Skip to comments.
Nuke-Lock Breach Could Be 'Devastating' ( Los Alamos )
CBS News ^
| Nov. 3, 2006
| (CBS)
Posted on 11/03/2006 3:48:38 PM PST by george76
Data Found In Drug Raid Contains Weapons-Design Secrets.
The recent security breach at Los Alamos National Laboratory was very serious, with sensitive materials being taken out of the facility possibly including information on how to deactivate locks on nuclear weapons, officials tell CBS News.
Officials say there is no evidence the information taken from Los Alamos was sold or transferred to anybody else, but there is no way to be sure right now.
As CBS News correspondent Sharyl Attkisson was the first to report, secret documents apparently taken from the lab were found during a drug raid at a Los Alamos-area home last month. The FBI was called in to investigate.
Multiple sources now tell CBS News that the material includes sensitive weapons-design data.
A federal official who has been briefed on the issue said at least three USB thumb-drives were involved. Those small storage drives contained 408 separate classified documents ranging in importance from Secret National Security Information (pertaining to intelligence) to Secret Restricted Data (pertaining to nuclear weapons).
The woman believed to have taken the information Jessica Quintana, 22, who owned the trailer worked in three classified vault rooms across Los Alamos:
Safeguards and Security (relating to strategic nuclear material control and accountability)
X-Division (top secret)
Physics P-Division.
The woman had top secret "Q-clearance" with access to all the U.S. underground nuclear test data. Additionally, she had "Sigma 15" clearance, which allows her access to info on how to deactivate locks on nuclear weapons. Quintana has not been arrested or charged.
For example, if a terrorist steals an American nuclear weapon, he could not detonate it due to the special access controls. This woman is authorized to read the reports that tell how to get around those safety controls.
(Excerpt) Read more at cbsnews.com ...
TOPICS: Crime/Corruption; Government; War on Terror
KEYWORDS: action; affirmative; affirmativeaction; akal; akalsecurity; alamos; chillmanchill; computers; corruption; doe; energy; fbi; gao; hippiesrunlosalamos; jessicaquintana; livermore; losalamos; lucyramirez; qclearance; quintana; securecomputers; security; thisbeggarsbelief; usb; usbports
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-80, 81-85 next last
To: george76
Everyone who works at Livermore and Los Alamos gets one if they pass the FBI background check. It's the history of your life starting with your first job and living with Mom and Dad. It's come to Jesus time with the FBI. Usually, getting a "Q-Clearance" is no problem, unless you try to hide something and the FBI finds out a few weeks after the interview.
The "Q" is the basic Top-Secret clearance for Dept of Energy facilities. IIR, it's not anywhere near the highest clearance levels. With those, you're allowed into the Area 51 storage buildings..........:)
To: george76
I could guard the nation's secrets better by putting them in an empty fruit canning jar and burying them in the backyard. Those responsible for this crap (starting with X42) ought to tried and shot.
To: darkwing104
Before I retired I made a big push to disable USB ports on secure computers. I would think that a big purchaser like the feds could get a batch of PCs minus USB ports, floppy drives, etc, plus special ethernet ports that would not accept standard cables
Hell, 5 minutes with some epoxy glue would ensure that USB ports became secure
23
posted on
11/03/2006 4:16:38 PM PST
by
SauronOfMordor
(A planned society is most appealing to those with the arrogance to think they will be the planners)
To: USNBandit
When I go into secure spaces, I have to leave cell phones, USB drives, PDA and anything else that could be use to collect or transmit data outside the space. CDROMs that come in the door go straight to the security officer for a virus scan and get labeled as classified. It's always a one way trip. Paper leaves via the shredder and burn bag. Disk drives get disassembled and the platters dissolved in acid.
24
posted on
11/03/2006 4:16:41 PM PST
by
Myrddin
To: muleskinner
"The problem is when you actually have those materials that are supposed to be protected inside the lab and you find them outside the lab in the hands of criminals that should worry everybody."
Danielle Brian, executive director,
Project on Government Oversight
25
posted on
11/03/2006 4:17:18 PM PST
by
george76
(Ward Churchill : Fake Indian, Fake Scholarship, and Fake Art)
To: SauronOfMordor
Hell, 5 minutes with some epoxy glue would ensure that USB ports became secureNot if they were removed.
26
posted on
11/03/2006 4:18:16 PM PST
by
darkwing104
(Let's get dangerous)
To: darkwing104
Behind the secure doors we use USB hard disks on the computers. When finished, they are unplugged, put back into the secure bag, locked and returned to the safe. Easier than having a PC with an internal IDE disk kept at system high.
27
posted on
11/03/2006 4:19:56 PM PST
by
Myrddin
To: kinoxi
I wanna know why a 22 yr old has that much clearance?
28
posted on
11/03/2006 4:20:01 PM PST
by
tiki
To: george76
I'm sorry, but a 22 year old woman who lives in a trailer had a top secret security clearance? Huh?
29
posted on
11/03/2006 4:20:35 PM PST
by
Argus
(John French Kerry is Lt. Keefer (Fred McMurray) in THE CAINE MUTINY - somebody get Jose Ferrer.)
To: george76
Stand down from the drill: The report is pure BS.
30
posted on
11/03/2006 4:20:38 PM PST
by
patton
(Sanctimony frequently reaps its own reward.)
To: patton
Is this CBS helping the DUmmies for next Tuesday ?
31
posted on
11/03/2006 4:21:38 PM PST
by
george76
(Ward Churchill : Fake Indian, Fake Scholarship, and Fake Art)
To: kinoxi
Not charged? What is she a dem?
###
More likely an illegal alien.
32
posted on
11/03/2006 4:21:52 PM PST
by
SUSSA
To: martin_fierro
This came from cBS.... and just a few days from an extremely important election.
Nope, I am not buying it as accurate.
33
posted on
11/03/2006 4:23:23 PM PST
by
Gator113
To: tiki
According to wikipedia the Q clearance requires a background check for the previous ten years. I guess they had to go interview her middle and high school teachers.
?
link
34
posted on
11/03/2006 4:24:14 PM PST
by
kinoxi
To: Myrddin
Too bad the folks at the DOE don't use this practice.
35
posted on
11/03/2006 4:24:29 PM PST
by
darkwing104
(Let's get dangerous)
To: george76
Jessica Quintana, 22, AKA LUCY RAMIREZ?
;oD
36
posted on
11/03/2006 4:25:06 PM PST
by
maggief
To: george76
>>I never even heard of top secret "Q-clearance"
Tht's because it's top secret, cut it out or you could winf up in Irak /Humor
37
posted on
11/03/2006 4:26:26 PM PST
by
DelphiUser
("You can lead a man to knowledge, but you can't make him think")
To: darkwing104
What I meant was that it seems it would contribute more to security to disable/eliminate the USB ports, than to try to stop people from trying to bring in USB drives
38
posted on
11/03/2006 4:26:48 PM PST
by
SauronOfMordor
(A planned society is most appealing to those with the arrogance to think they will be the planners)
To: george76
Must be - the twenty-something cleaning lady has launch codes for the nukes?
AYFKM?
This article is incredible (as in the old sense of the word: not credible, only a drooling idiot would give it credence.)
(apologies to the freeper I stole that last bit from.)
39
posted on
11/03/2006 4:26:53 PM PST
by
patton
(Sanctimony frequently reaps its own reward.)
To: tiki
In the military you can get a Top Secret cleance at 18...
40
posted on
11/03/2006 4:27:05 PM PST
by
darkwing104
(Let's get dangerous)
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-80, 81-85 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson