[net.legal] Testimony of Willis Ware

bts@unc.UUCP (Bruce Smith) (01/10/84)

I received a copy of this from Charles McGrew @ Rutgers (who mentioned
its availability to ARPAnauts in Human-Nets).  Here it is for those of
us who cannot FTP from ARPANET:
_____________________________________
Bruce Smith, UNC-Chapel Hill
decvax!duke!unc!bts (USENET)
bts.unc@CSnet-Relay (lesser NETworks)

==============================================================================
==============================================================================
Here's a partial reply to the point raised by Greg Davidson. I'm not a
lawyer, so don't take my legal suggestions as guarenteed legal possibilities
but at least I put the suggestion before a Congressional Committee.

This testimony was part of a series of 3 hearings, the other two being
on Sept. 26 and October 17. The series was designed to hear from the
research community (9/26), the government agencies (10/17) and the
private sector (10/24).

					   Willis H. Ware
					   Rand Corporation

==============================================================================

							11/14/83

			      Testimony of

			     Willis H. Ware

		INFORMATION SYSTEMS, SECURITY, AND PRIVACY

          Before the Subcommittee on Transportation, Aviation and
          Materials, Committee on Science and Technology, United
	  States House of Representatives*

			    October 24, 1983


INTRODUCTION

     My name is Willis H. Ware.  I am a member of the Corporate Research
Staff of The Rand Corporation, but the views I state today are solely my
own; they in no way reflect a position of The Rand Corporation nor of
its research clients.  Furthermore, my views do not come from a specific
contract, but rather reflect a decade of my attention to the issue.  I
am an electrical engineer by training, but have specialized in the field
of computer technology for over thirty years.

     My credentials for addressing the issue include the following.  In
1967, I was the first to bring the issue of computer security to the
attention of the technical field by organizing a special session on the
subject at a Joint Computer Conference in the spring of that year.
Subsequently, I chaired a Defense Science Board (Department of Defense)
committee to look at the issue of computer security which had never been
examined comprehensively anywhere in government.  The report was a
definitive treatment of the subject, and to this day remains an
excellent primer.  I have furnished three copies of that document to
this committee as background information.
____________
     *Additional material on electronic mail was orally presented but
did not appear in the originally submitted testimony.  This version
includes the additional material and has been slightly edited and
annotated.


                                  - 2 -

     Because of my work in computer security, I was asked in the early
1970s to join a special advisory group to the Secretary of HEW, and I
subsequently became its chairman.  Its report, "Records, Computers and
the Rights of Citizens," was the first comprehensive treatment of the
matter at the federal level.  It provided the intellectual foundation
for the Federal Privacy Act of 1974, which among other things created
the Privacy Protection Study Commission of which I was a member and vice
chairman.

     In addition to my participation in the activities noted above, I
have also spoken and written widely on the subject.  In particular, I
presented a paper, "Policy Aspects of Privacy and Access," to a National
Science Foundation symposium.  Although the paper will be published by
Crane-Russak as a special double issue of its journal "The Information
Society,"** I will forward three copies of it to the committee for
background information.


STATEMENT

     Congressman Glickman, it is a pleasure to have been invited here
today to talk with you about a subject that is of such importance, not
only to me professionally but also to the country.  Since time is
limited this morning, my presentation will be in the nature of a
hopscotch over a variety of points and ideas that I think will be of
significance for you.  I will elaborate or expand in any detail at your
request or on another occasion.

     Let me first clarify the relationship between security and privacy,
where I use the latter term in the context of record-keeping privacy;
namely, the use of information about people to make decisions and
judgments about them.  Record-keeping privacy concerns personal
information kept in computer-based systems, and the essence of it is
protecting such information and controlling its use for authorized
purposes.  In contrast, computer security is that body of technology,
techniques, procedures, and practices that provides the protective
mechanisms to assure the safety of both the computer systems themselves
____________
     **Issue 3/4, Vol. 2 is in press.  Anticipated date of publication
December 1983.


