-Caveat Lector-

InsightMag.com

01/01/2001

DOE ‘Green Book’ Secrets Exposed

By J.  Michael Waller
[EMAIL PROTECTED]


Insight uncovers astonishing new security lapses by the Energy
Department that, via public e-mail, compromised U.S.
nuclear-weapons designs and next-generation weapons plans.

Evidence of terrible security lapses at Department of Energy
(DOE) nuclear-weapons labs continues to mount — thanks,
ironically, to defenders of Wen Ho Lee, the Los Alamos, N.M.,
scientist who, according to the FBI, passed many of the most
sensitive U.S. nuclear-weapons secrets to the People’s Republic
of China.

Insight has learned that the sloppy — and possibly illegal — DOE
handling of other nuclear-weapons secrets may have compromised
the entire U.S.  nuclear arsenal to other countries, including
Russia. Senior DOE officials knew about the breach, but failed to
inform Congress.  One former U.S.  official with firsthand
knowledge tells Insight, “It all got kind of hushed up.”

Some of Lee’s defenders have argued that the Taiwan-born
scientist, who pleaded guilty in August to a single felony count
in a plea bargain with the FBI, was targeted unjustly because he
is Chinese.  Their line of defense is curious: that violations
such as those to which Lee pleaded guilty are common occurrences
at the DOE labs.

One of those defenders is Charles E.  Washington, a former DOE
acting director of counterintelligence.  Washington stated in an
August affidavit for Lee, “I am aware of Department of Energy
employees who were not imprisoned or prosecuted for committing
offenses that are much more serious than the ‘security
infractions’ alleged to have been committed by Dr.  Lee.  I am
personally aware of a DOE employee who committed a most egregious
case of espionage that cost our nation billions of dollars and
drastically impacted our national defense.  That DOE employee was
not prosecuted.”

One of those cases to which Washington refers, sources tell
Insight, involves the aforesaid compromise of the entire U.S.
nuclear-weapons inventory, as well as plans for next-generation
nuclear weapons, to Russia and other countries.  Yet DOE did not
recommend punishment for the offending individual, sources tell
Insight.

That shocking and undoubted compromise occurred during
preparation of a classified report of the DOE’s Stockpile
Stewardship and Management Plan known as the “Green Book.”
According to Assistant Secretary of Energy for Defense Programs
Victor Reis, the Green Book “describes in detail our plans for
maintaining the safety and reliability of the nuclear-weapons
stockpile in the absence of underground testing and no new-design
nuclear-warhead production.” DOE presented the secret report to
Congress in 1997 and released a declassified version in response
to a lawsuit from disarmament groups early the following year.

The declassified version discussed the need to replace existing
stocks of nuclear weapons by 2010, to retain “the ability to
develop new nuclear options for emergent threats” and “the
technology for new approaches to deterrence,” according to
excerpts released by the antinuclear Los Alamos Study Group.

But Insight has learned the far more sensitive classified version
of the Green Book was compromised even before it was completed.
According to sources, a Los Alamos lab editor responsible for
compiling the Green Book sent edited sections back to the authors
over the open Internet — a massive security breach that deposited
the document, piece by secret piece, on open computer servers in
cyberspace.

“Every server it went through backed up automatically,” says an
Insight source.  “Anyone looking for the information could have
found it.” Whether it is still on the servers depends upon the
length of time between backups.

In a damage assessment in 1997, counterintelligence investigators
found that a computer printer at a Los Alamos area frequented by
visiting foreign scientists also was accessed for the classified
report.  And “at least one printer attached to the server had
forensics accessed from a Russian site,” according to a source.
An audit trail traced Internet-protocol (IP) addresses around the
world through which unknown computer operators accessed that
printer within the Los Alamos lab.

IP is a format for transmitting data over the Internet between
two computers.  An IP address is a numeric identifier for a
computer, usually an Internet service provider on a transmission
control protocol/Internet protocol (TCP/IP) network.  It does not
generally identify the exact location of the individual accessing
the information.  But those following the audit trails found that
computers entered the Los Alamos printer either from or through
IP addresses in Brazil, China, Israel and Russia.  But there the
trail ended.

