Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Nuclear Facility’s Security Breach Draws Attention, Concern

By Bill Zalud
Security forces responding
The contract security force at Y-12 recently competed in an exercise with other DOE squads. Photo by Paul Efird
Nuclear compound
Security forces responding
Nuclear compound
September 4, 2012

It was about 4:30 a.m. in Oak Ridge, Tenn., when sensors on the perimeter intrusion detection and assessment system alarmed. There was an unauthorized entry into a high-security, protected area.

A well-trained and heavily armed guard force responded.

And they found Megan Rice, an 82-year-old nun; Greg Boertje-Obed, 57, a housepainter; and Michael Walli, 63, a gardener, all of whom started reading a statement about their beliefs and opposition to nuclear weapons.

Surprisingly, the trio had simply cut through fencing to hang banners in the dark, splash blood and paint messages on the facility, what turned out to be the $549 million fortress that contains America’s primary supply of bomb-grade uranium.

The target: the Y‑12 National Security Complex, one of four production facilities in the National Nuclear Security Administration’s Nuclear Security Enterprise. Its unique emphasis is the processing and storage of uranium and development of technologies associated with those activities. Y‑12 maintains the safety, security and effectiveness of the U.S. nuclear weapons stockpile.

 

Big Security Shakeup

The break-in, of course, led to the arrest of the three. It also led to a major shakeup in management and supervisors of security at the facility as well as action by the Secretary of the U.S. Department of Energy (DOE). It also spotlights the assignment, and ongoing debate, of contract security at the nation’s nuclear power, government laboratory, poison gas storage and warhead facilities, which demand the highest level of security.

Before they were ordered to halt and kneel, the protesters at Y-12 suggested they break bread with the guards and showed off a Bible, candles and white roses. They also sang.

The incident happened just this past late July and was not greatly covered except for local news reports.

Y-12 spokesman Steven Wyatt has said it was fortunate that no one was hurt or killed in the break-in: “The protesters put themselves at a high risk of losing their life in performing this act. We are thankful that did not occur.”

The Obama Administration responded to the break-in and what it called other protection shortfalls at the Y-12 National Security Complex by shifting critical site supervisors and temporarily relieving from duty certain defensive personnel, according to statements by Energy Secretary Steven Chu, adding that the incident “was not consistent with the level of professionalism and expertise we expect from our guard force and all of those federal employees and contractors responsible for security across the [Energy Department] complex.”

In a short-term way, the three intruders got what they wanted.

Chu said in early August, “We decided to halt nuclear operations at the site, the guards involved in this incident were suspended, the general manager of the contractor protective force [WSI-Oak Ridge General Manager Lee Brooks] and two members of his leadership team were removed from their positions and all employees at the site are undergoing additional security training. The department has no tolerance for security breaches at any of our sites, and I am committed to ensuring that those responsible will be held accountable.”

DOE, however, is sticking with WSI. Steve Hafner will serve as acting general manager. He is vice president and director of safety, security and environment for Mission Support Alliance (MSA) in Hanford, Wash.

MSA is made up of Lockheed Martin, Jacobs and WSI as well as several partners with specialized Hanford expertise. The DOE Hanford site sits on 586 square miles in the desert of southeastern Washington State. The area is home to nine former nuclear reactors and their associated processing facilities. MSA provides integrated infrastructure services for the Hanford cleanup mission, including, but not limited to: roads and transportation services; electrical and water services; facility maintenance; emergency response (fire and patrol) services; network and software engineering; cyber security and records management; as well as environmental compliance and clean energy solutions.

Beyond the Y-12 break-in, the question is proprietary or contract when it some to protecting the most sensitive government facilities. It is also a matter of debate within the Transportation Security Administration, where some airports are choosing private security, often for budgetary reasons.

This article was originally published in the print magazine as "The Nun, the Housekeeper, White Roses and Nuclear Warheads."

KEYWORDS: nuclear security perimeter fence perimeter security security breach Security News

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • New Newswire Feature Image 3/8/2012

    Detroit Bomb Threat Draws Attention to Stadium Security

    See More
  • New Newswire Feature Image 3/8/2012

    Audit Finds Multiple Security Lapses at Y-12 Nuclear Facility

    See More
  • New Newswire Feature Image 3/8/2012

    Guards Replaced Following Tennessee Nuclear Security Breach

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing