Energy IG report raises more security concerns
NNSA chief information officer says lack of resources caused compliance delays
- By Wade-Hahn Chan
- Apr 23, 2007
IG report: Excessing of Computers Used for Unclassified Controlled Information at Lawrence Livermore National Laboratory [.pdf]
The Energy Department’s inspector general found the National Nuclear Security Administration’s chief information officer created security risks by failing to implement departmentwide excess equipment directives at the Lawrence Livermore National Laboratory for almost two-and-a-half years. The CIO’s office cited resource constraints for delaying the enforcement of security directives that had 90-day implementation deadlines.
The Lawrence Livermore lab was in the process of implementing those directives as of March 1. NNSA did not incorporate them into the lab’s management contract with the University of California until 2006, the IG said in a report released in March.
“Instead of directing LLNL to implement the directives, NNSA waited while its Office of the Chief Information Officer drafted a policy letter to provide LLNL and other NNSA sites with specific requirements for clearing, sanitizing and destroying unclassified controlled information on computers and electronic devices,” wrote Gregory Friedman, DOE’s IG, in a memo accompanying the report on excess equipment policies at Lawrence Livermore.
The Lawrence Livermore lab disposes of about 5,300 computers each year. The departmentwide excess equipment directives issued in February 2004 and June 2005 apply to computer equipment containing unclassified information such as controlled nuclear data and official-use-only, proprietary and personally identifiable data.
David Schwoegler, a Lawrence Livermore lab spokesman, said the IG’s report took a limited view of the lab’s excess equipment policies by criticizing them for not aligning with departmentwide policies. Schwoegler said the lab has strong policies and procedures for disposing of unclassified computers and memory devices, and it complies with those policies.
“We don’t reuse unclassified drives,” Schwoegler said. “We destroy them. We hammermill them. We actually witness their destruction.” He said a contractor destroys them, and a lab employee documents it.
But Schwoegler said that because of the delays the IG cited, the lab shouldn’t be held liable for any data that might have been improperly disclosed during the past two-and-a-half years. The IG reported no improper disclosures.
DOE’s excess equipment policies are defined in two publications: a departmentwide notice released in February 2004 and a manual released in June 2005. However, NNSA did not enter the two publications into the lab’s contract until February 2006. According to the IG’s report, an official at NNSA’s Office of the CIO blamed the delay on “problems with resources and other issues.” Julianne Smith, an NNSA spokeswoman, said it was a resource allocation problem.
“As with all issues relating to cybersecurity, implementation of a policy is risk-based,” Smith said. “Within the allocated budget, each organization must prioritize policy implementation.”
DOE Secretary Samuel Bodman fired the previous administrator of NNSA,
Linton Brooks, in January for data security lapses breaches that occurred on his watch.