                                  - 3 -

and the information within them; and, in addition, limits access to such
information solely to authorized users.  Computer security is of
importance whether the information to be protected is personal in nature
and therefore relative to privacy; whether it is defense in nature and
therefore related to the security of the country; or whether it is
sensitive in nature and therefore relevant to corporate welfare in the
private sector.  The important point to be noted is that a comprehensive
set of security safeguards within and around a computer-based
information system is an essential prerequisite for assuring personal
privacy.  To operate such a system without relevant safeguards is a sham
against privacy assurance.

     The computer security issue must be seen as analogous to the
classical offense/defense situation.  As computer security safeguards
become stronger, the offenses against them will become more
sophisticated and the cycle will repeat.  Therefore, no organization or
Congress can assume that the computer security issue is one that can be
looked at and forgotten.  It first surfaced on the professional scene
only fifteen years ago; we are still low on the learning curve with
regard to knowing how to incorporate comprehensive protection mechanisms
in our systems.  It is an evolving issue, not a static end-of-the-road
one to be dismissed.  Therefore, I would recommend to you that:

     It be a standing agenda item for this or other committees of
     the Congress to look at every year or so for at least the next
     five and possibly the next ten years.
     
     Next, let me contrast the security situation in the defense
environment versus that in the commercial/industrial world.  Within
defense the threat against computer-based systems includes the full
technical resources of advanced major world powers, where such threats
can be mounted with substantial funding and other resources.  In the
Department of Defense context, therefore, the threat includes intense
technical aspects as well as aspects involving people -- such as buying
them for subversive actions.  On the other hand, the defense community
does go through an investigative process to grant formal clearances to
people; therefore, it has substantial assurance of trustworthiness.


                                  - 4 -

     In the commercial sector, on the other hand, the technical threat
is at present minimal.  The big threat is people within the systems
themselves.  If one examines, for example, the Parker/SRI database of
computer-related criminal actions, he finds that the great bulk of them
have been perpetrated by an individual who was authorized to interact
with the system and who knew enough about it to exploit it for personal
gain.  Furthermore, there is generally little attention paid in the
commercial world to establishing trustworthiness of individuals in
critical and sensitive positions within a computer-based information
system.  Some corporations do essentially nothing by way of assuring the
trustworthiness of critical individuals; others take the minimal step of
requiring that individuals be bondable -- a really minimum level of
assurance of trustworthiness; and very few, perhaps none, engage in a
comprehensive background investigation.  When the private sector gets
the "people problem" dimension of the threat against its computer
systems under control, and the simple technical threats protected
against, then sophisticated technical threats will become more
important.

     Let us examine the last point more closely.  What can we do about
the simple technical threats, such as those used in the Milwaukee-414
caper, or those involved in the various criminal acts of the SRI
database?  The dominant point is:  technology is not the issue.  There
are ample technological safeguards that can be installed, and would be
effective against many of the crimes that have been perpetrated and
against many of the mischievous pranks that have occurred.  There are
also procedural and administrative safeguards that can be important
deterrents.  In the private sector, we need only the corporate will to
address the problem, and the corporate commitment to put the issue on
the same level of concern as that of protecting other valuable
resources.  By implication, we also need the corporate commitment to
spend the modest sums needed.  Importantly, we need private sector users
of computers to signal the computer industry that technical safeguards
are wanted, are essential, and will be paid for.


                                  - 5 -

     Do not underestimate that last point.  Until the IBMs, the DECs,
the Burroughs, the UNIVACs, and others of the commercial computer
industry understand that their respective customer bases want technical
security safeguard features, the product lines will not have them.  I
would suggest that the government has a major leverage on this issue.
It can make mandatory the inclusion of appropriate technical security
features in computer systems that it procures.

     Consider now the people aspect of the threat.  It is a hard one to
counter because one cannot legislate trustworthiness, and even the most
extensive background investigation may not reveal deeply hidden or latent
problems.  To start with, we must do all that is possible with technical
procedural safeguards; a good array of them will fend off many people
problems.  We might take legal steps.  One possibility for encouraging
private sector response would be to create a basis in law for acting
against the record-keeping installation for negligence should state-of-the-
art security safeguards not be in place.

     It might be possible to extend the principle of the attractive
nuisance, which in a sense is really what happens with 414-type activities.
A computer system is not a physically attractive nuisance, but rather an
intellectually attractive one that causes imaginative or criminally minded
people to hack at computer systems.  The legal principle of an attractive
nuisance encourages people to build fences around swimming pools -- at
least in California; perhaps the same notion can be elaborated or
reinterpreted to encourage operators of computer systems to install
appropriate safeguards.

