Los Alamos computer thefts prompt DOE security check at nuclear lab
Computerworld - Los Alamos National Laboratory last week launched a monthlong effort to ensure that computers taken off-site by employees fully comply with the nuclear research facility's information security policies.
Officials at the U.S. Department of Energy (DOE) facility said they are also conducting a full review of the policies governing the use of lab computers at the homes of employees.
Both initiatives were launched less than two months after the theft of three computers from the Santa Fe home of a lab employee and the subsequent disclosure that several dozen more systems are listed as missing from the U.S. nuclear weapons lab.
Jeffrey Berger, director of communications at the facility in Los Alamos, N.M., said that lab officials are taking the loss of the computers "very seriously."
"It is true that [the lab], like any large organization that uses computers, has had computers go missing or get stolen," he said.
Berger insisted that despite the recent thefts, the lab has "consistently earned some of the highest ratings for property accountability" by the DOE's National Nuclear Security Administration (NNSA).
Berger added that none of the missing systems held classified data.
The loss of the Los Alamos computers was disclosed earlier this month by the Project on Government Oversight, which posted on its Web site a memo from the NNSA to the lab expressing concern over the stolen computers.
The Feb. 3 memo noted that the DOE inquiry into the January theft found that as many as 67 Los Alamos lab computers were listed as "missing," including 13 that were known to have been lost or stolen. The memo chastised lab officials for what the the DOE called significant security weaknesses, as well as configuration management and accountability issues. It also cited uncertainty about the "magnitude of exposure and risk" resulting from the loss of the computers.
Berger contended that the memo and other reports about the thefts posted by the nonprofit watchdog group had "distorted the situation."
This version of this article originally appeared in Computerworld's print edition. It's an abridged version of a more in-depth look into the loss of computers at Los Alamos National Laboratory.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts