Nuclear Security
Better Oversight Needed to Ensure That Security Improvements at Lawrence Livermore National Laboratory Are Fully Implemented and Sustained
Gao ID: GAO-09-321 March 16, 2009
In April 2008, the Department of Energy's (DOE) security inspection at Lawrence Livermore National Laboratory (LLNL) found significant weaknesses, particularly in LLNL's protective force's ability to assure the protection of weapons-grade (special) nuclear material. LLNL is overseen by the National Nuclear Security Administration (NNSA), a separately organized agency within DOE, and managed by a contractor. NNSA is planning to remove most of the special nuclear material from LLNL. GAO was asked to (1) characterize security deficiencies identified in the 2008 inspection; (2) determine the factors that contributed to these deficiencies; (3) identify LLNL's corrective actions to address security deficiencies; and (4) assess LLNL's plan to permanently remove the riskiest special nuclear material from its site. To conduct this work, GAO visited LLNL, reviewed numerous documents and plans, and interviewed LLNL and NNSA security officials.
DOE's Office of Independent Oversight found numerous and wide-ranging security deficiencies with LLNL's safeguards and security program. DOE gave the laboratory the lowest possible rating in two security areas: protective force performance and classified matter protection and control. The Office of Independent Oversight also reported that LLNL's physical security systems, such as alarms and sensors, and its security program planning and assurance activities needed improvement. Weaknesses in LLNL's self-assessment program and LSO's oversight contributed to security deficiencies at the laboratory. LLNL's security self-assessment program and LSO's annual security survey failed to identify numerous security deficiencies before DOE's Office of Independent Oversight conducted its inspection. According to one DOE official, both programs were "broken" and missed even the "low-hanging fruit" of compliance-oriented deficiencies. More specifically, LLNL's self-assessment program should have identified the magnitude of technical problems with a key weapon system used at the laboratory. Furthermore, LSO's September 2007 security survey gave LLNL 100-percent satisfactory ratings in its security performance--differing markedly from the security performance DOE observed during its inspection a short time later. To address these issues, LSO is implementing a new program to better train security officials to perform security assessments and recognize deficiencies; however, according to LSO officials, LSO does not have a specific budget to implement this new security training program. LLNL has developed corrective action plans to address the 54 security deficiencies identified by the Office of Independent Oversight, and both NNSA and DOE will oversee the plans' implementation. As of December 2008, LLNL reported having completed 74 percent of the milestones included in corrective action plans to address physical security deficiencies. DOE plans to re-inspect LLNL in April 2009 and focus on the effectiveness of corrective actions. In the past, LLNL has not sustained corrective actions to address similar security deficiencies. For example, in 1999 DOE reported that LLNL's capability to conduct vulnerability assessments was deficient. By 2000, this problem had been corrected. In 2008, DOE again noted deficiencies in LLNL's vulnerability assessment capability. NNSA has the opportunity to use its new performance-based management and operating contract to hold LLNL's contractor financially accountable for ensuring that security improvements resulting from corrective actions are sustained. The plan to remove most of LLNL's special nuclear material by the end of fiscal year 2012 faces challenges because the plan's schedule depends on a number of factors, some of which LLNL does not control, such as the willingness and ability of other NNSA and DOE sites to receive the material, the timeliness of the effort, adequate funding, and the availability of specialized transport trucks operated by NNSA's Office of Secure Transportation to transfer material to other DOE sites.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-09-321, Nuclear Security: Better Oversight Needed to Ensure That Security Improvements at Lawrence Livermore National Laboratory Are Fully Implemented and Sustained
This is the accessible text file for GAO report number GAO-09-321
entitled 'Nuclear Security: Better Oversight Needed to Ensure That
Security Improvements at Lawrence Livermore National Laboratory Are
Fully Implemented and Sustained' which was released on April 15, 2009.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Committees:
United States Government Accountability Office:
GAO:
March 2009:
Nuclear Security:
Better Oversight Needed to Ensure That Security Improvements at
Lawrence Livermore National Laboratory Are Fully Implemented and
Sustained:
Physical Security at Lawrence Livermore National Laboratory:
GAO-09-321:
GAO Highlights:
Highlights of GAO-09-321, a report to congressional committees.
Why GAO Did This Study:
In April 2008, the Department of Energy‘s (DOE) security inspection at
Lawrence Livermore National Laboratory (LLNL) found significant
weaknesses, particularly in LLNL‘s protective force‘s ability to assure
the protection of weapons-grade (special) nuclear material. LLNL is
overseen by the National Nuclear Security Administration (NNSA), a
separately organized agency within DOE, and managed by a contractor.
NNSA is planning to remove most of the special nuclear material from
LLNL. GAO was asked to (1) characterize security deficiencies
identified in the 2008 inspection; (2) determine the factors that
contributed to these deficiencies; (3) identify LLNL‘s corrective
actions to address security deficiencies; and (4) assess LLNL‘s plan to
permanently remove the riskiest special nuclear material from its site.
To conduct this work, GAO visited LLNL, reviewed numerous documents and
plans, and interviewed LLNL and NNSA security officials.
What GAO Found:
DOE‘s Office of Independent Oversight found numerous and wide-ranging
security deficiencies with LLNL‘s safeguards and security program. DOE
gave the laboratory the lowest possible rating in two security areas:
protective force performance and classified matter protection and
control. The Office of Independent Oversight also reported that LLNL‘s
physical security systems, such as alarms and sensors, and its security
program planning and assurance activities needed improvement.
Weaknesses in LLNL‘s self-assessment program and LSO‘s oversight
contributed to security deficiencies at the laboratory. LLNL‘s security
self-assessment program and LSO‘s annual security survey failed to
identify numerous security deficiencies before DOE‘s Office of
Independent Oversight conducted its inspection. According to one DOE
official, both programs were ’broken“ and missed even the ’low-hanging
fruit“ of compliance-oriented deficiencies. More specifically, LLNL‘s
self-assessment program should have identified the magnitude of
technical problems with a key weapon system used at the laboratory.
Furthermore, LSO‘s September 2007 security survey gave LLNL 100-percent
satisfactory ratings in its security performance”differing markedly
from the security performance DOE observed during its inspection a
short time later. To address these issues, LSO is implementing a new
program to better train security officials to perform security
assessments and recognize deficiencies; however, according to LSO
officials, LSO does not have a specific budget to implement this new
security training program.
LLNL has developed corrective action plans to address the 54 security
deficiencies identified by the Office of Independent Oversight, and
both NNSA and DOE will oversee the plans‘ implementation. As of
December 2008, LLNL reported having completed 74 percent of the
milestones included in corrective action plans to address physical
security deficiencies. DOE plans to re-inspect LLNL in April 2009 and
focus on the effectiveness of corrective actions. In the past, LLNL has
not sustained corrective actions to address similar security
deficiencies. For example, in 1999 DOE reported that LLNL‘s capability
to conduct vulnerability assessments was deficient. By 2000, this
problem had been corrected. In 2008, DOE again noted deficiencies in
LLNL‘s vulnerability assessment capability. NNSA has the opportunity to
use its new performance-based management and operating contract to hold
LLNL‘s contractor financially accountable for ensuring that security
improvements resulting from corrective actions are sustained.
The plan to remove most of LLNL‘s special nuclear material by the end
of fiscal year 2012 faces challenges because the plan‘s schedule
depends on a number of factors, some of which LLNL does not control,
such as the willingness and ability of other NNSA and DOE sites to
receive the material, the timeliness of the effort, adequate funding,
and the availability of specialized transport trucks operated by NNSA‘s
Office of Secure Transportation to transfer material to other DOE
sites.
What GAO Recommends:
GAO recommends that the Administrator of NNSA improve and sustain
federal oversight of security at LLNL by (1) developing a detailed plan
and budget for training NNSA‘s Livermore Site Office (LSO) security
staff and (2) providing financial incentives to LLNL‘s contractor to
sustain security improvements. NNSA generally agreed with the report‘s
findings and recommendations.
To view the full product, including the scope and methodology, click on
[hyperlink, http://www.gao.gov/products/GAO-09-321]. For more
information, contact Gene Aloise at (202) 512-3841 or aloisee@gao.gov.
[End of section]
Contents:
Letter:
Background:
DOE's Office of Independent Oversight Identified Several Significant
Weaknesses in LLNL's Safeguards and Security Program:
A Weak Laboratory Self-Assessment Program and Insufficient Federal
Oversight Contributed to Security Deficiencies at LLNL:
LLNL Has Developed Corrective Action Plans to Address 54 Identified
Security Deficiencies, and Both NNSA and DOE Will Oversee Their
Implementation:
LLNL Faces Challenges in Implementing Plans to Complete De-inventory of
Its Category I and II Special Nuclear Material by the End of Fiscal
Year 2012:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Safeguards and Security Topics Covered in Office of
Independent Oversight Inspections:
Appendix II: Comments from the National Nuclear Security
Administration:
Appendix III: GAO Contact and Staff Acknowledgments:
Tables:
Table 1: LLNL Security Deficiencies Identified by the Office of
Independent Oversight, by Topical Area, April 2008:
Table 2: LLNL's Required Protective Force Performance Assurance
Testing:
Figures:
Figure 1: LLNL Corrective Action Milestones by Security Topic, as of
December 2008:
Figure 2: Timeline for the Development and Final Approval of LLNL's
Corrective Action Plans:
Abbreviations:
DBT: design basis threat:
DOE: Department of Energy:
LLNL: Lawrence Livermore National Laboratory:
LLNS: Lawrence Livermore National Security, LLC:
LSO: Livermore Site Office:
NNSA: National Nuclear Security Administration:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
March 16, 2009:
The Honorable Henry A. Waxman:
Chairman:
The Honorable John D. Dingell:
Chairman Emeritus:
The Honorable Joe Barton:
Ranking Member:
Committee on Energy and Commerce:
House of Representatives:
The Honorable Bart Stupak:
Chairman:
The Honorable Greg Walden:
Ranking Member:
Subcommittee on Oversight and Investigations:
Committee on Energy and Commerce:
House of Representatives:
The Department of Energy (DOE) has long recognized that a successful
terrorist attack on a site containing nuclear weapons or the fissile
material used in nuclear weapons--called special nuclear material--
could have devastating consequences for the site and its surrounding
communities. Lawrence Livermore National Laboratory (LLNL), located in
Livermore, California, is one of three national laboratories
responsible for designing, developing, and maintaining a safe, secure,
and reliable nuclear weapons deterrent.[Footnote 1] For these and other
missions, LLNL stores and uses special nuclear material. Special
nuclear material--including plutonium and highly enriched uranium--is
considered to be Category I when it is weapons-grade and in specified
forms and quantities. The risks associated with Category I special
nuclear material vary but include theft, and the potential for sabotage
in the form of radiological dispersal, also known as a "dirty bomb."
Because of these risks and LLNL's location in California's densely
populated San Francisco Bay area, NNSA decided in October 2007 to
permanently remove, or "de-inventory," all Category I nuclear material
from LLNL.[Footnote 2]
LLNL is overseen by the National Nuclear Security Administration
(NNSA), a separately organized agency within DOE. DOE's and NNSA's
safeguards and security program develops policies essential for
preventing an unacceptable, adverse impact on national security. To
manage potential risks, DOE has developed a classified policy that
identifies the potential size and capabilities of terrorist forces
against which facilities containing Category I special nuclear
material--which at LLNL is the "Superblock" facility--must be prepared
to defend.[Footnote 3] Additionally, LLNL must adhere to other DOE
security requirements on the effective protection of classified assets,
such as documents, removable electronic media, and nuclear weapons
components. LLNL documents its ability to meet these requirements
through its Site Safeguards and Security Plan.
On October 1, 2007, Lawrence Livermore National Security, LLC (LLNS)
took over as the management and operating contractor of LLNL after more
than 50 years of operation by the University of California.[Footnote 4]
NNSA measures LLNL's performance and determines LLNS' management and
operating incentive fee using annual performance evaluation plans that
establish NNSA's priorities for LLNL and ensure that contract
requirements--such as effective security performance--are met.
To determine the overall effectiveness of LLNL's implementation of DOE
and NNSA security requirements--including its protection strategy to
meet the DBT--two organizations periodically conduct comprehensive
reviews of LLNL's security performance. First, NNSA's Livermore Site
Office (LSO)--the on-site, federal office responsible for ensuring the
secure operation of LLNL facilities and for accepting certain security
risks on NNSA's behalf--conducts an annual survey and issues a report
based on survey results, observations of security performance, and
compliance with DOE and NNSA security directives. This survey is a
means for LSO to oversee the laboratory's security performance and is
intended to ensure that the security risks NNSA accepts are both known
and mitigated to the extent practicable. Second, the Office of
Independent Oversight, within DOE's Office of Health, Safety and
Security, performs comprehensive, periodic security inspections at LLNL
and other sites. These inspections may include performance assurance
tests, such as "force-on-force" exercises that evaluate the ability of
LLNL's protective force to successfully defend the Superblock facility
against a mock terrorist group simulating a potential attacking force.
All deficiencies--"findings"--identified during surveys and independent
inspections require LLNL to take corrective actions; both LSO and the
Office of Independent Oversight track the implementation of these
actions. In addition, both LSO and DOE review the self-assessments LLNL
conducts of its own security performance.
In April 2008, DOE's Office of Independent Oversight concluded a
comprehensive inspection of security at LLNL. As a result of this
inspection, LLNL earned the lowest possible rating--"Significant
Weakness"--in two of seven security performance areas, including
protective force performance. Two additional security performance areas
were rated as "Needs Improvement."
In this context, you asked us to (1) characterize the security
deficiencies identified by DOE's Office of Independent Oversight in its
April 2008 inspection; (2) determine the factors that contributed to
the deficiencies DOE's Office of Independent Oversight identified in
its inspection; (3) identify corrective actions LLNL is taking to
address identified security deficiencies and how these actions are
being overseen; and (4) assess LLNL's plan for permanently removing
Category I and II special nuclear material from its Superblock
facility.
To address these questions, we visited LLNL and observed facilities
included in the Office of Independent Oversight's inspection. We also
reviewed applicable DOE safeguards and security policies, such as the
DBT and DOE Manual 470-4.1, Safeguards and Security Program Planning
and Management. Furthermore, we reviewed both the Office of Independent
Oversight's inspection reports and LSO's security surveys of LLNL from
1999 to the present and analyzed trends in security performance, with a
focus on the four of seven security areas for which the Office of
Independent Oversight provided overall ratings of less than effective
performance in its 2008 inspection report. In addition, we analyzed
LLNL's Site Safeguards and Security Plan for defending the site against
the 2003 DBT as well as other key laboratory plans for ensuring that
DOE security training and performance testing requirements are met.
Furthermore, we reviewed LLNL's and LSO's interim and final corrective
action plans to address security performance deficiencies identified by
the Office of Independent Oversight. We also interviewed officials from
DOE's Office of Health, Safety and Security; NNSA's offices of Defense
Nuclear Security and of Nuclear Material Management Integration; LSO;
and LLNL.
We conducted this performance audit from July 2008 to March 2009 in
accordance with generally accepted government auditing standards. Those
standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe that
the evidence obtained provides a reasonable basis for our findings and
conclusions based on our audit objectives.
Background:
LLNL's inventory of special nuclear material consists predominantly of
weapons-grade plutonium and highly enriched uranium. This inventory
takes two forms: (1) metals, including weapons components and material
machined into forms for use in weapons components; and (2) oxides and
other compounds, such as salts. Some of LLNL's special nuclear material
inventory has been determined to be "programmatic," or material that
has been declared to be of national security value and that has an
identified program use. Other special nuclear material in LLNL's
inventory has been determined to be "excess," or material declared to
be of national security value but that does not have an identified
program use. Finally, LLNL's inventory includes waste material that
does not have a national security value.
In accordance with DOE Manual 470.4-1, Safeguards and Security Program
Planning and Management, NNSA must develop a safeguards and security
program that ensures NNSA has the necessary protections in place to
protect its security interests against malevolent acts, such as theft,
diversion, sabotage, modification, compromise, or unauthorized access
to nuclear weapons, nuclear weapons components, special nuclear
material, or classified information. The safeguards and security
program integrates NNSA's physical security efforts by protective guard
forces, information and personnel security systems, and nuclear
material control and accountability systems. Contractors that manage
and operate NNSA laboratories--including LLNS--are required to comply
with DOE safeguards and security directives, as stated in their
management and operating contracts.
Because LLNL contains Category I and II special nuclear material, DOE
Manual 470.4-1 requires that it prepare a Site Safeguards and Security
Plan, a classified document that identifies known vulnerabilities,
risks, and protection strategies for the site and formally acknowledges
how much risk the contractor and DOE are willing to accept. The
protection measures identified in LLNL's approved Site Safeguards and
Security Plan are developed in response to site-specific vulnerability
assessments and become the basis for executing and reviewing protection
programs at the Superblock. LLNL must annually review its Site
Safeguards and Security Plan to ensure that implementation of the plan
will provide effective security protection. This review includes a
validation of the protective strategy, accomplished in part through an
annual force-on-force exercise, which exercises LLNL's protective force
against a mock adversary group simulating a potential attacking force.
Force-on-force exercises are conducted using plausible attack
scenarios. In addition, DOE Manual 470.4-3, Protective Force, requires
that LLNL conduct other performance assurance tests throughout each
year, including quarterly performance assurance tests of a more limited
scope than full force-on-force exercises.
While most NNSA and DOE sites were required to meet DOE's 2005 DBT,
[Footnote 5] LLNL has been declared "non-enduring" and is required to
meet DOE's less-demanding 2003 DBT. Specifically, in a March 7, 2008,
memorandum the Acting Deputy Secretary of Energy concurred with NNSA's
October 2007 decision to declare LLNL a non-enduring Category I and II
special nuclear material site because of plans to remove this material.
[Footnote 6] Together with DOE, NNSA determined that the benefits of
expediting the removal of Category I and II special nuclear material
outweighed the risks associated with foregoing security upgrades, and
funds that were to be spent on these upgrades were redirected to
support the de-inventory of special nuclear material. In line with this
decision, DOE also agreed with NNSA's decision to suspend planned
security upgrades at LLNL's Superblock facility that would have brought
LLNL's security posture to the level consistent with the larger
adversary threat identified in DOE's 2005 DBT. However, DOE and NNSA
are requiring LLNL to maintain a "denial-of-task" security strategy
until de-inventory is complete. Under this strategy, any adversaries
that gain hands-on access to special nuclear material must be
neutralized. LLNL and NNSA documented the site's ability to meet the
2003 DBT through their approvals of LLNL's Site Safeguards and Security
Plan, which had been revised and approved in January 2007, and through
a validation force-on-force exercise conducted in December 2006.
