Fact-checked by Grok 2 weeks ago

Office of Intelligence and Counterintelligence

The Office of Intelligence and Counterintelligence (IN) is a component of the () responsible for all and counterintelligence activities within the DOE complex, focusing on threats to from foreign services, , and insider risks targeting DOE's nuclear weapons programs, technologies, and facilities. Established as part of DOE's apparatus, IN serves as the Intelligence Community's primary source for on nuclear deterrence, nonproliferation, , and emerging science and technology, informing U.S. policymakers through of foreign capabilities and intentions. Its efforts include investigations, threat assessments, and protective measures across DOE's 17 national laboratories and facilities, safeguarding and essential to U.S. strategic advantages. IN's operations have been scrutinized in reports, including examinations of security incident handling and recent allegations of management deficiencies, underscoring ongoing challenges in balancing operational effectiveness with oversight in a high-stakes prone to foreign adversarial targeting. Despite such reviews, IN continues to mitigate risks, as evidenced by its role in countering persistent threats from state actors seeking DOE technologies, contributing uniquely to the broader U.S. Community's mission.

History

Origins and Establishment

The origins of intelligence and counterintelligence functions within what became the Department of Energy trace to efforts, including the Project's operations to gather on German nuclear programs and safeguard atomic research against . These activities laid the groundwork for organized security measures in and weapons development. In the postwar period, the (P.L. 79-585), signed into law on August 1, 1946, established the Atomic Energy Commission () and created its Office of Security and Intelligence to oversee classification, personnel security, and related to atomic energy. This office managed threats to sensitive technologies amid emerging tensions. The Energy Reorganization Act of 1974 (P.L. 93-438), effective January 19, 1975, dissolved the and transferred its functions, including intelligence responsibilities, to the newly formed (). Three years later, the Department of Energy Organization Act of 1977 (P.L. 95-91), enacted on August 4, 1977, consolidated ERDA with other federal energy entities to form the Department of Energy (DOE), explicitly authorizing under Section 215 the development of intelligence and programs to protect interests in energy technologies. This legislation formalized DOE's role in these domains, integrating them into the broader U.S. framework.

Evolution During the Cold War

The Atomic Energy Commission (AEC), established by the (P.L. 79-585), inherited intelligence functions from the and promptly created the Office of Security and Intelligence to oversee , physical security, and personnel vetting for nuclear programs. This office focused on preventing foreign espionage targeting classified atomic research and production, liaising with the CIA, FBI, and congressional Joint Committee on Atomic Energy to enforce security standards amid emerging rivalries. Its early priorities included safeguarding facilities like Oak Ridge and Hanford, where lapses in vetting had enabled pre-1946 leaks, such as those by Soviet agents during . The onset of confirmed Soviet nuclear espionage in the late 1940s drove significant operational evolution, with Klaus Fuchs's January 1950 confession revealing the transfer of plutonium bomb designs that hastened the Soviet Union's 1949 test, prompting the office to expand investigative capabilities and clearance revocations. High-profile cases followed, including the 1951 convictions of for relaying secrets via courier , leading to their 1953 executions and highlighting insider vulnerabilities at ; these incidents spurred formalized counterintelligence protocols, such as routine testing for sensitive personnel and enhanced collaboration with the FBI's counterespionage efforts. By the 1950s, the office had shifted from wartime ad hoc measures to systematic threat assessments, monitoring communist sympathies among scientists and contractors while collecting foreign intelligence on adversaries' atomic advancements to inform U.S. policy. Through the 1960s and 1970s, as nuclear arsenals expanded under mutual assured destruction doctrines, the office adapted to proliferating threats by integrating technical surveillance and lab-specific security divisions, responding to over 100 suspected espionage incidents annually at key sites. The 1974 Energy Reorganization Act (P.L. 93-438) transferred functions to the Energy Research and Development Administration (ERDA), preserving the office's structure amid oil crises and energy diversification, though nuclear counterintelligence remained paramount against persistent Soviet targeting of designs like thermonuclear weapons. The 1977 Department of Energy Organization Act (P.L. 95-91) consolidated ERDA into DOE, broadening the mandate to include non-nuclear energy intelligence but retaining core focus on classified R&D protection, with staff growth to handle escalating computational and materials science secrets during détente and renewed arms race tensions in the 1980s. Despite these adaptations, systemic gaps in foreign visitor controls and lab access persisted, as later reviews documented, reflecting the challenges of balancing open scientific collaboration with rigorous counterintelligence in a bipolar conflict.

Post-Cold War Reorganization and Expansion

Following the in 1991, the Department of Energy (DOE) experienced a diminished emphasis on traditional threats posed by state actors seeking nuclear weapons technology, leading to expanded international collaborations at national laboratories and reduced internal security measures. This shift exposed vulnerabilities, as evidenced by multiple espionage incidents, including the 1999 arrest of scientist on suspicion of transferring classified data to , which highlighted systemic lapses in oversight and foreign visitor protocols. The Cox Committee Report, released in May 1999, further documented Chinese efforts to acquire U.S. nuclear secrets through DOE facilities since the mid-1990s, prompting congressional demands for structural changes to address what critics described as a culture of lax security prioritizing scientific openness over protection of sensitive information. In response, President Clinton issued Presidential Decision Directive 61 (PDD-61) on February 11, 1998, mandating comprehensive reforms, including the subordination of DOE's functions to enhanced oversight and the appointment of a senior (FBI) executive to lead a newly empowered program. Implementation accelerated in 1999, reorganizing DOE's intelligence apparatus by separating foreign intelligence collection and analysis into the Office of Intelligence while establishing a distinct Office of with authority over all related programming, budgeting, personnel, and field operations. This bifurcation aimed to insulate from perceived conflicts with intelligence-gathering activities, incorporating mandatory testing for high-risk personnel—expanded to cover over 12,000 DOE employees and contractors by 2000—and increasing the budget from approximately $10 million in 1997 to over $50 million by 2000. The President's Foreign Intelligence Advisory Board (PFIAB), in its June 1999 report "Science at Its Best, Security at Its Worst," endorsed these measures but criticized persistent cultural resistance within DOE, attributing it to post-Cold War complacency that had eroded risk awareness. The creation of the National Nuclear Security Administration (NNSA) under Public Law 106-65 in November 1999 further restructured DOE's nuclear security portfolio, initially authorizing a semi-autonomous counterintelligence office within NNSA to manage weapons-related threats independently, reflecting congressional skepticism of DOE's centralized control. However, operational inefficiencies from this fragmentation—such as duplicated efforts and resource strains—led to consolidations; by 2006, Congress authorized DOE to merge NNSA's counterintelligence functions back into a unified structure, culminating in the modern Office of Intelligence and Counterintelligence (OICI) that integrated both domains under a single directorate by 2007. This evolution expanded OICI's mandate beyond nuclear espionage to encompass emerging post-Cold War threats, including weapons of mass destruction proliferation, terrorist targeting of energy infrastructure, and cyber vulnerabilities, with the establishment of specialized analysis units like the Energy Infrastructure Security Center in response to legislative directives such as the 2019 Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act. These reforms marked a significant expansion in scope and resources, with OICI's personnel growing from fewer than 100 in the late to over 300 by the mid-2000s, alongside enhanced integration with the broader Intelligence Community for joint operations against transnational risks. Despite improvements, independent assessments, including those from the PFIAB, noted ongoing challenges in execution, such as inconsistent compliance rates below 80% in early implementations and resistance to FBI-led protocols, underscoring that organizational changes alone did not fully mitigate entrenched institutional priorities favoring research access over stringent security.

Mission and Responsibilities

Intelligence Collection and Analysis

The Office of Intelligence and Counterintelligence (OICI) collects intelligence primarily on foreign threats to U.S. , capabilities, and scientific-technological advancements, drawing from specialized sources tailored to Department of (DOE) equities. Collection occurs through 14 Field Intelligence Elements (FIEs) embedded at DOE national laboratories, production facilities, and sites, which harness technical expertise to acquire data on topics including foreign weapons programs, fuel cycle activities, security, risks, and strategic scientific and technological trends. OICI also sets collection requirements for the broader Intelligence Community (IC) and acquires processed intelligence from other agencies, such as products, without conducting its own collection. These efforts emphasize liaison with the 17 other IC elements and the Office of the (ODNI) to access all-source data relevant to DOE missions. Analysis within OICI integrates raw and processed into DOE-specific assessments, focusing on , energy infrastructure vulnerabilities, protection, and foreign cyber threats to U.S. energy systems. Analysts produce finished intelligence products that inform DOE leadership, including the Secretary and Deputy Secretary, as well as national security policymakers on risks to nuclear nonproliferation and energy supply chains. This process leverages DOE's unique scientific and technical capabilities, such as those from national laboratories, to evaluate foreign scientific advancements and potential targets within the DOE complex. OICI maintains the DOE Intelligence Operations Center, a 24/7 facility for secure /sensitive compartmented information (TS/SCI) communications, enabling rapid dissemination of time-sensitive analysis to support crisis response and policy formulation. products also contribute to interagency processes, such as reviews by the Committee on Foreign Investment in the United States (CFIUS), where OICI provides assessments of foreign investments posing risks to DOE-controlled technologies. Through these activities, OICI ensures that intelligence unique to —such as threats to nuclear stockpile stewardship or emerging technologies—is both generated and shared across the IC to mitigate vulnerabilities.

Counterintelligence Operations

The counterintelligence operations of the (OICI) within the U.S. of Energy focus on detecting, disrupting, and defeating foreign activities targeting facilities, personnel, and technologies, particularly in nuclear weapons design, energy research, and national laboratories such as , Livermore, and Sandia. These operations encompass threat assessments, investigations into suspicious foreign contacts, and coordination with the FBI and other Community elements to neutralize risks, including economic and technology theft by state actors like and . Operating from 15 field offices nationwide, OICI professionals conduct proactive measures such as debriefings of DOE employees with foreign ties, analysis of travel patterns, and monitoring to safeguard and dual-use technologies. A core component involves countering foreign services' (FIS) approaches to scientists and contractors, often through subtle via conferences, exchanges, or vectors. For instance, following 1990s revelations of efforts to acquire U.S. nuclear warhead designs—detailed in the 1999 Cox Committee Report—OICI intensified operations including mandatory examinations for personnel with access to and enhanced vetting of foreign visitors to labs, which identified unauthorized data transfers and prompted referrals for federal prosecution. These efforts addressed systemic vulnerabilities exposed in earlier lapses, such as inadequate tracking of classified downloads at , where OICI Director Notra Trulock's 1996-1999 investigations flagged potential leaks of W-88 warhead simulations to , leading to the high-profile case, though Lee was ultimately charged only with mishandling classified material rather than espionage. OICI also maintains a 24/7 Operations to monitor real-time threats, integrating with cybersecurity to counter FIS-sponsored campaigns against networks, as seen in persistent attempts by actors linked to the to exfiltrate research on and fusion energy. Recent operations emphasize programs, with audits noting DOE's implementation of behavioral analytics and access controls across its nuclear security enterprise, though gaps in full deployment persist as of 2023. Through these activities, OICI has contributed to threat mitigations, including the disruption of unauthorized technology transfers, but historical critiques from bodies like the President's Foreign highlight ongoing challenges in and cultural resistance to rigorous CI protocols within the scientific community.

Support to National Security Policy

The Office of Intelligence and Counterintelligence (OICI) supports policy by delivering specialized scientific and technical intelligence assessments that inform U.S. government decision-making on , threats, and protection. These assessments focus on foreign weapons programs, material , and cyber vulnerabilities, enabling policymakers to address risks to DOE assets and broader national interests. OICI provides unique expertise derived from DOE's National Laboratories and 14 Field Intelligence Elements, producing tailored products that underpin policy formulation in areas like non-proliferation and technology export controls. OICI delivers intelligence products directly to DOE's Secretary, Deputy Secretary, and senior leaders, as well as to interagency stakeholders, facilitating informed programmatic and decisions. This includes contributions to the Intelligence Community's coordinated efforts, such as inputs to the Committee on Foreign Investment in the United States (CFIUS) process to evaluate foreign investments posing potential risks to technologies. By assessing worldwide threats to DOE missions, OICI helps shape policies that mitigate and risks, ensuring alignment with executive priorities like and . The office operates the DOE Intelligence Operations Center, a 24/7 facility for top-secret/sensitive compartmented information (TS/SCI) communications, which supports real-time threat monitoring and rapid dissemination of actionable to policymakers during crises. This capability enhances policy responsiveness to emerging threats, such as foreign adversarial targeting of U.S. infrastructure, and coordinates with the Office of the (ODNI) and other IC elements to integrate DOE-specific insights into national strategies. OICI's policy support extends to liaison functions that bridge DOE operations with broader U.S. government efforts, prioritizing empirical threat analysis over generalized assessments.

