remain about whether NSDD-145 will create confusion with existing Federal statutes and regulations; what the definition of "unclassified but sensitive" will mean; and whether there should be public debate and review of NSDD-145 before Congress and the Federal agencies. Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 TRAINING FOR FEDERAL COMPUTER SYSTEMS USERS Testimony also described the need for greater computer security training of personnel in the Federal Government. GAO, ABA, the Inspector General of HHS, and others commented on the current state of Federal computer training and security awareness during the course of the subcommittee's hearings. Witnesses on the last day of testimony before the subcommittee on October 30, 1985, dealt directly with H.R. 2889. H.R. 2889, as introduced by Representative Dan Glickman, would establish a focus within the Federal Government at the National Bureau of Standards for computer security research, and develop- ment of computer security training guidelines. This is to ensure that agencies would better train personnel in the vulnerabilities of computer and communication systems. The bill requires that each Federal agency provide such training on a periodic basis. The train- ing would encompass all levels of personnel involved in the man- agement, operation, and use of automated information processing systems. There is little argument that such training is needed or that in some areas, that much is needed to supplement existing training procedures. Most of the witnesses testifying on the current state of Federal computer security commented that computer security training in the Federal Government is either inadequate or non-ex- istent and that such training is necessary. William Franklin, Asso- ciate Director, Information Management and Technology Division, GAO, stated on October 30: There can be little question that extensive and continu- ing security research and training are essential if we are to gain reasonable assurance that our computerized infor- mation is properly safeguarded in storage, processing and transmission. However, there was concern that the creation of a new structure within the Federal Government might add unnecessarily to its overall cost and bureaucracy. Several witnesses stated that existing Federal computer training fa-ilities, such as those at NSA, should be used to train Federal employees. Robert Brotzman, Assistant Di- rector for Computer Security at the National Computer Security Center at NSA, described the security program at the Computer Security Center. This program assists civilian and military agen- cies, as well as outside contractors with sensitive data, to develop secure information and communication systems. As Mr. Brotzman stated: The knowledge base that we have now will support an effective training program, and it will support the substan- tial improvement in the security of computer systems op- erated by and for the United States Government. Mr. Brotzman also stated that, as introduced, H.R. 2889 might cause duplication and overlapping of effort within Federal agencies and interfere with programs already supported by NTISSC under NSDD-145. H.Rept. 99-753 --- 2 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 James Burrows, Director, Institute for Computer Sciences and Technology (ICST), of the NBS, spoke on the computer training and security programs at the ICST. As part of its mandate to develop computer security standards and guidelines, the ICST assists Feder- al agencies in developing computer security programs. This in- cludes both software and hardware development, system interfaces, personal identification and authentication of users. The Depart- ment of Commerce opposed the structure of H.R. 2889 because of its interpretation that the Brooks Act and other legislation makes a Federal computer training and awareness mandate for NBS un- necessary. However, Mr. Burrows did state that NSDD-145 could be "slightly confusing in who has control" of overall Federal securi- ty management among the agencies. Mr. Burrows also stated that, to date, NSDD-145 has had little adverse effect on NBS' activities in computer security and training. Terry Culler, Associate Director, Office of Personnel Manage- ment (OPM), also spoke on H.R. 2889, stating that OPM already has the legislative authority to provide other Federal agencies with guidance on information and communication systems security training. Mr. Culler did not feel the need for the additional regula- tory action, which H.R. 2889 would mandate by requiring that OPM coordinate Federal computer training. OPM currently con- tributes to Federal agency computer training, if the agency re- quests training for its employees. Several of the witnesses did speak in favor of Federal computer training legislation, although they also suggested changes in the language and intent of H.R. 2889. Donn Parker, a computer crime and security expert at SRI International, also spoke on October 30 on computer security in general, while testifying on H.R. 2889. Mr. Parker made several observations: that it is the information, not the technology, which needs security; that information must be considered secure before it goes into the computer; that technology controls to date are adequate-it is the management of "human controls" which need improvement; that most information systems employees consider security a detriment to productivity; therefore, that measures must be taken to incorporate computer security into personnel performance evaluations; that each individual must be held accountable for taking security precautions, to ensure that these measures are taken; that advisory and counseling provisions within an organization can short-circuit the stresses and problems which may drive someone to commit a computer crime; that all in- formation systems workers, not just computer programmers, should be trained in securing systems; and that training should be broad- ened to include a wider range of potential vulnerabilities, including the full civil, military, and private sector prospectives of computer training and awareness. William Franklin of GAO also addressed H.R. 2889: We endorse the bill's purpose in requiring the National Bureau of Standards to establish and conduct a computer security research program in the Federal Government and the requirement that each Federal agency provide manda- tory periodic training in computer security. Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 GAO testimony also raised the basic question of the appropriate- ness of a Department of Defense agency taking the lead in training civilian employees and classifying non-military, non-national secu- rity computer data. GAO supported H.R. 2889 because of the eval- uation by GAO staff that H.R. 2889 clarifies the authority of NBS and its relationship to other agencies in setting training standards and computer security awareness. GAO staff expressed the opinion that such a clarification might encourage greater cooperation be- tween NBS and NSA. III. NEED FOR LEGISLATION There are several key principles the Committee seeks to empha- size by this legislation: 1. Computer crime in the Federal Government appears to be much more pervasive and serious an issue than previously as- sumed. Descriptions of computer criminals as "insiders" by ABA, GAO, the Inspector General of HHS, and others may imply that many Federal computer users represent potential risks of fraud and abuse. 2. Security measures in a number of agencies are very vulnerable to abuse and fraud. Only five of 25 Federal computer systems sur- veyed by GAO contained minimum safeguards, and only two of 25 systems offered formal training sessions for computer users. 3. There is a need for coordinated guidance for security of sensi- tive information in computers. NSDD-145 further complicates a sit- uation which already is unclear. NSDD-145 may create confusion among many Federal agencies which currently follow existing laws and regulations, such as the Brooks Act, the Paperwork Reduction Act, and the OMB circular, to set guidelines and standards for com- puter security. 4. NSDD-145 can be interpreted to give the national security community too great a role in setting computer security standards for civil agencies. A civilian authority is needed to develop stand- ards relating to sensitive, but unclassified data. 5. Training of Federal personnel in ADP security is a critical issue to ensure security in Federal agencies. Yet many Federal agencies do not take advantage of available training to remedy this problem. A stronger, more active computer training and awareness program is needed to address this issue in the civil agencies of the Federal Government. 6. Greater emphasis should be given to cooperation between the military and civil agencies as well as the private sector in setting computer security and training goals. This can be accomplished by fostering greater communication and cooperation between the NBS and NSA in setting overall Federal computer policy. IV. EXPLANATION OF THE BILL PURPOSE The purpose of H.R. 2889, the Computer Security Act of 1986, as amended, is to improve the security and privacy of sensitive infor- mation in federal computer systems. It achieves this purpose through improved training, aimed at raising the awareness of fed- Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 eral workers about computer system security, by establishing a focal point within the government for developing computer system security standards and guidelines to protect sensitive information, and by requiring agencies to establish computer system security plans. To explain what these mean, it is first necessary to examine sev- eral underlying concepts that define and scope the boundaries of the bill's coverage. First, the primary objective of the bill is control- ling unauthorized use of the information in federal computer sys- tems, rather than merely protecting the computer systems them- selves. Although computer hardware and software have real value and certainly must be safeguarded, it is the data stored, manipulat- ed, displayed and transmitted by computer systems that represent the greatest vulnerability. Nevertheless, computer systems are the instrumentality through which security measures are usually ap- plied. Therefore, the bill makes distinctions both about which com- puter systems are included as well as about what kinds of informa- tion are subject to the bill's provisions. Second, the term "computer system," as used throughout the bill, is defined broadly to include traditional computer hardware and software, and related services and other resources used in the automatic acquisition, storage, manipulation or display of informa- tion. It also includes any of the above items used in the associated electromagnetic transmission and reception of information. The word "procedures" as used in the definition is intended to include procedures for humans using the computer system. The term "fed- eral computer system" is used to delineate the reach of the bill to include federal agencies, contractors of federal agencies and other organizations that process information using a computer system on behalf of the Federal Government to accomplish a Federal Govern- ment function. The term "operator of a federal computer system" denotes an agency or institution that owns or otherwise possesses a federal computer system, rather than an individual who physically operates the machine. Included in this definition, for example, would be state agencies that disburse federal funds or act in some other way as an extension of the federal government. The term "sensitive information" is used to limit the kinds of information which are covered by the bill. Sensitive information is defined as unclassified information which, if lost, misused, accessed or modi- fied in an unauthorized way, could adversely affect the national in- terest, the conduct of federal programs or the privacy of individ- uals. Examples include information which if modified, destroyed or disclosed in an unauthorized manner could cause: Loss of life; Loss of property or funds by unlawful means; Violation of personal privacy or civil rights; Gaining of an unfair commercial advantage; Loss of advanced technology, useful to a competitor; or Disclosure of proprietary information entrusted to the gov- ernment. The definition of sensitive information allows the possibility that some unclassified information may not be sensitive. Each operator of a federal computer system must make a determination (as de- scribed later) as to which unclassified information in its possession Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 is sensitive. Sensitive information does not include nor does the bill apply to classified information for which extensive standards-set- ting authority already exists. These mechanisms are unaffected by H.R. 2889. ADDITIONS TO NBS ORGANIC ACT H.R. 2889 amends the Act of March 3, 1901, creating the Nation- al Bureau of Standards, to add the study of computers to the list of authorized activities of the agency. The reason for this language is to provide specific authorization for activities that are widely ac- knowledged as necessary in the eomputer age, but which are con- ducted currently under general authorities contained in the Act. It is intended to authorize NBS to study the means of automatic com- putation (computer science) independent of the technology in- volved. The new language is occasioned by an opportunity for legis- lative update, rather than being related directly to the primary purpose of the bill-computer security. The bill also adds three new sections. Section 18 provides a hier- archical enumeration of NBS' responsibilities. At the top of the hi- erarchy is the mission of developing standards, and associated methods and techniques for computer systems generally. An exam- ple would be the "Open Systems Interconnection" (OSI) standards for computer networking, which the Bureau develops technically (with extensive private sector input) and presents to the American National Standards Institute, and through it to the International Standards Organization, for adoption. This statement of responsi- bility is intended to conform Section 18 with the above addition to the list of authorized activities. At the next hierarchical level, NBS is responsible for developing uniform standards and guidelines, in all areas other than security, for federal computer systems. As before, this delineation of respon- sibility is intended to conform Section 18 and to provide specific au- thority for activities that are currently carried out under general provisions of the Organic Act. The product of this effort is the Fed- eral Information Processing Standards (FIPS) which are used gov- ernment-wide. In current practice, some computer standards developed by NBS become compulsory under authority of OMB pursuant to the Brooks Act and the Paperwork Reduction Act. The process outlined in H.R. 2889-which includes standards development by NBS and subsequent promulgation by the Secretary of Commerce under re- drafted authority in the Brooks Act (to be described later)-is es- sentially the same as current practice, but is spelled out more ex- plicitly. Systems involving intelligence activities, cryptologic activities re- lated to national security, direct command and control of military forces, equipment that is integral to a weapons system or direct ful- fillment of military or intelligence missions (except routine admin- istrative and business functions) are exempted from this provision. Such systems are highly specialized in their functions and have been traditionally exempted from government-wide standards and regulations applying to general purpose computer systems. There- fore, the boundary of NBS' responsibility for non-security stand- Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 18 ards is drawn so as to exclude such defense-related, special-purpose systems. The third hierarchial level spells out explicitly, and thereby gives special emphasis to, responsibility for standards and guide- lines in the computer security arena. It assigns to NBS responsibil- ity within the federal government for developing technical, man- agement, physical and administrative standards and guidelines de- signed to achieve, in a cost-effective way, the security and privacy of sensitive information in federal computer systems. The purpose of the standards and guidelines is to control loss and unauthorized modification or disclosure of sensitive information and to prevent computer-related fraud and abuse. Certain computer systems are exempted from this provision, re- gardless of the kind of information they contain. There are two cat- egories of such exempted systems. The first is the same list of de- fense and intelligence-related systems that were exempted in the previous subsection, dealing with non-security standards. The second category includes systems that are operated at all times under rules designed to protect classified information. The chief effect of this exemption is to exclude classified systems from cover- age by this subsection of the bill. Also exempted are mixed sys- tems-those systems containing classified information at certain times and unclassified information at other times-provided such systems are operated at all times under the rules for protecting classified information. The purpose of this exemption is to avoid imposition of a second, less stringent set of security standards-the NBS standards-for the unclassified operations of a mixed system. Further relief for mixed systems is provided in the amendment to the Brooks Act, allowing system operators to employ standards, other than the NBS standards, if such standards are more strin- gent. For example, an operator of a mixed system might use a subset of the classified rules for his unclassified operations, if the subset were more stringent than the NBS standards. The main reason for the assignment of responsibility to NBS for developing federal computer system security standards and guide- lines derives from the Committee's concern about the implementa- tion of National Security Decision Directive-145. As indicated pre- viously, this directive established an interagency committee-the National Telecommunications and Information Systems Security Committee (NTISSC). The function of the NTISSC is to devise oper- ating policies needed to assure the security of telecommunications and automated information systems that process and communicate lx th classified national security information and other sensitive government national security information. Policies developed by NTISSC would apply government-wide. While supporting the need for a focal point to deal with the gov- ernment computer security problem, the Committee is concerned about the composition of NTISSC, which favors military and intelli- gence agencies. It is also concerned about how broadly NTISSC might interpret its authority over "other sensitive national securi- ty information". For this reason, H.R. 2889 