Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.

Google
 
Web cryptome.org cryptome.info jya.com eyeball-series.org cryptome.cn


18 June 2002


[Federal Register: June 18, 2002 (Volume 67, Number 117)]
[Notices]
[Page 41399-41400]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr18jn02-37]

-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No. 020503109-2109-01]
RIN 0693-AB51


Establishment of Information Technology Security Validation
Programs Fees

AGENCY: National Institute of Standards and Technology, Commerce.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: The National Institute of Standards and Technology (NIST)
operates a number of Information Technology Security Validation
Programs. Under these programs, vendors use independent private sector,
accredited testing laboratories to have their products tested. The goal
of the Information Technology Security Validation Programs is to
promote the use of validated products and provide Federal agencies and
other users with a security metric to use in procuring software and
equipment. The results of the independent testing performed by
accredited laboratories provide this metric. NIST validates the test
results and issues validation certificates. NIST also posts and
maintains the validated products lists on the Computer Security
Division Web site. The Information Technology Security Validation
Programs currently do not charge a fee for their services, but demand
for these services as increased over 1800% since 1996 in some cases.
This growth has resulted in significantly increased expense to NIST for
program management and associated functions. NIST issues this notice to
adopt a fee schedule for some of the Information Technology Security
Validation Programs, with fees being set individually for each program.
The fees will allow NIST to continue and expand the Information
Technology Security Validation Programs.

DATES: This notice is effective July 18, 2002.

FOR FURTHER INFORMATION CONTACT: Ray Snouffer, Computer Security
Division, National Institute of Standards and Technology, 100 Bureau
Drive, Stop 8930, Gaithersburg, MD 20899-8930, telephone (301) 975-
4436, e-mail: ray.snouffer@nist.gov.

SUPPLEMENTARY INFORMATION: Federal agencies, industry, and the public
now rely on a number of measures for the protection of information and
communications used in electronic commerce, critical infrastructure and
other application areas. Though these measures are used to provide
security, weaknesses such as poor design can render the product
insecure and place highly sensitive information at risk. Adequate
testing and validation against established standards is essential to
provide security assurance. NIST operates a number of established
Information Technology Security Validation Programs. Under these
programs, vendors use independent private sector, accredited testing
laboratories to have their products tested. The goal of the Information
Technology Security Validation Programs is to promote the use of
validated products and provide Federal agencies and other users with a
security metric to use in procuring software and equipment. The results
of the independent testing performed by accredited laboratories provide
this metric. Federal agencies, industry, and the public can choose
products from the Validated Products List and have increased confidence
that the products meet their claimed levels of performance and
security.
    NIST validates the test results and issues validation certificates.
NIST also posts and maintains the validated products lists on the
Computer Security Division web site. Since the IT standards, security
specifications, and NIST security recommendations, which underlie the
testing programs must be flexible enough to adapt to advancements and
innovations in science and technology, NIST continually performs
reviews and updates. This process is based on technological and
economical changes, which require research and interpretation of the
standards.
    The Information Technology Security Validation Programs currently
do not charge a fee for their services, but demand for these services
as increased over 1800% since 1996 in some cases. This growth has
resulted in significantly increased expense to NIST for program
management and associated functions. NIST proposes to adopt a fee
schedule for some of the Information Technology Security Validation
Programs with fees being set individually for each program. The fees
will allow NIST to continue and expand the Information Technology
Security Validation Programs. Fees will be subjected to an annual cost-
analysis to determine if the fees need adjustment.
    The first Information Technology Security Validation Program to
charge a fee will be the Cryptographic Module Validation Program
(CMVP). Each of the Rating Levels (1-4) will have a different fee.
Every Validation report will be charged a ``baseline'' fee. Baseline
fees will accompany each validation report submitted to NIST.
Validation reports will not be reviewed until such time as NIST
receives payment of the baseline fee from the vendor. Validation
reports that necessitate extended evaluation and collaboration with the
certifying laboratory will be charged an additional ``extended'' fee.
The baseline and extended fees for each Rating Level will be:

------------------------------------------------------------------------
                                                                  Total
                   Level                    Baseline  Extended  possible
                                               fee       fee       fee
------------------------------------------------------------------------
1.........................................     $2750     $1250     $4000
2.........................................      3750      1750      5500
3.........................................      5250      2500      7750
4.........................................      7250      3500    10750
------------------------------------------------------------------------
 All fees are given in US dollars.

    The levels specified above are commensurate with the security
testing levels applied by the Cryptographic Module Testing laboratories
in determining compliance with FIPS 140-2. A government and industry
working group composed of both users and vendors developed FIPS 140-2.
The working group identified eleven areas of security requirements with
four increasing levels of security for cryptographic modules. The
security levels allow for a wide spectrum of data sensitivity (e.g.,
low value administrative data, million dollar funds transfers, and
health data), and a diversity of application environments (e.g., a
guarded facility, an office, and a completely unprotected location).
Each security level offers an increase in security over the preceding
level.

    Authority: NIST's activities to protect Federal sensitive
(unclassified) systems are undertaken pursuant to specific
responsibilities assigned to NIST in section 5131 of the Information
Technology

[[Page 41400]]

Management Reform Act of 1996 (Pub. L. 104-106), the Computer
Security Act of 1987 (Pub. L. 100-235), and Appendix III to Office
of Management and Budget Circular A-130. NIST's authority to perform
work for others and charge fees for those services is found at 15
U.S.C. 273 and 275a.

    Classification: Because notice and comment are not required under 5
U.S.C. 553 or any other law, for matters relating to agency management
or personnel or to public property, loans, grants, benefits, or
contracts, a regulatory flexibility analysis (5 U.S.C. 601 et seq.) is
not required and has not been prepared.
    Executive Order 12866: This notice has been determined to be not
significant for the purposes of Executive Order 12866.

    Dated: June 12, 2002.
Karen H. Brown,
Deputy Director.
[FR Doc. 02-15278 Filed 6-17-02; 8:45 am]
BILLING CODE 3510-13-P