LEXIS-NEXIS® Congressional Universe-Document
LEXIS-NEXIS® Congressional
Copyright 1999 Federal Document Clearing House, Inc.
FDCH Political Transcripts
October 20, 1999, Wednesday
TYPE:
COMMITTEE HEARING
LENGTH: 28464 words
COMMITTEE: MILITARY PROCUREMENT SUBCOMMITTEE OF THE
HOUSE ARMED SERVICES
HEADLINE: U.S. REPRESENTATIVE DUNCAN HUNTER (R-CA) HOLDS HEARING ON DEPARTMENT OF
ENERGY SECURITY ISSUES
LOCATION: WASHINGTON, D.C.
BODY:
HOUSE ARMED SERVICE COMMITTEE: SUBCOMMITTEE ON MILITARY
PROCUREMENT HOLDS A HEARING ON DEPARTMENT OF ENERGY SECURITY
ISSUES
OCTOBER 20, 1999
SPEAKERS: U.S. REPRESENTATIVE DUNCAN HUNTER (R-CA), CHAIRMAN
U.S. REPRESENTATIVE FLOYD SPENCE (R-SC)
U.S. REPRESENTATIVE BOB STUMP (R-AZ)
U.S. REPRESENTATIVE JAMES V. HANSEN (R-UT)
U.S. REPRESENTATIVE JIM SAXTON (R-NJ)
U.S. REPRESENTATIVE JAMES M. TALENT (R-MO)
U.S. REPRESENTATIVE TERRY EVERETT (R-AL)
U.S. REPRESENTATIVE J.C. WATTS, JR. (R-OK)
U.S. REPRESENTATIVE WILLIAM M.
"MAC" THORNBERRY (R-TX)
U.S. REPRESENTATIVE LINDSEY O. GRAHAM (R-SC)
U.S. REPRESENTATIVE JIM RYUN (R-KS)
U.S. REPRESENTATIVE JIM GIBBONS (R-NV)
U.S.
REPRESENTATIVE MARY BONO (R-CA)
U.S. REPRESENTATIVE JOSEPH R. PITTS (R-PA)
U.S. REPRESENTATIVE ROBIN HAYES (R-NC)
U.S. REPRESENTATIVES NORMAN SISISKY (D-VA), RANKING MEMBER
U.S. REPRESENTATIVE IKE SKELTON (D-MO)
U.S. REPRESENTATIVE JOHN M. SPRATT, JR. (D-SC)
U.S. REPRESENTATIVE LANE EVANS (D-IL)
U.S. REPRESENTATIVE ROD R. BLAGOJEVICH (D-IL)
U.S. REPRESENTATIVE THOMAS H. ALLEN (D-ME)
U.S. REPRESENTATIVE JIM TURNER (D-TX)
U.S. REPRESENTATIVE ADAM SMITH (D-WA)
U.S. REPRESENTATIVE JAMES H. MALONEY (D-CT)
U.S. REPRESENTATIVE MIKE MCINTYRE (D-NC)
U.S. REPRESENTATIVE CYNTHIA MCKINNEY (D-GA)
U.S. REPRESENTATIVE ELLEN TAUSCHER (D-CA)
U.S. REPRESENTATIVE ROBERT BRADY (D-PA)
GLENN S. PODONSKY, DIRECTOR, OFFICE OF INDEPENDENT
OVERSIGHT
& PERFORMANCE ASSURANCE, DEPARTMENT
OF ENERGY
GILBERT G. WEIGAND, DEPUTY ASSISTANT SECRETARY FOR
DEFENSE STRATEGIC COMPUTING
& SIMULATION,
DEPARTMENT OF ENERGY
DR. C. PAUL ROBINSON, DIRECTOR, SANDIA NATIONAL
LABORATORIES
GENERAL EUGENE E. HABIGER, DIRECTOR, OFFICE OF
SECURITY
& EMERGENCY OPERATIONS, DEPARTMENT
OF ENERGY
EDWARD MCCALLUM, ACTING DIRECTOR, COMBATING TERRORISM
TECHNOLOGY SUPPORT OFFICE, DEPARTMENT
OF DEFENSE
*
CHAIRMAN: The subcommittee will come to order.
The chairman, Mr. Hunter, is attending another event, and he will be joining us
very shortly, but in the meantime, we wanted to go ahead and get started.
And, first, let me apologize to our witnesses and all our guests for the delay.
There was, as you may know, another hearing in this room before we got
started, and it has caused the schedules to get messed up.
Without objection, I will put the statement of the chairman, Mr. Hunter, into
the record at this point, and ask the ranking member, Mr. Sisisky, if you have
any comments you'd like to make.
SISISKY: I'm delighted that our guests are here, and I've been at that whole
meeting since 9:00 this morning, so I will put my, with no exceptions, in the
record.
CHAIRMAN: Without objection.
We will first hear testimony from Mr. Edward McCallum. Mr. McCallum was an
employee of the Department of Energy for
25 years and director of the office of safeguards and security at DOE for the
last ten.
We will next hear testimony from Mr. Glenn Podonsky, the director of DOE's
office of independent oversight and performance assurance. Mr. Podonsky's
office evaluates security and emergency operations at DOE facilities.
Mr. Gil Weigand, the deputy assistant secretary of energy for defense,
strategic, computing, and simulation will then discuss the sale of a
supercomputer by Sandia National Laboratory which could have had national
security and proliferation implications.
He'll be followed by Dr. Paul Robinson, director of Sandia, who will explain
the sale and recovery of the computer.
Finally, General Eugene Habiger, often referred to as DOE's new security czar,
is the director of DOE office for security and emergency operations. He will
describe the efforts of his office to improve DOE security.
With that brief introduction,
let me turn to the witnesses, and, Mr. McCallum, you may proceed.
MCCALLUM: Thank you, Mr. Chairman, ladies and gentlemen, congressmen, and
congresswomen.
I'm here today at your request to speak with the committee about my
observations of the Department of Energy's safeguards and security program.
As has already been described earlier this year, DOE's arrogant disregard for
national security was clearly described in the June '99 report on security at
the Department of Energy by the president's foreign intelligence advisory
board, chaired by Senator Rudman.
The title,
"The Best of Science, the Worst of Security," set the stage for Congressman Cox's committee report on espionage at our
national laboratories. It's clear today that DOE has sacrificed nuclear
security for other budget priorities and has jeopardized national security by
failing to protect our laboratories against widespread espionage and possible
terrorist attacks.
I'm currently assigned to the Department of Defense as the acting director of
the combating terrorism technology support office, under the assistant
secretary for special operations and low intensity conflicts.
However, over the past nine years, I served as DOE's director of safeguards and
security, as you already stated. In this capacity, I was responsible for the
policy that governs the protection of the DOE's national security assets,
including nuclear weapons, nuclear materials, highly classified material and
facilities.
As the director, my team provided senior DOE management with sound professional
judgment regarding security of our nation's most critical strategic nuclear
assets. We provided specific action plans to correct shortcomings, even though
much of what was recommended was not considered politically correct since the
end of the Cold War.
The steady decline in resources available to the DOE safeguards and security
program, as well as a lack of priority, allowed the department's security
posture to deteriorate to a point where it is not effective.
Numerous unclassified reports from the office of safeguards and security issued
between 1994 and 1999 document the reduction of the department's security
readiness. These reports are supported by hundreds of classified incident and
inspection reports that provide detailed analysis.
The information I present today is not new. The message has been repeated
consistently over the last decade in such reports prepared by my office as the
annual reports to the secretary in 1996 and 1997. In fact, these reports were
frequently referenced and footnoted in the PFIAB report this spring.
External reviews, such as the report to the secretary by General James Freeze,
or the review by the Department of Defense's nuclear command and control staff
report on oversight in DOE in 1998, cite similar
concerns.
There have also been dozens, literally dozens, of GAO office reports addressing
these areas.
We have frequently reorganized, restructured, and studied these issues;
however, the department has not chosen to resolve these serious and
long-standing problems.
I'd like to briefly cover just a few specifics to introduce the committee to
the severity of the issues. I must point out, however, that I've been off the
DOE security scene for six months, and there may have been some changes, as the
department has attempted to correct some of these issues. But it's clear to me
that there remains a serious need for an infusion of technical expertise in the
department and continuous external oversight or the problems will not be fixed
except in the short run. Reorganization and reshuffling will not suffice.
One of the areas covered very heavily in the last year has been information
security. Because of the espionage issues, the issues covered heavily by
Congressman
Cox, there's been a multitude of activity in the department. Indeed, just
before I left, we were preparing a number of action plans to try to bring the
department's laboratories and facilities up to speed. I think we're still
sitting at the center of the worst spy scandal in our nation's history. We
knew our greatest secrets were being stolen and we did nothing about it.
The DOE's computer security program has suffered from a variety of problems.
Of primary concern is the lack of protection for unclassified systems. Until
recently, little guidance was issued.
And as early as 1995, the chief information officer at the Department of Energy
and my office collaborated with the field elements to develop a comprehensive
manual. However, there was resistance at the labs and by the program assistant
secretaries in Washington, because they believed that providing protections,
such as firewalls and passwords -- what I would consider simple, commercial,
and grade
security -- was unnecessarily expensive and a hindrance to science. As a
result, implementation of the computer security manual was prevented
completely.
A variety of the computer security tools and techniques which would have been
implemented, things as simple as using different floppy disc sizes between
classified and unclassified systems, would have prevented many of the problems
which have surfaced in reports to you ladies and gentlemen in the last year.
Despite the most severe and candid briefings to the secretary on compromises of
nuclear weapons data at our national laboratories, we were still unable to move
essential policy changes forward. Although we were well aware of ongoing
espionage, it was not until parts of Congressman Cox's report were made public
that DOE began to react.
In another area, which is of great concern to me, protective forces. There has
been little public interest lately; however, it's an equally serious cause for
concern.
An
example would be, in 1992, the number of protective forces -- since 1992, the
number of protective forces at DOE sites nationwide has decreased by almost 40
percent. That should be contrasted with a gain of almost 30 percent in the
quantities of special nuclear materials at our facilities. And when I say
special nuclear materials, those are defined in our orders and regulations as
materials which can be used to make nuclear weapons.
HUNTER: Now, would you repeat that, Mr. McCallum? What declined by 40 percent?
MCCALLUM: Mr. Chairman, the number of protective forces, the men and women who
carry firearms and protect our facilities against theft of nuclear materials,
weapons, or sabotage, declined by about 40 percent, from a number of around
5,600 to a current number of around 3,500, depending on how that's changed
since I left.
As I already said, they
protect our facilities. They would be the first responders who would react in
case of an attack, either by outsiders or a wayward insider who we've given
access.
The number of security police officers has declined to the point where it's
questionable at some facilities whether the DOE security force can defeat an
adversary.
MCCALLUM: By 1996, several facilities were no longer capable of recovering a
nuclear asset if it were lost due to terrorist action or an insider action.
Indeed, a number of sites have even stopped training for this mission because
resources were reduced below the minimum level necessary to expect success.
In order to rationalize these severe reductions, several of our sites began
using unrealistic performance tests to verify their protective forces could
win. For instance, artificial safety constraints were imposed on exercise
Adversarial
Red Teams that effectively neutralized their ability to operate. Last year, a
review by a DOD special operations team at one of our sites reported that
needlessly restrictive exercise rules for the intruders were unnecessary and
resulted in a false sense of security.
This is related directly with physical security systems. The aging and
deteriorating security systems throughout the DOE complex, including at such
sites as Los Alamos and Rocky Flats, are a serious concern. Systems, including
things like sensors, alarms, access control and video systems, are critical to
ensure the adequate protection of special nuclear material and classified
information, including nuclear weapons parts.
Many facilities have systems ranging in age from 14 to 21 years and are based
on technology developed in the mid-'70s. Because of the obsolescence of these
systems, they fail too frequently, and replacement parts and
services are increasingly expensive and hard to obtain, also requiring very
expensive and sometimes unreliable compensatory measures, meaning guard forces
have to be assigned instead of sensors.
Older systems are also vulnerable to defeat by advanced technologies that are
clearly readily available to potential adversaries who would like to enter our
facilities. Continued reductions in budget, delays and cancellations in
line-item construction funding increase the risks to our facilities and
materials.
Further, DOE is not realizing some savings available through advancements in
technology that have increased detection assessment and delay capabilities. As
an example, the Air Force consolidated many of their nuclear weapons at one
facility at Kirkland Air Force Base, reducing -- closing many other facilities
and saved a tremendous amount of money. Depending on what source you go to,
it's as much as half of their protection budget was saved.
I'd like to cover another area quickly and then move forward to some suggested
fixes. I also fear that a recent decision by the department to have program
assistant secretaries fund the cost of personnel clearances will have severe
repercussions in the future. Since implementing this new approach, at least
when I left the department, we were already seeing a dramatic increase in the
backlog of personnel security investigations.
As well as other security areas, program offices must decide between competing
interests when determining which areas to fund. Unfortunately, security
activities are related and relegated to a lower tier in terms of importance by
many organizations. As a result, the first and best line of defense against
both insiders and espionage -- adequate funding and timely conduct of
reinvestigations -- is critical for DOE to maintain a security posture that
ensures
only trustworthy individuals are given access to critical nuclear security
assets.
Now to what you're probably more interested in is a path forward.
Operating beneath the surface of some of these major shortfalls are some
fundamental issues that, if properly addressed, could provide the impetus to
affect real change. These challenges are not new nor are there solutions.
The first area is safeguards and security program funding. I believe this is
the central and root cause issue for failed security in the Department of
Energy. As previously stated, when headquarter's program assistant secretaries
face shortfalls in funding, there's a tendency to cut security programs in
greater proportion than other program elements.
In recent years, these cuts have been made routinely without the benefit of
assessing the impact of these cuts on the security of our sites or the safety
of site personnel and surrounding communities. The implementation of virtually
every security
program has suffered significantly. Many of these cuts are ill-advised, and,
as we have seen, they have led to serious security lapses. Nevertheless, my
office had no authority, nor does the office that I left have the authority to
ensure implementation of departmental security policies and regulations.
The new DOE security czar, General Habiger, still does not have a budget for
implementation of anything. Safeguards and security budget for DOE should be
provided through one line item to the DOE security director, not various
assistant -- program assistant secretaries.
Program fragmentation and fragmentation of security funding has been in place
in DOE for 20 years, and it has not worked. Without an adequate budget there
is simply no authority in this government.
The second area which should be looked at is performance exercises. A
centrally funded and well-integrated national security exercise program is
critical to meet the
safeguards and security protection needs of DOE and the nation. Regulations in
existence today require exercises annually at DOE sites. However, many of the
sites and exercises are conducted without the participation of local law
enforcement, the FBI and other federal offices that should be involved. Their
lack of participation makes these exercises largely meaningless.
Under Presidential Decision Directive 39, U.S. Policy on Counterterrorism, and
Presidential Decision Directive 62, Protection Against Unconventional Threats
to the Homeland and Americans Overseas, the secretary is directed to conduct
exercises to ensure the safety and security of its nuclear facilities from
terrorism.
With the cooperation and support of the FBI, several regional exercises were
conducted at DOE sites last year. However, funding and commitment are far
short of the required goals. My staff estimated that DOE is meeting only about
25 percent of site requirement.
Significantly, the majority of the funding for exercises
resides at the site levels where expenditures must vie with other immediate
program needs. Exercise funding should be centrally managed from a line item
budget to assure the monies are available and spent on exercises.
The third area I'd like to cover is oversight. It must be obvious by now that
attempts to implement internal oversight of the DOE safeguards and security
program have failed over the last decade; indeed, many times over the last two
decades. While there have been brief periods when oversight has been
effective, organizational and budget pressures have played too central a theme
for this function to remain within the DOE. When the student develops the
grades and grades their own test and writes their own report card, there is no
independent oversight.
Currently, internal oversight should be consolidated under the security
director or abolished. Additionally, an organization like the commission on
safeguards and
security and counterintelligence for the Department of Energy facilities,
proposed by the Senate in Section 3152 of the National Defense Authorization
Act for fiscal year 2000, should be established rapidly to ensure independent
review of security at DOE and its laboratories. This would fulfill
long-standing recommendations of both the GAO and the Congress.
Further, a direct information mechanism of some type needs to be established
with one or more of the congressional committees that have oversight of these
areas in the Department of Energy.
Lastly, I'd like to talk briefly about organizational structure and
accountability. In all of the reviews of the safeguards and security program
conducted during the last decade, there is one recurring theme: namely, the
organizational structure of the department's safeguards and security program
does not align program authority and responsibility and is too often open to
manipulation by the contractors.
Severe fragmentation of the safeguards and security program staff guarantees
a lack of accountability in the program
For example, the current structure of the safeguards and security program has
one organization developing policy, training and providing technical assistance
to the field, the office of safeguards and security; another organization
providing funding and implementing guidance, the headquarters program assistant
secretaries.
