speeches · September 9, 1987

Regional President Speech

Silas Keehn · President
S. KEEHN REMARKS INFORMATION SECURITY CONFERENCE SEPTEMBER 10, 1987 I. WELCOME - GIVEN THE SIZE OF OUR AUDIENCE, AND THE NATURE OF REPRESENTATION, TOPIC OBVIOUSLY OF GREAT INTEREST AND IMPORTANCE. A. TEN YEARS AGO, WE PROBABLY WOULDN'T HAVE HELD SUCH A MEETING. 1. THE NEED SIMPLY WASN I T THERE THEN - NOT TO SUGGEST THAT SECURITY WASN'T IMPORTANT - CERTAINLY IT WAS. 2. BUT RATHER, THE NATURE OF THE SECURITY PROBLEM WAS MUCH DIFFERENT. 3. SECURITY MEASURES WERE EASIER TO DEAL WITH - THEY WERE MUCH MORE STRAIGHT FORWARD. ~- TRADITIONAL SAFEKEEPING METHODS WERE QUITE ADEQUATE TO ASSURE ESSENTIAL PROTECTION. B. 1HE DEVELOPMENT (READ REVOLUTION) OF ELECTRONICS HAS CHANGED ALL OF THAT AND HAS ASSAULTED TWO OF THE ABSOLUTELY ESSENTIAL ELEMENTS OF BANKING AND OTHER FINANCIAL SERVICES ENTITIES. 1. lHE PROTECTION OF ASSETS. 2. MAINTAINING THE INTEGRITY AND ABSOLUTE CONFIDENTIALITY OF INFORMATION. Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis C. BEFORE THIS REVOLUTION, PROCEDURES COULD AND WERE DEVELOPED WHICH SAFEGUARDED THESE ESSENTIAL KEYSTONES. 1. THESE PROCEDURES, WHILE CERTAINLY NOT FAILSAFE, NONETHELESS PROVIDED A HIGH LEVEL OF ASSURANCE THAT VIOLATIONS COULD NOT BE EASILY ACCOMPLISHED AND COULD BE DETECTED. D. BUT TO SAY THE OBVIOUS, THE WORLD IS VERY, VERY DIFFERENT NOW. 1. VIRTUALLY EVERYTHING, FINANCIAL RECORDS, DATA, INFORMATION, CORRESPONDENCE - ALL OF THE ITEMS OF EXTREME IMPORTANCE TO AN ORGANIZATION ARE MAINTAINED IN SOME TYPE OF ELECTRONIC MODE. 2. WITHOUT SPECIFIC CONTROLS AND MONITORING MECHANISMS A. THESE RECORDS ARE NOW MORE ACCESSIBLE TO VIOLATION. B. DETECTION IS HARDER. C. IT CAN OCCUR ALMOST UNNOTICED. II. THE RISKS HERE ARE, OF COURSE, ENORMOUS. A. FIRST THERE IS THE RISK OF FINANCIAL LOSS. PAGE 2 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis 1. THERE ARE ALL SORTS OF SCARE STORIES, AND WE I VE ALL HEARD THEM, WHICH CAN'T HELP BUT PUT MANAGEMENT ON THE EDGE OF ITS CHAIR. 2. SOME YEARS AGO IN A FORMER ORGANIZATION - AND I EMPHASIZE BEFORE I JOINED THE FEDERAL RESERVE BANK OF CHICAGO - I HAD SUCH AN EXPERIENCE. 3. I HAD THE MANAGEMENT RESPONSIBILITY FOR OPERATIONS AT A BANK WHERE A $1,000 WI RE TRANSFER WAS ERRONEOUSLY ESCALATED TO $1 MILLION, TRANSFERRED TO A FOREIGN DEPOSIT ACCOUNT AND THEN FRAUDULENTLY REMOVED FROM THE ACCOUNT AT THE OTHER END. 4. NOT ONLY DID WE EXPERIENCE THE FINANCIAL LOSS BUT THE ATTENDANT PUBLICITY WAS EXCRUCIATING AND PREDICTABLY THE RESULTING LEGAL FEES AND OTHER EXPENSES WERE ALMOST AS HIGH AS THE LOSS OF THE TRANSFER. B. OTHER THAN THE FINANCIAL LOSS THERE IS THE SERIOUS RISK THAT INVOLVES THE INTRUSION INTO HIGHLY CONFIDENTIAL DATA OR INFORMATION. 1. ALL ORGANIZATIONS POSSESS DATA AND INFORMATION THAT IS OF UTMOST IMPORTANCE TO THEIR PARTICULAR INSTITUTION. WHEN IT WAS MANUALLY MAINTAINED, IT COULD EASILY BE PLACED IN A FILE DRAWER, PERHAPS UNDER DUAL CONTROL. INTEGRITY WAS PRETTY GOOD. Digitized for FRASER PAGE 3 https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis 2. BUT NOW THAT IT IS STORED ELECTRONICALLY, ACCESS IS A DIFFERENT QUESTION. C. INTRUSION THAT INVOLVES EITHER OF THESE RISKS, FINANCIAL LOSS AND/OR EXPOSURE OF CONFIDENTIAL INFORMATION, EFFECTS THE CONFIDENCE IN AND INTEGRITY OF THE PARTICULAR INSTITUTION AND CAN RESULT IN PRETTY AWKWARD EMBARRASSMENT. D. HARDLY A DAY GOES BY THAT l DON T WORRY THAT SOMEONE OUT THERE 1 (OR EVEN WORSE SOMEONE WITHIN OUR OWN INSTITUTION) IS WORKING AWAY AT A PLAN TO VIOLATE OUR SAFEGUARD PROCEDURES AND GAIN ACCESS TO FINANCIAL ASSETS OR INFORMATION. 1. MAJOR FINANCIAL INSTITUTIONS FIRST HAVE TO REPRESENT AN IRRESISTIBLE TARGET FOR THESE KINDS OF PEOPLE. E. SOMEHOW THIS SEEMS TO HAVE BEEN AN ISSUE THAT HAS RATHER CREPT UP ON US. 1. IN FORMER DAYS, AS l SUGGESTED, SECURITY ISSUES HAD A DIFFERENT DIMENSION. A. SAFEGUARD PROCEDURES WERE DEVELOPED, PUT IN PLACE AND AUDIT CHECKS ASSURED ADHERENCE. B. SENIOR MANAGEMENT, THEREFORE, DID NOT NEED TO BE INVOLVED ON A DAY-TO-DAY BASIS. 2. BUT ELECTRONICS, OF COURSE, HAVE CHANGED THIS. ACCESS ISSUES ARE ENTIRELY DIFFERENT. Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis n Arr- /1 A. SENIOR MANAGEMENT MUST BE INVOLVED; CLEARLY THIS IS AN IMPORTANT MANAGEMENT ISSUE. B. AND IT IS ONE THAT MUST RECEIVE OUR CONTINUING ATTENTION. III. THE RATE OF TECHNOLOGICAL CHANGE IS QUITE INCREDIBLE. A. PROCEDURES THAT WERE APPROPRIATE LAST YEAR MAY NOT BE TODAY AND CERTAINLY WON'T BE TOMORROW. B. THE VOLUMES AND VELOCITIES HAVE GOTTEN VERY, VERY LARGE - AND RAPIDLY. 1. AT OUR BANK LAST YEAR, ALMOST $21 TRILLION IN FUNDS WERE TRANSFERRED OVER THE FEDERAL WIRE. 2. THE AVERAGE TRANSACTION WAS $9.2 MILLION. 3. ON A BROADER SCALE, IT IS ESTIMATED THAT THE DAILY VALUE OF TRANSFERS ON FEDERAL WIRES IS ABOUT $1 TRILLION. C. WHILE THESE NUMBERS ARE GROWING AT A STAGGERING RATE, THERE IS ANOTHER IMPORTANT, BUT MORE SUBTLE SHIFT TAKING PLACE. PAGE 5 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis 1. HERETOFORE THE ELECTRONICS WORLD HAS LARGELY BEEN IN THE WHOLE SALE DOMAIN; COMMERCIAL BANKS, CORPORATIONS AND THE LIKE. 2. INCREASINGLY THOUGH, ELECTRONIC ACTIVITY IS GROWING AT THE RETAIL LEVEL. 