Defensive Computer Security Architectures (DCSA) are a vital element in the application of computer security to nuclear facilities. The DCSA should provide higher degrees of protection to digital assets performing more significant functions. This will increase the difficulty to the adversary as they will need to overcome multiple, diverse, and independent measures to successfully complete...
A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage, diversion, or other malevolent intruder attacks.
The PPS functions are detection, delay and response, before the design of the PPS we must see what we must protect (facility categorization), what I must protect against (against which the PPS must...
The increasing use of digital instrumentation and control (DI&C) systems in nuclear power plants (NPP) presents new challenges to traditional security and protection measures. The current focus of cyber security-related research on protecting sensitive information or privileged networks from state-of-the-art “hacker” attacks struggles to adequately address protection needs for digital...
Small quantities of nuclear and other radioactive materials are used in educational institutions worldwide in education, research, health care, agriculture and industry. In practice it is often desirable to protect the critical infrastructure (buildings, materials and equipment) from malicious acts caused by humans and the protection is usually provided by complex Physical Protection System...
The quantity and capability of cyber-attacks targeting Industrial Control System (ICSs) is growing rapidly. The integration of digital technology and communication channels in Nuclear Power Plants (NPPs) introduces vulnerabilities to cyber-attacks that may threaten the safety and operation of nuclear power facilities. Current efforts in developing and deploying cybersecurity...
Usually information is classified into different levels of sensitiveness which will dictate the measures for its protection. Information protection measures include barriers for access such as people clearances, cyber security, physical access controls, etc
Also, Design Based Threat, or DBT, is a common principle for physical and cyber protection, which is based on threat assessments. Then,...
The Office of Radiological Security Alarm Response Training (ART) program provides a unique, quality training experience for sites participating in the voluntary security program. The training course is designed to cultivate interoperability of various response elements and offer the opportunity to discuss, develop, and refine their organizations' response plans and strategies.
The three day...
One challenge of the risk management process for cyber security within nuclear facilities is understanding how to create scenarios to test deployed security controls that are representative of how threat actors operate. The challenge to creating these scenarios is centered on three issues. First, the complexity of systems and components (assets) at nuclear facilities makes for an expansive...
Abstract: The stable operation of the ICS (ICS) directly affect the safety of nuclear power plants and cyber security has become an important factor affecting nuclear safety. With the continuous development of the digitalization and networking of modern industry, the cyber security of ICS in nuclear power plants is facing unprecedented challenges. Therefore, it is necessary to take cyber...
This work presents the development of a nuclear power plant (NPP) simulator suitable for cyber security assessment. The NPP model is based on a pressurized water reactor (PWR) implemented using Matlab/Simulink. The Matlab/Simulink model, the Asherah NPP Simulator (ANS), simulates nuclear processes and controller’s system dynamics. ANS has been developed by the University of Sao Paulo, Brazil,...
This paper describes the application of a risk management performance-based approach, and compares a security project using three areas of nuclear security: physical protection, information security and accounting and control of nuclear material. This approach uses probabilistic threat parameters, equipment, systems and response forces used to prevent, dissuade and deter malicious acts against...
Cyber security has been object of study since the beginning of the digital era. However, until the 2010 Stuxnet case in the Iran's enrichment facility at Natanz, most of world’s cyber security concerns were directed to the theft of sensitivity information. Due to its specially designed attributes, Stuxnet is considered the first “weapons grade computer virus” [1] [2] [3].
After the Natanz...
Nuclear power plants are complex systems with critical controls and measures implemented by computers and dedicated programmable logic controllers. These end devices are grouped into different security levels and zones and are connected by computer networks forming a complex trust relationship between the entities. The boundaries of the zones are separated by specialized security systems, e.g....
The identification of digital assets and their classification (i.e. assignment to security levels) within computer security programmes at nuclear facilities has historically been a complex process. The current approaches use a system or asset-centric approach with the aim of applying cyber-security retro-actively. A example of such an approach is provided in US NRC Reg Guide 5.71 [1] whereby...
Provision of nuclear materials and nuclear facilities physical protection is an essential part of nuclear activity. This statement mentioned in many IAEA International Documents.In particular those documents also mentioned that modern physical protection systems (PPS) creation should be based on their effectiveness evaluation. It is necessary to understand how nuclear materials and nuclear...
Abstract
The International Physical Protection Advisory Services (IPPAS) mission has been conducted by IAEA for the Egyptian Atomic Energy Authority (EAEA) in December 2005. The purpose of the IPPAS has been to provide advice and assistance to strengthen the effectiveness of the physical protection systems of Egypt’s second research reactor (ETRR-2) nuclear complex. The purposes of that work...
As the number of cancer cases and deaths in Africa continues to rise, African states are racing to get ahead of this wave by acquiring additional radiotherapy machines. In doing so, these countries not only face financial challenges, but considerations of whether to use linear accelerators, which both offer better cancer care and reduce radiological security risks, or cobalt-60 machines, which...
Physical security at nuclear facilities is an important licensing and design consideration. The ultimate objective of the physical protection system (PPS) is to prevent the accomplishment of unauthorized overt or covert actions to nuclear facilities and nuclear materials. When a physical protection system is applied to a nuclear facility or to nuclear materials, its objective is to prevent...
KAMAL H. LATEEF
Iraqi Radioactive Sources Regulatory Authority
Baghdad Iraq
Chairman@irsra.gov.iq
FADHIL H. MIZBAN
Iraqi Radioactive Sources Regulatory Authority
Baghdad Iraq
fadhil_res@irsra.gov.iq
Abstract
The security of radioactive sources, nuclear materials and the facilities they contain is related to the provision of factors related to the human role, while others are related to...
A long established methodology for determining the effectiveness of an overall physical protection system (PPS) is through a healthy and robust performance testing program. Performance tests are vital because they provide essential information used in the determination of asset risk and the analysis of protection effectiveness. By establishing and verifying detection, assessment, response,...
Blood Irradiators are often used to irradiate blood and blood components prior to transfusion to prevent the proliferation of certain types of T lymphocytes that can inhibit the immune response and cause graft-versus-host disease. Morristown Medical Center, which is part of Atlantic Health System based in the northern part of New Jersey, USA, employed a Cesium-137 Blood Irradiator for about...
Ensuring a Stable Supply of Mo-99 in the U.S. without the use of HEU
Technetium-99m (Tc-99m) is a radioisotope used in approximately 80% of all medical imaging procedures across the globe. With a half-life of approximately six hours, this important medical radioisotope cannot be stockpiled and must be either used immediately upon direct production or repeatedly milked from generators bearing...
Large Panoramic Irradiators (LPI) are widely used to sterilize medical supplies, food products, spices, cosmetics, and other consumable goods. LPIs typically use a large array of cobalt (Co-60) sources to expose the products to gamma radiation. Co-60 is desirable to terrorist and criminal organizations that are interested in developing a radiological dispersal device (RDD) or radiological...
Modelling and Simulation (M&S) in nuclear safety applications is commonplace, for example to underpin and inform criticality, dose and shielding assessment. However, the adoption of modelling and simulation for nuclear security has not seen the uptake that many anticipated. This is despite significant advances being made in the capability of equivalent tools for nuclear security, coupled with...
In the last few years, distributed ledger technology (widely recognized in the form of blockchain) has demonstrated practical benefits beyond the development and exchange of cryptocurrencies. Blockchain solutions are being implemented in the fields of international development, healthcare, and education, predominantly as an information-sharing platform that enable parties to interact in a...
Radioactive materials play an important role in commercial, medical, and research facilities across the world. However, the benefits of these sources must be balanced with sufficient security to prevent radiological materials from falling into the wrong hands. In its efforts to prevent high-activity radiological materials from being used in acts of terrorism, the Department of Energy’s (DOE)...
The present paper summarizes the work conducted by the authors working on the International Atomic Energy Agency (IAEA) Coordinated Research Project (CRP) on “Nuclear Security for Research Reactors and Associated Facilities (RRAFs)-J02006” and more specifically, Task 2 activities: “Comprehensive Measurement of Security Risk for Research Reactors and Associated Facilities (RRAF)”. Task 2 aims...
Synopsis
This paper will outline the potential benefits of taking a business-orientated approach to nuclear security and the opportunities and challenges that may offer. It draws on experiences of UK industry and activities conducted under the UK Government’s Global Nuclear Security Programme (GNSP) (formerly Global Threat Reduction Programme, GTRP), which has been designing and...
Today’s nuclear institutions are facing major security issues; consequently, they need several specially trained personnel to attain the desired security. This personnel may make human mistakes that might affect the level of security. The human face plays an important role in social interaction, identifying people. Using the human face as a key to security, face recognition technology has...
The internet, which for years has been viewed as a global online commons with standardized protocols but few regulations, is, according to some experts, starting to mirror the contentious political and commercial contours of the physical world.
A number of problems, including data breaches, privacy debates, cyber enabled attacks on critical infrastructure, government surveillance operations,...
Given the rising threat of radiological and nuclear terrorism, it is imperative to assess if radiological facilities, such as universities and medical centers, have the means to fully understand and evaluate the security of their radioactive sources. In this context, risk assessment is a function of threat, vulnerability and consequences. This study aims to develop and demonstrate a...
Abstract
Nuclear security is facing great challenges nowadays due to the rapid development of technology, and Drones are one of among the major growing new technology which are currently considered the biggest threat to nuclear facilities, and I focused in these study on a type of Drones called small Unmanned Aerial Vehicles where it became spreading at everywhere, have many commercial...
The NRC licenses and provides oversight of the civilian use of special nuclear materials (SNM) used at research reactors. Regulatory oversight seeks to protect public health and safety, promote the common defense and security, and protect the environment.
The existing SNM physical protection regulatory requirements at research reactors are graded using a material categorization approach...
Cyber incidents are the norm in every industry, and the nuclear industry is no different. However, the effects of an incident are different in the nuclear sector, where consequences are heightened by fears of radiation releases and material diversion. In an era of fake news that often spreads on social networks quicker than accurate official reports, incident planning needs to be prioritized...
This paper introduces the main concepts of the project management strategy for upgrading the Physical Protection System (PPS) at nuclear facilities. The project scope is redesigning the security systems to enhance the security measures to fulfill the requirements and recommendations of IAEA and the vision of the member state. The most challenging of security project is the successful...
Nuclear Facility Low Altitude Threat and Defense Technology
——Identification, Comparison and best practise sharing
With the rapid development of high and new technology, Low-altitude, Slow-speed and Small-sized Aircraft(Hereinafter to be referred as LSSA), represented by UAV, paraglider, hot air balloon and other light aircraft, are becoming more and more widely used. However, due to the...
IPPAS missions play an important role to provide with an external review of a nuclear security regime and its implementation on a nuclear facility. France considers it as a very relevant tool developed by IAEA, whose legitimacy is internationally recognized, that can serve national authorities, according to their needs, to improve nuclear security globally. Internally as well, it can be a...
29 May 2019
A CO-ORDINATED RESPONSE TO NUCLEAR SECURITY EVENTS – CHALLENGES AND OPPORTUNITIES
1. SUMMARY
Nuclear Security Events (NSEs) represent serious risks to the public and responding services alike and are extremely complex situations to resolve. It is essential therefore that States have a clear framework to deal with all aspects of those risks and that supporting plans facilitate...
The Specialized Command for Nuclear Security (CoSSeN), is an organisation created by the French Government in 2016. Supervised by the Interior and Energy ministries and composed of Gendarmerie and Police officers as well as civil servants, it aims to enhance the response of state security forces regarding physical protection of civilian nuclear facilities and transports.
As nuclear...
IAEA Nuclear Security Series No. 33-T provides an ordered list of the four potential consequences of a compromise on I&C system function are arranged from worst to best case. These potential consequences are the basis on which to define the computer security requirements for the I&C system functions. IAEA NSS 20 details the need for risk informed approaches to take into account a current...
KAERI has built a condenser and condensate HIL system as a part of IAEA CRP J02008 “Enhancing computer security incident analysis and response planning at nuclear facilities.” The condenser and condensate system, which is a simple version of physical feed-water condenser system in nuclear power plants, is integrated with a hypothetical pressurized water reactor simulator “ASHERAH”, which is...
Uranium ore concentrate (UOC) is an important nuclear material of interest for Canada. A large-scale analytical program is being led by the Directorate of Security and Safeguards (DSS) of the Canadian Nuclear Safety Commission (CNSC) to establish a reference dataset of UOCs that have passed through and/or that are currently under Canadian regulatory control. Isotopic ratios are among the...
The KITE System is one of the components in the Integrated & Intelligent Nuclear Security System (I2NS) that are currently under development in Malaysian Nuclear Agency, with the aims to enhance the capability for the insiders control and monitoring. KITES development involves the usage of mathematical modelling of the personnel trustworthiness to calculate the trust degree for each personnel...
The consequences of nuclear terrorism represent a grave threat international security. The responsibility to address the risk of nuclear material theft or sabotage of nuclear facilities is shared by multiple organizations that must strategically collaborate based on their individual missions and capabilities. Stakeholder organizations share a common need to prioritize their activities based...
Insiders who may be staff members or contractors enjoy authorised access to a nuclear facility. Majority of insiders will be trustworthy. In spite of taking all the care in their recruitment, vested organisations may succeed in planting of mischievous elements or convincing or radicalising existing staff to implement their designs of terrorism. Use of insiders in creating trouble is obviously...