     Incidentally, for the most part we are not talking about large
dollar investments.  Clearly, if an organization operates its computer
center behind a plateglass window and encourages casual visitors to
wander among the equipment, there might be a significant initial
investment to physically secure the facility and provide it with
appropriate physical and fire protection.  Beyond this phase though,
many organizations find that important security safeguards can be
installed as part of changes that are made for other reasons and the
costs of such security changes are frequently unnoticeable.  Cost will
not be zero but neither will it be burdensome.


                                  - 6 -

     What about technical safeguards against the people threat?  There
are attractive options and I will illustrate with two examples.  When an
individual logs on to a computer system, he is normally requested to
supply personal identification and a password which, in effect, is an
authentication of his identity.  Someone attempting to penetrate a
computer system tries to guess his way in by masquerading as a
legitimate user.  Most systems today permit an indefinite number of log-
on trials.  It therefore is feasible for a perpetrator to program a
small computer to systematically try words, combinations of letters and
characters, or other possible passwords until one is found that works.
The movie "WarGames" showed such a penetration very realistically and
accurately.

     Clearly, this is an undesirable and unsafe arrangement.  There is
no reason why a computer should not disconnect an individual after some
number of attempts, such as three or five, and keep him disconnected
until his authenticity has been assured.  Three weeks ago you heard from
Mr. McClary of the Los Alamos National Laboratory.  He did not mention
the arrangement at Los Alamos with regard to passwords, but since I
happened to have discussed computer security with LANL recently, let me
indicate how it is handled.

     If an individual -- and it might be a respected, established senior
researcher of national repute -- fails to log on after a number of
tries, such as three or five, his account is completely disabled until
he personally appears at the security office and explains why he was
unable to type his password successfully after the prescribed number of
tries.  If he fails to log on successfully in a second series of
attempts, his supervisor is required to explain in writing why the
individual in question seems not able to type correctly.  While this
process might seem stringent and it is undoubtedly annoying to an
individual, nonetheless disabling repeated log-on attempts is an
appropriate arrangement to fend off penetration attempts by guessing in.
The media reported the Security Pacific National Bank as having diverted
a presumed penetrator by offering him a game to play while tracing the
origin of the call; such an approach is obviously a very imaginative and
appropriate deterrent.


                                  - 7 -

     A second example.  Since every computer system has to be started at
some time, invariably there is a mechanism for accomplishing what is
called the initial software load.  Often this takes the form of a
button, a switch, or a sequence of actions by the console operator.
Imagine a scenario in which an operator on the graveyard shift finds the
machine inactive and decides to do something in his own behalf such as
illegally copying a sensitive file of information.  Having done so, he
simply reloads the machine as though it had stopped for some reason;
there will be no record of what he has surreptitiously done.  There are
obvious technical offsets to such malfeasance by operators, but they do
not exist in marketed machines.  Even the procedure of two-person
control as used by the military would be a deterrent.

     We need a menu of technical features that machines should have in
order to help offset aspects of the people-threat problem.  Let me offer
you a recommendation:

     Task the Institute of Computer Science and Technology of the
     National Bureau of Standards to produce such a list of options,
     and consider making it mandatory in government acquisitions
     of computer systems.
     
     Now to the question of where the wisdom will come from within
government to deal with the broad dimensions of computer security.  I
remind you that there are technical aspects of it related to not only
hardware and software but also to communication security and radiation
security (TEMPEST); but in addition there are physical, procedural,
personnel, and administrative aspects.  Every one has to be attended to,
especially the last three.  A computer system with the best technical
safeguards can be readily penetrable if it is operated with sloppy and
careless procedural and administrative arrangements by people with
uncertain backgrounds.  Where will the government develop the guidance
that it needs on these many dimensions?

     Many of them are already in hand because they are understood for
other reasons.  For example, the Department of Defense certainly knows
how to deal with physical security and with personnel security; its


                                  - 8 -

experience is available to other agencies of government as might be
needed.  The TEMPEST radiation issue is understood and safeguards for it
exist.  There are many private organizations today that can advise on
fire protection, physical protection, personnel control, and the likes.
But, in government where does the technical software/hardware guidance
come from?  And where does the contextual administrative and management
guidance come from?

     What are the government's principal assets?  You heard from them on
October 17; the Institute of Computer Science and Technology of the
National Bureau of Standards, the Computer Security Center of the
National Security Agency, and GSA.  Take the CSC first.

     The focus of concern in CSC is "trusted systems" and especially
"trusted software."  Understand the word "trust" as you would
intuitively think of it; namely, one can have confidence that the system
or the software will do what it is supposed to do, and one can have
confidence that it will not do what it is not supposed to do.  Keep in
mind that CSC is a Department of Defense entity, and therefore its focus
of concern is on defense systems and especially with a sophisticated
technical threat.  It can and it will provide expertise to address the
software/hardware issue.

     I suggest to you that the problem of incorporating security
safeguards in software -- and of knowing that they are really there and
functioning correctly -- is so difficult technically and the country's
expertise is so miniminal on it, that we can staff only one such Center
at the moment.  We would be wise to place all our eggs in this one
basket with regard to trusted software until additional expertise can be
developed over the next five to ten years.  While CSC will also be
concerned with other security aspects of systems that contain both
computers and communications, it will not be concerned with the general
administrative and procedural environment in which secure systems must
be operated.

     The ICST of the NBS is also involved in technical work.  For
example, it was the source of the Digital Encryption Standard some five
years ago and it made a very significant contribution to the protection
of information while in transit through a communication network.  It
also publishes the "Federal Information Processing Standards" which deal


                                  - 9 -

with such issues as the use of DES, the management of keys for it, risk
assessment and risk management.  But, neither the ICST nor the CSC is
providing the comprehensive overview that can stipulate:

     o   Here is how one runs a computer system and does it securely.

     o   Here are the procedural and administrative safeguards that must
         be in place.

     o   Here are the specific risks that people represent.

     o   Here are the countermeasures that can be taken against the
         nontechnical threats.

     o   Here are the management mechanisms to oversee security
         safeguards.

     o   Here are the general protective precautions that can be taken.

         Etc.

     No entity in government has addressed the general policy issue of
what constitutes a comprehensive top-to-bottom prescription for
installing security controls, nor identified the many dimensions of such
a policy and made it available as guidance.  It is being done piecemeal;
every agency is inventing it for itself or not doing it.  There is some
policy guidance in the DoD in the form of general regulations and
directives.  There are interagency committees and technical
organizations in which people can trade ideas and talk with one another.
In the private sector, major corporations have built their own policy
structures and implementing details.

     The government truly needs a comprehensive "how to do it" document
that sets forth preferred practices and procedures for operating a
secure computer system.  The private sector could well use the same
thing.  The ideas and the information exist but everything is scattered.
The information is not collected and coordinated; it is in people's
heads or embodied in daily activities and not otherwise documented.  We
-- the country -- need to organize the collective wisdom of what is
known and what is being done and make it widely available.

     As a first step, I would note that the General Services
Administration has had a major role in government, and it therefore
seems reasonable to recommend that:


                                 - 10 -

     You task the GSA to compile such a comprehensive handbook of
     preferred practices and procedures for running a computer
     center securely.

It is not a big undertaking.  It is not an endeavor for tens or dozens
of people working for many years.  One could survey the federal agencies
and a selected set of large corporations, assemble the composite wisdom
of what is being done and what is known, and get it written down.  I
would submit that it is a chore for a few people for a year or so.

     Mr. Stephen Walker testified before you on September 26 and
suggested a Federal Center to undertake some of the tasks that I have
suggested above be done by ICST and the GSA.  Such a Federal Center
would undoubtedly be a good idea and we clearly could well have one in
the long run.  CSC cannot do everything; moreover, some of its technical
knowledge can never be shared because of national defense reasons.  But
in the large, CSC represents an innovative opportunity for interaction
between the federal government and the commercial sector.  It can
respond to technical issues and it can examine and certify commercial
software products for trustworthiness; but CSC is not likely to concern
itself with the less esoteric and more mundane issues that a Federal
Center might accommodate.  Until, and if, we get such an organization in
place, however, there is no reason why the ICST and the GSA ought not do
what clearly can be done now.

     I do not want to conclude this testimony without touching briefly
on privacy.  First, let me clarify a statement which I believe was made
to you by Congressman Wirth.  I disagree strongly with his observation
that all the aspects of privacy have now been attended to.  In fact,
most of the recommendations that were made by the Privacy Protection
Study Commission have not been implemented in law, and moreover there
are new dimensions of privacy that the PPSC did not identify nor treat.
To date, privacy has been interpreted in the context of record-keeping
processes, but it is clear that the widespread application of computer
and communication systems to provide a broad spectrum of services will
eventuate in many new dimensions of privacy.


                                 - 11 -

     We are seeing the emergence of systems that contain vast amounts of
information about people but not for record-keeping purposes.  Let me
illustrate in terms of electronic mail, which the U.S. Postal Service is
promoting as E-COM.  The purpose of such a service is to transport
information from sender to addressee and to the extent that such
information is personal in nature, the system will contain much
information about people but not for record-keeping purposes.  In
addition to the message content, the system will contain information
relating addressee to sender.  In principle, such information could be
used to establish relationships among groups of people, such as
organized groups or circles of acquaintance.  Obviously, such
information could be of high interest to the law enforcement community
and others, but the legal umbrella of protection over it is confused and
probably incomplete.

     Whatever one believes about the security of information in the
hands of the USPS's E-COM, it is clear that private offerings of
electronic mail, such as by MCI and GTE, are another question.   In the
case of the latter there is little, if any, legal protection for message
information in the hands of private organizations.

     I will develop the issue more fully with two examples relative to
electronic mail.  In a federal agency, the in-house investigative staff
on at least three occasions obtained a complete printout of the
electronic mail system that provides office-automation support.  On at
least one occasion, an outside law enforcement entity was also involved.
In effect, several hundred workers who use electronic mail in the
conduct of their business had all their computer records read; and in at
least one instance, an indvidual was intimidated.  The privacy of the
workplace records of hundreds of people had been invaded; hundreds of
people were caught up in an investigative sweep without recourse to
protect themselves.

     It all sounds very much like search-and-seizure without due process
of law, or like a fishing expedition to see if something wrong had
happened or if some crime had been committed.  In this instance, the
computer happened to be agency-owned; one wonders what the situation
might have been if the mail service had been provided by a commercial
vendor whose computer would be located on private premises?


                                 - 12 -

     I do not know the motivations of the investigative groups; I have
only one side of the story.  Perhaps they were tracking down hackers, or
maybe it had to do with possible fraud or embezzlement.  I have no wish
to make this incident a cause celebre, but it is very useful to
underscore the ease with which new privacy issues arise as computer and
communications technology is exploited to provide a wide variety of new
services to a wider and wider population of users.

     It is an example of a new dimension of privacy -- "access without
action"; computer matching of files exhibits the same dimension.
Individuals who happen to keep records in a computer system or who are
record subjects in a computer file have their privacy invaded whether or
not an individual has done something wrong.  Private information gets
exposed to a third party and possibly to hostile eyes.  In effect, all
the hundreds of office workers or all the data subjects in a computer
file have, a priori, been assumed to be guilty; the examination of mail
or the matching of computer records is to demonstrate that they are not.
Much information about people has been seen but no action taken.  It
sounds like a back-end-to process of justice.

     There are some happy aspects of the office-automation seizure.  In
such a system, hundreds of people will keep hundreds of messages each;
there will be tens-of-thousands of messages altogether.  Only two
aberrant ones were found: a baby sitter's phone number and a cooking
recipe.  The odds are that each item, admittedly personal, was
transmitted more efficiently by electronic mail than by a phone call or
a walk to another person's desk; the electronic mail system surely
diverted much less people time from the job than any other means of
interpersonal communication.

     Certainly there are management problems in assuring that corporate
or business resources are not used for personal reasons, but I salute
the management discipline of an agency that operates such a tight
facility -- two items out of many tens-of-thousands is really an
infinitesimal ratio; and I acknowledge the integrity of the hundreds of
people who are using it.


                                 - 13 -

     Let us examine the possibility that an agency of government were to
use a commercial electronic mail service which is supplied by a computer
host that is most likely not in the District.***  There is no question but
that electronic mail is an efficient mechanism to facilitate the conduct
of business in any large organization; that is not the issue.  What are
the risks to such an arrangement?  I can offer some considered
observations -- which importantly would not be unique to any one private
sector vendor.

     o   It is unlikely that the phone lines, whether dial-up or
	 dedicated, between Washington and "the other state" would be
         protected by an encryption process.  Electronic eavesdropping
         and wiretapping would therefore be possible threats.

     o   It is unlikely that the computer system would have special
         security safeguards because commercial equipment is often used
         for such services.  One would assume that the vendor has
         provided appropriate physical, admininstative, and personnel
         safeguards.

     o   Since the electronic traffic would flow across state lines, it
         becomes a matter for federal law; but there is no law under
         which the information would be protected.

     o   In principle, the body of computer-contained electronic mail
         would be subject to the same seizure as the office workers
         experienced; the private vendor would have no legal standing to
         resist.  While I would not suggest for a moment that some
         agency of government would set out to seize the electronic mail
         of another, a dissident group might and such mail could get
         caught up in an investigative sweep aimed at someone else.


____________
     ***After the presentation of this testimony, the author's attention
was called to a "New York Times" article (White House Link: Computer in
Ohio; David Burnham, July 13, 1983, Late City Final Edition, page 18,
section A, column 4) which describes the Executive Data Network which
provides the Executive Branch of government with electronic mail
services from a system in Columbus, Ohio.  The article also reported by
name the officials who were to use it.


                                 - 14 -

     Why all my emphasis on both security and privacy of electronic
mail?  You must not think of electronic mail as solely the electronic
analog of the envelope.  Perhaps one fourth of my business interactions
and transactions occur electronically; at the moment there are about 600
messages in my mailbox and it can get as high as a thousand.  Why?  It
represents the written record of my conduct of business with a variety
of individuals and organizations; it is much more efficient than writing
letters, making phones calls, and then writing memoranda-of-record.
Moreover, I can organize the messages by folders and subfolders so that
the system becomes a comprehensive automated filing and information
retrieval system.  Anyone having access to such a body of information
might as well have the key to the office and to its file cabinets.

     Such comprehensive business records service is what electronic mail
is really all about, and it is the service that will be offered by the
private sector.  Can you imagine the situation when all that information
-- both private and corporate -- gets into electronic mail systems?  Can
you imagine what a lucrative target it will become for all sorts of
reasons?  The computer matching we have seen so far will be nothing
compared to what might arise when someone thinks about comparing files
from electronic mail systems.

     Here are some of the issues for information in such systems:

     o   It is not clear who owns it.  Does the owner of the computer
         system per se own it?  Does he have the right to witch-hunt
         through the information in his system as he sees fit?  Or is
         asked to by a third party?

     o   It is not clear if, or by what law, it is protected.  What will
         be the situation for intrastate offerings of service vs.
         interstate offerings?  And in the long run, for international
         offerings?

     o   It is not clear what the search-and-seizure situation is; can
         the private vendor be given legal standing to resist?  What
         should be his obligations to the users of his system in case of
         attempted seizure?



                                 - 15 -


     o   It is not even clear what the liability of the purveyor of the
         service might be, should something happen to one's electronic
         mail records.  What is his responsibility or obligation if his
         system accidentally spills information to the wrong party?
         What is his responsibility if his maintenance people
         accidentally see such mail information and use it for private
         gain, for personal embarrassment, for political advantage, or
         for a breach of national welfare and security?

     o   What are the vendor's obligations to provide comprehensive
         security safeguards for his system?  Should they be mandated by
         law?  Should it be caveat emptor?  For private sector and
         government use alike?  Should the government be concerned that
         so much corporate information might be subject to penetration
         by unfriendly agents?

     o   How should electronic mail be treated relative to telephone
         conversations?  Over the years, certain privacy protections
         have arisen for telephone billing records; formal legal
         processes are necessary to wiretap or to obtain records.
         Should similar protections exist for electronic mail?  Within
         government, as well as in private sector, as well as in
         regulated public utility?

