7 Approved For Release 2007 10 23 ADDRESS BY LTG LINCOLN D FAURER DIRECTOR NSA AT COMPUTER CONFERENCE 81 WASHINGTON D C 15 SEPTEMBER 1981 I WANT TO START OFF BY EXPRESSING MY THANKS TO DR MILLS AND OFFICIALS FOR THE OPPORTUNITY TO COME HERE THIS MORNING AND TELL YOU ABOUT THE NEW DEPARTMENT OF DEFENSE COMPUTER SECURITY CENTER I SAY BECAUSE THE ASSIGNMENT OF THIS JOB TO MY AGENCY IS VERY RECENT BUT IN POINT-OF-FACT WE HAVE BEEN INVOLVED IN WORK IN THIS AREA FOR A NUMBER OF YEARS IN SUPPORT OF OUR INTERNAL COMPUTER PROCESSING TIES AND IN SUPPORT OF DEFENSE COMMUNICATIONS SYSTEMS ACQUI- SITION EFFORTS SUCH AS THE PACKET-SWITCHED NETWORK AUTODIN II FIRST A BIT OF BACKGROUND AS MANY OF YOU IN THIS CON- FERENCE KNOW CONCERN HAS GROWN IN RECENT YEARS ABOUT THE PROBLEM OF MAINTAINING THE SECURITY OF INFORMATION IN AN INCREASINGLY AUTOMATED COMMERCIAL AND FEDERAL WORLD LAST YEAR MY PREDECESSOR ADMIRAL INMAN NOW DEPUTY DIRECTOR OF THE CIA WORKING WITH OF THE SECRETARY OF DEFENSE EXAMINED THE NEED FOR A TECHNICAL CENTER TO SUPPORT THE MILI- TARY AND DEFENSE AGENCIES THIS LED TO A LETTER ON THE FIRST OF JANUARY THIS YEAR FROM THE DEPUTY SECRETARY OF DEFENSE WHICH DIRECTED NSA TO ESTABLISH A CENTER FOR COMPUTER SECURITY EVALU- ATION SINCE THEN WE HAVE BEEN BUSY CONSOLIDATING THE INTERNAL COMPUTER SECURITY ACTIVITIES OF NSA AND DEVELOPING THE RESOURCE REQUIREMENTS TO SUPPORT THE CENTER THIS ORGANIZATION WAS FORMALLY ESTABLISHED WITHIN MY AGENCY IN JULY THIS MORNING I WOULD LIKE TO TALK WITH YOU ABOUT THE NEEDS FOR IMPROVEMENTS IN COMPUTER SECURITY AND ALSO THE OTHER CHALLENGES WE WILL FACE BUT MOST IMPORTANTLY--WHAT IT IS THIS CENTER WILL AND WILL NOT DO I SHOULD ALSO LIKE TO TAKE THIS OPPORTUNITY TO CLEAR UP ANY MISUNDERSTANDINGS ABOUT THE WAY WE WILL CONDUCT COMPUTER SECURITY ACTIVITIES AT NSA I HAVE HEARD SOME ANXIETIES EXPRESSED BY INDUSTRY AND BY OTHERS AND I WOULD LIKE TO CLARIFY OUR INTENTIONS AS MUCH AS POSSIBLE AS I HAVE INTIMATED THE CONCERN WITHIN DEFENSE ABOUT PUTER SECURITY IS A VERY GENUINE ONE WE LIVE IN A FAST-PACED AND TECHNOLOGY INTENSIVE WORLD FOR THE MILITARY SERVICES AND THE OTHER DEFENSE AGENCIES THE PROBLEM WE FACE IS AN EXPLOSION OF INFORMATION CLASSIFIED AT VARIOUS LEVELS OF DIFFERING SENSITIVITIES OUR WORLD IS FILLED WITH AUTOMATIC DATA PRO- CESSING EQUIPMENT AND OFTEN NETWORKED Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 TOGETHER THE THREAT TO SECURITY RANGES FROM THE INADVERTENT DUMP OF MATERIAL TO A NONAUTHORIZED RECIPIENT ALL THE WAY TO DELIBERATE PENETRATION I MEAN TO IMPLY THAT INDIVIDUAL DEFENSE AGENCIES AND SERVICES RECOGNIZED OR TRIED TO TACKLE THE PROBLEM FOR EXAMPLE WE HAVE TRIED TO DEAL WITH THE