A third tier, the operations offices, is responsible for implementation, while
a fourth is responsible for oversight, formerly known as EH, and I guess now
it's the OA, which Mr. Podonsky will address.
A fundamental change in both the organizational structure and funding of the
safeguards and security program is absolutely necessary before the department
can begin to systemically and systematically address the major challenges.
These organizations must be consolidated with policy, guidance and
implementation in one location and with an appropriate budget to participate in
decision-making within the department.
Secretary Richardson recently announced the creation of a new security czar for
the department. According to the secretary's pronouncements and the things
that I've read in the newspapers, many of the concerns that I've cited today
are being addressed.
However, the secretary's statements and the actual actions occurring within the
department sometimes seem startlingly different. Program assistant secretaries
continue to maintain separate security staffs. These staffs can be largely
ineffective, because they're small, they lack some knowledge in areas, their
experience levels are low, and they favor parochial interests frequently over
national security concerns.
A disturbing document that I read recently entitled,
"Safeguards and Security Roles and Responsibilities," was circulated by Sandia National Laboratory. It would give the security czar
less authority in the Department of Energy than I had for the last 10 years.
Specifically, in the proposed
security structure, critical approvals would be delegated from headquarters to
the very laboratories that have allowed critical losses. Important security
plans as well as approval of exceptions to national and departmental
regulations would be delegated to the field. And, finally, oversight
inspections would be conducted for cause-only based on initial reviews and
self-inspections by the labs. Worse still, this internal oversight program
wouldn't even report to the so-called czar.
Ladies and gentlemen, this devolution of the few authorities reserved to the
DOE is in direct conflict with the serious negligence identified in both
Congressman Cox's report and that of the PFIAB. It is the organizational
equivalent of sending the fox in to count the hens.
In short, closing, I would like to mention the most positive aspect of the
department's safeguards and security program. The program is staffed by hard
working dedicated men and women, both federal and contractor, who are firmly
committed to protecting the national security assets entrusted to their care.
Despite the dwindling resources available to them, these individuals continue
to perform in an outstanding manner.
Where this department has failed is in providing these professionals the
necessary resources to allow them to perform their responsibilities safely and
appropriately. The department has also failed to provide management support
and protection so that individuals will bring forward problems and deficiencies
without fear of retaliation.
Thank you, Mr. Chairman.
HUNTER: Thank you, Mr. McCallum.
Mr. Podonsky.
PODONSKY: Mr. Chairman, I have a prepared statement that runs about eight or
nine minutes or I have a summary. I'd like to ask the chair which you would
prefer?
HUNTER: Without objection, then you just go ahead and summarize your testimony,
if you would.
PODONSKY: OK. Then, I'd like to submit my written testimony for the record.
HUNTER: Without objection, it's going to be received.
In fact, without objection, all written statements will be taken into the
record.
PODONSKY: Mr. Chairman, and members of the subcommittee, I appreciate the
opportunity to discuss the status of security programs at the Department of
Energy nuclear facilities, including the results of our most recent
inspections.
I am the director of the office of independent oversight and performance
assurance, which is a direct report to the secretary; has a responsibility for
conducting independent oversight inspections of safeguard and security,
cybersecurity and emergency management within the Department of Energy.
Since we were established, we have had three major focus areas: review of
safeguards and security programs that have known problem areas, evaluating the
effectiveness of cybersecurity programs in both classified and unclassified
arena and evaluating the DOE emergency management programs.
As reported in the most recent annual report to the president, one or more
important safeguard and security program elements
at several DOE defense program sites were rated less than satisfactory. As a
result, the undersecretary of energy established a goal and a plan for
achieving a satisfactory status at all DOE defense program facilities by the
end of this calendar year.
Based on our inspection of problem sites from the national security perspective
-- Los Alamos National Laboratory, Lawrence Livermore National Laboratory,
Sandia National Laboratories, and the Y-12 plant -- it is clear to us that a
positive trend has been established. At every site we have evaluated,
safeguard security programs have received high levels of management attention
over the past year, and there have been significant improvements. As just one
example, Los Alamos National Laboratory has now established an effective
firewall to protect against unauthorized penetration of their unclassified
computer network.
Although significant
progress has been made, there is much work left to accomplish to achieve the
goal of fully satisfactory programs at all DOE sites. The most prevalent
problems we are currently seeing are in the areas of protection of the
non-nuclear components of nuclear weapons -- which are the classified weapons
parts -- and unclassified cybersecurity.
At the four sites we have reviewed, only Los Alamos National Laboratory was
assigned an overall satisfactory rating. The other three sites were rated as
marginal. However, based on their corrective action plans, we believe that
Livermore and Sandia are on track to making improvements needed to achieve a
satisfactory rating.
The inspection of the Y-12 plant, which was completed on October 8 -- wasn't
complete on October 8, and we are anticipating receiving their corrective
action plan next week. While the Y-12 plant) had significant challenges to
overcome to achieve a satisfactory status,
DOE headquarter organizations are coordinating their efforts to ensure that the
needed improvements are being made on an expedited basis.
There are indicators that safeguard and security is on a positive track to
achieving satisfactory programs within a short timeframe. The sites corrected
many of their identified weaknesses soon after they were identified.
Unlike the past, the sites have developed corrective action plans that address
each of the oversight findings. I must note that this is a major sea change in
the Department of Energy. In my last 15 years of inspecting the Department of
Energy, the department never tracked or seldom tracked its issues and findings
and then corrected the problems. That's a difference today from what Mr.
McCallum was just talking about in his statement.
Before the end of the year, we will be doing follow-up activities at all of the
sites and we'll provide DOE senior management with
an unbiased and independent perspective on progress toward the goal of fully
satisfactory programs at all these sites.
PODONSKY: Prior to this organization being directly put under the secretary of
energy, we had conducted independent oversight for 15 years. Our reports, many
of which Mr. McCallum just referred to in terms of issues and findings, have
documented many of these issues, but much of what Mr. McCallum just stated,
however, in the last seven months have been corrected, as far as we can see
from our inspections.
At the time, prior to seven months, there was no element of DOE that was
adequately addressing these issues. We believe that this has now changed with
the infrastructure that Secretary Richardson has put into place in which the
policy organization under General Habiger, together with the program offices
that are responsible for implementing, together with the oversight, are working
to a common end of improving safeguard and security in the Department of
Energy.
Thank you, Mr. Chairman.
HABIGER: I'd like to thank you, Mr. Chairman, and members of the committee for
the opportunity to speak to you today regarding the current status of security
at the Department of Energy.
Let me make it clear right up front that I did not come out of retirement from
San Antonio, Texas, to be involved in mere reorganization and reshuffling. I'm
here to make things happen, and I can report to you that things are happening.
I had not met Secretary Richardson before our meeting in June when he
interviewed me for the job. I must tell you, I'm very impressed with him and
what he's doing.
Since my arrival at the department, I have visited all of the department's
major sites, reviewed virtually all of the site security plans, observed and
participated in segments for our protective force training to include
qualifying on the side arm rifle and
shotgun that we use with our protective force.
I've examined our newly implemented cybersecurity procedures at our national
laboratories, I've talked to hundreds of scientists, technicians, and security
policeman, and I've taken -- and happily I am here to report I passed -- the
DOE-administered polygraph test.
This is what I've found so far, Mr. Chairman.
First, it's clearly obvious that the department reacted appropriately to the
wake-up call received this past year with the uncovering of internal security
problems and the publication of both the Cox and the Rudman reports. And I
will also tell you that those two reports formed the checklist for me as I
began my initial work in the department.
Second, through (sic) security throughout the department is being administered
responsibly and conscientiously by dedicated, hardworking professionals who are
firmly committed to protecting the critical national security assets. These
responsibilities of these individuals are demanding,
yet despite obvious challenges they continue to perform in an outstanding
manner.
Finally, although we do have security issues which we must and will address, I
found all sites that I had visited have the foundation to perform their
security functions capably, given adequate resources.
But I also discovered several troubling issues.
First and foremost, it was apparent to me early on that the department was
extremely close to losing the confidence and trust of both the American people
and Congress with respect to our ability to perform our security
responsibilities. The enormous media coverage surrounding recent security
related events, coupled with DOE's historical track record of security
deficiencies, added to this erosion of public trust.
Secondly, and equally as important, I discovered that over the years the
department had lost its focus on security. Let me emphasize that, Mr. Chairman
-- we had lost our focus on security. The secretary, on several
occasions, has referred to the department as being a group of fiefdoms within
fiefdoms, and almost every fiefdom had its own security responsibility and
security budget. There was no office within the department who had ultimate
accountability for our security requirements.
Byproducts of this organizational dysfunction and lack of focus included a
deterioration of security awareness and education resulting in a failure to
remind and educate our employees and contractors as to their personal security,
responsibilities, and accountabilities; a lack of attention to our
cybersecurity practices in a world of increased computer hacking and
cyberterrorism; and a gradual erosion or resources required to improve our
capabilities to combat ever- changing terrorist and cyberterrorist threats.
And, finally -- and this is a big issue with me, Mr. Chairman, and members of
this committee -- Congress has yet, up to this point, failed to fund the
department's FY2000 budget amendment which came forward in July in order to
make near- and
long-term fixes.
We have valid requirements in the area of cybersecurity. For example, we have
a valid requirement for $35 million to jump-start our cybersecurity program,
and we got zero dollars in our request.
In addition, we need to equip our protective forces to combat weapons of mass
destruction -- chemical, biological warfare equipment -- to fully arm our
headquarters protection forces. Over at the Forestal building, less than 50
percent of our protective force is armed, because we can't afford the training
for our people there -- and to complete our headquarter security upgrades.
And we were flogged for all the right reasons for not having a robust foreign
visitor access program. We have no money to start that program, Mr. Chairman.
Nor do we have any funds to set up an acceptable plutonium, uranium, and
special nuclear materials control and accountability program.
Simply stated...
HUNTER: General
Habiger?
HABIGER: Yes, sir.
HUNTER: Let me just hold you up for a second. Your lab leaders came to this
Congress and begged us -- and I'm looking at one of them right now -- to
continue the foreign visitor program. That wasn't imposed on you by Congress.
That's been requested by the labs as an important part of the lab culture and
the lab operation.
So, the idea that now -- now that they've asked us to have that, you don't have
enough money to administer it, this subcommittee has asked you and your
representatives from DOE about 15 times to give us what the ticket is, what the
bill is, for the foreign visitor program. They've always deflected and deferred
the question.
You're the first one that has sat there and said it actually costs money to
operate that program. So, I'm going to put it on you to find out how much it
costs and
give us the bill, and maybe we'll take a second look at whether we need to have
it or not.
HABIGER: I appreciate that, Mr. Chairman, you'll get it.
HUNTER: Please proceed.
HABIGER: You'll get it very quickly.
Simply stated, we have been given a mandate but not the resources to accomplish
that mandate.
Through a series of comprehensive and sweeping initiatives by Secretary
Richardson, the department has turned the corner, in my view, and has
aggressively and dynamically changed the way it does its security business.
Another important step was to change the way the department managed its
security responsibilities. In this regard, the secretary worked diligently to
remove the organizational barriers that has historically impeded the
department's ability to effectively and efficiently implement a comprehensive
security program within the department.
Very quickly, Mr. Chairman, I'd like to outline the four-phase program that
I've initiated since coming into this position.
First, in phase one, which was completed in August, I initiated visits to each
of our DOE sites in the field and established a baseline from which to move
forward. Areas requiring immediate fixes were identified. During this period,
a complex-wide security standdown was conducted to promote security awareness
as a valid individual responsibility. New policy was implemented for foreign
visitors who visit our facilities to ensure that the tightest possible security
procedures were followed.
In phase two, currently underway, I completed the visits to the sites and
issued -- we're in the process of issuing policy, addressing key issues as
standardized weapons for our protective forces, the requirement for protective
forces to keep a round in the chamber of their weapons.
We weren't necessarily training the way we would fight. We now have policies
in the field which mandate the timely reporting of security incidents, the use
of warning banners on computer systems and badge validation procedures.
We are developing an integrated security awareness training curriculum, and two
similar personal security assurance programs will be combined into a single
departmental human reliability program to eliminate redundancy and streamline
the administrative process.
In the area of cybersecurity, the national laboratories have implemented
numerous corrective actions. Key among those is a program to achieve physical
incompatibility between removable media formats within common laboratory work
areas.
We are taking sweeping action in an effort to prevent the intentional or
inadvertent transfer of classified information from classified to unclassified
systems or to a media format easily concealed or removed.
Phase three, which will occur from January to March of next year: At this time,
most or our new
policies to fix security will be implemented, and I'll reevaluate while
visiting the field to see the effectiveness of these policies.
And we are developing metrics so we can measure what we're doing.
When we reach phase four in April of next year, the proposed fixes will be in
place and our efforts turned toward adjustments as we maintain and improve our
security program.
We cannot control or alter the threats to the security interests entrusted to
our care. But what can be controlled, however, is our ability to plan and
respond to threats, should they ever materialize.
The changing security environment and other threats over the past decade have
fundamentally altered the department's security perspective and posture. This
is a significant challenge, but one that the Department of Energy is prepared
to meet.
And, Mr. Chairman, if I may, I'd like, for just a few minutes, to talk about
some of the issues that were addressed by Ed McCallum at the end of the
table.
First of all, Ed has a great reputation. I've seen his work. He has done
magnificent things for the department to correct and identify many of the
problems that I and my staff are working today. But I'd like to correct the
record, if I could. As Ed pointed out, he's been out of the fight for about
six months now, and there have been some significant changes.
First, backlog of investigations. Mr. Chairman, we no longer have a backlog of
background investigations, reinvestigations. And whatever backlog we have for
new hires, I will be monitoring that on a monthly basis. You can put the
backlog of investigations in the Department of Energy in the
"it's been corrected" category.
Ed stated the new security czar does not have the budget of implementation of
anything. Well, that was one of the contract items that I had with the
secretary before I hired on. He understood, the secretary understood,
I understood that if you don't have the control of the purse, so to speak, you
don't have much control of anything. Now, we have some missionary work to do
with the authorization of the Appropriations Committee, but for the FY2001
budget, the president's budget that will be coming over, there will be a
separate line item for all security dollars, and I will have control over those
dollars.
Ed made reference to a disturbing document entitled
"Safeguards and Securities Roles and Responsibilities" and how that document would seriously degrade my authority. I couldn't agree
more. That document is OBE'd (ph) and is not any way, shape, or form a policy
document.
That's my opening statement, Mr. Chairman.
HUNTER: Thank you, General.
Dr. Robinson.
ROBINSON: Thank you, Mr. Chairman. I appear before you to testify on a much
narrower issue, the issue of questions surrounding Sandia's
sale of an excess Paragon computer. I have prepared a longer statement for the
record that gives all the details. If I may, I'll just summarize briefly.
Mr. Chairman, I think there is less here than has met the eye in this matter.
Sandia's excess computer was neither sold nor exported to the People's Republic
of China, nor was it made operational. And no classified information was
released with or on the computer when it was transferred.
The story of the computer, its role in our laboratory, its declaring to be
excess, is delineated in the testimony. It was compared against the high-risk
list of materials; it is not on the list. It was circulated for availability
within the entire federal government, including calling sites that had
computers of the same type asking if they would like to use it for spare parts.
There was no interest. It was then advertised for sale twice to U.S.
corporations. In the end, it was sold to a U.S. corporation.
The fact that the system was disposed of in a completely lawful manner does
not...
HUNTER: Won't you describe, too, Dr. Robinson, what finally happened to the
computer for members of the committee here.
ROBINSON: OK. The computer was sold to a company whose principals -- so we
later learned -- was a citizen of the People's Republic of China. As a result
of the Cox Commission training, one of the individuals who was involved in the
sale came forward to the laboratory management and said,
"Gee, I think that individual might not be a U.S. citizen but could be a Chinese
citizen."
We began to investigate. We informed the Department of Energy at that time.
The Department of Energy directed us to find out what the status of the
computer was. We found the computer was stored in a site in Cupertino,
California, where it had originally been transported after the
sale. The individual allowed us to inspect the system.
ROBINSON: It was suggested that in order to be sure there was no possibility
that this computer could ever be exported, even though it was clearly marked as
export control on the documentation and on all the containers, that we buy it
back. Indeed, we did buy it back.
Now, I would like say, am I satisfied with Sandia's performance that what we
did was lawful and had checked all the squares? I'd like to tell you the
answer is no.
I think we do have a higher obligation, as a national security laboratory, to
put a lot more due diligence into looking is there any hypothetical us. Even
though my experts tell me if they were given the same problem of obtaining
computers to do supercomputing calculations by buying it from the market, this
is not the route they would have gone; that there are many other routes
available that were available a year ago at the
time of this sale that would be far more advantageous than this much older
vintage computer, which carried high operating costs and a high failure rate.
As I looked into it, I did find some serious problems, I think, within our U.S.
laws, and I have suggested to you in the testimony some steps we might take
together. The law prohibits, in the sale to a U.S. corporation, of making an
inquiry as to the citizenship of the owner of that company. I think for items
that are export controlled, it would be appropriate that you not only check to
see what the ownership is, but that if it is a country listed on our sensitive
countries list, as established by the State Department and by which we rate the
seriousness of visits to the laboratories, that any country -- any company that
is controlled by members from a sensitive country we should prohibit such
sales. Had I known about this sale at that
time and that the individual was a citizen of the PRC, I would have said,
"No. We should ask for a waiver not to sell the device." And, so I've proposed some suggested fixes for your consideration.
I would like to point out that the initial press stories of this were far from
the facts of the case, and indeed no harm to U.S. security resulted from the
incident, but I think we're all wiser by the exercise that has taken place and
the lessons learned including looking at gaps in our coverage for treating for
such matter of export controlled material to U.S. companies.
HUNTER: OK. Dr. Robinson, thank you. Mr. Weigand.
WEIGAND: Thank you, Mr. Chairman. I would like to shorten my testimony just a
small amount. Dr. Robinson's covered a couple of items that I have duplicated,
but I would like to read into the
record a part of my testimony.
Mr. Chairman and distinguished members -- I'd also like to do one other...
HUNTER: Could you get a little closer to your mike there, sir?
WEIGAND: Is that better?
HUNTER: That's better, yes.
WEIGAND: I'd also like to introduce three people that are with me here from the
Department of Energy that were all involved in the examination and subsequent
review of the events that took place around this Paragon machine. First one is
Steven Michaelson (ph). He's with the Office of Contracting Resource
Management; he's a director there; then it's Trish Dedick (ph), who is the
director of the Office of International Policy and Analysis in our Office of
Arms Control and Nonproliferation, and, Mr. Bill Hensley (ph), who is the
director of Security for the Defense -- Office of Defense Programs.
Mr. Chairman and distinguished members of the committee, I'd like to thank you
for inviting me to testify on security issues. In my
capacity as deputy assistant secretary for research, development and simulation
for the Office of Defense Programs, I oversee the nuclear weapons research and
development simulation work at Los Alamos, Lawrence Livermore and Sandia
National Laboratories.
While my office had no direct role in the sale and recovery of the Sandia Intel
Paragon computer, I will try to provide you with the information from the
department about that incident. I am best prepared to address the capabilities
of the computer itself, and the computers in general, with regard to their use
in the U.S. Nuclear Weapons Program, although to answer your questions on
computers in some degree of detail, it may be necessary to speak in a
classified environment.
The department named an Incident Review Team to conduct an investigation of the
sale and recovery of the Paragon computer. Experts on
procurement and export controls from the department's Office of Contract
Resource Management and Office of Arms Control and Nonproliferation, with
background in procedures and requirements regarding such transactions were
asked to perform the investigation and to provide the department with a report
of their findings.
I'd like to ask that a copy of that report, dated September 23, 1999, titled
"Sandia National Laboratories' Sale of an Intel Paragon Supercomputer," be entered into the hearing record as part of my testimony today, and I'd also
like the cover letter that I have sent out to Dr. Robinson asking that a
corrective action plan be developed on the 11 points found in this incident
report be also entered in the record.
I'll skip over, since the record will have the report -- it basically indicates
the 11 recommendations that we've now asked Dr. Robinson to follow.
I want the committee to know that I
fully supported the department's decision to investigate the Sandia Intel
Paragon incident, and my office provided support to the experts who were
assigned to the team. At the DOE, Nonproliferation Office of Arms Control and
Nonproliferation led recovery activities and provided the investigative input
of the subsequent review. That office, along with DOE's management and
administration, Office of Contract and Resource Management, provided the
department with the incident report.
I want to just give you a brief idea of what this computer was so that the
committee does understand quite possibly its impact on national security. The
Intel Paragon is basically a five-year old computer. It was declared obsolete
by Sandia. After determining that there were no U.S. government agencies
interested in the system, it was sold by Sandia on September 29, 1998 to a...
HUNTER: Would you discuss the capabilities of the computer, too, in your
description?
WEIGAND: Yes, I will. I just wanted to basically say that it was sold to this
company -- licensed American company, EHI Group, in Cupertino, California. And
Dr. Robinson described what happened thereafter.
As far as the computer goes, depending upon its operating configuration, this
Intel Paragon is capable of 150 million theoretical operations per second to
about 200 million theoretical operations per second. And there's that wide
gap, because it depends upon how you sum up the adders and arithmetic units in
that computer, how you ultimately get a number. There's no single to describe
it. It's in that range. It is a very powerful computer.
While the theoretical speed does sound impressive, in practical terms there are
limitations with regard to this system. It was a forerunner of a research
machine used in part to learn how to build the
next generation computers. That computer generation computers does now exist
at Sandia; it's called our Teraflux (ph) computer.
Today it would be -- it would be the most useful in an academic setting for
research on parallel computer machines. The other use for it would be for
spare parts on similar types of machines. The machine would be very expensive
to operate and not very efficient when anyone tried to use it in a production
mode. It did have, though, some of the U.S.' foremost and advanced
interconnect technology and was sold with its operating system still on the
machine, although the disk drives on which classified processing was done were
not sold with the machine.
I think that the single most important statement probably that you could make
about the machine's power is to a nation that has little computer power
capability, the capability of this machine would represent a significant
capability. It would be a substantial advance from anything that would be
obtainable on the market.
And the rest of my remarks are basically stats and facts about the computer,
and they'll be in the record.
HUNTER: OK. If you could, Mr. Weigand, just put that in context of the control
range that we have for computers in terms of
MTOPS.
WEIGAND: I will attempt to do that for you, and if I err, I'd like to Ms.
Dedick (ph) help me.
HUNTER: Sure. We'll let you revise and extend; don't worry.
WEIGAND: My understanding is that we have about a 7,000-MTOPS limit on many exports to countries that are on the list of controlled -- we
call it our controlled list; I think it's tier 4, or level 4. To our allies, we
don't have any restrictions, so this computer could have -- can be obtained --
computers of this type and quality can be obtained by our allies. But to the
countries in the
level 4 category, this computer would represent a very significant capability,
well above what they could obtain from the United States through the legal
export...
HUNTER: So, there's a 7,000-MTOP...
WEIGAND: Yes, sir.
HUNTER: ... level...
WEIGAND: Yes, sir.
HUNTER: ... with respect to the categories -- the controlled categories in
which China is a member.
WIEGAND: Yes, sir.
HUNTER: And the
MTOPS on this computer were what?
WEIGAND: One hundred and fifty thousand
MTOPS is a rating (ph) number, and...
HUNTER: One hundred and fifty thousand.
WEIGAND: And depending upon how you count, you could be higher.
HUNTER: One hundred and fifty thousand
MTOPS.
WEIGAND: One hundreds and fifty thousand.
HUNTER: So, 7,000 is as high as you can go legally.
WEIGAND: Yes, sir.
HUNTER: And this one was 150,000.
WEIGAND: Yes, sir.
HUNTER: OK. OK. Proceed, if there's anything else you want to
make in closing here.
WEIGAND: That basically concludes my remarks except for stats that are going to
be in the record.
HUNTER: OK. Thank you very much, Mr. Weigand.
We've had -- this is the second hearing that we've had today, and our members
have sat patiently through hearings all day, literally, with this subcommittee
and the R&D Subcommittee. So, the chair is going to defer to folks that haven't had a
chance to ask questions in the earlier hearings, and we've got quite a few
wrap-up questions here at the end that we'll go with.
So, Mr. Sisisky.
SISISKY: I've been asking questions all day, but -- well, let me just go ahead
and ask one. Then I have some other ones.
General Habiger and Mr. Podonsky, this is to you. Title 32 of the FY 2000
National Defense Authorization Act for FY 2000 mandates establishment of the
National Nuclear Security Administration, and I know there's been a lot of talk
regarding the legislation constraining the ability of the secretary's staff to
assist him in performing his duties. What will be the practical effect of the
legislation on the performance of his specific duties?
HABIGER: To be very candid with you, sir, I don't know. I hope it's not
significant, but my initial look is that there's a potential for some
significant changes in the way I'm now established through business. I'm
established to do business in terms of providing policy, oversight, and control
of the department's $800 million security budget, which I would not have under
the newer organization, and I'm also responsible now for operations in
emergency response. And under the title, I would no longer have responsibility
for that.
The secretary has made it very clear that we will comply by the law. He did
that yesterday in the Senate
hearing.
SISISKY: Made it very clear?
HABIGER: Yes, sir.
SISISKY: Good.
HABIGER: And I will comply by the law. I'm an American, and I understand laws,
and we'll make it work as best we can. But I will tell you, based upon my
current responsibilities, there would be some significant changes.
SISISKY: Well, if everybody complies with the law, I think if it's wrong, then
we can make the changes, but if people don't comply with the law, shame on you,
because -- I'll just go by and sum up some questions later, Mr. Chairman.
HUNTER: The gentleman from South Carolina is recognized, Mr. Spence.
Mr. Ryan.
RYAN: Thank you, Mr. Chairman. Actually, my question is a bit of a follow-up
to what was just said by the general just a moment ago about
your willingness to comply with the law. I've sensed in our panel there's been
a little bit of hesitation from the secretary and from the administration and
even in your verbal statement you have said that you want to see the trust by
the public and the Congress restored. So, we will take you at your word and
look forward to working with you.
I do have a question, though, and it relates back to the Visitors -- The
Foreign Visitors Program that has a 90-day limit on visitation from sensitive
countries, and that takes effect on November 5.
RYAN: Do you feel that's sufficient time -- the 90 days -- for everything to be
put in order so that the program will work well?
HABIGER: Yes, sir. As a matter of fact, one of the policies that we developed
and is working through the staff now is a policy on foreign visits and
assignments, and that policy will get out. It
will comply with the intent of the act that was just passed, and we'll be able
to get on with it at the end of the 90-day period. I'm confident of that.
RYAN: I'd like to direct that question to Mr. McCallum since he has been there
for a time. Do you feel that 90 days is sufficient to be able to put the
Foreign Visitors Program from sensitive countries in order, if you care to
comment on that? I know you've been gone six months.
MCCALLUM: I'd have to caveat my answer with I have been gone six months. I'm
not sure how much work has been accomplished in that time, but I will tell you
that the department's been trying to fix that program for that last 15 years,
and it's one that it will be very difficult to fix, because there's so many
interests that want elements of other countries in as assignees or visitors.
I wish General
Habiger the best of luck on that, and I hope that if there's anything that I
can do to help, I'll be pleased to consult. That's a very difficult answer and
a very difficult problem for the Department of Energy.
RYAN: And I do have one other question for Dr. Robinson, or I don't know who
would want to respond to this, but with regard to the computer, and I'm curious
as to some of the numbers involved. First of all, how much it was purchased
from you for; how much you had to offer to get it back, and then how much you
actually paid?
ROBINSON: Let's see. The...
RYAN: So, there's three parts to that question.
ROBINSON: OK. I'd even give you a fourth, if you will allow. First, I believe
our original price was just under $31,000 when we sold it as excess. The
original offer, when there was a strong interest shown in it and the suggestion
that this might be a
matter of some concern, an initial number of $2.7 million was suggested, and no
one took that seriously. The individual had spent approximately $140,000 in
buying the computer and transporting it to California and hiring the warehouse
space for it for the nine months in which it was in his custody. We were
authorized by the Department of Energy to offer up to $100,000. My colleague,
the chief information officer of Sandia, Pace Spendeviter (ph), who's sitting
behind me, then negotiated and agreed on a final number of $88,888.88. It
seems eight is a lucky number in China.
RYAN: All right. Thank you very much, Mr. Chairman.
HUNTER: Mr. Spratt.
SPRATT: Thank you, Mr. Chairman, and thank you very much for your testimony,
gentlemen.
Just briefly, on the back of an envelope, what do you need in the way of
additional resources to do this
job well -- I'll put the question, first, to General Habiger -- funds,
personnel, new equipment, updated security equipment? And has this committee
turned down or not fully funded some of your pending requests that would be
useful to you?
HABIGER: Sir, I'm not aware of this committee turning down any specific request
for funding. This is the first time I've appeared before this subcommittee,
and your reputation in the department is very high and very positive in terms
of your support for what we're doing and the problems we are trying to correct.
What I would prefer to do, sir -- I will give you a thumbnail sketch now, but
I'd like to, when I respond to the chairman's request for specific information
for the Foreign Visitors Program, to give you a breakout by line item. But
specifically, in the area of cybersecurity, it's $35 million. We're
asking for $16.5 million associated with hardware for the laboratories so they
can centrally control this highly classified data so it can be only authorized
under a two-person policy to be released to individuals. We need about $4.5
million for encryption equipment; $5 million for training. We discovered, and
I have John Gilligan (ph), our cybersecurity point of contact, here with me
today, and he discovered that we have not done a very good job in training our
administrators out in the field at the laboratories, the National Laboratories,
and our sites on the intricacies of managing cybersecurity.
We stood up, not too long ago, a computer incident advisory capability at
Lawrence Livermore. It's an awesome capability, but we discovered that the
labs weren't willing to provide this organization with reports of hackers. And
I will tell you that, in my view, from
my previous experience, that a serious hacker trying to get into a Department
of Energy computer is about the same as somebody setting off a truck bomb
outside one of our buildings. We need to let experts know about it and let the
rest of the department know about it.
And, so now we have policy in place that directs the laboratories to report to
this capability at Lawrence Livermore what has been happening to them, and then
they can do the proper analytical work. And, oh, by the way, for the first time
ever, that information is up- channeled to us so that we can take the
appropriate actions and see what our basic threats are.
And I would offer that up as the primary program that I need support on. But,
more importantly, the design basis threat, which is an interagency threat of
the kinds of terrorists that we can expect to see going after our nuclear
assets, whether they're Department of Defense or
Department of Energy, just came out in the 11th of June last year. I cannot in
this session go into any detail, but I will tell you, one of the things that
came out of that new threat analysis is that our security people have to be
able to respond to chemical and biological attacks in guarding our nuclear
assets. There's a $5 million bill associated with that which is unfunded.
So, our Foreign Visitors Program -- and, again, Mr. Chairman, I did not mean to
imply that you, specifically -- Congress was telling us to fix that problem,
because, as I recall, that was specific in the PFIAB report about needing to
get our act together in that area. But there, we're developing some new
software, and I don't have any -- I have a very minimal staff. I have to hire
something in the order of 12 new people to get that program up.
We need to
get it up for two reasons. Number one -- three reasons -- number one, to
tighten our process; number two, to make sure that our new tightened process is
handled in a timely manner so that the labs don't have to come in with a six-
or eight-week lead- turn time for us to respond so they can get approval. I'm
very sensitive to the fact that foreign visitors are essential in the
continuing dialogue in the scientific community. And, finally, I just need the
people to make it happen. Right now, I don't have the people.
I will get you that, Mr. Chairman, and, sir, and get it over to you very
quickly.
SPRATT: Now, what's the status of this inventory of your needs and the funds
associated with it? Would it be -- can you obtain that money out of the hide of
the FY 2000 budget, or is this an FY
2001 request?
HABIGER: It came over on the 14th of July, sir, as part of the department's FY
2000 supplemental.
SPRATT: Supplemental.
HABIGER: Yes, sir.
SPRATT: OK, fine.
HABIGER: And, as I said, we didn't do very well.
SPRATT: OK. So, the supplemental is still unfunded.
HABIGER: Yes, sir.
SPRATT: And that means until it's funded, you've got important needs there that
can't be completed at least -- undertaken but not completed as robustly as
you'd like.
HABIGER: Yes, sir.
SISISKY: Would the gentleman yield just a moment?
SPRATT: Certainly.
SISISKY: You are reprogramming to get some of those funds, are you not?
HABIGER: No, sir.
SISISKY: You sure?
HABIGER: I'm not aware of it, sir. I mean -- yes, it was a budget, but a
budget amendment for FY 2000.
SPRATT: In
conference or as a separate supplemental?
HABIGER: It was a separate supplemental, as I recall, sir, as part of the
overall request.
SPRATT: And some of it's been funded. We've passed -- we've approved...
HABIGER: Congress has approved some additional monies that we requested for
additional background investigations. Glenn Podonsky asked for some
supplemental funds for his organization, and most of that was funded.
SPRATT: In the Energy appropriation bill?
HABIGER: Yes, sir; I believe so.
SPRATT: Dr. Robinson, one question of you. Dr. Foster, Johnnie (ph) Foster,
makes the point not only about this but about safeguarding -- security and
safeguard operations, generally, is everybody's responsibility, and if you make
it a line responsibility, then some people will tend to think that's somebody
else's job; that's not my job. And you need to inculcate this sense of
security
awareness in everybody.
Among your chemists and physicists and high-powered scientists, is this a
problem now? Is there a new level of awareness? Any resistance to it?
ROBINSON: I think there is a new level of awareness. We have used the word
"integrated" security management. The most important people are the people who have the
knowledge to design the nuclear weapons. Having their good will, their
attention to these matters is crucial. You can hire any number of guards
standing outside, and if you don't have that, you don't have good security.
And, so you have to integrate the entire package. And I think I favor my
thinking along the lines of Dr. Foster.
SPRATT: Is tightened security affecting morale, but in particular, measures
like polygraphs?
ROBINSON: There's no question that the question of polygraphs as a screening
device -- a widespread screening device has gotten lots of criticism. General
Habiger was brave
enough to go around and do public hearings at all the sites, and he heard from
our staff members regarding their questions. I believe the actions this week
taken by the secretary saying rather than a case of polygraphing every
individual, we will look to polygraph a more appropriate smaller group, was
music to the ears of my scientists.
We do have a record of polygraphing for sensitive programs, and at my
laboratory, just under 200 people have been polygraphed in the past as they
work in compartmented programs, both for Defense Department and supporting
intelligence agencies. Within that framework, adding this for DOE matters is
appropriate, and I think we're ready to live with it. I believe we're working
together to make these more directed and less onerous.
SPRATT: Thank you very much.
HUNTER: I thank the gentleman. Mr. Gibbons.
GIBBONS: Thank you very
much, Mr. Chairman.
Mr. Podonsky, you were formerly the deputy assistant secretary of energy for
oversight, are you not?
PODONSKY: Yes, sir.
GIBBONS: Who did you report to in that job?
PODONSKY: In that job I reported to the assistant secretary for environment,
safety, and health.
GIBBONS: OK. And in your current position?
PODONSKY: In my current position, I am directly -- I report to secretary of
energy, Mr. Bill Richardson.
GIBBONS: So, you've taken just one level of management out of...
PODONSKY: Actually, sir, I would tell you that is one giant leap. Having been
in the department for 15 years, we have identified issues, including similar
issues that were related to the Hoan Lee (ph) situation, as far back as 1994,
and we were not very successful in getting people to pay attention to some of
those issues, and part of that was where we reported to.
GIBBONS:
Well, that's my next question, because I noticed in your testimony at the
bottom of page one where you say,
"We're pleased to report that our independent oversight inspections are
receiving considerable attention and management support." And that leaves me to believe that they were not given considerable attention
by management or the support of management prior to this incident. I'm not
sure whether it's simply because of the change in the hierarchy or the
structure of management or a renewed emphasis on the fact that we now know that
there are some serious problems out there, have been, with the security of our
labs.
Secondly, I'd like to ask you the question about the ratings, and I presume
that this sheet -- this colored sheet, is something you're familiar with, which
has the current and projected status of security ratings for all of the
laboratories and Department of Energy facilities. Are you familiar with it?
PODONSKY: Yes. That is not our rating sheet. That is the department's rating
sheet that has to do with the annual report to the president that we feed into.
GIBBONS: All right. Well, I noticed that there's some like the Los Alamos Labs
that across the board have received a marginal rating in their security which
is less than satisfactory. Yet, in here, the policy that was established says
that the secretary plans or intends to have every agency of the department up
to a satisfactory grade in security by the, I don't know, end of the year.
PODONSKY: End of the calendar year.
GIBBONS: Right. Now, I noticed on this sheet all is well, as the DOE has a
couple of projected status sections in there that show only marginal. So,
something -- it doesn't jive, either with their projected statement or they're
saying they can't there. But that's not the case.
What I want to talk about -- maybe if I can go back over to Mr. Weigand -- you
said the computer had its operating system intact when it was sold.
WEIGAND: Yes, sir; that's correct.
GIBBONS: What does that provide in terms of capability to any country which may
have obtained this -- if some country had been permitted, for example, China,
what capability would that computer -- would that operating system, in their
given -- its current condition, a country like China with regard to its nuclear
weapons, projects, and programs? Would it have been able to use that computer,
for example, to go directly to the design of miniaturized warheads?
WEIGAND: It's not the operating system directly, Congressman, that would allow
the machine to provide them expertise in making a leap to scientific answers.
The operating system for a computer allows the computer to interact with the
different peripherals -- the disks...
GIBBONS: Sure.
WEIGAND: ... the computer -- and it allows the human component to interact with
the computers. It's sort of the brains of the computer. The scientists who
work with the computer supply the knowledge through computer programs that are
a set of
instructions that the computer loops through in order to arrive at scientific
calculations. So, the operating system would be essential but not complete.
Without an operating system, the scientists would not be able to communicate
with the computer. With an operating system there, they're able to take their
knowledge, transcribe it into the codes that the computer understands, connect
with the operating system, and come up with answers and then make scientific
judgments. The computer does not make the scientific judgments. The computer
does not design the bomb. The computer does not give you the dimension and
height and weight.
GIBBONS: Thank you for the education.
WEIGAND: The computer doesn't give you scientific judgment.
GIBBONS: The question now becomes, with this system -- the computer system, in
the hands of the Chinese, would they have been able to move forward with their
miniaturization program on nuclear weapons?
WEIGAND: Sir, I'll return to my statement that I made that a country that has
a -- that does not have a substantial computing capability would benefit in a
national security way from obtaining a computer of this type.
GIBBONS: So, your answer would essentially be yes, it could move forward.
WEIGAND: You're drawing a...
GIBBONS: Well, I don't want to put words in your mouth.
WEIGAND: No, I understand that. And I do not want to draw the same...
GIBBONS: I understand the text of your answer, but...
WEIGAND: You understand that the capability of small and lightweight is a
substantial capability. I would rather not discuss in an open session as to
the computing capability and the methods by which you arrive at that.
GIBBONS: I understand.
Have any other systems like this been sold previous to this that you've come
across which we've been unable to return -- unable to question in terms of the
sale to countries that weren't authorized?
WEIGAND: I'm not aware of any exactly similar instance. There were, to my
knowledge, two -- there were two computers that had been raised as questions in
the past with regard to their entry into, I believe it was the Soviet Union.
But I think we should -- Trish, do you want to -- OK, this is not the same
class of computers. This is a substantially powerful computer. Those were in
the class of about 32,000
MTOPS.
GIBBONS: Sure, be happy to yield.
UNKNOWN: If the gentleman would yield, and I apologize for having to leave.
Steve Bryan (ph), who was our first director DTSA (ph), has said publicly that
he knows of no computer of this size that has ever been sold. Is he correct?
WEIGAND: No computer of this size that has ever been sold to who?
UNKNOWN: On a surplus market.
WEIGAND: To my knowledge, that's a true statement. You've got to understand,
that computer is one of the largest computers in the world. That's why we had
it.
GIBBONS: I guess the
question, then, would be -- my final question would be, do we need to do
something with regard to our checks and balances in terms of sales again of
equipment like this overseas or is there something that we're missing that
would have allowed a sale like to go through?
ROBINSON: If I could clarify, this was not exported, and so...
GIBBONS: It would have probably gone export though.
ROBINSON: There is no prohibition against the sale domestically of computers of
any size.
GIBBONS: Well, I presume, Dr. Robinson, that anybody who is a foreign national
can establish a United States company, buy a computer of this type, and then
say that this company is transferring it for its own use to its other
businesses overseas. Would that be an avenue they could...
ROBINSON: Congressman, I've looked into that in some depth as I've tried to
look at the hypotheticals of this. Our law assumes that if someone establishes
a business in the U.S. and registers their
business in the U.S. that they will abide by our laws. And we, right now, have
no basis in law to assume otherwise. I suggest in my testimony it might be a
good idea for us to try and amend things when we're dealing with folks who
represent sensitive countries. I would agree with you.
GIBBONS: Well, let me just follow-up one minute, if I may, Mr. Chairman.
When you have a company that you're selling a computer of this magnitude of its
computing capacity to, do you ever question them as to why they need such a
computer? And if you did in this case, what was their answer?
ROBINSON: Yes. You should recall that this was not being sold as the full
computer. Parts had been removed, and it was a substantially smaller portion,
and it was being sold as scrap, at that point, for parts. The individual
indicated he had the prospects of salvaging the processor chips for a Internet
service
provider, named Pacific Bell, in his part of California, and that was the basis
why he was buying the computer.
GIBBONS: Thank you, Mr. Chairman.
HUNTER: Mr. Robinson, do you have any knowledge as to whether or not that was a
true assertion? I mean, I think the unasked question that we're all kind of
wondering about is, was this a storage bin that you found this thing in or did
this guy have an ongoing business where he could actually use a computer that
was 40 times as powerful as the highest level of computer you could legally
transfer to China?
ROBINSON: No. He...
HUNTER: I mean, did he have a Dairy Queen operation or did he really have a
place where you could use this thing?
ROBINSON: His purchase of the computer and his shipment was very consistent
with a scrap dealer. He transported it on a flatbed truck, which one wanting
to use the computer would never have done.
HUNTER: Well, certainly, didn't we do some investigation about this guy?
ROBINSON: We did, and we did an
index check, and he came up clean.
HUNTER: Well, I'm not talking about an index check. Does he have a scrap
business?
ROBINSON: I'm told he buys various technology as he can, and then sells it.
So, he's an intermediary dealer, but not a widespread scrap dealer.
HUNTER: Has he ever sold any scrap before? I mean, you guys know some things
about this gentleman, so why don't you just tell us? What is your take on this
guy that he was likely looking at a transfer to China or to another country, or
was he a legitimate scrap dealer who just happened to have a nationality from
another country?
ROBINSON: Why don't we have someone who was close to the discussion?
HUNTER: Well, I think we need that, because I think your statements at least
imply that, and I think we need to just walk this
thing through. Let's find out what this guy was.
TRISHA DEDICK (PH), DIRECTOR, OFFICE OF INTERNATIONAL POLICY AND ANALYSIS,
OFFICE OF ARMS CONTROL AND NONPROLIFERATION, ENERGY DEPARTMENT: Mr. Chairman,
I'm Trisha Dedick (ph), and I was part of that negotiation process. The
individual in question was not a scrap dealer. He was a small businessman. I
believe we found that he sold small computer products and whatnot. He had
never bought anything of this size, to our knowledge, before or anything near
that size. His explanation of what he planned to do with it did vary from time
to time. He did talk about this IP address that he was going to establish, and
he talked about several other possibilities, and he did change his story from
time to time.
There is an ongoing investigation that continues by the Department of Commerce,
and I believe that they would be able to provide more information at this time,
because we have not gotten all of the information after the computer was,
again,
acquired by the department. But this investigation does continue, and the
individual is being looked into.
HUNTER: That's what we wanted to know. OK.
OK, Mr. Gibbons, go ahead and continue if you want to. You're finished? OK.
I thank you.
The gentlelady from California, Mrs. Tauscher.
TAUSCHER: Thank you, Mr. Chairman. Gentlemen, thank you very much for being
here. As many of you know, I represent Livermore, California, the home of the
best scientists in the world -- sorry, Dr. Robinson.
ROBINSON: But you have some of...
TAUSCHER: But I do have some of yours at Sandia.
Let me start by thanking you for your very hard work in a very tough situation.
This has been a tough time, generally, as we've figured out the post-Cold War
environment is a lot more difficult than necessarily the Cold War was for us,
and it's a very challenging time, and we have got to pull
together to make sure that we are using all of our energies to get from out
behind the eight-ball and move forward. And, clearly, we can accept nothing
less than a zero tolerance for anyone and anything that wants our secrets. We
are the idea goody bag in the world, and people are going to constantly try to
stick their hand in the bag and try to take things out, and we've got to be
smart about how we prevent that.
I believe that we've had a multi-decade, perfectly bipartisan, systemic failure
to really get this. And there's lots of blame to go around and lots of people
to blame, but I'm tired of that, so I want to go ahead and fix it.
And what I'm interested in eliciting from you, specifically Dr. Robinson and
General Habiger, is your indication of acceptance of what we've done in article
32 and the ability to move forward. I believe that the secretary's
comments, as of yesterday, indicate his willingness to move forward and that we
have got to do the best we can with the law that we passed and the president
signed just a few weeks ago in the Defense authorization bill.
And, as you know, Mr. Thornberry is chairing a panel that Chairman Spence has
put together as a special oversight panel. Many of the members are here in
this room, so we are looking forward to hearing from you subsequently, and
certainly the secretary subsequently, as to what we can do to make sure that we
are absolutely never confused again and that we are absolutely preeminent, not
only in the science that we produce and the protection of our nuclear stockpile
and in our nonproliferation efforts around the world, but in national security.
And it goes the bandwidth from things that nobody ever thought we'd have to
worry about to gates and guards.
And I know that this is -- it's been tough, and you're not going to get an
apology from me for being tough about it,
but I know that we all share the heightened sense of the necessity to work
together and the ability to work together. So, I look forward to that
opportunity.
Mr. Chairman, I really don't have any questions, but I do want to tell you that
I think that this is probably, in my opinion, the number one thing we have to
do in this Congress and the next Congress is make sure we get this right. We
don't have another chance.
ROBINSON: Could I...
HUNTER: Certainly.
ROBINSON: Could I respond? I have been disappointed, in fact, somewhat
confused that the recent problems arose between the different views of how to
fix this. We talked to Secretary Richardson as a group of lab directors on his
joining the department and said we must change the past where there were too
many people all giving conflicting views, all in control; we must streamline;
we must have someone who is accountable; and that the decision loops
close instead of endlessly going on. He agreed with that and took some major
steps to reorganize the department into lead, principal secretarial officers,
and we were delighted with that.
What he did is very close to the legislation, so it's my sincere hope on behalf
of the laboratories that we can close the gap the rest of the way to
streamline, get accountability, but not have many sets of open loops of
management direction taking place.
TAUSCHER: If I could just add one more thing, Mr. Chairman.
TAUSCHER: I think that Chairman Spence has shown great agility and great
foresight in helping us by creating this panel too to make sure that we were
really focusing on Congress' role and making sure that at least on the side, in
the House, that we were paying specific attention, because this is such a
changed environment. And I want to congratulate you, Mr. Chairman, for your
ability to do that. Thank you.
HUNTER:
I thank the gentlelady. Mr. Jones.
JONES: Mr. Chairman, thank you very much, and, first, I want to thank you. I
am not a member of your subcommittee, but I thank you for the opportunity of
sitting here today and listening to the testimony from the panelists, and I
thank each and every one.
I guess that I am like the fine lady from California. I want to go a little
bit back in history, because I have an obligation to the people in my district.
I represent the third district of North Carolina; take great pride, Camp
LeJeune, Cherry Point, Seymour Johnson Air Force Base, and we have 77,000
retired veterans, men and women that are very patriotic and have great, strong
feelings in this country, because they've served, many, during war time,
obviously, if they're veterans. And I feel
compelled to go just a little bit back in history.
You know, I think about it, when this revelation came out a year or two ago
that there might be some type of espionage at our labs, Mr. Chairman, I think
about it, quite frankly, if there had not been that leak, if it was a leak, if
it had not been for the Cox report, then we probably would not be here today
having this discussion, because we would not have known what had happened. And
that's what concerns me.
And I want to start with Mr. McCallum and then Mr. Podonsky -- did I say that,
correct? Close?
PODONSKY: Podonsky.
JONES: Thank you -- I've got to practice. I want to start and I want to ask
this: Mr. McCallum, you were a director for how long as Safeguard and Security
Office?
MCCALLUM: I was at the Office of Safeguard and Security -- it was just short of
10 years.
JONES: OK. And,
Mr. Podonsky -- I'll keep trying; don't give up on me -- you have been with the
Department of Energy for 15 years, right?
PODONSKY: Yes, sir.
JONES: What I want to know is how did we get into the situation that we're in
today? When did you, Mr. McCallum, Mr. Podonsky, when did you suspicion that
we had a problem? When were you ready to say to someone in higher authority,
"We've got a problem"?
MCCALLUM: Congressman Jones, the problem as many problems evolved, we've always
had a level of interest in our laboratories, I think as Congresswoman Tauscher
said. It's a goody bag, and it's too good a technology base for foreign
countries and rogue nations not to be interested in. So, there's always been a
level that you can look back to that we or the FBI have been looking at. But
evolving from about 1993 to about 1995, resources had been depleted, technical
personnel had left the department, and we stopped being able to maintain any
kind of sense of where we were, but there was a clear sense of decline.
By 1995, my office, the Office of Safeguards and Security, wrote a very
cautiously negative report that essentially warned that there were cracks
appearing in the infrastructure, but there were parts -- and that funding and
support for the program needed to be escalated. Now, I focus on funding,
because funding sends a major signal to the labs, to the lab directors, and to
our field elements of whether it's important or not. Our funding had been
chopped in the Safeguard and Security arena by about 40 percent, at the same
time that we knew espionage was occurring.
