Energy secretary is surprised by nuclear disclosure

Energy Secretary Steven Chu conceded on Wednesday he was caught off guard by the unauthorized dissemination of "highly confidential" documents showing the whereabouts of stockpiles of nuclear weapons and fuel.

At a House Energy and Water Appropriations Subcommittee hearing, Chu acknowledged that he learned about Monday's release of "highly confidential material" on a Web site devoted to federal secrecy issues from media reports.

Chu said the online publication of 266 pages of information was "of great concern," and he planned to step up security measures to prevent terrorists from gaining access to nuclear materials. Chu said that "someone made a mistake, probably at the Government Printing Office." The material has since been withdrawn from a GPO Web site. House Speaker Nancy Pelosi, D-Calif., Wednesday asked GAO to investigate the release.

During the hearing Chu tried to put to rest any idea that Yucca Mountain might still become a storage facility for nuclear waste. "Yucca Mountain as a long-term repository is off the table," Chu said, despite the lack of alternative sites and the billions spent in studies. But Energy and Water Appropriations subcommittee ranking member Rep. Rodney Frelinghuysen, R-N.J., criticized shuttering Yucca "irresponsibly" without alternatives. Chu said he plans to appoint a blue-ribbon panel to find alternatives.

The department budget includes $197 million to implement President Obama's termination of Yucca Mountain as a waste site and find other geological repositories. Chu also told the panel he expects to have 50 percent of the department's $38.7 billion economic stimulus allotment dispensed by Labor Day. Frelinghuysen also questioned how the United States could continue nuclear nonproliferation efforts without additional funding for the Energy Department.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.