PROBLEM BY USING TIGER TEAMS TO DELIBERATELY PENETRATE OUR SYSTEMS THEY ALMOST ALWAYS SUCCEED IN ATTAINING ACCESS SOMETIMES USING SUCH SOPHISTICATED EFFORTS THAT THEY LEAVE NO TRACE OF THE ATTEMPT TO PENETRATE THE SYSTEM SUCH EFFORTS WERE USUALLY FOLLOWED BY TECHNICAL EFFORTS TO CORRECT WEAKNESSES UNFORTUNATELY THIS TYPE OF CORRECTIVE EFFORT WAS GENERALLY UNSUCCESSFUL AND WARDING FURTHERMORE THE CORRECTIVE EFFORTS OFTEN SERIOUSLY DEGRADED PERFORMANCE THE AIR FORCE TOOK THE LEAD ON A MORE SUCCESSFUL PROGRAM INVOLVING SECURITY KERNEL TECHNOLOGY THE MOST SUCCESSFUL EFFORT WAS THE SECURITY-ENHANCED MULTICS SYSTEM THAT HAS BEEN RUNNING FOR SEVERAL YEARS IN THE PENTAGON A SIGNIFICANT AMOUNT OF TECHNOLOGY IS NOW AVAILABLE BUT IT IS DIFFICULT FOR INDIVIDUAL USERS TO UNDERSTAND WHAT FT IS AND IS NOT CAPABLE OF ACHIEVING A TECHNICAL ORGANIZATION TO RESPOND TO THE PROBLEMS OF THE INDIVIDUAL DOD AGENCIES SEEMS CALLED FOR THERE ARE CLEAR REQUIREMENTS FOR SUPPORT TO SUCH ORGANIZA- TIONS IN THE NATIONAL SECURITY ESTABLISHMENT FOR EVALUATION OF NEW TECHNOLOGY 0 THERE ARE REQUIREMENTS FOR SYSTEMATIC CERTIFICATION AND ACCREDITATION OF SYSTEMS TO BE OPERATED IN A VARIETY OF ENVIRON- MENTS THERE IS A NEED FOR BASIC RESEARCH AND DEVELOPMENT TO BE CONSIDERABLYAACCELERATED ONE MIGHT ASK--WHY CHOOSE NSA FOR THE CENTER I THINK THERE ARE SOME STRAIGHTFORWARD ANSWERS 0 WE ARE A LARGE AND VERY TECHNICAL ORGANIZATION 0 WE HAVE A LARGE WORK FORCE OF SCIENTIFIC AND OTHER PRO- FESSIONAL TALENTS THAT PROVIDE THE CRITICAL MASS FROM WHICH TO DRAW THE CORE OF MANPOWER NECESSARY TO FORM THE CENTER WE CAN 3 -TAKE CONSIDERABLE ADVANTAGE OF OUR WORK IN RELATED AREAS ALTHOUGH COMPUTER SECURITY SUPPORT IS A DISTINCT AND INDEPENDENT FUNCTION THE NEED TO EXPLOIT ADVANCED TECHNOLOGY CLOSELY PARALLELS THE RESPONSIBILITY OF NSA TO OUR NATIONAL GOVERNMENT FOR THE SECURITY OF ITS COMMUNICATIONS Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 INITIATIVE IN COMPUTER SECURITY IS NOT WITHOUT ITS PROBLEMS AND ITS CHALLENGES THE MAJORITY OF COMPUTER SYSTEMS IN USE SIMPLY DO NOT HAVE SECURITY OF DATA AS THEIR PRIMARY OBJECTIVE USERS ARE MOST INTERESTED IN PERFORMANCE RELIABILITY EASE OF USE AND THEY SHOULD BE CONTEMPORARY COMPUTER SYSTEMS SIMPLY DO NOT PROVIDE RELIABLE PROTECTION OF THEIR DATA AND CONTEMPORARY SYSTEMS ARE OFTEN DISTRIBUTED WITH SECURITY PROBLEMS COMPOUNDED BY REMOTED TERMINAL OR NETWORK CONSIDERATIONS DESPITE THE PROGRESS THAT HAS BEEN MADE THERE IS A MAJOR SHORTAGE OF GOOD COMPUTER SECURITY TECHNOLOGY INDUSTRY LEADERS HAVE TOLD US THAT THIS SITUATION WILL CONTINUE IN THE ABSENCE OF A CERTAIN COMMERCIAL MARKET WILLING TO PAY FOR SUCH PRODUCTS WE ALSO OBSERVE