Volume 3, No. 3
Published by MIDSD/NCC
May/June 1980
 WCC  TO  BE  TRANSFERRED  TO  RTF
                                                                    Maureen Johnson
 The WCC computer facility and  support functions will be transferred to Research Triangle
 Park, N.C.,  in FY1981.   The  move includes all user processing and entails the  transfer of
 user  programs,  data,  and any  associated procedural  modifications.   The Waterside  Mall
 Distribution Center and  a User Support  function will be  retained  at EPA headquarters in
 Washington,  D.C.

 To  reduce user  impact, the MVS operating system and supported software will be installed
 as  nearly like  the  current system  at WCC as possible.  The new  hardware configuration is
 built around an IBM 370/168-MP with six megs of memory for each  processor.  Disk capacity
 will  increase by  20 percent over current WCC capacity.  A mass  storage device with 102.2
 billion bytes of capacity with appropriate  disk  staging  will be  installed later  in the
 year.

 Detailed  plans  are  in  development  for each phase of  the  transfer.   User meetings,
 conference calls, memos,  and discussions with various user groups will  provide  information
 and  the opportunity to exchange ideas on how the data center can best  meet user needs in
 the future.
FADPUG  SPONSORS

SECURITY CONFERENCE
                               Peg Hall

Many   users   of  ADP   in   the   Federal
Government  belong  to  an  OMB-sponsored
organization  called  the Federal ADP Users
Group.  It is better known by its  acronym,
FADPUG.  One  of FADPUG's suborganizations,
the Special Interest Group on Security and
Auditing,  recently  sponsored  a  2-day
conference  on computer security.   The
conference was held at  the National Bureau
of Standards  in Gaithersburg, Maryland.

Computer security  is currently  such  a
high-interest  item that  the conference
attracted over 500 people.   Not only were
most  Federal  agencies represented,  but
also  the  Canadian  Government,  several
universities, and a number of businesses.

Two  of the   conference's  speakers  have
national reputations in the security area..
               Bob Courtney of IBM  said that ADP's number
               one security  problem is  carelessness  and
               ignorance, not fire, flood,  embezzlement,
               or bombs.  Dr.  Carl Hammer, Director  of
               Computer  Sciences at Sperry  Univac,  spoke
               on  the  need  to  take  a  total system
               approach  to data security.   He emphasized
               that  data can be altered,  destroyed,  or
               disclosed  at  any point  from  input  form
               completion  to report  distribution.    In
               addition, speakers from OMB,  GSA, NBS,  and
               0PM discussed their agencies'   roles  in
               implementing OMB's A-71  Security  Circular.

               Bill  Allen, from  MIDSD's Research Triangle
               Park  office,  was a  member of a  panel  on
               contingency  planning.   Bill represented
               organizations with  large-scale   computers
               and  service  bureau  operations.     He
               described the National  Computer Center
               (NCC),  NCC   management's   attempts   to
               involve   their   user  community    in
               contingency  planning,  and  their current
               negotiations  for  backup services.

                        (Continued on  page 3)

-------
WCC  HIGHLIGHTS
                          Maureen Johnson
NCC HIGHLIGHTS
                              Tom Rogers
If April  system  stability was outstanding
at WCC  with only  14 stops, 7 on  the IBM
168 and 7 on the IBM 3032.   There were 12
WYLBUR  stops,   6  JES  stops,  and  no  TSO
failures.
   The  Value-Added   Network   (VAN)  is
installed  and  available for  user access.
The  VAN  will  eventually replace  most  of
the   low-speed   WATS   lines   used   for
interactive  terminal  access.   The WCC
Telecommunications  staff  is   assisting
users  in  learning  new  sign-on   procedures
and  in reporting  user problems  with the
new VAN.
              Beg Your Pardon
The  staff of  EPA  Data  Talk  regret  that
photographic  credit was omitted  from the
March/April  issue.    The  two  photographs
appearing  in  that issue were taken by Joe
Wilson (MIDSD/NCC).
     EPA Data Talk is published bimonthly by the
     EPA Management Information and Data Systems
     Division, National Computer Center, for EPA
     personnel and contractors interested  in
     general ADP topics.

