recommended reading

Air Force Brass Confident of Nuclear Base Security Following Deadly Navy Incident

NATIONAL HARBOR, MD. -- A two-star Air Force general responsible for overseeing atomic matters has voiced confidence in security at service bases housing nuclear-tipped ground-based ballistic missiles and aircraft-delivered cruise missiles and gravity bombs, following Monday’s deadly shooting at the Navy Yard in Washington.

Asked if the Air Force would review its contractor security clearances and base-access procedures -- given revelations that alleged killer Aaron Alexis had a history of mental-health problems and gun-related incidents -- Maj. Gen. Garrett Harencak played down the idea that similar security gaps could affect his service’s stewardship of two-thirds of the nation’s nuclear arsenal.

“We never stop doing that,” said Harencak, the Air Force assistant chief of staff for strategic deterrence and nuclear integration. “We’re always constantly self-assessing our security procedures; we’re always testing our security procedures."

“This is not just part of the nuclear enterprise … but [is] throughout our United States Air Force,” he continued, speaking on Tuesday at an Air Force Association conference just outside of Washington.  “We’re never static when it comes to looking at better ways … to secure our airmen and our facilities.”

The nuclear leader added, though, that he would have to check with his service’s security directorate before knowing whether a fresh Air Force review would be conducted, based on the apparent Navy Yard lapses that allowed Alexis a facility badge as a contractor and entry into the Navy facility.

The Air Force did not provide a requested response on the matter prior to press time on Wednesday.

The Navy Yard shooter killed 12 civilian personnel at the base before being shot dead himself by law enforcement. Several others were wounded in the attack, which has since been attributed to Alexis as the lone gunman.

Defense Secretary Chuck Hagel on Wednesday announced that he had launched two major reviews the prior day, both of which will be led by Ashton Carter, the Pentagon’s No. 2 official.

“We will do everything possible to prevent this from happening again,” Hagel said at a press conference.

One review is to focus on "physical security and access procedures" for U.S. bases worldwide, while the other will address Defense Department “practices and procedures for granting and renewing security clearances,” including for contractors, he said.

Pentagon leaders would implement the recommendations of both reviews and address any gaps they find, Hagel said.

"Obviously there were a lot of red flags," the defense secretary said in reference to Alexis's ability to retain a security clearance and facility privileges. "Why they didn't get picked up, why they didn't get incorporated into the clearance process, what he was doing -- Those are all legitimate questions that we're going to be dealing with."

Alexis previously had been arrested but never charged with a crime, leading some observers to question whether the clearance process may not account sufficiently for troubling warning signs.

The chairman of the Joint Chiefs of Staff stopped short of concluding whether the process was to blame, or if instead there was human error in implementing existing clearance or access rules.

"I think this will be scrutinized a great deal," said Gen. Martin Dempsey, speaking at the same press briefing. "Until I understand the outcome of the investigation, I can't render a judgment about whether it was a red flag or just something that flew beneath the radar."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.