Nuclear center waits over a year to report cyber-attack.THE ASAHI SHIMBUN. May 19, 2016, http://www.asahi.com/ajw/articles/AJ201605190028.htmlAccording to an online document outlining responsibilities, Japan's Nuclear Material Control Center (NMCC) is the “Designated Organization” for information treatment, inspection activities and sample analyses (http://www.jnmcc.or.jp/pdf/nmcc-punf-en.pdf p. 3)
Computer hackers infiltrated a server installed at a facility that oversees handling of plutonium and other nuclear materials, but the breach was not reported for over a year because officials thought it wasn’t serious.
The government-affiliated Nuclear Material Control Center acknowledged on May 18 that the server at one of its facilities in Tokai, Ibaraki Prefecture, was used as a relay point in a cyber-attack in February last year....
On Feb. 19, 2015, an outside information security firm notified the center, “Your server is being used as a relay point in a cyber-attack that is sending high volumes of data to an outside target.”
The center changed the settings on its server the following day to prevent further infiltration attempts. The security company did not reveal the target of the cyber-attack.
Other roles include R&D on Safeguards, physical protection, public relations and international cooperation.
Page 7 notes that “the scope of R&D projects relevant to nuclear material control includes facility or process specific aspects of material accountancy, containment/surveillance (C/S) and physical protection.”
The NMCC’s headquarters are located in Tokyo with additional offices in Tokai and Rokkasho.
So, essentially, the organization tasked with PHYSICAL PROTECTION of Japan's nuclear program was HACKED and utilized as a RELAY STATION for a Cyber-Attack elsewhere.
I wonder whether any information was taken during the hacking since the NMCC probably has information on Japan's PLUTONIUM and ENRICHED URANIUM stockpiles.
I suspect that there is a lot more to this story that is not being reported.