The Project On Government Oversight

Back to POGO Main Page
For more information on
Energy and Environment Investigations

U.S. Nuclear Weapons Complex:
Security At Risk

October 2001

Table of Contents

Foreword

EXECUTIVE SUMMARY

Introduction

Examples of Recent Vulnerabilities

Background on DOE Nuclear Weapons Complex

Appendix F DOE Map of Plutonium Inventories

The Design Basis Threat

Three Case Studies

Major Threats to the Complex

Misleading Test Results And they Still Lose 50% of the Time

Security Oversight A Weak Record

Rewards and Punishment Turned On Its Head

Budget

PROBLEMS / SOLUTIONS

Glossary

Footnotes

List of Appendices


Foreword

"And we will operate from a few basic principles. First, candor. No one should be wary of coming forward when they see a problem. It's the only way to define a solution. The urgency of our task dictates candor about our challenges and confidence in our ability to solve them."
Director of Homeland Security Tom Ridge, October 8, 2001

This report presents the results of an eight-month investigation initiated when more than a dozen insiders contacted POGO with unclassified evidence that the U.S. Department of Energy's nuclear bomb complex is vulnerable to terrorist attack. We were in the final stages of editing on September 11th. We immediately took our information to policy-makers, briefing the National Security Council, the Pentagon and Congressional Committees. During that process, our report was made public and began to receive media attention. Because of the extraordinary demand for this report, we are now making it available on POGOs website.

The contents of this report have been reviewed by trained and certified classifiers from inside and outside the government to ensure that this report contains no classified information.

Report Contributors

POGO Staff
Danielle Brian, Executive Director
Lynn Eisenman, Research Assistant
Keith Rutter, Director of Operations

Peter Stockton, is a paid consultant with POGO. He was Special Assistant to DOE Secretary Bill Richardson from 1999-2001. Mr. Stockton was the Chief investigator for Chairman John Dingell (D-MI) of the House Energy and Commerce Committee from 1972-1995, including during the Committees investigations of DOE security failures.

Unpaid Contributors: Ron Timm, RETA Security President, Security Analyst hired by DOE to analyze security at DOE weapons facilities. The additional contributors to this report have requested anonymity for fear of retaliation for exposing security failures. They include DOE security analysts, current and former Special Forces who portray mock-terrorists in force-on-force drills, DOE contractors, and officials at various levels of DOE Headquarters and facilities.


EXECUTIVE SUMMARY

The Department of Energy (DOE) analyzes and tests the security of nuclear weapons facilities by conducting simulations and mock force-on-force exercises, often using U.S. military forces as adversaries. The government requires that nuclear facilities be able to defend against theft of nuclear materials or radiological sabotage by a few terrorists using surprise and readily available weapons and explosives, as well as against the theft of nuclear secrets.

According to experts who have conducted these tests in the past, the government fails to protect against these attacks more than 50% of the time although the exact figure is classified. For example, in a test at the Rocky Flats nuclear production facility, Navy SEALs successfully stole enough material to make multiple nuclear weapons. In a test at a Los Alamos facility, the terrorists had enough time to construct an Improvised Nuclear Device. In addition, the theft of nuclear secrets remains as possible today as it was several years ago before the controversy over the downloading of classified information at Los Alamos.

DOE employees and others who have raised security concerns have largely been ignored and subjected to retaliation over many years. This report details several case studies of whistleblowers being fired, being forced to resign, losing contracts or losing security responsibilities because they were unwilling to quietly accept the inadequate security measures at DOE nuclear facilities. In one example, in a desperate attempt to raise public awareness last year about these problems, a DOE employee faxed two unclassified Inspector General reports to USA Today and the Washington Post, which highlighted the Departments failure to take corrective measures. His security clearance was suspended and he is no longer working on security issues.

DOEs disregard for proven threats to nuclear security and its institutional bull-headedness has thwarted the efforts of reformers, time and time again. According to a review by Senator Warren Rudman, scores of critical reports from the General Accounting Office (GAO), the intelligence community, independent commissions, private management consultants, its Inspector General, and its own security experts...the Departments ingrained behavior and values have caused it to continue to falter and fail.

Ten major sites have weapons-grade plutonium (PU) and highly-enriched uranium (HEU) in sufficient quantities to make a nuclear device even though most of them have not had a national defense mission since the end of the Cold War. Several of these sites are located near major metropolitan areas including the Bay area of Northern California; Denver, Colorado; Albuquerque, New Mexico; and Knoxville, Tennessee (see Metropolitan Areas Within 100 miles of Nuclear Weapons Facilities chart below). In addition, the DOE Transportation Safety Division regularly moves weapons-grade nuclear materials and nuclear weapons between facilities across the country. Because many tons of weapons-grade nuclear materials are at these facilities, a nuclear detonation at one of them would dwarf the impacts of Chernobyl, potentially kill or injure millions of Americans, and destroy the environment of a significant portion of the United States.

The Project On Government Oversight (POGO) has conducted a series of interviews and consultations with nuclear security and terrorism experts to identify the following major problems with nuclear facility security and their solutions:

PROBLEM: Nuclear Materials Are Spread Across the Country. Weapons-quantity special nuclear materials are stored at 10 fixed sites even though most have virtually no national security mission. DOE cannot currently adequately protect this material, and security at each site unnecessarily increases redundancies and costs. Not only do the unnecessary sites cost the taxpayers billions annually, but they also present a significant health and safety risk to nearby communities.

PROBLEM: Bureaucracy Makes Security Tests Easier Rather than Fixing Problems. The DOE bureaucracy portrays facilities as being secure and impervious to terrorists and spies when, in fact, they are not.

PROBLEM: Independence in Nuclear Security is Lacking. The recently Congressionally-created National Nuclear Security Administration (NNSA) exacerbates the problem by elevating the same people who have managed this debacle over the last three decades.

PROBLEM: Computers Containing Nuclear Secrets Remain Vulnerable. It is virtually as easy today for a trusted insider to put weapons design information on a tape or disk and walk out the door as it was during the controversy at Los Alamos. All of our known spies have been insiders with the highest security clearances.

PROBLEM: DOE Security Forces Cut by 40%. According to a high-level DOE official, Since 1992, the number of Protective Forces at DOE sites nationwide has decreased by almost 40% (from 5,640 to the current number of approximately 3,500) while the inventory of nuclear material has increased by 30%. The increase has resulted from the dismantling of nuclear weapons and the receipt of nuclear materials from the Former Soviet Union. During the same period the threat of terrorism has increased.

Introduction

The chances that chemical, biological or nuclear terrorism will occur on U.S. soil over the next ten years is 100%, according to Richard Clark, U.S. National Security Council National Coordinator for Infrastructure Protection and Counterterrorism for the Clinton and Bush White Houses.

Over a dozen whistleblowers have contacted the Project On Government Oversight (POGO) with unclassified evidence that the U.S. nuclear bomb complex, containing tons of weapons-grade uranium and plutonium, is vulnerable to a terrorist attack. The particular vulnerabilities discussed in this report have been addressed by the Department of Energy (DOE), thereby making them no longer classified. However, new as well as recurring vulnerabilities continue to plague DOEs nuclear security program. This evidence confirms the findings of multiple Presidential and DOE Commissions. Such an attack would endanger the health and safety of the communities near each site to levels in excess of the accidental release at Chernobyl.

The DOE tests the security of these sites by conducting simulated and mock force-on-force exercises often using military forces as the adversary. The government requires that these sites be able to defend against theft of nuclear materials or radiological sabotage by a few terrorists using surprise and readily available weapons and explosives, as well as against the theft of nuclear secrets. According to experts who have conducted these tests in the past, the government fails to protect against these attacks more than 50% of the time although the exact figure is classified. In addition, the theft of nuclear secrets remains as possible today as it was two years ago when controversy surrounded Los Alamos National Laboratory over the possible leaking of classified information.

As a result of that controversy, in June of 1999, the Chair of the Presidents Foreign Intelligence Advisory Board, former Senator Warren Rudman (R-NH) was asked to review security at the DOE nuclear weapons laboratories. Their report, Science at its Best, Security at its Worst was startlingly blunt in their criticism: . . . the brilliant scientific breakthroughs at the nuclear weapons laboratories came with a very troubling record of security administration. . . . This report finds that DOEs performance, throughout its history, should have been regarded as intolerable. (Emphasis added)1

More importantly, the Rudman report points out the longevity of these problems and the institutional hubris that continues to perpetuate them: Second only to [DOEs] world-class intellectual feats has been its ability to fend off systemic change. Former Energy Secretary Richardson did much to promote institutional reform in the area of nuclear security, including bringing people in from outside the DOE bureaucracy to oversee nuclear security specifically General Eugene Habiger and General John Gordon. However, Rudman points out that the Departments bureaucracy is quite capable of undoing Secretary Richardsons reforms, and may well be inclined to do so.