creates a civilian coun- terpart, within NBS, for setting policy with regard to unclassified information. In so doing, the bill has the additional effect of specifi- cally limiting the purview of the NTISSC to systems containing Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 classified information and cancelling the authority contained in NSDD-145 for systems containing unclassified information. NBS is required to work closely with other agencies and institutions, such as NTISSC, both to avoid duplication and to assure that its stand- ards and guidelines are consistent and compatible with standards and guidelines developed for classified systems; but the final au- thority for developing the standards and guidelines rests with NBS. Note that the previous subsection dealt with developing non-se- curity standards and guidelines, most of which affect hardware and software performance and interfaces. Accordingly, the bill's juris- diction in that area is defined by the universe of federal computer systems, as limited by certain exceptions. In this subsection, the bill deals with security standards and guidelines, which apply more properly to protecting information. Therefore, the bill addresses unclassified (but sensitive) information in federal computer sys- tems, but with certain systems exempted. The method for promulgating federal computer system security standards and guidelines is the same as for non-security standards and guidelines. NBS submits them to the Secretary of Commerce along with recommendations regarding the extent to which they should be made compulsory and binding. The Secretary of Com- merce, under redrafted authority in the Brooks Act (to be ex- plained later), then promulgates standards and guidelines, making those standards compulsory and binding that he determines are necessary to improve the efficiency of operation or security and pri- vacy of federal computer systems. An additional responsibility of NBS is to devise guidelines for use by operators of federal computer systems containing sensitive infor- mation for their use in training their employees in security aware- ness and good security practice. Periodic training of this kind is re- quired by Section 5 of H.R. 2889 to be conducted by all operators of federal computer systems that contain sensitive information. Also, as part of its responsibility for developing computer stand- ards and guidelines, NBS is required to devise validation proce- dures to evaluate the effectiveness of the standards and guidelines. This is not an enforcement or compliance determining function. Rather, it provides the ability for operators to determine if the standards and guidelines are achieving their desired purpose. NBS is to maintain liaison (as it now does) with users of the standards, to assure their workability. Finally, in fulfilling these responsibilities, NBS is authorized to give technical assistance to the General Services Administration, the Office of Personnel Management, operators of federal computer systems and the private sector in implementing the standards and guidelines promulgated pursuant to the bill. Also, NBS is author- ized to perform research and conduct studies to determine the nature and extent of the vulnerabilities of computer systems and to devise techniques to protect, in a cost effective way, the informa- tion contained in them, and to coordinate with other agencies (in- cluding NSA) which perform such research, to gain the benefits of their efforts. A new Section 19 of the NBS Organic Act establishes a twelve- member Computer System Security and Privacy Advisory Board within the Department of Commerce. The chief purpose of the Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 20 Board is to assure that NBS receives qualified input from those likely to be affected by its standards and guidelines, both in gov- ernment and the private sector. Specifically, the duties of the Board are to identify emerging managerial, technical, administra- tive and physical safeguard issues relative to computer systems se- curity and privacy and to advise the NBS and the Secretary of Commerce on security and privacy issues pertaining to federal com- puter systems. Members of the Board are to be appointed by the Secretary of Commerce and are to come from both inside and outside the feder- al government and have qualifications as specified in the bill. Members will not be paid for their services, other than for reim- bursement of travel expenses. The Board may use personnel from NBS or other agencies of the federal government for the purpose of staff support, with the consent of the respective agency head. The Board may conduct business with as few as seven members present. Findings must be reported to the Secretary of Commerce, the Director of the Office of Management and Budget, the Director of the National Security Agency, and the appropriate Committees of Congress. Section 21 is a housekeeping change. It adds a short title to the NBS Organic Act for ease of reference. AMENDMENT TO THE BROOKS ACT H.R. 2889 contains a redrafted version of section 111(f) of the Federal Property and Administrative Services Act of 1949. The chief purpose is to establish an orderly process for promulgating standards and guidelines pertaining to Federal computer systems. Specifically, the Secretary of Commerce is charged with issuing standards and guidelines based on the standards and guidelines de- veloped by NBS, pursuant to two subsections in the amendment to the NBS Act. As explained, those subsections formalize NBS' re- sponsibility for developing both non-security and security standards and guidelines. The Secretary is authorized to make certain stand- ards compulsory and binding as needed to improve the efficiency of operation or security and privacy of federal computer systems. As described earlier, the amendment contains relief from strict compliance with these standards, when agencies already employ standards that are more stringent. An example is the instance where the unclassified operations of a mixed system are conducted under a subset of the rules used during classified operations, pro- vided the subset is tougher than the standards mandated by the Secretary. Further relief is provided by language authorizing the Secretary of Commerce to waive the compulsory standards when compliance would adversely affect an operator's mission or cause major finan- cial impact on the operator that is not offset by government-wide savings. The Secretary may delegate this authority to agency heads when necessary and desirable to achieve timely and effective im- plementation of measures to improve federal computer system se- curity and privacy. Agency heads may redelegate this authority only to certain high-level officials, designated pursuant to the Pa- Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 perwork Reduction Act for the purpose of carrying out the agen- cies' information management activities under that Act. The need for delegation authority arises from Committee con- cerns about the administrative burden on NBS. Under normal pro- cedures, the Secretary can be expected to rely on NBS for technical evaluation of any requests for waiver. The Committee expects NBS to devote the bulk of its energy to producing computer systems standards, rather than to such compliance determinations. Accord- ingly, the amendment to the Brooks Act allows the Secretary flexi- bility to delegate the waiver authority. The amendment ties the process for developing and promulgat- ing computer system standards to the requirement for an integrat- ed information resources management system, as set forth in the Paperwork Reduction Act. To achieve this, the Administrator of General Services is charged with developing and implementing policies on federal computer systems and revising the federal infor- mation resources management regulations to reflect the standards and guidelines emanating from the Secretary of Commerce. Finally, the amendment conforms those sections of the Brooks Act not changed by this bill by substituting the term "computer system", as defined in this bill for the terms "automatic data proc- essing equipment" and "automatic data processing systems" wher- ever they appear. One of the fundamental purposes of H.R. 2889 is improved com- puter security awareness and use of accepted computer security practice by all persons involved in management, use, or operation of federal computer systems that contain sensitive information. As indicated, the Committee found in its hearings that training in these areas is a particular weakness at most agencies. A GAO study revealed, for example, that only two of twenty-five major fed- eral computer systems surveyed had adequate training programs. For this reason, the bill contains a requirement that each operator of a Fedeal computer system that contains sensitive information provide periodic training for its employees. The objectives of the training are to enhance employees' awareness of the threats and vulnerabilities of computer systems and to encourage the use of im- proved security practices. The process envisioned in the bill starts with NBS, which is rsponsible for developing training guidelines based on its research and study of vulnerabilities and countermeasures. Within six months of enactment and using these guidelines, the Office of Per- sonnel Management must issue regulations coverins such areas as training objectives for various categories of employee general guid- ance concerning course content and frequency of training. Within sixty days after OPM issues regulations, each operator must begin training of its employees, tailored to emphasize its particular oper- ating conditions and needs. Training can be accomplished in sever- al ways, by using the services of providers such as OPM or private companies, or by using the agencies' internal training capabilities. Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 I....l l _ Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 SECURITY PLANS A key determination upon which many provisions of the bill depend is the identification of which Federal computer systems contain sensitive information. By definition, the search for such systems is restricted to systems containing unclassified informa- tion. Some, but possibly not all, of these systems will be determined to contain unclassified-sensitive information. The philosophy re- flected in the bill is that each Federal agency is best equipped to make that determination relative to its own mission and circum- stances. Therefore, the bill calls on each agency to make a determi- nation for each computer system under its control, within six months of enactment. The determination should be based on the definition of "sensitive" contained in the bill and use the additional guidance in the section on purpose in this report. In the case of fed- eral contractors and other organizations, determinations are to be reviewed and approved by their supervising federal agency. Within one year of enactment, each operator must also establish a plan for the security and privacy of each computer system so identified by the operator. Plans are to be based on the standards and guidelines issued by the Secretary of Commerce pursuant to the Brooks Act, or any waivers received. This requirement applies only to those computer systems subiect o pro ons o at Act e p ans must be submitted to the atlona ureau oTS andards and the National Security Agency for advice and com- ment and to the Office of Management and Budget, which has the authority to disapprove the plan. In the case of plans established by federal contractors and other organizations, the plans are to be submitted through the supervising federal agency. Implicit in the authority to disapprove security plans is responsi- bility for oversight of the identification process and compliance with the security plans as approved. Thus, OMB is the watchdog over the key implementation step in the bill. AUTHORIZATION OF APPROPRIATIONS The bill contains a "such sums as may be necessary" authoriza- tion for fiscal years 1987, 1988 and 1989 for each federal agency to carry out the training and planning requirements of the bill. Reau- thorization will be required for subsequent years. Authorizations of appropriations needed to carry out the other provisions of the bill are implicit in the language establishing those provisions. The Con- gressional Budget Office has estimated this to be in the neighbor- hood of $20 million per year for the entire Federal government. In the case of NBS' responsibilities, explicit authorization was includ- ed in the Fiscal Year 1987 Authorization bill and must be reauthor- iN,ed in future years. The CBO estimate is that $4-5 million may be required for NBS. The computer security program will, therefore, be extremely cost-effective, since testimony has indicated that losses to fraud and abuse are in excess of a billion dollars yearly. V. SECTIONAL ANALYSIS-H.R. 2889 Section 1. Short Title. Section 2. Purpose: Sets forth the Congressional declaration that Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 improving the security and privacy of federal computer systems is in the public interest and states Congressional intent to institute a means for establishing minimum acceptable security practices for such systems, without limiting the scope of security measures al- ready planned or in use. The specific purposes of the Act are to assign the National Bureau of Standards responsibility for developing standards and guidelines for Federal computer systems, including standards and guidelines for the cost-effective security and privacy of sensitive in- formation in Federal computer systems; to provide for promulgat- ing such standards and guidelines through the Federal Property and Administrative Services Act of 1949; to require all operators of Federal computer systems that contain sensitive information to es- tablish security plans; and to require mandatory periodic training for all persons involved in management, use or operation of Feder- al computer systems that contain sensitive information. Section 3. Establishment of Computer Standards Program. Amends the Act of March 3, 1901 to add to the mission of the Na- tional Bureau of Standards the study of equipment, procedures and systems for automatic acquisition, storage, manipulation, display, and transmission of information, and its use to control machinery and processes. Inserts a new Section 18(a) stating the National Bureau of Stand- ards shall: (1) have the mission of developing standards, guidelines, and associated methods and techniques for computer systems; (2) develop uniform standards and guidelines for Federal computer systems, except those systems excluded by section 2315 of title 10, United States Code, or section 3502(2) of title 44, United States Code; (3) have responsibility within the Federal Government for developing technical, management, physical and administra- tive standards and guidelines for the cost-effective security and privacy- of sensitive information in Federal computer systems except- (A) those systems excluded by section 2315 of title 10, United States Code, or section 3502(2) of title 44, United States Code; and (B) those systems which are protected at all times by procedures established for information which has been spe- cifically authorized under criteria established by an Execu- tive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy; (4) submit standards and guidelines developed pursuant to paragraphs (2) and (3) above, along with recommendations as to the extent to which these should be made compulsory and binding, to the Secretary of Commerce, for promulgation under section 111 of the Federal Property and Administrative Serv- ices Act of 1949; (5) develop guidelines for use by operators of Federal comput- er systems that contain sensitive information in training their employees in security awareness and accepted security prac- Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 tice, as required by section 5 of the Computer Security Act of 1986; and (6) develop validation procedures for, and evaluate the effec- tiveness of, standards and guidelines developed pursuant to paragraphs (1), (2), and (3) above through research and liaison with other government and private agencies. Inserts a new Section 18(b) authorizing the National Bureau of Standards to: (1) assist the private sector in using and applying the results of the programs and activities under this section; (2) make recommendations to, assist and coordinate with other Federal agencies, as appropriate, in carrying out this Act; (3) provide, as requested, technical assistance to operators of Federal computer systems in implementing the standards and guidelines promulgated pursuant to this Act; and (4) perform research and to conduct studies, as needed, to de- termine the nature and extent of the vulnerabilities of, and to devise techniques for the cost effective security and privacy of sensitive information in Federal computer systems. Inserts a new Section 19(a) establishing a Computer System Secu- rity and Privacy Advisory Board, with a chairman to be appointed by the Secretary of Commerce and twelve members as follows: (1) four members from outside the Federal Government who are eminent in the computer or telecommunications industry, at least one of whom is representative of small or medium sized companies in such industry; (2) four members from outside the Federal Government who are eminent in the fields of computer or telecommunications technology, or related disciplines, but who are not employed by or representative of a producer of computer or telecommunica- tions equipment; and (3) four members from the Federal Government who have computer systems management experience, including experi- ence in computer systems security and privacy, at least one of whom shall be from the National Security Agency. Inserts a new Section 19(b) stating that the duties of the Board shall be: (1) to identify emerging managerial, technical, administra- tive, and physical safeguard issues relative to computer sys- tems security and privacy; (2) to advise the Bureau of Standards and the Secretary of Commerce on security and privacy issues pertaining to Federal computer systems; and (3) to report its findings to the Secretary of Commerce, the Director of the Office of Management and Budget, the Director of the National Security Agency, and the appropriate Commit- tees of the Congress. Inserts a new Section 19(c) stating that the term of office of each member of the Board shall be four years, except that- (1) of the initial members, three shall be appointed for terms of one year, three shall be appointed for terms of two years, three shall be appointed for terms of three years, and three shall be appointed for terms of four years; and Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 (2) any member appointed to fill a vacancy in the Board shall serve for the remainder of the term for which his prede- cessor was appointed. Inserts a new Section 19(d) prohibiting the Board from acting in the absence of a quorum, which shall consist of seven members. Inserts a new Section 19(e) stating that Members of the Board, other than full-time employees of the Federal Government, while attending meetings of such committees or while otherwise perform- ing duties at the request of the Board Chairman while away from their homes or a regular place of business, may be allowed travel expenses in accordance with subchapter I of chapter 57 of title 5, United States Code. Inserts a new Section 19(f) that authorizes the Board in carrying out its functions, to use staff personnel from the National Bureau of Standards or any other agency of the Federal Government with the consent of the head of the agency. Adds a new Section 20 which establishes a short title for the Act of March 3, 1901, henceforth to be known as the "National Bureau of Standards Act". Section 4. Amendment to the Brooks Act. Replaces Section 111(f) of the Federal Property and Administrative Services Act of 1949 with new language that: (1) empowers the Secretary of Commerce, on the basis of standards and guidelines developed by the National Bureau of Standards pursuant to section 18(a) (2) and (3) of the National Bureau of Standards Act, to promulgate standards and guide- lines pertaining to Federal computer systems, making such standards compulsory and binding to the extent to which the Secretary determines necessary to improve the efficiency of op- eration or security and privacy of Federal computer systems. (2) authorizes the head of a Federal agency to employ stand- ards for the cost effective security and privacy of sensitive in- formation in a Federal computer system within or under the supervision of that agency that are more stringent than the standards promulgated by the Secretary of Commerce, if such standards contain, at a minimum, the provisions of those appli- cable standards made compulsory and binding by the Secretary of Commerce; (3) provides that the standards determined to be compulsory and binding may be waived by the Secretary of Commerce in writing upon a determination that compliance would adversely affect the accomplishment of the mission of an operator of a Federal computer system, or cause a major adverse financial impact on the operator which is not offset by government-wide savings. The Secretary may delegate to the head of one or more Federal agencies authority to waive such standards to the extent to which the Secretary determines such action to be necessary and desirable to allow for timely and effective imple- mentation of Federal computer systems standards. The head of such agency may redelegate such authority only to a senior of- ficial designated pursuant to section 3506(b) of title 44, United States Code. Notice of each such waiver and delegation shall be promptly transmitted to the Committee on Government Oper- Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 ations of the House of Representatives and the Committee on Governmental Affairs of the Senate; and (4) directs the Administrator of the General Services Admin- istration to ensure that such standards and guidelines are im- plemented within an integrated information resources manage- ment system (as required by chapter 35 of title 44, United States Code) by- (A) developng and implementing policies on Federal computer systems; and (B) revising the Federal information resources manage- ment regulations (41 CFR ch. 201) to implement such standards, guidelines, and policies. Adds language that conforms section 111 by substituting the term "computer system" for the terms "automatic data processing equipment" and "automatic data processing systems" whenever they appear. Section 5. Training by Operators of Federal Computer Systems. Provides that each operator of a Federal computer system that con- tains sensitive information shall provide mandatory periodic train- ing in computer security awareness and accepted computer securi- ty practice. Such training shall be provided under the guidelines developed pursuant to this Act. Training under this section shall be started within 60 days after the issuance of the regulations. Such training shall be designed- (1) to enhance employees' awareness of the threats to and vulnerability of computer systems; and (2) to encourage the use of improved security practices. Directs that within six months after the date of the enactment of this Act, the Director of the Office of Personnel Management shall issue regulations prescribing the procedures and scope of the train- ing to be provided and the manner in which such training is to be carried out. Section 6. Additional Responsibilities for Operators of Federal Computer Systems for Computer System Security and Privacy. Di- rects that within 6 months after the date of enactment of this Act, each operator of a Federal computer system shall identify each computer system, and system under development, of that operator which contains sensitive information. In the case of a Federal con- tractor or other organization, such identification shall be reviewed and approved by its supervising Federal agency. Provides that within one year after the date of enactment of this Act, each such operator shall, consistent with the standards, guide- lines, policies, and regulations prescribed pursuant to this Act, es- tablish a plan for the security and privacy of the identified comput- er systems. Copies of such plan shall be transmitted to the Nation- al Bureau of Standards and the National Security Agency for advice and comment. In the case of a Federal contractor or other organization, such plan shall be transmitted through its supervis- ing Federal agency. Such plan shall be subject to disapproval by the Director of the Office of Management and Budget. Section 7. Definitions. Defines- (1) the term "computer system" as any equipment or inter- connected collection of equipment, including (A) ancillary equipment, (B) software and other procedures, (C) services, and Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 (D) other resources that are used in the automatic acquisition, storage, manipulation, or display, or in any associated electro- magnetic transmission and reception of information; (2) the term "Federal computer system" as a computer system operated by a Federal agency (as that term is defined in section 3(b) of the Federal Property and Administrative Services Act of 1949) or by a contractor of a Federal agency or other organization that processes information using a comput- er system on behalf of the Federal Government to accomplish a Federal Government function; (3) the term "operator of a Federal computer system" as a Federal agency (as that term is defined in section 3(b) of the Federal Property and Administrative Services Act of 1949), contractor of a Federal agency, or other ogranization that proc- esses information using a computer system on behalf of the Federal Government to accomplish a Federal Government function; and (4) the term "sensitive information" as any information, the loss, misuse, or unauthorized access or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are enti- tled under section 552 of title 5, United States Code (the Priva- cy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Con- gress to be kept secret in the interest of national defense or foreign policy. Section 8. Authorization of Appropriations. Authorizes to be ap- propriated to each Federal agency such sums as may be necessary for fiscal years 1987, 1988, and 1989 to carry out the computer sys- tems security training program established by section 5 of this Act and the indentification and planning requirements of section 6. VI. EFFECT OF LEGISLATION ON INFLATION In accordance with Rule XI, Clause 2(l)(4), of the Rules of the House of Representatives, this legislation is assessed to have no ad- verse inflationary effect on prices and costs in the operation of the national economy. VII. COMMITTEE OVERSIGHT FINDINGS AND RECOMMENDATIONS Pursuant to Rule XI, Clause 2(l)(3)(A), and under the authority of Rule X, Clause 2(b)(1) and Clause 3(f), of the Rules of the House of Representatives, the following statement on oversight activities is made: The Committee's oversight findings are incorporated in the rec- ommendations contained in the present bill and report. VIII. OVERSIGHT FINDINGS AND RECOMMENDATIONS BY THE COMMITTEE ON GOVERNMENT OPERATIONS Pursuant to Rule XI, Clause 2(l)(3)(D), and under the authority of Rule X, Clause 2(c)(2), of the Rules of the House of Representatives, the following statement on oversight activities by the Committee on Government Operations is made: Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 The Committee's oversight findings are reflected in the recom- mendations contained in the bill as reported by that Committee and the accompanying report. IX. BUDGET ANALYSIS AND PROJECTION The bill provides for new authorization rather than new budget authority and consequently the provisions of Section 308(a) of the Congressional Budget Act are not applicable. X. CONGRESSIONAL BUDGET OFFICE COST ESTIMATE U.S. CONGRESS, CONGRESSIONAL BUDGET OFFICE, Washington, DC, June 23, 1986. Hon. DON FUQUA, Chairman, Committee on Science and Technology, U.S. House of Representatives, Rayburn House Office Building, Washington, Be. DEAR MR. CHAIRMAN: The Congressional Budget Office has pre- pared the attached cost estimate for H.R. 2889, the Computer Secu- rity Act of 1986. If you wish further details on this estimate, we will be pleased to provide them. With best wishes, Sincerely, RUDOLPH G. PENNER, Director. CONGRESSIONAL BUDGET OFFICE COST ESTIMATE 1. Bill number: H.R. 2889. 2. Bill title: Computer Security Act of 1986. 3. Bill status: As ordered reported by the House Committee on Science and Technology, June 4, 1986. 4. Bill purpose: H.R. 2889 would make a number of changes af- fecting the security of federal computer systems. It would authorize the appropriation of such sums as may be necessary for fiscal years 1987, 1988, and 1989 to carry out the planning and training pro- grams required by the bill. H.R. 2889 would direct the National Bureau of Standards (NBS) to establish a computer security standards program for those com- puter systems subject to the Brooks Act. NBS would be required to develop government-wide standards and guidelines; to conduct re- search; to provide technical assistance; to develop and coordinate training programs; and to develop validation standards to evaluate the effectiveness of computer security standards through research and liaison with government and private agencies. The bill would also establish a 13-member Computer System Security and Privacy Advisory Board composed of representatives of other federal agen- cies and the private sector. Within six months after the date of enactment, H.R. 2889 would require all federal agencies to identify each computer that contains sensitive data. Within a year after the date of enactment, each agency would be required to establish a plan for the security for each computer and related system previously identified. The bill Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 would also require mandatory periodic training in computer securi- ty for all federal agency employees who manage, use or operate computer or other automated information systems. Similar train- ing and security plans would also be required for certain employees of private contractors, and state or local governments. 5. Estimated cost to the Federal Government: CBO estimates that enactment of this bill would cost NBS about $4 million to $5 million annually beginning in 1987. Additional costs for planning and training in computer security by all agencies throughout the federal government would probably cost $20 million to $25 million in 1987 and $15 million to $20 million in each fiscal year thereaf- ter. To the extent that this legislation would reduce fraud or other financial losses, some savings could also result from enactment of H.R. 2889. It is not possible to quantify these potential savings at this time. Basis of estimate: Under the National Security Decision Direc- tive (NSDD) 145, which became effective in September 1984, the President gave the National Security Agency (NSA) responsibility for ensuring the security of all classified and certain other sensi- tive information transmitted by federal computers or telecommuni- cations systems. If enacted, H.R. 2889 would assign some of this au- thority to NBS, mainly in the area of unclassified data. Although under current guidelines it is expected that most federal agencies, with assistance from NSA, would have strengthened security ef- forts consistent with the directive, this bill would enhance the role of NBS and would also impose new requirements upon federal agencies and their contractors in the area of computer security. National Bureau of Standards: Assuming enactment of H.R. 2889 by October 1, 1987, the expanded role of NBS in computer security management and training is estimated to cost about $2 million an- nually beginning in 1987. Based on information from NBS, an esti- mated $2 million to $3 million annually mayalso be needed for re- search, beginning in 1987. This assumes that NBS would expand its management and oversight role, but would also receive assistance and information from the National Computer Security Center (NCSC) within the Department of Defense (DoD). Government-wide computer security plans: The level of computer security varies greatly among the approximately 80 federal enti- ties, including about 1,300 different organizations that would be af- fected by this legislation. The cost of identifying all sensitive com- puter systems and developing an appropriate plan for facility, ap- plication and personnel security would thus vary greatly from agency to agency, depending upon the agency's current level of se- curity, the size and number of sites, and the resources and exper- tise available to implement this provision. CBO has not been able to contact each major federal entity to determine the cost of identifying and developing these plans for computer security. Based on the information available, it is expect- ed that most agencies would probably assign existing personnel and resources to this task in order to meet the one-year deadline im- posed by H.R. 2889. If approximately 10,000 plans were developed, each requiring about 1-2 work weeks of effort by agency personnel, and two and one-half work days of review by NBS, NSA, and the Office of Management and Budget (OMB), the cost spread among Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 the various federal agencies would be $10 million to $20 million over the fiscal years 1987 and 1988. Government-wide training: Currently, training resources in the area of computer security are scattered throughout the federal gov- ernment. A few civilian agencies, such as the Department of Energy, have developed their own computer security training for both classified and unclassified systems. Most agencies, however, send employees to commercial courses or those offered by other federal agencies, such as the General Services Administration (GSA), the Office of Personnel Management (OPM), the Depart- ment of Agriculture Graduate School, or NSA. H.R. 2889 would require mandatory training for all federal and contractor personnel who manage, use of operate computer sys- tems. The cost of such training depends on the number of people involved and the kind of training provided. Based on information from a number of agencies, it expected that roughly half of all gov- ernment and contractor employees would initially receive some type of training as a result of the bill, or about 3 million employ- ees. Subsequently, training would be provided to most new employ- ees, and retraining would be required only periodically. It is expected that most training in the area of computer security would become decentralized, with each agency responsible for de- veloping its own programs, although some centralized training for smaller agencies and in specialized program areas would remain. The NCSC is developing a data base of educational opportunities offered by government, universities and private sources, and plans to make this available to agencies. Training courses are relatively expensive, however. They currently cost about $50 to $200 per day per person (not including development costs) and typically are of- fered to technical personnel who attend a three-to-five day session. In an effort to reduce training costs, NCSC is developing training packages that will be available on tape or film, sharply reducing the training cost per person. Based on information from NCSC, GSA, OPM, and OMB, CBO made a number of assumptions about the numbers and types of training that would be required as a result of enactment of H.R. 2889. The resulting estimates provide a rough estimate of the possi- ble additional cost of training, but should not be considered precise. Within three years after the date of enactment, it is assumed that about 90 percent of the estimated 3 million employees affected by the bill would receive some type of computer security awareness training. Assuming the availability of training modules and other low-cost products, it is expected that the cost for this type of train- ing would have no significant budget impact over and above the cost of maintaining good information systems, which is now the re- sponsibility of each agency. It is estimated that about 10 percent of the 3 million employees, or 300,000, would require more formalized training. Assuming that about three-quarters of these individuals (about one-half from DoD) would have received training under cur- rent law, then about 75,000 employees would likely require train- ing as a result of this bill. Three days of specialized training, at an average cost of $100 per day, for 75,000 persons would cost $20 mil- lion to $25 million over several years. After the initial training, Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 costs for retraining and training of new personnel are expected to cost about $5 million annually. Finally, it is assumed that about 250 civilian employees would gradually be recruited and/or trained to evaluate the technical pro- tection capabilities of industry and government-developed systems, and to train other agency personnel. This type of training, accord- ing to NCSC, takes two to three years. At an average cost of $60,000 per year, including overhead, it is estimated that this type of support staff would cost the federal government about $15 mil- lion annually, once fully implemented. 6. Estimated cost to State and local governments: H.R. 2889 would require nonfederal entities that process federal data to iden- tify and develop security plans for each applicable computer system, and to provide security training. Based on information from Committee staff, this requirement would also apply to nonfed- eral entities that maintain data for ultimate federal use, or that are involved in disbursing federal funds. No complete inventory=of the relevant systems currently exists, and it is not possible at this time to estimate with precision the costs to state and local govern- ments. Based on the limited information available, we expect that total costs incurred by state and local governments are likely to be less than $25 million annually. 