EPA
     Vol. 2
September/October
No.  5
STRINGER REORGANIZES MIDSD

MIDSD Director  Bud  Stringer is proposing
to  reorganize  the  division.    The  re-
organization  will  sharpen the organiza-
tional responsibility of MIDSD branches,
and  consolidate some application  system
operational  functions  within   a   new
branch.

Stringer  was influenced by several  fac-
tors in making  the  change, not the least
of which  was his own idea about how MIDSD
would function  better.   "Activities  like
systems  development, planning,  policy
making,  data resource management, along
with overhead  activities  like budgeting,
and  training,  can  be  more   effectively
performed at  the  Headquarters'   level,"
says  Stringer.   "However, the   overall
management  of  the computer utility,  and
allied technical  functions, will  thrive
and  operate more  efficiently  away  from
the Headquarters' environment."

In   MIDSD's   case,   away   from   the
Headquarters'  environment   means   the
National  Computer Center at Research
Triangle  Park,  North Carolina, directed
by Sam Brown.   Each of the RTF branches
works  with the  computer centers—one
operates  them, and one plans for and buys
new  computers.   The Data  Center   Branch,
headed by Don  Fulford, will continue its
role  of  managing   the  National   and
Washington  Computer  Centers.     The
Computing Resources  Branch combines  the
functions  of  the  Major Acquisitions
Office and  the  Planning,  Analysis,  and
Research  Branch to  ensure a  continuous
flow of concepts, equipment, and services
to  the  data centers.    Mike  Steinacher
heads  this branch  and  his   responsi-
bilities  also  include  keeping track of
EPA's data  center user requirements.

At Headquarters, a new branch  was formed
from  a  nucleus  staff  in the Personnel
          Management Division.   As it starts  up,
          the  Production Systems Branch will  oper-
          ate  the  personnel  management  and  con-
          tracts  information  systems,  with  other
          systems  in  MIDSD's  parent office of
          Management and Agency Services  (OMAS)  to
          be considered  for  inclusion during  the
          next  year.    Consultant  Richard  Nolan's
          observation, that EPA had too widely dis-
          persed  organizational elements  operating
          its  systems,  has  taken root  in  this
          change.

          A second  Nolan observation suggested the
          newly  articulated theme  of  the  Informa-
          tion Systems  Development Branch.   Nolan
          saw  an  overly  high  dependence  on  con-
          tractors, and noted  that  many feasibility
                              (Continued on Page 6)

          COSTLE ESTABLISHES

          MONITORING   STEERING  GROUP

          "A major milestone   in  EPA ADP  manage-
          ment"  is  one description of the  action
          taken   recently   by  EPA  Administrator
          Doug  Costle.    He   has  established a
          standing  committee  of   key   Deputy
          Assistant Administrators  to oversee  all
          Agency  monitoring programs.   They  will
          establish  policy  on monitoring,   in-
          formation management, and information
          systems.      The   committee    includes
          Walt Barber, Matt Bills, Marilyn Bracken,
          Swep   Davis,   Roy   Ganse,  Ed   Hanley,
          Jeff  Miller,  and  Al Morris,   and  is
          chaired  by  EPA  Science  Policy  Advisor,
          Dick Dowd.

          Since  January  1978, an  in-house  work
          group,  the  Select Committee on  Monitor-
          ing,  has  been developing a  plan  for a
          carefully  designed  review  of  the  full
          range  of  monitoring  activities.   It  was
          formed  to respond to criticism  from the
          Office  of Management and  Budget  that EPA
          collects  too  much data,  the wrong  data,
                             (Continued on Page 5)

-------
                        ADP   SECURITY
                          Marguerite  L.  Hall, Computer Specialist
           This is the first  in a series of four articles on ADP security.  These articles are  in-
           tended to give you some perspective on  this relatively new and increasingly  important
           topic.  The first  article focuses on aspects of data processing which make  it inherently
           insecure.  The article examines concepts and terminology.  The third  article is by way of
           history.   It describes Federal reactions  to and actions on  security  problems.  The final
           article covers  EPA's recently developed  Agencywide security  program and  our plans  for
           staged implementation.	
                                  ADP'S LATENT INSECURITIES

Computer  security,  or to  use  the  broader  term "ADP"  security,  is  a hybrid  of computer
science  and industrial  security.   Industrial  security  is the  field  bringing  you Brink's
trucks,  barbed  wire,  and  closed circuit T.V.  monitors.    It's been  around a  long time.
Computer  science is a  bit newer, but certainly seems  to  be well entrenched.  The same can't
be said  for ADP  security.  It's only now  beginning  to emerge in its own right.  What's sur-
prising  is  how long it's  taken to get recognition  of the  scope and importance  of security
in relation to both computers and the information systems  that run them.