3. WITH THIS PROLIFERATION, THE OPPORTUNITY FOR SECURITY VIOLATIONS IS EXPONENTIALLY INCREASED. D. AT THE WHOLSESALE LEVEL, WHILE IN THE PAST BANKS HAVE BEEN ABLE TO MONITOR AND ESSENTIALLY CONTROL TRANSACTIONS BETWEEN TWO ENTITIES, ONE CAN IMAGINE THE EXTENSION OF THIS PROCESS RESULTING IN THE BANKS MERELY SERVING AS THE CONDUIT THROUGH WHICH TRANSACTIONS ARE AUTOMATICALLY PROCESSED. WITH A LITTLE IMAGINATION, THIS POSES SOME RATHER SCARRY POSSIBILITIES AND RAISES THE DIFFICULT QUESTION AS TO JUST WHO WILL BEAR THE ULTIMATE RESPONSIBILITY IN THIS PROCESS. IV. NEARER AT HAND, THE DEREGULATION OF THE FINANCIAL INDUSTRY HAS RESULTED IN THE PROLIFERATION OF NEW PRODUCTS AND SERVICES WHICH DEPEND ON COMPLEX COMPUTER SYSTEMS FOR PRODUCTION OR DELIVERY. TECHNOLOGICAL ADVANCEMENTS HAVE ALSO MADE IT POSSIBLE FOR FINANCIAL INSTITUT/ONS TO OFFER SOPHISTICATED INFORMATION SERVICES TO THEIR CUSTOMERS. SINCE MORE AND MORE ORGANIZATIONAL FUNCTIONS ARE BEING ENTRUSTED TO COMPUTERS AND THEIR SUPPORTING PAGE 6 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis COMMUNICATIONS NETWORKS, IT IS ESSENTIAL THAT FINANCIAL INSTITUTIONS DEVELOP SOUND CONTROLS FOR COORDINATING AND INTEGRATING OPERATIONS AND AUTOMATION. AS THE FINANCIAL SYSTEM BECOMES MORE ELECTRONIC,( MORE COMPLEX, AND MORE INTERNATIONAL, THESE CONTROLS WILL BECOME ABSOLUTELY IMPERATIVE. WITH TODAY'S 24-HOUR GLOBAL BANKING AND TRADING MARKETS, MONEY CAN BE ELECTRONICALLY TRANSMITTED THROUGH MANY ACCOUNTS IN SEVERAL COUNTRIES IN A MATTER OF MINUTES. THE IRAN-CONTRA HEARINGS HIGHLIGHTED SOME OF THE DIFFICULTIES INVOLVED IN ESTABLISHING AN AUDIT TRAIL FOR SUCH COMPLEX GLOBAL TRANSACTIONS. V. GIVEN THE NATURE OF THE FEDERAL RESERVE SYSTEM'S RESPONSIBILITIES - OUR CENTRAL BANK ROLE - WE HAVE BEEN ACUTELY AWARE OF THE NEED FOR SAFEGUARDS IN THE ELECTRONIC AREA. A. WE LIKE TO THINK THAT WE HAVE BEEN ON THE LEADING EDGE ON THIS. 2. DATA ENCRYPTION FOR COMPUTER LINKS AND THE IMPLEMENTATION OF CONTROLS ON PERSONAL COMPUTERS AND ATTENTION TO DATA CLASSIFICATIONS ARE ONLY PART OF OUR ONGOING PROGRAM TO ENSURE A SECURE ENVIRONMENT FOR OUR CUSTOMERS AND FOR OURSELVES. VI. NOT ONLY HAS THE ENVIRONMENT CHANGED DRAMATICALLY BUT THE SOURCE OF THE PROBLEM HAS ALSO CHANGED - AND I FIND IT AN AWKWARD SHIFT. PAGE 7 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis A. AS THE ELECTRONIC WORLD DEVELOPED, MANAGERS WERE CONCERNED WITH PREVENTING VIOLATION FROM EXTERNAL SOURCES. 1. AND THIS, OF COURSE, CONTINUES TO BE A CRITICAL ISSUE. B. BUT LATER, IT WAS DISCOVERED THAT THE MAIN SOURCE OF SECURITY PROBLEMS IS NOT OUTSIDERS BUT INSIDERS. 