Organizational Structure

Leadership and Directors

The Director of the Office of Intelligence and Counterintelligence (OICI) is appointed by the Secretary of Energy with the concurrence of the Director of National Intelligence, overseeing all intelligence and counterintelligence activities within the Department of Energy (DOE). The position reports to the DOE Under Secretary for Science and Innovation and coordinates with the broader Intelligence Community. Deputy directors handle specialized functions, such as counterintelligence operations and intelligence analysis, supporting the Director in threat mitigation and policy advisory roles. Historical leadership includes Edward Bruce Held, a former CIA officer recalled to federal service in December 2009 by Energy Secretary to lead OICI amid post-2007 concerns, including the handling of leaks at national laboratories. Held directed intelligence efforts focused on foreign threats to assets until approximately early 2013, when he transitioned to acting roles in nuclear security administration. Steven K. Black succeeded Held, serving as Director for eleven years from around 2012 until his abrupt reassignment on November 17, 2023, to a senior advisory position amid congressional scrutiny over a counterintelligence report on vulnerabilities. During Black's tenure, OICI emphasized foreign nuclear weapons analysis, counter-espionage at energy facilities, and integration with interagency efforts against proliferation risks. Jay A. Tilden, appointed in October 2023, is the current Director. A career intelligence professional with prior DOE roles in analysis from 2004 to 2008 and nuclear threat science from 2008 to 2012, Tilden concurrently holds positions as NNSA Associate Administrator and Deputy Under Secretary for and , enhancing OICI's focus on emerging threats like cyber intrusions into energy infrastructure and adversarial in advanced technologies.
DirectorTenureKey Notes
Edward Bruce HeldDecember 2009 – ~2013Led post-espionage reforms; former CIA operations officer.
Steven K. Black~2012 – November 2023Oversaw 11-year term emphasizing ; reassigned amid oversight concerns.
Jay A. TildenOctober 2023 – presentIntegrates OICI with NNSA ; expertise in threat analysis.

Directorates and Key Divisions

The Office of Intelligence and (DOE-IN) is structured around functional directorates that align with its core responsibilities in , protection, and support operations, supplemented by field-based divisions for operational reach. These components enable the office to integrate scientific and technical expertise from DOE's national laboratories into efforts. As of recent official descriptions, key directorates include the Directorate, Directorate, and Directorate, each addressing distinct threat domains within the DOE enterprise. The Intelligence Analysis Directorate delivers advanced, evidence-based assessments of foreign nuclear weapons programs, energy sector vulnerabilities, and related risks, drawing on DOE's unique technical capabilities to produce actionable for policymakers. This directorate supports broader Intelligence Community efforts by analyzing open-source and classified data on adversarial technological advancements, such as those from state actors targeting U.S. . The Counterintelligence Directorate focuses on detecting, deterring, and neutralizing and insider threats directed at facilities, , and nuclear assets, including coordination with field offices to safeguard the (NNSA). It conducts risk assessments and investigations to mitigate foreign intelligence services' attempts to acquire restricted technologies. The Cyber Directorate furnishes information technology infrastructure, secure communications, and technical capabilities to the DOE-IN workforce, while addressing cyber threats to critical energy systems through vulnerability analysis and defensive measures. This includes supporting secure handling of sensitive compartmented information across DOE sites. Key divisions extend DOE-IN's operations through decentralized elements, including 14 Field Intelligence Elements embedded at DOE laboratories, production plants, and sites, which provide on-site technical collection and analysis expertise. Complementing these are 15 field offices nationwide dedicated to counterintelligence coordination and threat response at operational facilities. The DOE Intelligence Operations Center serves as a central hub for 24/7 top-secret communications with interagency partners, including the White House, facilitating real-time intelligence sharing. DOE-IN also accredits Sensitive Compartmented Information Facilities (SCIFs) throughout the DOE complex to ensure compliance with Intelligence Community standards.

Integration with DOE and Broader Intelligence Community

The Office of Intelligence and Counterintelligence (OICI) operates as a core component of the U.S. Department of Energy (DOE), integrating intelligence and counterintelligence functions directly into the department's national security and scientific missions. Established to oversee all such activities across DOE's complex, including its 17 national laboratories, OICI ensures the protection of sensitive technologies in nuclear energy, weapons stewardship, and advanced research. It deconflicts, coordinates, and integrates intelligence efforts within DOE channels, reporting directly to the DOE Under Secretary for Science and Technology, thereby aligning intelligence outputs with departmental priorities such as energy security and nonproliferation. This embedded structure facilitates rapid threat mitigation at DOE facilities, where OICI maintains nearly 30 field offices to support counterintelligence investigations and insider threat programs tailored to the department's unique scientific assets. Within the broader U.S. Intelligence Community (IC), OICI functions as one of the 18 statutory elements under the Office of the Director of National Intelligence (ODNI), contributing specialized scientific and technical intelligence while adhering to IC directives on information sharing and analysis. It produces unique assessments on energy-related threats, foreign espionage targeting DOE technologies, and proliferation risks, which are disseminated through ODNI-coordinated products to inform national policymakers. Coordination with other IC agencies is formalized; for instance, OICI aligns overseas counterintelligence operations with the Central Intelligence Agency (CIA) to avoid duplication and enhance effectiveness, as mandated by DOE procedures. Domestically, it collaborates with the Federal Bureau of Investigation (FBI) on joint investigations, including representation on two FBI-led Joint Terrorism Task Forces focused on threats to critical infrastructure. This dual integration enables OICI to bridge DOE's domain-specific expertise with IC-wide efforts, such as countering adversarial targeting of U.S. innovation sectors, without conducting traditional collection, which remains prohibited under . Such arrangements have supported interagency responses to cases involving DOE personnel and technologies, underscoring OICI's role in fusing departmental insights with community-wide fusion centers.

Key Operations and Achievements

Major Investigations and Threat Neutralizations

The Office of Intelligence and Counterintelligence (OICI) has conducted and supported investigations into , unauthorized disclosures, and insider threats targeting Department of Energy () facilities, particularly national laboratories handling and energy technologies, though many operational details remain classified to protect methods and sources. OICI's directorate initiates inquiries and full investigations into suspected clandestine relationships or activities that could compromise DOE assets, often in coordination with the FBI and other agencies. A notable case involved a former employee at the , who on January 26, 2009, pleaded guilty to unlawfully disclosing restricted atomic energy data in violation of the Atomic Energy Act. The individual had shared related to nuclear materials handling, prompting an that highlighted vulnerabilities in personnel at DOE sites; OICI's headquarters provided analytical and counterintelligence support to the probe led by the FBI and DOE Office of . In another incident at the in Oak Ridge, contractor Roy Lynn Oakley was arrested in 2008 and sentenced on July 13, 2009, to five years in federal prison for attempting economic espionage by trying to sell stolen components of uranium enrichment equipment—valued at supporting technologies critical to —to an undercover FBI posing as a foreign buyer. This underscored OICI's role in fostering threat awareness and collaborating on threat neutralization within the DOE complex, where foreign actors seek to acquire proliferation-sensitive technologies. OICI has also contributed to broader efforts, such as detecting and mitigating foreign contacts and insider risks at 's 17 national laboratories, resulting in administrative actions, security clearances revocations, and referrals for prosecution, though public metrics on neutralizations are limited due to constraints. For instance, post-2000 reforms under OICI's framework have enhanced detection of attempts, building on earlier DOE counterintelligence reports documenting progress in threat referrals and case handling.