Not that  there hasn't  been a lot of bad  press.   There was  the  Pentagon fire that destroyed
three  complete computer systems.   In  1972, the  Susquehanna River  flood destroyed thousands
of dollars  worth  of Postal  Service computer supplies and  came within inches  of floating
$7.5 million  worth of  their computer equipment.  There was  the Equitable Funding scandal,
the Riggs deposit  slip  slip-up,  and  the Mark Rifkin Russian  diamond fraud.   They've all
made the  Wa.sh,31nJg;tQn Post as well as PAXAMATJflft.  What I'm  referring to is the understanding
that  ADP security is a  broad  discipline;  that it  covers denial  of  service  as  well  as
destruction of data centers, the loss of  confidentiality as well as fraud, and the theft of
computer  time  as well  as the computer.

It seems  so obvious that ADP is different and that  its difference  requires special care and
handling.   It's  different because  it's  so  terribly  complex.   It's different  because its
assets are  so concentrated.   It's different  because many of  its assets  are  intangible.
It's different because it's so readily accessible.

Think  about complex.  The jargon  alone  is intimidating.    There  are coined words, initials,
acronyms,  terms  borrowed from other  fields, and inscrutable codes.   For example, are you
comfortable with  nanosecond,  cache  memory, DBMS,  S522,  demand,  multithreading,  IBF2851,
asynchronous,  fiche,  degausser,  ECL,  mode,  LISP, inverted  files,  archiving,  hex, host,
RS232,  and  cursor?  Have you worked you  way through a system  flowchart of late?  How about
understanding  an equipment configuration diagram?  If you've  spent the last few years as  a
systems analyst, can you still log on?

The result  is that no one,  but  no  one,  has a good grasp  of the  big  picture as well as  a
detailed  understanding  of all  the  puzzle  pieces.   In  contrast,  all  it  takes  is a little
knowledge  prompted  by  a little  malice  or avarice  to  wreak  havoc.    Not  much  skill  is
required  to note a password  tacked  to the  Snoopy calendar hung over your terminal.  Stolen
computer time  has turned computer programming  into  a  thriving cottage  industry.  Absolutely
no skill is required  for water from an  overhead sprinker  to  seek  its own level or a flash
fire  to find  the forms supply, or a bulldozer  to terminate your trunk line.  Perfect know-
ledge  is obviously  a  prerequisite to perfect  protection,  and  that's  just not the state of
the art.

Next,  think about  concentrated assets.    Never before has  so much been so little.   Thirty-
two  single-spaced  pages become  a box of punched cards.   Five hundred  and forty pages of
printout are  pictured on one  microfiche.   Thirty thousand  pages become a magnetic  tape.
Forty  thousand pages translate  to a disk pack.   I didn't attempt to calculate the  number'of

-------
pages that could fit on  the  head  of a drum.   So easy to walk  out  with.  So  easy to write
over.  So easy to destroy.   There are cases  of blackmail by employees who have exited with
the only existing copy  of accounts receivable, the  only  copy  of customer lists,  the only
copy of  the  personnel  records.    Disgruntled  tape  librarians  fill  the literature with
fascinating  tales  of  external  label swapping,  methodical master  file scratching,  and
systematic system catalog entry switching.   Whole  disk  libraries have gone up in smoke and
down in flames.  Microchips have been bent, burnt, and  burglarized.   Punch  cards have been
poked,  soaked, and  otherwise mutilated.

Think about intangible assets.  Information no longer sitting on ledgers, in out-boxes, and
file cabinets.  Transactions that can't be followed from desk to desk and office to office.
Money that never makes it to your wallet.  ADP has transformed paper and pencil into  binary
bits of magnetic material placed on pieces of plastic.  It's  a  new game and  new rules are
needed for collecting and keeping and destroying invisible  information.   In the absence of
rules,  vital  records  expire,  disks become garbage dumps, and  sensitive information leaks.
Audit trails are lost, turning detection of error or evil over to chance.