1. EMPLOYEE ERRORS, OMISSIONS, FRAUD AND EMBEZZLEMENT ACCOUNT FOR MORE THAN HALF OF ALL ELECTRONIC SECURITY PROBLEMS. 2. IN A RECENT CASE OF INSIDER FRAUD AT A BANK, A WELL-RESPECTED SENIOR TECHNICAL OFFICER OPENED UNAUTHORIZED ACCOUNTS IN THE BANK'S COMPUTER RECORDS. HE USED THESE FICTITIOUS ACCOUNTS TO STEAL OVER $1 MILLION. IRONICALLY, THE PERPETRATOR WAS EVENTUALLY CAUGHT AS A ·RESULT OF AN IMPROPERLY FUNCTIONING ADDRESS MACHINE. ELECTRONIC FRAUD CAUGHT BY A SIMPLE MECHANICAL MALFUNCTION. TWO OF THE CHECKS DRAWN ON THESE FICTITIOUS ACCOUNTS AND SENT TO A FICTITIOUS ACCOUNT HOLDER WERE RE1URNED TO THE BANK BECAUSE OF INSUFFICIENT ADDRESS INFORMA1ION. THE RETURNED CHECKS WERE INVESTIGATED BY THE CUSTOMER SERVICE SECTION, WHICH DETECTED AN IRREGULARITY. THE AUDIT DEPARTMENT WAS CONTACTED, AND AFTER A SERIES OF INVESTIGATIONS THE PERPETRATOR WAS FINALLY APPREHENDED. HE RETURNED THE UNSPENT PORTION OF THE STOLEN MONEY, WHICH HAD BEEN REDUCED TO ABOUT ONE-HALF OF THE ORIGINAL AMOUNT. PAGE 8 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis 3. MANAGERS HAVE NOT ONLY COME TO REALIZE THAT EMPLOYEES POSE THE GREATEST THREAT TO SECURITY, BUT THEY HAVE ALSO DISCOVERED THAT THE INTRODUCTION OF NEW SECURITY TECHNOLOGIES FREQUENTLY REQUIRE THE ESTABLISHMENT OF NEW PROCEDURES FOR MANAGING EMPLOYEES. FOR EXAMPLE, THE VERY DESIGN OF SOPHISTICATED ACCESS CONTROL SYSTEMS REQUIRED DATA OWNERS TO TAKE RESPONSIBILITY FOR DECIDING WHO WOULD HAVE ACCESS TO THEIR DATA AS WELL AS WHEN, HOW MUCH, AND WHAT TYPE OF ACCESS WOULD BE ALLOWED. MANAGEMENT PROCEDURES HAD TO BE DEVELOPED TO CONTROL THE ACCESS OF STAFF MEMBERS TO INFORMATION SYSTEMS, AUDIT TRAILS HAD TO BE ESTABLISHED TO ENSURE THAT PASSWORDS WERE TIGHTLY CONTROLLED, AND STAFF DUTIES HAD TO BE SEPARATED SO THAT NO ONE PERSON HAD COMPLETE ACCESS TO ANY ONE INFORMATION SYSTEM. IN OTHER WORDS, MANAGEMENT HAD TO DEVELOP CONTROLS COVERING THE ENTIRE INFORMATION LIFE CYCLE FROM THE CREATION OF THE INFORMATION, TO ITS TRANSFORMATION INTO AUTOMATED DATA, TO ITS VARIOUS USES, TO ITS FINAL UTILIZATION, STORAGE OR DESTRUCTION. VII. WITH THAT BY WAY OF BACKGROUND, LET ME NOW QUICKLY HIGHLIGHT SOME OF THE KEY ISSUES THAT WILL BE ADDRESSED IN GREATER DETAIL THROUGHOUT OUR CONFERENCE. TH t s E I NC I llti:t ~ ~~s ~ ~ ~~~ crJ $ ~ ~c.L,•N Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis - MICROCOMPUTER SECURITY - SECURITY MANDATES - FEDERAL GOVERNMENT INVOLVEMENT - FEDERAL RESERVE ASSISTANCE AND SOLUTIONS - IMPLEMENTING A SECURITY PROGRAM VIII. FIRST, MICROCOMPUTER SECURITY A. THE ADVENT OF THE MICROCOMPUTER HAS MADE IT POSSIBLE FOR ORGANIZATIONS OF ALL TYPES