DOEs disregard for proven threats to nuclear security and its institutional bull-headedness has thwarted the efforts of reformers, time and time again. Regardless of scores of critical reports from the General Accounting Office (GAO), the intelligence community, independent commissions, private management consultants, its Inspector General, and its own security experts . . .the Departments ingrained behavior and values have caused it to continue to falter and fail. The report goes on to emphasize this point:

Finally, the Rudman report states, The panel has found that DOE and the weapons laboratories have a deeply rooted culture of low regard for and at times, hostility to security issues . . . The Department of Energy is a dysfunctional bureaucracy that has proven it is incapable of reforming itself. . .2

More recently, in June of 2001, then-Chair Fred Thompson (R-TN) of the Senate Governmental Affairs Committee, highlighted the Department of Energy and particularly their poor handling of security in its report Government at the Brink: An Agency by Agency Examination of Federal Government Management Problems Facing the Bush Administration.3

Examples of Recent Vulnerabilities

In October 2000, during a force-on-force drill at Los Alamos, New Mexico, the mock terrorists gained control of sensitive nuclear materials which, if detonated, would have endangered significant parts of New Mexico, Colorado and downwind areas. (Appendix A4)

In an earlier test at the same location, a U.S. Army Special Forces team was able to steal enough weapons-grade uranium for numerous nuclear weapons and was able to carry the extremely heavy material with the use of a Home Depot garden cart throwing the protective forces into disarray. The DOE argued that this test attack was unfair. (Appendix A)

In another exercise, Navy SEALs were able to make a hole in a chainlink fence surrounding Rocky Flats near Denver, Colorado, undetected and easily stole enough plutonium for several nuclear bombs. They were only discovered as they were successfully leaving the facility.

The Department of Energy Transportation Security Division moves nuclear weapons, as well as weapons-grade uranium and plutonium, from site to site across the nation on public highways. Over the last several years, there have been exercises testing the security of this Division where the DOE security force failed to protect nuclear cargo because they had inadequate weapons and insufficient numbers, as well as poorly conceived tactics. Due to these insufficiencies, the protective forces were defeated in six out of seven exercises in December 1998. (Appendix B)

In 1998, the Fall of 1999, and again in the Spring of 2000, two force-on-force exercises were run to test the Rocky Flats protective force. A criticality alarm warning that a nuclear chain reaction is potentially imminent was set off creating confusion, allowing the terrorist access to special nuclear materials. Such an alarm requires everyone to immediately leave the building. Hoping to kill the adversaries the protective force indiscriminately shot employees, controllers and each other as they were exiting the building in response to the alarm5. The protective force count these tests as successes because they kill all the adversaries although they also killed all the employees and several of the protective forces as well. (Appendix C)

In addition to physical security, there also remain cyber security weaknesses. The major threat to the compromise of critical nuclear weapons information is the trusted insider personnel with the highest security clearances. Voluminous amounts of information can be accessed quickly and easily. For example, a device the size of a Gameboy can download the equivalent of 1100 floppy discs off a computer in 3 minutes and 14 seconds. Another device called a memory stick, smaller than a stick of gum, can download the equivalent of 44 floppy disks in a couple of minutes. Incredibly, DOE has done virtually nothing effective to protect against the insider working on classified computers despite the many Congressional hearings and increased media scrutiny generated by the Los Alamos controversy6. (Appendix D)

Background on DOE Nuclear Weapons Complex

The U.S. nuclear weapons complex managed by DOE is spread across the country. Ten major sites have weapons-grade plutonium (PU) and highly-enriched uranium (HEU) in sufficient quantities for a nuclear device. Several of these sites are located near major metropolitan areas with large populations. (See chart below.) In addition, the DOEs Transportation Safety Division (TSD) moves weapons-grade Special Nuclear Materials (SNM) across the country on interstate highways. Although the total inventory of PU and HEU is classified, according to DOE Facts sheets, there are 994 metric tons of HEU7 and 33.5 metric tons of PU (Appendix F), excluding the PU inventories at Pantex which remain classified. According to the Nuclear Control Institute, it takes less than 50 pounds of HEU or PU to craft a crude nuclear device8. In addition, there are significant quantities of completed nuclear weapons, and huge quantities of weapons in various stages of assembly and dismantlement including those that have been stored for decades as a war reserve that would be attractive to terrorists. The DOE (Appendix F) map shows the location of weapons-grade plutonium inventories. The eight sites identified with plutonium on the map, as well as the Oak Ridge National Laboratory in Tennessee and Sandia National Laboratory in New Mexico, also hold highly enriched uranium inventories.

Metropolitan Areas Within 100 miles
of Nuclear Weapons Facilities9

Site Name Metropolitan Area Population
Lawrence Livermore San Francisco-Oakland-San Jose, CA 7,039,362
Rocky Flats Denver, CO 2,581,506
Sandia Albuquerque, NM 712,738
Oak Ridge Knoxville, TN 687,249
Savannah River Augusta-Aiken, GA-SC 477,441
Pantex Amarillo, TX 217,858
Hanford RichlandKennewick-Pasco, WA 191,822
Los Alamos Santa Fe, NM 147,635
Argonne & Idaho National Pocatello, ID 75,565

DOE Map of Plutonium Inventories (Appendix F)

An issue that exacerbates security problems is the age of these sites and the decay of the infrastructure. Oak Ridge, Savannah River, Hanford and Los Alamos, for example, were all built for the Manhattan Project in the 1940's. The isolated location of these sites made sense at the time for safety and security reasons. Now, population growth and more mobility have made a number of the sites extremely difficult to protect. For example, Technical Area-18 (TA-18) at Los Alamos, New Mexico, with tons of PU and HEU was built in a canyon to absorb the radiation from the reactors. TA-18 also houses several moveable burst nuclear reactors, which are small machines, from the size of a bowling ball to as large as 4 feet by 4 feet by 5 feet tall, containing PU and HEU fuel. The site is extremely vulnerable because terrorists could easily occupy the unprotected high ground around the canyon. A public highway passes within a few feet of the fence line and the facilities that house the PU and HEU. The infrastructure around many of these sites is in decay including storage facilities, fences, and alarm systems.

The Design Basis Threat

There is a classified Design Basis Threat (DBT) that describes the level of threat the contractor is required to defend against the number of outside attackers and inside conspirators, and the kinds of weapons and explosives that would be available to terrorists. (Appendix G) The process that determines this threat was described by Edward McCallum, the former Director of the Office of Safeguards and Security in a letter to the Director of the Office of Security Affairs: The FBI, CIA, DOE, and the military services as well as the Nuclear Command and Control Staff have developed the existing Design Basis Threat over a number of years. It has been extensively reviewed and supported by studies issued by the DIA [Defense Intelligence Agency]. Sandia, as well as the other labs, have been asked to comment and participate in the development process. (Appendix H)

Each site is then required to develop a Site Safeguards and Security Plan (SSSP) annually, which describes in detail how they would counter the most likely and most disastrous attack scenarios based on the DBT. The plan is developed by the contractors, and then analyzed and approved by the DOE field office and various Headquarters program offices to confirm that the site is at low risk.

Despite the fact that the DBT goes through this studied, interagency process, the bureaucracy often complains that it is too high a standard to meet defending against that terrorist that is about thirteen feet in height (Appendix E) or super-terrorists. But in fact, the DBT does not require DOE to defend against exotic weapons, but weapons that are readily available on the open market from private arms dealers. According to DOEs Independent Oversight Office, the opposite is true and in fact the capabilities of terrorists are underestimated in the planned scenarios:

Capabilities of Available Adversary Weapons Are Not Being Accurately Represented. In the last year this office has catalogued a long list of readily available adversary weapons and tools that are not being used appropriately by the adversaries depicted in current SSSP/VAs. Among these are tactical smoke, irritant gases, anti-personnel and anti-vehicle explosive devices (stay-behinds), grenades, armor-piercing small arms ammunition, and communications disruption devices, to name but the most obvious. It has become customary in DOE to limit the use of such weapons and tools, creating the potential for artificially high calculations of protective force effectiveness. [This is inconsistent with tactics currently being taught in the Afghanistan training camps and used by terrorist groups in Columbia, the Philippines, Sri Lanka, Chechnya, the Balkans, and the Middle East.] (Appendix I)

The Design Basis Threat specifies that sites are only expected to protect against:

A small group (including an insider) [the actual number is classified]

"Characteristics:

This Design Basis Threat intends to protect nuclear weapons facilities from:

  • Theft of nuclear material;

  • Radiation sabotage blowing up nuclear material and dispersing radiation into the surrounding areas (this could be achieved by an insider, an outside terrorist getting inside or more likely, with a truck bomb); and

  • Exploding PU or HEU in such a way that it causes a nuclear chain reaction, through the creation of an Improvised Nuclear Device that could result in Hiroshima-like devastation. How such a crude weapon could be created is highly classified, however, experts point out that any self-respecting college physics student already has that knowledge. Explicit instructions on how to build a nuclear weapon are on the internet.

