loslos alamos alamos science science and and technology technology magazine magazine JUJULYLY 20 20 09 09

Wired for the Future

Cyber Wars

Have SQUIDs, Will Travel 1663 A Trip to Nuclear North Korea

About Our Name: During World War II, all that the 1663outside world knew of Los Alamos and its top-secret Table of Contents laboratory was the mailing address—P. O. Box 1663, Santa Fe, New Mexico. That box number, still part of our address, symbolizes our historic role in the nation’s from terry wallace service. Principal Associate Director for Science, Technology, and Engineering

Located on the high mesas of northern New Mexico, Los Alamos National Laboratory was founded in 1943 to build the first atomic bomb. It remains a premier scientific laboratory, dedicated to national security in its broadest The Scientist Envoy INSIDE FRONT COVER sense. The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy’s National Nuclear Security Administration. features About the Cover: Artist’s conception of a ’s “Trojan horse,” in cyberspace. Los Alamos fights an mosArchive

unending battle against Trojan horses, worms, and la other forms of malicious software but is spearheading LosA research to play offense rather than defense in the Wired for the Future 2 During the Manhattan Project, Enrico Fermi, Nobel Laureate and leader of SUPERCONDUCTING WIRES MIGHT TRANSFORM ENERGY DISTRIBUTION ongoing cyber wars. F-Division, meets with San Ildefonso Pueblo’s Maria Martinez, famous worldwide for her extraordinary black pottery.

From Terry Wallace Cyber Wars The Scientist Envoy 6 THE UNENDING BATTLE FOR CONTROL

Since the middle of the His direct experience with both plutonium metallurgy nineteenth century and the and international diplomacy have allowed him to days of Mendeleev, Darwin, communicate with the North’s weapons scientists, Pasteur, and Maxwell, obtain accurate information about the country’s scientists have helped to plutonium capabilities, and report his findings to the Have SQUIDs, Will Travel 12 better society. Their theories United States government. In an exclusive interview THE WORLD’S BEST MAGNETIC-FIELD SENSORS FOR MEDICINE AND HOMELAND SECURITY and discoveries underlie all of today’s technologies, with this magazine, Hecker recalls his experiences in and increasingly, society is turning to them to help nuclear North Korea. dialogue find long-term solutions to tomorrow’s environmental, Today, Los Alamos’ scientific staff members social, and security challenges. continue to support numerous nuclear nonproliferation Scientists at Los Alamos National Laboratory activities, for example, monitoring seismic activity readily shoulder this responsibility. Evidence for to detect underground nuclear tests. They design that can be seen throughout this issue of 1663, systems to safeguard nuclear facilities, as exemplified A Trip to Nuclear North Korea 18 which highlights efforts to develop superconducting by the work of Howard Menlove, the world’s expert FORMER DIRECTOR SIG HECKER OPENS DOORS IN YONGBYON transmission lines, perfect new medical imaging on measuring neutrons from radioactive materials. technologies, and safeguard computer networks. Each Menlove designed instruments to monitor operations of those efforts has the potential to contribute greatly and nuclear materials at North Korea’s Yongbyon spotlight to society and national security. reactor. In the area of diplomacy, George Eccleston But scientists also form a unique community. was a technical expert at the Six-Party Talks, a role All hold a rational view of the natural world and, now filled by Los Alamos scientist Kevin Veal. regardless of their native tongue, speak the universal As the premier national security science HOW TO BRAKE AN EPIDEMIC 25 language of mathematics. They relate to one another Laboratory, Los Alamos is a continuing source MEASURING THE VARIABLE STARS so that, on occasion, scientists can play a special role, of diverse and important contributions. Those that of the unofficial envoy, called upon to help society contributions, whether technical, social, or confront a difficult situation. diplomatic, will arise from the talents of one of our North Korea’s development of nuclear weapons is nation’s great assets—its scientists. one example. Since 2004, former Los Alamos Director Sig Hecker has gone to that country several times in the capacity of technical advisor to verify North Korea’s ability to make and purify plutonium.

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 The complicated network of transmission a very chilly –300°F, to become superconducting. To lines that brings electricity from energy sources to the cool an underground cable (current ones typically are user has dramatically changed its topology since the only a half mile long), liquid nitrogen enters the cable 1970s. Power plants that traditionally served local at 68K and warms to about 72K as it flows along the WIRED areas became part of a large interconnecting network of cable to the other end. It is then taken out of the cable hubs and spokes, with power plants and transmission and recooled. This scheme, which uses the specific heat lines fanning out to multiple population centers, many of liquid nitrogen for cooling, requires recooling after of which are connected to multiple power plants. The no more than a mile, making it uneconomical for long, interconnectedness has tended to make the grid more overhead cable runs. reliable because failures in individual power lines don’t Ashworth has demonstrated an alternative scheme bring the system down. that requires a cooling plant only once every 40 miles. for the future The trouble is that investments in transmission lines Each plant takes in air, cools it, and produces liquefied Superconducting Wires Might Transform Energy Distribution have not always kept up with the addition of new power nitrogen at 77K and 4 times atmospheric pressure. In plants, especially in congested areas. No one wants one design, the liquid nitrogen would run through a a power line in the backyard, so new lines can take perforated flexible-metal cooling tube alongside the The recent successes of underground 7 to 10 years to site and string. The National Energy superconducting wire. All would be encased in a long superconducting power lines and the Regulatory Commission reports that 25,000 miles of cryostat (vacuum-walled piping). The pressurized liquid new high-voltage lines are planned for construction nitrogen would spray out of its piping, vaporizing as it advent of second-generation, potentially over the next 10 years, but historically, only a small cools the nearby wire to superconducting temperatures. cost-competitive superconducting fraction of lines planned are actually built. If renewable The vapor would then exit from engineered vents every wires may well be a prelude to a bigger sources of electricity (wind farms and solar arrays) few miles. The conceptual difference is the use of the revolution in our nation’s power grid. increase as expected, most will be located far from liquid nitrogen coolant’s latent heat of vaporization, major population centers and will require at least as well as its specific heat, and that difference makes another 12,000 miles of new lines. overhead lines feasible. Steve Ashworth, leader of the applications team Says Ken Marken, head of the STC, “Steve’s out-of- at the Los Alamos Superconductivity Technology the box thinking is what’s needed if superconducting Center (STC), sees opportunity in these challenges. technology is to be a major player in the next 20 years.” Steve Ashworth has invented a cooling Superconducting wires, which are just now being Because superconducting lines could transmit scheme produced in kilometer lengths (just over a half mile), power with a significantly lower visual impact than can carry massive amounts of electric power with conventional high-voltage power lines, Ashworth thinks almost no energy loss. Ashworth wants to run these they would be more acceptable to the public and would wires overhead to minimize the environmental impact reduce—by years—the delay for obtaining permits. of new high-power lines that must run for hundreds Even more important, bringing one large wind-power of miles. Superconducting wires would carry generating facility online a year earlier, and using it to much more current and much lower voltage replace a coal-fired generator, would eliminate up to

and so could be strung on much shorter, 4 million tons of CO2 emissions. A superconducting grid less intrusive poles than are used for could help power a green revolution. conventional high-power lines. However, superconducting First Trials wire has to be cooled below Almost 100 years ago, 90 degrees Kelvin (90K), mercury was found to be superconducting at 4K (–453°F), and since then, scientists have finessed hundreds of elements and compounds into exhibiting superconductivity. Starting in 1986 a class of compounds called copper oxide

Three high-temperature superconducting power lines enter an underground right of way on Long Island, New York. Switched on in April 2008, the lines carry almost 600 megawatts of power, as much as all the

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 2 3 perovskites were found to become superconducting at The Long Shot Los Alamos’ Yates Coulter checks the quality and temperatures about 100 degrees higher than mercury Another possible high-temperature superconductor uniformity of long tapes for a number of compa- does. That meant cooling costs would be 1,000 times was yttrium barium copper oxide (YBCO), discovered lower, a giant advantage in any application. These new in 1987. This was the first compound found to be nies. His cassettelike machine passes each tape, “high-temperature” superconductors promised to fulfill superconducting at temperatures above that of liquid inch by inch, through two external magnetic fields, the dream of lossless power transmission. nitrogen. But it was a long shot for superconducting the first in the plane of the tape and the second The new compounds, however, were ceramic wire because on the microscopic scale, current would vertical to it, automatically measuring current flow materials, as brittle as chalk. To be used in wires not flow from one YBCO grain to another unless through each segment. Reduced current flow in and cables, whether above the ground or under it, the two grains were almost perfectly aligned, an they would have to be coaxed into a flexible form that arrangement not achievable through the powder-in- could stand up to real-world torture such as bending, tube manufacturing method. twisting, and the occasional lightning strike. STC’s Steve Foltyn, Xindi Wu, and Paul Arendt 2G Hot Wire The most promising superconductor was a copper all had experience growing thin films of YBCO for Today, YBCO wire has overtaken BSCCO, becoming oxide compound containing bismuth, strontium, electronics applications, and they did it on single- the second-generation (2G) superconducting wire and calcium, copper, and oxygen—BSCCO (pronounced crystal substrates—substrates in which the crystal the hope for the future. About 10 companies are making “bisco”). Silver tubes were loaded with BSCCO powder, lattice is continuous (no boundaries). The single- 2G wires longer and longer, and SuperPower leads the sealed, and drawn into long, thin filaments that were crystal surface served as a template for growing YBCO pack, having manufactured the first mile-long wire with then rolled into very thin tape. The tiny platelike crystallites that were aligned sufficiently to allow a high current-carrying capacity. BSCCO crystallites naturally formed a layered superconducting currents to flow easily. In 1993 the In 2006 a 100-foot cable made from YBCO wire was structure like mica, with their planes of copper and three decided to apply the same technique to making spliced into an underground superconducting BSCCO oxygen atoms (the layers where current flows) running YBCO into superconducting wires. cable in Albany and performed very well. Now YBCO parallel to the flat tape. They needed to grow the YBCO thin film on wire cables up to a mile long will be used in a new Through the 1990s this method produced longer and something flexible, strong, inexpensive, and available round of government-sponsored superconducting power longer tapes, and by 2001 American Superconductor in long lengths—in other words, on metal strips. But team members began making YBCO/YSZ-coated line projects in New Orleans, New York City, and Long was planning a production facility to make 10,000 metal strips are polycrystalline, with the crystal grains samples. By 1995 they had made a 1-centimeter-long Island. And Ashworth is set to try his overhead cable kilometers of tape per year for commercial applications. facing every which way, making them poor templates sample that carried current at over a million amperes idea with a 100-foot cable strung at Los Alamos. But BSCCO wire has two Achilles heels. First, for aligning YBCO grains. per square centimeter—1,000 times the current density On the development front, STC scientists are the metal used to form the tape must not react with Their search for a solution took the STC researchers carried by household wiring. now collaborating with SuperPower, American the superconducting material, and silver is the to a technique discovered in 1991: coating the When they announced their achievement, they Superconductor, and other companies to simplify cheapest metal that qualifies; therefore, BSCCO will polycrystalline metal with a single-crystalline-like were met with snickers. No one believed that their the design of 2G wire, get better control over the always be prohibitively expensive. Second, BSCCO’s surface that would serve as a buffer. The team tried 1-centimeter-long sample could ever be scaled up to processing, and improve performance in high magnetic current-carrying capacity in liquid nitrogen is very a method called ion-beam-assisted deposition, or commercial lengths. But they didn’t give up. By the fields. If 2G wire becomes cost competitive with copper low in high magnetic fields, so it could never be used IBAD, which uses a beam of argon atoms to bombard end of 1995, they had the growth process under control wire, it could eventually be in widespread use. in commercially attractive applications like oil-free a film of a YSZ (a yttrium-stabilized form of zirconium and could quadruple the length of their product. Ken Marken states, “DOE’s Office of Electricity transformers and high-efficiency motors, whose wiring oxide) as the film grows on a metal strip. IBAD causes By 1997 they had produced their first meter-long sees high-temperature superconducting wire as a must operate in high magnetic fields. misoriented grains to sputter from the surface, leaving superconducting tape—just over 3 feet. key enabler for high-efficiency power transmission a crystalline-like surface. A thin YBCO coating grown In that same year, they speeded up the process cables with 3 to 5 times the capacity of conventional on top of YSZ was able to carry significant current. by replacing the YSZ with a much thinner film of underground AC cables and up to 10 times the capacity Starting with funds from the Laboratory Directed magnesium oxide (MgO), which could be laid down with of DC cables. Given the immense potential of this wire, Research and Development program at Los Alamos, IBAD much faster. Foltyn says, “Magnesium oxide has we need to face the remaining challenges and support a better texture than YSZ for achieving alignment of the research to overcome them.” v the YBCO grains. So MgO made the tapes cheaper to —Necia Grant Cooper manufacture and improved their performance.” A SuperPower cable Y yttrium By 1999, the STC team had a continuous process with YBCO su- Y Ba barium that produced meter-long, superconducting-coated Ba Cu copper perconduct- YBCO conductors with very high current-carrying capacity. Cu O oxygen Buer O It wasn’t long before a leading high-temperature At the atomic superconductor company negotiated a license to adapt Polycrystalline Metal level, YBCO has the technology for commercial purposes. That same company eventually created SuperPower. at a layered struc- ost cry YBa Cu O (.3) d 2 3 7 le ture. Current flows al w n - ge Quanxi Jia (left) and his colleagues have focused le ro along the copper- b it u n o id D u on reducing the number of buffer layers, an im- iq L portant step toward low-cost 2G wires. Leonardo YBCO wire has a polycrystalline metal substrate (gray), a crystalline Civale (right) has shown that the right distribution MgO buffer layer (yellow), and a layer of YBCO grains that align of imperfections grown in the YBCO layer will r with the MgO crystalline structure. The buffer layer may have pe 1663 los alamos science and technology magazine july 2009 op 4 C as many as five sublayers to prevent diffusion of impurities, 5 In the war between network professionals and reproducing programs that send themselves through a computer , the professionals know they have network from one computer to another. Other types of little advantage over their hacker adversaries, who malicious software () arrive attached to email, have roughly the same programming skills, use the encoded into documents or PDFs, or in the form of a same software, speak the same language, and know the Trojan horse, a program that carries another “hidden” same tricks as the professionals. program, often harmful, that is ready to be activated by The unending battle for The professionals also know that their current an unwary user. role is a defensive one, reacting to hackers’ attacks The Laboratory’s primary defense is its “firewall,” a CONTROL instead of mounting an offense against them, their sophisticated program that intercepts and inspects all formidable defenses doing little to stop the onslaught. incoming communications. The firewall is continually Most of all, the pros know they can’t stop fighting maintained and improved by a large contingent of More than employees and authorized visitors seek entrance to Los Alamos. back. Once an outsider has gained access to secure network, systems, and day-to-day operations people. Computer hackers are always trying to break in, but the Laboratory fights back files, the information in those files, whether personal Hackers, however, can be remarkably adept at finding against their “worms,” “Trojan horses,” and other forms of malicious software. information or state secrets, is forever compromised. ways to get through the barrier. The need for constant vigilance is especially true at “The firewall tends to drive the evolution of more- Los Alamos National Laboratory, whose famous name, sophisticated attack strategies,” says Alex Kent, the substantial Internet presence, state-of-the-art computer head of the Advanced Computing Solutions Program systems, and huge stores of proprietary information Office (ACS-PO). “As a result, firewalls get breached make it a hacker’s dream target. more often than network administrators like to admit. Los Alamos fends off several million cyber attacks Unfortunately, the response is often to make the firewall a day, mostly from worms—highly virulent, self- more restrictive and systems less ‘user friendly.’”