THAT SUCH TECHNOLOGY AS DOES EXIST DOES NOT ENJOY WIDESPREAD USE THERE ARE MANY REASONS FOR THIS IGNORANCE OF THE ATTRIBUTES OF THE PRODUCT PERFORMANCE DEGRADATION THAT IS UNACCEPTABLE OR COST MANAGEMENT AWARENESS OF THE PROBLEM ACROSS THE DEPARTMENT OF DEFENSE NEEDS CONSIDERABLE BOLSTERING THIS IS NOT AN EASY COMPUTER SECURITY ASPECTS OF COMPUTER OPERATIONS ARE VIEWED BY MOST AS A BLACK ART AND MOST OFFICIALS CAN HARDLY BE BLAMED FOR SIMPLY SETTLING FOR ASSURANCES THAT THEY ARE IN COM- PLIANCE WITH COMPUTER SECURITY REGULATIONS I MUST CONFESS THAT AN INFORMED VIEW IS THAT THE CREATION OF POLICY AND REGULATION ON THIS ISSUE HAVE IN A SENSE BEEN GEARED TO THE TECHNOLOGY AVAILABLE TO SUPPORT IT AS ONE OF OUR SENIOR PROFESSIONALS OBSERVED IN AN ARTICLE SEVERAL YEARS AGO COMPUTER MAY WELL SATISFY ALL REGULATIONS AND STILL BE HIGHLY BUT AS I HAVE ALLUDED TO EARLIER PERHAPS THE BIGGEST CHALLENGE WE FACE IS THE ENORMOUS RELIANCE WE MUST PLACE ON INDUSTRY COMPUTER SECURITY FEATURES ARE NECESSARILY PRODUCT- PECULIAR AND WE MUST FIND WAYS TO WORK CLOSELY WITH INDUSTRY TO HELP PRODUCE TRUSTED COMPUTER SYSTEMS CLEARLY IF I AM CORRECT IN MY ASSERTION THAT THERE IS A DISTINCT SHORTAGE OF RELIABLE SECURITY FEATURES AND THAT THE BULK OF THE PRODUCTS WILL HAVE TO BE COMMERCIALLY PRODUCED THEN WE WILL OWE IT TO OUR DOD CUSTOMERS TO KEEP THE PRESSURE ON INDUSTRY TO PRODUCE THAT PRESSURE WILL NEED TO BE SUSTAINED UNTIL MARKET AWARENESS IS GENERATED AND SECURITY OF INFORMATION AND OF COMPUTER PROCESSES THEMSELVES BECOME A MAJOR DESIGN GOAL FOR NEW COM- MERCIAL SYSTEMS UNDER DEVELOPMENT BY THE MAJOR VENDORS NOW I WOULD LIKE TO TELL YOU ABOUT THE SPECIFIC THINGS THE COMPUTER SECURITY CENTER WILL DO THESE FALL INTO FOUR AREAS RESEARCH AND DEVELOPMENT ASSISTANCE IN THE ACQUISITION OF DOD COMPUTER SYSTEMS DISSEMINATION OF COMPUTER SECURITY AND EVALUATION OF COMMERCIAL COMPUTER SECURITY PRODUCTS FIRST LET ME ADDRESS OUR CONDUCT AND SUPPORT OF RESEARCH AND DEVELOPMENT AS I NOTED BEFORE THE ABSENCE OF 3 Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 TECHNOLOGY IS A MAJOR PROBLEM I BELIEVE WE NEED AN ACTIVE WELL-FORMED PROGRAM THIS WORK MUST OF COURSE BE TECHNICALLY BUT IN ADDITION IT MUST BE CLEARLY FOCUSED ON TECHNOLOGY GAPS WHERE IF SUCCESSFUL THE RESEARCH WILL HAVE A SIGNIFICANT PAY-OFF IN TERMS OF DOD COMPUTER SECURITY BOTH THE IN-HOUSE WORK AND THE SPONSORED RESEARCH IN INDUSTRY AND UNIVERSITIES WILL BE PART OF A COHESIVE PROGRAM WITH SEVERAL FACETS 0 WE WILL EXPLORE THE IMPLICATIONS OF SECURITY ON HARDWARE AND SOFTWARE ARCHITECTURES FOR VARIOUS COMPUTER COMPONENTS SUCH AS DATA BASE SYSTEMS AND MICROPROCESSORS 0 WE WILL LOOK FOR MORE EFFECTIVE