    It is difficult to deal with the failures of DOE security because of the level of classification of information regarding the nuclear weapons complex. Of course, some classification is legitimate, but a good deal of information is classified because it is embarrassing.

    Three Case Studies

    Three case studies provide an insight into how the system has failed: the plant at Rocky Flats, outside of Denver, Colorado; Technical Area-18 (TA-18) at Los Alamos, New Mexico; and the Transportation Security Division, which travels the United States interstate highways. The repetition of problems in these case studies should make it clear that these problems are systemic, constant and recurring.

    Rocky Flats

    Rocky Flats, outside Denver, Colorado, was a major weapons production facility during the Cold War where the plutonium parts for nuclear weapons were milled and fabricated. Tens of tons of plutonium as well as uranium are stored at Rocky Flats. DOE is currently in the process of shutting down the plant and de-inventorying sending the PU to Savannah River and the HEU to Oak Ridge. Currently, there are still large quantities of Special Nuclear Materials (SNM) at Rocky Flats that are attractive to terrorists. Wackenhut Security, a private security firm, supplies the protective force. Kaiser-Hill LLC is the prime contractor managing Rocky Flats.

    In 1992, members of the Wackenhut security force were upset because they argued federal oversight was too overzealous. This tension between federal overseers and the contractor is highly unusual in the DOE complex. In a July 16, 1992 letter to Terry Vaeth, DOE Manager at Rocky Flats, Timothy P. Cole, President of Wackenhut Services Incorporated stated, after taking over security at the site in July 1990:

    As even Cole acknowledged, Wackenhut was having trouble performing some basic security duties. For example according to sources, in a surprise security test at that time, federal security overseers passed through a secured entrance with a pistol in a coffee can an obvious breach of security.

    Wackenhut President Timothy Coles letter warned Rocky Flats federal security officials, The distrust, doubt and fear our Security Inspectors have for certain DOE officials is unhealthy and may lead to serious consequences. (Emphasis added) The federal Director of Security was removed, and Wackenhut retained their contract. (Appendix J)

    In 1995, two Wackenhut security force whistleblowers, Mark Graf and Jeff Peters, wrote to their Congressman, David Skaggs (D-CO), citing their concerns about the poor security at Rocky Flats being performed by Wackenhut. Their whistleblowing lead to a harrowing sequence of retaliations against both Graf and Peters, including their being sent for psychiatric evaluations. After both were put on administrative leave, Peters resigned. Graf was reinstated after winning his whistleblower retaliation lawsuit.10

    The federal Office of Personnel Management interviewed Wackenhut Services Inc. (WSI) General Manager William R. Gillison during the Jeff Peters whistleblower case. Gillison acknowledged that he, reported to WSI Corporate that the SNM was at high risk and it was not WSIs responsibility to assume responsibility for such material. (Appendix K)

    In 1996, according to sources, DOE Headquarters rejected the Site Safeguards and Security Plan (SSSP) citing serious deficiencies.

    In January 1997, the DOE Report to the President on the Status of Safeguards and Security for 1996" gave Rocky Flats a marginal rating meaning that nuclear material was not being protected adequately. (Appendix L)

    In March 1997, DOE determined that Rocky Flats was in fact not marginal, but that there were vulnerabilities at the site that were not identified or addressed in the 1997 SSSP and that SNM was at risk under the then existing conditions. (Appendix M)

    In April 1997, a subsequent Director of Security for DOE at the Rocky Flats site, Col. David Ridenour, resigned because he believed the health and welfare of the public was not being protected, and that top management would not allow him to perform his duties. He wrote in a letter to the Head of the Operations Office, In my professional life as a military officer, as a Registered Professional Engineer. . . I never before experienced a major conflict between loyalty to my supervision and duty to my country and to the public. I feel that conflict today. (Appendix N)

    The next week in April 1997, Col. Ridenour wrote in a letter to then-Secretary of Energy Federico Pena . . . I was instructed by my direct supervisor . . . that my mission was to not negatively impact the contractor and that I was to facilitate the contractor (a joint venture between Kaiser and CH2M Hill) winning the award fee. (Appendix N)

    In September 1997, again the SSSP was rejected. DOE Headquarters gave Rocky Flats 120 days to implement corrective actions. After 120 days, no action had been taken, and no one was held accountable neither government employees nor contractors (Appendix M)

    In 1997, unauthorized taped phone calls with DOE Headquarters Director of Security Col. Edward McCallum by Wackenhut whistleblower Jeff Peters revealed McCallums concern that terrorists could gain access to large quantities of plutonium and cause a sizable nuclear detonation. McCallum stated, Ive said in front of the Deputy Secretary and people at that level, I think the citizens, the employees at the plant, and the citizens of Colorado are at extremely high risk for no reason. These concerns were first raised in 1995 two years earlier yet they had remained unresolved. (Appendix O)

    In January 1998, the Independent Oversight team from DOE Headquarters conducted a force-on-force at Rocky Flats, concluding that security was adequate by a narrow margin. For the third time, another SSSP was submitted and rejected by Headquarters the site was not at low risk. (Appendix Q)

    In May 1998, Deputy Assistant Secretary Glenn S. Podonsky of the Office of Independent Oversight and Performance Assurance (heretofore the Office of Independent Oversight) wrote that after a comprehensive inspection, . . . the protection program elements measured during this inspection do not indicate that a fully effective program is yet in place. As evidenced by deficiencies identified in some areas of physical security systems, material control and accountability, computer security, and classified matter protection and control, there remain a number of legacy safeguards and security issues to be resolved. (Appendix P)

    Several whistleblowers attended a summer 1998 briefing of all DOE Security Directors at Savannah River Site near Aiken, SC, by a Navy Captain regarding force-on-force drills conducted by the Navy SEALs at Rocky Flats. During the tests, the SEALs successfully entered the site through the perimeter fence, getting into a nearby building, and "stealing" a significant quantity of plutonium, exiting the building, getting out through the fence and escaping without being caught. After this embarrassment, for the next two force-on-force tests, Rocky Flats management over controlled and demanded that the SEALs could not go through the same hole from which they came in they had to take the plutonium and climb a guard tower and rope it over the fence. (Of course, real terrorists could have just thrown it over the fence.) In these two contrived tests, the protective force successfully defended the facility. According to the whistleblowers, the SEAL Captain announced he would never waste the time of the SEALs coming back to a DOE site, because the tests were unrealistic.

    In July 1999, then-Energy Secretary Bill Richardson sent a security team to Rocky Flats. Two glaring vulnerabilities were found, strikingly similar to those found in 1995 and again in 1997. Rocky Flats management vehemently denied the teams accusation that plutonium was kept out of the vault without additional protective forces in place, as is required. Several hours later in the meeting, they finally admitted they had plutonium out of the vault in a high-risk situation eight hours a day, five days a week. (Appendix R) The significance of this dangerous practice was highlighted when, according to security team members, only a few weeks earlier an employee had walked out of a key security door setting off the alarm yet the protective force could never find the employee. Because the PU was inadequately protected, the employee could have taken some of it, walked out and thrown it over the fence never to be discovered.

    Also according to sources, the security team found the vehicle barrier on the wrong fence. A vehicle barrier is a heavy steel cable strong enough to stop a speeding truck loaded with thousands of pounds of explosives that should be attached to the inside fence of a two-fence perimeter. The Rocky Flats cable was on the outside fence, which does not have alarms. Therefore a terrorist could, undetected, cut the cable and drive through the outside fence, easily crash through the inside chain link fence in a truck loaded with explosives, park alongside a nearby vault, and detonate a bomb. This vulnerability had been identified in 1996, and had never been fixed. In late 1999, under pressure from Richardsons team, this problem was addressed within hours at minimal cost by placing large boulders around the fence.

    In October 1999, the DOE security czar sent DOE and DOD experts to Rocky Flats to resolve the outstanding problems found by Richardsons team. At first, Rocky Flats DOE management refused to allow the team on the site. Once they were permitted inside, the experts still found the same problems Rocky Flats had agreed to fix two years earlier.

    When the experts returned in March 2000 to validate the protective force changes, they found a different but alarming trend. Repeatedly during force-on-force drills, the protective forces were shooting everyone in sight mock terrorists, scientists, controllers wearing orange safety vests, and each other in a simulated test. The rules of deadly force were completely abandoned to pass the tests and prove low risk, the same problem noted in 1998 and again in 1999. (Appendix C; Appendix M)

    Los Alamos Technical Area-18

    Technical Area-18 (TA-18), run by the University of California, is one of a number of technical areas at Los Alamos. It houses several nuclear burst reactors and tons of weapons-grade HEU and PU. The facility was built on the floor of a canyon in the 1940's so that the walls of the canyon would absorb the radiation from the reactors. However, today the lack of control of the high ground around the canyon makes the site extremely difficult to defend.

    Special Nuclear Materials (SNM) are stored in vaults at several locations on the site. The security infrastructure has been in a state of disrepair. As recently as a few years ago it was found that someone could get inside the fence without being detected because of the poor quality of the closed-circuit TV cameras. Until recently one of the vaults storing SNM even had a window.

    The House Subcommittee on Oversight and Investigations was concerned about the security of this site as early as the early 1980's. According to former Chairman John Dingell, The Subcommittees work on this matter began in 1981 in response to efforts to undermine independent review of security threats. . .[T]he safeguards at the most critical facilities which included Los Alamos were in shambles while, at the same time, DOEs Office of Safeguards and Security was giving the facilities a clean bill of health. (Appendix S)

    In 1997, a special unit of the U.S. Army Special Forces was the adversary during a force-on-force exercise. The normal theft scenario is to steal enough SNM for a crude nuclear weapon that would fit in rucksacks. But, according to the Wall Street Journal, this exercise required that they steal more HEU than a person can carry. Not to be outmaneuvered, the Army Special Forces commandos went to Home Depot and bought a garden cart. They attacked TA-18, loaded the garden cart with nuclear materials, and left the facility. [T]he invaders reached the simulated objective of the game: enough nuclear material to make an atom bomb. (Appendix T) And they did so with relative ease. As the Wall Street Journal reported,

    As the Wall Sreet Journal further noted, The 1997 mock invasion succeeded despite months of guard [protective forces] training and dozens of computerized battle simulations showing that newly beefed-up defenders of the facility would win. (Appendix T)

    In 1998, while completing their required annual survey, the Albuquerque Operations Office found the security at TA-18 and other Los Alamos sites unsatisfactory. By the time the report made its way through top management, the unsatisfactory became satisfactory, with no change in actual security. A force-on-force exercise was performed by the 1998 survey team, but they reported that the Los Alamos protective force had compromised the exercise. The DOE Inspector General found that DOE supervisors in Albuquerque refused to investigate the matter. A more detailed description of these incidents is found in the Field Operations Office annual surveys section of this report below. (Appendix U)

    In the Summer of 1999, Secretary Richardsons security team inspected Los Alamos and recommended that TA-18 be shut down and immediately de-inventoried because it could not be defended. However, DOE management persuaded Secretary Richardson not to shut down the site immediately, but instead to further study the matter. In the Fall of 1999, Secretary Richardson created a relocation team to recommend alternative sites for the TA-18 missions. (Appendix V)

    In January 2000, while on a site visit to TA-18, members of the relocation team raised questions about an obvious vulnerability at this site. In a semi-hardened building, one of the burst reactors with large plates of HEU fuel was properly stored in an upgraded vault. Another almost identical reactor was sitting in the middle of an open area. The obvious security issue was to either put the reactor in a vault, or take the fuel out and store it in a vault. Los Alamos management refused to do either. (Appendix A)

    In a meeting to determine the relocation teams recommendation to Secretary Richardson, Defense Programs (the predecessor organization to the National Nuclear Security Administration [NNSA]) was the lone voice out of ten DOE offices that resisted relocating the facility. Defense Programs took this position in the very memo where they pointed out it would be less expensive to move TA-18 to a more secure site. (Appendix V)

    In April 2000, Secretary Richardson, against strong reactions from DOE Defense Programs, ordered that TA-18 be shut down and the SNM completely removed by 2004. He also ordered that a Memorandum of Decision (MOD) be completed by January 15, 2001, in which he would identify the new location for the TA-18 mission. Defense Programs dragged their feet and had barely started the necessary steps to complete the MOD, including the Environmental Impact Statement (EIS) by the deadline. (Appendix X)

    In October 2000, the Headquarters Independent Oversight group ran a force-on-force attack gaining access to the reactor fuel and potentially causing a sizable nuclear detonation that would have taken out part of New Mexico and caused havoc downwind. (Appendix A)

    On November 22, 2000, shortly after a meeting with Secretary Richardson, NNSA Director General John Gordon sent an angry letter to Los Alamos Lab Director Dr. John Browne threatening to shut down TA-18 after the debacle in October. Gordon wrote:

    A DOE Headquarters security team went to Los Alamos in December of 2000 to verify that Los Alamos had made adequate upgrades. While they had made upgrades, the changes had not been performance tested to ascertain their effectiveness. An internal DOE memorandum raised basic questions about the adequacy of the new and improved protection of this site. (Appendix A)

    Transportation Security Division

    The Department of Energy Transportation Security Division (TSD) moves nuclear weapons, as well as weapons-grade uranium and plutonium, from site to site across the nation on public highways. The protective forces in the Transportation Division are civilian federal employees. In late 1998, TSD submitted a Site Safeguards and Security Plan (SSSP) to Headquarters for approval. Preliminary examination of the testing scenarios revealed that the SSSP used simplistic attacks and dumbed down use of weapons.

    During planning phases the TSD team of specialists and commanders were aghast at the proposed use of sniper rifles with armor-piercing incendiary rounds by the adversaries. The DOE Inspector General determined that DOE management considered the use of a sniper rifle unreasonable and that only super adversaries would use them. In fact, these weapons have been available since World War I. The GAO found in an undercover investigation that more than 100,000 rounds of Pentagon-surplus armor-piercing incendiary rounds have been sold on the civilian market. (Appendix Z)

    At the DOE Pantex nuclear weapons-assembly facility, security officials believed that armored Humvees were death traps, because of the availability of armor-piercing incendiary rounds. The Pantex Security Director lamented that he would never allow his protective forces to fight from them, and that it would have been just as effective to buy Yugos. Incredibly, the next day, Secretary Richardsons security team was at Sandia, and found officials in the process of buying armored Humvees. Using these readily-available armor-piercing incendiary rounds, terrorists could shoot through the armored truck cabs, killing the driver and protective forces, making the transported nuclear materials ready for the taking.

    In the simulation phase only four tests were run. According to sources familiar with the test, the TSD protective forces were literally annihilated in tens of seconds after an attack was started. In after-action briefings the convoy commander admitted that they had experienced similar results in force-on-force testing many months earlier. Part of the problem was that the guards weapons were of inadequate range to reach the adversary.

    A December 12, 1998 internal DOE memorandum reported on the computerized Joint Tactical Simulations (JTS) evaluations of the Transportation Divisions SSSP conducted at Sandia: JTS results on the first worst case scenario. . .were 3 losses and no wins. JTS results on the second worst case scenario. . .were 3 losses and 1 win. The high TSD JTS loss rate for the first two worst case scenarios caused TSD to request termination of JTS activity. TSD requested DOE Headquarters assistance to analyze the poor results and begin to determine possible corrective actions. (Appendix B)

    In early 1999, a special force-on-force test was run at Fort Hood for the luminaries from Washington Deputy Secretary, Undersecretary and top security and program officials, to show that the TSD could handle the threat. The U.S. Army Special Forces provided the adversaries. The protective force won. However, according to a Special Forces representative, he noticed a piece of paper held by a protective force member that he had just shot it was a complete outline of the mock terrorists attack plan. The protective force was cheating. Secretary Richardsons Special Assistant, Peter Stockton, proved the cheating to the Albuquerque manager and the TSD manager. No action was taken. (Appendix W)

    In November 1999, an Army Special Forces representative found that the new sniper rifles used by TSD were target range variety, not for combat in rugged terrain. In fact, the sights on the rifles were very sensitive and would not survive the rigors of combat. More than half of the unclassified recommendations made by the DOE Inspector General regarding the SSSP process were focused on improving the security of the TSD program. (Appendix MM)

    Major Threats to the Complex

    There are four particularly worrisome threats that cut across the complex: 1. The threat of attack by weapons of mass destruction; 2. The threat of truck bombs; 3. The threat of the creation of an Improvised Nuclear Device from the material at particular DOE sites; and 4.The threat of theft of nuclear secrets.

    Weapons of Mass Destruction

    In the summer of 1995, then-President Clinton issued Presidential Decision Directive 39 (PDD-39) to address the nations concern over the use of weapons of mass destruction (WMD) against our citizens11. Weapons of mass destruction are biological, chemical, radiological, and nuclear. In May of 1998 he added a supplemental directive PDD-62 reaffirming PDD-39. These two directives highlight the growing threat of unconventional attacks against the United States, including, terrorist attacks, use of weapons of mass destruction, assaults on our critical infrastructures and cyber-attacks.12

    The use of chemical and biological weapons has barely reached the level of consciousness in DOE. Security tests at the facilities do not include weapons of mass destruction in their scenarios. Chemical and biological weapons are not even considered in the Site Safeguards and Security Plans or SSSPs at any of the DOE nuclear sites. Keep in mind the use of chemical or biological weapons against DOE weapons facilities is as a limited engagement device for the terrorist to neutralize the protective forces and gain access to the SNM on site for theft, creation of an Improvised Nuclear Device (IND), or radiological dispersal sabotage. In a recent force-on-force drill at Los Alamos, the adversary force used a simulated irritant gas against the protective force. The protective force was totally unprepared for even the use of the gas mask. (Appendix A)

    Five and a half years after PDD-39 was issued by President Clinton, DOE now has a classified study underway on developing strategies against chemical and biological attacks. It is believed that this study will recommend further study.

    Truck Bombs

    Since the U.S. Marine barracks in Beirut, Lebanon, were leveled by a truck bomb in 1983, DOE facilities have been required to protect against truck bombs. The U.S. Government has suffered significantly from truck bombs:

    A September 2000 CIA Interagency Intelligence Committee on Terrorism report points out, These massive vehicular bombs have illustrated the need for substantial vehicle access denial systems to afford a buffer area between bomb vehicle and the building or facility requiring protection. (Appendix AA)

    A truck bomb at a nuclear weapons plant could be devastating, dispersing tons of PU or HEU over the surrounding communities. As discussed earlier in this report , Secretary Richardsons security team found that Rocky Flats was vulnerable to such an attack. They had placed the vehicle barrier cable on the outside fence rather than the inside fence. A terrorist could have cut the cable on the outside fence (which does not have alarms), driven a large truck through both fences and up against the wall of a vault containing tons of PU, and detonate a bomb before any credible response could be mounted by the protective force. Putting the cable on the inside fence would slow down an intruder once they have already broken through the outside fence, and set off the sensors between the fences thereby alerting protective forces to their presence. This is 16 years after the bombing of the U.S. Marine barracks in Beirut, 4 years after the Presidential Decision Directive on terrorism, and 2-1/2 years after this was initially discovered and Rocky Flats was ordered to fix it.

    At the Pantex Plant during one of the Secretarys Special Assistants visits in 1999 it was noted that the vehicle barrier on the primary road into the main storage area was installed backwards. Instead of stopping a vehicle the barrier would provide a ramp for the vehicle to drive over. Pantex, is the crown of DOE, and this area was the jewel in that crown. This area had been inspected and examined countless times by the assessment, survey and inspection groups since 1995.

    The Creation of an Improvised Nuclear Device

    A Improvised Nuclear Device (IND) explosion is qualitatively different from exploding SNMs with a homemade bomb. While exploding PU or HEU with a bomb would cause a major dispersion of highly radioactive materials as occurred at the Chernobyl Reactor in the Ukraine, an IND explosion could cause a chain reaction on par with the devastation of Hiroshima and Nagasaki, Japan. An IND can be created at a number of DOE sites because of the presence of nuclear weapons or special nuclear materials in bomb grade quality and quantity. This can cause nuclear detonations of varying sizes. Little time is required to accomplish this act. In a force-on-force test in October 2000 at TA-18, at Los Alamos, the protective force failed to stop the terrorists from gaining access therefore a sizable nuclear detonation was possible. (Appendix BB)

    Frighteningly, a terrorist group would not have to steal nuclear material, create a nuclear device, transport it in a suitcase to the United States, and detonate it in a major city. They could simply gain access to the material at a U.S. nuclear facility, some of which are near large cities where they could accomplish the same outcome. As the former DOE Director of Office of Safeguards and Security simply stated regarding Rocky Flats, . . .you don't need to take it in the middle of Denver, it's going in the middle of Denver anyway. (Appendix O)

    Although discussing the potential for an IND explosion is not classified, discussing the details of how such an explosion could be detonated has been classified by DOE as a Special Access Program (SAP). This vulnerability is widely recognized within the defense community, however DOE takes the stance that analyzing and fixing this vulnerability cannot be discussed by anyone other than those in the small club who have clearance for the SAP program. As a result, security experts have been forced to wait for these people to address this problem and they have been waiting for decades.

    Theft of Nuclear Secrets

    In early 1999, the Los Alamos cyber security failures surprised DOE. Congress and the press were highly critical of DOE for its inability to protect classified information on their computer systems. The Rudman Panel bemoaned the constant use of ineffective commissions and panels to review ongoing security failures at DOE:

    DOEs answer to this crisis was to initiate yet another multi-million dollar commission to study the matter. In the Fall of 1999, DOEs Defense Programs presented a foot-thick report entitled Information Security Management to the Undersecretary with a $1.3 billion price tag to solve the problem. Obviously it was not funded due to budgetary constraints. In the Summer of 2000, an internal review of cyber security of classified information found DOE had done nothing effective to stop a trusted insider from downloading the Mother Lode (bomb design information, etc.) and walking out the door exactly the concerns raised at Los Alamos eighteen months earlier.14 (Appendix D)

    The major threat to the compromise of critical information at DOE is the insider trusted employees. Virtually all of our known spies have been insiders with the highest security clearances. The DOE security team reviewed many of the interagency threat documents all came to the same conclusion the insider is a priority problem. Despite this, the vast majority of planning and preparations was aimed at protecting sensitive information from outsiders.15 (Appendix D)

    A number of experts believe that there are ways of protecting priority information to near certainty for very little money but it just doesnt happen. The Labs simply refuse to prioritize what should be protected because they are more concerned about convenience for the scientists rather than security. The Warren Rudman lead Presidents Foreign Intelligence Advisory Board (PFIAB) Panel concluded:

    There is a device that looks like a childs Game Boy that can download the equivalent of 1100 floppy disks off a computer in 3 minutes and 14 seconds. There is also a device called a memory stick about the size of a stick of gum that can hold the equivalent of 44 floppy disks. Virtually the only way to stop the abuse of this technology is the use of media-less computing. To stop an insider you have to stop any media (disks, tapes, laptops, etc.) from coming in or going out of priority classified areas. On August 30-31, 2000, a meeting was held at Lawrence Livermore with the Chief Information Officers of the key facilities and labs and the DOE officials from the Operations Offices. Everyone agreed that DOE had to move ahead quickly on the insider problem before the Hill or the press found out that virtually nothing effective had been done to stop a dedicated insider. (Appendix D; Appendix CC)

    An implementation strategy was established at the Livermore meeting for near-term enhanced security for classified systems including implementing media-less computing systems. (Appendix CC) A schedule was developed during this meeting that would have had this system in place before the end of 2000 at a cost in the neighborhood of $10-15 million. The consensus was that these changes would have taken DOE from a low confidence level that a trusted insider could be stopped, to near certainty.

    The effort was rejected by the NNSA representative, John Todd, in deference to the alleged functionality and morale concerns of the lab scientists. In the battle between morale of scientists and security, security always loses. In an October 30, 2000 memo to then-DOE Secretary Richardson, his Special Assistant Peter Stockton wrote,

    Misleading Test Results And they Still Lose 50% of the Time

    Dumbed-down Security Tests

    Past results have demonstrated that security forces and DOE field management have learned how to game-the-game to the extent that most tests are unrealistic, tactics are canned and expected, and the outcome of exercises are pre-ordained. Two techniques are used to performance test the protection system effectiveness 1) force-on-force tests performed by mock terrorists from the DOE, Army Special Forces and Navy SEALs, and 2) computerized Joint Tactical Simulations (JTS).

    A number of groups including the Army Special Forces, Special Operations Unit of the Special Forces, the Navy SEALs and DOEs Office of Independent Oversight have raised serious questions about realism of the force-on-force tests and the JTS computer simulations used to test the effectiveness of protective force responses. They all argue that exercise artificialities make the protective forces appear far more capable than they actually are yet even with the scales tipped in their direction, protective forces still lose over 50% of the time. (Appendix DD)

    The protective forces are civilian private contractors not under military discipline or the military command structure. A postulated terrorist attack on these facilities would be not only a surprise but also extraordinarily violent, considering the conventional weaponry and explosives available to terrorists today. Some experts question whether the protective forces would have the training or experience or would continue to fight under these circumstances. It is not a question of the personal courage or dedication of the protective force, but the daunting circumstances under which they are placed by the system.

    On August 30, 1999, the DOE Office of Independent Oversight sent an unusually candid memorandum marked For Official Use Only to the new security czar, describing in detail the weaknesses and artificialities of the security testing process at DOE. According to this office:

    This document clearly articulates the grave concerns of the DOE Independent Oversight Office regarding the inadequacies of the simulation and exercise test system used by DOE, and its inability to accurately predict security capability or status.

    There is virtually no surprise in a force-on-force test. Once the protective force is outfitted with the Multiple Integrated Laser Engagement System (MILES) weapons laser-simulation equipment, they know the attack will take place within an hour or two. The specific location of the attack is always tipped off by the controllers and the observers during the safety walk down. A walk down is performed across the whole area where a battle will be simulated to ensure no obstacles or other land variations would trip or otherwise injure the protective forces during the exercise obviously not creating a realistic scenario. This is far more than leaning forward in the foxhole.

