DOE IG reviews security at Oak Ridge
Connecting state and local government leaders
Unauthorized laptop with wireless capability was taken into a "limited area' at the Y-12 nuclear weapons plant.
Additional security protocol training for employees, better information sharing with local counterintelligence officials and periodic review of laptop PC security procedures are among the recommendations made by the Energy Department's inspector general after an investigation into a security breach at the department's Y-12 National Security Complex in Oak Ridge, Tenn.
According to the IG's report, in 2006 an unauthorized laptop with wireless capability was taken into a "limited area' at the Y-12 nuclear weapons plant. Limited areas are defined as "secure work areas that employ physical controls to prevent unauthorized access to classified matter or special nuclear material," the report states.
DOE prohibits any equipment capable of transmitting data wirelessly. Posted at the entrance to the Y-12 limited area is a large sign that lists the items prohibited from the area without prior approval. Second on that list, after firearms, is "Electronic equipment with data exchange port capable of being connected to automate information systems equipment (i.e., personal computers, PDAs)."
Four main security violations occurred, the IG said:
- On Oct. 24, 2006, Y-12 employees discovered a contractor from Oak Ridge National Laboratory had brought an unclassified laptop with wireless capability into a Y-12 limited area without following proper protocols.
- Y-12 cybersecurity staff did not properly secure the laptop, and the user left the area with the computer, contrary to Energy policy. The laptop was not retrieved by the department until almost an hour later. Because the laptop could have been tampered with during that time, it could not be collected as best evidence.
- Energy requires that within 32 hours of an incident of security concern, a written report be submitted to the Headquarters Operations Center. The written report was not made until six days after the incident was discovered.
- Subsequent inquiries revealed that as many as 37 additional laptops may have been brought into the limited area by ORNL employees without following proper security protocols.
sensitive countries list
NEXT STORY: NIST posts final draft of FISMA guidance