     Comments, suggestions,  and news items
     should be addressed to:

         William G. Allen
         Editor, EPA Data Talk
         National Computer Center
         Research Triangle Park
         North Carolina 27711
     To ensure that our distribution list is up
     to date, please  indicate  any  required
     changes  on the mailing label attached to
     this  issue and mail  it to the  above
     address.
 V  Stability on  the  NCC computer  system
continues  high.    For  the  last  quarter
(January-March),   stability  was  the  best
since the  second  quarter  of FY1979-   The
NCC is also continuing to set  new  records
for the amount of work processed.   Several
new  daily  records were  established,  and
April was  the highest month  on record  for
generated   SUP's   (Standard   Units   of
Processing).    With   so  much  work  being
processed,  a degradation in  response time
and/or turnaround time may  be encountered.

 ^[  The    Central   Processing   System
Expansion  (CPSE)   for the  NCC  has  been
installed in the  new computer facility.   A
new  level  of Sperry  Univac  operating
system  software   is  being  generated  and
tested  for use  on the  hardware.    Plans
currently call for the  initial conversion
of  user  production  work   to the  CPSE
(SPERRY UNIVAC  1100/82  System)  during
August  of  this  year.   Users will  be
informed   of  status  and  plans  through
SIGNON, EPA  Data  Talk,  memorandums,  and
briefings.

 ^|  The  combined  data  center  graphics
surveys have  been returned.    An analysis
of  the  results  is currently  under  way.
The end result, a graphics  plan,  should  be
forthcoming during the summer.

 ^|  Sperry  Univac  has  recently unbundled.
This means  that almost all  items supplied
by Sperry  Univac  become cost items  to  the
data center.   Direct  user  cost  items, as a
result  of  the contractual  arrangement,
include  Sperry  Univac  documentation  and
training.    User  memorandums  will  detail
the  procedures  to  follow  for  requesting
documentation manuals.
The  deadline  for  contributions  to  the
July/August issue of EPA Data Talk is June
27.    Contributions received  after  that
date  will  be published at  the  discretion
of the editor.

-------
SOFTWARE  EXCHANGE

HELPS  PARTICIPANTS
                          Margie Edwards

If you have a PDP11/70  or  a  PDP11/45,  the
Minicomputer  Software  Exchange  (MXS)
provides an excellent  opportunity to  save
development costs and effort.

In  1976,  EPA  began  standardizing   the
minicomputers used  in  all  regional  branch
offices  and  laboratories.   In 1979,   the
standardization of  software was a  smoother
transition with the establishment of  the
Minicomputer  Software  Exchange.     The
Exchange Center  is  operating at  CSSD,
Cincinnati,  Ohio,  with  GSA  Contractor
support from the  University  of Cincinnati
Computing Center.

The purpose of  the  Exchange is  to:

   •  Coordinate   software   development
      efforts by providing a focal point.

   •  Store software  and documentation of
      general  need  by  at  least  three
      sites.

   •  Distribute  software, documentation,
      and software  information.
   •  Assist    software
      developers.
users
         and
   •  Identify,   collect,  and  distribute
      information.

   •  Develop and maintain  a  data  element
      dictionary  for software within  the
      Exchange.

The  benefits  of  participating  in  the
Exchange are very attractive in savings of
both cost and time.  For example,  joining
the  Exchange  can  reduce  application
software duplication,  overall software
development cost,  and software development
time.

Support  from the  Minicomputer Software
Exchange varies,  depending  on how  complex
the software is and whether the  supportee
is a user or developer.

The  Exchange now has  an inventory of  61
packages.    Computerized  records   are
maintained in the  MSX inventory status and
include such details as name of submitter,
language, and  documentation  available;  a
distribution status of when and where each
is distributed; and directory.   The  most
active categories  are (1) system software,
(2)  national  data entry  interfaces,  and
(3)  graphics.   The bulk  of MSX inventory
can  be   grouped   under  the  following
headings:

   •  PDP11  Operating  &  Communications
      Software

   •  National  System  Interfaces  (Data
      Entry  Systems  with  Validation  and
      Reformatting  for  Submission  to
      National Systems)

   •  Tracking and Management Systems

   •  Statistics and Graphics

A detailed list of MSX inventory,  as well
as guidelines for  participating in MSX and
for   standardizing   documentation,   is
available by  contacting (FTS) 684-7902 or
your PDP11 ADP System Manager.


         (Continued from page  1)

At the  end  of  his 20-minute  talk,  Bill
answered a  number of  questions,  some  of
which should interest Data Talk readers:
                 Q.

                 A.

                 Q.

                 A.

                 Q.
                 A.
                  Q.
                  A.
     How long an outage before  you  switch
     to the  backup  site?
     Two weeks.

     What percentage of your workload will
     you attempt to run?
     Twenty  percent.
     What types  of  processing?
     Production   batch   only.
     development   work  and  no
     processing.
    No
demand
                  Q.
                  A.
     What will be required of your users?
     They will have  to define the critical
     elements  of their   critical  systems
     and  prepare  run books  suitable  for
     use by NCC operations  staff who will
     be located at the backup site.

     Do you plan to  test  the plan?
     Yes,  I  am expecting a call  at 2:00
     a.m. some morning.
                             	OOOOD	

-------
                                              ICURITY
                         Marguerite L.  Hall, Computer Specialist
          This is the third in a series of  four articles on  ADP security.  The first article
          reviewed the peculiarities of ADP that make it inherently insecure.  The second article
          covered ADP security's key concepts and terminology.  This article traces the history of
          ADP security in the Federal Government from the early 1960's through the issuance of OMB
          Circular A-71,  Transmittal Memorandum No.  1.  The fourth article  covers EPA's recently
          developed agencyvide security program and our plans for a staged implementation.
                               Historical  Overview
Almost  2  years ago, in  July 1978, the  Office  of Management  and  Budget (OMB)  issued  its
magnum  opus on  ADP security:    OMB  Circular  A-71,  Transmittal  Memorandum No.  1.    The
memorandum,  its  origins,  intent,  and  content are the  subject of this article.

ADP  security was  pretty much  overlooked  in the  Federal  Government during those  halcyon
pre-COBOL  days of the 1950's.   Data  centers were built  in glass boxes; big  signs showed
the  way;  authorization  and  authentication, uninterrupted  power  supply  (UPS),  and
encryption were  still  out  in the cold.   However, early  in the sixties data  processors'
security  awareness was  raised  a  bit  because of a dozen  or so well-publicized  floods  and
fires  and several well-placed  bombs  and  grenades.   Management  responded.   Data  centers
were  relegated to dark dungeons  in building basements and  armed guards  were  stationed at
every entrance.   The computer world sat back satisfied.

Then  came the mid-to-late  sixties with its  new movements,  changing public policy,  and -
surprise  of surprises  -  finger  pointing  at  ADP.   It  started,  oddly  enough, with  the
Freedom  of  Information  movement.    Historically,   requestors  of  information  from  the
government had had to  come, hat  in  hand, showing that  they had good reasons  for  their
requests:   professors  searching  out  obscure memos and minutes,  lawyers  seeking facts  and
figures,  geologists  pursuing  sinks and  rifts, actuaries  delving into  demographic
distributions.   In the government's judgment, all  good  causes.

The Freedom  of Information Act, better known by its abbreviation,  FOIA, reversed the  rules
in 1966.   It became,  and still is, the government's  responsibility  to  prove why a  request
should  be denied.   You  can write to any  executive agency  and ask  for  a  copy  of  any
definable  record  and,  with  few  exceptions,  it's yours.    And  the  answer  is yours  quite
quickly  because  of  stringent  time tables.    In fact,  delays  and  denials  can  result  in
disciplinary action for  any government official who  arbitrarily  or  capriciously withholds
the data.
About  the  same  time that the FOIA legislation was drafted,  the  prestigious  Social Science
Research  Council recommended the  creation of a national data center.   On the  surface,  it
made  sense:   economies  of scale,  shared data  resources,  and nationwide  availability.
However,  the proposal  raised  considerable furor.   The Orwellian specter of computerized
invasions  of  personal  information  on  every  single  citizen  inflamed   liberals and
conservatives alike.   Even  a few data processors  professed  shock and chagrin.

And  right on the  heels of  this proposal  came a  congressional  investigation  into  unfair
credit  practices.   The investigation revealed the  extent  to which personal information was
being  swapped or sold, used and abused, modified  and misinterpreted.

This  investigation  was followed  by another  series of  congressional  disclosures on the
extent of information gathering  by  the  government:    military intelligence agents
collecting  and  computerizing   dossiers  on  civilians;  the  FBI  wiretapping  government
officials  and  the  press, while  government  officials and the press were taping each other's

-------
                                                                                         5
private conversations  -  with only an occasional  18-minute gap.   In  other  words,  a wealth
of  information  was  being captured  legitimately and  illegitimately,  much  of which  was
conveniently  packaged  in machine-readable  form and  widely  distributed  for purposes  not
originally envisioned.  Decidedly, not nice.

Obviously, the climate was ripe for righteous reaction.  In Washington it came in the form
of the Privacy Act  of  1974.   Although the Act applied only to Federal executive agencies,
its principles were widely accepted  (although  not  necessarily implemented) by  state  and
local governments,  educational institutions, and industry.

Although  "freedom of  information"  and  "privacy" are seemingly contradictory  terms,  the
security issue is really  the same - confidentiality.  On the one hand, the POIA, as it  was
amended in 1974,   spelled  out nine exemptions  to  automatic  release  of information.   On  the
other  hand,  the Privacy  Act  specified  that  agencies  must  "establish  appropriate
administrative,  technical,  and  physical   safeguards  to  insure  the  security  and
confidentiality of  records and to  protect  against  any anticipated  threats  or hazards to
their security or integrity...."  If  there  were  information  that  the public didn't have a
"right" to access,  if  there  were  personal information that had to be safeguarded, if both
kinds of information were in automated  information  systems,  then  someone had better start
thinking about unauthorized  access and  disclosure.   That realization was  the first step
toward A-71, T.M. No.  1.

By the mid-seventies ADP security had become  a high-interest  issue.   The  National Bureau
of Standards (NBS)  had held  several security conferences.  HEW had worried in public about
the vulnerability of  its  multi-billion-dollar  welfare system.   The National  Academy of
Sciences had  sponsored  a project on computer  data banks in  a  free society.   There  was
enough  interest  to make  publishing pay.   James Martin wrote a  book  titled "Security,
Accuracy,  and Privacy  in  Computer  Systems."   Donn Parker  at  the  Stanford  Research
Institute  published a  book on crime.   Even the New Yorker  ran a  three-article series on
white-collar computer  capers.

The General Accounting Office (GAO) took notice too.  The GAO, as you may recall from your
high school  civics  class, is  Congress's  creation charged with auditing,  accounting,  and
investigating the activities of  the executive branch.  ADP,  as you  can  imagine,  has over
the years  provided  the GAO with  a rich array of problems to ponder.  During 1975 and 1976
GAO  looked  into  three  separate  areas:    data  processing  facility  catastrophes,
computer-assisted crime,  and information systems that seemingly made their own decisions -
often wrong.

The GAO  report  titled  "Managers Need to  Provide Better Protection  for  Federal Automatic
Data Processing  Facilities"  was  filled with  sad,  sad stories of  data center  disasters -
all at Federal or federally  sponsored facilities.  This report came complete with pictures
- a rare treat, indeed,  for  a GAO report.  There were pictures of the gutted Pentagon data
center,  a  very wet postal  center  in Wilkes-Barre-on-the-Susquehanna,  a  bombed-out Army
Mathematics  Research  Center at  the  University of  Wisconsin,  and  a  collapsed  roof  and
mangled beams at  the St.  Louis Military Personnel Records Center.   Messy, very messy.

The second report,  "Improvements  Needed  in  Managing Automated Decisionmaking by Computers
Throughout  the  Federal  Government," contained  stories  programmers know  all too  well.
There were unedited data, outdated  data,  damaged data,  and destroyed data.   There were
misunderstandings between customers and designers, misunderstandings between designers and
developers,  misunderstandings  between developers and implementers,  and  misunderstandings
between  implementers and  users.   Business as usual  in ADP.