To evaluate the effectiveness of sites' protection programs, DOE uses a
three-stage evaluation model: laboratory self-assessment, federal site
office security surveys, and Office of Independent Oversight
inspections. In each stage of the evaluation model, the results of
performance assurance tests are considered. All three stages are
required to address laboratory safeguards and security programs
comprehensively. More specifically:
* LLNL's self-assessment program is intended to provide the opportunity
to self-identify security performance strengths and to address
weaknesses internally before they can be exploited by a potential
adversary. When security vulnerabilities are self-identified, these
become the basis for federal decisions about how to mitigate them and
what level of risk to accept. DOE requires that LLNL complete specific
numbers and types of performance assurance tests to inform its self-
assessments and assure DOE and NNSA that safeguards and security
interests are being protected at their required levels.
* LSO security surveys are intended to confirm the availability and
adequacy of safeguards and security programs, as implemented by LLNL.
Surveys must be conducted annually and are based, in part, on direct
observations of security performance, including compliance with DOE and
NNSA security directives. LSO may also consider LLNL's security self-
assessment as part of its annual survey as well as its performance
assurance test results. To be comprehensive, LSO surveys cover eight
topical areas and 33 subtopical areas and provide one of three ratings:
satisfactory--the element being evaluated meets protection objectives
or provides reasonable assurance that protection objectives are being
met; marginal--the element being evaluated partially meets protection
objectives or provides questionable assurance that protection
objectives are being met; or unsatisfactory--the element being
evaluated does not meet protection objectives or does not provide
adequate assurance that protection objectives are being met. LSO may
identify security deficiencies that are required to be addressed
through corrective actions.
* The inspections by DOE's Office of Independent Oversight evaluate
LLNL's and LSO's security performance. To determine the adequacy of
security policy and the implementation of those policies, the Office of
Independent Oversight conducts its own performance assurance tests of
key security systems, observes security performance, and conducts
interviews. Inspections result in reports, which may identify
deficiencies that must be addressed through corrective actions. To be
comprehensive, Office of Independent Oversight inspections cover eight
topical areas and 36 subtopical areas[Footnote 7] (see appendix I) and
provide one of three ratings: effective performance--the system
inspected provides reasonable assurance that the identified protection
needs are met; needs improvement--the system inspected only partially
meets identified protection needs or provides questionable assurance
that the identified protection needs are met; or significant weakness--
the system inspected does not adequately assure that identified
protection needs are met.
DOE's Office of Independent Oversight Identified Several Significant
Weaknesses in LLNL's Safeguards and Security Program:
During the course of its April 2008 inspection, the Office of
Independent Oversight found significant weaknesses in LLNL's protective
forces' performance against the adversary threat identified in DOE's
2003 DBT, particularly during force-on-force scenarios and in other
types of performance assurance testing. Deficiencies identified in
LLNL's protection program management contributed to the protective
forces' poor performance. In addition, the office identified
deficiencies in LLNL's classified matter protection and control
programs, which are intended to provide protection against unauthorized
disclosure of classified matter, as well as in LLNL's physical security
systems. LLNL's security performance in two other security topical
areas--material control and accountability, and personnel security--
[Footnote 8] was rated effective.[Footnote 9] Table 1 describes the
Office of Independent Oversight's overall findings for LLNL. The office
also identified 12 security deficiencies for LSO.
Table 1: LLNL Security Deficiencies Identified by the Office of
Independent Oversight, by Topical Area, April 2008:
Topical area: Protective force;
Number of findings: 13;
Overall rating: Significant weakness.
Topical area: Classified matter protection and control;
Number of findings: 7;
Overall rating: Significant weakness.
Topical area: Physical security systems;
Number of findings: 7;
Overall rating: Needs improvement.
Topical area: Protection program management;
Number of findings: 7;
Overall rating: Needs improvement.
Topical area: Personnel security;
Number of findings: 4;
Overall rating: Effective performance.
Topical area: Material control and accountability;
Number of findings: 0;
Overall rating: Effective performance.
Source: Office of Independent Oversight.
Note: The Office of Independent Oversight identified an additional 16
security deficiency findings in cyber security that were outside the
scope of our review.
[End of table]
LLNL's Protective Force Performed Poorly in an Exercise against the
2003 DBT:
Despite an approved Site Safeguards and Security Plan and performance
tests that validated LLNL's ability to defend against the 2003 DBT,
DOE's Office of Independent Oversight identified 13 specific
deficiencies in LLNL's protective force's performance; these
deficiencies resulted in an overall rating of significant weakness, the
lowest rating possible. These deficiencies became most apparent during
force-on-force exercises designed to evaluate tactical response
capabilities associated with the protection of LLNL's special nuclear
material inventory, as well as limited scope performance tests to
determine skill levels associated with routine and emergency duties.
Specifically, the Office of Independent Oversight found the following:
* LLNL had not conducted an annual force-on-force exercise, as required
by DOE Manual 470-4.3, Protective Force. Prior to the April 2008
exercise conducted during the Office of Independent Oversight's
inspection, LLNL had not conducted a full force-on-force exercise since
December 2006, when LLNL validated the site's ability to meet the
adversary threat postulated by the 2003 DBT.
* Other quarterly performance assurance tests, also required by DOE
Manual 470-4.1, were too limited in scope to meet performance testing
requirements. In addition, not all required quarterly performance
assurance tests were completed.
* LLNL protective force members did not demonstrate proficiency in
specific response capabilities, such as donning chemical masks in the
required time.
* Communication among protective force members was poor during the
force-on-force exercise and did not facilitate rapid and effective
response to alarms and adversary movements.
* While protective force members performed well in individual
qualification tests, the protective force did not demonstrate effective
team tactics.
* Protective force commanders did not demonstrate sufficient command
and control capabilities during the force-on-force exercise to
effectively direct tactical units.
* Protective force members failed to respond to their fighting
positions as required by LLNL's Security Incident Response Plan.
* LLNL's mobile weapon platform--an armored vehicle that carries a
mounted M-134D Dillon multi-barreled machine gun and that was
identified in the laboratory's approved Site Safeguards and Security
Plan as key to the site's security--failed to competently support the
protection mission. Numerous technical problems were noted with the
weapon system's operation, and officers were unable to perform
operational tests of the weapon at the Superblock because of safety and
security concerns. Furthermore, officers were not allowed to train with
the weapon at LLNL's nearby training range because of environmental
concerns.
* LLNL experienced "controller errors" when those running the exercise
failed to communicate critical information on simulated events--such as
explosions--that might have affected the exercise's outcome. Office of
Independent Oversight and LLNL officials agreed that errors of this
nature can be attributed to a lack of practice in conducting force-on-
force exercises.
In several instances, LLNL security officials knew of the deficiencies
identified by the Office of Independent Oversight before the April 2008
inspection, but had not committed to corrective actions. For example,
LLNL security officials were aware of some mechanical problems with the
mobile weapon platform before April 2008. Officials said the full
extent of the problems was not known because the platform had not been
sufficiently tested in an operational environment. Officials explained
that performance tests of the mobile weapon platform did not include
tests of how effectively the weapon would function in different attack
scenarios, but rather tested officers' response times for getting to
the weapon and positioning it. Nevertheless, a review of LLNL's
quarterly performance assurance testing reports to LSO shows that LLNL
reported completing 100 percent of required performance tests on all
essential protection strategy elements, including the mobile weapons
platform. These reports do not include the results of the performance
assurance tests; they only state that the tests were conducted. LLNL
has since taken steps to improve the reliability of the mobile weapon
platform, and a complete review of the electrical and mechanical
systems is underway. Similarly, in 2006, LSO found that LLNL had not
conducted its annually-required force-on-force exercise. There was an
18-month gap between a June 2005 exercise at LLNL and the one conducted
in December 2006 to validate LLNL's protection strategy against the
2003 DBT.
Deficiencies in LLNL's protection program management also contributed
to the protective forces' poor performance. The Office of Independent
Oversight found seven security deficiencies in the area of protection
program management--LLNL's security program planning and assurance
activities--and rated this security topic as needing improvement. The
seven findings were focused on three areas of security planning and
feedback: vulnerability assessment, self-assessment, and performance
assurance testing. More specifically, the office found the following:
* The evidence files to support the vulnerability assessments
underpinning LLNL's Site Safeguards and Security Plan were incomplete
and raised questions about the scope and methodology used to prepare
vulnerability assessments.
* LLNL's security self-assessment program was not comprehensive and
individual assessments of security elements lacked the breadth and
depth to provide management with information necessary to make
meaningful decisions.
* The list of essential security program elements LLNL had included in
its performance assurance test plan was incomplete and the performance
assurance tests did not always include measures that would test the
effectiveness of these elements.
DOE Concluded That LLNL's Protection and Control over Classified Matter
Was Deficient:
DOE Manual 470.4-4, Information Security, lays out the classified
matter protection and control requirements that are intended to prevent
the unauthorized disclosure of classified matter. Protection strategies
include properly marking classified documents and media to make visible
their classification level and other information; using security
containers (or safes), vaults, and vault-type rooms for classified
matter storage; having accountability systems that use unique
identification numbers for controlling access to and movement of
certain classified matter; and having access barriers, such as
combination locks. Other physical security systems--such as alarms and
sensors to detect unauthorized access to rooms storing classified
matter--are considered separately during Office of Independent
Oversight inspections.