We were aware of Chinese espionage in our labs back to about 1985. You've
heard the magic words
"tiger trap" and some of those operations that the bureau was running back then. We knew
that there was activity. Those reports were ongoing. The lab Safeguards and
Security and the lab counterintelligence people were briefed regularly by me
and the director of Operations in counterintelligence. So, those elements were
happening, but they slowly escalated. Incidents with computers, the evolution
of computer systems escalated to the point that by 1995 we sent a flare up.
JONES: OK. Who did you send your report to? I mean, who should that have
raised a red flag? I mean, who did the report go to?
MCCALLUM: We raised the flag for the serious time to the secretary of Energy in
our annual report to the secretary for calendar year 1995 in January of 1996.
Before that, there were numerous incident reports and numerous situations that
pointed to a deteriorating information security, computer security program back
to about 1992, but it had not become critical to the point where we had really
lost control of the program, in my words, in the department until 1995.
JONES: Mr. Podonsky?
PODONSKY: I go back a little bit further, Congressman Jones, relative to when
the problems in the department began, and I go back to the 1970s. There was a
great concern by the legislative arm of the government about the department's
ability to protect its nuclear materials and its weapons. A great deal of
effort by Congressman Bliley and Congressman Dingell forced the department to
take a good hard look back in the early '70s on how to plug these gaping holes
of security.
That was find up and until about '84 to '89. Safeguard and Security was
plugging the holes in terms of all the glaring problems. Then the department,
in 1989, started to focus on environment, safety, and health, and the focus on
security lessened. Some of the reductions in resources came about during that
period.
We continued to do inspections and
raised issues that we're talking about today as far back as '88. The most
telling one was in '94. From '94 to '97, there was a great deal of focus on
human radiation experiments as opposed to safeguards and security or even
environment, safety, and health. It wasn't until recent times that we've come
full circle back to the attention paid on safeguards and security. And I would
say, having been in the department, living through all these cycles, the thing
that is encouraging my folk -- my people, and myself the most is the way this
new infrastructure is working.
And something that would be helpful to long past survive this current secretary
who had the vision to stay with keeping a separate policy office and
independent oversight and holding the line accountable, is somehow we need to
make sure that federal and contractor people alike are accountable. It's a
problem more of attitude and
accountability, and that's one thing that we haven't seen in the department.
It's always been easy in the department to blame contractors for failings, but
it goes all the way back to the federal staff as well. And that's where the
biggest problem lies in terms of the department, whether it be a safety issue
or a security issue that we're looking at today.
JONES: So - and then I'm going to go to another question, Mr. Chairman -- but,
basically -- and, again this is my first opportunity to sit in to hear this
discussion in-depth -- but, basically, when you or Mr. McCallum -- in the
mid-'90s you became concerned that maybe this espionage had picked up, so to
speak, or, as Mr. McCallum said, has been ongoing, but maybe then you got aware
that it was picking up as far as the advances being made in espionage. So,
basically, when this report that he spoke about -- or
your explanation, then you don't have -- you couldn't go to the sector at that
time and say to her or to him,
"Listen, we've got a serious problem out here. We need some action." I mean, does the process work that way?
PODONSKY: First of all, just a point of clarification. Our reports never
alluded to the specific espionage. We specifically called out the systemic
problems involving cybersecurity -- the classified and the unclassified. I
just want to make that point clear. But, yes, the problem has been, as I
explained to Secretary Richardson in May, the problem has been the ability to
access the secretary, to inform the secretary of what's actually going on as
well as, over the years, our ability to brief the legislative part of the
government as to what was going on.
JONES: Mr. McCallum, was that...
MCCALLUM: Yes, we had a great deal of difficulty getting to the secretary's
office in the '94-'95 time frame. We couldn't get through staff. They were
clearly guardians at the gate, and we were not allowed to get there. We did
finally almost push our way into the deputy secretary's office, Mr. Charlie
Curtis (ph), who listened to the report, was very disturbed by it, and had us
brief the field mangers in a session on what we were finding. And the briefing
was done, but, frankly, the secretary's chief lieutenant, Mr. Don Perriman
(ph), told the field managers not to worry about it.
JONES: Told the field managers not to worry about it.
MCCALLUM: He said: Don't worry about it. He said: Do what you got to do. So,
the signals from the very top of the department at that time frame were: This
is not a priority. This is not an important mission. Don't worry about it;
we'll take care of these guys.
JONES: Just a couple more. Let me ask you in your comments and Mr.
Podonsky, and maybe the general also could speak to this. I don't guess this
would be classified. But you mentioned a concern that I found very interesting
about terrorists within the country or terrorists coming from outside the
country that could maybe overtake a lab, one of our labs. Did I understand
that right in your testimony? I didn't get a chance to read it, but I was
listening that mentioned that you did have a concern that this could happen?
MCCALLUM: I'm going to be careful about how I answer that in an open session,
but clearly from the 1970s, as Mr. Podonsky mentioned, the Congress and the
American people became concerned about the Munich terrorism. After the Munich
Olympics, we were all urged in numerous organizations to get moving, and in
fact, the Department of Energy changed from an individual-based security
operation to one which if you looked at it in the
mid-'80s, we had SWAT teams, we have helicopters, we were ready to react in a
military fashion to a possible terrorist event, particularly when we were
looking at nuclear weapons, and nuclear weapons, material from which nuclear
weapons could be readily made.
So, yes, the concern is there. I think that the FBI and the intelligence
community and the kind of report that General Habiger mentioned has said that
the risk is low if we maintain a high security base. But that if we drop our
security base, it could become increasingly problematic, because we know that
there are people and organizations out there that want a nuclear capability.
So, yes, it is possible. And we became concerned by 1996 that several of four
facilities had lost enough people and tactical capability that they could no
longer efficiently respond. Now, to go into any more detail than that, I think
we'd have to be in a closed session.
JONES: When you say lost a
number of people for protection purposes, was that because of the decline in
the budget or was that administrative decisions that...
MCCALLUM: I think that there were reductions in the budget about that point,
and -- but the reductions, frankly, as we looked at it, one of the evaluations
that we did, the department took about a 25- percent cut in our lab budgets and
what were doing from the department, but we took about a 40-percent cut in
personnel in the safeguards and security arena.
JONES: And the cuts meant that weapons, ammunition, and training declined to
the point that the people that were there were tactically questionable?
MCCALLUM: Many of the younger people that came on to our forces -- we became
oriented towards special weapons and tactics and military responses to a
terrorist event -- were the first people to go, because many of our sites are
unionized, and as in most union operations, the newest people are the first
ones to go. So, the age of our force increased dramatically.
So, it was largely capability and numbers. If you have been to some of our
sites, they're cities. There are hundreds of buildings and multiple targets.
So, what we ended up with was a smaller force that was guessing where the bad
guys might hit. And being the security director at the time, I had to worry
about whether they were capable of stopping a terrorist attack if it should
occur. And we raise those issues in, I think, the strongest terms.
JONES: And I guess, Mr. Podonsky, this is now being addressed in general. I
guess this comment that was made by Colonel McCallum as far as the concern he
had when he was there with the Department of Energy, we're addressing that
adequately now, right?
PODONSKY: I can't speak for the general, but from an oversight perspective, we
think that in the last six months there's been a marked sea change especially,
and I don't want to emphasize the infrastructure, but having General Habiger as
the
head of policy and the security czar, having also direct access to the
secretary as do myself, we're assuming any time you have a chief executive
officer of a corporation get personally involved, you see major changes taking
place, including the stressful tests that Barb Stone, who's with me today --
her people run performance tests on all of the sites. And we're going to
continue to test. We'll trust, but we'll continue to verify that the
department is moving on this track and not just rest our laurels on the
infrastructure. But we do believe the department has made a tremendous sea
change.
MCCALLUM: And just one comment, if I could, relating to access to the
secretary. It's total; it's immediate, and he listens.
Virtually everything I've recommended to him, he has accepted and told me to
implement. There's no bureaucratic nonsense involved; it's get out there and
fix it.
MCCALLUM: In my
opening statement, I made a comment about personally reviewing the security
plans for each of our sites. Are they all perfect? No. Are we going to make
them better? Yes, and we're going to do it very, very quickly.
We've cut down the bureaucratic infighting between headquarters and the field
to make sure we have viable security plans out there. As a matter of fact, I
have a team at one of our sites out there today, as we speak, to correct some
bureaucratic infighting. And by the end of this week or the middle of next
week, we'll have a viable plan out there.
JONES: Mr. Chairman, this will be my last question, if I may.
And, General, I'll ask you and Mr. Podonsky and Colonel McCallum, one of you
gentlemen mentioned -- either Mr. Podonsky -- I'm getting better -- or Colonel
McCallum in your comments that you felt that we needed to have oversight by
an agency outside of the Department of Energy as it related to security. Would
you three gentlemen comment on that? Either you do, or you don't, or you don't
know at this time?
PODONSKY: I think Mr. McCallum was the one that made the statement, and there
was a point in time that I would fully agree with him, having been in the job
for 15 years, and at one point Mr. McCallum and I did the job together. When
we were not able to get the attention of the department, oftentimes we
discussed whether an external entity would be more effective. But also on a
personal note, having been a regulator with the Nuclear Regulatory Commission,
I will tell you that, in my opinion, external regulation for the department on
safeguards and security is not the answer.
The answer is to institutionalize responsibility, accountability and hold
people accountable. That's what it comes down to. We pay a lot of people,
both federal staff as
well as contractor folks, to run our laboratories and our sites. If they are
held accountable, like private industry does, you don't need more oversights.
Oversight with a sledgehammer is not the way to change the hearts and minds of
people; it's to hold them accountable for what they were hired to do.
JONES: What would you like to -- General?
HABIGER: Yes, if I believed that would endure, I would agree. It's certainly
the cleanest way to work it. Certainly a Cabinet-level officer should be able
to do that. But I've been with the department in one capacity or another for
about 25 years, and I've seen that cycle move through the phases of we're going
to fix it, and then it gets broken again on three separate occasions.
I sat at a table like this in front of Congressman Dingell's committee about
eight years ago with the secretary of energy when the secretary of energy said,
"We're going to fix it, and it's going to stay fixed." And he was committed to those -- Admiral James Watkins -- and it worked for a
couple of years. And then it went back into the wrong direction. I don't
think that something as important as the protection of nuclear weapons can rely
on the good faith and intentions of one or two people. And, unfortunately, I
think things got so bad for several years that something outside of the
department needs to be looked at.
There's a proposal, I think, in the legislation this year -- I think it's in
the legislation -- there will be a commission. That should happen. The
activity and activity level of commission can depend on whether the department
is carrying out its responsibilities, but it's just failed too many times, and
the promises have been made by too many different people, and it's failed. The
competition for resources and the
competition between open science and national security is just too much of a
problem in the department. Somebody outside needs to make the -- at least be
able to send a flare up.
I hope that the commitments that I hear made in the statements are very true,
but I don't know what happens in four years or six years or eight years. We
shouldn't be here again with this system broken. Nuclear weapons are too
possibly disastrous.
MCCALLUM: I would just like, if I could comment quickly, I disagree. I think
the department can oversee itself. Glenn has done -- Podonsky -- has done some
marvelous work in institutionalizing the process so that his oversight
evaluations are done when they're completed. I sit next to him. I sat down at
Sandia when Dr. Robinson was out-briefed on his evaluation. I will go to the
field, and when I leave, my successor will go to the field.
I think, Congressman Jones, the key to success here -- and I'm apolitical; I've
said this many times; only one person knows how I vote, and that's my wife, and
we cancel each other out every year -- but the point is we need strong
leadership in the position of the secretary of energy; that's key. I think
we've learned some lessons there.
HUNTER: Thank you, Mr. Jones, and I wanted to ask a guy who's been a real star
in this area to -- who's got a few comments on this, Mr. Weldon, to kind of be
our cleanup hitter.
But just before we do this, I just wanted to ask you, General: You're a
military person, obviously. You believe in accountability.
HABIGER: Yes, sir.
HUNTER: You believe in chain of
command. If you look at that diagram over there to your left, that's what you
have in place right now. If you had a division-size element and you wanted to
make sure that you had accountability and had responsibility and had the
ability to bring people before you who had done either a good job or a bad job
and act accordingly and you wanted to get your mission accomplished, I would
submit to you that if that was your chain of command coming down from a
division where you had a lot of -- or people on the staff of a division
commander could end up micromanaging platoon members in the Third Platoon
Company B, Fourth Battalion, you'd have a mess.
If the staff could replace that with what we have come up with with respect to
reform of DOE, at least their weapons department, I want you to see what we
replaced it with. We basically replaced it with a military model -- put that
up there. That maze has been replaced with this. Now, I've
told Bill, and I know he wants to have a strong security; I believe that very
truly. He has an administrator; he makes the policy. He's the division
commander, and he makes the policy on intelligence and counterintelligence, and
if the administrator makes a mistake, he can pull that administrator before
him, and he doesn't have 35 different lines of communication going down to the
lab level. Now, I think it was you or Mr. Podonsky who mentioned fiefdoms
within fiefdoms. Was that your statement?
HABIGER: Yes, sir.
HUNTER: Well, sir, if we don't -- if we didn't go -- if we hadn't gone to this
new military-like accountability chain of command, you'd still have fiefdoms
within fiefdoms, and I think that's -- that is the genesis for Mr. McCallum's
statement, essentially what he's been saying, and I think there's some truth
there, and that it's true if everybody's pulling together and you've energized
this culture of being very attentive to security, you can hold that
for awhile. But with that maze that we have there that is the present way that
these fiefdoms within fiefdoms operate, the thing can degenerate back into a
situation -- and I think you saw this.
When Mr. Lee was identified as having stolen some nuclear secrets, the head of
the FBI sat in a room with the undersecretary of Energy, according to him, and
said,
"Remove this guy from the nuclear weapons vaults and take away his classified
material, because he may be stealing stuff form us." She nodded approvingly. A couple weeks later he had a meeting with the
secretary of energy. He said,
"We think this guy's stealing nuclear weapons or nuclear secrets. Take him away
from these classified areas." He nodded approvingly. Fourteen months later, somebody turned around, like a
scene from the Keystone Cops, and said,
"Is that guy still down there next to the weapons vault? I thought you were
supposed to fire him," and somebody else said,
"I
thought you were supposed to fire him." That's what made the nuclear weapons laboratory system the laughing stock of
the country. In my estimation, it's also partially a result of that maze that
you saw and all the confusion and the lack of accountability that is manifested
in it.
So, I would hope that you would look at this as a military man at that very
clear chain of command that we now have. And that administrator's not hired by
Congress; he's not hired by some adversary; he's hired by the administration
who hires the same secretary of Energy, and he should be a guy in whom the
Secretary has enormous confidence and trust. And if something doesn't go
right, he can jerk him into the office and say,
"Why didn't this go right down in the Third Platoon Company B?"
Now, don't you think that that is preferable to the mess that we've been
operating under?
HABIGER: Mr. Chairman, I sat before this panel two days after
I was hired, and I saw this, your previous chart, and I was showing the chart
that the secretary of energy, Richardson, showed you and said,
"Hey, this is where we are today. It's not quite as bad as you've depicted it
-- or Chairman Spence had depicted it." When I came and signed this contract with the secretary of energy, I asked for
two things: number one, if Gene Habiger is going to fix this problem in the
Department of Energy, I need the full weight, power, and authority of the
secretary of energy, and, number two, I said if I'm going to fix the problem in
the Department of Energy, not specifically defense programs, but in the
Department of Energy, I needed total and absolute control of those $800
million.
This is a new paradigm, and that's why when I was asked the question earlier
what my role and responsibility and how am I going to do it, I don't
know yet. It's a new way of doing business. I understand you military
analogy, and in concept I agree totally with that, sir.
HUNTER: OK, thank you. And, now, Mr. Weldon.
WELDON: Thank you. It's time to liven the hearing up a little bit.
First of all, I'm going to start off by saying that I think the concerns that
have been raised about our labs was largely brought on by Bill Richardson
himself.
Now, why do I say that? Well, I was one of those nine members of Congress that
served on the Cox committee. I sat through seven months of meetings with the
CIA and the FBI, and I attended almost every one of them, during all of our
holidays. I saw the evidence presented, and I was involved in all the
recommendations we made, which were all nine to zero. There were no seven to
two, or
eight to one, or five to four votes; all of our votes were nine to zero. If
there was a problem on any issues or any piece of any language of any of our
recommendations or findings, we changed it. It was a nine to zero vote.
What we found in the Cox committee was not just about the labs; in fact, in my
opinion, that was one small part of what we found in the Cox committee. There
was a gross abuse of technology transfer capabilities be taken away from DTSA
(ph), the DTRA (ph) movement, allowing technology to flow in terms of HPCs,
encryption technology, aerospace technology, across the board.
The administration got our report the first week of January and started looking
for it and knew what was in there. They made Bill Richardson the pit bull, and
do you know when the report was finally released in May, he was the person we
saw all over this
city doing all the press conferences, talking about the Cox committee.
And what did he focus on? He didn't focus on the relaxation of the export
controls. He didn't focus on DTSA (ph) and how it had been watered down. He
didn't focus on the cooperation between space entities and Loral and the Hughes
situation. He focused on one thing: It's all about the labs. Because why?
Because the transfer of the W- 88 warhead occurred in the previous
administration, and Bill Richardson could then say this was all about something
that occurred in a previous administration, and we've corrected that. We've
corrected all these problems.
So, the whole focus in this country came around to a debate on whether our labs
are with it or not, and how could our labs have allowed the theft the W-88
warhead to occur? When I knew full well as someone who sat through seven
months of
testimony that what Bill Richardson was doing was spinning the Cox committee
report; spinning it to try to make it look like it was something that it
wasn't.
Now, I have some concerns at our labs, and I'm also a big supporter of our
labs, and I'll get to that in a moment, but I want to focus on this issue,
because in mind, in my opinion, it was Secretary Richardson who created this
problem, because he thought the spin on the labs and the W-88 warhead theft
could divert attention away from the other problems that we uncovered in the
Cox committee relative to seven years of allowing technology to flow in an
uncontrolled manner from the U.S. to China.
And then we got to ask the questions, and I'm going to ask you, Dr. Robinson,
wasn't it Hazel O'Leary who ended the Laboratory ID Security Program?
ROBINSON: The
biggest change, and I think it has been a major change, came in that period to
omit the requirement of acute clearance for all of our folks and substitute for
a large number of folks, in fact a majority of folks, an L-clearance.
WELDON: Didn't you take away the color-coded classification system?
ROBINSON: Yes.
WELDON: Wasn't it Hazel O'Leary who did that?
ROBINSON: That's my...
WELDON: Didn't we just reinstate that after the Cox committee report came out?
ROBINSON: It's being reinstated now.
WELDON: Isn't that interesting. Bill Richardson never mentioned that to the
American people. Wasn't it Hazel O'Leary who entered the background checks at
the labs, the kind of checks that occurred before she took office?
ROBINSON: That's the Q&L I think.
WELDON: So, is the answer yes?
ROBINSON: If
I understand it's the Q&L, yes.
WELDON: Wasn't it Hazel -- well, you're not from Lawrence Livermore, so I'll
put this on the record, because I know this to be true. When we found out that
one of our retirees from Lawrence Livermore had violated his security clearance
and had given away classified information in a public setting, one of the
offices in California -- I can't think of which one it was -- punished him by
taking away his top secret or security clearance as a retiree. And that went
to Hazel O'Leary desk, and she overturned that denial.
Were you aware of that, Dr. Robinson? And wasn't it Hazel -- well, I know it
was Hazel O'Leary , so I'll put this on record. All this fuss about Bill
Richardson about the labs in the '90s and the '80s allowing the Chinese to
steal the W-88 warhead designs, it's
kind of interesting when in 1995 it was Hazel O'Leary herself who gave the
designs for the W-87 warhead to a
"U.S. News and World" reporter who published that in a special edition in July of 1995, including
the warhead design of the W-87 warhead, which I was told by the lab leadership
at Lawrence Livermore was classified at that time.
Now, Bill Richardson tried to create the impression when the China Cox
committee came out that this all was something labs were doing and that he was
taking control of this and was straightening it out, and that offended me,
because I knew where it occurred, and I knew that much of what had occurred in
the labs was orchestrated by the leadership of DOE.
Much like the dismemberment of the Russian Fishing Program that was formerly
run by Jay Stewart (ph) was totally eliminated even though it had been
recognized by
everybody from (INAUDIBLE) who headed NATO to the former secretary of energy
and Jim Schlessinger to be an outstanding effort. Jay Stewart's (ph) effort
was eliminated, because he was coming to some conclusions that would cause ill
feelings, perhaps, in Russia, because he was telling Hazel O'Leary that Russia
did not have total and adequate stockpile of the Russian (INAUDIBLE) material.
And what offended many of us was when Bill Richardson (INAUDIBLE) the story and
spun the Cox committee at the labs, because he felt that that one issue, the
warhead issue, would be the one that would grab the media and the American
people's attention. That's why I was so offended as Bill Richardson went
around the country talking about what he had done and all of these things that
were being changed from previous administrations. Then result in our seeing
the sale of this computer at Sandia.
Now, Dr. Robinson, as you know, I've been a big support of your lab and all the
labs, but I can
tell you nothing incensed me more than this transfer. I wrote you immediately;
I called on the phone; you wrote me a response back. Now, I'm going to ask
some very specific questions, because I don't think we've been given the very
specific information we need.
My concern with the lab wasn't some political rhetoric against Secretary
Richardson, nor against you personally, because I have the highest regard for
you. It was based on a memo that I got from Mr. Weigand. Have you seen that
memo, Dr. Robinson? The memo that Mr. Weigand wrote to Vic Reese (ph) about
the transfer?
ROBINSON: I don't believe I have.
WELDON: Do you remember this memo, Mr. Weigand?
WEIGAND: Yes, sir; I remember the memo. It's not a memo; it is a -- the
following morning after I got the information, I wanted to write
down what I knew, when I knew it, and inform my line of management. It is an
internal memo that has been never been released, to my knowledge, until I've
seen it in your hand, and it is a -- it was my way of writing down what I knew,
when I knew it, so I documented very carefully something I considered to be a
very significant incident with my boss.
WELDON: Mr. Weigand, I agree with you, and I have the highest respect for you
and the work that you've done. I got this memo handed to me, along with
several other memos, and when I read it, I said,
"What in the heck is going on here?" It wasn't that I had some problem with Livermore, I wanted to chase Bill
Richardson, but Bill Richardson's out telling the world,
"Everything's OK; I've got everything
under control," and I see this memo, which absolutely knocks me off my chair.
And, Dr. Robinson, when I quiz you about the sale, it's like,
"Oh, well. No big deal; it happened." And I want to go through some specifics with you that were in Mr. Weigand's
memo and ask if these two things are in sync.
First of all, Mr. Weigand, were you ever approached and offered the opportunity
to buy the computer in question that was being offered for sale?
WEIGAND: Sir, I owned it.
WELDON: You owned it. So, they were selling your computer.
WEIGAND: Sir, I -- the equipment, yes. That's maybe a term of art,
"I owned it." This is a Department of Energy equipment. It's in my line. It would have
been my responsibility.
WELDON: OK. Then I should ask: Was DOD ever -- have the opportunity to acquire
the equipment?
WEIGAND: The process should have
allowed the federal government, first -- to have first dibs.
WELDON: Was DOD offered that opportunity.
WEIGAND: To my understanding, yes, sir.
WELDON: And they turned it down.
WEIGAND: Yes, sir.
WELDON: So, we've got on the table that the capability of the computer is
between 150,000
MTOPS and 200,000
MTOPS, is that correct?
ROBINSON: That's of the full computer, yes.
WELDON: The way this whole thing came about was we sold the computer for
surplus to an individual, and I would ask my colleagues -- I have classified
information I can't put on the record about who this individual and his
one-person company is. Do you know the -- the company's EHI. He's a
one-person shop who just happens to buy high performance computers.
Dr. Robinson, are you aware of any affiliation between EHI and an Australian
operation, or an Australian company?
ROBINSON: None.
WELDON: Are you
aware of whether or not EHI -- are you aware of that connection? You are aware
of that connection. Thank you.
I would suggest to my colleagues they have to see the analysis that I, as a
member of Congress, got about this individual, EHI, the Australian company and
the ties directly back to the Beijing Research Institute of Telemetry. And I
can't for the life of me understand how we would not check a person trying to
acquire a computer of this size and what his past activities may have been in
terms of technology for the People's Liberation Army and one of its arms.
It didn't take much to ask for this, and, I don't know, myself, if I were going
to be involved in surplusing what is in fact -- and Steven Bryan (ph), I've
just gotten on the record, said he's never known of a sale like this ever
during the time he served as director of DTSA (ph), and I think Mr. Weigand
said he's
never heard of one of this size either. How we could take a supercomputer of
this size and simply decide we're going to surplus it, and, oh, this guy is
just going to use it for some casual case of having the need for this surplus
material?
In fact, you know how we found out about this. He went to the Intel
Corporation to buy the parts to reconfigure the computer. Is that right or
wrong, Dr. Robinson?
ROBINSON: That's how we first learned of it, yes.
WELDON: And Intel, their security -- thank goodness for Intel's security person
-- they called the lab, and DOE -- was it you, Dr. Robinson or was it Mr.
Weigand; who'd they call?
ROBINSON: They called people at the laboratory, and I would point out the parts
they wanted were no longer made.
WELDON: But the request was he had gone to Intel trying to buy the parts to
reconfigure the computer, so it wasn't our
surveillance that found out about this. Intel Corporation tipped us off, and
that happened in July. All of a sudden, the you know what hit the fan, and
everybody started jumping around, and that's when the labs...
HUNTER: If the gentleman will yield.
WELDON: ... tried to buy the computer back.
HUNTER: If the gentleman will yield, then you're saying that he wasn't going to
scrap the computer; he was trying to...
WELDON: Reconfigure.
HUNTER: Reconfigure the computer.
WELDON: Right.
HUNTER: Well, Dr. Robinson, if you knew that, why did you spend so much time
talking to us about this guy being a scrap dealer?
ROBINSON: That is all I knew him to be, sir. I must say if he were going to
reconfigure the computer, it would have been a really stupid act to transport
it on a flatbed truck with no control and store it in a non-temperature
controlled area. And, indeed, when we reacquired the
computer, we found it in very, very bad shape from its journey on such a truck.
WELDON: Well, let me go on -- is the gentleman finished? In fact, I have a
copy of the contract here, and in the contract that we signed between Sandia
and EHI, we gave him the contact at Intel. Now, if he wasn't going to reuse
the computer, Dr. Robinson, if it was going to be scrapped, why would we write
on the contract the name
"Contact Mike Rogers (ph), Intel Corporation, 507-0677-7787? If he wasn't going
to reuse the computer, why would we give him the name of the contact at Intel?
ROBINSON: The system of the computer required Intel's approval to deliver it,
and that was the individual who approved that, and it was provided. The
computer was sold as is, where is, which we reminded him when he later made a
request of Sandia that
"Gee, there's enough here for me to make this operational." We reminded him this was sold as is, where is.
WELDON: But on our contract with him, why would we put the Intel contact
for that computer if he was going to just scrap it? What's the purpose of
that? I don't understand the purpose.
WEIGAND: Sir, could the gentleman who did the investigation for the DOE
comment?
WELDON: Sure.
MICHAELSON: Hello. My name is Steve Michaelson, and I wrote the report that's
been offered into the record with regard to the investigation of the incident.
A couple things have been said maybe I can clarify.
With regard to the representations made by Intel, our investigation indicated
that in fact those calls were made to Sandia National Laboratory in December of
1998, and the issue that was being raised was that there was a Mr. Chang (ph),
the buyer of the Paragon computer, asking about parts, equipment, but not
understanding fully what pieces of equipment he really needed for the computer
and asking for available parts that actually were not accepted in that computer
configuration.
So, it came across as there was an individual who had
a high powered computer that didn't have sufficient information to really
understand not only what he had but what was available to be added to that
computer.
"Just give me parts," and that raised some suspicion...
WELDON: So, that was in December of '98.
MICHAELSON: Yes, sir.
WELDON: Why, then, did we wait six months to try to buy it back?
MICHAELSON: Well, if you read the report, the report...
WELDON: I haven't seen the report yet, so I haven't read it.
MICHAELSON: OK, I'm sorry. The call was made to a senior program person within
the Sandia organization. That individual raised the issue that a respected
individual from Intel, a man who they had contact with over a long period of
time, a man who was not given to glib remarks, had suggested that an individual
was calling about a computer. He didn't seem to understand exactly what he had
or what parts were
available.
There was a suspicion that the computer was on its way to Peking or the
People's Republic of China, and the contact at Sandia respected that
information, raised it with his immediate supervisor and with the reapplication
specialist on-site there at Sandia. Circumstances occurred that that
information really never went any farther within the laboratory organization.
Individuals, acting on their own, made a decision that this information was not
credible.
WELDON: So, what triggered the offer to buy it back? Was it a TV station that
came in and did the story in June or July?
MICHAELSON: I interviewed 20 people at the laboratory after July 23. And what
was said to me was that the secretary stand-down event at Sandia Laboratories
had raised the consciousness of the individuals in the laboratory. Security is
an issue, and if somebody had remembered this incident in December of 1998 and
brought that forward within their organization and elevated it to the
attention of the laboratory and ultimately to the department.
ROBINSON: I think you could credit the Cox commission and the secretary's
response to it with triggering this information to be passed up the management
chain of people that felt,
"Well, now, this is gossip. It doesn't look like it's really something." And when we focused the attention on Chinese espionage and the laboratories,
as a result of our first day's training, a call was made to the management and
came up to me, and we began to investigate, and we notified the Department of
Energy.
WELDON: Was that in July?
ROBINSON: I thought it was June.
WELDON: So, the incident, you were aware of it as alive in December.
ROBINSON: We learned of it during the two-day stand-down.
WELDON: But in July is when it came up.
Let me read you a sentence from Mr. Weigand's memo, which indicates to me why
-- and I didn't get your characterization of your testimony, Dr. Robinson,
all the way, but, Chairman, did you say it was kind of like a trivial incident;
it wasn't a major incident?
HUNTER: I said it was much ado about nothing.
WELDON: Much ado about nothing. Is that what it was, much ado about nothing?
HUNTER: No, less than it appears.
WELDON: Less than it appears.
ROBINSON: There is certainly less there than met the eye in the press.
WELDON: Well, let me read the statement of the gentleman sitting next to you.
Now, you've characterized it your way.
"Until we're certain that there is physical evidence that the machine is still
in the U.S., we should treat this matter as a significant national security
concern."
Now, that grabs my attention. If someone who I have the highest respect for
who's in charge of our computers says that what may have happened here is a
significant national
security concern, and to say this is less than a major issue certainly doesn't
reflect the concern at that time.
WELDON: Maybe it's changed since then, but it certainly doesn't reflect the
tone that Mr. Weigand had about what was happening in this incident when we
were asking the questions. And when I first called Secretary Richard, and he
had no idea what was going on. He wasn't even aware that you had already
started trying to buy it back and in fact had the computer. He wasn't even
aware of that.
ROBINSON: If I could answer for the record, and I need to make this a
classified answer, and you will understand why, you must...
UNKNOWN: No, wait, wait, wait. You're not going to discuss classified here.
ROBINSON: No.
WELDON: No, he's not going to give classified here. He said he would make it
classified.
ROBINSON: The question of what could be assembled from the marketplace if a
country wanted a
supercomputer of this performance formed the basis of our assessment that a
country intent on trying to provide nuclear weapon calculations would not rate
this as an exceptional opportunity versus what the marketplace could provide.
And that's what I'll provide to you, and that's the basis of why I tried to put
it with a little bit of perspective, sir.
WELDON: I would like to see that, because that flies in the face of this
statement that to a country that has little of this computer power capability,
reassembling this system would provide significant capability. That's from the
memo.
Now, we've either got to have it one way or the other. Either it does provide
significant capability to another country or it doesn't, but we can't have it
both ways.
HUNTER: Well, if the gentleman will yield, before you got here, Mr. Weigand,
right here in this hearing said it would provide significant capability.
Didn't you, Mr. Weigand?
WEIGAND: Yes, sir. I
stand by that statement. Normally, I think -- in fact, the good general knows,
don't make a whole lot of decisions on the first bit of data you get from the
battlefield. But those statements that I made I stand by. The explanation of
those statements I am not at liberty to go into with you except in the
classified mode.
WELDON: Understand.
WEIGAND: You need to understand, we're beginning to delve into Intel data.
We're beginning to delve into what could be or couldn't be important to a
nation's program that could or could not develop substantial national
security...
WELDON: Mr. Weigand, I agree with you fully, and that's why I am so outraged
that the whole attempt by this administration is to wipe off this issue off the
table. Publicly, the perception being given by the lab and by Bill Richardson
is nothing happened. It's all much ado about
nothing. If people would look at what you wrote and look at the classified
capability here, they would see that what you're saying is true. And I'm sick
and tired of saying it publicly and having people of the administration say,
"Oh, it's nothing," but we can't talk about it in public. We got to go to a classified session.
WEIGAND: I apologize for you.
WELDON: You don't have to apologize; it's not you.
WEIGAND: I just want to tell you that I intend to guard the information that I
have until an appropriate setting, and I would be glad to discuss it with you
in length...
WELDON: Well, I've asked the FBI for a formal FBI investigation.
WEIGAND: But I also want to be sure that we go in the record. This is not a
problem that is alone with the laboratories. We have some of the most
nationalistic-minded men and women that work at the laboratories. I do not
believe that they intentionally would harm this nation's national security.
This information we're dealing with -- I'm telling you, this is a pure and
simple computer science issue that I am making those statements from. I am not
making those statements necessarily specific to nuclear weapons. I'm making
them...
WELDON: I understand.
WEIGAND: ... about how computer science today, which exists at every major U.S.
university and how we use that computer science information in special ways to
produce what we do for this nation.
WELDON: I understand.
WEIGAND: It's not that it is unique, but I do not want to give anyone any hedge
on us by telling them what we think is important or doesn't think is important.
WELDON: Understand.
WEIGAND: Let them figure it out for themselves.
WELDON: I understand. And that's why my concern, Mr. Weigand, is in
going through the China commission process that we went through, the cavalier
attitude that I think has developed in terms of sale of high performance
computers has caused this country harm, and the Cox committee agreed with that.
Steven Bryan (ph), the first director of DTSA (ph), testified on the record,
both public and in classified session, that up until 1996 China had no
high-performance computers in the 8- to 10,000-MTOP range and above -- zero. We changed -- the U.S. changed its policy on
exporting high performance computers in '96, even though Japan wasn't a part of
that process and every other manufacturer. We changed unilaterally. Within
two years, because of our policy change, China acquired over 400
high-performance computers.
Now, I agree with you. I don't want other people to understand our process as
well,
but I would think that certainly sends a signal that up until 1996 we're not
even going to make these HPCs available, and now all of sudden we're going to
flood China with over 200 or 400, and we're going to be told we're going to be
given a paper that's going to tell us where that HPC computer is being used.
And then we find out from the Chinese they won't give us access to find the
location of those HPCs.
WEIGAND: Congressman, I will go silent on this issue, if you'll just allow me
one other comment. The word HPC, high-performance computer, is used and abused
widely. The computer performance capability of a single microprocessor has, to
my complete thrill, as an opportunity to be in that technology, increased
fantastically because of the U.S. manufacturing capability. So, what was a
very specialized, military capability, specially-built computers.
Today, your kids have them.
And, so the problem we're dealing with here is that it's not the computer
cycles that is the thing we need to understand how to protect, it's people like
me. It's people who understand how to use them and use them in ways that can
advance your national security gains. Because the computing cycles are out
there, sir.
WELDON: Understand.
ROBINSON: If I could respond. I certainly did not testify on behalf of the
administration. As I pointed out to my own peril when I testified on the test
ban two weeks ago, I do not speak for the administration but trying to provide
to you as an arm of the government the best technical judgment I can provide.
Let me give you one number that might put things into perspective, and it
involves Microsoft Corporation and their 20th anniversary. It was pointed out
that over the 20
years of their existence the cost of computing went down by a factor of $1
million; that's bit per second that you could buy when they started versus
their 20th anniversary. It went down by a factor of $1 million over 20 years.
They revealed a study on the occasion of their 20th anniversary that had been
performed by Intel Corporation, Hewlett-Packard, working with Microsoft that
made a projection for the technology for the future that over the next 20 years
there would be at least another million. So, we will go by a trillion decrease
in cost for computing.
WELDON: Understand, OK.
ROBINSON: And that's the bits he's talking about. So, you have to recalibrate
yourself as to what is available, what makes sense to protect, what you can
hope to protect at any give point in time...
WELDON: And we did that. I understand.
ROBINSON: It's that perspective
I'll provide you in a classified memo.
HUNTER: If my friend would yield for just a second. Dr. Robinson, think that's
the whole point here. We were fortunate that this guy who was a scrap dealer
who really wasn't a scrap dealer who showed up at your place in a flatbed truck
and just happened to have a nationality of country that's been trying to get
some of this stuff and probably was trying to get it for the country, didn't
ship it. It was there for 80 days.
Now, you send stuff out through Long Beach Harbor, and we had the Customs
Service before us, and they testified to us that only about two percent of the
ships that move in and out have any search at all. So, probably, physically,
this stuff could have been moved offshore.
The point is...
ROBINSON: Sir, the date it was there was eight and
a half months it sat in his warehouse.
HUNTER: Well, that's my whole point. You've pointed out that it didn't leave,
and therefore we should feel better, but my point is that's not because of any
brilliant action on the part of the labs; that's because it just didn't move.
And if you'll look at the massive traffic going in and out of Long Beach
Harbor, much of it carried out by China's corporatized merchant marine, called
Costco (ph), the guys that shipped the 2,000 machine guns into California, they
only have a small percentage of those ships searched or looked at or
surveilled, or monitored. So, obviously, it could have left.
So -- I mean, we've got a system here that hasn't worked, and it's the same
non-working that was manifested in the 14 months that passed between the head
of the FBI telling the secretary of
energy to get a guy that he thought was a spy away from the nuclear weapons
plans, and 14 months later, the guy's still there, and nobody's sure who was
supposed to have removed him.
Now, that's the system that we've got here. And, so, sure, we all know, we've
all seen the statistics that you can buy -- the same dollar today will buy a
million times as much computing power as there was a few years ago. I wouldn't
use that to hide behind. I mean, as long as we've got -- that's all the more
reason for when we do have
MTOP levels, past which you're not supposed to ship, the idea is to not let that
stuff hemorrhage out any faster than it's going to in the natural course of
business.
And, so -- I mean, this is almost a comedy. Guy drives up in a flatbed truck.
He's a scrap
dealer who's never scrapped anything. He's supposed to get rid of the stuff,
but your guy writes down the name of the company that theoretically can get him
the rest of the parts to rehabilitate it. He probably wasn't very smart. He
probably didn't know what he was getting, but he took a chance on it; it didn't
cost it much. Didn't cost China much, because I'm sure they're the people that
would have ultimately paid for it.
The point is that you've got a system that's broken here.
WELDON: Let me get back to my -- I don't want to get bogged down in a computer
discussion, because I agree with what you're saying about technology changing
so rapidly, but that's not the issue here. It is the issue that internal
concerns were raised by the technical experts, and what I'm seeing is
double-talk, and that's what I want to
get at, the double-talk and the double-speak.
Attached to the memo that Mr. Weigand sent to Mr. Reese (ph), which I will give
the chairman a copy, and it will be kept in a classified form, is a summary
page, along with a copy of the contract. This is called
"Sandia's Summary of the Paragon Computer Sale."
I don't know whether you've seen this or not, Dr. Robinson, but I'm not going
to ask you to respond whether you think it's valid, but this is what it says,
and I'll read from it. Quote,
"Sandia's staff also stated that there are no security concerns since the
computer had never processed classified or sensitive information." That's what it says. Is that right? Well, you can't answer, but that's what
it says.
Now, let me read...
ROBINSON: The computer that was sold, all of the classified parts were
dismantled and were not sold.
WELDON: But here's what you
said in your letter to me on July 26, quote,
"Hard drives with sensitive and classified information were not part of the sale." Well, that doesn't jive with this, because it was used for classified. You're
just saying that those hard drives were not.
ROBINSON: That's correct.
WELDON: But, now, let me read you Bill Richardson's letter to me on August the
11th. Quote,
"Classified date in the computer was erased." So, was the secretary wrong?
ROBINSON: The hard drives -- the way the system was operated, different sets of
drives were connected or disconnected. There was a security procedures. There
was a double-check with a two-person rule to make sure that they could never be
connected at the same time. The parts that were used in any classified
computation, anything that could have a persistent memory, were removed from
the computer; they were degaussed; they were then destroyed. They were not
sold.
WELDON: So, when Bill Richardson says that
classified data in the computer was erased...
ROBINSON: That's correct.
WELDON: ... that's correct.
ROBINSON: That's correct.
WELDON: So, there was classified information, but it wasn't on the computer...
ROBINSON: That was sold.
WELDON: ... that was given to the fellow from EHI.
ROBINSON: That's correct.
WELDON: Next line of questions deals with both Dr. Robinson and Mr. Richardson
insisting that no sensitive information was provided in the sale; both
insisting that classified data was degaussed before the sale.
Dr. Robinson, you stated in your letter to me that the sensitive and classified
portions were degaussed and destroyed. But then you go on to say that
insensitive hard drives were included in the sale but were not degaussed,
because doing so risked deletion of parts of the operating system and added
nothing to security. So, there were hard drives sold.
ROBINSON: Yes.
WELDON: And they weren't degaussed.
ROBINSON: Yes. They were the unclassified hard drives;
yes, sir.
WELDON: So, that's not a problem?
ROBINSON: No.
WELDON: OK. Do you agree with that, Mr. Weigand?
WEIGAND: If I'm not mistaken, the requirements for selling the machine would
have required them to degauss those also to eliminate information. I think we
could get experts to comment. So, those were supposed to be -- that's one of
our findings is that they weren't. But the information, to our knowledge, to
date, is that there was no classified information...
WELDON: On that system.
WEIGAND: ... on that system, but we are continuing to investigate that.
WELDON: Did you want to add something?
MICHAELSON: Our property regulations require that any computer that's sold or
moved out of the complex -- the Department of Energy complex, be degaussed, the
memory erased, and then the operating system reinstalled, for instance, if
we're going to donate them to a school or university. In fact, this machine
did not have the memory erased, the operating system was available, and what
hasn't come up yet is as part of the sale there were disks and manuals and
documents transferred unbeknownst to the laboratory. The Office of Security
Affairs is reviewing those disks, manuals and documents now.
As of this morning, I was advised that the capability of the forensic unit and
the department to look at those disks and discern what was on them, the
capacity of the department was exceeded. The disks have been returned to the
Department of Commerce who's continuing the investigation, and those disks will
be passed on to the FBI. They're all evidence in an action that's being taken
against Mr. Chang (ph).
WELDON: Than you for that explanation. Also in the memo to Vic Reese (ph)
there is mention that all the parts were not included, as you stated, Dr.
Robinson, but it also suggests -- and I won't read the exact quote, but it
suggests that what was provided should only present a challenging but
straightforward task for a talented group of CS computer systems and EE
engineering types to put a substantial computer
in working order again. Do you agree with that, Dr. Robinson?
ROBINSON: I certainly didn't write it.
WELDON: But you agree with that.
ROBINSON: I would have to evaluate someone's skill level.
WELDON: But here we have someone saying that even though parts are removed for
a group of computer systems and engineering types, it wouldn't be that
difficult of a task to put a substantial computer back in working order again.
ROBINSON: I would assume that's the case, yes.
WELDON: Then how in the world could we sell this? I don't understand. I just
don't understand. I mean, for -- and if the system was not necessary and had
been removed of all the -- why would we try to buy it back, or why did we buy
it back for $88,000? Why not just leave it go as surplus parts and let the guy
have it?
ROBINSON: First of all -- and you missed my
earlier testimony -- I asked myself in this process if I had this to do all
over again, would we have sold the computer had I known about it? And I said
the answer is no; we would not have. We abided by the law. We took the steps
that are required...
WELDON: Not all of them.
ROBINSON: Not all of them, I agree. I am told we should have applied for a
waiver, and we would have likely been granted that waiver. But I would not
have followed through even with the steps if there was a chance that national
security would be affected.
WELDON: But you weren't even informed about this.
ROBINSON: And I was not informed, but I believe I speak for the folks in my
organization. They're as patriotic as anyone else you can find. They believe
the value of the system and the part that they were selling, compared to what
the marketplace could provide, that this did not present a major national
security step.
HUNTER: If the
gentleman will yield -- the gentleman will yield on that point. We've
established a 7,000
MTOPS as the level beyond which the Chinese cannot legally buy a computer. This
computer is 150,000 to 200,000
MTOPS. So, how could the come to the conclusion that they can go out and buy a
similar computer?
ROBINSON: I would like to only answer that for you in a classified memo.
HUNTER: What I think what you're going to have to tell in a classified memo is
that they can buy one illegally.
ROBINSON: No, but, trust me, I do not want to point my finger towards what is
the right way for someone interested in getting higher computing capability off
the open market to go. I have no desire to help anyone else do that, but there
are ways with present products to get that.
WELDON: Gentleman finished?
HUNTER:
Yes, just one further one, if my friend would indulge me here. The one thing
that you've had here is that this was -- this guy was a dummy, because this
thing was virtually unusable. But the last statement that Mr. Weldon read
indicates to me he's not a dummy, because he read the statement to the effect
that a smart team of computer guys could find this a challenging prospect but
nonetheless could put this thing together.
Now, if you're the Chinese Nuclear Complex, and you can't legally buy anything
more powerful than 7,000
MTOPS, but by using one of your teams and a discarded computer from an American
nuclear establishment you can get one that's 40 times as powerful as the one
that you can legally buy, doesn't that make it somewhat valuable, Dr. Robinson?
And you haven't used the term
"valuable" throughout this entire hearing.
ROBINSON: No, that's correct.
HUNTER: You sought to kind of...
ROBINSON: You're right. And it's probably a better term. Had it had that
value, I think it would have been a very stupid thing for Mr. Chang (ph) to do
to then transport it in an open flatbed truck without shipping the way other
computer systems are, with very carefully shock-controlled,
temperature-controlled ways.
HUNTER: But I wouldn't use the -- you're using the flatbed truck as the
determinant of whether or not he's very smart or not. My point is that this
memo that Mr. Weldon just read said that a group of smart computer guys
wouldn't have a lot of trouble putting this thing together. Then they'd have a
computer that had 150,000 to 200,000
MTOPS, which is 40 times the power that the Chinese nuclear complex could buy legally
on the market.
Why is he such a dummy? And I wouldn't use the flatbed -- I mean, I think he
did a great
job. He drove up like an old junkman; you found out later he wasn't an old
junkman; he'd never parted out anything, and you felt comfortable, because he
drove up in an old truck.
WEIGAND: Well, he didn't know he was -- excuse me, he didn't know he was going
to be in that.
ROBINSON: He didn't drive up in an old truck. The bid was solicited through
the mail. He came with his brother-in-law to inspect the equipment and then
chartered which was a flatbed truck.
HUNTER: But you didn't know that when you signed the contract with him.
ROBINSON: Of course not.
HUNTER: But, I mean, it's interesting to me that you brought that up about 20
times in this hearing that with a laboratory that's got all these smart guys in
it, the one thing we don't have any systemic capability, apparently, of
stopping this stuff, but we do have is we can reflect
on the fact that the guy drove it away in a flatbed truck, and somehow that is
probative of whether or not this was an espionage operation, whether or not the
guy was very smart, and whether or not the nation lost anything of value.
ROBINSON: Congressman Hunter, let me say, I offer as evidence our expectation
that if someone really intended to use a computer and not just for parts, it
would be not a smart idea to ship it in the flatbed truck. Indeed, when we
repurchased the computer and examined it, there was massive damage done to the
computer, and it had to be as a result of that ride in the flatbed truck.
WELDON: I think that's a little disingenuous to make that the issue here. No
one knew he was going to pick it up in a flatbed truck when he bought it,
obviously. And maybe the guy didn't know what -- he didn't know what he was
doing in transporting it that
way, but you didn't know that at the time.
ROBINSON: I believe that's correct.
WELDON: If the insensitive -- if he was selling it for scrap, why wouldn't we
have removed the insensitive hard drive and not given him that on the computer?
Why wouldn't we have kept that part of the equipment, as well, if he was going
to use it for scrap anyway? Why would you give him any of the hard drive?
ROBINSON: When it was advertised for sale, it was that it could be put back
together and operated, but we were offering no...
WELDON: So, we advertised it.
ROBINSON: ... no guarantees that it could. It was as is.
WELDON: So, we advertised we could put it back together?
UNKNOWN: It was sold as operational.
WELDON: It was sold as operational?
WEIGAND: It sold as operational; yes, sir.
WELDON: Maybe I haven't been hearing in the room. Maybe there's some...
ROBINSON: No, it was sold as is, where is.
WELDON: Operational?
WEIGAND:
Right.
WELDON: Well, as is doesn't imply to me operational.
ROBINSON: That's correct; it doesn't to me either.
WELDON: So, we sold it as operational.
WEIGAND: It sold as is.
MICHAELSON: Let me clarify for the record. In doing the investigation, we
talked to any number of people at the site. We asked about why the hard drives
had not been erased, and one of the explanations was is that it lessened the
value of the unit as an operational entity.
WELDON: Whoa, whoa, whoa. Let's go back to that again. Repeat that sentence
again.
MICHAELSON: To erase the hard drive would lessen the value of the unit as an
operational entity.
WELDON: But it was being sold for scrap.
MICHAELSON: Well, look at the sales document itself. It says, here's a list of
parts sold as is, where is. The sales document really doesn't say that it's
operational. But within the laboratory complex, there were some
people who were thinking of it as a unit that could be put into operation.
I'll clarify that, even by university or by another government agency.
WELDON: I don't see anything in the contract about as is. It lists all the
parts and what it is, and I don't see where it says,
"as is" or...
ROBINSON: I could point that out in the sales documents.
WELDON: Well, the -- what is offending me even as much as the sale itself is
the way that it's been spun different ways by Secretary Richardson, by the lab,
and even here today. If we made a mistake, fine, we made a mistake, we own up
to it, and move on. But to say
"You're overstating this case; it's really not that bad," when we've got internal memoranda stating that it's a very severe issue. It's
like we're trying to spin the things as opposed to dealing with what may have
been an
honest mistake.
And let me say this, Dr. Robinson: You mentioned the term
"questioned patriotism." No one is questioning anyone's patriotism, and don't even mention that,
because I'm offended by that. I don't think anyone did this because they want
to secretly undermine the U.S. What I think may have happened is there may have
been some casual conservation between these -- this individual at EHI and some
of your employees at the lab who got to know him, and he was a good old guy.
And you decided to sell him the system, because he wasn't going to do anything.
There's wasn't any attempt to sell it to the Chinese.
My point is that we shouldn't allow that kind of a transfer to occur under any
circumstance. And without getting into the details of the capability of the
computer, now to go back and try to reinterpret what was said and reconfigure
what kinds of equipment was in it -- which I'm not going to get into, because
I'm not a computer
expert at all; I'm not even computer literate -- just makes me think that we're
now trying to, to some extent, cover our tracks for what had occurred. And I
hope -- and I think you've made the point here very eloquently that it's not
going to happen again -- but I just can't for the life of me understand how it
happened in the first place.
ROBINSON: Well, understand, this was a sale of scrap computer parts to a U.S.
company for which there are no prohibitions.
WELDON: Yes, but EHI is a one-person company.
ROBINSON: That's must be understood. That must be understood.
WELDON: A one-person company owned by a Chinese national that has ties to an
Australian firm that if somebody would have checked would see where the
connections go back to Beijing.
ROBINSON: That is the point, if you'll check into my testimony of the
recommendation I'm putting forward, sir, is that there are no constraints
against that in law nor to seek to know what the ownership of the company is
would have in fact been a breech of the law.
WELDON: Dr. Robinson, I call that common sense. I call that common sense. I
mean, I'm not a Ph.D., but I tell you, I have enough common sense to know that
if I'm going to sell a 150,000
MTOP to a Chinese national, one-person shop, I want to find something out about the
guy.
ROBINSON: I'm telling you that that's what the law should be changed to allow,
and had I known that, I testified that I would have tried to stop the sale
myself.
WELDON: The law doesn't cover...
ROBINSON: But I make no bones about it, we stand in great difference as to the
belief of what you think the national security was of that system, what
I believe, and what Mr. Weigand believes.
WELDON: Oh, no, no, no. Wait a minute. Wait a minute, Dr. Robinson. This
memo wasn't written by me. It was written by Mr. Weigand. Don't you go say
"you and I." Everything I've said is based on what Mr. Weigand wrote. Do you want me read
the entire memo to you publicly?
ROBINSON: No, but I...
WELDON: Well, then don't say it's me and you. I'm reading what he wrote.
ROBINSON: I'm telling you that the risk, if there was a risk, to national
security in this particular case was a very low risk. Mr. Weigand believes
differently; you have accepted to believe his version. I'd be happy...
WELDON: Well, you just said it was me versus you and him.
ROBINSON: I would be happy to have us settle that debate, but that debate
shouldn't be done in public; it should be done in
classified.
WELDON: Well, it shouldn't be done in public, and this sale shouldn't have
occurred in public, and, damn it, you ought to acknowledge it instead of trying
to spin the thing a thousand different ways.
ROBINSON: I can only give you my testimony, sir.
WELDON: Well, you've given me your testimony, and I can tell you it's
unacceptable. I have respect for you, but, like I said, this, in my opinion,
should have caused Secretary Richardson to resign. He's out telling the
American people
"Everything's OK. Don't worry, we're under control," when he created this whole situation by blaming the labs on the W-87 issue.
And he wasn't aware of what you were even doing.
WELDON: He wasn't even aware when I talked to him on the phone that you were
buying the computer back, because the press out in L.A. -- or out
in California was on your tail that they were aware of the story and had access
to the same information that I got. They had these papers, and they were
raising the same concerns I raised.
I'm sorry, Mr. Chairman, for being emotional, but I think this is outrageous.
I think the spin trying to be created here is outrageous, and I'm not going to
accept it.
HUNTER: I thank the gentleman, and I think there have been a number of
different themes that have been offered today, and they're all extremely
interesting.
Dr. Robinson, you mentioned that you didn't have the -- there's no bar to you
selling to a one-man shop as long as it's an American company.
ROBINSON: Right, sir.
HUNTER: There was no mandate to sell this computer, was there?
ROBINSON: Yes, there is.
HUNTER: There is a mandate?
ROBINSON: Yes.
HUNTER: You have to do it?
WELDON: Excuse me, by who was the mandate?
ROBINSON: I could have applied for an exemption
not to sell it, and had I known even possible difficulties or potential for it,
I would have probably exercised it. But there is an order that all equipment
that is used should be sold for salvage.
WELDON: Cite that, cite that for me. Give me the reference of that where it
says you should -- not says should. You said you had to sell it. Give me the
citation.
ROBINSON: It is in my testimony, but it's unless it's on the high-risk list,
and this was not on the high-risk list of equipment.
WELDON: You're saying on the record it had to be sold; you had no choice.
ROBINSON: Unless you seek an exemption, that's correct.
WELDON: And the exemption is, what, for you to keep it?
ROBINSON: Or to do something else with it.
WELDON: So, you were being forced by our regulations to sell this computer?
ROBINSON: Unless you get an exemption, that's correct.
WELDON: Who gives the exemption?
DEDICK (ph): I believe this is a slight misunderstanding, if I may respectfully
disagree with my colleague from Sandia. I believe he's talking about -- he's
not looking at the law that actually should govern this case, and those are the
export laws. And, in fact, part of the Department of Commerce's investigation
now, they are looking into the fact of whether or not this indeed was an
export, because it was sold to a Chinese national. So, it has not been
established that this was not an export and that there was no violation of law.
I do understand that this is Sandia's belief, because they do believe that
there are other pieces of law that would not allow them to check on the
nationality of a potential buyer for this equipment. So, I understand their
part to it, but, on the other hand, I do think that there is an ignoring of the
export laws that were on the books.
And what we found in our investigation was that there was not a thorough enough
review of the export rules.
So, we do disagree with Sandia on that part.
HUNTER: In your estimation, though, is there a mandate to sell this equipment
as surplus equipment?
DEDICK (ph): In my estimation, absolutely not.
HUNTER: OK.
WEIGAND: Congressman, may I put something else on the record, please?
HUNTER: Yes, Mr. Weigand.
WEIGAND: I'd like to put two things on the record. One of them was that as
soon as the department found out about this computer being outside of the
Sandia National Laboratories' control, we immediately informed my management.
It was immediately raised with the undersecretary. The undersecretary nearly
immediately formed a task force to go, and within two days the machine was back
in the possession of Sandia Labs and the federal system.
HUNTER: Well, now, let me ask you, Mr. Weigand. I thought this machine resided
for months
in a warehouse.
WEIGAND: Congressman Hunter, that is absolutely true. What I am putting on the
record is as soon as we knew and understood that this computer was outside of
the control of the Department of Energy...
HUNTER: Why was it July? Why did it take so long?
WEIGAND: Sir, I think that -- I am looking into that. I've asked for
processes. I've attached my letter to the top of the issues, and if you want
to know my professional opinion, the machine should have a more (inaudible)
look before it went out the door with regard to national security.
HUNTER: OK. Could you find out why it was July, and let us know, let the
committee know.
WEIGAND: I will take that and get back to you.
The second item I want to put on the record is that I hope that you could take
some comfort from the fact that the Department of Energy does have in residence
the expertise to determine what
computers may or may not be of risk to national security. I'm one part of
that; Trish is another part of that.
With regard to this computer, I was actually the program manager at the DOE's
Defense Advanced Research Projects Agency -- you're probably familiar with that
agency. It actually did the research and development and build this computer
under contract with the...
HUNTER: So, you recognized the value when you saw it.
WEIGAND: So, let me tell you something: I know that computer inside and out, I
participated in parts of the design, and so I believe that the Department of
Energy has called this just about right; that this computer went on the loose
was a little bit of a -- I'll stand by my statement, it was a national security
concern.
HUNTER: OK. OK, thank you.
Mr. McCallum, let me go back to this one issue that we've talked about
a little bit which was the 14-month lapse between Mr. Lee being -- the
instruction from the FBI being to get Mr. Lee's clearances away from him so he
couldn't steal more nuclear secrets and the 14 months lapsing before somebody
slapped their forehead and said,
"Is he still working there, and does he still have the clearances?" What happened there in your estimation? Are you up to speed on that?
MCCALLUM: Congressman, much of that I don't have the detail on much more than
you've already talked about. My office supported it, the Office of
Counterintelligence in some of those investigations, and I know that at one
point the department was a little slow to take action, because they were
waiting to see whether the Federal Bureau of Investigation and didn't want to
blow their case. I guess it was not until we became aware that Director Freeh
supposedly said,
"Get him out of there."
HUNTER: Yes, he
said, and I'll quote,
"There's no investigative reason to keep him there. Get him out of there."
MCCALLUM: Once the bureau says there's no investigative reason, to get him out
of there, we should have taken immediate action.
HUNTER: OK. Put the -- if your staff could put up that matrix, and we're going
to get everybody out of here very shortly. Put that matrix up that we had
that's the present system before the reform.
This, General, is one thing I wanted to bring to your attention. You had the
head of the FBI tell the assistant secretary of energy and then about a week
later the secretary of energy to remove the person he'd identified as a spy
from our nuclear secrets. Now, if you want to analogize that to the military
operation, that's the division commander being told by the CINC to get that guy
in third platoon out of there, OK? That's -- somewhere in that maze, that
message was lost. That's what we're trying -- so, no matter how many
good feeling, patriotic, hard-charging energetic people you put into that
system and no matter how much you change the culture, I think you've got a
system there that was begging for this to happen.
I mean, if you look at that, you've got so many different chains of command and
channels of communication, nobody will stand up and say,
"This shouldn't have been done." When we tried to figured out what happened, nobody's sure. It was mass
confusion, and the interesting thing is the confusion happened not once but
twice. And maybe we can talk to the -- I think it was Secretary Pena who
received the direction the second time, the second direction to do this, and
apparently didn't act on it. But that's what we're trying to change with a
shortened, direct, accountable chain of command, if you will, between the
secretary and the head of the Security Administration.
I mean, I
hope you can appreciate that, and I would hope that you'd work with the
secretary and help him to understand that's not going to hurt him. I think
that's going to help him. I think that's going to help any secretary, and I
think that will keep, as Mr. Podonsky mentioned, this thing from being a
cyclical thing where you concentrate on environment one era to the detriment of
security and the next era you concentrate on something else to the detriment of
security. Finally, something blows up, and you concentrate on security.
But I think you'll need to look at what we've done in terms of making this
thing more like a military operation with respect to accountability for
security. And I would think that that's something the secretary should
appreciate.
Do you have any comments on that, Mr. McCallum, Mr. Podonsky, and then,
General? What do you think about the system we put in? Do you think it's
going to
help any? And that ain't it, incidentally; that's beforehand.
MCCALLUM: I think that the new system could have several major benefits, and
one of them is to raise the level and attention of the Defense Program element
of the department. There have been a number of proposed reorganizations over
the years that have looked at essentially creating another undersecretary, and
there's some serious benefits to that.
I have one major concern, and I'll address it in security, but I believe it
will also hold true in safety. And that is if you move the security element
into the Defense Programs or nuclear weapons piece of this, you've got major
quantities of special nuclear materials that reside outside of those programs,
under the assistant secretary for environmental management at places like the
Savannah River Plant, the Idaho National Engineering Laboratory, Richland
Operations Office and the Rocky Flats site in Colorado. That material would
then lie outside of the
direct command and control of this new organization.
When I first came to the headquarters in Mr. Podonsky's role as the inspector,
that's in fact the organization that were in. And, frequently, those
organizations, with tens of tons of weapons usable material, did not pay any
attention to us, because we were Defense Programs. There is material that lies
outside of that direct umbrella that you've drawn. It would not necessarily be
covered adequately, and it's a good a material as the nuclear weapons people
have.
HUNTER: How would you recommend adapting this system to handle that stuff, to
control that? What you're saying is under the environmental umbrella, the old
sites being cleaned up, et cetera...
MCCALLUM: Yes, sir.
HUNTER: ... there's a lot of stuff.
MCCALLUM: And there's still very good material at those sites, at some of them.
In the area of security, I think that the person who's the security director
for the Department of Energy has to oversee
all of those elements. Fragmentation has been part of the problem with
different calls, as you done the line and block chart here. There needs to be
one man in control or one person in control, one budget, and one program. And
that way we'll get all of the material properly protected.
HUNTER: OK, thank you.
Mr. Podonsky.
PODONSKY: Well, the devil and salvation are in the details, and the details for
the proposed agency have not obviously been totally worked out. I would just
like to offer up an observation. In 1984, when I first joined the department,
at a time that both Mr. McCallum and I were in the same business, Defense
Programs had counterintelligence; it has intelligence; it had oversight; it has
policy. The lines of communications were very clear, and it was very difficult
for both Mr. McCallum and/or myself to get the attention of the assistant
secretary for Defense Programs, because there was
more focus at that time on production of nuclear weapons and maintaining the
stockpile.
So, while I fully agree that the streamlining of the chain of command is
necessary in the department for it to work, I still go back to an earlier
statement I made about accountability, about an independent capability to
oversee what that group is doing, both from environment, safety, and health as
well as a security perspective. So, again, I conclude with the opening piece
that the details are going to be very important to work out, and we need to
look at history so that we don't make the same mistakes that we made 15 years
ago.
HABIGER: Mr. Chairman, I agree wholeheartedly with what Mr. McCallum just said
in terms of about 50 percent of the things that we're worried about are outside
of the new structure, and that's one of the reasons why I took this
job was that the secretary was going to make me the director of Security for
the Department of Energy, not for a semi-autonomous agency or for Defense
Programs.
And I'm not trying to pick an argument with you, sir -- I know better than that
-- but the chart that you showed with your military organization, the reason
why I waffled on you, I didn't see a director of Security for the Department of
Energy. And when you have the sites that Ed just pointed out still not under
the firm control of a security czar, I have concerns.
HUNTER: Well, how about if you've got weapons material, basically, much of it
in these closed and bases that are in the process of cleaning up? I presume
that's a lot of the stuff that we're talking about here.
HABIGER: In one site, yes; three sites, no.
HUNTER: OK. How about
bringing that material under the direction of the administrator? He answers
directly to the secretary. In other words, you're saying he doesn't have the
jurisdiction for it right now, and therefore it's got to be overseen by
somebody else, if you bring it under his jurisdiction, stuff that's in the
environmental sites as well as the weapons sites.
HABIGER: As my colleague, Glenn Podonsky, just pointed out, the devil's in the
details to try to make that work.
HUNTER: OK.
HABIGER: And also, sir, your very clean lines of military organization, which I
can appreciate, become convoluted when you start doing things like that.
HUNTER: Well, but if you're talking about real stuff and real material, you may
have to just move that under their jurisdiction, and let them handle it. I
mean, we do that in the military all the time -- We change jurisdictions, we
change commands.
Anyway, give us your --
I might -- we'll be interested in any additional thoughts you have for the
record in taking a look as this thing; I'm sure you already have. But if you
come back to the committee with an articulation of this problem Mr. McCallum
mentioned and a way that you would solve it, we'd be happy to take a very close
look at that.
HABIGER: All right, sir.
HUNTER: OK, appreciate it. OK.
I've got it -- staff just gave me a memo to the effect, Mr. Podonsky, that your
organization is not barred from monitoring from the nuclear material within the
-- in NSA, but you still don't control it.
PODONSKY: Yes, that...
HUNTER: You're not barred from monitoring.
PODONSKY: Right.
HUNTER: OK. Well, gentlemen, It's been a long and lively hearing, I think kind
of an important one to have. Thank you for
being with us, and we'll do this again shortly.
So, the devil's in the details. There are a lot of details, and we're going to
be spending some time working with you. Thank you for being with us today.
Thanks for your endurance.
HUNTER: Oh, General Habiger, and, Dr. Podonsky, Mr. Thompson reminds me that at
the director level or at the secretary level there is a director of Security in
title 31. Take a look at that.
UNKNOWN: All right, sir.
HUNTER: OK, thank you.
END
NOTES:
Unknown - Indicates speaker unknown.
Inaudible - Could not make out what was being said.
off mike - Indicates could not make out what was being said.
PERSON:
DUNCAN L HUNTER (94%); JAMES V HANSEN (57%); BOB STUMP (57%); FLOYD SPENCE (57%); LEE TERRY (55%); MARY BONO (53%); ROBERT (ROBIN) HAYES (52%); IKE SKELTON (52%); NORMAN SISISKY (52%); CHRIS JOHN (51%); LANE EVANS (51%); JIM TURNER (50%); WILLIAM M THOMAS (50%);
LOAD-DATE: October 26, 1999