Information Security


Book Description

The Los Alamos National Laboratory (LANL), which is overseen by the National Nuclear Security Admin. (NNSA), has experienced a number of security lapses in controlling classified information stored on its classified computer network. This report: (1) assesses the effectiveness of security controls LANL used to protect information on its classified network; (2) assesses whether LANL had fully implemented an information security program to ensure that security controls were effectively established and maintained for its classified network; and (3) identifies the expenditures used to operate and support its classified network from FY 2001 through 2008. Charts and tables.







Reports and Testimony


Book Description




Los Alamos National Laboratory


Book Description

In 2006, a Los Alamos Nat. Lab. (LANL) contract employee unlawfully removed classified information from the lab. This was the latest in a series of high-profile security incidents at LANL spanning almost a decade. LANL conducts research on nuclear weapons and other nat. security areas for the Nat. Nuclear Security Admin. This report: (1) identifies LANL¿s major programs and activities and how much they rely on classified resources; (2) identifies initiatives LANL is taking to reduce and consolidate its classified resources and physical footprints and the extent to which these initiatives address earlier security concerns; and (3) determines whether its new mgmt. approaches will sustain security improvements over the long-term. Illustrations.




Month in Review ...


Book Description




A Review of the Department of Energy Classification


Book Description

With the end of the Cold War, the Department of Energy is engaged in a review of its policies regarding the classification of information. In 1994, the Secretary of Energy requested the assistance of the National Research Council in an effort to "lift the veil of Cold War secrecy." This book recommends fundamental principles to guide declassification policy. It also offers specific suggestions of ways to improve public access while protecting truly sensitive information.