According to DOE officials, in the area of classified matter protection
and control, none of the seven individual findings of security
deficiencies would independently have resulted in a rating of
significant weaknesses; however, in total, the deficiencies identified
led officials to question the overall effectiveness of LLNL's
classified matter protection and control program. More specifically,
the Office of Independent Oversight found the following classified
matter protection and control deficiencies:
* LLNL failed to comply with basic security requirements, such as the
frequency of changes to safe combinations when individuals' needs for
access to safes have changed; repeated errors in classified document
marking; weaknesses in the timely completion of classification reviews
for working papers; and errors in location records for all safes
containing classified matter.
* Individual LLNL directorates' policies for storing accountable
classified removable electronic media after hours were inconsistent and
conflicted with DOE requirements.
DOE Identified Additional Areas of LLNL's Security Program That Needed
Improvement:
The Office of Independent Oversight also reported that LLNL's physical
security systems needed improvement. The office identified seven
security deficiencies, including the adequacy of the alarm systems'
redundancy; the quality of lighting for, and images from, closed
circuit television monitoring systems; the extent to which protective
force posts needed repairs; and the protection strategy for security
keys. Two of the office's findings involved the security of vault-type
rooms in which classified matter is stored.
The personnel security and material control and accountability security
areas received effective performance ratings from the Office of
Independent Oversight in April 2008. However, four security
deficiencies were found in the personnel security area. All four
related to aspects of LLNL's Human Reliability Program, a program
designed to ensure that individuals who occupy positions affording
access to special nuclear and explosive materials meet the highest
standards of reliability and physical and mental suitability.
A Weak Laboratory Self-Assessment Program and Insufficient Federal
Oversight Contributed to Security Deficiencies at LLNL:
Neither LLNL's security self-assessment program nor LSO's annual
security survey identified the security performance deficiencies that
DOE's Office of Independent Oversight found. According to one DOE
official, both programs were "broken" and missed even the "low-hanging
fruit" of compliance-oriented deficiencies that LLNL must now take
actions to correct. More specifically, LLNL's self-assessment program
did not identify security deficiencies in the laboratory's classified
matter protection and control program or the performance assurance
program established to test the operability and effectiveness of
elements essential to LLNL's protective strategy. Furthermore, LSO's
September 2007 annual security survey, completed only 6 months before
the Office of Independent Oversight's inspection, resulted in 100-
percent satisfactory ratings for the laboratory's security performance.
The Office of Independent Oversight found LSO's survey program was not
comprehensive, and LSO security officials said site office employees
who conduct surveys need more subject matter training.
LLNL's Self-Assessment Program Did Not Identify the Security
Deficiencies Identified by DOE's Office of Independent Oversight:
DOE's safeguards and security orders require that self-assessments
comprehensively cover all topical and subtopical areas in order to
assure the adequacy and effectiveness of security programs and their
implementation. However, LLNL's self-assessment program failed to
identify the security deficiencies identified by DOE's Office of
Independent Oversight because the program (1) was not comprehensively
implemented and (2) not supported by an effective performance assurance
testing regime. In terms of implementation, the office reported that
LLNL's and LSO's collaborative approach to selecting high-priority
security topical areas for self-assessment each year benefited the self-
assessment program by making efficient use of limited resources;
however, it also reported that several subtopic areas were not
evaluated annually as required. Specifically:
* There had not been a comprehensive, site-wide assessment of safes
containing classified matter for 3 years.
* LLNL's self-assessments were not broad and deep enough to provide
laboratory management with sufficient information to make meaningful
decisions about security performance. For example, self-assessments
completed in fiscal year 2007 did not describe the evaluation criteria
used to perform the assessments.
DOE requires that all essential elements of a site's protection program
be subject to performance testing to provide comprehensive assurance
that the required levels of protection are met. Essential elements
include the equipment (such as weapon systems), procedures (such as
security incident response plans), and personnel (such as security
police officers) components of LLNL's safeguards and security program.
The failure of any of these components would reduce protection of
departmental property to an unacceptable level. Each site, including
LLNL, is required to develop a Performance Assurance Program Plan that
describes the program and its implementation by identifying elements
essential to the protection of Category I and II special nuclear
material and Top Secret classified matter. The results of required
performance assurance tests should contribute to the security topic
self-assessments.
We reviewed LLNL's quarterly reports to LSO on the laboratory's
performance assurance testing activities for fiscal year 2007 and the
first half of fiscal year 2008. With the exception of the first quarter
of fiscal year 2007, these reports show the performance testing
requirements were met or exceeded. However, the Office of Independent
Oversight's inspection revealed multiple deficiencies in the design and
implementation of LLNL's performance assurance testing program.
Specifically, the office found that (1) the individual test plans LLNL
developed for essential protection elements did not always measure the
effective performance of these elements; (2) not all essential elements
were included in LLNL's performance assurance testing program; and (3)
LLNL did not perform annual force-on-force exercises or quarterly
integrated performance tests as required. The September 2007 LSO
security survey also found that LLNL did not perform some performance
assurance tests with the required frequency. Table 2 provides
information on LLNL's required protective force performance assurance
tests and deficiencies identified by the Office of Independent
Oversight and LSO.
Table 2: LLNL's Required Protective Force Performance Assurance
Testing:
Type of test: Limited Scope Performance Tests;
Description: Scheduled or unscheduled limited scope performance tests
of individuals or teams test any operation, procedure, skill, or task
performance that falls within the scope of protective force
responsibility. Examples of these tests include individual and team
tactical movement, arrest and control techniques, building clearing,
command and control activities, and implementation of protection
strategies;
Minimum performance test frequency: Weekly at Category I/II special
nuclear material facilities; all other facilities as required depending
on security protection levels;
Office of Independent Oversight and LSO findings: The Office of
Independent Oversight found that LLNL's protective force lacked a
specific protection capability that should have been demonstrated in
limited scope performance tests. Further, technical problems with the
mobile weapon platform should have been identified to a greater extent
during limited scope performance tests. Finally, some limited scope
performance tests did not effectively measure the performance of the
security elements being tested.
Type of test: Alarm Response and Assessment Performance Tests;
Description: Unscheduled tests based on simulated adversary actions
consistent with the DBT to evaluate protective force response to a
specific location under alarm protection and readiness to alarm
conditions;
Minimum performance test frequency: Twice per quarter at Category I/II
special nuclear material facilities and other alarmed special nuclear
material facilities; once per quarter at all other locations;
Office of Independent Oversight and LSO findings: The LSO survey
reported that LLNL failed to assure that the required number of alarm
response and assessment performance tests were conducted; The Office of
Independent Oversight noted LSO's finding in its report.
Type of test: Validation Force-on-Force Exercises;
Description: Major tests of all elements involved in response to a DBT
and site-specific threats that is used to validate site-specific
protection strategies;
Minimum performance test frequency: Once per year per facility for all
sites with armed protective force;
Office of Independent Oversight and LSO findings: The Office of
Independent Oversight reported that LLNL protective force management
had not conducted a validation force-on-force exercise in calendar year
2007.
Type of test: Command Post Exercises;
Description: Scheduled or unscheduled exercises conducted to observe
and evaluate crisis teams' overall handling of simulated safeguards
and/or security or a natural disaster incident. Lines of authority,
timeliness of reporting and decision-making, and facility and equipment
availability must be included;
Minimum performance test frequency: Twice per year at Category I/II
special nuclear material facilities, and once per year at all other
facilities;
Office of Independent Oversight and LSO findings: Not discussed.
Type of test: Command Field Exercises;
Description: Extensions of Command Post Exercises, these exercises test
the interaction among various support organizations, site management,
and the protective force to a simulated event. Exercises focus on
procedures, tactical intelligence, communications, logistics, and the
interfaces between federal and contractor support systems;
Minimum performance test frequency: Twice per year at Category I/II
special nuclear material facilities, and once per year at all other
facilities;
Office of Independent Oversight and LSO findings: Not discussed.
Type of test: Joint Training Exercises;
Description: Exercises conducted with outside agencies that support the
successful mitigation of a security incident;
Minimum performance test frequency: At least once per year and
consistent with requirements of the Site Safeguards and Security Plan;
Office of Independent Oversight and LSO findings: Not discussed.
Type of test: Integrated Performance Tests;
Description: Scheduled tests encompassing all essential protection
elements associated with a comprehensive site or facility threat
scenario conducted to evaluate the overall facility safeguards and
security effectiveness;
Minimum performance test frequency: Category I facilities requiring
denial protection strategies under the DBT (such as LLNL's Superblock)
must conduct Integrated Performance Tests on a quarterly basis;
Office of Independent Oversight and LSO findings: The Office of
Independent Oversight reported that there was no evidence that LLNL's
protective force had conducted quarterly integrated performance tests
as required.
Type of test: Training Exercises;
Description: Exercises involving each protective force shift are site-
specific to the protective force in preventing the success of potential
adversarial acts defined in the DBT;
Minimum performance test frequency: Monthly;
Office of Independent Oversight and LSO findings: Not discussed.