WAYS TO PROVIDE SECURITY IN NETWORKS ADDRESSING ISSUES SUCH AS COMMUNICATIONS PROTOCOLS AND 0 WE WILL SPECIFICALLY WORK ON VERIFICATION TOOLS TO ASSIST US IN EVALUATING WHETHER THE SECURITY FEATURES OF COMPUTER AND NETWORK SYSTEMS ARE TRULY EFFECTIVE A SIGNIFICANT THRUST WILL BE DIRECTED TOWARDS APPLYING THE EMERGING RESEARCH RESULTS TO REPRESENTATIVE PROBLEMS WHERE THE CRITICAL ISSUES OF PERFORMANCE AND FUNCTIONALITY CAN BE ASSESSED THESE DEVELOPMENTS WILL BE SELECTED TO PROVOKE THE ASSIMILATION OF THE TECHNOLOGY INTO INDUSTRY PRODUCTS THE RECENTLY ANNOUNCED HONEYWELL SECURE COMMUNICATION PROCESSOR IN THEIR LEVEL 6 MINICOMPUTER PRODUCT LINE SERVES AS AN EXAMPLE OF THIS PROCESS THIS PRODUCT WAS BASED DIRECTLY ON PREVIOUS DOD SPONSORED RESEARCH THAT PRODUCED THE SECURITY KERNEL TECHNOLOGY AND I WOULD POINT OUT ANOTHER IMPORTANT CHARACTERISTIC OF OUR WE ARE COMMITTED TO HAVING THE RESEARCH DONE AND THE RESULTS DISSEMINATED IN AN OPEN AND UNCLASSIFIED MANNER EXCEPT IN THOSE EXCEPTIONAL CASES WHERE WE ARE WORKING ON A PREVIOUSLY CLASSIFIED BASE OUR MOTIVATION SHOULD BE CLEAR--THE TRANSFER OF THE TECHNOLOGY INTO COMPUTER SECURITY PRODUCTS THAT DOD CAN IN TURN PURCHASE RESTRICTED IF THE RESEARCH RESULTS ARE CLASSIFIED OR IN SHORT I EXPECT OUR TO BE OPENLY AVAIEA SIGNIFICANT IN ITS RESULTS COMPLE- MENTARY TO THE WORK OF OTHERS AND RELEVANT TO DOD AND THE OTHER ORGANIZATIONS OF THE NATIONAL SECURITY ESTABLISHMENT OUR SECOND MAJOR TASK IN THE CENTER IS ASSISTING THE DOD ELEMENTS IN THE ACQUISITION AND TESTING OF TRUSTED SYSTEMS THE BEST TECHNOLOGY IN THE WORLD IS OF LITTLE VALUE UNTIL WE HAVE PUT IT INTO OPERATION Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 A STARTING POINT THE SPECIFICATIONS FOR THE TION OF A NEW SYSTEM MUST CLEARLY STATE WHAT COMPUTER SECURITY CAPABILITIES ARE REQUIRED IN THE PAST REQUIREMENTS HAVE NOT ALWAYS BEEN CLEARLY AND CONSISTENTLY SPECIFIED TO HELP REDRESS THIS PROBLEM THE CENTER WILL DEVELOP A SET OF SECURITY STANDARDS AND CORRESPONDING INPUTS FOR USE IN PROCUREMENT SPECIFICATIONS THESE WILL EVOLVE AND GROW AS THE TECHNOLOGY ADVANCES SO THAT DOD CAN TAKE FULL ADVANTAGE OF THE ALTERNATIVES AVAILABLE FRANKLY OUR INTENTION IS TO SIGNIFICANTLY REWARD THOSE DOD SUPPLIERS WHO PRODUCE THE COMPUTER SECURITY PRODUCTS THAT WE NEED A DOD ELEMENT CAN OPERATE A TRUSTED SYSTEM REGULATIONS REQUIRE A CERTIFICATION AND ACCREDITATION PROCESS THIS PROCESS PROVIDES THE BASIS FOR A JUDGMENT BY THE APPROVING AUTHORITY THAT THE SYSTEM SHOULD ACTUALLY BE TRUSTED FOR THE SIMULTANEOUS PROCESSING OF MULTIPLE LEVELS- OF CLASSIFIED OR SENSITIVE INFORMATION AGAIN THE CENTER WILL PROVIDE AN EVOLVING SET OF TECHNICAL STANDARDS AND CRITERIA TO AID IN MAKING THESE JUDGMENTS 0 FOR SELECTED SYSTEMS OF PARTICULAR IMPORTANCE TO DOD THE CENTER WILL DIRECTLY PARTICIPATE IN THIS ACQUISITION PROCESS THIS WILL BE IN THE FORM OF TECHNICAL SUPPORT TAILORED TO THE UNIQUE PROBLEMS OF A PARTICULAR SYSTEM IT SHOULD BE CLEAR THAT I EXPECT THE CENTER TO HAVE MAJOR POSITIVE INFLUENCE ON THE SECURITY OF THE COMPUTER SYSTEMS THAT ARE BROUGHT INTO THE DOD INVENTORY SHOULD SOME SUPPLIER CHOOSE NOT TO KEEP UP THEY CAN EXPECT TO BE LEFT BEHIND TO ACHIEVE THIS IMPACT A LOT OF INFORMATION MUST BE EXCHANGED THUS A THIRD CENTER FUNCTION IS PROVIDING COMPUTER SECURITY DATA CENTER SERVICES 0 WE WILL PROVIDE A CONSOLIDATED SET OF INFORMATION ON THE VARIOUS COMPUTER SECURITY PRODUCTS THAT EXIST IN THE COMMERCIAL AND GOVERNMENT SECTORS AS A SERVICE TO OUR CUSTOMERS 9 WE WILL ACTIVELY PARTICIPATE IN FOSTERING AN INCREASING AWARENESS OF COMPUTER SECURITY PROBLEMS AND SOLUTIONS FOR DOD PERSONNEL WE WILL ASSIST IN IDENTIFYING OPPORTUNITIES FOR COMPUTER SECURITY EDUCATION TRAINING SEMINARS AND WORKSHOPS WE WILL ORGANIZE AND CONDUCT SUCH ACTIVITIES OURSELVES WHERE NEEDED FURTHERMORE WE EXPECT TO BE ACTIVE IN PUBLIC FORUMS--SUCH AS THIS CONFERENCE--TO KEEP YOU IN THE COMPUTER INDUSTRY INFORMED ON OUR ACTIVITIES AND OF COURSE TO LEARN ABOUT WHAT YOU ARE DOING 0 WE WILL OBVIOUSLY PROVIDE A REPOSITORY FOR THE VARIOUS STANDARDS AND CRITERIA DEVELOPED BY THE CENTER FOR USE WITHIN DOD Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 THE EFFECTIVE EXCHANGE OF INFORMATION ON COMPUTER SECURITY IS TOO IMPORTANT TO BE LEFT TO CHANCE THE CENTER WILL MAKE IT ITS BUSINESS TO STIMULATEVAND FACILITATE THIS EXCHANGE THE FINAL FUNCTION I WANT TO TALK ABOUT IS THE EVALUATION OF COMMERCIAL COMPUTER SECURITY PRODUCTS LET ME FIRST DISTIN- GUISH THIS FROM THE ASSISTANCE TO COMPUTER SYSTEMS ACQUISITION THE ACQUISITION SUPPORT THAT I DESCRIBED EARLIER PROCEDURAL TEMPEST AND COMMUNICATIONS SECURITY HOWEVER WE FREQUENTLY FIND THAT A GIVEN PRODUCT WILL SHOW UP IN A NUMBER OF DIVERSE DOD APPLICATIONS THEREFORE IT IS EXTREMELY VALUABLE TO HAVE A CAREFUL EVALUATION OF THE TECHNICAL MERIT OF THE PRODUCT ITSELF THIS IS PARTICULARLY USEFUL WHEN SELECTING THE WINNER 0 THE RESULT WILL BE AN EVALUATED PRODUCTS LIST FOR USE WITHIN THE NATIONAL SECURITY ESTABLISHMENT THIS WILL BE BASED ON CRITERIA FOR DISTINCT LEVELS OR OF 0 THIS EVALUATION WILL BE DONE ON AN OPEN BASIS THE COOPERATING MANUFACTURER WILL BE PROVIDED THE RESULTS OF THE EVALUATION AND THE SUPPORTING RATIONALE FURTHERMORE THE FIGURE OF MERIT AND AS APPROPRIATE SUPPLEMENTAL COMMENTS WILL FURTHERMORE SPECIFIC VULNERABILITIES THAT ARE IDENTIFIED BY THE CENTER WITH THE COOPERATION WILL BE TREATED WITH SIMILAR CONFIDENTIALITY I -0 Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010 Approved For Release 2007 10 23 2 FINALLY I TO CLEARLY DISTINGUISH BETWEEN MYTH AND REALITY IN REGARD TO THE ISSUE OF CLASSIFICATION FOR COMMERCIAL I PRODUCTS WE HAVE GIVEN CAREFUL THOUGHT TO THIS ISSUE AND IF YOU WILL PERMIT ME TO CAREFULLY SET ASIDE FROM THIS DISCUSSION THE ISSUE OF PUBLIC AS IT APPLIES TO COMPUTER SECURITY WE CANNOT CONCEIVE OF A CONDITION THAT WOULD REQUIRE CLASSIFICA- TION 0F COMMERCIALLY-DEVELOPED COMPUTER SOFTWARE OR HARDWARE SYSTEMS FURTHERMORE IT IS CLEAR THAT TO DO SO WOULD SEVERELY IMPAIR THE EFFECTIVENESS OF THE CENTER AFTER ALL WHAT MANU- FACTURER WOULD COOPERATE IN THE EVALUATION OF HIS PRODUCT IF THIS COULD POSSIBLY LEAD TO CLASSIFICATION THAT WOULD RESTRICT HIS SALE OF THAT NOW LEST I BE MISUNDERSTOOD IT IS CONCEIVABLE THAT A PARTI- CULAR DOD COPY OF SUCH A PRODUCT MIGHT BE CONTROLLED AS CLASSIFIED TO PREVENT MALICIOUS TAMPERING WHILE BEING SIMILARLY SPECIFIC VULNERABILITIES IN THE CONTEXT OF A PARTICULAR DOD APPLICATION MIGHT BE CLASSIFIED BUT THE IMPORTANT THING IS THAT NONE OF THESE SORT OF CLASSIFICATION ACTIONS WOULD IN ANY WAY RESTRICT THE DISTRIBUTION OF THIS PRODUCT IN THE PRIVATE SECTOR IN SUMMARY LET ME SAY THAT WE HAVE A BIG JOB HERE THIS IS A SERIOUS UNDERTAKING WHICH WILL TAKE SUBSTANTIAL RESOURCES SMART PEOPLE AND HARD WORK THE THREAT IS A REAL MADE MORE PRESSING BY THE VERY OPENNESS OF OUR SOCIETY AND RELATIVELY EASY TARGET WE REPRESENT SECURITY CONTROLS MUST BE AS EFFECTIVE AS WE CAN HELP MAKE THEM WITHOUT-SERIOUSLY INTER- WITH THE FUNDAMENTAL PURPOSE FOR WHICH THE SYSTEMS ARE ACQUIRED TO MEET THESE OBJECTIVES WE WILL AGGRESSIVELY PURSUE WELL-FOCUSED RESEARCH AND DEVELOPMENT TO PROVIDE IMPROVED NOLOGY AND WE WILL STIMULATE EFFECTIVE USE OF THE TECHNOLOGY WE ALREADY HAVE TO FURTHER PROVOKE COMMERCIAL DEVELOPMENT WE WILL INSIST THAT THE SYSTEMS WE BUY INCLUDE THOSE ACHIEVABLE SECURITY CAPABILITIES THAT WE NEED FINALLY I WANT TO EMPHASIZE THAT THE SUCCESS OF THE COM- PUTER SECURITY CENTER WILL REQUIRE THE CLOSEST INTERACTION WITH INDUSTRY AND ALTHOUGH WE EMPHASIZE THE FREE AND OPEN EXCHANGE OF INFORMATION WE WILL RESPECT THEIR PROPRIETARY RIGHTS I MIGHT ADD THAT THIS CLOSE INTERACTION INCLUDES OTHER ELEMENTS OF THE TECHNOLOGY UNIVERSITIES TECHNICAL INSTI- TUTES AND PROFESSIONAL ASSOCIATIONS SUCH AS YOU AGAIN MY THANKS FOR THE OPPORTUNITY TO PRESENT MY VIEWS ON THIS SUBJECT AND FOR YOUR ATTENTION THIS MORNING Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0 I i f Approved For Release 2007 10 23 CIA-RDP83M00914R001800060010-0
OCR of the Document
View the Document >>