Artist’s depiction of a hacker’s Trojan horse, attempting to

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 6 7 by a 14-year old Swedish boy who called himself “.” The details of that Super VTR: Reducing the Insider Threat incident won’t help any hacker but do give the uninitiated a taste of battle. In the summer of 2006, a young woman, trained “What we’re doing is connecting each user to a From August 2003 to March and sanctioned by the Laboratory to scan secret protected server 24-7,” says Kent. “All files and data 2005, Stakkato (and maybe others) documents into a computer, but behind in her work, reside on the server, and every calculation, all data compromised roughly 1,000 computers, allegedly wanted to catch up by taking work home. storage—everything—is done on the server. There’s including unclassified supercomputers She walked into a document storage vault, copied never any tangible classified material in the user’s belonging to Los Alamos, NASA, the U.S. secret documents to a removable flash memory office. An insider who tries to remove information military, the National Supercomputing drive, printed pages of secret material, placed the from the server instantly triggers an alert.” Center in Linköping (Sweden), and flash drive and copies in her knapsack, and walked many of the world’s leading universities and No users are allowed inside the S-VTR, which is out the door. Her actions were consistent with what corporations. But he started by breaking into just manned by special personnel trained to handle every cyber expert knows to be true: the greatest one, likely a Unix-based computer at a Swedish classified media. Any user who wants to physically university. From there, he was able to jump to other threat to computer and information security is the retrieve materials, must submit a request to an computers because he had found a way to steal insider—the person authorized to use the system S-VTR worker, who records the removal and return passwords. and/or access classified material. of the material. Eventually, few users will ever need Kent’s small ACS team has other ideas. It’s building On a Unix-based machine, the “ssh” protocol opens an understanding of the relationships between users, a secure (encrypted) connection between the user’s Mike Fisk, Scott Miller, and Alex Kent, of ACS-PO, to carry classified documents around because every technology, and security; tapping into new research computer and another one. The user can then log onto argue that the majority of insider attacks, and protected area will be connected to the server. and technology; and coming up with solutions that the second computer by entering an assigned username almost all inadvertent security violations, can be Materials will be printed onsite and destroyed after both enhance security and foster a more favorable and password. eliminated by concentrating classified materials into each use. work environment. Kent also takes every opportunity Stakkato modified the Swedish computer’s ssh a small number of rooms and conducting all aspects The print jobs themselves will go to a queue on the to leverage the unique problem-solving skills of protocol, turning it into a Trojan horse. Whenever a user of classified computing on centralized computer secure server and won’t print until the user swipes other Laboratory specialists, such as theoreticians, on the Swedish computer accessed another computer servers. Their plan, currently being implemented at his or her security badge in a reader attached to mathematicians, and statisticians. Says Kent, “My (say, computer B), the Trojan ssh surreptitiously the Laboratory, houses both the media room and the printer. The Laboratory is also looking into reward is having people come to me and say, ‘I think this recorded that person’s username and password as he server inside a physically secure, restricted-access technology for placing an individual bar code or idea I’ve had for my own work has got some applicability logged on. The Trojan then sent those credentials to a area known as a super vault-type room, or S-VTR. to the problem that you’re describing.’” third machine that the hacker could access. watermark on each page of the job. In both cases, One of those people is Joanne Wendelberger, a Using the stolen credentials, the hacker could log The existing fiber-optic network connects the S-VTR users will know they are accountable for what’s statistician with the Computer, Computational, and onto computer B on his own. Right out of the gate, to the numerous protected areas (scattered across printed, which will help prevent casual misuse, or Statistical Sciences Division and a relative newcomer he hid his tracks by disabling B’s history log (type the Laboratory) where classified work is conducted. clandestine abuse, of the material. to the cyber wars. “I had a view of cyber security as this “unset HISTFILE”). Then he looked for users with A staffer in one of those areas still uses a mouse, compliance-driven, necessary evil that made it difficult administrative privileges (they tend to own lots of monitor, and keyboard, but those devices aren’t for us to do our jobs,” she confesses. “But after looking system files) and identified other computers networked connected to a computer beneath the desk. Instead, at the threats, I understood why some policies get with B (look in the “/etc/hosts” file). Again using the they’re connected, through the network, to a server implemented. Then I wanted to help.” pilfered username and password, he tried logging onto Wendelberger and colleagues are beginning to apply each network computer and, if successful, got the new in the S-VTR. statistical methods to the analysis of network traffic machine to tell him all about itself (with the command streaming into the Laboratory. The large, time-ordered “uname”) and its users (the Unix “w” command). datasets need to be reorganized and analyzed in a way His goal was to find a computer (B or any other) with that identifies statistical anomalies. “Then we’d be in a vulnerabilities that would gain him administrative better position to characterize normal versus unusual control of the computer. His bigger goal was to steal the behavior,” she says. “Understanding why data deviates “root” password, which would make him a “superuser,” from normal might allow us to design a system that with total control of the computer. One technique recognizes an intrusion as it is happening.” he used was to deploy his Trojan ssh in a system administrator’s account, hoping the administrator A Hacking Incident would log onto a machine using the root password. Like every institution worth targeting, the In the end, he hoped to gain control of one of the Laboratory has been infiltrated. Kent keeps the details network file system (NFS) servers, computers where of those events close to his chest, but an exception is everyone on the network stores data files. Often he had the Stakkato incident, a sustained attack perpetrated to bootstrap his way and first control the computers continued on page 10

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 8 9 Visualizing a Worm But a different future may be possible because of from the network by switching off its network ports. the Secure Enterprise Network Consortium (SEN-C), It’s easier said than done. Los Alamos alone has over package developed by Danny Quist of the ACS- a partnership between Accenture, a global technology 10,000 computing devices tied to more than 33 square PO. That package automatically creates a graphic management company; industry-leading provider miles of network infrastructure. The semiautomated representation of the worm’s execution path (the companies Cisco, Sun Microsystems, and Computer software, however, is several orders of magnitude program’s flow chart). Because different subroutines Associates (CA); and Los Alamos, a premier national faster than other solutions, and after a year’s use at or program units have distinctly different patterns, security research institution. The SEN-C was formed the Laboratory, the response time to remove a worm the graphic provides a quick way to classify the because collaborative development is key to designing infection has been reduced from over 3 weeks to less worm and begin figuring out what it does. truly unified, secure information systems that are than 1 day. deployable across the country. Solutions such as NARQ are coming none too soon. The graphic shown here illustrates the structure of the V3 worm, which is likely to The SEN-C intends to do away with the usual Hackers are sophisticated and bold, and they grow A computer worm is a fully become the most widespread infection to date. “general contractor” model of systems development, more numerous by the hour. By compromising the compiled program that begins to The program unfolds from right to left. Each mark wherein a “service integrator” contracts with individual integrity of computers and the Internet, they literally execute once it enters a computer. along the lines corresponds to a small block of software, hardware, and network providers and threaten the foundation of our society. Not part of the computer’s file program steps, so a line of marks represents a constructs a customer’s product. Instead, a product will The good news is that there’s a heightened system and specifically designed sequential set of steps. Forks indicate decision essentially be designed, developed, and deployed jointly awareness of the cyber security problem on the national to avoid detection, the worm can be points and alternate ways for the program to by all members of the consortium, with Accenture level. President Obama’s announcement of a cyber difficult to find within the host system proceed. The tangle of loops in the middle shows overseeing and coordinating the effort. security coordinator is recognition that computer and even more difficult to reverse the many paths the worm can follow, depending Says David Seigel, the Laboratory liaison for the security is of central importance to the United States, engineer to figure out what it does. on instructions from its creator. The bundle on the SEN-C, “By coming together as one team, we can on a par with traditional military concerns. Laboratory scientists have devised a complete lower left is a spam engine, indicating that one maximize our R&D efforts, reduce the time it takes Short of disconnecting completely from the Internet, system for rapidly dissecting a worm. The worm is purpose for this worm is to send spam from the to deploy solutions, and thereby ensure that those there will always be a risk of hackers stealing allowed to infect a mock network computer containing infected computer to every email address it finds solutions are not obsolete upon installation because proprietary or personal information. Indeed, a tenet of analysis software that includes a visualization on the machine. adversaries have already designed around them.” cyber security is that you can never win; you only hope Los Alamos’ role will be to inject new technology and not to lose something today. Eventually, Los Alamos concepts into the SEN-C and to conceptualize defensive would like to disprove that belief and is prepared to that talked to the servers (the NFS clients). But once onto a Los Alamos machine. Apparently the user took measures as rapidly as hackers evolve offensive methods. create and deploy multidisciplinary teams of scientists he gained control of the server, his invasion was a short break and left his computer without closing the To do so will require that the Laboratory bring into the to help make it happen. Until then, the cyber war will complete, for he essentially ruled the local network. He connection, allowing Stakkato access to the Los Alamos cyber realm its expertise in data visualization, algorithm rage on, and the Laboratory stands ready. v then gathered more usernames and passwords, jumped machine. Once he had this foothold, Stakkato never development, statistical analysis, and high-performance to a new machine on a different network, and did it all left, discretely maintaining a connection to the machine computing. It will need to call upon its experience in —Jay Schecker again. even after the original user logged out.” modeling and simulating national infrastructures, along System administrators were lucky (as far as they Upon learning that it had been cracked, Los Alamos with their interdependencies, in order to place cyber know) in that Stakkato was more egotistical than closed all ssh connections from outside computers and security within the bigger picture of national security. malicious. For example, after an administrator tried mitigated several vulnerabilities, thus locking the (but failed) to eradicate the hacker from his machines, hacker out. A similar, Stakkato-type attack couldn’t To Turn the Worm Stakkato sent every user on the administrator’s happen today at the Laboratory. Accenture chose Los Alamos to join the consortium network an insulting message, but he didn’t destroy But Fisk stresses that hackers are experts at finding based on the Laboratory’s reputation for initiating any data. Still, the attacks cost millions of dollars, and exploiting new vulnerabilities and getting around inventive and effective solutions to cyber security. mostly for the time needed by administrators to check, firewalls. “And there will always be vulnerabilities,” he An example is the Network Automated Response and diagnose, and fix their systems. states matter-of-factly. “That’s just the nature of the Quarantine (NARQ) software, designed to shut down a computer beast.” worm infestation. Stakkato Hits the Lab A computer worm will enter a vulnerable computer, Stakkato’s infiltration of Los Alamos was different. The Secure Enterprise Network Consortium rapidly copy itself, and then send its clones out over a A few years before the attacks started, the Laboratory One reason cyberspace is so vulnerable is that network to infect other computers. Because the number had gone to a “one-time” password system. This when the initial Internet infrastructure was cobbled of worms grows exponentially, the network, or even security measure negated the hacker’s attack because together, no one foresaw the vast array of commercial large portions of the Internet, can become so clogged a user’s password (generated by a “cryptocard”) is valid services, variations of network hardware, and volumes that it has to be shut down. The cost can be enormous: for only one use. So the hacker adapted his strategy. of digital information that it would need to support, the various worms, launched in 2001, cost “He hid in a computer outside the Los Alamos integrate, and transmit. The infrastructure grew too businesses roughly $2.6 billion in lost productivity. network and monitored the user’s activities,” says Mike fast and became peppered with incompatibilities and NARQ efficiently stops the worms’ spread by Fisk of ACS-PO. “He then waited for the user to log vulnerabilities that are now easy pickings for hackers. locating each infected computer and then removing it