Federal security officials must presume that the U.S.
nuclear-weapons data in the Green Book were compromised.  And
“every warhead in the current inventory is described in the Green
Book,” according to a senior nuclear-weapons security source.
“By definition, every warhead is compromised when it is put on an
unclassified system, made accessible whenever it switches through
different servers over the Internet and is then backed up.”

In addition, Lee, in his plea bargain, admits he downloaded what
the FBI calls the rough equivalent of 400,000 pages of
nuclear-weapons design and testing information from secret
government computers at Los Alamos.

Lee’s defenders argue that DOE has been rife with security lapses
that have gone uninvestigated and unpunished.  “I was informed of
the government’s claim that no other individuals have committed
similar offenses to Dr.  Lee and avoided prosecution.  Although I
do not currently have access to Department of Energy and FBI
files regarding investigations of other DOE employees, I am
certain that DOE files contain information that would prove that
this claim is false,” says Washington, the former DOE
counterintelligence official.

Washington, who is black and reportedly has had heated conflicts
with counterintelligence officials who are white, alleges that
the whites, for what he calls “racist” motivations, unfairly
targeted Lee because he is a member of a minority group.  He and
other Lee apologists argue that, at worst, Lee’s offense was
sloppiness, not treason.

“Security infractions within DOE are not unusual, and as long as
one is in good favor, security infractions generally do not
result in harsh discipline, much less criminal prosecution and
pretrial confinement,” says Washington.  “Many security
infractions involving classified information result in a form
being completed that indicates the violator was verbally
counseled, even though these counselings frequently did not
occur.  I do not believe that prior to the AI [administrative
inquiry] involving Dr.  Lee that other DOE employees who were in
good favor underwent this type of extreme scrutiny and criminal
prosecution when they committed security infractions.”

FBI Director Louis Freeh disagrees.  “In this case, as has
happened often in the past, national-security and
criminal-justice needs intersect,” he told reporters.  “In some
instances, prosecution must be foregone in favor of
national-security interests.  In this case, both are served.” The
FBI agreed to drop all but one of the charges against Lee — and
reduce any prison sentence to time served — in exchange for his
cooperation in wrapping up the case.

Other news organizations, including the Associated Press, the New
York Times and the Washington Post, recently have documented more
examples of sloppy DOE handling of highly classified material.
Even documents with the most sensitive classifications — special
compartmented intelligence (SCI), whose disclosure could mean the
death of U.S.  agents abroad — were handled carelessly and
sometimes lost, with potentially catastrophic consequences.
Recent press reports further show that the DOE sent classified
material by registered mail to addresses not authorized to
receive such material and that the Lawrence Livermore National
Laboratory shipped SCI documents on numerous occasions to
unauthorized recipients, despite repeated warnings to stop. One
DOE lab shipped critical SCI documents that were “lost.”

Insight also has learned that DOE improperly placed SCI
information on computer networks and then, in violation of
security procedures, changed software applications without regard
to possible security holes that could allow hackers to gain
access.

In 1993, the DOE Office of Export Control and International
Safeguards developed the Proliferation Information Network System
(PINS), a secret computer network intended to assist
export-control assessments and improve nonproliferation
coordination between DOE and other agencies. However,
counterintelligence sources tell Insight, officials responsible
for PINS showed little interest in safeguarding the most
sensitive intelligence information.

“They put SCI on a secret system with impunity,” says one
insider, meaning that extremely sensitive intelligence was placed
on a system with the much lower classification of “secret” that
made the life-or-death SCI material available to countless
unauthorized users. “There was willful ignoring of procedures and
policies that governed the use of computers,” says the source.
Those procedures and policies included a specific chain of
command to approve the removal or installation of software on the
system.

One investigation showed that PINS officials removed software
applications from DOE computers without going through the
approval chain and loaded new software that had not been tested
for security holes that would allow hackers to access the system.

In short, the new secretary of energy has a horrendous security
problem to deal with.  Especially important is determination of
how completely our nuclear-weapons secrets have been penetrated
by foreign intelligence, how it was done and by whom and how it
can be prevented from — happening again.  Congress can begin that
process in forthcoming confirmation hearings.  Failure to do so
will raise serious questions about cover-up.



=================================================================
             Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

  FROM THE DESK OF:
                     *Michael Spitzer*  <[EMAIL PROTECTED]>
                      ~~~~~~~~~~~~~~~
  The Best Way To Destroy Enemies Is To Change Them To Friends
=================================================================

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to