For  want  of  a binary bit  the  Army  hauled radioactive  materials around  the  country in
unshielded  trucks.   The Navy, relying  on  an  uncleared  accumulator, wasted  ten million
dollars  on unnecessary repairs.   Tiny,  internal table troubles resulted  in an overpayment
of  $700,000  in a Veterans  Administration  program.   A  buried bug  brought  about several
million dollars of  unneeded  cross-country material  transport before  it was exterminated.

-------
6
The GAO  also went  searching  for Federal  computer crime.   They found  it.    In a  report
titled "Computer-Related Crimes in Federal Programs," the GAO detailed fraudulent payments
for goods,  real  and imaginary.   They discovered payments  for  services  neither wanted  nor
delivered.   They  found  phony  welfare  checks  and  surreptitious  step  increases.   They
uncovered  stolen  timesharing services,  stolen  data  and  stolen  software.    They also
suggested,  as  have many  security  analysts,  that most  computer crime  goes undetected.
Often the little that gets detected goes unreported.  And of the  little that  gets reported
even less gets successfully prosecuted.

The underlying theme of the three reports  was  MANAGEMENT NEEDS TO GET INVOLVED.  Managers
need  to  understand the magnitude  of the  problem.   Managers need  to allocate  resources.
Managers need  to provide  reasonable  protection of their ADP resources.   Managers need  to
evaluate the effectiveness and  efficiency of  their  controls.   Thus a giant  step was made
on the way  to A-71, T.M. No.  1.

The GAO reports  prompted  Senator Ribicoff,  chairman  of the Senate Committee  on  Government
Operations,  to  order  his  staff to  prepare  a study  on  computer  crime in the Federal
Government.    The   study,  released  in  1977,   contained  a  collection  of  documents  and
information  on  "questionable  practices" in Federal  ADP programs.  For example, the study
looked  into a   programmer-training  project at Leavenworth Penitentiary.    Inmates were
allowed to  develop sensitive  software for both the IRS and the Department of Agriculture.
That  included  tax  returns and commodity projections.   To  make matters worse, development
took  place  on  a governmentwide timesharing  service.   Other agency software  and data were
there wide  open  for abuse.

The study  also  reported on the  United  States  of America  v. Bertram Seidlitz.  This case
may be  familiar to many in EPA.  Mr.  Seidlitz had been an employee of a Washington-based
timesharing  firm  before  he   resigned to  start  a  software business  of  his  own.    He  was
convicted of wire  fraud after he was discovered trying  to  get copies of WYLBUR  code via a
terminal  and phone  lines in his  Virginia home.    The crime was  uncovered  by an  alert
operator who recognized Seidlitz's initials  in a SHOW LINES command.

As a  result of  its investigation,  the Committee recommended that OMB should  take the  lead
in improving security by:

      •    Directing the executive agencies  to  implement the GAO  recommendations.

      •    Coordinating  activities  of  the  General  Services  Administration  (GSA),  the
          National Bureau  of Standards  (NBS), and the  Office of  Personnel  Management
           (0PM).

      •    Having NBS,  which has responsibility for providing governmentwide  standards  and
          guidelines, develop technical security standards.

      •    Having GSA,  the Government's  landlord, housekeeper,  purchasing  agent,  and  record
           retainer, develop physical  security  standards.

      •    Having 0PM,  formerly  the  Civil  Service,  issue personnel security policies.

 OMB's response  to  the  congressional  directive  eventually emerged as Transmittal  Memorandum
 No.  1 to Circular A-71.   T.M.  No. 1 assigns  ADP security responsibility  to the head of
 each  executive  branch  agency.   Agency heads  are to  ensure  that reasonable  measures  are
 taken to  protect   their  ADP  assets.   That  should   sound  familiar to  you  by  now.   The
memorandum  also directs that comprehensive security  programs be  developed  and implemented
 in  each  agency.   It spells out  the  scope  for these programs.   The scope  includes personnel
 practices,  ADP contracts, data processing facilities,  and  application systems.   It  covers
 all   application  systems  which  are  sensitive because  they  process  personal  data  or
 confidential business information or because  they control assets.   It  covers application
 systems  which  are critical  to agency functions  and  missions.   It requires  management

-------
                                                                                         7
control  processes, certification  that security specifications  have been  met, risk
analysis, official  record retention, and  periodic  evaluation.   It's  broad,  it's thorough,
and it makes sense.

In addition, T.M. No. 1 has given some further responsibilities to GSA,  NBS,  and 0PM.   GSA
is to issue policies and regulations for physical security of computer rooms and to assure
that  procurements  have received  agency  security  certification.    NBS  is  to  develop
standards  and  guidelines   for security  and  procedures  for  implementing   them  and  for
evaluating their effectiveness.

0PM has  responded  to  its T.M.  No.  1  directive by issuing both a  formal  change  to  Chapter
732 of the  "Federal Personnel Management Manual"  and  Bulletin  No. 732-2.   The  manual  now
directs  all  agencies  to classify their ADP  positions  by the degree of  sensitivity.   EPA
has done  this.   If you're  a manager of ADP  you may  recall  a letter  from the Security  and
Inspection Division requesting the  classification  of all ADP-related jobs into  critically
sensitive,  sensitive,  and  nonsensitive  categories.   EPA  must  also perform  appropriate
background checks on candidates for these sensitive positions.  If you're the manager of a
major system handling sensitive  information,   you'll  be subject   to  a full field
investigation.  If  you're a programmer on a  less sensitive system, a national agency check
may  suffice.   Bulletin No.   732-2  clarifies the  authority of  the executive  branch  to
investigate  and  grant  or  deny  clearances  to  employees   of  contractors  and  proposed
contractors.

Within 6 months of  issuance of the A-71 directive, OMB asked each of the agencies how well
they  were doing with their programs.  About that  time also, GAO asked  each agency about
the same question.   It was a  moment  of  truth.  Most  agencies realized  they needed  some
instant  expertise.   They  tried training  in-house staff, papering  personnel boards  with
vacancy  announcements,  hiring consultants,   and flooding  the streets with RFP's  for  risk
analyses,  vulnerability  studies,  security  surveys,   threat  assessments,  and  exposure
measurements.

By  now,  somehow,  with  few exceptions most  agencies  have   something they  are  calling  a
security  program.   Some programs  begin  and  end with  changing a password or two  once or
twice a  year.   Other  programs focus  on  carefully composed  technical teams  of thousands
running  risk assessments.   Still  others  have concentrated on the preparation of elaborate
plans for contingency operation, on installation of Halon fire suppression systems, on key
cards, on UPS systems, or on maintaining high employee morale.

Not that all that isn't needed, in whole  or  in part.   But what  most  programs  seem  to  lack
is both  breadth and balance.   Security  programs  need  clearly  defined   policy  and  scope.
They need assigned  responsibilities.  They need carefully designed standards and realistic
administrative  procedures.   Programs need  to promote  awareness and provide  for  periodic
evaluation.

And that's  what we're doing  in EPA.   We are taking  a well-planned methodical  approach
which  should result in  a  realistic,  well-rounded program.   Our security  program, when
fully  operational,  will include  standards   for the  security of  all our data  processing
facilities,   standards  for  security during  development and  operation of  our  sensitive  or
critical  application  systems,  and  standards  for  our  sensitive  ADP procurements.    The
program  will also  have a  documented  methodology  for  evaluating  how well we are  meeting
these  standards.    Our  plans   and  progress   to date  in implementing our program  are  the
subject of the  last article in this series.
                                         QOQOD

-------
8
               UNITED STATES
       ENVIRONMENTAL PROTECTION AGENCY

        National Computer Center

         Research Triangle  Park

          North  Carolina 27711

             OFFICIAL BUSINESS
        PENALTY FOR PRIVATE USE f 3OO
         AN IOUAL OPPONTUNITT EMPLOYE*
POSTAGE AND FEES PAID
 U S ENVIRONMENTAL
 PROTECTION AGENCY

      CPA-339

-------