     Many of these same concerns will also be pertinent to other
systems.  For example, there is voice mail which is the spoken analog of
electronic mail -- a service which is actively being promoted by private
vendors and by various telephone companies.  Voice mail has all the
vulnerabilities that electronic mail has when offered by public vendors;
moreover, an intruder can always claim that a particular individual's
voice can be recognized although his typed signature can be forged by
someone else at the keyboard.  Encryption techniques can be used to
protect electronic mail but present systems do not offer sender-to-
reader encryption options.  It is much more difficult technically to
provide speaker-to-listener protection for voice mail.


                                 - 16 -

     There is, in addition, the body of information which is collected
about people by point-of-sale systems, by debit card systems on the
merchant's premises, by automated checkout stands in grocery stores, and
a whole host of others.  In each case the system exists for some purpose
other than the traditional record-keeping one; each happens to contain
information about people as a collateral consequence of its primary
intent.  But the whole subject of privacy ahead, of what the future
holds for privacy, of what its new dimensions are, is for another day;
I have left you just a little teaser of what it will be all about.
Clearly, electronic mail is upon us now.

     Let me speak to the issue of a National Commission.  Congressman
Wirth and Mr. Parker suggested to you on September 26 that a national
commission to investigate computer crime would be appropriate.  A year
or so ago I suggested at a National Computer Conference that a National
Commission would be an appropriate forum in which to examine possible
vulnerabilities of our highly computerized society.  The fact is that
there is a whole set of interrelated issues that could well be
collectivly examined by a congressionally chartered commission.  The
common element to all of them is information handling as performed by
computer and communication systems.  Included would be such things as
computer-related crime, new dimensions of privacy, national
vulnerability as a result of computerization, representation of
information, social consequences of intensive computerization, personal
identification in a highly automated society, dislocations of power as a
result of concentrations of information, and others.

     My personal experience with the Privacy Protection Study Commission
persuaded me that a congressionally chartered commission is an
appropriate mechanism to address broad national issues that transcend
the jurisdictional boundaries of federal agencies and also transcend
public and private sector interests.  Such a commission can provide an
enormous bargain for the country in terms of work accomplished.  For
example, the PPSC delivered about 60 man-years of research on the
subject of record-keeping practices in the private sector for about $2.5
million.  That equates to about $40,000 per person-year of effort which
is about one third of what it would cost if done by a contractor.  In my


                                 - 17 -

view there is a right and a wrong way to structure a commission, but
that is a subject for another time if the Congress should be persuaded
to move that way.

     Congressman Glickman, I have given you a once-over-lightly on some
aspects of a very intricate and complex issue.  I would be glad to deal
in more depth with such aspects as you may wish, either in writing or
personal discussion with your staff.  There must be a national concern
for providing adequate security protections in our public and private
information systems and for attending the new privacy issues that arise.
We know a lot about doing it, but it needs to be organized into a
concerted effort.  If the Congress has the will to pursue this issue and
to pay sufficient attention to it, my feeling is that the time is right
for action.

     To begin with, let's get the GSA going; let's put ICST to work;
let's address electronic mail as the most pressing of the new dimensions
of privacy.  Let's think about making 1984 "the right year" to launch a
Commission to comprehensively examine the many issues of which we have
talked.

[At the conclusion of the testimony and questions, the chairman,
Congressman Glickman, read excerpts from a "New York Times" article
(Computer Intrusion Reported in 18 Companies and U.S. Agencies; Joseph
B. Treaster, Sunday, October 23, 1983, page 21).  It described the
penetration of the Telemail service offered by GTE, and the apparent
access to the electronic mail of major U.S. companies such as Raytheon,
Coca-Cola U.S.A., the 3M Company, and of several federal agencies such
as NASA and the Department of Agriculture.]


--------

Note added in proof:

Subsequent to the completion of this document, a "New York Times"
article discussed the incident referenced anonymously on page 11 above
(Can Privacy and Computer Coexist?; David Burnham, Saturday, November 5,
1983, page 11).  It identified the "federal agency" as the Army's DARCOM,
the "in-house investigative staff" as the Army's Criminal Investigation
Division, and the "outside law enforcement entity" as the FBI.  It also
mentions that the incident was originally described in an ARPANET
message and includes quotes from it.  In addition, it paraphrases three
responses from various identified individuals.


=================================== END ======================================