Nuclear Weapons

DoD Fails to Control “Controlled Unclassified Info”

10.23.08 | 2 min read | Text by Steven Aftergood

Pentagon officials say that the Department of Defense and its contractors are failing to adequately protect “controlled unclassified information” (CUI) that may have significant military or technological value to adversaries or competitors.

“Simply stated, hostile actors can exfiltrate large volumes of unclassified program information in a single attack that can potentially net enough information to enable adversaries to narrow a capability gap,” according to a recent Army information paper (marked “for official use only”).

Digitized information in the hands of Defense Industrial Base (DIB) contractors is said to be particularly vulnerable.

“Exfiltrations of unclassified data from DIB unclassified systems have occurred and continue to occur, potentially undermining and even neutralizing the technological advantage and combat effectiveness of the future force,” the paper stated.

See “U.S. Army’s Concerns with Protection of Controlled Unclassified Information,” (pdf) August 15, 2008.

The paper was obtained by Inside the Army and first reported in “Army Cyber Task Force To Manage Growing Industrial Espionage Risk” by Daniel Wasserbly, Inside the Army, October 20, 2008.

A similar concern about protection of controlled unclassified information was expressed last month by DoD Chief Information Officer John G. Grimes.

He reiterated “the importance of properly protecting controlled unclassified information placed on information systems connected to the Internet, especially those that use file transfer protocol (FTP), peer-to-peer (P2P), and other protocols that are inherently insecure and pose significant security risks.”

“DoD is currently hosting thousands of such sites and, in spite of previous direction, far too much CUI data is still publicly available from these DoD sites,” he wrote.

See “Protection of Controlled Unclassified Information on DoD Information Systems Connected to the Internet” (pdf), September 22, 2008. The Grimes memo was first reported by Sebastian Sprenger in Inside Defense on October 22.

The Department of Defense Inspector General recently reported that defense contractors had failed to properly manage, recover or revoke thousands of Common Access Cards that permit the holder to access controlled defense information on DoD information systems.

This presents “a potential national security risk that may result in unauthorized access to DoD resources, installations, and sensitive information worldwide,” the DoD IG said.

See “Controls Over the Contractor Common Access Card Life Cycle” (large pdf), DoD Inspector General, October 10, 2008.

Among other things, a failure to reliably protect restricted information that is unclassified may produce an undesirable incentive to classify such information.

publications
See all publications
Nuclear Weapons
Report
Nuclear Notebook: Russian Nuclear Weapons, 2023

The FAS Nuclear Notebook is one of the most widely sourced reference materials worldwide for reliable information about the status of nuclear weapons, and has been published in the Bulletin of the Atomic Scientists since 1987.. The Nuclear Notebook is researched and written by the staff of the Federation of American Scientists’ Nuclear Information Project: Director Hans […]

05.08.23 | 1 min read
read more
Nuclear Weapons
Blog
Video Indicates that Lida Air Base Might Get Russian “Nuclear Sharing” Mission in Belarus

On 14 April 2023, the Belarusian Ministry of Defence released a short video of a Su-25 pilot explaining his new role in delivering “special [nuclear] munitions” following his training in Russia. The features seen in the video, as well as several other open-source clues, suggest that Lida Air Base––located only 40 kilometers from the Lithuanian border and the […]

04.19.23 | 7 min read
read more
Nuclear Weapons
Blog
Was There a U.S. Nuclear Weapons Accident At a Dutch Air Base? [no, it was training, see update below]

A photo in a Los Alamos National Laboratory (LANL) student briefing from 2022 shows four people inspecting what appears to be a damaged B61 nuclear bomb.

04.03.23 | 7 min read
read more
Nuclear Weapons
Blog
STRATCOM Says China Has More ICBM Launchers Than The United States – We Have Questions

In early-February 2023, the Wall Street Journal reported that U.S. Strategic Command (STRATCOM) had informed Congress that China now has more launchers for Intercontinental Ballistic Missiles (ICBMs) than the United States. The report is the latest in a serious of revelations over the past four years about China’s growing nuclear weapons arsenal and the deepening […]

02.10.23 | 6 min read
read more