The National Nuclear Security Administration's Implementation of the Federal Information Security Management Act
The National Nuclear Security Administration's (NNSA) mission includes maintaining and enhancing the U.S. nuclear weapons stockpile, reducing global danger from weapons of mass destruction, and providing safe and effective nuclear propulsion. To achieve its
mission goals, the NNSA utilizes many classified and unclassified computer networks and individual systems. Given the sensitivity of the infonnation residing on these networks and systems, strong cyber security measures are essential for protecting operational, personally identifiable, and other critical data from compromise. In Fiscal Year 2006, NNSA officials reported that they expended just over $90 million on cyber security in an effort to protect its information technology resources.
mission goals, the NNSA utilizes many classified and unclassified computer networks and individual systems. Given the sensitivity of the infonnation residing on these networks and systems, strong cyber security measures are essential for protecting operational, personally identifiable, and other critical data from compromise. In Fiscal Year 2006, NNSA officials reported that they expended just over $90 million on cyber security in an effort to protect its information technology resources.
Device Assembly Facility Utilization
Management Controls over the National Nuclear Security Administration's Ability to Maintain Capability of the TA-18 Mission
The mission of Technical Area 18 (TA-I 8) at the National Nuclear Security
Administration's (NNSA) Los Alamos National Laboratory (Los Alamos) was to conduct
nuclear criticality experiments and hands-on training in nuclear safeguards, criticality
safety and emergency response. TA-18 was the only facility in the United States capable
of performing these nuclear criticality experiments needed to validate safety evaluations,
establish limits for operations involving special nuclear material (SNM), and provide
criticality training. Experiments were performed on five one-of-a-kind criticality
machines and required a diverse set of SNM and highly skilled technical personnel.
Administration's (NNSA) Los Alamos National Laboratory (Los Alamos) was to conduct
nuclear criticality experiments and hands-on training in nuclear safeguards, criticality
safety and emergency response. TA-18 was the only facility in the United States capable
of performing these nuclear criticality experiments needed to validate safety evaluations,
establish limits for operations involving special nuclear material (SNM), and provide
criticality training. Experiments were performed on five one-of-a-kind criticality
machines and required a diverse set of SNM and highly skilled technical personnel.
Excessing of Computers Used for Unclassified Controlled Information at the Idaho National Laboratory
I11 suppoi-t of its mission, the Department of Energy spends over $2 billioil each year on
infonnation teclulology and has a current inventory of approxiinately 800 info~mations ystems,
including up to 11 5,000 personal computers, many powerful supercomputers, numerous servers,
and a broad array of related peripheral equipment. The unclassified computers and electroil~c
inelllory devices in these infomlation technology systeins often contain "unclassified controlled
infoimation." This tenn includes unclassified controlled nuclear information, proprietary
information, export controlled information, official use only inforn~ationa, nd personally
identifiable infom~ation(P II), which can include employees' social security numbers, places of
birth, and dates of birth.
infonnation teclulology and has a current inventory of approxiinately 800 info~mations ystems,
including up to 11 5,000 personal computers, many powerful supercomputers, numerous servers,
and a broad array of related peripheral equipment. The unclassified computers and electroil~c
inelllory devices in these infomlation technology systeins often contain "unclassified controlled
infoimation." This tenn includes unclassified controlled nuclear information, proprietary
information, export controlled information, official use only inforn~ationa, nd personally
identifiable infom~ation(P II), which can include employees' social security numbers, places of
birth, and dates of birth.
I11 suppoi-t of its mission, the Department of Energy spends over $2 billioil each year on infonnation teclulology and has a current inventory of approxiinately 800 info~mations ystems, including up to 11 5,000 personal computers, many powerful super...
I11 suppoi-t of its mission, the Department of Energy spends over $2 billioil each year on
infonnation teclulology and has a current inventory of approxiinately 800 info~mations ystems,
including up to 11 5,000 personal computers, many powerful supercomputers, numerous servers,
and a broad array of related peripheral equipment. The unclassified computers and electroil~c
inelllory devices in these infomlation technology systeins often contain "unclassified controlled
infoimation." This tenn includes unclassified controlled nuclear information, proprietary
information, export controlled information, official use only inforn~ationa, nd personally
identifiable infom~ation(P II), which can include employees' social security numbers, places of
birth, and dates of birth.
infonnation teclulology and has a current inventory of approxiinately 800 info~mations ystems,
including up to 11 5,000 personal computers, many powerful supercomputers, numerous servers,
and a broad array of related peripheral equipment. The unclassified computers and electroil~c
inelllory devices in these infomlation technology systeins often contain "unclassified controlled
infoimation." This tenn includes unclassified controlled nuclear information, proprietary
information, export controlled information, official use only inforn~ationa, nd personally
identifiable infom~ation(P II), which can include employees' social security numbers, places of
birth, and dates of birth.
Alleged Loss or Theft of Personally Identifiable Information at Pantex