Contributions to Energy Security and Technology Protection

The Office of Intelligence and Counterintelligence (OICI) contributes to U.S. by producing scientific and on foreign capabilities, materials security, and vulnerabilities in the sector, enabling policymakers to address threats to such as the electric grid and facilities. This draws from OICI's unique access to DOE's 17 laboratories and sites, where 14 Field Elements conduct threat assessments tailored to -related technologies. By mitigating risks targeting DOE's —valued for its role in deterrence, , and nonproliferation—OICI helps preserve U.S. technological edges against adversaries seeking to undermine . In technology protection, OICI provides support to 's 15 field offices, identifying and neutralizing foreign attempts to exfiltrate sensitive data on advanced energy systems, including fusion research, battery technologies, and grid cybersecurity tools. It accredits Facilities (SCIFs) across the DOE complex to secure classified discussions on proprietary innovations and collaborates with the Committee on Foreign Investment in the United States (CFIUS) by supplying on potential foreign acquisitions of energy tech firms. OICI's further bolsters resilience against state-sponsored hacks on energy , informing DOE's responses to incidents that could disrupt supply chains or R&D pipelines. OICI operates the DOE Intelligence Operations Center, a 24/7 facility handling top-secret communications with the and interagency partners, which facilitates rapid dissemination of energy threat warnings to enhance sector-wide defenses. Through joint investigations with the FBI and other Community elements, OICI has supported efforts to counter proliferation risks, such as unauthorized transfers of nuclear-related expertise, thereby protecting technologies essential to long-term . These activities underscore OICI's role in translating technical insights into actionable safeguards, though specific case outcomes often remain classified to avoid compromising ongoing operations.

Role in Countering Foreign Espionage

The Office of Intelligence and (OICI) plays a central role in detecting, deterring, and disrupting foreign targeting Department of Energy (DOE) assets, particularly sensitive nuclear technologies, national laboratories, and energy infrastructure. Through its Directorate, OICI conducts operations to identify foreign intelligence activities aimed at stealing , , and technological advancements vital to U.S. . This includes proactive measures such as threat assessments, surveillance detection, and coordination with enforcement to mitigate risks from adversarial nations seeking to exploit DOE's scientific expertise. OICI maintains 15 field offices embedded at DOE facilities nationwide, enabling localized counterespionage efforts that leverage technical expertise from 14 Field Intelligence Elements. These offices investigate suspicious foreign contacts, elicitations of classified data, and intrusions linked to , while fostering awareness programs to train DOE personnel on recognizing indicators like unsolicited offers of favors or . Historical data underscores the persistence of these threats: between fiscal years 1995 and 1999, DOE counterintelligence identified over 75 attempted incidents at four key national laboratories—Lawrence Livermore, , Oak Ridge, and Sandia—involving tactics such as electronic , hotel room searches, and attempts to access nuclear-related information. In response, OICI has developed targeted action plans to counter foreign intelligence collection against DOE information systems, including protocols for canceling or modifying high-risk international engagements. Collaboration with the broader Intelligence Community and partners like the FBI enhances OICI's effectiveness in attributing and neutralizing espionage campaigns, particularly those originating from state actors prioritizing energy sector technologies. By integrating counterintelligence into DOE's insider threat program and laboratory security protocols, OICI addresses vulnerabilities such as foreign nationals' access to restricted areas, ensuring the protection of irreplaceable intellectual capital without compromising legitimate scientific collaboration. These efforts have contributed to disrupting potential technology transfers that could undermine U.S. strategic advantages in nuclear deterrence and energy security.

Focus Areas and Emerging Threats

Foreign Adversarial Espionage in Nuclear and Energy Sectors

The U.S. and sectors have faced sustained efforts by adversarial foreign powers, primarily and , aiming to pilfer classified technologies, designs, and operational data to advance their own capabilities. These activities encompass recruitment, cyber intrusions, and exploitation of academic and research collaborations, often targeting Department of (DOE) national laboratories and contractors involved in nuclear weapons stewardship, fissile material production, and advanced energy systems. The Office of Intelligence and (OICI) identifies these threats through surveillance of foreign contacts, programs, and coordination with the FBI and broader intelligence community, emphasizing vulnerabilities in supply chains and personnel with access to restricted areas. China's campaigns against U.S. programs date back decades, with the 1999 Cox Committee report documenting the acquisition of classified on seven U.S. warhead types, including the W-88, via penetrations at and during the 1980s and . In a incident, state-sponsored hackers exfiltrated over 200 gigabytes of , equivalent to the storage capacity of an average at the time, highlighting persistent cyber vectors into energy-related networks. More broadly, from 2000 to 2023, at least 224 publicly reported instances of targeted U.S. entities, including -affiliated in and high-energy physics, often through talent recruitment programs like the that mask intelligence gathering. In 2014, the Department of Justice indicted five hackers from China's Unit 61398 for economic , including intrusions into U.S. and clean energy firms to steal turbine and technologies. Recent assessments note researchers at labs engaged in weapons-related work, amplifying risks of inadvertent or coerced transfers. Russian intelligence services have similarly prioritized energy sector reconnaissance and disruption, with campaigns from 2011 to 2018 targeting and international energy organizations via malware implants like , which enabled remote access to control systems in plants and oil/gas . In March 2022, the DOJ charged three intelligence officers and a hacker for a five-year global operation energy entities in 135 countries, including U.S. facilities, to map networks for potential sabotage amid geopolitical tensions. The 2020 supply chain compromise, attributed to Russia's , infiltrated networks for nine months, granting access to unclassified but sensitive and technical files. FBI alerts from 2022 documented IP addresses scanning at least five U.S. companies, indicative of pre-positioning for or attacks on . Efforts by and , while less voluminous against DOE targets, focus on nuclear technology . North Korean groups like have conducted ransomware-funded since at least 2021, attempting to steal nuclear secrets from U.S. and allied entities, including designs for enrichment and weaponization processes. Iran's intelligence apparatus has pursued acquisition of dual-use nuclear materials and expertise, often via front companies interfacing with U.S. energy suppliers, though direct DOE penetrations remain rarer compared to cyber probing of sanctions-evading networks. OICI mitigates these threats through mandatory reporting of foreign contacts under DOE Order 470.5A and programs for high-risk personnel, though challenges persist in vetting international collaborators at labs handling .

Cyber Threats to Critical Infrastructure

The Office of Intelligence and Counterintelligence (OICI) addresses cyber threats to U.S. by delivering specialized on foreign cyber operations targeting energy systems, enabling anticipation and mitigation of disruptions to power grids, facilities, and national laboratories. These threats primarily emanate from state actors like , , and , who seek to infiltrate industrial control systems for , , or intellectual property theft; for instance, historical penetrations of DOE labs by entities prompted Presidential Decision Directive-61 in to bolster countermeasures. OICI's cyber functions emphasize analysis of foreign-origin incidents, coordinating with DOE's Chief Information Officers and the to attribute attacks and protect sensitive networks housing technologies vital to . OICI operates a 24/7 Intelligence Operations Center for top-secret communications with the and participates in the FBI-led National Cyber Investigative Joint Task Force, facilitating interagency responses to energy sector intrusions. Through 14 field intelligence elements at DOE sites, the office conducts counterintelligence investigations into cyber-enabled targeting of personnel and facilities, including insider threats that could amplify vulnerabilities in systems. This intelligence supports broader DOE efforts, such as those by the Office of Cybersecurity, Energy Security, and Emergency Response, to enhance grid resiliency against and advanced persistent threats observed in incidents like the 2021 attack, though OICI's focus remains on foreign intelligence attribution rather than direct operational . Emerging risks include supply chain compromises in energy technologies, where cybersecurity gaps expose attack vectors for adversaries to exploit DOE-managed assets and private-sector partners; OICI mitigates these by producing tailored products for DOE stakeholders and the energy industry, prioritizing threats to intellectual property in renewable and nuclear domains. In fiscal year 2023, DOE reported heightened foreign cyber probing of energy infrastructure, underscoring OICI's role in fusing scientific expertise with threat intelligence to inform policy and hardening measures without relying on unverified academic or media narratives prone to bias.

Insider and Proliferation Risks

The Office of Intelligence and (OICI) plays a central role in addressing within the Department of (DOE) enterprise, particularly those that could compromise sensitive technologies, materials, or facilities. Under DOE Order 470.5, OICI reviews and analyzes data from the enterprise-wide (ITP) to identify indicators, such as unauthorized access to or anomalous behavior by employees and contractors. The ITP, established in , aims to deter, detect, and mitigate risks from insiders—including , , or unauthorized disclosure—across DOE's 17 national laboratories and other sites handling . OICI operates the centralized Analysis and Response (ARC), staffed by its personnel, to conduct assessments and coordinate responses to potential threats, integrating behavioral , , and personnel security data. Despite these mechanisms, implementation gaps persist, as highlighted in a 2023 () review, which found that had not fully deployed ITP capabilities at all sites, including incomplete user activity monitoring and inconsistent training for over 100,000 personnel with access to sensitive areas. OICI's efforts focus on high-risk insiders, such as those in nuclear weapons programs, where threats could enable theft of or design information; for instance, historical cases like the 1999 attempt underscored vulnerabilities that OICI now targets through proactive vetting and threat hunting. These risks are amplified by the dual-use nature of DOE technologies, where insider actions could facilitate unauthorized exports or collaborations with foreign entities. Proliferation risks intersect with insider threats when personnel enable the illicit transfer of expertise or materials to non-state actors or adversarial states, a concern OICI mitigates through targeted investigations and awareness programs. OICI supports DOE's broader nonproliferation objectives by assessing insider pathways for technology diversion, such as in enrichment or reactor designs, which could shorten pathways to weapons-grade material. In coordination with the , OICI conducts counterintelligence operations to prevent scenarios where insiders, motivated by , , or financial incentives, aid networks; this includes monitoring for contacts with entities in countries like or , as identified in DOE assessments. Effective mitigation relies on OICI's integration of with data analytics, though GAO has noted that uneven ITP rollout leaves vectors under-addressed at some facilities as of 2023.

Criticisms and Controversies

Allegations of Inefficiency and Internal Failures

The President's Foreign Intelligence Advisory Board (PFIAB) in its 1999 report, Science at Its Best, Security at Its Worst, attributed decades of security and shortcomings to entrenched cultural, structural, and historical deficiencies, including inadequate threat assessments and lax controls on foreign visitors and access. These lapses enabled risks at nuclear facilities, as evidenced by the bipartisan Cox Committee findings of grossly deficient practices persisting for years, which failed to safeguard sensitive nuclear weapons data against foreign actors like . analyses from the late 1990s further highlighted unresolved internal security issues, such as unaddressed vulnerabilities identified by DOE's own oversight staff, compounded by a convoluted management structure that fostered inefficiencies in implementing protective measures. Recurring operational failures included persistent gaps in cyber-security enforcement, inadequate access controls, and insufficient testing of compliance with security protocols, as documented in internal reviews spanning the 1990s. A 2019 Office of inspection uncovered allegations of intelligence management violations of internal directives and Intelligence Community standards, pointing to breakdowns in oversight and procedural adherence within counterintelligence functions. More recently, a 2023 GAO report criticized 's incomplete implementation of its Program, mandated under DOE Order 470.5, noting failures to monitor user activity across all classified networks despite the Office of Intelligence and Counterintelligence's (OICI) responsibility for funding and facilities. This shortfall heightened risks of unauthorized data releases with implications, as threats could exploit unmonitored access to critical energy and information. evaluations in 2024 raised concerns over OICI's bifurcated structure, arguing it generated administrative inefficiencies that hampered daily operations and resource allocation for countering espionage in energy sectors. Critics, including former DOE officials, have linked these persistent issues to overlapping jurisdictions with agencies like the FBI, diluting OICI's focus and response agility to emerging threats.

Debates on Scope and Effectiveness

Critics have long debated the adequacy of the Office of Intelligence and Counterintelligence's (OICI) scope, arguing that its focus on nuclear and energy-related threats has historically been undermined by cultural and structural weaknesses within the Department of Energy (DOE), leading to vulnerabilities in countering foreign espionage. A 1999 President's Foreign Intelligence Advisory Board (PFIAB) report, titled "Science at Its Best, Security at Its Worst," identified persistent issues such as lax counterintelligence prioritization and inadequate oversight of foreign visitors to DOE labs, attributing these to a departmental culture that emphasized open scientific collaboration over security, which facilitated espionage risks over two decades prior. Congressional hearings in the late 1990s and early 2000s, including those by the Senate Select Committee on Intelligence, echoed these concerns, highlighting failures to address espionage at national labs despite repeated warnings, prompting reforms like enhanced polygraph testing but questioning whether the office's mandate was sufficiently expansive to integrate with broader intelligence community efforts. On effectiveness, (GAO) assessments have revealed implementation gaps in OICI-supported programs, particularly for insider threats, with a 2023 report finding that had not fully met required standards across its nuclear security enterprise, including incomplete monitoring of networks that could expose classified data to undetected insiders or foreign actors. These findings underscore debates over whether OICI's measures, such as screenings introduced post-1999 reforms, reliably deter or detect threats; scientific reviews, including a 2000 analysis, have criticized polygraphs as scientifically unreliable for broad employee screening, potentially yielding false positives that erode without proportionally enhancing . A 2023 investigation further highlighted operational lapses, revealing a contractor's unauthorized access to Biden's during a review, raising questions about internal controls and the office's ability to safeguard even high-profile investigations. Proponents of OICI's current scope defend its targeted focus on DOE-specific equities like and energy infrastructure , arguing that expansions into broader domains risk diluting expertise amid interagency overlaps with the FBI and , as noted in a 2008 analysis of post-reform consolidations. However, recent congressional scrutiny, including 2025 Senate Energy Committee hearings on foreign nationals at labs, has intensified debates by linking potential workforce reductions to heightened risks, with witnesses testifying to ongoing threats from adversarial nations like that test the office's and adaptive capacity. GAO's persistent high-risk designations for DOE vulnerabilities, updated as of 2025, suggest that while OICI contributes to threat mitigation, measurable outcomes in neutralizing —such as through declassified case resolutions—remain limited, fueling arguments for more rigorous metrics and funding to validate effectiveness against empirical benchmarks like detected intrusions or prevented proliferations.

Responses, Reforms, and Defenses

In response to espionage scandals, including alleged penetrations of weapons laboratories documented in the 1999 Cox Committee Report, President Clinton issued Presidential Decision Directive 61 (PDD-61) on February 12, 1998, mandating comprehensive reforms at the Department of Energy. These included reorganizing DOE's and foreign elements into two independent offices reporting directly to the of Energy, expanding the use of examinations for certain personnel, enhancing FBI coordination for investigations, and establishing a Board chaired by the DOE . PDD-61 aimed to address longstanding cultural resistance to security measures within DOE laboratories, where empirical assessments had revealed inadequate safeguards since at least 1980. Congress codified PDD-61's provisions in the National Defense Authorization Act for Fiscal Year 2000 (P.L. 106-65), which formalized the Office of Counterintelligence and required annual reports on implementation progress. This legislation also created the National Nuclear Security Administration (NNSA) as a semi-autonomous entity within DOE, initially with its own parallel counterintelligence office to oversee weapons facilities. However, fragmented implementation persisted, prompting further reform via the John Warner National Defense Authorization Act for Fiscal Year 2007 (P.L. 109-364), which eliminated NNSA's separate counterintelligence office and consolidated all functions under DOE's Office of Counterintelligence to streamline policy development and execution across both DOE and NNSA sites. The for Fiscal Year 2020 (P.L. 116-92) codified the merged structure of the Office of Intelligence and (OICI), designating a accountable to the Under Secretary for and affirming its authority over intelligence collection, analysis, and counterintelligence operations enterprise-wide. These organizational changes responded to critiques of inefficiency by centralizing oversight, reducing duplication, and mandating integrated threat assessments for and energy sectors. Proponents defend OICI's effectiveness by citing its role in safeguarding technologies and of "incalculable value," including unique analyses of foreign nuclear weapons programs and contributions to interagency efforts against risks. Operating 15 field offices and 14 Field Intelligence Elements, OICI provides counterintelligence support to DOE's national laboratories and facilities, mitigating insider threats and cyber vulnerabilities through collaboration with the Office of the and other intelligence community partners. Despite its relatively small size, officials assert OICI delivers disproportionate value by informing decisions on infrastructure protection and foreign adversarial activities, as evidenced by its integration into broader U.S. frameworks since the 1992 Intelligence Authorization Act (P.L. 102-496).

References

  1. [1]
    Office of Intelligence and Counterintelligence - Department of Energy
    The Department of Energy's Office of Intelligence and Counterintelligence (DOE-IN) informs national security decision makers and mitigates threats.
  2. [2]
    Members of the IC - DNI.gov
    The U.S. Department of Energy's Office of Intelligence and Counterintelligence is responsible for the intelligence and counterintelligence activities throughout ...
  3. [3]
    Department of Energy Office of Intelligence
    The Department of Energy's Office of Intelligence (IN) is the Intelligence Community's premier technical intelligence resource in four core areas.
  4. [4]
    Dept. of Energy Office of Intelligence and Counterintelligence
    The Office protects vital national security information and technologies, representing intellectual property of incalculable value. Its distinctive contribution ...
  5. [5]
    Department of Energy's Office of Intelligence and ... - Congress.gov
    Jun 7, 2024 · OICI's counterintelligence component provides support for DOE's 17 national laboratories and offices; this includes investigations and DOE's ...
  6. [6]
    [DOC] https://www.energy.gov/intelligence/articles/count...
    The mission of the U.S. Department of Energy's Office of Intelligence and Counterintelligence (DOE-IN) is to identify and mitigate threats to U.S. national ...
  7. [7]
    DOE-OIG-25-11 | Department of Energy
    Jan 3, 2025 · Allegations of Management Concerns at the Department of Energy's Office of Intelligence and Counterintelligence. Office of Inspector General.
  8. [8]
    National Security & Safety Reports | Department of Energy
    Review of the Office of Intelligence and Counterintelligence's Closing of Category A Security Incidents. December 30, 2019. Special Report: DOE-OIG-20-21.<|separator|>
  9. [9]
    Explore the Journey of the Intelligence Community: Our History ...
    DOE's Office of Intelligence and Counterintelligence provides the U. S. government with critical insights to respond to foreign intelligence, terrorist, and ...
  10. [10]
    Department of Energy's Office of Intelligence ... - Every CRS Report
    Jun 7, 2024 · Department of Energy's Office of Intelligence and Counterintelligence (OICI) congressional oversight. responsibilities, which OICI retains.<|separator|>
  11. [11]
    About the Office of Intelligence and Counterintelligence (IN)
    The Office of Intelligence and Counterintelligence (IN) contributes to multiple DOE missions and is a critical contributor to policy and national security ...
  12. [12]
    [PDF] The Atomic Energy Commission
    Almost a year after World War II ended, Congress established the United States Atomic Energy. Commission to foster and control the peacetime development of ...
  13. [13]
    [PDF] The Cold War Atomic Intelligence Game, 1945–70 - CIA
    Since its inception in the early. 1940s and through much of the. Cold War, the Soviet atomic project was the focus of a mas- sive intelligence effort by the.
  14. [14]
    [PDF] SCIENCE SECURITY WORST - Department of Energy
    This report examines: • The 20–year history of security and counterintelligence issues at the DOE national laboratories, with an emphasis on the five labs that ...
  15. [15]
    Intelligence Reform at the Department of Energy: Policy Issues and ...
    Apr 10, 2006 · Despite these changes, a majority in Congress decided that DOE's counterintelligence reforms were insufficient. The Turning Point. March 1999 ...
  16. [16]
    PDD/NSC 61 Energy Department Counterintelligence
    PDD/NSC 61 Energy Department Counterintelligence February 1998 · hiring counterintelligence professionals to be based at the weapons labs · doubling the budget ...
  17. [17]
    In 1977, Congress enacted the Department of Energy Organization Act
    Jun 7, 2024 · The Department of Energy's Office of Intelligence and Counterintelligence (OICI) can trace its origins to the Second World War, when the U.S. ...
  18. [18]
    Intelligence Reform at the Department of Energy - Every CRS Report
    Jul 25, 2008 · In permitting DOE to consolidate the two offices, Congress reversed its 1999 authorization to establish a separate NNSA CI office—a decision ...Missing: Cold War<|separator|>
  19. [19]
    116th Congress (2019-2020): Damon Paul Nelson and Matthew ...
    “(2) In establishing the Energy Infrastructure Security Center, the Director of the Office of Intelligence and Counterintelligence shall address the following ...<|separator|>
  20. [20]
    [PDF] Department of Energy Office of Intelligence and Counterintelligence ...
    Jun 27, 2023 · DOE-IN will retain personal information concerning a non-U.S. person on the basis that it is foreign intelligence or counterintelligence in ...
  21. [21]
    [PDF] intelligence activities - DOE Directives - Department of Energy
    Jan 17, 2017 · These Department of Energy (DOE) Procedures for ... The Office of Intelligence and Counterintelligence (IN) and subordinate offices.
  22. [22]
    [PDF] department of energy counterintelligence, intelligence and nuclear ...
    PDD-61, a Presidential Directive designed to acknowledge and ad- dress the problems in DOE's counterintelligence program. Subsequently, a number of steps ...
  23. [23]
    FBI investigates former Energy Department intelligence chief - CNN
    Jul 20, 2000 · Trulock's allegations touched off a federal investigation centering on a Chinese-American physicist at Los Alamos, Wen Ho Lee, whom Trulock ...Missing: counterintelligence examples
  24. [24]
    DOE Should Take Actions to Fully Implement Insider Threat Program
    May 24, 2023 · The Department of Energy has several programs to ensure proper access to and handling of the nation's nuclear weapons and related information.<|separator|>
  25. [25]
    [PDF] U.S. National Intelligence: An Overview 2013 - GovInfo
    Apr 29, 2025 · The Office of Intelligence and Counterintelligence. (IN) is DOE's intelligence office and IC component. It focuses on assessing worldwide ...
  26. [26]
    [PDF] Edward Bruce Held
    Held to return to federal service and serve as Director of DOE's Office of Intelligence and Counterintelligence. In that capacity, he led all DOE intelligence ...
  27. [27]
  28. [28]
    Risch, Colleagues Raise Alarm over Energy Department ...
    Nov 21, 2023 · Black was reassigned to a new position in the Department after leading the Office of Intelligence and Counterintelligence (DOE-IN) for eleven ...Missing: tenure | Show results with:tenure
  29. [29]
    GOP Senators sound alarm on counterintelligence at the ... - Fox News
    Nov 21, 2023 · 17, Steven Black, the director of the Office of Intelligence and Counterintelligence (DOE-IN), was abruptly reassigned to a "senior adviser ...Missing: tenure | Show results with:tenure
  30. [30]
    Jay A. Tilden | Department of Energy
    Jay Tilden currently serves as the Director for the Department of Energy's Office of Intelligence and Counterintelligence.
  31. [31]
    [DOC] https://www.energy.gov/intelligence/articles/intel...
    The mission of the U.S. Department of Energy's Office of Intelligence and Counterintelligence (DOE-IN) is to identify and mitigate threats to U.S. national ...
  32. [32]
    [DOC] https://www.energy.gov/intelligence/articles/cyber
    The role of DOE-IN's Cyber Directorate is to provide Information Technology infrastructure, capabilities, and technical support to the DOE-IN workforce, and p ...
  33. [33]
    [PDF] IF12684.2.pdf - Congress.gov
    Jun 7, 2024 · Presidential Decision Directive-61 (PDD-61). Among other things, PDD-61 reorganized the foreign intelligence and counterintelligence ...
  34. [34]
    Intelligence Community - DNI.gov
    The Office of Intelligence and Analysis was established by the Intelligence Authorization Act for fiscal 2004. OIA is responsible for the receipt, analysis, ...<|separator|>
  35. [35]
    Former Oak Ridge Complex Employee Pleads Guilty to Unlawful ...
    Jan 26, 2009 · ... DOE's Headquarters Office of Intelligence and Counterintelligence. Assistant U.S. Attorney A. William Mackie from the U.S. Attorney's Office ...<|separator|>
  36. [36]
    FBI — Contractor Sentenced in Espionage Case
    Jul 13, 2009 · Roy Lynn Oakley asked for when he attempted to sell stolen parts of uranium enrichment equipment to someone he thought was an agent of a foreign government.Missing: OICI | Show results with:OICI
  37. [37]
    DOE Reports on Security and Counterintelligence Accomplishments
    Jan 25, 2000 · created a strategic Analysis Program to conduct foreign intelligence threat assessments and economic espionage threat assessments. Office of ...
  38. [38]
    [PDF] GAO DEPARTMENT OF ENERGY - Government Accountability Office
    Jun 26, 2000 · During fiscal years 1995 through 1999, DOE counterintelligence officials and records identified over 75 incidents of attempted espionage by ...Missing: OICI | Show results with:OICI
  39. [39]
    [PDF] DOE O 475.1 - DOE Directives - Department of Energy
    Dec 10, 2004 · OBJECTIVES. To establish Counterintelligence (CI) Program requirements and responsibilities for the Department of Energy (DOE), ...Missing: OICI successes
  40. [40]
    [PDF] Foreign Economic Espionage in Cyberspace - DNI.gov
    Jul 24, 2018 · Recent events underscore the potential risks posed by technology companies that have links to foreign governments with high threat intelligence ...
  41. [41]
    Cox Panel Charges China With Extensive Nuclear Espionage
    The United States has been the victim of a sustained Chinese espionage campaign alleged to have acquired classified information on seven types of US ...
  42. [42]
    DOE cold case shows limits of U.S.-China cyber cooperation
    Oct 6, 2015 · In January 2013, hackers stole over 200 gigabytes of Department of Energy data -- enough to fill an average laptop at the time.
  43. [43]
    Survey of Chinese Espionage in the United States Since 2000 - CSIS
    This updated survey is based on publicly available information and lists 224 reported instances of Chinese espionage directed at the United States since 2000.
  44. [44]
    U.S. Charges Five Chinese Military Hackers for Cyber Espionage ...
    May 19, 2014 · A grand jury in the Western District of Pennsylvania (WDPA) indicted five Chinese military hackers for computer hacking, economic espionage and other offenses.
  45. [45]
    US science labs face 'growing threat' of espionage - New York Post
    Feb 20, 2025 · American government labs are facing a “growing threat” of espionage from foreign adversaries, former Energy Department and national security ...
  46. [46]
    Russia State-Sponsored Cyber Threat: Advisories - CISA
    ... Russian cyber actors from 2011 to 2018 and targeted U.S. and international Energy Sector organizations. CISA, the FBI, and DOE responded to these campaigns ...
  47. [47]
    Russian spies indicted in worldwide hacks of energy industry ...
    Mar 24, 2022 · Three Russian spies spent five years targeting energy infrastructure in 135 countries in an effort to enable the Russian government to gain remote control of ...Missing: espionage DOE counterintelligence
  48. [48]
    SolarWinds: How Russian spies hacked the Justice, State, Treasury ...
    Feb 14, 2021 · Russian spies went rummaging through the digital files of the US departments of Justice, State, Treasury, Energy, and Commerce and for nine months had ...
  49. [49]
    FBI: US energy sector faces 'reconnaissance, scanning' by Russian ...
    Mar 23, 2022 · Russian hackers may be exploring the potential for attacks on the U.S. energy sector, and several companies have experienced "abnormal ...Missing: espionage counterintelligence
  50. [50]
    North Korea hackers trying to steal nuclear secrets- US, UK warn
    Jul 25, 2024 · The US says the group funds its espionage activity through ransomware operations against US healthcare entities. Paul Chichester, director of ...
  51. [51]
    [PDF] Insider Threat Program - DOE Directives
    Dec 6, 2024 · PURPOSE. To further improve a central Insider Threat Program (ITP) framework to deter, detect, analyze, respond to, and mitigate insider ...
  52. [52]
    [PDF] Annual Threat Assessment of the U.S. Intelligence Community
    Mar 18, 2025 · This report assesses threats to US national security, including nonstate transnational criminals, terrorists, and major state actors like China ...
  53. [53]
    [PDF] Fortifying U.S. Energy Supply Chains Counterintelligence Risks
    Among the risks identified in DOE's one-year review, cybersecurity concerns pose the broadest challenges to U.S. energy interests, exposing attack points for ...
  54. [54]
    Office of Cybersecurity, Energy Security, and Emergency Response
    Cyber threats targeting energy systems continue to increase and evolve; foreign adversaries, nation states, and criminal actors pose a serious threat to U.S. ...Missing: OICI | Show results with:OICI
  55. [55]
    [DOC] DOE O 470.5 Insider Threat Program
    Office of Intelligence and Counterintelligence. (1) Reviews, analyzes and assesses ITP data for indications of counterintelligence concerns. (2) ...
  56. [56]
    [PDF] MEMORANDUM - Department of Energy
    The ARC is operated by personnel from the Office of Intelligence and Counterintelligence. (Intelligence) who develop and document DSO-approved insider threat ...
  57. [57]
    [PDF] DOE Should Take Actions to Fully Implement Insider Threat Program
    May 24, 2023 · 4 The program is also intended to coordinate insider threat analysis, response, and mitigation actions among the relevant DOE component ...Missing: proliferation | Show results with:proliferation
  58. [58]
    [PDF] Key Factors Underlying Security Problems at DOE Facilities - GAO
    For example. • The FBI, which examined DOE's counterintelligence activities in 1997, noted ... Department of Energy: DOE Needs to Improve Controls Over Foreign.
  59. [59]
    Science At Its Best; Security At Its Worst: Recurring Vulnerabilities
    Examples included a lack of management plans, inadequate access controls, and failures to test for compliance with security procedures. As a 1996 DOE ...
  60. [60]
    Inspection Report: DOE:OIG:19-50 | Department of Energy
    Sep 25, 2019 · The Office of Inspector General received allegations that: (1) Intelligence management possibly violated internal and intelligence community ...
  61. [61]
    [PDF] DOE Should Take Actions to Fully Implement Insider Threat Program
    May 24, 2023 · DOE Order. 470.5 identifies the Office of Intelligence and Counterintelligence as responsible for providing funding and facilities for the ...Missing: failures | Show results with:failures
  62. [62]
    Energy Department failing to monitor user activity on classified ...
    May 25, 2023 · The Department of Energy has failed to monitor user activity on all classified networks as required by federal insider threat policies, ...Missing: internal | Show results with:internal
  63. [63]
    Polygraph Testing and the DOE National Laboratories - Science
    Most scientists who have studied polygraph testing are deeply skeptical of its usefulness in screening employees as a way to enhance security.
  64. [64]
    Watchdog uncovers 'inappropriate access' to Biden's personal data
    Aug 23, 2023 · The Department of Energy's inspector general discovered that a contractor violated rules for counterintelligence reviews of the president ...
  65. [65]
    Senate Hearing on Security Risks from Foreign Nationals at DOE ...
    Feb 20, 2025 · Senate Committee on Energy and Natural Resources hearing entitled, "Hearings to examine research security risks posed by foreign nationals ...
  66. [66]
    GAO Urges Attention to 2025 “High Risk List” to Save Billions and ...
    Feb 5, 2025 · GAO today issued its updated High Risk List, which identifies 38 areas of government operations with serious vulnerabilities to fraud, waste, abuse, and ...