Data stolen from National Nuclear Security Administration

Click For Summary

Discussion Overview

The discussion centers around a data theft incident involving the National Nuclear Security Administration (NNSA), where sensitive information, including names and Social Security numbers of contract workers, was stolen. Participants explore the implications of this breach, the security measures in place, and the responsibilities of various government agencies regarding data protection.

Discussion Character

  • Debate/contested
  • Technical explanation
  • Conceptual clarification

Main Points Raised

  • Some participants express concern over the security practices of government agencies, questioning how sensitive information could be accessible to hackers.
  • Others argue that the breach highlights a broader issue of inadequate communication and security protocols among federal agencies.
  • A few participants emphasize that the stolen data could potentially allow unauthorized access to nuclear facilities, raising alarms about national security.
  • Some contributions suggest that the information stolen may not be sufficient for direct access to nuclear weaponry, prompting a debate about the severity of the breach.
  • There are mentions of other recent data theft incidents, indicating a pattern of security failures across various organizations, including the Department of Veterans Affairs.
  • Participants discuss the implications of outsourcing data processing and the perceived decline in security awareness among employees in various sectors.

Areas of Agreement / Disagreement

Participants do not reach a consensus on the implications of the data theft or the adequacy of the security measures in place. There are competing views on the severity of the breach and the responsibilities of different agencies involved.

Contextual Notes

Some participants reference specific security protocols and historical practices that may no longer be in place, indicating a potential shift in standards over time. There is also mention of the complexity of jurisdiction between the Department of Energy and the Department of Defense regarding nuclear security.

Who May Find This Useful

This discussion may be of interest to individuals concerned with cybersecurity, government accountability, and the implications of data breaches in sensitive sectors such as national security.

edward
Messages
73
Reaction score
165
Government workers are sleeping at the wheel. Why in Gods name would information on a National Nuclear Security Administration's computer be hackable? Perhaps the NSA should use their high tech equipment to take a closer look at other federal government agencies.

A hacker stole a file containing the names and Social Security numbers of 1,500 people working for the Energy Department's nuclear weapons agency.

But the incident last September, somewhat similar to recent problems at the Department of Veterans Affairs, was not reported to senior officials until two days ago, officials told a congressional hearing yesterday. None of the victims was notified, they said.

The data theft occurred in a computer system at a service center belonging to the National Nuclear Security Administration in Albuquerque, N.M. The file contained information about contract workers throughout the agency's nuclear weapons complex, a department spokesman said.
http://www.washingtonpost.com/wp-dyn/content/article/2006/06/09/AR2006060901505.html



This data theft goes far beyond the possibility of identiity theft. By showing who and where the Nuclear weapons contract workers are, it shows where the weapons complexes are.
 
Physics news on Phys.org
edward said:
Government workers are sleeping at the wheel. Why in Gods name would information on a National Nuclear Security Administration's computer be hackable? Perhaps the NSA should use their high tech equipment to take a closer look at other federal government agencies.

Err, the http://www.nsa.gov/. The former is under the DoD (I think) and does communications and cryptography stuff, the latter is under the DOE and mainly oversees nuclear weapons.

Just to get that straight...
 
Last edited by a moderator:
Yet another! In the last 2 months my SS info and more has been in 2 different stolen laptops. A Fidelity employee lost a laptop with ALL of HP employes info and sepetely a VA emploee lost a laptop with Vets info.

What is going on?
 
Rach3 said:
Err, the http://www.nsa.gov/. The former is under the DoD (I think) and does communications and cryptography stuff, the latter is under the DOE and mainly oversees nuclear weapons.

Just to get that straight...

I always had that straight. And that is part of the problem; too many agencies who can't communicate with each other, and each of them using their own data (or lack of) sucurity methods. Having information stolen from the National Nuclear Security Administration (DOE), should be a high priority for the National Security Agency (DOD).

This information stolen pertained to nuclear weapons belonging to the DOD not nuclear energy. The security of nuclear weapons is every bit as important as domestic surveillance.:rolleyes:

If the DOE can't keep its own national nuclear security information secret and untouched by outside hands, perhaps they need some supervision.

Hurky's link indicated that the NSA had started probing the DOD computers for weaknesses as early as 1997. Apparently they ignored the DOE. And once again someone dropped the ball and waited over six months to report it.
 
Last edited by a moderator:
Yah this was already posted a week ago...

edward said:
This information stolen pertained to nuclear weapons belonging to the DOD not nuclear energy. The security of nuclear weapons is every bit as important as domestic surveillance.

false, read the article.

https://www.physicsforums.com/showthread.php?t=123375

I don't know if it really required a lock however...
 
Last edited:
Pengwuino said:
Yah this was already posted a week ago...



false, read the article.

https://www.physicsforums.com/showthread.php?t=123375

I don't know if it really required a lock however...

Nuclear weapons definitely belong to the DOD! Did you ever see a recall run the 52's used to make. I have. There were planes in the air headed for Russia at all times. They turned around at the last minute and headed back provided they got the radio recall.

They were'nt carrying candy bars from the DOE. They were carrying nukes from the DOD. Either way it is a matter of semantics, The DOE lost information.

And the fact that the information was lost is the real point. Have the boy scouts take care of it if you wish.:rolleyes: I personally would rather see a more capable agency take charge of the situation.

Bear in mind anyone with the name, social security number, and location of a contract worker could possibly take that persons work identity and gain access to nuclear weapons.

When I worked for Martin in the 80's I had to sign a vow that I would sacrifice myself and/or my family to prevent this type of incident from happening. God you kids have it made. You just go ahead and play your own little version of "who's on first".

But in the end, the data was still lost by an agency who should have done a better job of protecting it. OK so pick it apart! The data will still be lost!

The data theft occurred in a computer system at a service center belonging to the National Nuclear Security Administration in Albuquerque, N.M. The file contained information about contract workers throughout the agency's nuclear weapons complex, a department spokesman said.
 
Last edited:
They have names and SSN's, hardly the information necessary to gain access to nuclear weaponry and national secrets. Stay on topic.
 
Pengwuino said:
They have names and SSN's, hardly the information necessary to gain access to nuclear weaponry and national secrets. Stay on topic.



I am on topic. Give me your name and SS number and I will easily find you. It wouldn't mean diddlly squat if just another 1500 ordinary people had lost personal info. The VA lost the data of 25 million. Many of the people in the DOE incident will be carrying identification cards that give them access to nuclear information and weapons. Dam I have been there and done that.

OH God forget it. I can see now how these things happen.:rolleyes:
 
Last edited:
  • #10
Integral said:
Yet another! In the last 2 months my SS info and more has been in 2 different stolen laptops. A Fidelity employee lost a laptop with ALL of HP employes info and sepetely a VA emploee lost a laptop with Vets info.

What is going on?

I think what is going on with ordinary people is that our personal info is spread so widely. A lot of banks are outsourcing their data processing and billing, both in and out of the country. Employers are outsourcing payroll to companies that do only payroll. Even my credit union has started outsouricng their data processing and credit card billing. I originally went with the Credit union to avoid just that.

But it is more than just that. We seem to have a generation of workers who don't have a clue about security, and employers who are trying to save a buck. When my wife was a bank employee all personal information files had to have two persons present to be opened. Security procedures like "Single point of entry" and "Dual control" have dissappeared and individuals are running around out there with their laptops full of our personal data.
 
  • #11
It is getting to the point where government computer information access or theft hardly makes the news. The little tidbit below was on page nine of my local paper.

WASHINGTON — An FBI computer consultant gained access to the secret passwords of Director Robert Mueller and others using free software found on the Internet, the latest embarrassment in the bureau's long struggle to modernize its computers.
http://www.foxnews.com/story/0,2933,202406,00.html

Again I think that our personal information is too widely spread. This particular case is an incident that is a great example of what can happen when a single person has access to vital information. This guy was working for an outsourced civialian contractor. The FBI used to be capable of doing this type of work in house.

Once the outsourcing starts the skills are lost, and that goes for the federal government as well as industry in general.

When everything was hard copy there was always dual control on classified information. Two people should have been working in close proximity to each other on this project. And yes that means two people with security clearances.
 
Last edited by a moderator:
  • #12
Administrative stuff as NNSA is apparently on unsecure systems, possibly in computers which are connected a network, which is connected to the Internet.

The nuclear weapons designs and technology are supposed to be on isolated computers in specially designed vaults, and generally one does not transport anything in or out of that vault without approval. Clearly data/reports have to be transported in and out.

Knowing who does what could be valuable to someone.

While DOD controls the disposition of nuclear weapons, the design and construction is handled by DOE/NNSA, which appears to be much less secure than it should be.
 

Similar threads

Replies
25
Views
4K
Replies
2
Views
3K
  • · Replies 16 ·
Replies
16
Views
4K
  • · Replies 25 ·
Replies
25
Views
5K
  • · Replies 36 ·
2
Replies
36
Views
17K
  • · Replies 29 ·
Replies
29
Views
11K
  • · Replies 6 ·
Replies
6
Views
4K
  • · Replies 10 ·
Replies
10
Views
4K
Replies
10
Views
5K
  • · Replies 65 ·
3
Replies
65
Views
12K