Now think about accessibility.  Facilities are accessible.  Hardware is accessible.   Infor-
mation is accessible.  There  are  computers sitting in glass houses.   There  are facilities
with literal welcome signs over  the door and operating  systems with virtual welcome signs.
There are computers on flood  plains and  computers  on fault  lines.    There are computers in
tornado belts and computers in riot corridors.  And then, best of all, if you have defalca-
tion, fraud, embezzlement, espionage, or mischief  in mind,  there are  computers with tele-
communications.   No cloaks.   No daggers.   No out  of  town  travel required.   All  that's
needed is a  telephone, a  terminal,  and a  little time.   There, in  the  privacy of your own
home, you can  plumb  the riches of  your  favorite  data center.    Need to know your competi-
tion?  Or, how about the secret ingredients in a new drug, cosmetic, herbicide, or pigment?
How  about  commodity  prices,  insurance  claims,  welfare  lists,  criminal records,  medical
histories, or tax returns?  There are cases  of stolen software,  invented invoices, altered
accounts and amounts, and  bogus  beneficiaries.   The  wrong to be wrought, thanks to today's
telecommunications technology, is truly staggering.

It  doesn't  take much knowledge  of  Boolean  algebra  to understand  that  complexity "anded"
with concentrated assets  "anded"  with intangible assets  "anded" with accessibility equals
trouble.  And  when  you  "and" all  the above  with absolute dependence  on ADP,  the equation
can  result  in  catastrophe.   Picture  Social  Security without  billions of binary  bits,  the
Weather Bureau A3f\fr  its  satellite  signal digesting models,  our   air  traffic controllers
minus their  CRT's, or the IRS calculating without  its CPU's.  In EPA, we are  using ADP in
planning and  management,  abatement  and  control,  research and development,  and monitoring
and  enforcement.   We have  tracking systems, and  compliance  systems.   We  edit,  converse,
sort, merge,  retrieve,  update, model, text  process, analyze,  and  project.   We have major
purpose  timesharing  facilities,  nationwide  telecommunication  networks, mini's  and batch
terminal sites, and low-speed  terminals  sitting  in every continental state and Canada.  If
you will pardon some  awful  algebra mixed up  with a little  plagiarism  from  a popular song,
what it all adds up to is - the day  the  computers stop is the "day  the music dies."


However, there's some good news  too.   As I noted in the beginning,  ADP's special penchant
for disruption, disclosure, and destruction  is receiving  some  long-deserved  attention.   In
fact, security has become big business.   There are dozens of companies and  several Federal
agencies providing  training courses,  classes,  briefings,  tutorials,  workshops,  seminars,
chautauqua, colloquia, and symposia.   You can buy encryption  software,  auditing software,
authentication and  authorization  software.   You  can buy shredders, degaussers,  incinera-
tors, and chemical decomposers.   You can buy consultants, experts,  advisers,  and prophets.
It's a rare  edition  of  CjQmju.terwQr^d that doesn't cover at least  one data center disaster
or computer crime caper.  A quick scan of our  trade's  scholarly  journals reveals that risk
analysis, encryption, and security  "kernelology" have usurped  other compelling topics like
data base, structured programming, networking, and minicomputers.

-------
Of  course, security  has its very  own lexicon of O.K.  buzz  words  and  concepts:   Hazard,
risk,  privacy,  ROC, threat, exposure, vulnerability, sensitivity, ALE,  contingency,  safe-
guard,  perpetrator,  KSOS,  etc.   The terms  have been  lifted  from physics, mathematics,
engineering,  psychology,  sociology, and  astrology.  The second article in  this series is an
attempt  to bring  order to  the  terminology.    The  Federal  Government  is now in  the act,
thanks to  Congress, GAO,  OMB, GSA,  and the  Office of Personnel  Management.   That's Article
No.  3.    All  Federal  executive  agencies  have been directed  to establish comprehensive
security programs.  EPA's program and  our implementation are described in  Article No. 1.

Hopefully,  attention,  direction, and  technology can  be  translated into better built facil-
ities, trusted  software,  reliable  hardware, secure data,  appropriate procedures, and, most
importantly,  concerned  users.  ADP  security should be and can be a no-lose proposition.
WHO  MAY  USE

EPA's  COMPUTER  FACILITIES

                            Ernie Watson

There  are  about  2400 registered users of
the  two  primary  computer  centers.   This
number fluctuates daily.   Of those 2400,
1700 are users of the  Washington Computer
Center and 700  are registered to use the
National Computer Center.   The user com-
munity at  the EPA  data centers consists
of  EPA employees  and  their  contractors,
other  non-EPA Federal  employees and their
contractors, and  state and local govern-
ment  users.   How,  then, do  these  users
gain access  to the  computer center?

The  policy  and  procedure  to  become  a
registered  user  of either data center is
the  same.    An  EPA employee  or  EPA con-
tractor  must complete EPA  Form 2800-3,
specifying  an  EPA  employee  as  Project
Manager,  obtain  proper  signatures,  and
forward  the completed  form  to  the Time
Sharing  Services  Management Office.  The
Project  Manager,  in all  cases,  becomes
responsible  for  the utilization of  the
account,  emphasizing  the   importance  of
the   Project   Manager  being  an  EPA
employee.

Either computer  facility and  all services
offered are available to any non-EPA
Federal  Government  facility.   The  first
step  toward gaining access is the  estab-
lishment  of an  Interagency  Agreement
(IAG).    The  policy,  conditions,  and
mechanisms of controlled system utiliza-
tion  are  defined  in   Chapter  7,   Utili-
zation of  EPA Systems  by Non-EPA Govern-
ment  Units,  of  the  Au topped fia^a. fro-
         Manual .
EPA Order 1610.1A deals with the  develop-
ment  and  administration of lAG's.  Once
the  agreement  is  signed  and  effective,
then  the  procedure to access a  computer
center  is  as  defined  in  the   previous
paragraph.

Congressional  legislation,  such   as  the
Clean Air Act  of  1970,  the  Federal Water
Pollution Control  Act of  1972,  and  the
Safe Drinking Water Act of 1974,  provides
EPA  with state  program  support  grant
authority.    This  authority is  used  to
channel resources  to  the  states  so that
they may implement the Federally-mandated
programs.   This,  in short, means  that EPA
and  the  states may share  the  same com-
puter system.  In order for the  state or
local agency to gain  access to a system,
they must have a  sponsor.   This  sponsor
is either  the  EPA  Regional  Office that
serves the  state, a research laboratory,
or a  Headquarter's  element.   Funding is
through an  Intergovernmental Cooperation
Agreement  between the state  or  local
agency and  the Regional Office,  labora-
tory, or  Headquarter's  office.   This is
made  possible  by  the  Intergovernmental
Cooperation  Act of 1968.   More  informa-
tion  is  contained in  Chapter  7   of  the
Au^qpt^tiq P^t^  j'pQGesaing ^a/majl ,  as well
as  OMB Circular  A-97  and EPA  Order
1610.1A.   Access to the appropriate com-
puter center is  then  gained  through  the
submittal  of a  completed EPA Form 2800-3.
  The deadline  for  contributions to the
  November/December issue of  EPA  Da^ta
       is  October 31,  1979.

-------
WCC  HIGHLIGHTS
                        Maureen Johnson
  V  qv? ConveraAoji.   The  MVS/TSO/WYLBUR
system  has  been available for  user  con-
version  activities  since  the  first  of
September.   The  MVS system is running on
one processor, while the MVT/ ALPHA system
continues  to be available  on  the  other
processor.   Users  are kept  informed  of
conversion  progress as  well as  problem
status  through on-line NEWS  ALERTS,  user
meetings  and  conference  calls,   and
through the  MVS Conversion Assistance
Team.   Conversion  of  several  production
systems  is  nearing  completion and  many
users  are  taking  advantage  of  improved
response  and  turnaround  under  the  MVS
system.
     WCC frgject OffAeej?.    Curt  Lackey
recently  accepted  a  position  with  the
Office of Toxic Substances.  We will miss
Curt's  initiative  and expertise  in pro-
viding guidance  to  the  WCC  Project.
Maureen  Johnson will  be  acting  Project
Officer until the position can be filled.

  V  PPP-t. AS— 5-    Contingency  Plans  are
being  finalized  to  provide 2BB-dedicated
service  on  the COMNET  Commercial  AS-5
system during October  and  November 1979.
ZBB  has  been  satisfactorily  using  the
Commercial  AS- 6 system  during  the past
several months.
               PAvAd-    Although  not  as
severely  as other  locations,  the  WCC
facility suffered effects of the remnants
of  Hurricane David as  it  passed through
the Washington, D.C.  area  during  the
second  week of  September.   An interrup-
tion  in the  electrical supply  from  the
local  utility,  which  lasted  in excess of
four hours,  not  only caused the immediate
loss  of  the 3032  system,  but  the  sub-
sequent  failure  of  the  370/168,  which is
protected  from short (15 minute) failures
by  an  Uninterrupted  Power  Supply  (UPS)
system.   The UPS, which is essentially a
series  of batteries,  prevented extensive
damage  to  some  of  the  hardware devices.
If  subjected to  the surges  and  drops of
commercial  power, this  hardware  would
most  likely have been  severely affected.
However,  as the UPS system does not pro-
tect  all  devices,  several  of  the  com-
ponents  did  suffer  the  aftereffects of
burned or weakened circuit boards.   Com-
prehensive diagnostic  tests  were  run to
ferret out any weaknesses  for correction.
NCC  HIGHLIGHTS
  V
                             Tom Rogers
     An additional Uninterruptible  Power
Supply (UPS)  system has been procured  to
support  the   upcoming  Sperry  Univac
Expansion.

  \  The  ceiling  and  lights are installed
at the NADPSC  building expansion.   New
electrical  transformers  to  supply  in
excess of 2000 KVA power to the expanded
facility  were  installed the  last  week  of
September.

  w  System stability has  been excellent
at the Univac  Data  Center  for  the past
several months .
     As of August 20,  1979, the NCC Com-
 puter System is available for  the user at
 7:30 a.m., Eastern Standard Time, instead
 of  8:00 a.m.   This new  start  time was
 implemented  in  order  to  provide service
 to  EPA personnel under the newly  imple-
 mented  "Compressed Work Schedule."
 COSTLE  (Cont. from Page 1)
 or  data which  is  unreliable.   The  com-
 mittee  has  been studying  ways  to  prevent
 redundancy  of  monitoring  programs, to
 manage  monitoring,  and to  plan for  the
 long-term.   Much  of  the  committee's  work
 led  to  the  establishment  of  the DAA  Com-
 mittee.   The  Committee  will  report to
 Costle  at  least  quarterly   on  their
 activities:

      •    An  improved  planning  mechanism
          for ADP;
      •    A  mandatory  quality  assurance
          program;
      •    Development  of a  monitoring
          strategy;
      •    Review  of   data  collection
          activities  for  consistency,
          redundancy, and utility;

-------
     •     Formal  audits  of every  major
          monitoring  program once  every
          three to five years.

In  a September  18  memorandum,  Costle
states, "I am directing  the DAA Committee
to establish a communication channel with
all EPA offices with  a strong interest in
monitoring and information  management...
This   communication   should   include
issuance  of  a series of  monitoring and
information management policy memoranda."
It has been obvious to many EPA data pro-
cessing professionals that  ADP has seldom
received  top  management  attention.   The
DAA  Committee will  clearly  remedy  that
problem.


STRINGER (Cont. from  Page  1)
studies  of  requirements  analyses failed
to result in the  creation  of new  systems.
Although MIDSD has always  had some role
in  applications  systems  development,  it
has in the past been  mostly a passive one
heavily  dependent  on  contractor exper-
tise.   The  new branch  will be augmented
with  eight  new  positions  taken  from
within  OMAS  during the  ZBB  process.
Contractors  will  continue to  have  an
          UNITtO STATES
   I NVmOMMENTAL PROTECTION AGENCY
   National Computer Center
    Research Triangle Park
     North Carolina 27711
        OFFICIAL BUSINESS
    PENALTY FOR PRIVATE USE S3OO
    AN EQUAL OPPORTUNITY EMPLOYE*
important role in the development cycle,
but  the  eight staff added  to  the  three
which MIDSD had heretofore  devoted to  the
function will  be  of  more  substantial
assistance.  Morris Yaguda will head  the
new branch.   "Recruiting is  underway  for
these  positions,  and  applications  from
within  EPA are  especially  welcome,"
states Morris.    "We  are  looking  for
systems analysts in Grades  11-14."

Nolan  has  also  recommended  adopting  a
"top  down" ADP  planning  strategy  which
links  EPA's  overall mission plans   to
plans  for  ADP  applications  and  data
resource  support.   Planning and budget-
ing,  data resources management,  and  ADP
policy  will  now   find a  home  in  the
Information Resources  Management Branch
headed by Ken Byram.  Other  functions of
the  new  branch   include  procurement
approval  coordination,  training,  and
security.   The  planning  function   is
especially important,  responding  to  a  GAO
observation  that  although EPA  spends
nearly $50  million  annually  on data pro-
cessing,  much  of   it   is  spent  in  the
absence  of an overall  plan.  The  staff
will  also support  the  DAA  Committee  on
Monitoring and  Information Management.
           POSTAGE AND PECS PAID
            U S ENVIRONMENTAL
            PROTECTION AGENCY
                EPA-393

-------