AND SIZES TO REAP THE BENEFITS OF COMPUTER POWER. BUT THE GROWING USE OF MICROCOMPUTERS HAS ALSO CREATED NEW SECURITY RISKS, AND MANAGERS HAVE HAD TO DEVELOP CONTROLS TO PROTECT THESE NEW AND HIGHLY FLEXIBLE INFORMATION SYSTEMS. MANAGERS CAN NO LONGER RELY SOLELY ON THE PHYSICAL AND PROCEDURAL SAFEGUARDS DESIGNED TO PROTECT THE EQUIPMENT, SOFTWARE AND INFORMATION HOUSED IN A CENTRAL COMPUTER FACILITY. THE SECURITY REQUIREMENTS FOR MICROCOMPUTERS DIFFER SUBSTANTIALLY FROM THOSE OF A CENTRAL COMPUTER FACILITY BECAUSE MICROCOMPUTERS ARE USUALLY WIDELY DISPERSED THROUGHOUT AN ORGANIZATION. EQUIPMENT, PROGRAMMING, PROCESSING, AND PAGE 10 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis DATA/SOFTWARE STORAGE ARE ALL DECENTRALIZED. AS A RESULT, THE DATA PROCESSING DEPARTMENT OF AN ORGANIZATION NO LONGER HAS TOTAL CONTROL OVER DATA SECURITY AND NEW CONTROLS HAVE TO BE ESTABLISHED TO ENSURE DATA INTEGRITY. IX. THEN SECURITY MANDATES A. IN THE FORESEEABLE FUTURE, FEDERAL AND STATE LAWS, PROFESSIONAL STANDARDS, AND INSURANCE GUIDELINES WILL TEND TO PROMOTE MANDATORY, RATHER THAN VOLUNTARY, SECURITY PRACTICES. ALREADY, SOME CORPORATIONS ARE REQUIRED TO ENFORCE SPECIFIC SECURITY PROCEDURES. FINANCIAL INSTITUTIONS USING MICROCOMPUTERS TO FUNCTION ELECTRONIC TRANSACTIONS THROUGH THE FEDERAL RESERVE SYSTEM ARE REQUIRED TO ENCRYPT THEIR TRANSACT IONS. CONTRACTORS WI TH THE DEPARTMENT OF DEFENSE ARE REQUIRED TO FILE A RISK ANALYSIS PLAN FOR PROTECTING INFORMATION RESOURCES ASSOCIATED WITH THEIR CONTRACTS. ALSO, COMPANIES USING PURCHASED SOFTWARE MUST INSTITUTE A SECURITY AWARENESS PROGRAM TO ENSURE THAT THEY WILL NOT BE SUED FOR UNAUTHORIZED DUPLICATION OF THE SOFTWARE. X. ANlL_Ifil.RL_l_S __ THE QUESTION OF FEDERAL GOVERNMENT INVOLVEMENT A. lHE FEDERAL GOVERNMENT HAS TAKEN AN ACTIVE ROLE IN PROMOTING INFORMATION SECURITY IN THE FINANCIAL INDUSTRY. THE NATIONAL SECURITY AGENCY IS CONDUCTING EXTENSIVE TESTS OF MAINFRAME PAGE 11 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis COMPUTERS AND HAS DEVELOPED GUIDELINES ON HOW TO SELECT MAINFRAMES. THE NATIONAL BUREAU OF STANDARDS' INSTITUTE FOR COMPUTER SCIENCES AND TECHNOLOGY IS ESTABLISHING SECURITY STANDARDS FOR MICROCOMPUTER SYSTEMS. AT THE DEPARTMENT OF THE TREASURY, STANDARDS ARE BEING DEVELOPED FOR MESSAGE AUTHENTICATION. AND AT THE DEPARTMENT OF DEFENSE'S COMPUTER INSTITUTE, SECURITY TRAINING PROGRAMS ARE CONDUCTED FOR ALL FEDERAL AGENCIES. XI. WITH REGARD TO FEDERAL RESERVE ASSISTANCE AND SOLUTIONS A. IN RECENT YEARS, THE FEDERAL RESERVE SYSTEM HAS ALSO BECOME ACTIVE IN PROMOTING INFORMATION SECURITY. CURRENTLY, SYSTEMWIDE SECURITY STANDARDS ARE BEING DEVELOPED FOR ALL FORMS OF INFORMATION MEDIA. IN CONJUNCTION WITH THESE SYSTEMWIDE EFFORTS, THE CHICAGO RESERVE BANK WILL BE PROVIDING A VARIETY OF EDUCATIONAL PROGRAMS TO ASSIST FINANCIAL INSTITUTIONS IN MEETING THEIR SECURITY NEEDS AND TO ENSURE THE INTEGRITY OF THE NATION'S PAYMENTS MECHANISMS. XII. El..NA.LL..Y_AND OF CRITICAL IMPORTANCE. IMPLEMENTING A SECURITY PROGRAM A. IN RESPONSE TO MANAGEMENT INTEREST IN INFORMATION SECURITY AND TO GOVERNMENTAL, PROFESSIONAL AND INDUSTRY PRESSURES TO IMPROVE INFORMATION SECURITY, MANY FINANCIAL INSTITUTIONS HAVE IMPLEMENTED, OR ARE BEGINNING TO IMPLEMENT, INFORMATION PAGE 12 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis SECURITY PROGRAMS. AS A BAREBONES OUTLINE OF AN APPROPRIATE PROGRAM, WE SUGGEST THAT FINANCIAL INSTITUTIONS TAKE AT LEAST FOUR STEPS: 1. ASSIGN RESPONSIBILITY FOR INFORMATION SECURITY. 2. INCORPORATE INFORMATION SECURITY INTO THEIR STRATEGIC PLANS. 3. ESTABLISH A CORPORATE SECURITY POLICY. 4. START AN ORGANIZATIONWIDE SECURITY AWARENESS PROGRAM TO INFORM INFORMATION SYSTEM USERS ABOUT THE SECURITY RULES THAT WILL AFFECT THEM. XI I I . TO CONCI UDE A. IT IS CLEAR THAT INFORMAl ION AND ELECTRONICS SECURITY HAS BECOME AND WILL CONTINUE TO BE AN IMPORTANT MANAGEMENT PRIORITY FOR FINANCIAL INSTITUTIONS. IN THE FUTURE, SECURITY CONSIDERATIONS WILL INFLUENCE THE WAY ORGANIZATIONS ARE STRUCTURED AND, MORE GENERALLY, THE WAY WORK IS PERFORMED. E.FFEClIVE INFORMATION SECURITY WILL REQUIRE A COMBINATION OF SOUND MANAGERIAL PRACTICES AND STATE-OF-THE-ART SECURITY TECHNOLOGIES. WE WILL ALL NEED TO WORK TOGETHER TO PROTECT THE INFORMATION ASSETS OF OUR INDUSTRY. I BELIEVE THAT THIS CONFERENCE WILL SERVE AS A MAJOR STEP FORWARD IN THIS COOOPERATIVE EFFORT. PAGE 13 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis l. WHILE, AS I SUGGESTED AT THE OUTSET, TEN YEARS AGO THIS MEETING MIGHT NOT HAVE BEEN NECESSARY, IT CERTAINLY IS TODAY AND WE ARE DELIGHTED TO HOST IT. THANK YOU. PAGE 14 Digitized for FRASER https://fraser.stlouisfed.org Federal Reserve Bank of St. Louis
Cite this document
APA
Silas Keehn (1987, September 9). Regional President Speech. Speeches, Federal Reserve. https://whenthefedspeaks.com/doc/regional_speeche_19870910_silas_keehn
BibTeX
@misc{wtfs_regional_speeche_19870910_silas_keehn,
  author = {Silas Keehn},
  title = {Regional President Speech},
  year = {1987},
  month = {Sep},
  howpublished = {Speeches, Federal Reserve},
  url = {https://whenthefedspeaks.com/doc/regional_speeche_19870910_silas_keehn},
  note = {Retrieved via When the Fed Speaks corpus}
}