Are US Nuke Secrets Vulnerable to Cyberattack?

The Department of Energy’s internal watchdog has released a “very problematic” report about its cybersecurity practices.

Wikimedia Commons

The Department of Energy, which is responsible for safeguarding America’s nuclear weapons and secrets, has failed to tell law enforcement the details of when its computer systems have come under attack, “hindering investigations” into some of the 2,300 cybersecurity incidents the agency recorded between October 2009 and March 2012. This lack of timely and comprehensive cybersecurity reporting is putting the DOE’s “information systems and networks at increased risk,” according to a new investigation by the agency’s internal watchdog.

The findings are “very problematic,” says James Lewis, a senior cybersecurity expert at the Center for Strategic and International Studies, because “DOE sites are a primary target for espionage and have been successfully hacked in the past.”

While preparing the report, the DOE’s Office of Inspector General audited seven sites, including nuclear laboratories at Los Alamos and the Savannah River Site in South Carolina, and found that, of 223 incidents reported at DOE sites, 41 percent were not reported within established time frames. Another 10 incidents involving a loss of personally identifiable information (which affected 109 people) were reported late.

Joshua McConaha, a spokesman for the National Nuclear Security Administration (NNSA), the DOE entity responsible for the nation’s nuclear weapons stockpile, told Mother Jones that the cybersecurity incidents not involving identity theft “were normal computer issues such as viruses” that occur “on a regular basis.” But experts say that the report’s findings still don’t bode well for nuclear weapons security.

Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists, says that while the weapons themselves weren’t at risk, “weapons-related information and facility security information could potentially be vulnerable.” It wouldn’t be the first time: In 2007, hackers believed to be from China launched a sophisticated cyberattack on several DOE laboratories in the United States. A spokesman for Los Alamos National Lab, which undertakes nuclear weapons design, told ABC News that “a significant amount of data was removed” from a small number of computers on the facility’s unclassified network. This is the same lab that had its director step down in 2003 after a scandal involving widespread theft and security lapses.

Kevin Roark, a spokesman for Los Alamos National Laboratory, denies that the lab is reporting cyberattacks incorrectly. He told Mother Jones that the audit listed “six incidents where they believed Los Alamos was late in its reporting,” none of which had to do with personal information being stolen. And according to Roark, “Los Alamos personnel have subsequently checked the six incidents, and determined that all were reported within the required time frame, but the information in the reports led the reporting authority to derive an inaccurate date and time.”

When asked to about the incidents and Roark’s response, a spokesman for the IG said that “the report speaks for itself and we have no additional comment.”

It’s well established that the NNSA faces regular cyberattacks—a spokesman for the agency told US News and World Report in March that if you count “security significant cyber security events,” the number of cyberattacks goes up to 10 million per day. (Experts told Mother Jones that the number changes depending on how you categorize different types of incidents.) The real question is whether NNSA and DOE can deal with the attacks. The DOE has recently taken steps like improving cybersecurity training for employees and addressing weaknesses at facilities, according to a separate report released by the inspector general last month.

“Cybersecurity is a work in progress, both inside and outside government.” Aftergood notes. ” One would like to think that the nuclear weapons infrastructure would be ahead of the curve, but apparently that is too much to expect.”

Left unanswered is the question of who’s to blame for the cyberattacks that the DOE seems to have so much trouble reporting correctly.

“It’s probably not Russia or China,” Lewis snipes. “They’ve already gotten everything.”

Zoom in on the map below to find the warheads near you as well as the nuclear labs that maintain the stockpile and develop the next generation of atomic weaponry. (For reference, we’ve also included the locations of the nation’s civilian nuclear power plants.)

View full-screen map

View Mother Jones: America’s Nuclear Facilities in a full-screen map

Sources: Bulletin of the Atomic Scientists and Federation of American Scientists (PDF), Office of the Deputy Assistant to the Secretary of Defense for Nuclear MattersNuclear Energy InstituteUnited States Nuclear Regulatory CommissionUnited States Navy.


The more we thought about how MoJo's journalism can have the most impact heading into the 2020 election, the more we realized that so many of today's stories come down to corruption: democracy and the rule of law being undermined by the wealthy and powerful for their own gain.

So we're launching a new Mother Jones Corruption Project to do deep, time-intensive reporting on systemic corruption. We aim to hire, build a team, and give them the time and space needed to understand how we got here and how we might get out. We'll publish what we find as a major series in the summer of 2020, including a special issue of our magazine, a dedicated online portal, and video and podcast series so it doesn't get lost in the daily deluge of breaking news.

It's unlike anything we've done before and we've got seed funding to get started, but we're asking readers to help crowdfund this new beat with an additional $500,000 so we can go even bigger. You can read why we're taking this approach and what we want to accomplish in "Corruption Isn't Just Another Scandal. It's the Rot Beneath All of Them," and if you like how it sounds, please help fund it with a tax-deductible donation today.

We Recommend


Sign up for our newsletters

Subscribe and we'll send Mother Jones straight to your inbox.

Get our award-winning magazine

Save big on a full year of investigations, ideas, and insights.


Support our journalism

Help Mother Jones' reporters dig deep with a tax-deductible donation.