iTnews

Nuclear lab computers go missing

By Angela Moscaritolo on Feb 13, 2009 10:44AM
Nuclear lab computers go missing

Sixty-nine computers are missing or were stolen from the Los Alamos National Laboratory, a nuclear weaponry research institution in New Mexico, according to an internal memo released by a government watchdog.

Sixty-nine computers are missing or were stolen from the Los Alamos National Laboratory, a nuclear weaponry research institution in New Mexico, according to an internal memo released by a government watchdog.

Last year, 80 computers went unaccounted for -- 13 stolen and 67 missing. To date, 11 have been recovered, but 69 remain missing, lab spokesman Kevin Roark told SCMagazineUS.com.

None of the missing computers were labeled classified but still may have contained personal information on employees or other individuals, he said. Some of the machines contained encryption, and the lab now is considering implementing the technology across all computers.

“If we determine it's likely that someone's PII (personally identifiable information) has been compromised, we provide resources to those people to protect them from identity theft,” Roark said. “But the serious matter is whether there was classified info involved, which it was not.”

Los Alamos, part of the US Department of Energy, researches and develops technology related to national security.

An internal memo concerning the number of missing or stolen laptops was obtained and released by the nonprofit Project on Government Oversight (POGO), a federal government watchdog.

The memo states that a laptop theft occurred on January 16, where three computers were stolen from a lab employee's home in the city of Santa Fe. That incident revealed cybersecurity, management and accountability concerns.  

Initially, the incident was treated just as a property issue and the lab was "not engaged in a timely and proactive manner to assess and address potential loss of sensitive information,” the memo states. Only one of the three computers was authorised for home use, though, which since has raised security concerns that policies were not being followed, Roark said.

Adrian Lane, principal security strategist at security consultancy Securosis, told SCMagazineUS.com that this was often found in instances of machine being lost or stolen.

"You have to bring into question [that] each one has the possibility that there was actually sensitive information on it and if there's not protection [encryption] and they're not being audited, I would be worried," he said.

As a result of the memo, Los Alamos National Laboratory (LANS) was given until last Friday to send a written report about the status of all the stolen or missing computers and address the potential cybersecurity ramifications of each. Los Alamos was directed to work with the National Nuclear Security Administration (NNSA), which manages the lab, to develop and execute a program to correct any system deficiencies or weaknesses in computer accountability.

An NNSA spokesman said LANS did provide that correspondence on Friday but could not elaborate on the content of the letter, as it is currently under review.

See original article on scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
alamos computers laboratory los missing nuclear security

Partner Content

Tackling cybersecurity in 2021
Partner Content Tackling cybersecurity in 2021
Four data superpowers to harness before 2022
Promoted Content Four data superpowers to harness before 2022
What is zero trust cybersecurity?
Partner Content What is zero trust cybersecurity?
Why companies fail at picking cloud modernisation partners
Promoted Content Why companies fail at picking cloud modernisation partners

Sponsored Whitepapers

The top 5 tech trends to deliver business outcomes
The top 5 tech trends to deliver business outcomes
10 reasons why businesses need to invest in cloud security training
10 reasons why businesses need to invest in cloud security training
Your guide to application security solutions
Your guide to application security solutions
State of Software Security: Open Source Edition
State of Software Security: Open Source Edition
Five questions to ask before you upgrade to a SIEM solution
Five questions to ask before you upgrade to a SIEM solution

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • [iTnews and Micro Focus] Navigating the cloud modernisation minefield
By Angela Moscaritolo
Feb 13 2009
10:44AM
0 Comments

Related Articles

  • Geolocation threats rise following demonstration of router hacking that can pinpoint a person's home
  • US senator claims Microsoft failed to fix cloud holes before SolarWinds hack
  • 86 400 looks to strengthen customer sign-up process
  • Britain's GCHQ cyber spies embrace the AI revolution
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom to start enticing NBN customers to move

TPG Telecom to start enticing NBN customers to move

Infosys scores another $40m for Centrelink payments engine build

Infosys scores another $40m for Centrelink payments engine build

Telstra InfraCo opens up telco's own fibre network

Telstra InfraCo opens up telco's own fibre network

Transport for NSW data stolen in Accellion breach

Transport for NSW data stolen in Accellion breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.