    Another indicator of the artificiality of force-on-forces are the baffling reactions of the protective forces during the tests. For example, in the force-on-force test at Rocky Flats in 1998, 1999 and again in 2000, the protective force indiscriminately shot scientists, controlling referees in orange vests, and each other as they were exiting the building in response to the alarm.

    This obviously is not a realistic demonstration of how the protective forces would react to a terrorist attack, making the force-on-force test next to useless. DOE Headquarters had already warned Rocky Flats about this inappropriate use of deadly force.

    During the March 2000 force-on-force drill, extreme restrictions were placed on the adversaries by Rocky Flats management. The commando adversary team was prohibited from using their own radios and could not effectively communicate. In addition, the commandoes were not even allowed to drive around a road block simulated by a PF [protective force] vehicle being parked on the side of the road and a traffic cone placed in the center of the road, which led to the facility. To suggest terrorists would not drive around a car and traffic cone to reach their target stretches reasonable expectations. (Appendix C)

    In a force-on-force test at Los Alamos in October 2000, a convoy of protective forces responding to an attack at another site hit a minefield. Despite the fact that the first vehicle hit a mine and would have been destroyed, the other vehicles continued on through the minefield. Military doctrine and common sense clearly calls for a convoy to stop when hitting a minefield. Los Alamos managements response was that they didnt have time to stop. (Appendix A)

    Overstatement of Protective Force Combat Effectiveness

    A recent force-on-force test illustrates the problem of combat ineffectiveness. In a memo to then-Energy Secretary Richardson his Special Assistant Peter Stockton wrote, [D]espite the absolutely critical requirement for denial [not allowing an adversary in a building]. . .denial failed. It is clear that if denial were to fail in a real attack, such a facility cannot be recaptured because of the extraordinary percentage of protective forces killed in the initial skirmish. Military doctrine dictates when losses exceed 20%, forces become combat ineffective due to loss of command and communications and basic squad-sized tactics deficiencies. In this force-on-force test, the site lost 50% of their protective force in the initial attack with eight dead on the doorstep of the facility. At this point, according to combat veterans, there would likely be no further offensive action to recapture the facility by the protective force. In a number of force-on-force scenarios developed by DOE, even when the protective force is successful in repelling an attack, they lose up to 80-95% of the force. This is simply unrealistic. Los Alamos security officials admit this is a problem, but they claim they have unusually brave people. Real bullets may make a difference in their calculation. As an Army Special Forces Commander wrote:

    The clear solution is to shut down sites that cant be protected; if they have a critical mission, move sensitive materials to a site that can be protected.

    Simple access denial systems are available to the U.S. government which would delay terrorist access to sensitive materials. These systems were developed by DOE and are currently deployed at DOD facilities but not at DOE.

    Security analysts claim that Protective Forces are not robust in tactics, weaponry or numbers and result in a low probability of success all of which results in force-on-force failures in more than 50% of the tests. (Appendix DD) Even with improved tactics and weaponry, the protective force at the 10 critical fixed DOE sites are still at half the manpower level deployed in 1992.

    Naturally, safety is a constant concern for all DOE employees. However, the same safety standards that apply to an office worker also apply to the protective force. Because of this universal application of safety standards the protective forces are encouraged not to, and in many cases prohibited from, engaging in any activity that could possibly result in any injury. All this contributes to a protective force unable and unwilling to respond when they are most needed.

    Security Oversight A Weak Record

    In Congressional testimony, DOE has led the public to believe that its security at these sites is a well-oiled machine, and there is nothing to worry about. After all, they argue the government has been building bombs at these sites for 60 years, and no one has attacked them yet. Given the recent tragedies in New York and Washington, DC, this argument falls flat. In fact, they are one-eyed toothless watchdogs. Each level of oversight fails for varying reasons: conflict of interest, protection of the contractor, embarrassment, protection of the program, political sensitivities, and bureaucratic survival. The following is an analysis up the chain of command of this redundant security oversight apparatus:

    Up the Security Chain of Command

    National Nuclear Security Administration
    Different Name, Same Problem

    In the wake of the Los Alamos security breach, the Congress reacted by legislatively mandating the reorganization of the nuclear weapons program in DOE by creating a semi-autonomous agency reporting to the Secretary National Nuclear Security Administration (NNSA). Even though the Agency was named the National Nuclear Security Administration, security is only one of the many duties entrusted to it.

    For example, on June 27, 2001, Administrator of the National Nuclear Security Administration General Gordon testified before the House Armed Services Committee on the work and budget needs of the NNSA. Out of 44 single-spaced pages of testimony, General Gordon only devoted 1 pages to physical and cyber security. This testimony demonstrates the extraordinary span of General Gordons responsibilities: there is no way security (and safety for that matter) can compete with nuclear submarines, non-proliferation deals with Russia, and stockpile surety. This hodgepodge is clearly, as General Gordon says, fragile if not worse17.

    The Los Alamos case was a cyber security problem and an alleged counter intelligence issue. There have been no hearings since the early 1990's addressing the myriad of issues involved in physical security. The reorganization did nothing to address the physical security problems. In fact it exacerbated the problems. It was simply a rearrangement of the deck chairs in a bureaucracy that has failed. In a memo from NNSAs Principle Deputy Administrator, Bob Kuckuck even stated, This reorganization is predominantly a functional realignment with many employees continuing to perform their current functions. He went on to say that many employees would even continue to report to their current supervisor. (Appendix GG) Furthermore, several of the new appointments to top NNSA positions were the very same people who oversaw the agencys predecessor, DOE Defense Programs. At that time, Representative John Dingell (D-MI) warned that this was a mistake:

    As it has turned out, the Congress has already realized they simply created another unwieldy bureaucracy. In the FY2002 House Appropriations Report, it was observed that, Congress assumed that creation of the NNSA would lead to efficiencies and streamlined management. However, the result has been an increase in staff at Headquarters and in the field. (Appendix HH)

    Lack of Congressional Oversight

    In testimony before the House Commerce Committee on April 20, 1999, the GAO stated we are concerned that, given DOEs past record, it may not be up to the challenge without congressional oversight to hold it accountable for achieving specific goals and objectives for security reform. (Appendix II)

    There are two things that move any bureaucracy: one is sustained press attention to a problem and second is congressional oversight. For example, recently there was sustained press attention to the plutonium contamination of workers at a DOE facility at Paducah, Kentucky which finally lead DOE to compensate the injured workers and their families. Over the last 20-30 years, there has never been sustained press attention paid to security debacles at DOE because the Department has been able to hide behind overclassification.

    Throughout the 1980's and early 1990's, Chairman John Dingell (D-MI) of the House Energy and Commerce Committee conducted numerous investigations of security lapses. One major problem that Chairman Dingell faced was that he did not have clear jurisdiction over the budget of the nuclear weapons program. He was unable, therefore, to use the most effective threat to the Department budget cuts.

    Despite the efforts of both the GAO and Representative Dingells Committee, the DOE bureaucracy remained entrenched. According to the Presidents Foreign Intelligence Advisory Board, The panel has found that DOE and the weapons laboratories have a deeply rooted culture of low regard for and, at times, hostility to security issues, which has continually frustrated the efforts of its internal and external critics, notably the GAO and House Energy and Commerce Committee.18

    The Congressional hearings spurred by the Los Alamos cyber security breaches focused on two specific incidents of security failures, but did not deal with the systemic physical and cyber security problems at the nuclear weapons complex. As this report illustrates, without sustained and intensive scrutiny and oversight, DOE briefings and testimony will not reveal the actual status of security.

    Rewards and Punishment Turned On Its Head

    Promotions for Security Failures

    Whenever a security crisis occurs at DOE, the Secretary usually assures the Congress and the press that the responsible officials will be held accountable. It virtually never happens. As the Rudman report points out, the lack of accountability . . . has become endemic throughout the entire Department.19 On the other hand, if someone internally raises an issue about security, they are always retaliated against and find themselves without any further security responsibilities. In other words, the reward and punishment system is turned on its head.

    For example, Dr. John Browne, the lab director at Los Alamos, was in charge during the Wen Ho Lee case, the hard drive debacle and the force-on-force in October 2000 that would have led to a nuclear detonation. He is still the lab director. Steve Younger, the head of the X Division at Los Alamos where these debacles took place remained in his job, until appointed by President Bush to become the head of the Pentagons Defense Threat Reduction Agency. The security director at Los Alamos, Stan Busbaum, is still in his job.

    Rocky Flats, which is operated by contractor Kaiser-Hill, had severe security problems in the 1996-98 time frame and again in 1999. In 1997, outgoing Secretary of Energy Hazel OLeary became a paid Director of Kaiser and outgoing DOE Assistant Secretary for Environmental Management (overseeing Rocky Flats) Tom Grumbly became Senior Vice President for Kaiser. The current DOE Undersecretary Robert Card was President and CEO of the Kaiser-Hill Company. The DOE Manager of the Rocky Flats Field Office from 1996 to 1999, Jessie Roberson, is now the DOE Assistant Secretary for Environmental Management.