7. Estimate comparison: None. 8. Previous CBO estimate: On November 14, 1985, CBO prepared a cost estimate for H.R. 2889, as ordered reported by the House Committee on Government Operations. The estimated costs of this version of H.R. 2889 reflect a later assumed date of enactment. 9. Estimate prepared by: Mary Maginniss. 10. Estimate approved by: C.G. Nuckols (for James L. Blum, As- sistant Director for Budget Analysis). XI. CHANGES IN EXISTING LAW MADE BY THE BILL, As REPORTED In compliance with clause 3 of rule XIII of the Rules of the House of Representatives, changes in existing law made by the bill, as reported, are shown as follows (existing law proposed to be omit- ted is enclosed in black brackets, new matter is printed in italic, existing law in which no change is proposed is shown in roman): ACT OF MARCH 3, 1901 AN ACT To establish the National Bureau of Standards ? s s s s s s SEC. 2. The Secretary of Commerce (hereinafter referred to as the "Secretary") is authorized to undertake the following functions: (a) 3 (f) Invention and development of devices to serve special needs of the Government. In carrying out the functions enumerated in this section, the Sec- retary is authorized to undertake the following activities and simi- lar ones for which need may arise in the operations of Government agencies, scientific institutions, and industrial enterprises: Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 (18) the prosecution of such research in engineering, mathe- matics, and the physical sciences as may be necessary to obtain basic data pertinent to the functions specified herein; [and] (19) the compilation and publication of general scienctific and technical data resulting from the performance of the func- tions specified herein or from other sources when such data are of importance to scientific or manufacturing interests or to the general public, and are not available elsewhere, including demonstration of the results of the Bureau's work by exhibits or otherwise as may be deemed most effective, and including the use of National Bureau of Standards scientific or technical personnel for part-time or intermittent teaching and training activities at educational institutions of higher learning as part of and incidental to their official duties and without additional compensation other than that provided by law[.]; (20) the study of equipment, procedures, and systems for auto- matic acquisition, storage, manipulation, display, and transmis- sion of information, and its use to control machinery and proc- esses. SEC. 18. (a) The National Bureau of Standards shall- (1) have the mission of developing standards, guidelines, and associated methods and techniques for computer systems; (2) except as described in paragraph (3) of this subsection (re- lating to security standards), develop uniform standards and guidelines for Federal computer systems, except those systems excluded by section 2315 of title 10, United States Code, or sec- tion 3502(2) of title 44, United States Code; (3) have responsibility within the Federal Government for de- veloping technical, management, physical, and administrative standards and guidelines for the cost-effective security and pri- vacy of sensitive information in Federal computer systems except- (A) those systems excluded by section 2315 of title 10, United States Code, or section 3502(2) of title 44, United States Code; and (B) those systems which are protected at all times by pro- cedures established for information which has been specifi- cally authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy, the primary purpose of which standards and guidelines shall be to control loss and unauthorized modification or disclosure of sensitive information in such systems and to prevent computer- related fraud and misuse; (4) Submit standards and guidelines developed pursuant to paragraphs (2) and (3) of this subsection, along with recommen- dations as to the extent to which these should be made compul- sory and binding, to the Secretary of Commerce, for promulga- Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 tion under section 111 of the Federal Property and Administra- tive Services Act of 1949; (5) develop guidelines for use by operators of Federal comput- er systems that contain sensitive information in training their employees in security awareness and accepted security practice, as required by section 5 of the Computer Security Act of 1986; and (6) develop validation procedures for, and evaluate the effec- tiveness of standards and guidelines developed pursuant to paragraphs (1), (2), and (3) of this subsection through research and liaison with other government and private agencies. (b) In fulfilling subsection (a) of this section, the National Bureau of Standards is authorized- (1) to assist the private sector in using and applying the re- sults of the programs and activities under this section; (2) to make recommendations, as appropriate, to the Adminis- trator of General Services on policies and regulations proposed pursuant to section 111(f) of the Federal Property and Adminis- trative Services Act of 1949; (3) as required, to provide to operators of Federal computer systems technical assistance in implementing the standards and guidelines promulgated pursuant to section 111(f) of the Federal Property and Administrative Services Act of 1949; (4) to assist, as appropriate, the Office of Personnel Manage- ment in developing regulations pertaining to training, as re- quired by section 5 of the Computer Security Act of 1986; (5) to perform research and to conduct studies, as needed, to determine the nature and extent of the vulnerabilities of and to devise techniques for the cost effective security and privacy of sensitive information in Federal computer systems; and (6) to coordinate closely with other agencies and offices (in- cluding, but not limited to, the Departments of Defense and Energy, the National Security Agency, the General Accounting Office, the Office of Technology Assessment, and the Office of Management and Budget)- (A) to assure maximum use of all existing and planned programs, materials, studies, and reports relating to com- puter systems security and privacy, in order to avoid unnec- essary and costly duplication of effort; and (B) to assure, to the maximum extent feasible, that stand- ards developed pursuant to subsection (a) (3) and (5) are consistent and compatible with standards and procedures developed for the protection of of information in Federal computer systems which is authorized under criteria estab- lished by Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy. (c) As used in this section and section 19, the terms "computer system" ; "Federal computer system" "operator of a Federal comput- er system" ; and "sensitive information" have the meanings given in section 7 of the Computer Security Act of 1986. SEC. 19. (a) There is hereby established a Computer System Securi- ty and Privacy Advisory Board within the Department of Commerce. The Secretary of Commerce shall appoint the chairman of the Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Board. The Board shall be composed of twelve additional members appointed by the Secretary of Commerce as follows: (1) four members from outside the Federal Government who are eminent in the computer or telecommunications industry, at least one of whom is representative of small or medium sized companies in such industry; (2) four members from outside the Federal Government who are eminent in the fields of computer or telecommunications technology, or related disciplines, but who are not employed by or representative of a producer of computer or telecommunca- tions equipment; and (3) four members from the Federal Government who have computer systems management experience, including experience in computer systems security and privacy, at least one of whom shall be from the National Security Agency. (b) The duties of the Board shall be- (1) to identify emerging managerial, technical, administra- tive, and physical safeguard issues relative to computer systems security and privacy; (2) to advise the Bureau of Standards and the Secretary of Commerce on security and privacy issues pertaining to Federal computer systems; and (3) to report its findings to the Secretary of Commerce, the Di- rector of the Office of Management and Budget, the Director of the National Security Agency, and the appropriate Committees of the Congress. (c) The term of office of each member of the Board shall be four years, except that- (1) of the initial members, three shall be appointed for terms of one year, three shall be appointed for terms of two years, three shall be appointed for terms of three years, and three shall be appointed for terms of four years; and (2) any member appointed to fill a vacancy in the Board shall serve for the remainder of the term for which his predecessor was appointed. (d) The Board shall not act in the absence of a quorum, which shall consist of seven members. (e) Members of the Board, other than full-time employees of the Federal Government, while attending meetings of such committees or while otherwise performing duties at the request of the Board Chairman while away from their homes or a regular place of busi- ness, may be allowed travel expenses in accordance with subchapter I of chapter 57 of title 5, United States Code. (f) To provide the staff services necessary to assist the Board in carrying out its functions, the Board may utilize personnel from the National Bureau of Standards or any other agency of the Federal Government with the consent of the head of the agency. SEC. [18.] 20. Appropriations to carry out the provisions of this Act may remain available for obligation and expenditure for such period or periods as may be specified in the Acts making such ap- propriations. SEC. 21. This Act may be cited as the National Bureau of Stand- ards Act. Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 SECTION 111 OF THE FEDERAL PROPERTY AND ADMINISTRATIVE SERVICES ACT OF 1949 AUTOMATIC DATA PROCESSING EQUIPMENT SEC. 111. (a) The Administrator is authorized and directed to co- ordinate and provide for the economic and efficient purchase, lease, and maintenance of [automatic data processing equipment] Com- puter systems by Federal agencies. (b)(1) [Automatic data processing equipment] computer systems suitable for efficient and effective use by Federal agencies shall be provided by the Administrator through purchase, lease, transfer of equipment from other Federal agencies, or otherwise, and the Ad- ministrator is authorized and directed to provide by contract or otherwise for the maintenance and repair of such equipment. In carrying out his responsibilities under this section the Administra- tor is authorized to transfer [automatic data processing equip- ment] computer systems between Federal agencies, to provide for joint utilization of such equipment by two or more Federal agen- cies, and to establish and operate equipment pools and data proc- essing centers for the use of two or more such agencies when neces- sary for its most efficient and effective utilization. (2) The Administrator may delegate to one or more Federal agen- cies authority to operate [automatic data processing equipment] computer systems pools and automatic data processing centers, and to lease, purchase, or maintain individual [automatic data process- ing systems] computer systems or specific units of equipment, in- cluding such equipment used in automatic data processing pools and automatic data procesing centers, when such action is deter- mined by the Administrator to be necessary for the economy and efficiency of operations, or when such action is essential to national defense or national security. The Administrator may delegate to one or more Federal agencies authority to lease, purchase, or main- tain [automatic data processing equipment] computer systems to the extent to which he determines such action to be necessary and desirable* to allow for the orderly implementation of a program for the utilization of such equipment. [(f) The Secretary of Commerce is authorized (1) to provide agen- cies, and the Administrator of General Services in the exercise of the authority delegated in this section, with scientific and techno- logical advisory services relating to automatic data processing and related systems, and (2) to make appropriate recommendations to the President relating to the establishment of uniform Federal automatic data processing standards. The Secretary of Commerce is authorized to undertake the necessary research in the sciences and technologies of automatic data processing computer and related systems, as may be required under provisions of this subsection.] ()(1) The Secretary of Commerce shall, on the basis of standards and guidelines developed by the National Bureau of Standards pru- suant to section 18(a) (2) and (3) of the National Bureau of Stand- ards Act, promulgate standards and guidelines pertaining to Feder- al computer systems, making such standards compulsory and bind- ing to the extent to which the Secretary determines necessary to im- Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 prove the efficiency of operation or security and privacy of Federal computer systems. (2) The head of a Federal agency may employ standards for the cost effective security and privacy of sensitive information in a Fed- eral computer system within or under the supervision of that agency that are more stringent than the standards promulgated by the Sec- retary of Commerce, if such standards contain, at a minimum, the provisions of those applicable standards made compulsory and bind- ing by the Secretary of Commerce. (3) The standards determined to be compulsory and binding may be waived by the Secretary of Commerce in writing upon a determi- nation that compliance would adversly affect the accomplishment of the mission of an operator of a Federal computer system, or cause a major adverse financial impact on the operator which is not offset by government-wide savings. The Secretary may delegate to the head of one or more Federal agencies authority to waive such standards to the extent to which the Secretary determines such action to be necessary and desirable to allow for timely and effective implemen- tation of Federal computer systems standards. The head of such agency may redelegate such authority only to a senior official desig- nated pursuant to section 3506(b) of title 44, United States Code. Notice of each such waiver and delegation shall be promptly trans- mitted to the Committee on Government Operations of the House of Representatives and the Committee on Government Affairs of the Senate. (4) The Administrator shall ensure that such standards and guidelines are implemented within an integrated information re- sources management system (as required by chapter 35 of title 44, United States Code) by - (A) developing and implementing policies on Federal comput- er systems; and (B) revising the Federal information resources management regulations (41 CFR ch. 201) to implement such standards, guidelines, and policies. (5) As used in this section, the terms "computer system"; "operator of a Federal computer system ", and "Federal computer system " have the meanings given in section 7 of the Computer Security Act of 1986. (g) The authority conferred upon the Administrator and the Sec- retary of Commerce by this section shall be exercised subject to di- rection by the President and to fiscal and policy control exercised by the Office of Management & Budget. Authority so conferred upon the Administrator shall not be so construed as to impair or interfere with the determination by agencies of their individual [automatic data processing equipment] computer systems require- ments, including the development of specifications for and the se- lection of the types and configurations of equipment needed. The Administrator shall not interfere with, or attempt to control in any way, the use made of [automatic data processing equipment] com- puter systems or components thereof by any agency. The Adminis- trator shall provide adequate notice to all agencies and other users concerned with respect to each proposed determination specifically affecting them or the [automatic data processing equipment] com- puter systems or components used by them. In the absence of Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 mutual agreement between the Administrator and the agency or user concerned, such proposed determinations shall be subject to review and decision by the Office of Management & Budget unless the President otherwise directs. XII. COMMITTEE RECOMMENDATION A quorum being present, the bill was ordered favorably reported on June 4, 1986 by unanimous voice vote. Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 XIII. ADDITIONAL VIEWS FOR H.R. 2889, COMPUTER SECURITY REPORT We are sensitive to the Administration's concerns about this bill. We believe we have reached a compromise that, while far from per- fect, gives directors of agencies the discretion they need to imple- ment reasonable, effective security procedures. For example, agency directors are given the option of choosing a single standard for their agency rather than being required to handle different data in different ways. Our goal has been to give agency directors maximum flexibility to enable them to decide the type of security system needed to pro- tect sensitive government information. SHERWOOD L. BOEHLERT. MANUEL LUJAN, Jr. TOM LEWIS. RON PACKARD. Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3 XIV. DISSENTING VIEWS FOR H.R. 2889, COMPUTER SECURITY REPORT We are opposed to H.R. 2889 as reported by the Committee. This unnecessary, ill-timed effort to pre-empt Administration policy is likely to lead only to confusion and duplication of efforts. This bill's supporters claim the measure is needed because Na- tional Security Decision Directive (NSDD)-145 will give the Nation- al Security Agency control over how civilian agencies operate their computer systems. Yet there is no evidence of any interference by NSA in civilian agencies. Indeed, civilian agencies are represented on the National Telecommunications and Information Systems Se- curity Committee (NTISSC), which is in the process of formulating security guidelines. There is no reason to pre-empt the panel's work. H.R. 2889 also provides for security training by the National Bureau of Standards. However, NSA already is putting out train- ing material. A new efffort by the Bureau could easily lead to pointless duplication. We ought to give NSDD-145 a chance to work before we begin tinkering. F. JAMES SENSENBRENNER, Jr. DON RITTER. JOE BARTON. DAVID S. MONSON. (39) 0 Approved For Release 2011/03/15: CIA-RDP87B00858R000400480025-3