Sources: GAO analysis of DOE Manual 470.4-3, Protective Force; DOE
Manual 470-4.1, Safeguards and Security Program Planning and
Management; Lawrence Livermore National Laboratory, Safeguards and
Security Organization Performance Testing and Assurance Program Plan,
September 21, 2006; Department of Energy, Office of Health, Safety, and
Security, Volume I: Independent Oversight Safeguards and Security
Inspection of the Livermore Site Office and the Lawrence Livermore
National Laboratory, June 26, 2008; and National Nuclear Security
Administration, Livermore Site Office, Periodic Safeguards and Security
Survey of Lawrence Livermore National Laboratory (LLNL) October 2,
2006, through September 28, 2007.
[End of table]
Had LLNL's self-assessment program been implemented comprehensively,
with the required breadth and depth, and used performance assurance
testing in addition to compliance-based reviews, security deficiencies
identified by the Office of Independent Oversight might have been self-
identified and corrected internally. This is particularly true with
respect to deficiencies in the operation of the mobile weapon platform
and protective force performance in command and control,
communications, and team tactics. Significantly, the one area of LLNL
security performance where the Office of Independent Oversight
identified no security findings was nuclear material control and
accountability. According to DOE and LLNL officials, the self-
assessment program for nuclear material control and accountability
provides assurance that all elements are evaluated. In addition,
appropriate performance testing is conducted in this area. Since the
April 2008 force-on-force exercise, LLNL has conducted four full-scale
exercises--two each in August and November 2008--during which
protective force performance was successful. In addition, limited scope
performance tests continue to be conducted to ensure readiness and
knowledge of LLNL's Security Incident Response Plan. Furthermore, since
April 2008 LLNL has conducted quarterly force-on-force exercises, which
the laboratory believes fulfills the requirement to conduct quarterly
integrated performance tests. According to a LLNL security official,
LSO and LLNL disagree as to whether conducting quarterly force-on-force
exercises meets the requirement to conduct quarterly integrated
performance tests. The official said LLNL and LSO are working to
resolve the disagreement.
LSO's Annual Security Survey Did Not Identify Deficiencies DOE Reported
in 2008:
LSO completed an annual survey of LLNL's security performance in
September 2007, 6 months before the Office of Independent Oversight
inspected LLNL in April 2008. The survey consisted of a year-long
process during which LSO staff conducted assessments, walk-throughs,
and observations to gather data on different security programs. As a
result of this survey, LLNL received 100-percent satisfactory ratings
in its security performance--differing markedly from the security
performance DOE observed during its inspection a short time later. In
particular, LSO's survey report noted as strengths that LLNL's self-
assessment program was supported by laboratory management and that LLNL
had succeeded in sustaining a protection strategy consistent with the
2003 DBT, assertions the Office of Independent Oversight inspection
called into question. The LSO survey did result in six findings of
security deficiencies: one for protective force, two for physical
security systems, two for cyber security, and one for nuclear material
control and accountability. For example, with respect to protective
forces, LSO found that LLNL could not assure that it had conducted the
necessary number of alarm response and assessment performance tests
during the survey period. With respect to physical security, LSO found
that LLNL did not adequately implement DOE requirements prohibiting
employees from bringing personal laptop computers into secure locations
and did not adequately implement a key management system.
The Office of Independent Oversight also includes a review of site
offices' survey programs when it conducts its inspection of the
protection program management security topic. In its April 2008 review,
the office found LSO's survey program was deficient in several areas.
Specifically, the office found that the LSO security survey:
* Was not comprehensive, as required by DOE Manual 470.4-1. LSO staff
did not consistently follow the assessment schedule, did not prepare
adequate assessment plans, and did not retain evidence files of
individual survey activities. It also did not provide enough data to
assure that survey reports comply with DOE requirements to characterize
the impact associated with observed deficiencies.
* Did not consistently assure that security deficiencies were
identified or that identified deficiencies resulted in findings that
would require corrective action. For example, the office noted that
survey narratives pertaining to the physical security systems area
identified several deficiencies; however, the survey program did not
assign findings to these deficiencies, and the survey report did not
describe LLNL's compensatory measures, as required.
* Resulted in a satisfactory rating for LLNL's self-assessment program
without conducting the activities necessary to determine that the
program was comprehensive.
* Used reviews of the contractor's records and the contractor's
implementation of the performance assurance program to determine the
status of compliance and performance of protective force duties, rather
than conducting independent performance assessments of LLNL's
protective force.
LSO security officials told us they are redesigning their security
survey program in response to these findings. Rather than aggregating
LSO security staffs' observations made over the course of a year,
security at LLNL will be comprehensively surveyed during two set
periods each year. These survey periods will be supplemented by
continuous observation throughout the year. Surveys will continue to
review compliance with DOE orders and requirements, but will also
increase focus on assessing the extent to which security performance is
effective. In addition, LSO is creating a security training program to
ensure that all LSO officials who participate in the security survey
program cover the different security topics comprehensively and are
expert enough to recognize and report on deficiencies. According to LSO
officials, site office employees have been responsible for identifying
their own training needs and have had independence in determining how
they met training requirements. Little formal training was provided on
how to conduct security surveys. Rather, training was received on the
job and through what one official described as an "oral tradition" of
how to perform oversight activities. The new training program is
designed around DOE security standards, and LSO officials said the
majority of the training will be provided by DOE's National Training
Center. The program is intended to ensure that LSO security staff
members are adequately trained to fulfill their duties and
responsibilities. LSO's goal is to have all security staff qualified
through this program by 2010. Underpinning this new training program is
what LSO security officials described as a "cultural shift"--an effort
to rely less on contractor assurance of security performance and more
on independent, federal expertise to test and recognize that
performance. However, according to LSO officials, LSO does not have a
specific budget to implement this new security training program.
[Footnote 10]
LLNL Has Developed Corrective Action Plans to Address 54 Identified
Security Deficiencies, and Both NNSA and DOE Will Oversee Their
Implementation:
LLNL has developed corrective actions to address the security
deficiencies identified by the Office of Independent Oversight. LSO and
DOE will oversee the implementation of these corrective actions, and
NNSA will judge whether implementation was successful when it
determines LLNS' contract award fee at the end of fiscal year 2009.
While LLNL's corrective actions put the laboratory on a path toward
improved security performance, LLNL has not sustained corrective
actions intended to address security deficiencies identified in 1999
and 2002 that are similar to those identified by the Office of
Independent Oversight in 2008.
Corrective Action Plans Are Intended to Address 54 Identified Security
Deficiencies:
LLNL has developed corrective action plans to address 54 security
deficiencies identified by the Office of Independent Oversight.
[Footnote 11] These plans include a total of 257 individual milestones,
185 of which are associated with the 4 security areas DOE rated as
either having significant weaknesses or needing improvement. Corrective
action plans associated with physical security deficiencies were made
final between September and November, 2008. LLNL has reported that it
will complete implementation of physical security milestones by October
30, 2009. As of December 2008, LLNL reported having completed 136 of
the 185 milestones, or about 74 percent (see figure 1).
Figure 1: LLNL Corrective Action Milestones by Security Topic, as of
December 2008:
[Refer to PDF for image: stacked vertical bar graph]
Security topic: Classified Matter Protection and Control;
Completed milestones: 23;
Remaining milestones: 8;
Total milestones: 31.
Security topic: Physical Security Systems;
Completed milestones: 29;
Remaining milestones: 9;
Total milestones: 38.
Security topic: Protective Force;
Completed milestones: 60;
Remaining milestones: 20;
Total milestones: 80.
Security topic: Protection Program Management;
Completed milestones: 24;
Remaining milestones: 12;
Total milestones: 36.
Source: GAO analysis of LLNL corrective action plans and milestone
completion reports.
[End of figure]
In compliance with DOE Manual 470.4-1, Safeguards and Security Program
Planning and Management, each corrective action plan includes a root
cause analysis, risk assessment, and cost-benefit analysis, where
appropriate. To complete root cause analyses, LLNL used a DOE-agreed
upon methodology and assigned root causes as directed by agency
guidance. Of the 54 findings, LLNL determined that 29 had a single root
cause, 18 had 2 root causes, 2 had 3 root causes, and 5 had 4 or more
root causes. LLNL identified five recurring causes and issues as a
result of its root cause analysis, including:
* Resource allocation. LLNL identified resource allocation as the
single largest root cause of the security deficiencies. According to
the Office of Independent Oversight, LLNL had sufficient financial and
human resources to meet applicable protection requirements. However,
LLNL and LSO officials believe that LLNL could not fully fund all
security program activities within available security budgets. Instead,
LLNL allocated security resources on the basis of a broad set of
priorities, management decisions, and budget constraints, which
resulted in unfunded security activities and accepted risks. By
identifying resource allocation as a root cause of the security
deficiencies, LLNL determined that security deficiencies might have
been avoided if resources had been allocated differently.
* Work/organization planning. In several cases, an activity or project
was poorly planned or deviated from its plan because of time or budget
constraints. In addition, some projects did not follow good project
management practices or did not include contingency plans. For example,
the Office of Independent Oversight found that a protective force
armorer assigned to maintain weapons had not completed DOE's
recertification requirements. LLNL determined that armorer
recertification planning could be improved by adding this requirement
to a training database.
* Policies and procedures. In several instances, policies or procedures
were not followed, and DOE orders and requirements were unclear or were
interpreted differently from the Office of Independent Oversight's
interpretation. For example, the Office of Independent Oversight found
that LLNL did not follow DOE's requirement to conduct weekly
inventories for all hard drives containing classified nuclear weapons
design information. LLNL had interpreted DOE's requirement differently
and did not conduct weekly inventories for hard drives that had been
demagnetized, which makes the information stored on them unreadable.
* Training. In several cases, training content did not adequately cover
all requirements. In addition, LLNL reported that a lack of practical,
hands-on experience--performance testing--was a contributing factor in
many areas of protective force deficiencies. NNSA headquarters security
officials told us that the lack of training was the main cause for the
protective force's performance during the April 2008 force-on-force
exercise.
LLNL, LSO, and DOE officials agreed on other factors that contributed
to the laboratory's overall security performance. First, the change in
management and operating contractor from the University of California
to LLNS in October 2007 contributed to a loss of focus on security
performance. According to LLNL security officials, during the period of
contract transition, employees' focus was on ensuring safety as well as
on potential impacts on employee pensions. In addition, the contract
transition contributed to a delay in conducting LLNL's required annual
force-on-force exercise. Second, DOE's and NNSA's determination to
declare LLNL a non-enduring site for Category I and II special nuclear
material affected the morale of laboratory employees. LLNL security
officials said highly experienced employees left the laboratory as a
result of this declaration. Finally, successive changes to DOE's DBT
policy between 2003 and 2005 affected the analytical process that
underpins security planning. In particular, LLNL security officials
said the laboratory faced challenges in completing necessary
vulnerability assessments.
To complete corrective action plans' risk assessments, LLNL security
officials evaluated the worst-case scenario presented by individual
findings of security deficiencies relative to a set of seven risk
areas: mission success, cost, schedule, health and safety, environment,
safeguards and security, and political and public trust. Ultimately,
each finding was assigned a single, overall risk level: negligible
risk, low risk, moderate risk, or high risk. According to LLNL's
analysis, 43 percent of the findings were determined to be of
negligible risk, and 57 percent were determined to be of low risk. LLNL
officials said the low risk ratings associated with each of these
findings is associated with the relatively low likelihood of a worst
case scenario ever occurring, as well as the level of redundancy that
exists for security systems. In contrast to LLNL's risk assessment
methodology, the Office of Independent Oversight based its security
ratings on evaluations of management system performance.
The vast majority of the physical security corrective actions LLNL has
planned can be completed using existing funding, according to the
laboratory's plans. The complexity of these corrective actions and the
costs associated with their implementation range from relatively simple
and inexpensive to complex and expensive. For example, to correct one
classified matter protection and control deficiency concerning policies
for handling accountable classified removable electronic media after
regular laboratory hours, LLNL plans to develop a new policy and
conduct a series of briefings on how to implement the policy.
Milestones associated with completing these corrective actions are
straightforward and can be completed with existing funds.
In contrast, to address the finding that LLNL's protective force had
not conducted quarterly integrated performance assurance tests of
sufficient scope, LLNL plans to redesign its performance assurance
testing program and has already begun to conduct larger, more frequent
protective force exercises. According to LLNL and NNSA security
officials, conducting additional performance assurance training has
resulted in a 30-percent overtime increase for the protective force and
a $5.5 million budget shortfall in fiscal year 2009 to address findings
and sustain this level of activity. According to NNSA, after an
examination of security priorities and tradeoffs, the Office of Defense
Nuclear Security provided LLNL with additional funding to cover this
shortfall.
NNSA and DOE Plan to Oversee Implementation of Corrective Actions:
LSO and the Office of Independent Oversight have overseen the
development of LLNL's corrective action plans, and the completion of
these plans has been an iterative process (see fig. 2). While the
process was ongoing, LLNL took steps to complete milestones that would
be included in final corrective action plans.
Figure 2: Timeline for the Development and Final Approval of LLNL's
Corrective Action Plans:
[Refer to PDF for image: timeline illustration]
April 15, 2008 – April 24, 2008: Office of Independent Oversight
conducts inspection.
July 8, 2008: Office of Independent Oversight inspection report
finalized.
July 15, 2008: LLNL sends interim corrective action plans to LSO.
July 28, 2008: LSO sends comments on interim corrective action plans to
LLNL and the Office of Independent Oversight.
September 2, 2008: Office of Independent Oversight sends additional
comments on interim corrective action plans to LLNL.
September 10, 2008: LLNL sends revised corrective action plans to LSO.
October 10, 2008: LSO approves all but 8 corrective action plans.
October 22, 2008: LLNL sends LSO revisions to the 8 unapproved
corrective action plans.
November 13, 2008: LSO approves the remaining 8 corrective action
plans.
December 15, 2008: The Office of Independent Oversight provides
concurrence with LSO‘s approvals for physical security corrective
action plans.
Source: GAO analysis of LLNL, LSO, and Office of Independent Oversight
corrective action plan documentation.
[End of figure]
LSO officials said they plan to meet with LLNL officials every month to
review the status of the corrective actions. LSO is required to
describe the overall implementation status of corrective action plans
and the extent to which these actions are effective in its annual
security survey reports. In addition, the Office of Independent
Oversight has scheduled a follow-up security inspection of LLNL for
April 2009 that will include a force-on-force exercise. Office of
Independent Oversight officials told us the inspection will also
include a review of progress on corrective actions associated with the
four security areas that received less than satisfactory ratings in
2008.
In keeping with the requirements of the National Defense Authorization
Act for Fiscal Year 2000 which created NNSA,[Footnote 12] NNSA's Office
of Defense Nuclear Security has provided significant assistance to LLNL
and LSO to help address identified security deficiencies. Office of
Defense Nuclear Security officials have worked directly with LLNL to
develop a recovery plan to improve the effectiveness of LLNL's
protection strategy. In addition, Office of Defense Nuclear Security
officials have assisted LLNL in identifying corrective actions, and
have provided assistance in implementing these corrective actions
effectively. For example, officials from the Office of Defense Nuclear
Security observed force-on-force exercises conducted at LLNL in August
and November 2008 and provided feedback. In addition, to help LSO
better integrate its security activities and improve security
oversight, the Office of Defense Nuclear Security temporarily augmented
LSO's security staff with assistance teams of security experts from
other NNSA site offices and from NNSA headquarters. These assistance
teams provided independent technical reviews of revisions to LLNL's
vulnerability assessment documentation, protection strategy, training
and testing procedures, and Site Safeguards and Security Plan, as well
as support in resolving issues associated with classified matter
protection.
NNSA will ultimately judge the success of LLNL's corrective action
implementation when it determines a contract award fee at the end of
fiscal year 2009.[Footnote 13] In fiscal year 2008--LLNL's first year
of contract performance evaluated under the new performance-based
contract with LLNS--LLNS earned approximately $17.2 million, or 54
percent of the total "at-risk" incentive fee available under the
contract.[Footnote 14] This amount included $1.3 million, or just 9
percent, of the total incentive fee available for safe and secure
operations. NNSA identified the results of the Office of Independent
Oversight's inspection and the significant issues in LLNL's physical
and information security programs as concerns that contributed to the
low award fee determination in this area. In particular, NNSA noted in
its performance evaluation report for LLNL that considerable management
attention from LLNS, NNSA, and DOE leadership was required to assure
that the laboratory could meet protection requirements for special
nuclear material. Furthermore, NNSA reported that LLNL failed to submit
a security self-assessment report for fiscal year 2008, despite the
Office of Independent Oversight's findings on the laboratory's self-
assessment program.
LLNL Has Not Sustained Corrective Actions That Addressed Past Security
Deficiencies:
In its June 1999 and April 2002 inspections of security performance at
LLNL, the Office of Independent Oversight identified weaknesses in
LLNL's protection program management and protective force performance,
as well as numerous deficiencies in its classified matter protection
and control program. LLNL implemented corrective actions, and the
Office of Independent Oversight later rated LLNL's performance as
effective in these areas. However, LLNL did not sustain the corrective
actions. Specifically:
* In 1999, the Office of Independent Oversight reported that LLNL's
capability to conduct the vulnerability assessments that underpin
protection program planning was deficient. By 2000, LLNL had corrected
this problem, and in a follow-up inspection the office called LLNL's
vulnerability assessment program a model for the rest of the nuclear
weapons complex. In its 2008 inspection, however, the Office of
Independent Oversight again reported several deficiencies in the area
of vulnerability assessment.
* In 2002, the office found weaknesses in protective force training and
command and control. These weaknesses appear to have been addressed by
the time of the 2006 force-on-force exercise, when Office of
Independent Oversight officials said LLNL's protective force performed
well. In its 2008 inspection, however, the office again found
significant weaknesses in protective force training and command and
control.
* In its 1999 inspection the office gave LLNL's classified matter
protection and control program the lowest possible rating, but the
office rated LLNL's program as satisfactory in a follow-up inspection 6
months later. Though some findings were reported in the interim,
overall satisfactory ratings were maintained for classified matter
protection and control until the Office of Independent Oversight's 2008
inspection.
According to officials in NNSA's Office of Defense Nuclear Security, it
will be challenging to sustain the security improvements that result
from LLNL's successful implementation of corrective actions because of
the laboratory's non-enduring status and the drawdown in security
resources that will come as special nuclear material de-inventory
activities are completed. Officials said that NNSA must provide
incentives to ensure that LLNL's protective force can sustain the
appropriate levels of protection until de-inventory is complete.
According to a senior LSO official, sustaining attention on security
performance could be difficult as NNSA priorities shift and future Site
Office management weighs NNSA priorities. LLNL has taken steps to
ensure a sufficient number of protective force members will remain
employed by the laboratory to protect Category I and II special nuclear
material throughout the de-inventory process as currently scheduled. A
new collective bargaining agreement with LLNL's protective force union,
concluded in December 2008, expires at the end of fiscal year 2012. The
agreement includes annual, additional lump sum payments of up to
$50,000 over 3 years to protective force members who remain at LLNL
during the de-inventory process.
LLNL Faces Challenges in Implementing Plans to Complete De-inventory of
Its Category I and II Special Nuclear Material by the End of Fiscal
Year 2012:
When DOE concurred with NNSA's decision to remove Category I and II
special nuclear material from LLNL, the de-inventory process was
expected to be completed no later than the end of fiscal year 2014.
According to officials from NNSA's Office of Nuclear Material
Management Integration, NNSA decided to accelerate this schedule and
complete de-inventory by the end of fiscal year 2012 as part of its
efforts to transform the nuclear weapons complex. LLNL has completed a
detailed schedule and associated resource-loaded project management
documentation in support of the 2012 de-inventory date. NNSA officials
said this accelerated schedule does not include any contingency funds
set aside for risks within the project scope; however, LLNL officials
said the schedule is aggressive but realistic. As of August 2008, LLNL
had already decreased its inventory of Category I and II special
nuclear material by approximately 33 percent from the laboratory's
fiscal year 2006 inventory.
In order to de-inventory most of its special nuclear material, LLNL
must stabilize the material and package it according to DOE standards
for shipment to a receiving site.[Footnote 15] The stabilization
process uses special equipment, such as furnaces and gloveboxes, to
remove impurities. The material packages are containers approved for
use in transporting Category I and II special nuclear material to
storage and other disposition sites. Given these requirements, it takes
time to prepare packages for shipment. For example, according to LLNL
it takes approximately 2 months to prepare each package of plutonium
oxide for shipment. LLNL plans to ship over 250 packages of special
nuclear material to sites around the nuclear weapons complex to
complete the de-inventory, including Los Alamos National Laboratory;
the Nevada Test Site; the Savannah River Site in Aiken, South Carolina;
the Y-12 National Security Complex in Oak Ridge, Tennessee; the Idaho
National Laboratory near Idaho Falls, Idaho; and the Waste Isolation
Pilot Plant, in Carlsbad, New Mexico. Each of these sites has
particular safety requirements in place that govern the types and
amounts of material they can receive. For example, according to NNSA
officials, the Savannah River Site can only receive material excess to
programmatic needs. Similarly, the Waste Isolation Pilot Plant can only
receive certain waste material. Work to stabilize and package LLNL's
special nuclear material inventory is being conducted at Superblock
while programmatic operations are ongoing.
The plan to de-inventory LLNL's Category I and II special nuclear
material by the end of fiscal year 2012 is challenging because
executing it depends on a number of factors, some of which LLNL does
not control. Specifically:
* The willingness and ability of other NNSA and DOE sites to receive
the material. NNSA officials said work stoppages at receiving sites
could delay shipments, as could disputes over the terms of receiving
special nuclear material. NNSA's Office of Nuclear Material Management
Integration, an office NNSA created in July 2008 to coordinate the
consolidation of special nuclear material among DOE sites, is helping
to anticipate material acceptance issues by conducting monthly video
conferences with LLNL and receiving sites.
* The Superblock facility will be operational nearly 100 percent of the
time through fiscal year 2012. According to NNSA officials, there is
always a chance of a work stoppage in Superblock. At least one lengthy,
safety-related work stoppage at Superblock occurred in the recent past
and lasted approximately 16 months, from January 2005 to May 2006,
until operations fully resumed.
* Timely and adequate funding. LLNL estimates the entire de-inventory
process will cost $41.3 million over 5 years (fiscal years 2008 through
2012). This estimate does not include inflation or contingency funding.
* The availability of specialized shipping packages and transport
trucks consistent with the de-inventory schedule. All sites within the
nuclear weapons complex use the same shipping packages and rely on
NNSA's Office of Secure Transportation to safely and securely move
special nuclear material. The current de-inventory schedule plans to
have completed packaging and shipment of 90 percent of the inventory by
March 2011. The final 10 percent of the material, the most difficult to
process, will take the remaining 18 months. Any change in the
availability of packages or transport trucks could affect the de-
inventory schedule.
* The availability of skilled staff and fissile materials handlers.
According to a LLNL official, a limited number of people are qualified
to use the equipment at LLNL necessary to stabilize and package special
nuclear material, and the number of skilled staff may diminish as the
laboratory's special nuclear material inventory diminishes.
* The on-time procurement, installation, and startup of additional
equipment. In order to meet the accelerated 2012 schedule, LLNL is
procuring and installing additional equipment to add capabilities
specific to the stabilization processes for certain metals and oxides.
The last of these capabilities is expected to come on line in June
2009. A delay could potentially affect the de-inventory schedule.
According to LLNL and NNSA officials, there are not any feasible
options that would allow substantial acceleration of the de-inventory
schedule. We agree with this assessment. LLNL explored three options
for further schedule acceleration. First, LLNL assessed the extent to
which increasing its processing rate for special nuclear material by
adding manpower or installing additional processing equipment would
accelerate de-inventory. LLNL determined that only moderate schedule
gains would be made by adding manpower because processing equipment is
already operating 24 hours a day, 7 days a week. Installing additional
processing equipment is not feasible because, according to LLNL,
startup of new equipment of this type generally takes several years and
would not be operational in time to affect the de-inventory process as
currently scheduled. Second, LLNL explored options for shipping
materials to other sites for processing at a later date. LLNL
determined that this option is not feasible because sites do not have
enough storage space for material that is not yet packaged.
Furthermore, a LLNL official said other sites do not have processing
capability, and material would have to be shipped back to LLNL for
processing at a later date. Moreover, sites have restrictions on the
types of material they can receive. Finally, DOE looked at whether the
Department of Transportation's regulatory requirements for packaging
and shipping could be relaxed. DOE and LLNL determined that any such
relaxation would unacceptably increase safety, environmental, and
security risks.
Conclusions:
It is essential that sites adequately protect the Category I and II
special nuclear material they possess, given the threats and risks this
material poses. Until LLNL has fully completed the process of de-
inventorying its Category I and II special nuclear material from
Superblock, it must maintain a high level of security. As LLNL's
inventory of Category I and II special nuclear material diminishes, it
may prove difficult to sustain the level of security vigilance expected
of Category I sites. Even after Category I and II special nuclear
material is no longer present at LLNL, LSO's security oversight
responsibilities will continue because laboratory employees must comply
with requirements for protecting and controlling classified matter and
lesser categories of special nuclear material. Strong federal oversight
can help ensure that security remains a priority at LLNL and that
corrective actions implemented as a result of the Office of Independent
Oversight's April 2008 inspection are sustained. To do this, a federal
site office with adequately trained subject matter experts to perform
comprehensive security oversight, as required by DOE policies, is
needed. In addition, NNSA's annual performance evaluation plans,
associated with its management and operating contract for the
laboratory, include financial incentives for security performance. NNSA
can use performance evaluation plans to provide LLNS with financial
incentives to sustain laboratory security improvements.
Recommendations for Executive Action:
To improve and sustain federal oversight of security performance at
LLNL, we recommend that the Administrator of NNSA and the LSO Manager
take the following two actions:
* Develop a detailed plan and budget for implementing LSO's proposed
security training program.
* Incorporate financial incentives into future performance evaluation
plans, as allowed by the new LLNS management and operating contract,
for sustaining security improvements at LLNL through the completion of
the laboratory's Category I and II special nuclear material de-
inventory.
Agency Comments and Our Evaluation:
We provided a draft of this report to NNSA for its review and comment.
NNSA generally agreed with the report and its recommendations. NNSA
noted that in its view the Office of Defense Nuclear Security and LSO
are providing strong oversight over security at LLNL to ensure that
security improvements are fully implemented and sustained. In
particular, NNSA emphasized the Office of Defense Nuclear Security's
role in supporting the overall improvement of security at LLNL. NNSA's
comments on our draft report are presented in appendix II. NNSA also
provided technical comments, which we incorporated into the report as
appropriate.
As arranged with your offices, unless you publicly announce its
contents earlier, we plan no further distribution of this report until
30 days after the date of this report. At that time, we will send
copies of this report to the Secretary of Energy; Administrator of
NNSA; Director of LLNL; and appropriate congressional committees. In
addition, the report will be available at no charge on the GAO Web site
at [hyperlink, http://www.gao.gov].
If you or your staffs have any questions about this report or need
additional information, please contact me at (202) 512-3841 or
aloisee@gao.gov. Contact points for our Offices of Congressional
Relations and Public Affairs may be found on the last page of this
report. Appendix III lists key contributors to this report.
Signed by:
Gene Aloise:
Director, Natural Resources and Environment:
[End of section]
Appendix I Safeguards and Security Topics Covered in Office of
Independent Oversight Inspections:
Safeguards and security topics: Protection Program Management;
* Planning process;
* Organization and staffing;
* Budget process;
* Program direction;
* Control systems;
* Survey program;
Program definition: Programs are designed to ensure that security
interests are provided an appropriate degree of protection from hostile
acts. It is an iterative process, whereby activities related to
planning, staffing, budget, direction, and feedback are integrated with
overall strategic and near-term operational planning.
Safeguards and security topics: Physical Security Systems;
* Intrusion detection assessment;
* Entry and search controls;
* Badges, passes, and credentials;
* Barriers;
* Communications;
* Testing and maintenance;
Program definition: Programs are designed to use intrusion detection
and assessment, entry and search control, barriers, communications,
testing and maintenance, and supporting systems and interfaces to
deter, detect, annunciate, assess, delay, and communicate an
unauthorized activity.
Safeguards and security topics: Protective Force;
* Management;
* Training;
* Equipment and facilities;
* Duties;
Program definition: Programs are designed to protect both DOE security
interests from theft, sabotage, and other hostile acts that may
adversely impact national security or the health and safety of the
public, as well as life and property at DOE facilities.
Safeguards and security topics: Classified Matter Protection and
Control;
* Program management;
* Control of secret and confidential documents;
* Control of top secret documents;
* Control of classified materials;
* Special programs;
* Operations security;
* Technical surveillance countermeasures;
* Classification management;
Program definition: Programs are designed to provide protection against
unauthorized disclosure of classified matter and for sensitive
information from its inception to destruction or decontrol.
Safeguards and security topics: Material Control and Accountability;
* Administration;
* Accounting;
* Measurements;
* Inventories;
* Containment;
Program definition: Programs are designed to provide an information and
control system for nuclear material. These programs encompass those
systems and measures necessary to establish and track nuclear material
inventories, control access, detect loss or diversion of nuclear
material, and ensure the integrity of those systems and measures.
Safeguards and security topics: Personnel Security;
* Management;
* Personnel clearance program;
* Security education program;
* Visitor control program;
* Human reliability program;
Program definition: Programs are designed to ensure that access to
sensitive information, classified matter, and special nuclear material
will be granted only after it has been determined that such access will
not endanger security and is consistent with the national interest.
Safeguards and security topics: Cyber Security--classified and
unclassified;
Program definition: Programs are designed to prevent deliberate or
inadvertent unauthorized disclosure, acquisition, manipulation,
modification, or loss of information contained within computer networks
and systems, as well as measures designed to prevent denial of
authorized use of the system.
Source: Office of Independent Oversight's inspector guides.
Note: The Office of Independent Oversight inspects classified and
unclassified cyber security as separate security topics.
[End of table]
[End of section]
Appendix II: Comments from the National Nuclear Security
Administration:
Department of Energy:
National Nuclear Security Administration:
Office Of The Administrator:
Washington DC 20585:
March 5, 2009:
Mr. Gene Aloise:
Director:
Natural Resources and Environment:
U.S. Government Accountability Office:
Washington, D.C. 20548:
Dear Mr. Aloise:
The National Nuclear Security Administration (NNSA) appreciates the
opportunity to review the Government Accountability Office's (GAO)
draft report, GAO-09-321, "Nuclear Security: Better Oversight Needed to
Ensure that Security Improvements at Lawrence Livermore National
Laboratory Are Fully Implemented and Sustained." We understand that GAO
conducted this audit at the request of the House's Committee on
Homeland Security to assess aspects of Livermore's security posture.
The NNSA generally agrees with the report and recommendations.
Following the Office of Independent Oversight's inspection of the
Livermore Site Office (LSO) and Lawrence Livermore National Laboratory
(LLNL) that identified significant weaknesses in the security program
at the Laboratory, LLNL initiated an aggressive plan to improve the
effectiveness of its protection strategy in coordination with the
Office of Defense Nuclear Security (DNS) and LSO. DNS has devoted
considerable resources supplementing LSO's efforts to oversee
improvements to LLNL security and will continue to provide significant
support and validate the site's capability of moving forward in a
positive manner. Through the DNS/LSO collaboration, teams of security
experts have monitored and evaluated the security strategy upgrades and
a revision to the Security Incident Response Plan to ensure they were
effective. The teams actively worked to provide independent technical
reviews for vulnerability assessment actions, as well as protective
force strategy and training/testing procedures, and provided advice and
procedures for further improvements. Additionally, LLNL has made good
progress in their de-inventory efforts in that they have recently
relocated 20% of their special nuclear material inventory for a total
of a 55% reduction since the site's de-inventory effort began. The
active role of LSO and DNS provides strong oversight of the
Laboratory's security program to ensure the implementation and
sustainment of the LLNL security posture.
Enclosed are general and technical comments to the report for your
consideration. Should you have any questions about this response,
please contact Cathy Tullis, Acting Director, Policy and Internal
Controls Management.
Sincerely,
Signed by:
William C. Ostendorff:
Principal Deputy Administrator:
Enclosure:
cc:
Associate Administrator for Defense Nuclear Security Director, Service
Center:
Senior Procurement Executive:
[End of section]
Appendix III: GAO Contact and Staff Acknowledgments:
GAO Contact:
Gene Aloise (202) 512-3841 or aloisee@gao.gov:
Staff Acknowledgments:
In addition to the individual named above, Jonathan Gill and John
Cooney, Assistant Directors; Allison Bawden; Tom Twambly; Ray
Rodriguez; Omari Norman; Jamie Roberts; Tim Persons; Nabajyoti
Barkakati; and Carol Hernstadt Shulman made important contributions to
this report.
[End of section]
Footnotes:
[1] The other design and development laboratories are Los Alamos
National Laboratory in Los Alamos, New Mexico, and Sandia National
Laboratories in New Mexico and California.
[2] LLNL also plans to de-inventory all of its Category II special
nuclear material”smaller quantities of weapons-grade materials, such as
highly enriched uranium and plutonium”that could be credibly aggregated
into Category I quantities.
[3] Until recently, this policy was known as DOE‘s design basis threat
(DBT). In 2008, DOE replaced the DBT with a Graded Security Protection
policy that provides information that is similar to the information in
the DBT but is tailored to risks at specific sites within the DOE
nuclear weapons complex.
[4] LLNS is a limited liability corporation made up of Bechtel
National, Inc.; the University of California; BWX Technologies, Inc.
(now part of the Babcock & Wilcox Company); and the Washington Group
International, Inc. The team also includes Battelle Memorial Institute,
four small business contractors, and Texas A&M University.
[5] As noted earlier, DOE has now replaced the 2005 DBT (DOE Order
470.3A) with the Graded Security Protection plan (DOE Order 470.3B).
[6] Prior to this decision, NNSA had committed LLNL to meeting the 2005
DBT and had reported these plans to Congress in June 2006 as required
by Section 3113 of the National Defense Authorization Act for Fiscal
Year 2006 (Pub. L. No. 109-163, 119 Stat. 3136, 3543).
[7] LSO and the Office of Independent Oversight categorize the topics
and subtopics they cover differently. The Office of Independent
Oversight also includes in its inspections subtopics covering
safeguards and security at LSO.
[8] While the Office of Independent Oversight gave an effective
performance rating to LLNL‘s personnel security program, in December
2008 DOE‘s Office of Inspector General found that LLNL did not fully
adhere to DOE requirements regarding security clearance justifications
and that no internal controls were in place to validate the
justifications stated in security clearance requests. See U.S.
Department of Energy, Office of Inspector General, Office of
Inspections and Special Inquiries, Security Clearances at Lawrence
Livermore National Laboratory and Sandia National Laboratory-
California, INS-O-09-01 (Washington, D.C.: December 2008).
[9] The Office of Independent Oversight also inspected classified and
unclassified cyber security at LLNL. Separately, we are reviewing cyber
security across the DOE complex, including at LLNL, and therefore we
did not include an assessment of cyber security findings at LLNL as
part of this review.
[10] We have reported in the past on the lack of comprehensiveness of
site office security surveys and on a lack of training for site office
staff. See GAO, Nuclear Security: NNSA Needs to Better Manage Its
Safeguards and Security Program, [hyperlink,
http://www.gao.gov/products/GAO-03-471] (Washington, D.C.: May 30,
2003); and National Nuclear Security Administration: Additional Actions
Needed to Improve Management of the Nation‘s Nuclear Programs,
[hyperlink, http://www.gao.gov/products/GAO-07-36] (Washington, D.C.:
Jan. 19, 2007).
[11] LLNL‘s 54 corrective action plans address both physical and cyber
security findings. Of these plans, 34 corrective action plans address
physical security topical areas that received less than effective
performance ratings.
[12] Pub. L. No. 106-65, 113 Stat. 512, 953 (1999).
[13] According to LLNL‘s corrective action plans, one milestone to
correct a protective force deficiency will not be completed before the
end of fiscal year 2009. It is scheduled for completion on October 30,
2009.
[14] In fiscal year 2008, $1.5 million was deducted from the $17.2
million in incentive fee that LLNS earned as a penalty for the loss of
key personnel during the first year of the contract. However, LLNS also
was awarded an additional $21.9 million, which represents the fixed
fees for laboratory management and operation ($13.7 million) and work
for other federal agencies and organizations ($8.2 million). In total,
LLNS earned $37.5 million, or 70 percent of the maximum available total
fee.
[15] DOE-STD-3013-2004 Stabilization, Packaging, and Storage of
Plutonium-Bearing Materials (April 2004); and DOE-STD-3028-2000
Criteria for Packaging and Storing Uranium-233-Bearing Materials (July
2000).
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: