Are US Nuke Secrets Vulnerable to Cyberattack?

The Department of Energy’s internal watchdog has released a “very problematic” report about its cybersecurity practices.

Wikimedia Commons

Fight disinformation: Sign up for the free Mother Jones Daily newsletter and follow the news that matters.

The Department of Energy, which is responsible for safeguarding America’s nuclear weapons and secrets, has failed to tell law enforcement the details of when its computer systems have come under attack, “hindering investigations” into some of the 2,300 cybersecurity incidents the agency recorded between October 2009 and March 2012. This lack of timely and comprehensive cybersecurity reporting is putting the DOE’s “information systems and networks at increased risk,” according to a new investigation by the agency’s internal watchdog.

The findings are “very problematic,” says James Lewis, a senior cybersecurity expert at the Center for Strategic and International Studies, because “DOE sites are a primary target for espionage and have been successfully hacked in the past.”

While preparing the report, the DOE’s Office of Inspector General audited seven sites, including nuclear laboratories at Los Alamos and the Savannah River Site in South Carolina, and found that, of 223 incidents reported at DOE sites, 41 percent were not reported within established time frames. Another 10 incidents involving a loss of personally identifiable information (which affected 109 people) were reported late.

Joshua McConaha, a spokesman for the National Nuclear Security Administration (NNSA), the DOE entity responsible for the nation’s nuclear weapons stockpile, told Mother Jones that the cybersecurity incidents not involving identity theft “were normal computer issues such as viruses” that occur “on a regular basis.” But experts say that the report’s findings still don’t bode well for nuclear weapons security.

Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists, says that while the weapons themselves weren’t at risk, “weapons-related information and facility security information could potentially be vulnerable.” It wouldn’t be the first time: In 2007, hackers believed to be from China launched a sophisticated cyberattack on several DOE laboratories in the United States. A spokesman for Los Alamos National Lab, which undertakes nuclear weapons design, told ABC News that “a significant amount of data was removed” from a small number of computers on the facility’s unclassified network. This is the same lab that had its director step down in 2003 after a scandal involving widespread theft and security lapses.

Kevin Roark, a spokesman for Los Alamos National Laboratory, denies that the lab is reporting cyberattacks incorrectly. He told Mother Jones that the audit listed “six incidents where they believed Los Alamos was late in its reporting,” none of which had to do with personal information being stolen. And according to Roark, “Los Alamos personnel have subsequently checked the six incidents, and determined that all were reported within the required time frame, but the information in the reports led the reporting authority to derive an inaccurate date and time.”

When asked to about the incidents and Roark’s response, a spokesman for the IG said that “the report speaks for itself and we have no additional comment.”

It’s well established that the NNSA faces regular cyberattacks—a spokesman for the agency told US News and World Report in March that if you count “security significant cyber security events,” the number of cyberattacks goes up to 10 million per day. (Experts told Mother Jones that the number changes depending on how you categorize different types of incidents.) The real question is whether NNSA and DOE can deal with the attacks. The DOE has recently taken steps like improving cybersecurity training for employees and addressing weaknesses at facilities, according to a separate report released by the inspector general last month.

“Cybersecurity is a work in progress, both inside and outside government.” Aftergood notes. ” One would like to think that the nuclear weapons infrastructure would be ahead of the curve, but apparently that is too much to expect.”

Left unanswered is the question of who’s to blame for the cyberattacks that the DOE seems to have so much trouble reporting correctly.

“It’s probably not Russia or China,” Lewis snipes. “They’ve already gotten everything.”

Zoom in on the map below to find the warheads near you as well as the nuclear labs that maintain the stockpile and develop the next generation of atomic weaponry. (For reference, we’ve also included the locations of the nation’s civilian nuclear power plants.)

View full-screen map

View Mother Jones: America’s Nuclear Facilities in a full-screen map

Sources: Bulletin of the Atomic Scientists and Federation of American Scientists (PDF), Office of the Deputy Assistant to the Secretary of Defense for Nuclear MattersNuclear Energy InstituteUnited States Nuclear Regulatory CommissionUnited States Navy.

GREAT JOURNALISM, SLOW FUNDRAISING

Our team has been on fire lately—publishing sweeping, one-of-a-kind investigations, ambitious, groundbreaking projects, and even releasing “the holy shit documentary of the year.” And that’s on top of protecting free and fair elections and standing up to bullies and BS when others in the media don’t.

Yet, we just came up pretty short on our first big fundraising campaign since Mother Jones and the Center for Investigative Reporting joined forces.

So, two things:

1) If you value the journalism we do but haven’t pitched in over the last few months, please consider doing so now—we urgently need a lot of help to make up for lost ground.

2) If you’re not ready to donate but you’re interested enough in our work to be reading this, please consider signing up for our free Mother Jones Daily newsletter to get to know us and our reporting better. Maybe once you do, you’ll see it’s something worth supporting.

payment methods

GREAT JOURNALISM, SLOW FUNDRAISING

Our team has been on fire lately—publishing sweeping, one-of-a-kind investigations, ambitious, groundbreaking projects, and even releasing “the holy shit documentary of the year.” And that’s on top of protecting free and fair elections and standing up to bullies and BS when others in the media don’t.

Yet, we just came up pretty short on our first big fundraising campaign since Mother Jones and the Center for Investigative Reporting joined forces.

So, two things:

1) If you value the journalism we do but haven’t pitched in over the last few months, please consider doing so now—we urgently need a lot of help to make up for lost ground.

2) If you’re not ready to donate but you’re interested enough in our work to be reading this, please consider signing up for our free Mother Jones Daily newsletter to get to know us and our reporting better. Maybe once you do, you’ll see it’s something worth supporting.

payment methods

We Recommend

Latest

Sign up for our free newsletter

Subscribe to the Mother Jones Daily to have our top stories delivered directly to your inbox.

Get our award-winning magazine

Save big on a full year of investigations, ideas, and insights.

Subscribe

Support our journalism

Help Mother Jones' reporters dig deep with a tax-deductible donation.

Donate