recommended reading

U.S. Nuclear Security Agency Has 'Failed,' Advisory Panel Says

United States National Nuclear Security Administration

A congressionally mandated panel says a key Energy Department agency has "failed" in its mission to effectively oversee U.S. nuclear-arms operations.

Drastic reforms are crucial to address "systemic" management shortcomings at the National Nuclear Security Administration, according to preliminary findings unveiled on Wednesday by the co-chairs of the Advisory Panel on the Governance of the Nuclear Security Enterprise.

"The unmistakable conclusion of our fact-finding is that, as implemented, the 'NNSA experiment' involving creation of a semiautonomous organization has failed," according to Norm Augustine, who headed the bipartisan group with retired Adm. Richard Mies.

"The current DOE-NNSA structure has not established the effective operational system that Congress intended," Augustine told the House Armed Services Committee in a written summary of the panel's initial conclusions. "This needs to be fixed as a matter of priority, and these fixes will not be simple or quick."

The former officials attributed the National Nuclear Security Administration's history of high-profile security lapses at atomic-complex facilities and soaring cost overruns in major projects to problems that became embedded in the nation's nuclear weapons culture after the end of the Cold War. Congress established the agency in 2000 following the Wen Ho Lee spy scandal at Los Alamos National Laboratory, giving it the responsibility to oversee arms activities that were previously handled by the Energy Department itself.

Today, both organizations contain "too many people [who] can stop mission-essential work for a host of reasons," Mies said in a written statement to the committee, provided for a Wednesday hearing. He added that "those who are responsible for getting the work done often find their decisions ignored or overturned."

He also asserted that a culture of mistrust has developed between NNSA officials and the nuclear-weapons laboratories they oversee.

Augustine said nuclear-arms efforts managed by both the Energy and Defense departments have been bedeviled by "complacency" and a "loss of focus" since the end of the Cold War.

Mies added that "there is no affordable, executable joint DOD-DOE vision, plan, or program for the future of nuclear-weapons capabilities."

The panel's initial findings did not endorse any specific plan for altering oversight of the nuclear-weapons complex. The group -- mandated early last year under a provision of the fiscal 2013 National Defense Authorization Act -- is expected to issue its final report this summer.

Past reform proposals have included a Republican-led push to eliminate Energy Department oversight of NNSA operations and increase contractor independence. Others have advocated a boost in Energy's oversight, or to place the atomic agency under Pentagon control.

Augustine said the president and his administration would shoulder primary responsibility for instituting changes.

"Probably the most important individual under today's organization is the secretary of Energy who, in many cases in the past, did not have a background at all within this arena," he said during the committee question-and-answer session.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.