    The head of the DOE Office of Security Affairs, Joe Mahaley, who was responsible for security at all the sites, and whose office was involved in many of the following retaliations, was promoted to becoming the new security czar.

    Whistleblowers: Shooting the Messenger

    In every investigation concerning problems at the DOE weapons facilities and laboratories, the individuals responsible for the operation of defense programs consistently and repeatedly denied the problems, punished the whistle blowers, and covered up the problems to their superiors and Congress.

    Representative John D. Dingell (D-MI) (Appendix S)

    Retaliation at DOE does not necessarily entail attempting to fire federal employees. In the majority of cases in the security area, DOE supervisors attempt to revoke the whistleblowers clearance on trumped-up charges. Then they remove them from any responsibility for oversight of security. On the other hand, contractors often lose their contracts, or their jobs, for blowing the whistle. The frequency of retaliation against nuclear security whistleblowers reached such a crescendo, that in 1999 then-Secretary Richardson sent a memorandum to all DOE and contract employees stating: Management must also create and foster a work environment that allows free and open expression of security concerns, where workers fear no reprisals or retaliation. (Appendix JJ)

    Over the last three years, in the face of Richardsons zero-tolerance of retaliation against security whistleblowers, DOE still succeeded in eliminating all of the whistleblowers, or speed bumps in the road, as one federal official put it. In fact, months after this zero-tolerance policy was in effect, when the DOE Inspector General was investigating security failures at Los Alamos, a number of individuals requested confidentiality. They indicated they feared retaliation for disclosing information to the Office of Inspector General. (Appendix U) Currently, there are few DOE employees left in the bureaucracy with the knowledge or willingness to risk the damage to their careers to raise concerns about the lack of security. Retaliation against whistleblowers has been a clear object lesson to the rest of the bureaucracy.

    Going back to the early 1980's, there has been a pattern of retaliation against federal and contractor employees who raise issues about security problems. For example:

    As Admiral Rickover once warned, You can sin against God, and God will forgive you if you sin against the bureaucracy, they will never forgive you! This old adage certainly describes the culture at DOE.

    Budget

    [T]he annual report I wrote. . . said that we were about $150 million dollars underfunded, we've lost 42% of our protective forces and 50% of our SWAT capability. I said that at a time when we've increased our SNM holdings by 70 metric tons. It doesn't take a brain surgeon to figure this one out.

    Edward McCallum, Director of Safeguards and Security, DOE (Appendix O)

    The security budget competes with the far more politically popular issues in the weapons programs such as stockpile stewardship and weapons research, that command far more Congressional interest. As a result, security ends up as a poor stepchild. For example, during the battle over relocating TA-18 at Los Alamos, the Acting Deputy Administrator for Defense Programs (the predecessor to NNSA) General Thomas Gioconda stated, Defense Programs limited capital funding is already allocated to higher priority Stockpile Stewardship projects. (Appendix V)

    The former Director of DOEs Office of Safeguards and Security stated, since 1992, the number of protective forces at DOE sites nationwide has decreased by almost 40% (from 5,640 to the current number of approximately 3,500), while the inventory of nuclear material has increased by more than 30%. At the same time, the total federal budget devoted to DOE security was cut by one-third. No one argues that the terrorist threat had been reduced, in fact, the intelligence community believes the threat is greater today than during the Cold War. (Appendix OO)

    In the mid 1990's the cuts were so deep that several sites including Livermore had to disband their SWAT teams. Livermore then had to depend on the Alameda County Sheriffs Department for a SWAT team. The only problem was it took the Sheriffs SWAT team over an hour to mobilize and deploy a force to Livermore long after a possible attack had taken place. Livermore found a way to overcome this response time problem. According to whistleblowers, in a 1995 force-on-force, the Army Special Forces adversaries found an Alameda County Sheriffs Department helicopter in the air and their SWAT team near the perimeter fence before the attack had started was the site cheating? The Sheriff told DOE investigators he had been told by the site that prepositioning his forces was acceptable. He understood the test to be one of capability not of timing. Clearly both are important. In 1998, Livermore decided the situation was untenable, and took an additional two years to reconstitute and train a new SWAT team.

    In 1999-2000, Secretary Richardson attempted to split the security budget out of the weapons program budget, putting it under the security czar. This was finally accomplished. However, it only lasted for a matter of months before the Congress put the security budget back under the new semi-autonomous National Nuclear Security Agency.

    PROBLEMS / SOLUTIONS

    PROBLEM: Nuclear Materials Are Spread Across the Country. Weapons-quantity special nuclear materials are stored at 10 fixed sites. This dispersion is a leftover from the Cold War, when there were many more missions for the various sites. Now, a number of sites have virtually no national security mission, however, they continue to store and try to protect tons of nuclear materials at great cost. DOE can not currently adequately protect this material, and security at each site unnecessarily increases redundancies and costs. However, DOE has resisted consolidation as it would threaten fiefdoms and potentially even lead to the closing down of facilities.

    PROBLEM: Bureaucracy Makes Security Tests Easier Rather than Fixing Problems. Without leadership and accountability, there are few incentives for the DOE bureaucracy to address problems. As a result, DOE portrays facilities as being secure and impervious to terrorists and spies when, in fact, they are not. This is largely achieved by sweeping undesirable messages and test results under the bureaucratic carpet and dumbing down the current system to hide embarrassing test failures. Ongoing publicized problems at such sites as Los Alamos and the Transportation Safeguards Division attest to this assertion.

    PROBLEM: Independence in Nuclear Security is Lacking. The recently Congressionally-created National Nuclear Security Administration (NNSA) exacerbates the problem by elevating the same people who have managed this debacle over the last three decades. As the Rudman report states, due to the deeply rooted culture of low regard for and, at times, hostility to security issues. . .a reshuffling of offices and lines of accountability may be a necessary step toward meaningful reform, but it will almost certainly not be sufficient.21

    PROBLEM: Computers Containing Nuclear Secrets Remain Vulnerable. It is virtually as easy today for a trusted insider to put weapons design information on a tape or disk and walk out the door as it was two years ago. All of our known spies have been insiders with the highest security clearances.

    PROBLEM: DOE Security Forces Cut by 40%. According to testimony from a high-level DOE official, Since 1992, the number of Protective Forces at DOE sites nationwide has decreased by almost 40% (from 5,640 to the current number of approximately 3,500) while the inventory of nuclear material has increased by 30%. (Appendix OO) The increase has resulted from the dismantling of nuclear weapons and the receipt of nuclear materials from the Former Soviet Union. During the same period the threat of terrorism has increased.


    ACRONYM GLOSSARY

    DIA - Defense Intelligence Agency

    DBT - Design Basis Threat

    EIS - Environmental Impact Statement

    GAO - General Accounting Office

    HEU - Highly Enriched Uranium

    IND - Improvised Nuclear Device

    IG - Inspector General

    JTS - Joint Tactical Simulations

    LANL - Los Alamos National Lab

    MILES - Multiple Integrated Laser Engagement System

    M&O - Management and Operations

    NNSA - National Nuclear Security Administration

    OIG - Office of Inspector General

    OSS - Office of Safeguards and Security

    OSSE - Office of Safeguards and Security Evaluations of the Office of Independent Oversight and Performance Assurance

    PDD - Presidential Decision Directive

    PF - Protective Force

    PU - Plutonium

    QA - Quality Assurance

    SAP - Special Access Program

    SNM - Special Nuclear Materials

    SSSP - Site Safeguards and Security Plan

    TA - Technical Area

    TSD - Transportation Security Division

    VA - Vulnerability Analysis

    WMD - Weapons of Mass Destruction


    FOOTNOTES

    Footnote and Document Note
    Some of the Footnotes are links to actual documents on other web sites. You will not leave POGO's frame as you go to these links. Please use the back button on your browser to return to the report.

    1. http://fas.org/sgp/library/pfiab/ Downloaded September 13, 2001.

    2. Ibid.

    3. http://www.senate.gov/~gov_affairs/vol2.pdf Downloaded on September 17, 2001.

    4. At the time this memo was written, this particular vulnerability had not yet been resolved, thus the identity of the facility was classified. Since that time, this particular vulnerability has been addressed to the satisfaction of General Gordon and the Office of Independent Oversight, making this information no longer classified. Details described in the memo, such as the garden cart incident and the plans for relocation, have since been attributed to TA-18 at Los Alamos National Lab, by Appendix T, Appendix V, and Appendix BB.

    5. The protective force and mock terrorists are outfitted with Multiple Integrated Laser Engagement System (MILES) weapons laser-simulation equipment.

    6. fas.org/sgp/library/pfiab/ Downloaded September 13, 2001.

    7. http://www.osti.gov/html/osti/opennet/document/press/pc13.html - Downloaded September 25, 2001.

    8. http://www.nci.org/new/nci-pro.htm - Download September 26, 2001.

    9. Figures compiled from U.S. Census, Metropolitan Areas Ranked by Population 2000. http://www.census.gov/population/cen2000/phc-t3/tab03.pdf - Downloaded as of September 17, 2001.

    10. www.whistleblower.org/www/grafexcerpt.htm Downloaded on September 17, 2001.

    11. Official policy positions by the President of the United States are issued through the National Security Council in the form of Presidential Decision Directives (PDD).

    12. http://www.info-sec.com/ciao/6263summary.html Downloaded on September 14, 2001.

    13. fas.org/sgp/library/pfiab/ Downloaded September 13, 2001.

    14. Ibid.

    15. Ibid.

    16. Ibid.

    17. www.nnsa.doe.gov/docs/JAG_HASC_Testimony_6-27.pdf Downloaded September 13, 2001.

    18. fas.org/sgp/library/pfiab/ Downloaded September 13, 2001.

    19. Ibid.

    20. www.whistleblower.org/www/graf.htm Downloaded September 14, 2001.

    21. fas.org/sgp/library/pfiab/ Downloaded September 13, 2001.


    Appendices

    Appendix A: Memo from Peter D. H. Stockton, DOE Special Assistant to: Secretary of Energy Bill Richardson, December 20, 2000.

    Appendix B: Memo from Richard J. Levernier, Program Manager Assessment and Integration to: Col. Edward J. McCallum, Director Office of Safeguards and Security, December 12, 1998; and

    Memo from Richard J. Levernier, Program Manager Assessment and Integration to: Col. Edward J. McCallum, Director Office of Safeguards and Security, April 19, 1999 with attachments.

    Appendix C: Memo from Richard J. Levernier, Program Manager Assessment and Integration to: James L. Ford, Acting Director Field Operations Division, April 11, 2000 with attachments.

    Appendix D: Memo from Peter D. H. Stockton, DOE Special Assistant to: Secretary of Energy Bill Richardson, October 30, 2000.

    Appendix E: Partial transcript of speech by General Eugene Habiger at the 41st Annual Meeting of the Institute of Nuclear Material Management.

    Appendix F: Declassification of United States Total Production of Weapon-Grade Plutonium, DOE Facts, December 7, 1993.

    Appendix G: Design Basis Threat for Department of Energy Programs and Facilities (Unclassified), U.S. Department of Energy Office of Safeguards and Security, December 1998.

    Appendix H: Memo from Joseph S. Mahaley, Director Office of Security Affairs to: Acting Deputy Secretary, February 9, 1999 with attachments.

    Appendix I: Memo from Barbara R. Stone, Director Office of Safeguards and Security Evaluations Office of Independent Oversight and Performance Assurance to: General Eugene E. Habiger, Director Office of Security and Emergency Operations, SO-1, August 30, 1999 with attachment.

    Appendix J: Letter from Timothy P. Cole, President Wackenhut Services Inc. to: Terry Vaeth, Manager U.S. Department of Energy, Rocky Flats, July 16, 1992.

    Appendix K: Office of Personnel Management interview with William R. Gillison, General Manager, Wackenhut Services Inc., between March 6, 1996 and April 10, 1996.

    Appendix L: Report to the President on the Status of Safeguards and Security for 1996, Office of Safeguards and Security, Office of Security Affairs, Department of Energy, January 1997.

    Appendix M: Verification Assessment Report of the Rocky Flats Environmental Technology Site Safeguards and Security Plan, Department of Energy Internal Memo July 17, 1998.

    Appendix N: Letter from Col. David Ridenour, Director Office of Safeguards and Security to: Ms. Jessie Roberson, Manager, DOE Rocky Flats Office, March 31, 1997; and

    Letter from Col. David Ridenour, Director Office of Safeguards and Security to: Secretary of Energy Federico Pena, April 16, 1997.

    Appendix O: Excerpts of transcript of telephone conversations between Jeffrey Peters, Operational Security Manager, Wackenhut Services, Inc., and Col. Edward J. McCallum, Director Office of Safeguards and Security, May 7 & 8, 1997.

    Appendix P: Letter from Glenn S. Podonsky, Office of Independent Oversight to: J. Owendoff, Acting Assistant Secretary for Environmental Management, EM-1 & Jessie Roberson, Manager Rocky Flats Field Office, May 14, 1998.

    Appendix Q: Comprehensive Inspection of Rocky Flats Filed [sic] Office and the Rocky Flats Environmental Technology Site (U), Department of Energy Internal Memo, May 1998.

    Appendix R: Testimony of Peter D. H. Stockton, former-DOE Special Assistant, U.S. District Court, Colorado, Civil Action No. 97-WM-2191, U.S., ex rel., Col. David Ridenour et al. v. Kaiser-Hill Company, July 2001. This testimony was witnessed and cleared by a Department of Energy classifier to ensure that no classified information was revealed.

    Appendix S: Letter from Representative John D. Dingell, Ranking Member, House Commerce Committee to: former Senator Warren Rudman, Presidents Foreign Intelligence Advisory Board, March 24, 1999; and

    Statement of Representative John D. Dingell at the Joint Hearing of the Commerce Committee Energy and Power Subcommittee & the Science Committee Energy and Environment Subcommittee on Restructuring the Department of Energy, July 13, 1999.

    Appendix T: Debate Widens Over Most Effective Way to Secure Energy Departments Los Alamos Nuclear Site, John J. Fialka, Wall Street Journal, March 15, 2000.

    Appendix U: Summary Report on Inspection of Allegations Relating to the Albuquerque Operations Office Security Survey Process and the Security Operations Self-Assessments at Los Alamos National Laboratory, U.S. Department of Energy Office of Inspector General, May 2000.

    Appendix V: Memo from General Thomas F. Gioconda, Acting Deputy Administrator for Defense Programs to: the Secretary of Energy Bill Richardson, March 2000.

    Appendix W: Letter from Ronald E. Timm President, RETA Security to: General Eugene Habiger Director, Office of Security & Emergency operations, SO-1, January 5, 2000.

    Appendix X: Letter from Maureen McCarthy and Ellen Livingston to: Secretary of Energy Bill Richardson, November 21, 2000.

    Appendix Y: Letter from General John A. Gordon, Administrator National Nuclear Security Administration to: Dr. John Browne, Director Los Alamos National Lab November 22, 2000.

    Appendix Z: Weaponry: Availability of Military .50 Caliber Ammunition, General Accounting Office Report # OSI-99-14R, June 30, 1999.

    Appendix AA: Improvised Explosive Devices (IEDs) and Other Criminal and Terrorist Devices: A Basic Reference Manual, Director of Central Intelligence, Interagency Intelligence Committee on Terrorism, September 2000.

    Appendix BB: DOE Probes New Security Lapse And Accident at Los Alamos Lab, John J. Fialka, Wall Street Journal, December 11, 2000.

    Appendix CC: Overheads from Integrated Cyber Security Initiative, August 29 & 30, 2000.

    Appendix DD: Letter from Peter D. H. Stockton, former DOE Special Assistant to: Senator Richard Shelby, September 13, 2001.

    Appendix EE: Draft Statement of Facts, Nuclear Security: Improvements Needed in DOEs Safeguards and Security Oversight, General Accounting Office Draft Report, December 14, 1999.

    Appendix FF: Dear Colleague letter from Representative Curt Weldon, June 22, 1999.

    Appendix GG: Memorandum for the Headquarters NNSA Team, Bob Kuckuck, Principle Deputy Administrator, National Nuclear Security Administration, August 20, 2001.

    Appendix HH: Energy Appropriations FY2002 House of Representatives Report.

    Appendix II: Department of Energy: Key Factors Underlying Security Problems at DOE Facilities, General Accounting Office Testimony #T-RCED-99-159, April 20, 1999.

    Appendix JJ: Memorandum for All Department and Contract Employees, Secretary of Energy Bill Richardson, June 17, 1999.

    Appendix KK: Letter from Glenn S. Podonsky, Director of Office of Independent Oversight to: Ronald E. Timm, President RETA Security, March 5, 2001.

    Appendix LL: Letter from Ronald E. Timm, President RETA Security to: Secretary of Energy Spencer Abraham, February 9, 2001.

    Appendix MM: Summary Report on Allegations Concerning the Department of Energy Site Safeguards and Security Planning Process, Department of Energy Office of Inspector General, September 2000.

    Appendix NN: DOE Notification Letter from Owen Johnson, Director Office of Safeguard and Security, October 26, 2000.

    Appendix OO: Statement of Col. Edward J. McCallum, Director Office of Safeguards and Security, June 8, 1999.

    Appendix PP: Nuclear Safety: Potential Security Weaknesses at Los Alamos and Other DOE Facilities, General Accounting Office Report #RCED-91-12, October 1990.


    Contact POGO Click to the left to let POGO know! Please contact us if you have inside information concerning abuse of power, mismanagement or subservience to powerful special interests by the federal government.