Calendar Year 2020

The task of cleaning up contaminated sites and disposing of radioactive waste, as reported in the
Department of Energy's recent Performance and Accountability Report, is one of the greatest
challenges the Department faces. The Department's effort is estimated to cost over $220 billion
for remediation activities at 114 separate sites, including waste stored at the Idaho National
Engineering and Environmental Laboratory (INEEL).
Department of Energy Procurement Issues Involving Small Business Set-Aside Contracts Awarded to Eagle Research Group, Inc
As part of its program to ensure the performance of the nation's inventory of nuclear weapons,
the Department of Energy must maintain the capability to manufacture nuclear weapons
"secondaries." Secondaries contain the fusion stage of modern nuclear weapons and create
most of the explosive yield.
Currently, the Y-12 National Security Complex in Oak Ridge, Tennessee, is the only site
capable of manufacturing and remanufacturing certain unique components necessary for
assembling the secondaries. Many of these components are produced at Y-12's Depleted
Uranium and Binary Metal Cycle Operations facility, the sole producer of several of the key
components. We conducted this audit to determine if the National Nuclear Security
Administration (NNSA) can ensure the facility's reliability.
Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program 2002.
Like most private sector and government organizations, the Department of Energy has an
aggressive program to provide its Federal and contractor personnel with the ability to remotely
access a number of unclassified information systems. Such access allows travelers,
telecommuters and those who occasionally work off-site to more easily perform businessrelated
functions from remote locations. Personnel are able, for example, to retrieve electronic
mail, access business or other operational systems and administer systems or networks by
using government or privately-owned computer equipment. Generally, remote access to the
Department's networks is achieved through dial-in modems or through internet connections.
While the benefits of such access are clear, there is a corresponding increase in certain inherent
risks, most importantly, the potential for unauthorized access to the Department's information
systems. Based on several recent investigative cases relating to attempts to intrude into the
Department's systems, we initiated this audit designed to assess the Department's performance
in managing the risk associated with remote access to unclassified information systems.