Alex Kent (left) and Michael Fisk are helping the Laboratory defend computer systems against mali- cious cyber attacks. The screen shows a graphic representation of attacks on Los Alamos. Blue and yellow splotches are clusters of computers’ IP addresses that were attacked during an incident. Analysis

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 10 11 It was 2002, and the Los Alamos SQUID team had a problem. The team had just invented and tested a helmetlike system incorporating the world’s most sensitive magnetic-field detectors: superconducting HAVE quantum interference devices (SQUIDs). Placed just above the skull, the SQUIDs measured magnetic fields generated by neural electrical currents in the brain and pinpointed the currents’ locations to within a quarter millimeter. Such spatial precision SQUIDS, would be good enough to guide doctors’ attempts to electrically quell or surgically remove “epileptogenic” tissue—the small, localized regions of the brain where epileptic seizures begin—but only if the reference frame in which the positions of this tissue WILL were measured could be made to closely coincide (coregister) with the reference frame of a magnetic resonance image (MRI) of the same brain. An MRI shows the detailed structure a surgeon needs to see. TRAVEL At the time, however, the two reference frames couldn’t be coregistered precisely enough because the images were being produced by two different instruments—the team’s helmet and a hospital MRI machine. Each instrument separately produced images with the required spatial precision, but a set of two images, one from each machine, could be coregistered to only 5 millimeters. When you treat epilepsy surgically, you want all the precision you can get. Brain tissue is highly folded and densely packed with neurons, so even a slight surgical misstep can have disastrous results. Or as Bob Kraus, former SQUID team leader, says, “If someone is cutting into your brain, you want them to Los Alamos know where to cut as precisely as possible.” researchers are using the world’s most A Magnetic Disparity The solution to the coregistration problem might sensitive magnetic- seem obvious: combine the SQUIDs and the MRI field detector to machinery into one instrument. The problem is that pinpoint seizure- hospital MRI machines use a powerful magnetic field that will destroy SQUIDs. generating tissue in SQUIDs are really the only way of measuring epileptics’ brains and the brain’s magnetic fields, with a technique called to screen carry-on magnetoencephalography, or MEG. These fields have a strength of about 1 picotesla, some 50 liquids at airports. million times weaker than Earth’s magnetic field.A SQUID can detect a magnetic field as small as half a femototesla, or one 2,000th of a picotesla. The helmet, the team’s crowning achievement after 20 Andrei Matlashov, a member of the SQUID team, with the years of MEG research, uses 155 SQUIDs arranged apparatus used to study magnetic resonance imaging at on a curved supporting surface that conforms ultralow magnetic fields. The copper coils that produce the generally to the top of the skull. magnetic fields are wound on wooden armatures to avoid the magnetic distortions caused by metal.

This research is supported in part by LDRD funding.

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 12 13 An MRI is created from measurements of nuclear measurement, the patient has to stay put, like a beauty Way Less Is More magnetic resonance (NMR) signals, which are shop patron sitting under a hair dryer. Then in 2002, the same year the coregistration magnetic signals emitted by certain nuclei—including For those reasons, in spite of the distortion, EEG problem stymied the SQUID team, a potential solution hydrogen nuclei (protons)—when their quantum- is currently the diagnostic tool of choice at epilepsy was announced by scientists in California. Berkeley mechanical “spins” are manipulated in certain ways. treatment centers, although the most-reliable, most- researchers published a paper describing the first use Since hydrogen is a major atomic component of water accurate results for diagnosing epilepsy are actually of SQUIDs to perform a new kind of MRI. In this new and fat (two of the body’s main ingredients), proton obtained by combining MEG and EEG, Kraus says. variant, proton spins are aligned by a relatively weak NMR signals are commonly used to produce images electromagnet that is turned on for only about a second. of organs, muscles, and so forth, that is, to produce Shutting Out the Noise Subsequent spin manipulations with even weaker MRIs. To produce a hospital MRI, some of the spins However, two new concepts the SQUID team pulsed electromagnets produce NMR signals that are are first aligned by the powerful magnetic field of a developed and then proved with the helmet could provide detected by the SQUIDs (see box, next page). large superconducting electromagnet, and therein lay significant improvements that make MEG’s use more The use of magnetic fields much weaker than that the team’s dilemma: an instrument combining MRI common. Both concepts aim to reduce the interference associated with traditional MRI led researchers to and MEG imaging would self-destruct the first time with MEG measurements caused by magnetic “noise,” christen the new discipline “ultralow-field” (ULF) it was turned on because the powerful magnet used that is, ambient magnetic fields such as Earth’s magnetic resonance imaging, or ULF MRI. This to produce MRIs would destroy the SQUIDs used to magnetic field and magnetic fields produced by power approach clearly provides a way for a single SQUID- produce MEG images. lines, electric appliances, and even passing cars. The based instrument to perform both MRI and MEG new concepts so effectively reduce ambient magnetic imaging and thereby solve the coregistration problem. Finding Aberrant Brain Tissue noise that MEG measurements can be made in a room Excited by this development, the Los Alamos SQUID Nonetheless, in and of itself, the MEG helmet that has only one layer of magnetic shielding instead of team repeated some of the Berkeley group’s results and is a stunning success. As a method of localizing two, as is usually required. A single-layer room is much soon went beyond them. epileptogenic tissue, MEG is completely noninvasive. simpler and therefore less expensive than is a double- In fact, the helmet’s SQUIDs do not even touch the layer room. From Brains to Cokes skull. And that’s a very good thing because, to operate, The first new concept is to use a lead sheet, shaped The team started its ULF MRI odyssey simply, they must be kept extremely cold—a few degrees above roughly like a conquistador’s helmet, to shield the using a single SQUID to measure the NMR signals absolute zero. To chill them out, the team immerses SQUIDs from ambient magnetic fields. When bathed of whatever happened to be lying around in the them in liquid helium that has been poured into a large Jonatan Mattson, a former graduate student on the SQUID team, in liquid helium, the same medium used to cool the laboratory—Coke, V8, and sports drink, for example. thermos supported by a sturdy gantry above a person’s inspects the helmetlike system the team developed to measure the SQUIDs, the lead sheet becomes a superconducting “Some of our ‘research’ was driven by idle curiosity,” head. The thermos is so well insulated that the outer tiny magnetic fields produced by the brain’s neural currents. “magnetic mirror” that reflects the ambient fields away Kraus admits. Whatever the motivation, the team soon surface—only an inch or so from the subject’s skull—is from the SQUIDs. found it was easy to positively identify a liquid from its at room temperature. The only other technique with comparable temporal The second concept is to use additional SQUIDs ULF NMR signal. The team filed these results away The helmet’s MEG measurements are also extremely resolution is electroencephalography, or EEG, which outside the shaped lead sheet to measure ambient and went on to other experiments. precise with respect to time. The SQUIDs have a uses electrodes taped to the scalp and parts of the face fields that are not completely reflected by the magnetic One early experiment measured an NMR signal and temporal resolution of about 100 microseconds—short to measure changes in electrical potential. EEG is only mirror. When the data are later processed, the a MEG signal from the same brain at the same time—a enough to distinguish between electrical signals that mildly invasive (the discomfort of tape and conductive residual magnetic noise is cancelled out by subtracting first step to using a single SQUID-based instrument to occur at almost the same time but arise from patches of gel) but has a more important problem. The signals the signals of these residual fields from the signals image both the brain’s structure and its MEG-derived epileptogenic tissue in different parts of the brain. it detects must pass through various types of tissue measured by the 155 SQUIDs. electrical activity. Within a couple of years, the team In fact, MEG’s temporal resolution is comparable to and the bone of the skull, all of which have different Initial tests established that the helmet’s novel had also used an array of seven SQUIDs to produce that of the “gold standard” for localizing epileptogenic electrical conductivities that distort the signals. The design put it well ahead of its time and that it was a ULF MRI images of a preserved sheep brain, a living activity—electrocorticography (ECoG), which measures distortion is worst near openings in the skull, such potential steppingstone to cheaper MEG systems that postdoctoral researcher’s hand, and a living team the electrical potential of electrodes implanted in or on as eye sockets and ears, and introduces errors in could be used to help more people who have epilepsy leader’s knees. the brain. However, ECoG has the clear drawback of measuring the locations of the epileptogenic tissue. In or other brain disorders. But there was still that pesky Increasing the number of SQUIDs—from one to seven, being about as invasive as it gets. contrast, magnetic fields measured by the MEG helmet coregistration problem. in this case—is one way to increase the “signal-to-noise” pass through the skull undistorted because there are no ratios of the NMR signals. A signal with a high signal-to- magnetic materials within a normal skull. noise ratio can produce an image with a given quality in “However, EEG is cheaper to use than MEG is,” a shorter time than can a signal with a lower ratio. Kraus says, “and patients can ‘wear’ EEG electrodes Last year, the team published a paper describing for a long time to permit near-continuous monitoring experiments in which they used seven SQUIDs to of neural activity.” In contrast, during a MEG capture the first ULF MRI images of a living human brain and, at nearly the same time, to record seven channels of MEG data as that brain responded to audio Images obtained with traditional MRI (left) and ultralow-field (ULF) MRI (right). The ULF MRI image is fuzzier because the signals used tones. Team members also considered using the SQUIDs to produce it have relatively more noise than those producing traditional MRIs. However, unlike traditional MRI, ULF MRI can be A bottle of Perrier about to pass, on a conveyor belt, into the heart done in the presence of metals, allowing a surgeon to operate and of MagViz, a ULF MRI machine developed for use at airport security view an MRI of his/her work at the same time. Moreover, ULF MRI portals. MagViz provides MRIs of airline carry-on liquids and can image some types of tissue better than traditional MRI can. identifies the liquids.

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 14 15 Harmless Investigate (A) Ultralow-Field MRI Magnetic or “threats,” even if the liquids are inside metal cans or Field About 63 percent of the atoms in the body are hydrogen, mostly in fat and water. metal-foil-lined containers. “This would be impossible Magnetic resonance imaging (MRI) measures the concentration of those atoms at many for traditional MRI,” says Espy. In tests last December points in the body and converts the data into a map, or picture, of the body’s tissues. at Albuquerque’s international airport, the Sunport, MagViz took under a minute to scan the liquids in six The hydrogen atoms can be detected because each atom’s nucleus—a single proton— Spin has a tiny magnetic field produced by the proton’s quantum-mechanical “spin,” as containers placed in an airport coin tray 4 inches deep.

Proton Parameter 2 shown in Figure A. Normally, the spins point in random directions (Fig. B), so the total Because it uses the weak pulsed electromagnets of magnetic field measured by a detector far from the spins is zero. MRI manipulates the ULF MRI, MagViz is also safer than a traditional MRI spins so the protons’ magnetic fields combine into a field large enough to be measured. machine would be in a crowded public environment. (B) The superconducting electromagnet used for traditional MRIs is powerful enough to violently suck up nearby Y The first step in this process is to align some of the spins in the region of interest with a relatively weak uniform magnetic field B (Fig. C). In ultralow-field (ULF) MRI, B is steel objects—sometimes with lethal effect, which is p p Parameter 1 X produced by an electromagnet that is turned on for a second or two. Figure D is a why hospitals carefully control what people wear or schematic drawing of the electromagnets that produce B (yellow) and another, much MagViz discriminates between harmless liquids and those requiring carry in and around their MRI facilities. p further investigation, by security personnel, based on a liquid’s weaker magnetic field B (gray), as well as three magnetic-field gradients G (red), G m x y position in a space determined by two ULF MRI parameters. (blue), and Gz (green), which are discussed below. The timing diagrams (Fig. E) show Scanning in the Boondocks, Etc. Z when the electromagnets are turned on and off relative to each other. MagViz’s pulsed electromagnets are also lighter, in the MEG helmet to simultaneously image brain smaller, and cheaper than the magnet in a hospital

Signals are obtained when Bp is off. The field Bm , which points perpendicular to the structure and MEG sources. They were well on their way MRI machine, which means MagViz’s basic design aligned spins, is applied to the region for a few seconds. The spins start rotating together to brilliantly solving the coregistration problem—when could be used to build portable, inexpensive MRI (C) (“precessing” in phase) around B with a frequency proportional to B ’s strength m m they were suddenly diverted by world events. machines for use in third-world nations and rural Y (Fig. F). The magnetic fields of the precessing spins combine to produce a net magnetic areas, as well as at aid stations on the battlefield. Such field, B , that is vastly larger than that of a single proton, but still much weaker than B NMR A “Slight” Side Trip a machine could even be used by emergency medical p B . This nuclear magnetic resonance (NMR) signal oscillates at the precession frequency m In August 2006 British authorities foiled a terrorist technicians to treat a patient and/or perform triage on and can be measured by SQUIDs located some distance from the spins. plot to set off liquid explosives onboard an aircraft in the way to the hospital, Kraus says. flight, and what is known in the air-travel industry as Team members are excited by the humanitarian The strengths of G , G , and G vary linearly with distance in the x, y, and z directions. x y z the “3-1-1” rule was born. All carry-on liquids are now potential of portable MRI and by the fact that ULF MRI Z The total magnetic field then has a slightly different value at each point, so the spins limited to 3 ounces each and must be packed together could jump-start MEG research. But first they must at different points precess at slightly different frequencies. A 3-D map can be produced because each tiny measurement volume in the patient’s body produces an NMR signal in a single quart-size plastic bag—one per traveler. The finish MagViz. DHS doesn’t want the technology to be with a unique frequency that is determined by the volume’s position. delays and inconveniences caused by this rule have commercialized until it can scan an unopened piece of (D) Y been irking millions of air travelers ever since. luggage 1 foot deep in less than 1 minute. As time passes, very slight differences in the frequencies of the spins’ rotations, arising One particular air traveler, Michelle Espy, the The team is working hard to reach that goal and feels Gy from interactions with neighboring spins, cause the spins to rotate out of phase with current head of the SQUID team, would like to see it will succeed in another year or so. When that day the rule go away so she can take fruit juice on the comes, air travelers around the globe—especially Espy’s Gz each other, so BNMR fades away. For BNMR to be measured, the spins’ rotations are plane when she travels with her two young children. kids—will be deeply grateful, although most of them Bp reversed by reversing Bm. As the spins come back into phase and then fall out of it X again, they produce a measurable “echo” signal (bottom of Fig. E). The time it takes an She’s also one of the few people in the world who can will not know that the odious 3-1-1 rule was finally echo signal to rise and fall gives the first of two characteristic times used to distinguish probably do something about the rule, thanks to the toppled by brain research. v between different types of tissue or different chemicals. team’s old data on Coke and other liquids. Suddenly Z what had once been playfulness in the laboratory took —Brian Fishbine Gx The second characteristic time arises from the fact that after Bp is turned on, the spins take on a very serious purpose that drew the attention of the

some time to realign. To measure how fast they do, Bp is turned on and off in the usual Department of Homeland Security (DHS).

way, and then an echo signal is measured at a time tr after Bp is turned off. This procedure Well aware of the 3-1-1 rule’s unpopularity, DHS is Bm is repeated for several different values of t . The second characteristic time is obtained r actively seeking ways to modify or rescind it. So when a from a plot of the peak of B as a function of t . NMR r Los Alamos program manager briefed Washington on the team’s successes with ULF MRI, the department came BNMR (E) (F) calling. Could ULF MRI be used to screen carry-on liquids Bp at airports? Soon DHS was funding a major program at SQUID Bm Los Alamos to develop a technology called MagViz. That program has occupied the team for the last two Gx years, and the results have been spectacular. MagViz provides MRIs of the scanned liquids and, at the same Gz time, identifies them and classifies them as harmless

Gy Former leader of the SQUID team, Bob Kraus is the deputy program director of the Los Alamos Laboratory Directed Research and Bm Development (LDRD) Office. Michelle Espy (not shown) currently Signal heads the SQUID team. Time

1663 los alamos science and technology magazine july 2009 16 17 18 the Bushadministrationcutoff ourpart ofthe 1994tries’ uranium pathtothebombwhileobservingtwocoun- and theU.S. tensionsrosebetweenNorth KoreaThen inOctober2002, nuclear proliferationissues. Pakistan togetherwiththeU. S., ,China todiscuss and in CISAC’sNation Project, Five- which broughtIndiaand metobeatechnicalBomb. Back hehadasked expert in2002 Stanford. John isaChinaexpert andauthorChinathe of Hecker: 1663: S example of a situation in which our expertise becomes useful. involved whenever we’re needed, and Ministry ofForeign Affairs. Hecker andAmbassadorLiGun,director oftheNorthAmericanBureauKorea’s Hecker: you’re intotheNorth Korean situation. ests inyourworkwithRussian nuclearscientists,butnow 1663: Sig,youstarted combiningtechnical andpolicyinter many of us from

1663 DIALOGUE o howdidyougetinvolved?

Y Through John L Hecker isamemberoftheNonproliferationpanelNationalAcademies’Committee

beginning in2004.Herehediscusseshisfirsttripandthewaytechnicalexpertiseof on InternationalSecurityandArmsControl.HehastraveledtoNorthKoreafivetimes, es, in the spirit of reducing the nuclear danger, los Agreed Framework tofreeze theplutoniumpath, 17 yearstosecurethevaststockpileofex-Sovietfissilematerials.Hiscurrentinterests Siegfried Hecker,co-directoroftheCenterforInternationalSecurityandCooperation include nuclearIndia,Pakistan,NorthKorea,andtheaspirationsofIran. Laboratory, hasworkeddirectlywiththeRussiannuclearlaboratoriesforlast After accusingtheNorth Koreans oftakingthe

alamos (CISAC) atStanfordUniversityandformerdirectorofLosAlamosNational L our nationallabsopensdoors,providingabasisforbuildingcooperation. A Trip to os A lamos and the other national labs get

ewis, apoliticalscienceprofessorat science

and

N technology orth Korea is a great Nuclear NorthKorea Agreed Frame-

magazine - Y T ments areatloggerheads. ficial dialoguetomaintaincommunicationswhengovern- called a “track-two” dialogue,anongovernmental, nonof- Pyongyang, theNorth Korean capital,carrying onwhatis T Korea nineprevioustimes,gotaninvitation tocomeback. John L In lateNovember 2003, contained weapons-gradeplutonium. had beenstoredinacoolingpondsince1994. also begunreprocessingthereactor’s spent-fuelrods,which tower was visiblefromspace—butwedidn’tknowifthey’d tor they’d shutdownin1994—the steamfromthecooling they’d restarted the5-megawatt plutonium-producingreac- and say, “We’re goingtostrengthenour deterrent.” We knew Energy Korean responsewas toexpeltheIAEA(International of twocommerciallight-water nuclearreactors. Korea Japan andasked S work. Namely, heavyfueloiltoNorth westoppeddelivering

july ypically hewouldtalktodiplomaticandmilitarypeoplein ongbyon nuclear center, and John asked me to be his his be to me asked John and center, nuclear ongbyon his time the the time his

2009 gency) inspectors whohadbeentheresince1994Agency) inspectors N orth Koreans wanted John to visit their their visit to John wanted Koreans orth never wouldhave beenabletocome you, Dr. Hecker. Ifitweren’tforyou, I at theendofvisit, “I havetothank mats whoaccompaniedussaid tome In fact,oneoftheNorth Korean diplo- byon was off limitstoalmosteveryone. It was an important opportunity. 2004. 4, January on arrive to trip. scheduled Wewere S ing their nuclear facilities. facilities. nuclear their ing centri a between difference the know would who person the expert, technical director of of director former a that impressed were Koreans plutonium. making for tor reac a and uranium enriching for fuge tate tate D epartment also approved my approved also epartment outh Korea tostopconstruction ewis, whohadbeentoNorth os Los A lamos would be visit be would lamos Those rods

T The North A he he nd the U. the nd N Y orth orth Atomic ong- - S - - . W O L L E Y CHINA A E S NORTH KOREA Pyongyang the okay for you to go.” already talked to the White him that our trip had been leaked to the press, and he said, “ if you’re going to get in.” whether said, “Well, going to at home and said, “We just read in ary 2, the day we were to fly to T who was theseniorminoritymemberofcommittee. Frank Januzzi, principalstaffer forformerS of theS principal staffer forS separately butdecidedtojoinus.Onewas Keith Luse,the and twocongressionalstaffers whohadplannedtogo L Hecker: 1663: Who wentwithyouonthetrip? LintonBrookswantedpeople like metofindout. bottom linewas thatwedidn’tknowwhatthey’d done,and that stuff, butit’s information. difficult togetdefinitive themselves releasesomekrypton-85,andplanescansniff for when oursatellitesweren’toverhead. ing thembytruck. knowing itbyputting them insteel-linedcasksandtransport- diverted thoserodstotheirreprocessingcenterwithoutour gone,theNorththe inspectors Koreans couldeasilyhave backfilled with steel canisters withargon.Butinearly2003, helping torepackage fuelintostainless thehighlyradioactive been corroding inthecontainment pond,andwehadbeen from theNorth Korean reactor. SOUTH KOREA ewis andI;Jack Pritchard, aformerenvoy toNorth Korea; Seoul he press was also a constant presence. N A P A J F O A E S There werefiveofuswhotraveledtogether—John enate Foreign Relations Committee. I N ’ll be going to orth Korea. I ’m leaving for RUSSIA JAPAN They’d thetransfers onlyhavetomake enator Richard Lugar, thenchairman I s it true?” N T orth Korea because you never know hen C H hina today, and ouse and explained that S the NNSA (Nationaluclear But LintonBrooks,theheadof mouthpiece. purposes, thatI’d becometheir North Koreans forpropaganda that Iwouldbeusedbythe Department was concerned Hecker: learn there? interested inwhatyouwould 1663: Was ourgovernment to visit. Korean government areinvited oftheNorthnot evenmembers here.” S happened to the 8,000 fuelrods happened tothe8,000 wanted metofindoutwhathad I ecurity called The claddingontherodshad C hina, I did some fast thinking and USA Today o thisisaplacewhere Actually theState L Administration), The reprocessingsteps A inton Brooks to inform B A C t 7 a.m. on Janu

N enator Joe Biden, The otherwas I ews called me don’t know yet that you’re 1663 I gave The

los - I

alamos But theydidshowusalot. show youeverything.” that’s Ofcourse notwhathappened. Japan. Hesaid, “Because Dr. Hecker ishere,we’re goingto Korea, North Korea, theU.S., theRussian Federation, and The return trip. we agreedtoapressconferenceintheBeijingairport onour from thenewsmediacontinuedinNorth Korea, andfinally you hadalotofpublicitycomingoutBeijing.” Pressure our North Korean hostslaughedandsaid, “We understand airport beforewetookoff forNorth Korea. When wearrived, to avoid them. chasingThe presskept usdownnomatter howhardwetried who nowheadstheSix-Party The nextdaywemetwith Vice MinisterKimKye Gwan, immediately knewthatthiswouldbeanimportant meeting. North Korean MinistryofForeign sador LiGun,directoroftheNorth style customs. We weregreetedbynoneotherthan a 1950s-style airport inPyongyangandwentthroughS Hecker: We arrived on 1663: What kindofgreetingdidyouget? National Laboratoryinsteadofapoliticalscientist. byaformerdirectorofL that messagedelivered paying ussomerespect.” and wehavethebomb.Nowthatit,yououghttobe outthesefuelrods,we’vetaken reprocessedtheplutonium, about buildingadeterrent. Hecker: Ithinktheywanted ustoknowtheywereserious 1663: Why didtheywant thecoverage? we wanted ourtriptobebelowtheradar. because in the end that’s actually what they wanted, whereas Statue ofKimIl-sung, founderofNorthKoreaand fatherofKimJongIl. North Koreans got a big kick out of all the news coverage

science At least100 reporters werethere. They wereatourhotelinChinaandthe

and

technology Air Koryo, theNorth Korean airline,at And theywerequitehappytohave Their messagewas, “L T alks thatinvolve China,S Affairs, soJohn L American Bureauatthe

magazine

os july ook, we’ve ewis Alamos Ambas-

2009 oviet- outh 19 A day later all of us, along with Ambassador Li Gun and shown me facilities that are certainly adequate to make the “plutonium” and, with the gloves still on and my hands ex- about five others from the North Korean ministry, piled into plutonium, but I haven’t actually seen any plutonium,” to tended, asked Director Ri, “Can I get my hands monitored?” two Toyota Land Cruisers and rode off to Yongbyon, about which they said, “Do you want to see our product?” Now, I hadn’t seen a single detector of any sort anywhere. He 60 miles north of Pyongyang. We arrived at a guest house you don’t just go get some plutonium at the spur of the agreed, and in a few minutes, two technicians came back and were greeted by Ri Hong Sop, the director of the nuclear moment. They had obviously thought all this through. with a little radiation counter. facility. Director Ri was our host throughout the visit. He car- ried on the chief technical discussions with me and was very In less than 5 minutes, they brought in a red metal box and One technician turned on the electronics, and the counter knowledgeable. placed it on the table. Inside was a white wooden box with a went brrrr, which is typical if a counter hasn’t been used for a lid that they slid off to show me what looked like two glass long time. My American colleagues stood back, looking wor- 1663: What did they show you? marmalade jars with screw-on tops. They said that one con- ried, and the other technician must have said something like, tained 150 grams of plutonium oxalate (a yellowish greenish “Get the plutonium the hell out of here!” So the other techni- Hecker: In the morning, we saw the production reactor and powder—a precursor to plutonium metal) and that the other cian took away the box with the jars, and the counter settled its control room, where we could see that the reactor defi- held 200 grams of what they said was plutonium metal—a down. It didn’t pick up anything from my gloves, but it was nitely was operating. Then they took us to another building, funnel-shaped piece with a wall about one-eighth of an a Geiger counter, which detects gamma rays and not alpha to the pool where the spent-fuel rods were stored. It was a inch thick. In 1992 they declared that all the plutonium they’d particles, so the lack of a reading didn’t necessarily mean big pool, about 130 feet long and 24 feet deep, with canisters ever made was 62 grams. They showed the IAEA inspectors the gloves weren’t contaminated. I carefully peeled one off, stored row after row and two layers deep in a metal grid. As about 90 grams of plutonium oxide that contained that much inside out, and used it to peel off the other one. I never did I looked down into the pool, they said, “Look, the fuel rods plutonium in 1993. get to check further because there were no other counters to are gone,” but it looked like only one-third of the grid spaces be seen. were empty. About one-third held canisters with their tops The metal piece in the jar was the right color—dark gray missing, and another third had canisters with their tops still black—and the rough surface suggested that it had been cast 1663: Was that the end of your first visit toY ongbyon? on. It was the only place where I was uncomfortable in terms in a graphite mold, not machined. Because it was thin walled, of health and safety. There must have been nasty fission I knew right away it was alloyed, ductile plutonium (delta Hecker: Yes. Back in Pyongyang, Ambassador Li Gun said products around. We had dressed up in protec- plutonium) and not pure plutonium (alpha plutonium), which to me, “Well, now you know we have a deterrent.” And I tive smocks and booties, but there was no is brittle. They let me hold it, after bringing me Playtex kitchen repeated my statement that you need three things for the radiation barrier. gloves to wear, and when I lifted the jar with the metal piece, it deterrent. I said that I still wasn’t sure it was plutonium I saw Hecker (center) listens to Chief Engineer Ri at the spent-fuel pool . was heavy but only slightly warm. “Director Ri,” I said, “it’s not but that I certainly had seen that they have the people and Then they sat us down in a conference room. very warm.” He smiled and said, “Well, Dr. Hecker, that’s be- the facilities to make it. Five of us sat on one side of a large table, and at me and said, “Well, why don’t you pick one of the closed cause the plutonium-240 content is low.” Plutonium with a low five of them sat on the other side.T here were canisters, and we’ll open it up.” So we went back to the pool, content of the isotope 240 is good bomb-grade material, and Among ourselves we immediately started thinking about always about 10 or so of their people with us. and I indicated one seven rows up and three columns over. it’s also less warm. So I asked, “How low is it?” and Director Ri what we would say to the media waiting for us in Beijing. Some were from the General Department of Technicians walking along the edge of the pool used special said, “Well, Dr. Hecker, I’m not authorized to tell you that. Why Keith Luse suggested that Senator Lugar ask me to testify to Atomic Energy (the most senior of whom was tools to move the canister to an underwater work station, don’t you ask the IAEA. They know.” Congress, and I realized that if I told the media nothing until the head of its International Department), and where they loosened all the bolts and took the lid off. They my congressional testimony, I could make sure the media The 5-maga- others were security people. None of them brought over a light to illuminate the inside of the canister, “But why this shape?” I asked, and the director said, “It’s a got it right. I would be presenting my findings in writing. watt reactor ever spoke. and all I saw was some crud down at the bottom. So I agreed scrap piece from our most recent casting.” They may have And that’s exactly what I did. In Beijing I told the reporters building at Yongbyon. it was empty. Then at my request, they took me around a bar- cast it especially for me to demonstrate that they can cast Director Ri said, “Okay, now we’ve shown rier to the back of the pool, where I saw empty canisters that something thin walled. That would be proof to me that they you that the fuel rods are gone.” I said, “Well, I can’t really seemed to have been hastily discarded in the water. have significant plutonium fabrication capability. say what’s in the closed canisters.” So the director looked After lunch, we went to the reprocessing facility, where they Then I asked about the density of the piece. And the director said they had reprocessed the fuel, beginning in February said, “Between 15 and 16,” which was an incredibly clever 2003 and finishing by June. None of the material was there, answer because he was telling me it was alloyed (alpha pluto- but they showed me the hot cells, the sealed chambers nium has a density close to 20) but not giving away how much where they had presumably removed the plutonium from of the alloying element it contained. A more exact number, the rest of the spent fuel. As we walked through, I asked for like 15.76, would have given me that information. I raised my details about their separation chemistry, which they gave me, eyebrows, and he said, “Well, it’s alloyed.” “But alloyed with and then we reached a door we were not authorized to pass what?” I asked. “Well, Dr. Hecker, I’m not authorized to tell through. It wasn’t until 2007 that I learned that the plutonium you that, but you know something about plutonium. It’s the facility was through that door. same stuff you use.”

We then went to a nearby conference room, and they said, 1663: This is so amazing. “Now we’ve shown you our deterrent, Dr. Hecker.” And I said, “Well, no, you really haven’t. To have a deterrent, you must Hecker: Yes, but not amazing in that he knew what we have the plutonium, you must make the bomb, and then use. It was amazing for a North Korean to express that Director Ri (right front) guides Hecker through the reprocessing Hecker visits the Yongbyon reactor control room. you must have the means to deliver the bomb. So far you’ve sort of sense of humor. At that point, I gave back the jar of facility at Yongbyon.

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 20 21 He said, “I had hoped you would be able to say more than Hecker: Yes, and during the second or third visit, they were that. But I understand that as a scientist you have to say essentially saying that I was their technical guy for getting it the way you saw it. When you give testimony, tell them nuclear matters communicated to the outside world. In 2005, everything you just told me. Don’t add or subtract anything.” during an impasse in the denuclearization negotiations, Kim That’s what he said, right there at dinner. Kye Gwan said, “We’re going to have you back to help us try to make progress. And if we make progress in the negotia- In my congressional testimony, I never did say for sure that tions, then we’re going to have you back because we’ve got Fruit vendors at the Tong il Street Market. I’d seen plutonium. I just said it looked like plutonium. By a lot of work to do on denuclearization.” That was incredibly the time I wrote a paper for The Bridge, the National Acad- candid, and our conversations have continued in that vein. emy of Engineering journal, in May, I was able to say that it was plutonium. By then I had gone back to Los Alamos and 1663: Have you invited him to this country? met with Howard Menlove, a Los Alamos safeguards expert who’s been tracking the North Korean program for 17 years. Hecker: Kim Kye Gwan visited the Bay Area in 2007, and He used a plutonium-238 source with the equivalent gamma there was a whole army of newspeople waiting at the San activity of 200 grams of plutonium-239 and the same heat Francisco airport. John Lewis had scouted all this out and Students at the University for Foreign Studies in Pyongyang, output to duplicate everything I’d seen. At that point I was worked with the FBI internally, and they got Kim Gye Gwan February 2008. convinced that the North Koreans had actually shown me from the tarmac into a limousine and ushered him away. The plutonium. news media followed, but at our destination, the FBI pro- vided protection. give Kim Kye Gwan the paper over dinner in a nice Bay Area In looking back it’s clear that the North Koreans were com- restaurant. I said, “Vice Minister Kim, you’ve shown me a pletely prepared. They must have decided that, within a A paper I had written with one of my students was going to lot of things in North Korea, and so I’ve written a paper with certain envelope, the technical people at Yongbyon should appear on the day that Kim Gye Gwan was going from the a student of mine to answer the questions that folks in this A live performance of gymnastics and dancing. just answer my questions fully and honestly. But they were Bay Area to Washington, D.C. In it we had laid out our best as- country ask. We believe the greatest single risk is your co- not to let me get past the edge of that envelope. Also, they sessment of the nuclear situation in North Korea and conclud- operating with .” He took his glass of red wine, picked it had carefully decided what they had to show me to convince ed that our greatest concern was cooperation between North up, and said, “You’re right, Dr. Hecker, we should avoid that.” me that they have the bomb. Korea and Iran—diversion of plutonium or nuclear technolo- Just like that. gies to Iran. The North Koreans really know uranium metal- 1663: Why were the North Koreans so determined to con- lurgy and know how to make uranium fuel. Well, Iran would Now, this conversation was around the beginning of March vince the United States they have the bomb? love to know the uranium metallurgy because if they’re going 2007, before anyone knew that the North Koreans had built a to build the bomb, they’ll go the uranium route. reactor in Syria, and of course Syria and Iran have many ties. Hecker: To them we were, and are, an existential threat. They reasoned, “Saddam Hussein didn’t have the bomb, and look After checking with my Stanford colleagues, I decided to The North Koreans built this plutonium-producing reactor in what happened to him.” the Syrian desert where there were no reprocessing facilities to extract the plutonium and no fabrication facilities to make On our trip we met an army general who had been head the fuel. Who was the customer for that plutonium? There are of the DMZ for 30-some years, and he said outright, “We actually news reports now that Iran paid North Korea to build know you’re going to bomb us, and in fact, we believe that that facility. So my greatest concern today is still a potential A February 2005 performance at Children’s Palace. you’re going to use nuclear weapons on us.” Most of the collaboration in nuclear and missile technologies between folks I dealt with were from the Ministry of Foreign Affairs, North Korea and Iran. that I couldn’t tell them anything until after my testimony, but I would not be surprised if my visit was approved by and then after the January 21 testimony, I met with them and Kim Jong Il. The North Koreans watch our politics extremely 1663: At the time of your conversation, did you think he was said, “Look, here’s what they told us was there, here’s what I closely. They know how our government works better than a being candid with you? found, and here’s my assessment.” lot of Americans do. They depend on that knowledge for their existence. Hecker: No, I know that the North Koreans never tell you the But back to the night of our visit, at dinner Vice Minister Kim whole story. That’s why you have to see them many times in Kye Gwan wanted to know what I thought of Yongbyon. 1663: So they were disappointed? different settings. I always assume that all the North Koreans, I told him that before giving my testimony in the Senate, I’d even the technical people, are extremely disciplined about say nothing to anyone except him. Then I went through my Hecker: Yes, but they invited me back the following year. getting their country’s message across. Whereas the Russians, observations for him: yes, I’m convinced that the fuel rods are Actually, they never specifically invite you back. John Lewis when I was speaking with them, were more like Americans, gone, and yes, I believe that you’ve reprocessed the fuel rods. just goes back and says that we’re ready to go back in. So far, speaking their own minds rather than the official line. I’m still not absolutely positive that what I saw was plutonium, I’ve been there six times, every year starting in 2004. What’s and even if it was, I couldn’t know if it’s the plutonium from important to them is that I told them what I was going to say Nevertheless, we need to talk to these folks at every op- this reprocessing campaign without testing samples of it. and then did exactly that. I didn’t make up anything. That’s portunity. They already know everything that we do because And as far as deterrent goes, I repeated that there are three what you have to do. they have thousands of people studying the Congressional things needed for a deterrent. “You showed me something Record. So if we get an opportunity to sit across the dinner credible for the first part but nothing for the other two.” 1663: You earned their respect. A popular food kiosk in Pyongyang. table, we learn so much, not anything specifically set aside

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 22 23 as secret, but you don’t need to know represent a direct threat to the U.S., How to Brake an Epidemic all the secrets. but the potential transfer of nuclear technologies to Iran or other countries This spring’s swine flu outbreak, 1663: Did you anticipate the turn of does. So, it looks like we are in for which quickly affected several countries, events over the last few months? another negative cycle. At the end of had the news media calling Theoretical the February visit, they told me that Division scientists Tim Germann and Hecker: Over the past 5 years, we’ve we had better get used to their being a Catherine Macken to ask, “How do you the Unitedspot States and 214 other countries. do computerlight modeling and make follow- watched the pendulum of power nuclear power. slow an epidemic?” With other models, they are evaluating up observations of stars that swell and swing back and forth from the Minis- Germann and Macken had used medical supply logistics and the impact shrink, brighten and dim because of internal try of Foreign Affairs to the military. 1663: You’re spending a tremendous sophisticated supercomputer models to of such measures as closing schools, changes. Simmons will lend his expertise in The military obviously has had the up- amount of time and energy working simulate viral transmission through restricting travel, encouraging self-isolation, applying new modeling codes. per hand recently, especially regard- on nonproliferation issues. Why do city- and country-size populations while and using antiviral drugs, vaccines, and ing testing. The Ministry of Foreign you do it? gauging the impact of mitigating strategies. protective masks. NISAC is also using Affairs is probably against testing The results, published in the Proceedings models of the U.S. health care system to Sig Hecker at a Los Alamos conference in 2009. because they know it upsets China, Hecker: I’m not the only one who does of the National Academy of Sciences evaluate the implications of these measures and the Chinese are really important to North Korea. it. Many people from Los Alamos are involved in such USA (2006 and 2008), showed that school on hospital capacity in an emergency. work. We feel a great responsibility about nuclear weapons closings, careful hygiene, and antiviral Beyond NISAC, many Laboratory If you read the September 19, 2005, Joint Statement on the because they started here, and we’ve developed most of drugs were most effective staff members have long researched Denuclearization of the Korean Peninsula, which is the guid- the weapons currently in the U.S. stockpile. Los Alamos Although the simulations dealt with influenza, and Gary Resnick, leader of the ing-principles document for the Six-Party Talks, the one thing is the nuclear Mecca, and people listen to us, all over the avian flu (the H5N1 subtype) rather than Bioscience Division, has proposed that you take away from the Chinese side is that they want peace world. They respect what we have to say. swine flu (H1N1), they were still relevant Los Alamos integrate these disparate and stability on the Korean peninsula. Nuclear weapons, per because, as Germann explains, both activities—studies of everything from the se, don’t bother them that much unless their presence gets I’m reminded of a conversation I had in 2008 with then forms move similarly through a population. virus’s genetic/molecular characteristics the Americans upset enough to do a regime change in North ex-Director Ri Hong Sop and the head of the International But this year’s outbreak has redirected to its epidemiological behavior—into a Korea. That would put the Chinese in a very difficult position Department in the North Korean Ministry, whom I had met society’s attention to H1N1, and the Laboratory-wide effort. Photo taken April 8 of a small portion of because they have a mutual defense agreement with North on my first visit. I wanted to talk to them about worker questions about how to fight it will not stop With such an approach, says Resnick, Kepler’s field of view, showing stars in the Korea. reorientation, what might happen to the employees of the because swine flu may return this coming Los Alamos could have both a national and constellation Lyra. nuclear facilities under a denuclearization regime, and they fall and winter. an international impact. His proposal will In truth, the Chinese were willing to sanction North Korea said the subject was off limits—premature. I said I wanted certainly keep the phone ringing. Additionally, as part of the Kepler Guest after their first nuclear test and after their missile tests but in to give my ideas anyway, so we spent two hours together, Observer program, Guzik will observe 14 a less severe way than the Americans and Japanese wanted. and during that time, the head of the International Depart- stars that, in temperature and mass, are But their intent is not to bring North Korea to its knees but ment remained expressionless, stoic. Later, when we got on the cusp between two types of variable Measuring the Variable Stars to bring North Korea back to the diplomatic table, and it did back to Pyongyong, he stuck out his hand, and said, “We stars, delta Scuti and gamma Doradus, that. On the other hand, the Bush administration, during really appreciate what you’re trying to do.” which pulsate over different time scales: 2005/2006, wanted to do the opposite. “Teach me your mood, O patient stars!” a few hours (delta Scuti) because of the That’s the sort of impact you can have if you’re from the wrote poet Ralph Waldo Emerson, but four Los ionization of helium near the surface and 1 The Chinese say, “The main difference between you and us, Laboratory. Whether in Kazakhstan or North Korea or India, Alamos scientists hope to learn much more, to 3 days (gamma Doradus) because, as the is that we do sanctions in order to have diplomacy. You do the name “Los Alamos” opens doors. Everyone can do courtesy of NASA’s Kepler space telescope, Los Alamos team has proposed, of emergent diplomacy in order to have sanctions.” something to save the world, and if you’re from launched March 6. Joyce A. Guzik, Paul radiation being blocked at the bottom of deep Los Alamos, you can do even more. Bradley, Arthur N. Cox, and Kim Simmons are convection zones. 1663: How do you assess the present situation after the Prevalence of influenza cases— part of the multinational Kepler Asteroseismic “A ‘hybrid’ star, having both time scales, nuclear test of May 25, 2009? 1663: Your commitment seems to have a very personal low (blue), moderate (green), Science Consortium, which will analyze data should be difficult to find,” says Guzik. The flavor as well. and high (red)—in a from Kepler over the next 3.5 years. delta Scuti stars may not have deep-enough Hecker: We were back in North Korea in February 2009, and Kepler will measure the light from more convection zones to produce days-long that visit foreshadowed what has happened since. This time Hecker: Yes, it does. This country took me in as a teen- That possibility has the attention than 100,000 stars in part of the Milky Way, pulsations, while most gamma Doradus even the Ministry of Foreign Affairs towed the hard line. They age kid from and did so much for me. I feel I of the Department of Homeland mainly to find out if some have Earth-size stars should have such efficient convection told us they would launch a rocket and halt the disable- ought to pay it back. My association with Los Alamos Security (DHS), so at DHS’s request, planets. Such “exoplanets” (outside our that helium ionization can’t cause short- ment of the Yongbyon nuclear complex. They launched the helps me do that. v the Laboratory’s National Infrastructure solar system) would be found through term variations. Nevertheless, some recent rocket in April, got a slight slap on the hand from the United Simulation and Analysis Center (NISAC) is the “transit” method—detection of light publications have reported observations of Nations, and then walked away from all agreements. It was completing a 30-day study of H1N1, running variations caused by an orbiting planet’s up to four potentially hybrid stars. clear to us that they would reprocess more spent fuel and —Necia Grant Cooper and Eileen Patterson new simulations of how the virus may passage in front of the star, as seen from the Guzik wants to find such stars for herself. conduct another nuclear test. The May test was more suc- behave if it reappears this year. spacecraft. If they exist, they will be particularly useful cessful than the one in 2006 and, hence, gives them greater In work that began June 8, NISAC The Los Alamos scientists will focus for probing the stars’ interior structure and confidence in their small arsenal.T hat arsenal still doesn’t scientists are using epidemiological models on the stars themselves. Guzik, Bradley, testing stellar pulsation theories. to track the potential spread of H1N1 through and Cox are on working groups that will —Eileen Patterson

1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 24 25 ISSN: 1942-6631 Presorted Standard Address mail to U.S. Postage Paid 1663 Albuquerque, NM Mail Stop M711 Permit No. 532 Los Alamos National Laboratory Los Alamos, NM 87545 email: [email protected] Tel: 505-667-1447 Fax: 505-665-4408 www.lanl.gov/science/1663/

Frank Addessio of the Theoretical Division enjoys an early summer ride along the Valles Caldera National Preserve, west of Los Alamos.

Principal Associate Director of Science, Technology, and Engineering—Terry Wallace

Editor-in-Chief and Writer—Jay Schecker

Science Editor and Writer—Necia Grant Cooper

Story Editor and Writer—Eileen Patterson

Science Writer—Brian Fishbine

Art Director—Gloria Sharp Los Alamos National Laboratory, an affirmative action/equal Illustrator and Designer—Donald Montoya opportunity employer, is operated by Los Alamos National Security, LLC, for the National Nuclear Security Administration of the U.S. Photographer—LeRoy N. Sanchez Department of Energy under contract DE-AC52-06NA25396. Printing Coordinator—Lupe Archuleta A U.S. Department of Energy Laboratory LALP-09-028 Distribution Coordinator—Jeanette Gallegos

Advisory Board—Jeff Berger, James Rickman, Kim Thomas Printed on recycled paper