According to the International Atomic Energy Agency’s (IAEA) Information Circular (INFCIRC) 908, because “insiders possess access…authority and knowledge…[they] pose an elevated threat to nuclear security.” Insiders, witting or unwitting, working together or alone, possess the opportunity to cause significant damage to nuclear facilities through sabotage or unauthorized removal of nuclear or...
Radiation Portal Monitors (RPMs) play a key role in Nuclear Security applications for almost two decades. They enable to ensure on-line monitoring and guarantee the safety at borders or in critical infrastructures like big ports. The need for being able to rapidly detect gamma and neutron signatures is crucial for preventing illicit trafficking of radioactive sources or Special Nuclear...
IAEA Member States dedicate significant resources and effort to develop and implement their national nuclear security regimes, which are based on the capabilities to prevent, detect and respond to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. However, multiple examples and...
In 2018, Office of Atoms for Peace (OAP) conducted a policy study to consider approaches and measures appropriate for Thailand’s current situation on nuclear security as well as conforming to international legal instruments and standards. The research team led by the then OAP Deputy Secretary-General executed a study with qualitative methodology including literature reviews, gaps analysis by...
As digital instrumentation and control (I&C) systems are more fully integrated into nuclear power plants (NPPs) and communication networks cross boundaries of the business and operational systems, new opportunities for disrupting NPP operations are introduced. Enhancing the cybersecurity of digital I&C systems is key to ensuring the safety and economics of the nuclear power industry. Dynamic...
Abstract
In this work a proposed design for security lighting and cameras surveillance system for optimum supervision at a perimeter area of a hypothetical nuclear facility will be presented. A perimeter area has an isolation zone between double fences which are surrounds a nuclear facility site. The illumination poles, lamps type, towers space distance and lighting level, required for camera...
Virtualization technologies were developed first by the information technology (IT) industry. Now they have started being deployed in the process industry. Virtualization is a set of technologies that can be applied to a wide variety of applications and fields. Hardware and/or software can be virtualized: Hardware virtualization can be deployed in the process automation, where process...
A proven method for conducting cyber security self-assessments at nuclear power plants is now available for international use. This method was originally developed by Pacific Northwest National Laboratory (PNNL) under contract by the United States Nuclear Regulatory Commission (USNRC) for use by U.S. nuclear power plant licensees. The “Method”, described in NUREG/CR-6847 “Cyber Security...
The IAEA published the first model describing nuclear security culture in 2008. Based on that model, we developed quantitative and qualitative methods and collected data from eight nuclear sites in the U.S. The results from surveys, focus groups, and in-depth interviews were compiled and analyzed, shedding new light on the perceptions of nuclear security culture in these organizations. We...
This paper proposes an approach to simulate a Steam Turbine Generator subsystem focused on a realistic behavior and architecture of the IT-components with the aim of supporting training for cyber-security operators and cyber-security investigators. The scientific contribution of this paper is a description of the Steam Turbine Generator from a computer scientist point of view, the analysis of...
The Arab Atomic Energy Agency (AAEA) is a regional specialized organization working within the auspices of the League of Arab States to coordinate among its member states in the field of peaceful uses of atomic energy. It contributes also to the transfer of the peaceful nuclear knowledge and technologies to these countries assist in manpower development and scientific information concerning...
The Russian Federation has a unique experience in the operation of vessels powered with small modular reactors (icebreakers and lighter aboard ships). In accordance with Russian legislation, physical protection is required for the operation of such nuclear vessels. The Federal Environmental, Industrial and Nuclear Supervision Service (Rostechnadzor) is responsibile for the development and...
Abstract: Nuclear instrumentation has served nuclear and radioactive detection and contribute substantial benefits to securities worldwide. Hence, the form and method to ensure that every equipment used is appropriate and comply with standards is essential for the ability of the detection of radiation. It also will increase public confidence of nuclear response teams facing nuclear threats. ...
Introduction:
Chile has been one of the first countries to integrate the use of the Incident and Illicit Trafficking Database of the International Atomic Energy Agency, ITDB-IAEA. This poster is a study of the descriptive statistical analysis of the National Database of Notifications of Radiological Incidents in Chile, BADNIR.
Goals:
Evaluate the present situation, patterns and trends in the...
Between 1993 and 2018 almost 3500 incidents of radiological/nuclear material being handled outside of regulatory control occurred, some 1250 were possibly related to trafficking and malicious use with 27 incidents involving Special Nuclear Material (SNM). Finding material outside of regulatory control presents many well understood challenges, not least of which is the potential for weak...
In response for to the diversification of energy resources, several Asian countries have currently considered nuclear power as an option. As a result, a dramatic increase on the use of nuclear material is foreseen; nuclear security and safeguards, as well as nuclear safety, will become more important in the promotion of the peaceful uses of nuclear energy. For these reasons, the Nuclear...
Indonesia is a country rich in natural resources, both metal and non-metallic mineral resources, including tin and zircon. The by-products of tin and zircon processing still contain valuable minerals such as ilmenite, rutile, monazite and pyrite with a significant amount. However, the by-products of tin and zircon processing have the potential to have high radiation exposure compared to normal...
There are currently 16 interim storage facilities for spent nuclear fuel in Germany in use. As IT-security is getting more and more relevant for nuclear installations, specific regulations regarding IT-security were integrated into the regulatory guideline for the storage of nuclear material. The responsibilities for interim storage facilities in terms of computer security in Germany, the BSI...
Adult learning and nuclear security: the important role of adult learning educational practices for impactful cross-disciplinary nuclear security training
Author: Mart Stewart-Smith
Affiliation: United States, Department of Energy, National Nuclear Security Administration
Email: Mart.Stewart-Smith@nnsa.doe.gov
Summary:
The human elements of nuclear security sustainability rely on...
Cybersecurity in nuclear power is difficult to manage, overall. It is expensive to implement, regardless of the regulatory regime a plant is under. Technical controls are challenging to profile in many cases, as digital failure modes can be both difficult to model and can have wider ranging consequences than typical physical failures. Furthermore, intrusion detection and prevention controls...
In the global effort to reduce proliferation risks, and misuse, of radioactive and nuclear (RN) materials, effective and affordable technologies are required to improve areas identified by diverse national nuclear regulatory agencies. Canadian Nuclear Laboratories (CNL) is engaged on many fronts to enhance cutting-edge techniques and methodologies to address evolving national and international...
Organizations increasingly depend upon cyber-based technologies for the reliableoperation of Nuclear Power Plant (NPP) facilities through a myriad of Information Technology (IT) and Operational Technology (OT) systems. This enables the automation of industrial processes and a heightened exchange of information, however it also increases the attack surface which can be exploited by potential...
The World Nuclear Association is an international trade body representing the global nuclear industry, including major reactor vendors, nuclear power plant operators, nuclear fuel suppliers and uranium miners, engineering, construction and waste management companies, along with professional service and transport providers. Its working group on fuel cycle security was reorganized in 2018 to...
Carry out various research experiments of Vehicle Radiation Portal Monitor (RPM) by truck which loads fertilizer and nuclear material. The detail content of experiments as follow:
(1) Different load of natural radioactive material (fertilizer) experiment.
(2) Different activity of nuclear material experiment.
(3) Different vehicle speeds experiment.
(4) Different loading locations of natural...
Cyber threats are increasingly one of the major threats facing all countries. The high-profile “ransom-ware” attacks by WANNACRY in May 2017 and the TRITON attack against the safety system at an industrial complex in the Middle East in August 2017, and against a second victim recently, served as reminders that cyber risks are real and increasing. In nuclear facilities including nuclear power...
The IAEA’s Collaborating Centre in Nuclear Forensics with the Hungarian Academy of Sciences Centre for Energy Research (MTA EK) in Budapest, Hungary provides the Agency’s Member States with a leading partner laboratory enabling coordinated research, provision of applied training, access to advisory expertise, and mentoring opportunities that have allowed the IAEA programme of nuclear forensics...
The U.S. Department of Energy’s National Nuclear Security Administration (DOE/NNSA) Office of Material Management and Minimization (M3) works to minimize civilian stocks of highly enriched uranium (HEU) and separated plutonium globally through the conversion of research reactors from HEU to low-enriched uranium (LEU) fuel and, when possible, removal or disposition of excess weapons-usable...
Radioactive sources are used around the world to support life-improving and lifesaving industries. However, if found in the hands of terrorists and terrorist supporting organizations, these sources could be used to harm people and the environment. This paper will discuss the overall design, transportation configuration, deployment features, required equipment, personnel, and device...
The list and the fields of emerging technologies in the digital age may have endless applications, but it can be categorized into several major workforces, such as the Internet of Things (IoT), big data, machine learning(ML)/ artificial intelligence (AI), encryption and communication technologies. Undergone more than 10 years in the development of nuclear security regime, Vietnam is one of the...
After 60 years of development, China's nuclear fuel cycle front section, including uranium exploration, mining, metallurgy, purification, uranium conversion, uranium enrichment, fuel manufacturing, has formed industrial capacity; however, the nuclear fuel cycle back section has not yet formed industrial capacity, we lack commercial-scale power reactor spent fuel reprocessing plants, and have...
According to the International Convention for the Suppression of Acts of Nuclear Terrorism (ICSANT), which has been ratified by the Government of the Republic of Indonesia into Law No. 10 of 2014, nuclear terrorism is a violation committed if someone uses radioactive material illegally and intentionally to cause: serious death or bodily injury, or serious damage to property or environment, or...
Nuclear forensic has found a niche in Nuclear Security and a tool for attribution evidence. This is normally applied when nuclear material gets out of regulatory control and then interdicted. Nuclear Forensics provide a Laboratory technique for material accounting and control. The signatures can be in the form of Nuclear material age dating, Lead isotopic ratios, Nuclear material processing...
In order to secure public safety with utilization of nuclear fuel material, etc., it's important to avoid mutual bad influence of 3S (safety, security and safeguards) as well as take appropriate measures.
About the harmony of the safety and the security, “INSAG-24 (The Interface between Safety and Security at Nuclear Power Plants)” (2010, IAEA) proposed the important point to integrate safety...
Participants at the final Nuclear Security Summit in 2016 agreed on “action plans” for initiatives they would support by five international organizations and groups—the International Atomic Energy Agency (IAEA), the United Nations (UN), Interpol, the Global Partnership Against the Spread of Weapons and Materials of Destruction, and the Global Initiative to Combat Nuclear Terrorism (GICNT). The...
The security measures and systems for Radiological Facilities is considered to be an integral part of nuclear safety in Ghana. The changes made in ensuring and legislation of security following the establishment of new Nuclear Regulatory Authority. Regulation of radiation sources commenced in 1993 with the promulgation of the radiation protection instrument, LI 1559. Recently, the LI has been...
Many States need and have requested assistance to implement their national nuclear and radiological security objectives, especially their obligations under a range of legally binding international nonproliferation instruments. The International Atomic Energy Agency (IAEA) has a host of technical assistance programs to meet many of those needs, and an extensive record of providing such...
The development of nuclear infrastructure in the States embarking on the nuclear power or nuclear research programme is associated with objective difficulties due to the limited national capabilities and competencies. Being responsible vendor of nuclear material and technologies for a number of new overseas nuclear facilities, including nuclear power plants and nuclear science and technology...
Will you and your team be able to protect against an unpredicted attack? You can assess and test your capabilities by doing exercises.
Protecting against malicious acts by criminals or terrorists is an essential element of global efforts to ensure that nuclear and other radioactive materials, associated activities, and facilities housing them, are kept safe and secure.
Exercises are a key...
State Nuclear Security Technology Center (SNSTC) is the sole state-owned non-commercial service providing organization on nuclear security in China. SNSTC features in the comprehensive facilities on nuclear security and professional experts on nuclear security. Apart from the research and development in nuclear security, nuclear security training is also the mission of SNSTC. Since its...
In 2016 the International Atomic Energy Agency (IAEA) launched a Coordinated Research Project (CRP) on Enhancing Computer Security Incident Analysis at Nuclear Facilities (J02008). The primary objective of this CRP was to contribute to the improvement of computer security capabilities at nuclear facilities to support the prevention and detection of, and response to, computer security incidents...
In the context of penetration testing a Red Team of highly skilled IT security experts challenges the security posture of an IT infrastructure within an agreed upon perimeter.
They are countered by A Blue Team. The Blue Team identifies possible vulnerabilities and enforces the network security and the security of all digital devices. While the Red Team performs a cyberattack, the aim of the...
The Border Monitoring Working Group (BMWG) was established in 2006 by the International Atomic Energy Agency (IAEA), European Union (EU) and United States (US) to share information for the purpose of harmonizing border monitoring activities in the areas of radiation detection equipment deployment, training and sustainability. Such coordination prevents the duplication of efforts, exploits...
As the Belgian Nuclear Science Center, SCK•CEN has been maintaining and operating the BR2 research reactor since 1962. The BR2 is one of the world’s most powerful and versatile research reactors with very high neutron dose rates and extensive experimental positions available for use. The three main utilizations of BR2 are: nuclear fuels and material research, the commercial production of...
With the effort of industrial control system vendors, industrial network protocols are getting hardened and seems secure for last several years. Based on secured industrial network protocols, most of control system have getting updated. Especially, Siemens products widely used in industrial control system have well-made protection and security. However, the number of threats against Siemens...
The International Atomic Energy Agency Incident and Trafficking database [1] records cases of unauthorised possession, theft, loss, transport and other unauthorised activities involving nuclear and other radioactive material. Intercepted materials can be analysed using nuclear forensic techniques to provide information to law enforcement and government. In addition, an advanced materials...
The Institute of Applied Nuclear Physics (IANP) was established in 1970, and is the main user of the radioactive sources in Albania. IANP is a focal point and the main user and provider of nuclear and nuclear related techniques in the country and conducts research, applications, education and expert training in this field. According to Decision No. 563, 22.08.2007 of the Council of Ministers,...
The world moves at a very fast pace nowadays, and with it, new threats start to emerge and some of them come from the most unlikely sources. The whole world currently faces a common enemy, one that knows no boundaries, has no limits, has no fear. And this is the most dangerous enemy there is: the one which fears no death and whose only goal is to destroy, to inflict terror and make everyone...
Nuclear Security is a very important topic when it comes to the peaceful uses of nuclear energy. The history of the nuclear energy sector has concentrate its efforts in safeguards and safety, focusing on how to avoid proliferation and military uses of the nuclear technology, and how to protect the population and the environment from harmful effects of a possible radiation.
However, as a...
Forensic science is the application of sciences such as physics, chemistry, biology, computer science and engineering to matters of law. Forensic science can help investigators understand how blood spatter patterns occur (physics), learn the composition and source of evidence such as drugs and trace materials (chemistry) or determine the identity of an unknown suspect (biology).
Forensics play...
The fundamental underpinning of nuclear security is a State’s national nuclear security regime, consisting of the legislative and regulatory framework, responsible institutions and organizations, and nuclear security systems and measures. To be truly successful, the nuclear security regime must be sustainable – reliably effective both now and in the future. The recently published IAEA...
In this presentation, we will look at the results of Cambodia’s participation in the Coordinated Research Project (CRP) and how the mobile application “Tool for Radiation Alarm and Commodity Evaluation (TRACE)” will help users, especially Front Line Officers (FLOs), to reduce the hurdle of Initial Alarm Assessments and random inspections and focus on the most suspicious containers.
Under the...
Radiation Protection Regulatory Bodies often have the responsibility of overseeing nuclear security activities, especially in developing countries like in the African Continent. Knowing that nuclear security, which is part of the national security system, combines the participation of several competent authorities, information management and the distribution of roles in general are stumbling...
Education and training plays a pivotal role in the development and upgradation of overall security system. Specific training and education is necessary as new challenges evolve with time. After 9/11, the world scenario has completely changed in terms of security. With change of threat level, there is a need to improve, strengthen and revise existing education and training infrastructure....
Maintaining a sufficient number of highly skilled professionals, with appropriate academic qualifications and adequate experience, for regulatory supervision is of prime importance for regulatory bodies. This requires availability of a sustainable education and training program to build capacity of the regulatory staff through in-house training and retraining. Pakistan Nuclear Regulatory...
There is widespread use of nuclear and radiological materials (radioactive sources and nuclear material) and technologies in the various practices and applications in throughout the world. In Uganda, the risky radioactive materials are widely used in medicine for diagnostic and therapeutic purposes, in road construction industry for density and moisture gauging, in industrial radiography, in...
Capacity building for the development, implementation and sustainability of a national nuclear security regime and the physical protection of the nuclear material and nuclear facilities is a key objective and essential part of nuclear activities for States with an advanced nuclear power programmes and for those that are just starting to implement a nuclear power or nuclear research programme....
The U.S. Department of Energy/National Nuclear Security Administration’s Office of
Radiological Security (ORS) cooperates with partner countries throughout the world to enhance the security of radioactive sources used for legitimate purposes. The IAEA and member states recognize that sustainability and capacity-building with partners is the foundation for a successful security program. There...
In recent years, the threat of international nuclear terrorism is becoming increasingly serious, and the risk of the proliferation and loss of nuclear materials is increasing. In order to ensure the safety of human beings and the international community and prevent nuclear materials being stolen and illegally transferred, effective technology is needed to account and control nuclear materials....
Recommendation 3.19 of the IAEA Nuclear Security Series No.14, Nuclear Security Recommendations on Radioactive Material and Associated Facilities states, “The State should assess the potential threats, the potential consequences and the likelihood of malicious acts, and then develop a legislative and regulatory framework that provides for efficient and effective security measures to address...
The development of different Small Modular Reactor projects around the world will allow the production of electricity in many countries, with benefits in terms of costs, both in the construction and in the maintenance and operation of the facilities, which is a strong incentive for the use of this type of reactors in a wide range of environments and geographical locations.
Currently, the...
Currently Indonesia are expecting to build its first Experimental Power Reactor which has HTGR technology. The fuel design of the reactor will have the same type of fuel with HTR-10, a 10 MWt reactor in China. The fuel design of the reactor is pebble bed where the fuel is a collection of nuclear material inserted in small sized spheres containing structural and moderating material and a pebble...
Office of Atoms for Peace (OAP), the nuclear regulatory body in Thailand has gone through the steps and guideline provided by IAEA of conducting an effective information security policy which shall include (i) Analysis of organizational information especially sensitive information, (ii) Information classification, (iii) Information security policy framework design and implementation, and (iv)...
The nuclear law for regulation of peaceful applications of radioactive sources in Uganda was enacted in 2008. The law established the Atomic Energy Council as the national regulatory body in the nuclear energy subsector. The Act also provided for radiation safety, radiation protection and nuclear security in the applications of radioactive sources in the country.
The increasing use of...
BOYE Ndeye Arame Director General ARSN
TALL Moustapha Sadibou Director of inspections ARSN
Ababacar Sadikhe Ndao Director of Regulations and Authorization ARSN
Email: arame.boye@arsn.sn
SYNOPSIS
The security of radioactive material began to become a concern for the Regulatory Authority of Senegal, following the various discoveries of sources that were used and stored at sites during...
Nuclear power plants and fuel cycle facilities are constantly changing, particularly in recent years with works related to the implementation of security reinforcements. The security of a facility can be weakened by a lack of anticipation of the potential impacts of the changes implemented on the facilities, in particular those relating to physical protection systems.
The French nuclear...
The International Physical Protection Advisory Service (IPPAS) of the International Atomic Energy Agency (IAEA) is an essential part of IAEA’s efforts to assist Member States to establish and maintain an effective nuclear security regime. Upon the request of the Government of People’s Republic of China, IAEA conducted the IPPAS mission in China from 28 August to 8 September 2017. During this...
In January 2019, a shipment containing a highly radioactive Co-60 source was detected in Hamburg in a container of scrap metall imported from Nigeria by a German scrap metal merchant. So far it has not been possible to identify the device the sources stem from, it’s purpose or the design of the machine to determine where it might have originated from.
As more of these sources have appeared in...
The nuclear industry is just one of many industry verticals (e.g. automotive, medical, oil & gas etc.) grappling with the challenge of addressing cyber risk in the supply chain. The Common Criteria (ISO/IEC 15408) is the only well established and internationally recognized standard for the security evaluation of IT products – a vital part of the supply chain. Uniquely, the Common Criteria...
Most police officers in Malaysia will frown upon mentioning of nuclear security in normal policing. This is because the phrase is not common to their police lingo even though it is attached to the word security. Some will say nuclear security is something related to what scientist do in lab, some will relate it to nuclear bomb, others will say this is an academic issue, some go to the extent...
Natural radioactivity is unevenly distributed in the terrestrial environment, depending on the rocky nature of the soil. It can be dangerous for human life at a certain concentration of radionuclides. Unfortunately, these radionuclides are imperceptible to the human senses and detectors are used to "observe" them. In Burkina Faso, there are localities where the radioactivity is relatively...
The countermeasures against potential physical insiders and especially cyber insiders is critically important at nuclear facilities (NF); this concern reflected in IAEA Nuclear Security Series documents: NSS-8 (NST-041), NSS-10 (NST-058), NST-47.
Insiders activities confirmed by accidents presented in internet. For example, oil dumping from turbine at Belgium NPP Doel-4 performed by insider...
The risk to nuclear facilities from cyber attacks is increasingly perceived as a growing, real problem due to entrance of new adversaries (e.g. ISIS) and the advancement of capabilities of existing adversaries such as criminal organizations and nation states. Recent sophisticated attacks have targeted instrumentation and control (I&C) systems having significant potential consequences for...
Nuclear and radiological facilities are digitizing elements of security and operational systems in order to improve performance, effectiveness and efficiency while reducing cost of ownership. These digital elements have greatly increased the interconnectivity between traditionally disparate systems such as components in physical protection systems (PPS), nuclear material control & accounting...
This paper aims to illustrate how modern information security and best practice software development methodologies are applied to ensure appropriate information protection when storing or processing nuclear material inventory data. The Australian Government maintains a maturity based computer security framework for protecting digital systems and associated information. This is the basis for...
Computers and the internet have changed our lives for the good in many ways, but with the change comes risk. In a nuclear regime, risk must be managed appropriately, and to do so, personnel must be properly trained.
1. INTRODUCTION
This paper explores the findings of the first-ever international training course (ITC) on Protecting Computer-Based Systems in Nuclear Security Regimes, and...
Computer security is recognized an important aspect of nuclear security, as highlighted by Resolution GC(62)/RES/7 of the IAEA 62nd General Conference (2018), which encourages States to take effective measures against cyber-attacks. An important measure – highlighted in the Resolution – is the provisioning of computer security training courses. The nuclear sector, with support from agencies...
Cyber Informed Engineering (CIE) was defined in IAEA CN-244-520 as the inclusion of the cyber-attack and defense perspective (cyber security aspects) into the engineering process. It is the process by which engineering personnel are made aware of how their current actions impact the processes by which they architect and design systems. Decisions do not always take into consideration the attack...
CONSEQUENCES OF CYBER-ATTACKS IN A NUCLEAR SECURITY SYSTEM OF A BRAZILIAN NUCLEAR POWER PLANT
João C. B. Fiel1 and Pedro M.R. dos Santos1
1 Instituto Militar de Engenharia (IME)
Praça General Tibúrcio, 80 - Urca
22290-270 Rio de Janeiro, RJ, Brazil
fiel@ime.eb.br
ABSTRACT
This paper aims to describe an assessment of cyber-attacks impacts in the effectiveness of the security system of a...
After two extended up and down periods in the historical development of Artificial Intelligence (AI) during the last decades, since a few years, many AI solutions have become inherent components in several industrial business domains. We will briefly analyze how AI came to be where it is now and what boundary conditions have to be met in order to be able to apply AI. Yearly AI competitions...
Security culture self-assessment plays a key role in developing and maintaining an awareness of the strengths and weaknesses of Nuclear security culture (NSC). IAEA recently published technical guidance NSS No. 28-T (Self-assessment of Nuclear Security Culture in Facilities and Activities). Self-assessment is not strictly confined to the operators’ side but also to regulators’ side. However no...
Since the beginning of the implementation of IAEA INSSP, Moldova has achieved promising results in the context of strengthening security capabilities. Thus, the infrastructure for the detection of radioactive and nuclear materials at the border control points was strengthened, the system of physical protection of the nuclear and radiological facilities was strengthened. Also, the building of...
The role of the International Atomic Energy Agency (IAEA) regarding nuclear security evolved after the terrorist attacks of September 11, 2001, and the IAEA is currently held to be the global platform for nuclear security efforts, with a central role in facilitating international cooperation in the field. However this evolution has not been effortless, and universal acceptance by Member States...
CN-278; EVT 1900138
Synopsis
Name: GARBA BARKE HASSANE
Profession: Mining Engineer
Employer: Ministry of Mines
International Conference on Nuclear Security: Sustaining and Strengthening Efforts Vienna: 10 - 14 February 2020.
Title: Control and monitoring of uranium production in Niger from 1971 to 2018, challenges and opportunities.
The issues of nuclear materials become major problems...
International work to convert or decommission highly enriched uranium (HEU) research and test reactors to low enriched uranium (LEU) fuel has taken place since 1978. The decades-long effort is achieved by a multilateral group of stakeholders with the objective of reducing and eventually eliminating the civilian use of HEU.
The Reduced Enrichment for Research and Test Reactors (RERTR) Program...
Emerging global threats are constantly evolving. The velocity of technology change within organizations is introducing different attack surfaces with new technologies and digital mobility. These along with increased regulation on cyber security is a challenge that many utilities and cyber security teams face for their security postures.
A new Cyber Security regulation, CSA N290.7 Cyber...
Sustaining and Strengthening Efforts – Improved Assessment of Radiation
Portal Monitor Alarms at Laem Chabang Seaport
Aukrit Wongpanich, Natthawit Phiongam, Yanapan Hao
Thai Customs
Email: wongpanich1234@gmail.com
ABSTRACT
Thai Customs has several missions, including obligations to facilitate trades, collect tax, and protect the society. To ensure...
In Albania, radioactive sources are used in medicine, industry, agriculture, research and teaching process. The basic law for radiation protection in the Republic of Albania is the law "On Protection from Ionizing Radiation ", No. 8025, date 09.11.1995, and also, Law. 9973, date 28.07.2008 "On some amendments and additions to Law no. 8025, dated 09.11.1995 " On Protection from Ionizing...
In 2016 the International Atomic Energy Agency (IAEA) launched a Coordinated Research Project (CRP) on Enhancing Computer Security Incident Analysis at Nuclear Facilities (J02008). The primary objective of this CRP was to contribute to the improvement of computer security capabilities at nuclear facilities to support the prevention and detection of, and response to, computer security incidents...
The insider threat is recognised as one of the most challenging security threats to counter in any industry or organisation, including the civil nuclear industry. All industries suffer from this threat; the financial industry with insider trading, retail with ‘shrinkage’, aviation with ‘gun running’ and ‘drugs shipping’, and there are a myriad of other examples.
It is important for the nuclear...
The Kazakhstan Regulation on Cybersecurity of the Nuclear Industry was enacted in December 2018. This regulation was the result of a multi-year cooperative agreement between the Republic of Kazakhstan’s Committee of Atomic and Energy Supervision and Control and the USA Department of Energy. This paper will provide the motivation for the creation of the regulation, overarching goals of the...
Following Commission direction, the U.S. Nuclear Regulatory Commission’s (NRC) staff has recommended ways to credit a broader set of operator actions, including the use of Diverse and Flexible Mitigation Capability (FLEX) equipment, and credit response by local, State, and Federal law enforcement in the NRC’s security inspection program. This paper describes the NRC staff’s recommendation for...
The fundamental interface between nuclear safety and security is to protect and prevent the harmful effects of radiological hazards, also detect the unauthorized access, sabotage and illegal transfer or other malicious acts involving nuclear materials and radioactive substances.
Safety and security cultures aren’t opposing each other but mutually reinforce one another with complementary....
IRSN is the French Technical Support Organization in nuclear and radiation risks and its activities cover all the related scientific and technical issues. Among these numerous activities, it carries out the centralised accountancy of nuclear materials as part of the control of these materials under the authority of the Ministry of Energy (MTES). Within the context of the national regulation, a...
Abstract
In this work, a cyber security simulation testbed for Boiling Water Reactor is proposed. It is built up in the form of Client-Server. The Server being the reactor core and the Client being the control room. The Client performs continuous check on power level values of the reactor and runs machine-learning Intrusion Detection algorithm and. The performance of the proposed...
General-purpose computation has launched entire industries and improved the lives of billions around the globe. But the speed of commerce has pushed application of networked computing to so-called Operational Technology (OT) such as industrial control system (ICS), programmable logic controllers (PLC) and other embedded systems including the Internet of Things (IoT) without full understanding...
Cyber security defense strategies to detect, counter and respond to cyber attacks become increasingly challenging when the threats originate from within, from the organization’s authorized users.
The term “ insider threat” is often used to describe members of an organization , or associates such as a contractor,with malicious intent. However, threats can also result inadvertently from...
CYBER SECURITY APPROACH FOR NUCLEAR FACILITY; GHANA’S PERSPECTIVE.
Obed Agbenorku1, Simon Adu1, Kwame Appiah1
1. Nuclear Regulatory Authority
Abstract
The security of nuclear facilities is an important practice to prevent theft and sabotage of nuclear materials that could result in a radiological release. Traditionally, focus has been on physical threats to facilities such as armed militants...
Cybersecurity threats continue to grow, and the nuclear sector recognizes that it must have compensating measures in place to address these threats. The evolution of cyber threats to critical systems is growing at an alarming rate and it is important that the nuclear community response accordingly. One mechanism to addresses the cyber threat is through development and utilization of a Design...
As of the publication of NSS-13 and NSS-17 in 2011, the member states of IAEA are giving more attention to nuclear security regime including computer security for nuclear facilities. Following the recommendation of IAEA, member states has applied various kinds of computer security plan for their nuclear facilities. However, the occurrence of computer security incident is inevitable as the...
Summary
Executing physical security exercises is common practise at nuclear facilities. Executing cyber security exercises is still less common. In 2019 Urenco Nederland B.V. organised cyber security exercise “Georgius 2019”, a multidisciplinary security exercise. The exercise stretched over 3 days and was conducted over in the field. It involved several departments and processes of URENCO...
During inspections, one compares the actual state with a nominal state. This nominal state may be based on national laws, regulatory requirements or guidelines, or international standards. However, in the area of cyber security for nuclear facilities, one often finds itself in a dilemma: missing laws or guidelines. The adaptation of laws is a protracted process, and international standards are...
Cyber-attacks on indstrial installations including nuclear power plants (NPPs) are a significant issue/ Digital control systems are now at the core of industrial installations, playing a critical role in safety in many sectors, including Structures, systems, and components (SSCs) important to safety in the nuclear sector. The function of SSCs important to safefty is to bring into a safe state...
Cybersecurity in Research Centers: Focus on nuclear and radioactive facilities.
The Cybersecurity Research Center's standards for handling nuclear and radioactive materials should be built on a "defense in depth" model. This model should be suitable for the existing ecosystem and should consider all cyberthreats that can and undermine existing security, with the objective of compromising...
Nuclear forensics provides the ability to analyze radioactive and nuclear (RadNuc) material for the purposes of supporting the broader investigation of a nuclear security event. A comprehensive nuclear forensics capacity requires a capability to characterize and assess the provenance of materials discovered or seized from outside of regulatory control. The Government of Canada’s provenance...
On too many occasions the first input that the security team have to influence the security arrangements at a facility is after the design is agreed and the work is underway; or building use is modified; or the threat landscape changes. Thus, the security arrangements must be retrofitted within restricted footprints, and often within operational and Radioactive Controlled Areas (RCAs),...
Abstract
Radio Activity may spread in public places either intentionally or un-intentionally by any means out of any Nuclear Installation which may be catastrophic for the masses in general. There is a requirement of a system for detection and alarm annunciation of radioactive nuclides while there is any movement of Man/ Machine out of nuclear site. Also the alarm has to be communicated to...
Teguh Asmoro1, Khairul Khairul2, Fatmuanis3, Naoko Noro4
1 Center for Informatics and Nuclear Strategic Zone Utilization BATAN, Serpong Nuclear Research Complex, PUSPIPTEK Area, Serpong 15314, Tangerang-Indonesia, teguhasm@batan.go.id
2 Center for Informatics and Nuclear Strategic Zone Utilization BATAN, Serpong Nuclear Research Complex, PUSPIPTEK Area, Serpong 15314, Tangerang-Indonesia,...
The global never ending drive to progress in competing technology development has significantly showed rising numbers in import exports industry, while knowledge transfer and information sharing are now enabled by a finger swipe. Being geographically located in South East Asia, Malaysia shares land borders with Thailand, Brunei Darussalam and Indonesia, with wide part of the west coast of the...
The Nuclear Security Department (NSD) of the Centre for Energy Research, Hungarian Academy of Sciences (MTA EK) operates a Detector Applications and Testing Laboratory (DATL) in Hungary. MTA EK and the NSD, being the Nuclear Security Support Centre of Hungary together with the Hungarian Atomic Energy Authority, put a great emphasis on applied research work and prototype testing in the field of...
The cyber domain has evolved over the past thirty years from one that was primarily concerned with the protection of data confidentiality, integrity, and availability, to one that includes an integrated set of defensive technologies and processes in order to respond to the ever-advancing threats posed by skilled cyber actors. As the cyber threat actors have evolved their capabilities, it has...
Radioactive material and associated facilities are vulnerable to cyber attack. Possible adversary scenarios include disabling or spoofing computer-based security systems to gain unauthorized access to radioactive material, to an associated facility, or to security-sensitive information; compromise of computer-based accounting and inventory systems to mask theft or diversion of radioactive...
Recently, many Nuclear Power Plants (NPPs) have been upgraded from analogue systems to computer-based control systems. The control systems perform data acquisition, control actuation, and information indication based on software. The digitalization of nuclear facilities has brought many benefits, including high performance and convenient maintainability, in terms of facility operation. With...
Radioisotopes such as Cs-137 and Co-60 are used in various medical, industrial, and research applications. This radiological material can be a theft or sabotage target that requires a certain level of security for adequate protection. The presented work provides an overview of the United States Department of Energy/National Nuclear Security Administration Office of Radiological Security’s...
The growing concern of the international community relating to the security of nuclear and radioactive material after September 11th, 2001 resulted in a strengthening, at world level, of the application of nuclear security measures through the adoption of new parameters and methodologies for the design and implementation of effective nuclear security detection architecture (NSDA). The risk of...
The Transportation – Security, Tracking and Reporting System (T-STAR) was developed by NNSA NA-21 Office of Radiological Security (ORS) to provide a transportation security system for use during transport of Category 1 and Category 2 radiological material to provide detection and tracking capability for shipments. While many off the shelf systems provide asset tracking of the conveyance, few...
China Customs began developing the integrated system of fixed radiation detection equipment in 2018, and put it into trial operation in early 2019. In 2019, more than 3,000 sets of fixed equipment will be integrated. The integrated system of radiation detection equipment transmits the alarm data, images and equipment status information scattered at ports nationwide to all directly affiliated...
Establishing a design basis threat (DBT) provides an effective means through which a regulatory body can communicate risk-informed performance-based security standards to its operators and licensees. In the United States, the U.S. Nuclear Regulatory Commission (NRC) is responsible for regulating the physical protection of civilian nuclear material and facilities. The NRC maintains two design...
Any criminal or intentional unauthorized acts to critical infrastructures such as radioactive waste disposal facilities would undermine efforts to protect people, property, society and the environment either directly or indirectly through exposure to ionising radiation. With the aim of preventing a malicious act, a security measures should be design to deter malicious acts, detect and delay...
Rapid advancement in technological development has a profound effect on the world around us. In this context, the influences that these advances could have on the nuclear and radiological security are changing rapidly and dramatically. Nuclear operators and security stakeholders are already investing significant resources to address some of these new emerging threats and to also integrate new...
Human reliability from security point of view is challenging because internal and external influences can negatively impact the reliability and trustworthiness of employees in an organization. As a result, employees with access, knowledge and authority who develop malevolent intent against a facility pose a serious risk. Although, the Nigeria Research Reactor-1 facility is a low power research...
Radioisotopes such as Cs-137 and Co-60 are used in various medical, industrial, and research applications. This radiological material can be a theft or sabotage target and needs to be protected. This paper will provide an update on the progress of developing an international security standard for devices used in clinical medical settings that contain high-activity radioactive sources. A...
National Nuclear Energy Agency (BATAN) of Indonesia has been implementing trustworthiness assessment for nuclear facility employee which is part of nuclear security culture program. Currently, survey, interview and observation are still the best methods to assess the changes of employee behavior. These methods are become too subjective and difficult to measure and reanalyze due to the...
In advanced pressurized water reactors (PWR) as Korean APR-1400 and Russian VVER-1200, instrumentation and control (I&C) systems comprise of different data processing systems that utilize different network interconnections with different communication protocols. To provide data exchange between those several I&C systems, gateway devices play an important role in implementation of the I&C...
Nuclear forensics in Thailand established in 2012 since the Seoul Nuclear Security Summit. The Prime Minister has declared to support the global nuclear security as well as nuclear terrorism mitigation. As a result, Thailand had arranged the ASEAN Regional Forum on Nuclear Forensics on December 2011 and planned to establish a Nuclear Forensics Center. After that, the Office of Atoms for Peace...
Recent security events involving unmanned aircraft systems (UAS) or Remotely Piloted Aircraft Systems (RPAS) have left many Nuclear Sites wondering if they should implement counter-UAS technologies. Many sites are therefore beginning to assess the security risks and potential impact of UAS threats on security, operations, to determine whether implementing Counter-UAS technology or products is...
The Republic of Kazakhstan is a strong advocate in the non-proliferation of nuclear weapons, being one of only four countries to give up nuclear weapons they previously had in their territory, and is a consistent supporter of the idea of peaceful use of atomic energy.
Kazakhstan has a rich nuclear heritage and developed nuclear infrastructure, including former nuclear test sites; uranium...
Nuclear forensics (NF) is internationally acknowledged as an integral part of the robust national nuclear security regime that supports law enforcement investigations of nuclear security events (NSEs). NF could deter unauthorized and malicious acts through its ability to link material to perpetrators, whereas the conclusions drawn by NF analysis about the material origin confer a valuable...
The Nuclear Regulatory Authority Act, 2015 (Act 895) established the Nuclear Regulatory Authority, Ghana in January 2016 as the competent authority for regulation of nuclear and radiological activities in Ghana. The main practices and activities related to radioactive or nuclear material in Ghana are: Medical (General X-ray: computed tomography, mammography, fluoroscopy; Radiotherapy:...
The global nuclear security regime comprises of international instruments like CPPNM, United Nations resolutions and IAEA codes and standards. These instruments make States responsible for implementing nuclear security and development of domestic laws, regulations and institutions to govern nuclear security in the country and establishment of systems to prevent, detect, and respond to...
A nuclear security event involving nuclear and other radioactive materials out of regulatory control (MORC) has potential severe consequence on public health, environments, economics and society. Therefore, each state has responsibility to develop national nuclear security measures including the response on any nuclear security events. Japan Atomic Energy Agency (JAEA) which is the national...
BACKGROUND
In Malaysia, the Ministry of Health played a very important role to ensure the safety and security of radioactive material used in medicine particularly in nuclear medicine. The mechanism of the controlled was set by the implementation of the regulatory requirements such as registration and registry requirements, monitoring, and enforcement as well as prosecution practice....
Without proper end of life management, disused sealed radioactive sources (DSRSs) become increasingly vulnerable to loss, theft, and sabotage that can result in accidents and incidents, including loss of life. Type B quantities of radioactive material can be particularly hard to manage due to complexity and costs associated with their compliant shipment from user’s facilities to sites for...
This article describes the arrangements currently being worked on provision and promotion of training and enhancement of EPR capabilities of the Member States in the area of Maritime Search for illicit trafficking of nuclear and radioactive materials. The general Conference Resolution GC(57/RES/9 dated September 2013 – Article 70 requests the Secretariat to continue its efforts to develop, in...
Summary
The extended abstract provides a historical context and overview of a National Nuclear Forensics Library, henceforth ‘Library’, summarizes outcomes of the technical session on Libraries from the 2019 IAEA Technical Meeting on Nuclear Forensics: Beyond the Science, and offers an outlook of Library development, implementation, and sustainability over the next ten years.
Description
In...
Nuclear forensics developed over the last decades as a consequence of illicit nuclear material seized outside its fuel cycle. Candidate materials in the back end of the fuel cycle include spent fuel and Pu retrieved from the reprocessing of the fuel. An important challenging task in nuclear forensics is the identification of the origin of the material, which is characterized by the type of the...
Djibouti and the United States Forging a Strong Partnership in Sustaining a Nuclear Security Detection Architecture
Author: Jason Padilla, Osman Hassan Farah
Abstract:
The strong partnership between the United States and Djibouti is a successful representation of a multi-year effort to develop a nuclear detection architecture. Proper implementation and sustainment of a successful nuclear...
Rusli, I.
Royal Malaysian Customs Department, Malaysia
Email: irfan.rusli@customs.gov.my
Abstract: Bureaucratic delays, excessive border procedure and inspection pose a burden for moving goods across borders for traders. Trade facilitation, which requires simplification, modernization and harmonization of export and import processes, has therefore emerged as an important issue for the...
The National Nuclear Center of Kazakhstan (NNC) operates an Impulse Graphite Reactor (IGR) with a homogeneous uranium-graphite core. Graphite blocks in the reactor core are impregnated with a water solution of uranyl nitrite with a concentration of ~3.1 grams of uranium per one kilogram of graphite. The enrichment of uranium by the isotope U-235 is 90%. The reactor core consists of immovable...
The International Atomic Energy Agency (IAEA) recognizes that the drafting of regulatory text is the means of guaranteeing an adequate nuclear legal regime in order to preserve peace, health and security of populations. For the IAEA, the challenges are great and various. To this end, the IAEA provides constant support in the development of legal text in the sensitive areas of nuclear safety...
Successful implementation of international norms on nuclear security requires a number of prerequisites at the State – including the provision of adequate legal, institutional, financial, technical and human resources. Among the latter (HR), it is often taken for granted that necessary knowledge and competence do exist per se. However, this is not always the case, just the contrary – time,...
Critical infrastructure, such as nuclear power plants, widely uses various Operational Technology (OT) solutions, such as Industrial Control Systems (ICS). OT networks used to be logically and physically isolated from other business functions, but nowadays it is not always true. Along with the digitalization of such systems, they got interconnected and internetworked. Thus new cybersecurity...
Ensuring a timely and effective response to a security event involving nuclear or radioactive material is a challenge. This is due to the need for accurate and reliable contingency plans and procedures, adequate coordination between stakeholders involved in response, and the costs of systematic exercises to validate, test, evaluate, and prepare personnel to respond to nuclear security events....
Opportunities within technical fields may seem limited for women, particularly in specialized areas such as nuclear security. There may be real or perceived barriers to career advancement, specifically in opportunities for women to exercise project or team management leadership, build important networks, and expand and demonstrate technical skills. This paper will discuss serving as a Chief...
There have been many cases reported on security breached accident due to the lack of security
awareness around the world. This awareness on security that was called security culture was
especially important in the nuclear facility since its consequence was huge compared to other
facility. The international community including the IAEA has been making efforts to enhance
the awareness of nuclear...
In 2010, the Japanese Government issued the national statement at Nuclear Security Summit (Washington D.C., USA) to develop technologies related to measurement and detection of nuclear materials and nuclear forensics, and to share them with the international community. In response to this statement, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) was...
Albania has established much of the legal and regulatory framework necessary to form the basis of a comprehensive security regime for radioactive sources and associated materials and facilities. The law establishes and empowers a regulatory authority Radiation Protection Commission to enact security requirements on licensees. The regulation on Physical protection of radioactive material...
The record has shown, 84% cases of material out of regulatory control in Malaysia were contributed by mobile radioactive sources. From the figure, 38% were reported missing while another 38% were reported stolen. In both cases, almost 64% incidents occurred during transit with 68% incidents contributed by the Industrial Radiography Activities. At present, Malaysia has over 90 registered...
In the summer of 2016, the International Atomic Energy Agency (IAEA) launched a Coordinated Research Project (CRP) on Enhancing Computer Security Incident Analysis at Nuclear Facilities (J02008). The primary objective of this CRP was to improved computer security capabilities at nuclear facilities to support the prevention and detection of, and response to, computer security incidents that...
The IAEA’s Incident and Trafficking Database (ITDB) compiles 3497 confirmed reports of nuclear and other radioactive material out of regulatory control (MORC) from 1993 to 31 December 2018 to include 253 incidents involving unauthorized acts reported in 2018. Better recording of trafficking incidents, improvements in the resolution of alarms emanating from radiation detection events, and...
The U.S. Department of Energy/National Nuclear Security Administration’s Office of Radiological Security (ORS) cooperates with partner countries throughout the world to enhance the security of radioactive sources used for legitimate purposes. As codified in the IAEA’s Nuclear Security Series Number 11, Security of Radioactive Sources, effective radiological source security is based upon...
Nuclear Security education and training is very important for all personnel who are directly or indirectly involved with the nuclear industry. Pakistan Institute of Engineering and Applied Sciences (PIEAS) is the leading educational and training institute in Pakistan for master programs in various fields related to nuclear engineering and technology. Recognizing the importance of nuclear...
Background
Nuclear materials have to be secured while in facilities and during transports. It is a truism. That is why the CPPNM has been made and amended to fit with current threats. That is also the reason why IAEA is developing a set of NSS documents to help countries build, improve and implement their national nuclear security regime. The French nuclear security authority has...
If there is one noticeable trend in nuclear security these days, it is the global effort to develop, strengthen and sustain nuclear security regulatory infrastructure. Notwithstanding the level of nuclear advancement, regulatory frameworks of any given country are primary examples illustrating the principle of continuous improvement – we can always do more, better, safer and securer. Even when...
Working with key nuclear industry cyber experts, NTI has developed the Cyber-Nuclear Security Forum to strengthen protection of civilian nuclear facilities from cyberattacks. A successful cyberattack on a nuclear facility could have serious consequences with global ramifications for human health and safety and the industry. The Forum seeks to support the cyber-nuclear experts working hard to...
Abstract
Nuclear powers plants are one of the most important nuclear facilities, are considered to be a safe, economically viable, sustainable and environment friendly power source for the socio-economic development of any country. Most of the embarking countries have established or are in the process of establishing their legislative and regulatory framework to assess and subsequently...
Every activity related to the utilization of nuclear power must pay attention to the security, peace, welfare, safety and health of workers and community members, as well as protection of the environment. Further provisions relating to safety and security are regulated in Indonesian Government Regulation (GR) No. 33 of 2007 concerning Safety of Ionizing Radiation and Security of Radioactive...
Nuclear security is the responsibility of a Member State. Meeting international obligations and effectively implementing national nuclear security strategies can be a challenging activity, oftentimes made complicated by the need to implement and sustain national detection strategies that use both instruments and information. This paper will focus on the challenges of nuclear security operation...
Newcomer countries introducing nuclear energy programs for the first time have the advantage of building on the vast experience accumulated by countries with already existing nuclear energy programs in the design, development and implementation of their nuclear security systems. On the other hand, newcomer countries face a number of challenges that, if not addressed properly, can strongly...
The Kingdom of Morocco has been using, transporting and storing, for decades, radioactive sources in a variety of socioeconomic sectors, and different practices. It also had established a legal and regulatory framework for nuclear and radiological safety since 1971. However, security aspects were not addressed at that time.
The Kingdom of Morocco has been, like many counties, facing a real and...
For a State, one essential element of the security of radioactive sources is an effective national regulatory framework that provides for control over these radioactive sources. In many countries, the regulatory framework was initially developed based on safety concerns. Due to increasing concerns related to the security of radioactive sources and materials, States began to establish nuclear...
Nuclear security is the system that has responsibilities to prevent, detect and respond to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear or other radioactive substances or their associated facilities. Nuclear security culture is the collection of characteristics, attitudes, and behavior of individuals, organizations, and institutions which...
To ensure the continued security and safety of nuclear enterprises, the Penn State College of Engineering is formally introduced a nuclear security option in its nuclear engineering master’s program. This unique master’s degree program is designed to educate and train the next generation of nuclear security experts who can actively contribute to improving nuclear and radiological security...
Through collective efforts, the international community has made great strides in creating and promoting global awareness and cooperation in nuclear security. Since the 1st Nuclear Security Summit in 2010, an increased awareness and political momentum favoured international cooperation and boosted initiatives and activities at the IAEA level, as well as in the framework of the Global...
EVALUATING RADIOCHRONOMETRY BY SINGLE COLLECTOR MASS SPECTROMETRY FOR NUCLEAR FORENSICS: A MULTI-INSTRUMENT STUDY
K. Samperton (Lawrence Livermore National Laboratory / US Department of Energy)
K. Treinen (Lawrence Livermore National Laboratory / US Department of Energy)
R. Lindvall (Lawrence Livermore National Laboratory / US Department of Energy)
J. Wimpenny (Lawrence Livermore National...
Most nuclear security systems in place today were not designed to address the current threat environment. Systems that were originally intended to be stand alone are now interconnected. Devices that have a single purpose are built on multi-purpose platforms and use communication protocols that, while effective, have no ability to authenticate authorized versus unauthorized commands. These...
A threat and security analysis concerning the Physical Protection System (PPS) of Nuclear material (NM) and Radioactive material (RM) is a complex sector because of their widely used in justifiable functions like in industry, medicine, agriculture and scientific research. But their probable factors may be misrepresented by the incorrect performer to achieve particular anti-state goal in the...
It is important to have a robust computer security culture in order to enhance the efficiency of security plan since computer security culture is one of essential part of overall security culture. With a constant innovation on information technologies (IT), IT advancement can be utilized to develop a more composed security management through building, maintaining and even promoting awareness...
The safety and security record for the application of nuclear technology in the United Republic of Tanzania is admirable although some incidents involving illegal possession of radioactive material in the country have been intercepted by the national police between 1996 - 2012. Latest incidents of illicit trafficking were recorded in 2009 and 2012. In this matter the safety and security of...
Synopses:
Establishing and sustaining an effective and credible regulatory body is ensured through, inter alia, continuous improvement. In this sense, AMSSNuR has established a internal scientific committee whose mission is among others to assess and make proposals to AMSSNuR for improving its activities the national, regional and international levels. In this respect, AMSSNuR has conducted...
The U.S. Department of Energy/National Nuclear Security Administration’s Office of
Radiological Security (ORS) collaborates with partner countries throughout the world to enhance the security of radioactive sources used for legitimate purposes. The partner stakeholders’ environments consist of operators utilizing ionizing radiation for medical, industrial, and research applications. In each...
The global community relies on national nuclear regulatory authorities around the world to effectively implement the world’s nuclear nonproliferation legal instruments and standards, including: [The Non-Proliferation Treaty (NPT), International Atomic Energy Agency (IAEA) Safeguards Agreements and Additional Protocols, and the Convention on the Physical Protection of Nuclear Material...
In Chile, the Commission on Safety and Security for Radiological Emergencies, CONSER, was created by Decree No. 647, in December 2015 with the mission of advice and support the Presidency of the Republic, in strengthening the capacity of prevention and reaction of the competent institutions to nuclear or radiological events, that may affect public security, safety of people or the...
The Integrated Nuclear Security Support Plan (INSSP) initial and review missions were carried out in Cameroon in 2012, 2015 and 2018.One of the main nuclear security functional areas was on sustainability which lay emphasis on Nuclear Security Culture. Several recommendations were turned into actions to see to it that the action plan was developed and followed up. National Radiation Protection...
Sealed radioactive sources are used for a wide variety of purposes in Cameroon. A wide range of these sources or activities exist before the establishment and functioning of the Cameroon National Regulatory Authority. The main challenge of the Cameroon government through its National Regulatory Authority has always been to have knowledge on the radioactive source used under its territory. This...
The international & national efforts for reducing the threat of radiological terrorism and for responding to radiological emergency effectively have been strengthened. The organization of a major public event may give rise to security challenges and potential threats leading to health, social, psychological, economic, political and environmental consequences. The purpose of this paper is to...
Indonesia has around 7,430 different types of radioactive sources from all categories (based on BAPETEN database, b@lis infara on 16 May 2019). Radioactive sources has beed applied in industries, hospitals, and research centers and it is one of the most urgent and threatening dangers, as it can be used in dirty bomb and other malicious act. Indonesian Nuclear Energy Regulatory Authority...
The Centre of Technological Applications and Nuclear Development (CEADEN) is an organization of investigation, development and innovations destined to generate and diffuse knowledge; as well as, develop and market products and competitive services starting from the science and the nuclear technique, laser, optic and related. Inaugurated on October 28 of 1987 with the presence of the Mr. Hans...
The threat of criminal or unauthorized acts involving nuclear and radioactive material has grown since the early 1990s. Each year IAEA reports loss, theft or out of regulatory control discovery of radioactive materials. Most incidents are minor, but material is potentially available for criminal acts. Illicit trafficking and theft of nuclear material can lead to nuclear proliferation and the...
The concept of Unattended and Remote Monitoring Systems is commonly used in the field of IAEA nuclear safeguards. Usually, those technologies such as alarm detectors, gamma or neutron detectors, video cameras and data remote transmission network are used to transmit real-time or regular measured data back to supervisory departments (e.g. IAEA). It is mainly used to supervise those nuclear...
Part of the challenges to the creation of responsible nuclear energy programs—including new, novel activities within the nuclear fuel cycle (NFC)—lies in evaluating safety, security, and safeguards (or, nonproliferation) mechanisms. While traditionally implemented and evaluated independently across NFC activities, recent calls from the global community suggest the need for an “all hazards”...
This paper presents first the regulatory framework of the United Arab Emirates (UAE) for Cyber Security at the nuclear power plant and secondly its implementation for the licence of Barakah Nuclear Power Plant (NPP). FANR, the nuclear regulator of the UAE in accordance with the Federal Law by Decree No. 6 of 2009 on Peaceful Uses of Nuclear Energy, has developed and maintained a regulation for...
This paper presents the benefits, to the development of the nuclear power programme in the United Arab Emirates (UAE), of the different missions performed by the International Atomic Energy Agency (IAEA) in regards to nuclear security for nuclear power plant. At the very beginning of the implementation of the nuclear power programme, the IAEA, on demand of the UAE, conducted an Integrated...
The main purpose of the H-2020 C-BORD („effective Container inspection at BORDer control points”) EU project (2015-2018) was to develop, combine and test new comprehensive and cost-effective detection methods for higher efficiency non-intrusive inspection of freight containers to reduce false negative and positive alarms and to reduce safety risks for customs agents. These technologies are...
Whether we like it or not, acknowledge it or not, the number of cyber-attacks is increasing. Malicious actors are continuously becoming more sophisticated, highly motivated, some also well-funded, and focused on the nuclear sector. If cyber-attacks in the nuclear sector were to be successful, consequences of such an attack could potentially be catastrophic for people and the environment....
In France, the fight against illicit trafficking of radioactive and nuclear materials as long as the suitable operational response is part of the national security organization and doctrine. More widely, an efficient response to R/N terrorist threats requires coordinated actions from various authorities, such as security and control forces (mainly police and customs) or specialized units (fire...
On 14 January 1858, Napoleon III was victim of a bomb-attacked in front of the Paris opera house by Italian terrorists as a response to French interventionism in their country. After this attack, Napoleon III decided the building of a new opera house that would be more prestigious but as well better secured: one of the most famous building in Paris was born, the Opéra Garnier.
Who remembers...
GKTC is a part of the Ukrainian State System of training, retraining and advanced training of MPC&A specialists. During the years of activity GKTC has prepared and delivered about 300 national training courses on nuclear security. More than 4500 Ukrainian specialists of about 90 institutions and organizations of Ukraine have raised their level of skills at these training courses.
In 2012 an...
Natural Resources Canada (NRCan) has responsibility within Canada for mobile survey operations in the event of a nuclear emergency. Our research team, which includes researchers from NRCan, the National Research Council Canada, Defence Research and Development Canada, the Canadian Nuclear Safety Commission, and other Canadian Universities and Federal agencies, has benefitted from close...
This article is not about violation of rights of woman or man. This article is about deep understanding, that differences are combine. There is no need to underline, that traditionally security area is a “man area”, even nuclear science was “man area” not so far ago. Nevertheless, things are changing and we need to consider this. Worlds tendency is make equal possibilities for man and woman...
We report about milestones, past challenges, and the way ahead for a successfully ongoing German-Ukrainian nuclear security cooperation programme, which was launched in 2015 under the auspices of the Global Partnership against the Spread of Weapons and Materials of Mass Destruction. Following a thorough needs assessment, two sites were selected for implementation:
1) Rivne Nuclear Power Plant...
This work assesses Ghana’s Nuclear Security Regime in the wake of sustained upsurge in the frequency of activities of extremist groups in the west African sub region, highlights the key challenges Ghana is facing in implementing its Nuclear Security regime, and recommends a number of next steps for a forward outlook. The formation of the Nuclear Regulatory Authority, Physical Protection...
The U.S. Department of Energy’s National Nuclear Security Administration (NNSA) works to reduce the global danger from weapons of mass destruction in the United States and internationally. NNSA’s international nuclear security programs began more than 20 years ago as a cooperative effort with Post Soviet States under the Cooperative Threat Reduction framework, and has evolved to its approach...
China, Japan and the Republic of Korea (ROK) drew statements that committed to establishing a capacity building support center in each country at the 1st nuclear security summit held in Washington DC in 2010. Based on the statement, each country respectively established a capacity building support center in December 2010 in Japan (ISCN: Integrated Support Center for Nuclear Nonproliferation...
The nuclear industry is changing. Industrial Control Systems and physical security systems are evolving from analog to digital equipment. There is a proliferation of microprocessors and operating systems throughout the system. Equipment that was traditionally connected via dedicated, hardwired connections and used proprietary protocols are now networked using more traditional Internet...
Customs is the administrative department of the state to exercise the authority of border port entry and exit supervision and administration, and Customs is the first line of defense to guard the security of the country,Customs plays a very important role in maintaining national security. China Customs attaches great importance to nuclear security, earnestly implements the state's main...
Radioactive material dispersion and attacking nuclear facilities could be used for terrorism or other criminal acts. These incidents would lead to serious consequences such as human health and environment damage, creating panic, and affecting economic and political stability. Since 1993 to 31 December 2018, ITDB shows a total of 3497 incidents of unauthorized activities and events involving...
HELINUC: Airborne gamma mapping system of CEA
Marine WANSEK, Stéphanie MENARD
CEA, DAM, DIF, Bruyères-le-Châtel, 91297 Arpajon Cedex, France
The CEA DAM has a number of high-capacity (2 – 20 liters) sodium iodide gamma detectors and high performance germanium detectors used for operational response in nuclear security events. The detectors are positioned in packaging adapted to their use:...
For many decades, gamma ray spectrometry has been a key technology employed by laboratories for the identification of radioactive materials. Through this method, the detection of specific radioactivity can be indicative of nuclear events (ranging from nearby nuclear incidents to distant nuclear tests detected in global monitoring networks) or the process history and origin of nuclear...
The U.S. Department of Energy’s National Nuclear Security Administration (DOE/NNSA) Office of Material Management and Minimization (M3) works to minimize civilian stocks of highly enriched uranium (HEU) and separated plutonium from falling into the hands of non-state actors by minimizing and, when possible, eliminating the civilian use of weapons-usable nuclear material (WUNM).
Over the last...
Radiation detectors with fully integrated digital readout and Power-over-Ethernet (PoE) connectors enable a whole set of new applications and services. In this paper, neutron and gamma detectors will be presented which are read out by low-power Silicon Photomultipliers (SiPMs) that allow for long autonomy from mains power supply when deployed in the field. This is especially needed in...
ONR is the UK’s independent nuclear regulator of nuclear safety, security and conventional health and safety at licensed nuclear sites in GB. This includes the existing fleet of operating reactors, fuel cycle facilities, waste management and decommissioning sites.
This paper will explore how our goal-setting approach enables effective cyber security regulation by placing clear accountability...
As the IAEA declares, “excellence in operations and excellence in communications are mutually reinforcing concepts” . The main objective of this paper is to analyze the impact of communication tools in the nuclear sector. Particularly, we would like to narrate the experience of Argentina in management of security events.
Our main argument states that communication must be considered as a tool...
The United Nations Security Council Resolution 1540 (UNSCR 1540) in 2004 highlights the legislation phase of the United Nations Security Council. Before the establishment of this resolution, the Security Council Resolutions are interpreted mainly to maintain peace and security towards the existence of international armed conflicts. The mandate to maintain peace and security, as stipulated in...
In many countries there is some sort of screening in place as a preventive mitigation tool against the insider threat. A screening however, provides a picture of a person at a specific moment in time, based on the information that is gathered. Even though these screenings are conducted on a regular basis, it is still necessary to have some sort of follow up of these people who are working with...
Human Factor in Nuclear Security
Sypnoses presented by Nuclear Security Branch of Consejo de Seguridad Nuclear (Spain)
There is no doubt that the Human factor in many industrial activities is highly important.
In fact regarding Safety, the Reactor Operators who work in Control Room or even those who are dealing with important safety equipment have a very comprehensive and intensive training...
AUTORS: Antonio C.A. Vaz; Vinicius F. Borges and Frederico A.Genezini
ABSTRACT
A key concept in nuclear reactor operation is that nuclear security is the result of interactions between human, technological and organizational factors. Nuclear Standards Regulatory understands how human factors from psychological, physiological, behavioral and emotional origin can affect the reactor security....
IAEA NUCLEAR FORENSICS RESIDENTIAL ASSIGNMENTS
R. Kips (Lawrence Livermore National Laboratory / US Department of Energy)
K. Treinen (Lawrence Livermore National Laboratory / US Department of Energy)
E. Kovacs-Szeles (Hungarian Academy of Sciences - Centre for Energy Research – Budapest, Hungary)
K. Mayer (European Commission – Joint Research Center – Karlsruhe, Germany)
A. Apostol (Horia...
Building upon the successful International Conference on Advances in Nuclear Forensics: Countering the Evolving Threat of Nuclear and Other Radioactive Material out of Regulatory Control (July 2014), IAEA convened a Technical Meeting on Nuclear Forensics in April 2019, Vienna, Austria. This meeting focused on the implementation of nuclear forensics in response to nuclear security events...
This paper gives a study of the high resolutions γ ray spectrometry (HRGS) capa-bilities to define seized spent nuclear fuel (SNF) origin during its forensic examination in the first 24 hours of investigation. Keeping in mind the multicomponent nature of the spent nuclear fuel, during test method development attention was paid on the following set of nuclides: cesium-134, cesium-137,...
Cybersecurity has become a cornerstone of nuclear security in modern NPPs, considering the place of digital equipment (including reactor control systems and reactor safety systems) in their design and operations. IEC SC45A decided in 2008 to develop an IEC standard on cybersecurity requirements (IEC 62645). The first edition was published 2014. As the development of digital I&C raises, a new...
The first reported cyber-attack on a Safety Integrated System demonstrates that systems important to safety need cyber security measures to avoid their safety arguments being invalidated. But there is a broader justification: cyber security risks arise as a direct result of the nature of networked digital technology, which renders existing safety analysis inadequate to mitigate those risks....
It has become easier for terrorists to obtain chemical explosives in recent years, with the spread of the internet. Also, examples of terrorism at nuclear facilities have been reported around the world. Hence, various measures against terrorism targeting nuclear facilities with chemical explosives have been implemented in many countries. On the other hand, that fact indicates the need of...
Traditionally, nuclear Insider Threat programs have focused upon those individuals with trusted access to facilities and or sensitive information, the abuse of which could lead to unacceptable consequences. Prior to the advent of digital technology, “insider threat” was usually limited to physical attacks focused on theft or sabotage. Recent integration of remote connectivity, engineering...
Elements of capacity building for nuclear security cover education, training, awareness, workforce management, knowledge management and network management. As an operator, Indonesia National Nuclear Energy Agency (BATAN) has an obligation to ensure adequacy of its capacity building for nuclear security in organization level. According to Implementing Guide NSS-31 G document, one of...
Introduction:
Ionizing radiation sources are used in multifarious applications in various fields such as medicine, industry agriculture, research, etc. Safety record of the sources used in these practices is generally good, however, if radiation sources are not handled safely and securely then it may give rise to potential exposure leading to unacceptable health hazards including death of...
Thailand’s INSSP was developed in 2009 based on the findings and recommendations of IAEA team experts, the first review was in 2014 with the support of IAEA. Over the years, the Office of Atoms for Peace (OAP) continued to work on INSSP, as well as coordinate with the relevant authorities until Thailand’s legal instrument i.e. the entry into force of Thailand Nuclear Energy for Peace Act, B.E....
Implementation of the Borehole Disposal System for safe and secure management of Disused Radioactive Sources in Ghana.
Eric T. Glover and Paul Essel
Radiation Protection Institute
Ghana Atomic Energy Commission
The Government of Ghana, through Ghana Atomic Energy Commission (GAEC) is implementing the Borehole Disposal System (BDS) developed under an International Atomic Energy Agency (IAEA)...
The Czech Republic has a long-standing tradition in peaceful utilization of nuclear energy and ionizing radiation. Like other countries, the Czech Republic is also facing new modern ways of threat, especially due to increase of international terrorism, cyber threats, or new affordable technologies that can be misused to steal nuclear material or to sabotage nuclear facilities. Especially...
Radioactive sources and associated facilities are used in the world widely – in medicine, industry, agriculture, geological exploration etc. Depending on the type of their application, the characteristics of radioactive sources are also different - it could be a high activity radioactive source for radiotherapy treatment or a very low activity source in a chromatograph device. Conditions of...
Implementing a Counter Unmanned Aircraft System (CUAS) Program at a high-security nuclear facility is a challenge and requires a certain degree of empathy toward system owners as you migrate toward planning, installation and final operational status. Resistance and conflict will arise during the project lifecycle. An appreciation for the level of dedication and concern demonstrated by owners...
The paper describes the conduction of a tabletop exercise at the premises of NCSR Demokritos, in order to examine the efficiency of the Physical Protection System against external adversaries. The work forms part of the activities of the group within the framework of the IAEA CRP J02006 “Enhance the Effectiveness of Nuclear Security at Research Reactor and Associated Facilities” and in...
The use of radioactive material is increasing rapidly all over the world for a wide variety of beneficial purposes, in industry, medicine, agriculture, research and education. There is, thus, need for safe and secure applications of radioactive material, and safety and security measures are protect and prevent from causing a radiological hazard on individuals, society and the environment....
Emerging technologies have focused on blockchain technology. Its growing use in the industry motivates the review of possible applications in the nuclear production. For instance, the French Atomic Energy Commission (CEA) developing a blockchain solution to increase trust in the food and Rosatom (Russia) invest in R&D on blockchain to safeguard military assets.
On the other hand, the IAEA has...
Cyber threat profiling and risk mitigation is critical to any nuclear state organization and should be considered as part of any comprehensive nuclear security program. Defining and evaluating the impact of the cyber threat to mission can be challenging. An existing national nuclear nonproliferation organization undertook an effort to incorporate cyber security activities into its program to...
INFCIRC/225 “The Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities” is key IAEA document defining objectives and elements of a State’s physical protection regime. Its latest revision, INFCIRC/225/Revision 5 issued in 2011, first introduces concept of sustainability into physical protection activity. In particular, it recommends that “The State...
The Coordinated Research Project (CRP) J02012 has been deployed by the IAEA in the theme of “Advancing Radiation Detection Equipment for Detecting Nuclear and Other Radioactive Material out of Regulatory Control”. The objective of the CRP was to determine and fulfill the gaps between nuclear security (NS) needs and existing capabilities of the detection instruments. The final goal of the...
Our paper examines how local variations in policies, procedures, and regulations affect the value of national-level guidance and programs for local jurisdictions developing nuclear and radiological security capabilities. It also suggests a framework for additional research into these variations.
Efficient prevention, detection, and management of radiological and nuclear threats requires the...
The most important characteristics of the radiation monitoring equipment used to ensure Nuclear Security are: reliability, stability in operation, maintainability, repairability, long life of the system. To achieve these indicators, in addition to the quality assurances declared by the equipment manufacturer, an important role is played by the culture of operation and maintenance of on-site...
The Canadian Nuclear Safety Commission (CNSC) Laboratory, working within the Nuclear Material Signature and Provenance Assessment Capability Development Project (NMS/PAC), has developed a laser ablation inductively coupled plasma mass spectrometry (LA-ICP-MS) method for rapid bulk trace element analysis of uranium ore concentrate (UOC) suitable for both national nuclear forensics library...
Vietnam Agency for Radiation and Nuclear Safety (VARANS) is under the Ministry of Science and Technology (MOST) and has the responsibility to assist the Minister in performing the duties and authorities in radiation and nuclear safety; security of radioactive sources, nuclear materials, nuclear facilities; international safeguards; emergency response to radiation and nuclear incidents within...
Increasingly, physical security systems are evolving from analog, hardwired equipment to digital, networked, Internet Protocol (IP)-based components which means that computer security must be considered when implementing physical security upgrades to protect radiation sources. The blending of physical protection systems with traditional information technology systems is advancing at such a...
Indonesia is catching up with infrastructure development in recent years. Based on the World Economic Forum 2013 data, Indonesia's infrastructure is ranked 64 out of 148 countries in the world. Meanwhile, Indonesia's ranking in ASEAN is ranked 5th after Vietnam. The main purpose of this development is to improve the economy and business in Indonesia. However some aspects should be considered...
Indonesia's experience in implementing the Amendment to CPPNM for physical protection of its nuclear material and nuclear facilities
The research and development of nuclear science and technology in Indonesia has been operating since the late 1950s, and has contributed in various sectors of life. To date, the nuclear research and development is mainly carried out by the National Nuclear...
The U.S. Department of Energy/National Nuclear Security Administration’s Office of Radiological Security (ORS) collaborates with partner countries across the world to enhance the security of radioactive sources that are used for legitimate purposes. Defining and implementing a robust security approach across any industry that uses radioactive material requires strong coordination with...
The control of nuclear power plants (NPPs) is increasingly dependent on digital Instrumentation and Control (I&C) systems. The digitization has brought a series of benefits to the I&C systems of the NPPs, and it also results in a growing and previously unforeseen cyber attack threat. Even if the I&C system adopts preventive measures such as physical isolation, the risk of cyber attack is still...
1.The most important technological solutions for the digital transformation of customs control of fissile and radioactive materials;
2.The main organizational directions of digital transformation
The German Federal Office for Radiation Protection (Bundesamt für Strahlenschutz, BfS) has gathered considerable experience over the last decade in the identification and characterization of nuclear and other radioactive materials at the scene of a nuclear security event. This experience has been gained through numerous exercises, alarm exercises, training situations and deployments. The...
The Insider Quantification and Ranking Process (IQRP) is an assessment tool that effectively and accurately identifies and documents the potential negative effects an insider can have on the site’s protective posture. This analysis involves conducting interviews, physical protection analyses, validating or invalidating current analysis documentation or assumptions. The "risk-based" interview...
In the infosec community, insider threat is a “buzz word” which covers several different meanings. However, in the nuclear field, IAEA has precisely defined it as “an adversary with authorized access to a nuclear facility, a transport operation or sensitive information”.
Because many functions in nuclear facilities are now digitalized, computer networks are natural targets for a malicious...
The overall objectives of an Integrated Nuclear Security Support Plan (INSSP) are to identify and consolidate the nuclear security needs of an individual State into an integrated document that includes the necessary nuclear security improvements, as well as to provide a customized framework for coordinating and implementing nuclear security activities conducted by the State, the IAEA and...
The Government of Lebanon requested an INSerV mission in 2006 for evaluating the nuclear security measures that need to be taken in Lebanon for implementing a comprehensive scheme for combating the illicit trafficking of radioactive and nuclear material and to enhance the physical protection relevant to radiological facilities.
The first integrated Nuclear Security Support Plan, drafted in...
The application of ionizing radiation sources in various sectors of the Nigerian economy pre-dates the establishment of the Nigerian Nuclear Regulatory Authority (NNRA) as the competent authority for nuclear safety and radiological protection regulation in Nigeria. The NNRA established by Act 19 of 1995 commenced operation in 2001. In early 2000, Nigeria recorded loss of control incidences...
It is a widely accepted premise that terrorists seek to acquire radioactive materials with the objective of causing both harm and disruption on a major scale. The United States Depart of Energy’s Office of Radiological Security (ORS) has taken a multi-tiered approach to securing soft targets (e.g., universities and hospitals), which house radioactive materials for research and medical use. ...
Nuclear power plants (NPP) install digital instrumentation and control (I&C) systems and physical protection systems (PPS) for its safe and precise operation using software-intensive systems and interconnected digital components respectively. The both of these software-intensive digital I&C systems and interconnected systems of PPS interface safety and security systems creating new cyber...
Protecting facilities that house high activity radioactive materials can be a challenge for any organization. The Office of Radiological Security (ORS) seeks to mitigate this challenge by providing physical security equipment and training assistance to sites who volunteer to participate in their program. Over the last ten years, the ORS Alarm Response Training (ART) has conducted over 180...
Nuclear Power Plants (NPP) are globally most protected critical infrastructure in the sector. The Fukushima accident was a wake-up call for reminding the international community about the possible outcomes. Today, methods to protect critical infrastructures in the security sector are rapidly transforming due to the rapid changes in cyber, physical and hybrid threats which are exponentially...
In a resolution at the International Atomic Energy Agency (IAEA) 2002 General Conference, the IAEA adopted an integrated approach that includes physical protection and material accounting for transport of radioactive material and nuclear material and recommends that security system designers consult with safety experts. [1] In this paper, we present examples of the integration of safety and...
An effective nuclear security infrastructure in a country requires an appropriate integration and coordination of responsibilities among the government agencies. In Kenya, the Radiation Protection Board is the national competent authority on matters of radiation safety, security of radioactive and nuclear materials, control of consumer products contaminated with radioactivity, and other...
Nuclear safety and nuclear security of Uranium Fuel Fabrication Facilities have the same ultimate goal to protect individuals, the public, and the environment from harmful effects of ionizing radiation. In uranium fuel fabrication facilities with lowenriched uranium 20% which uses in research reactors, large amounts of radioactive material are present in a dispersible form. This is...
ABSTRACT
Radioisotope production facility is completed and commissioned in 2013 to produce some radioisotopes for medical and industrial applications. Nuclear safety and security is standardized and have common purposes for protection of people, society and the environment. In both cases, such protection is achieved by preventing a large release of radioactive material as well as nuclear...
Nuclear safety and nuclear security measures have in common the aim of protecting human life and health and the environment from the harmful effects of ionizing radiation. Thus, both must be designed and implemented in an integrated manner to ensure security measures do not compromise nuclear safety and nuclear safety measures do not compromise security. If there are interactions between...
The Off-Site Source Recovery Program is a U.S. Government activity sponsored by the National Nuclear Security Administration Office of Radiological Security and managed at Los Alamos National Laboratory. The program mission is to remove, safely secure, and disposition excess, unwanted, or disused radioactive sealed sources that pose a potential risk to national security, public health, and...
The physical protection of nuclear material is fundamental to nuclear security. Interdicting the illegal movement and transfer of nuclear material is part of the nuclear material physical protection. The instruments for monitoring the illegal movement of nuclear and radioactive material need to have performance characteristics and reliability that will assure that they will do the task of...
Background
There are over 50 countires that have either nuclear power programs or research reactors which possess nuclear material and virtually all IAEA Member States possess and use other radioactive material, e.g. radioactive sources for medical, industrial and other non-nuclear applications. During the life-cycle of these materials, safe and secure transport is required. Transport of...
The purpose of this work is to demonstrate how International Transport of Nuclear Material in Brazil is organized, coordinated and executed according to the National Nuclear Security Regime. The country has established a Nuclear Security governance in the President of the Republic Institutional Security Cabinet which has a central role in the System for the Protection of the Brazilian Nuclear...
Nuclear forensics is an effective technical tool for investigating nuclear materials, its properties, and its history. The importance of nuclear forensics has emerged as a result of the spread and growing phenomenon of terrorism. To get rid of this phenomenon, the international community supports any effort to strengthen and maintain a robust nuclear security system. The application of...
Equipment used for monitoring and assessment of cargo and pedestrians at borders are mainly handheld detector devices. The Radiation Handheld Devices (RHDs) are moved around a material (this can be in a form of cargo or be carried by a person) suspected to be emitting radiation. These detectors then alarm when the emitted radiation exceeds the established natural background radiation level of...
Abstract
In nuclear technology, one key parameter is the uranium enrichment of the uranium material for the characterization. For quick and accurate determination of uranium enrichment at border check-points to prevent illegal trafficking and contraband of special nuclear materials, such as uranium or plutonium, gamma-ray spectrometry is a fast and cheaper one than other analytical tools due...
Illicit trafficking of radioactive material and especially nuclear material (thorium, uranium, and plutonium) has been an issue of concern since the beginning of the 1990s, when the first seizures of nuclear material were reported to the International Atomic Energy Agency. In this work, twenty samples selected for investigation originate from South Africa and Namibia uranium mines. The aim of...
IPPAS missions comprise a team of international experts who assess a State’s system of physical protection (nuclear security), compare it with international best practices and make recommendations for improvements. IPPAS missions were established in 1995 as a voluntary service to assist States in strengthening their national nuclear security regime. Initially IPPAS missions were mostly...
JOINT SAMPLE ANALYSIS ON SELECTED URANIUM ORE CONCENTRATES
AND NUCLEAR FORENSICS LIBRARY EXERCISE
R. Kips (Lawrence Livermore National Laboratory / US Department of Energy)
R. Lindvall (Lawrence Livermore National Laboratory / US Department of Energy)
N. Marks (Lawrence Livermore National Laboratory / US Department of Energy)
V. Gluchshenko (Institute of Nuclear Physics – Kazakhstan)
A....
On June 2016, the governments of the United States of America and Japan has agreed to convert Kyoto University Critical Assembly (KUCA), located at Osaka, Japan from highly enriched uranium (HEU) fuel to low enriched uranium (LEU) fuel and to return all HEU fuel materials from KUCA to United States. Based on this mutual agreement, Kyoto University has been working extensively on both the LEU...
Nuclear forensics is a multidisciplinary field where science meets law. While the conduct of a nuclear forensic analysis requires advanced scientific capabilities, the ultimate purpose of the forensic investigation is to deliver reliable and relevant evidence for a number of purposes, including in legal proceedings. Nuclear forensic capabilities are not established in a legal vacuum: their...
Cyber threats had arisen with the rapid developing of information technology, and infringements of cyber threats are often occurring in national infra-structure, including nuclear facilities. In order to prevent and respond to evolving cyber threats, such as distribution of infectious devices through supply chain, and Ransomware, researches on application with effective cyber security measures...
ABSTRACT
LESSON LEARNED FROM NUCLEAR SECURITY SYSTEM AND MEASURES OF THE MAJOR PUBLIC EVENT (MPE) IN INDONESIA : THE PREPARATION, IMPLEMENTATION, AND ROLE OF INTERNATIONAL SUPPORT
Indah Annisa (i.annisa@bapeten.go.id)
Head of Cooperation Division, BAPETEN
Nuclear security is the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other...
Lesson Learned from Security Culture at National Border Management Agencies: A Case study in Indonesia
Mr. Werdi Putra Daeng Beta1, Mr. Rustama2
1Indonesia Nuclear Energy Regulatory Agency (BAPETEN),
Assessment Centre for Regulatory System and Technology of Radiation Facilities and Radioactive Materials, Jl. Gajah Mada No. 8 Jakarta 10120, Indonesia
2National Nuclear Energy Agency (BATAN),...
As nuclear fuel cycle activities grow and the amount nuclear material increases worldwide, there will be a similar increasing need to more deeply incorporate nuclear security knowledge, skills, and abilities into nuclear energy workforces across the globe. To address this need, the International Atomic Energy Agency (IAEA) has provided NSS No. 12—Education Programme in Nuclear Security—as a...
At international events on nuclear security, it is a near inevitability that, at some point, proceedings will grind to a halt as participants struggle to grasp or articulate the concept of “nuclear security” itself. This should pose little surprise: many languages - including four of the six official languages of the United Nations - use the same word to denote both “safety” and “security.”...
While Cobalt-60 and Cesium-137 have typically been used to irradiate materials for both research and industrial sterilization, the Office of Radiological Security (ORS) and its partners are investigating the viability of electron beam for various applications to reduce this radio isotopic footprint and improve global radiological security. Advantages of electron beam irradiation include lower...
Analog control systems are being replaced by digital Instrumentation and control systems in the nuclear power plant control consoles to improve reliability, availability and enhance the decision-making process. The introduction of digital systems has produced a network of reactor safety components with Programmable Logic Controllers (PLCs), sensors, valves, and breakers. By association, the...
This paper outlines the outcomes of reviews and reforms related to licencing elements of Australia’s nuclear security regime. The Nuclear Non-Proliferation (Safeguards) Act 1987 [1] enables the grant of permits to nuclear operators and transporters. Permits specify regulatory requirements and can be tailored to be industry specific. Australia’s application of State level physical protection...
Main Author
Innocent Mayida imayida@rpaz.co.zw
Co-Authors
Amos Muzongomerwa
Natsai Mutanga
Radiation Protection Authority of Zimbabwe
Sealed radioactive sources have found many uses which improve human activities and the quality of life of people. In Zimbabwe, a lot of sealed radioactive sources are used in the medical, mining, construction and processing industries. These...
What is safety-security interface and interface management
Security-safety interface is a decision point where both safety and security issues should be taken into consideration. When done in a risk-informed, balanced manner, this should result in best possible overall safety and security. Doing this—by effective processes and procedures—is safety-security interface management.
Interface...
The hundreds of thousands of radioactive sources in use worldwide (in perhaps every UN Member State) pose a significant risk for misuse if not well-secured. Evidence from recent decades shows that some terrorists seek to cause mass casualties and mass disruption, and they have shown an interest in acquiring nuclear and radiological devices to such ends. Use of a radiological weapon by...
Meeting the Needs of NSSCs: A Modular Approach to Train-the-Trainer
Authors: Shane Peper (Presenter) and Joan Wilson
The development of human resources [and the maintenance of those resources] to support a State’s nuclear security regime has been identified as a national level sustainability objective (i.e., Objective #6) in the recent IAEA publication NSS-30G, “Sustaining a Nuclear Security...
Nuclear power plants and other nuclear facilities are considered among the most critical infrastructure assets vulnerable to cyber attacks leading to loss of lives, property destruction and economic upheaval. It is essential that these cyber threats be properly addressed considering their nature of risk at particular nuclear facilities. The classical methodology described in NSS 10 document...
Nuclear security impacts everyone. Just as a nuclear accident anywhere is an accident everywhere, so too would a nuclear security incident anywhere be an incident everywhere. Though governments maintain that nuclear security is the responsibility of the state, the reality is that multiple stakeholders hold responsibility for nuclear security, from the legislators establishing laws that support...
Myanmar, a State with very limited quantities of nuclear material, acceded to the Convention on the Physical Protection of Nuclear Material (CPPNM) and its amendment on 6th December 2016 and entered into force on 5th Jan 2017. Following the accession to CPPNM and its amendment, Myanmar is working step by step approach to implement the obligations under the convention.
The utilization of...
Summary:
A common operational strategy should unify and integrate Federal, State, and local response actions for the duration of a nuclear or radiological incident. However, coordination mechanisms and objectives of the different response groups will change depending on the phase of an incident. Incident response starts at the local community level with local first responders in the immediate...
The cooperation with the IAEA is guided in particular by the directions and priorities defined in Kuwait’s Integrated Nuclear Security Support Plan (INSSP), whose one of the key objectives is to “establish formal governmental organization and measures for managing the national nuclear security regime” and which focusses on addressing immediate and future national nuclear security needs and...
Abstract
We are living in a digital and information-driven age and need to store information related to virtually every aspect of our lives, nuclear information included. For computer system to be reliable and secure in nuclear facilities, unauthorized event changes must be prevented (which means maintaining - confidentiality), field device inputs and outputs must remain immutable throughout...
As a regional Center of Excellence (COE) on nuclear security in Asia, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of Japan Atomic Energy Agency (JAEA) has been supporting countries in Asian region by providing training courses on nuclear security since 2011. ISCN applies Systematic Approach to Training (SAT) for its training activities, which consists of...
Nuclear Forensics is defined as the examination of nuclear or other radioactive material, or of evidence that is contaminated (or comingled with) radionuclides, in the context of legal proceedings under international or national laws related to nuclear security [1]. The goal of nuclear material forensics is to establish an unambiguous link between man-made nuclear materials and their intended...
Neutron emission is a typical signature from the presence of nuclear material (particularly uranium and plutonium isotopes that may be potentially involved in illicit trafficking of material out of regulatory control - MORC). Certain sources like 241Am Be or 252Cf have a significant neutron component and could be potentially used in the manufacture of dirty bomb.
The measurement of the...
Nongovernmental organizations (NGO) have played and continue to play a very important role in supporting governments’ efforts aimed at strengthening nuclear security at national, regional, and international level by: 1) promoting dialogue between various stakeholders; 2) building national capacities through education and training, and 3) creating partnerships with government bodies which...
Synopsis
NIGER SYSTEM OF ACCOUNTING FOR AND CONTOL OF NUCLEAR MATERIAL (SSAC).
The establishment and maintenance of a national system of accounting for and control of nuclear material are very important aspects of the safeguard agreement signed for the obligations of a State under the Treaty on the Non-Proliferation of Nuclear weapons (NPT) because it contributes to nuclear security around...
I. Introduction:
• An overview on Niger Republic and its related Nuclear Security activities.
• An overview of Niger's legislative and regulatory framework of the field of Nuclear security
• the creation of a high level body coordination for Nuclear Security and the promotion of peaceful use of nuclear energy (HANEA)
• the creation of a National Comity of Nuclear Security within the...
NMAC and Nuclear Security: Philosophy of Concept and Feasibility of Implementation
K.L. Ramakumar, Retiree, Department of Atomic Energy, Mumbai 400001, India
Email: Karanam.ramakumar@gmail.com
Nuclear security is one of the three important components of the triad namely Safety, Security and Safeguards. Soon after the IAEA came into existence, appropriate mechanisms in terms of documentation...
Nuclear Security Support and Training Centers (NSSC) has a role in a country to support relevant authorities and other organizations who are responsible for nuclear security to sustain the national nuclear security regime. NSSCs are covering the areas of human resource development, technical support, and scientific support. An NSSC also helps to implement nuclear security culture and enhances...
Background
State’s nuclear security regime provides institutional framework to protect persons, property, society and the environment from harmful consequences of a nuclear security event. Nuclear security to Major Public Events (MPEs) is a challenging task as it is relatively a new domain for the safety and security professionals. Securing MPEs against nuclear security threats requires...
Question - how does the world’s leading Special Nuclear Material and Radioactive Material Shipper assure its own competent authority and the international community that it can safely and securely transport every conceivable cargo on the Radioactive Material spectrum? Answer - through employment of rigorous and robust internal and external assurance programmes.
International Nuclear Service...
Cybercrime is widespread and rapidly increasing unabated in many institutions, government departments and in the private sector, as they are at odds in finding effective cybersecurity strategies to combat the new vice. The threats of nuclear attacks backed-up by cyber espionage have become a global issue to which the rate in is rising exponentially.
My concern is to address the challenge on...
Canada and the United States view nuclear forensics as an integral component of a State’s nuclear security architecture and an important capability for responding to events involving nuclear or radioactive material outside of regulatory control (MORC). Both countries maintain a robust system of nuclear material security, accountancy and control that is augmented by a wide range scientific and...
There is widespread use of nuclear and radiological materials (radioactive sources and nuclear material) and technologies in the various practices and applications in throughout the world. In Uganda, these materials are used in medicine, agriculture, industry, research and education etc. Uganda has declared interests in embarking on the development of nuclear energy resources and technology...
The international community recognizes that an essential component of a national nuclear forensics capability is the development of a national nuclear forensics library (NNFL). The Canadian Nuclear Laboratories (CNL, formerly Atomic Energy of Canada Ltd.) is contributing towards the development of Canada’s NNFL. Given its unique expertise and access to data, CNL is conducting research into...
Nuclear forensics is defined as "Nuclear forensics is the examination of nuclear or other radioactive material, or of evidence that is contaminated with radionuclides, in the context of legal proceedings under international or national law related to nuclear security. The analysis of nuclear or other radioactive material seeks to identify what the materials are, how, when and where the...
The establishment and further development of nuclear infrastructure as well as nuclear security regime in the countries, which are commencing the execution of their nuclear power or research program, is accompanied by objective difficulties related to their limited opportunities and competences. Given the IAEA recommendations and approaches, first, clear coordinating mechanisms need to be...
In August 2018, the Nuclear Security Division of the International Atomic Energy Agency (IAEA) presented the first-ever pilot International Training Course (ITC) on "Nuclear Material Accounting & Control (NMAC) for Practitioners" in conjunction with the United State Department of Energy/National Nuclear Security Administration Office of International Nuclear Security (NA-21.1) and Los Alamos...
This paper presents the development of an architecture to deploy a simulated nuclear power plant in order to support training and research within the scope of CRP J02008. This simulated nuclear power plant ASHERAH consists of components covering the underlying physical process, the Industrial Control System ("ICS") components supervising and controlling these processes and the IT components...
Undoubtedly nuclear security has surfaced as a subject of concern on the international agenda and has gained attention at the highest political level in several States. Argentina has demonstrated its strong commitment towards it and has recognized the unique role of the IAEA in strengthening global nuclear security. Argentina has also come to the conclusion that a number of stakeholders must...
Radioactive Sources are being used all over the world, including Indonesia for many decades to benefit the humankind for various applications. For example to diagnose and treat illness, irradiate food, non-destructive testing, well-logging, etc. Some sources contain relatively large amounts of radioactive material that could potentially be used for malevolent purposes. It is important for...
Nuclear security aims at protection of people and assets, as well as the environment against the radiological consequences of malicious acts involving nuclear material, other radioactive substances or their associated facilities. Nuclear safety aims at protection of workers, the public and the environment from undue radiation hazards by means of ensuring proper operating conditions, prevention...
The IAEA defines a major public event as a sporting contest or high level political meeting that presents unique security challenges for the responsible organizations. These kind of events are important because any kind of security problems in them can lead to severe health, social, psychological, economic, political and environmental consequences. The security of a major public event also...
I. THE CONTEXT OF THE EVENT: TERRORISM CONSIDERATION IN THE REGION.
II. PRELIMINARY ARRANGEMENTS OF THE EVENT
The political decision to undertake the major public event.
The creation of the independent authority for the organization of the event. “Agency for the organization of the African Heads of States 2019 conference called Agence UA-2019: its composition, organization and missions.
The...
The possibility of malicious acts involving nuclear or radioactive materials remains a worldwide threat. Ensuring nuclear security (NS) is one of the main responsibilities of an operator of any facility using nuclear / radioactive materials, and should be regulated by the state. Accounting, control and physical protection of nuclear materials and facilities are the subject of regulation. A...
In this paper nuclear security culture development programme (NUSEC) for new comers is presented. NUSEC is the continuation of the safety culture development program designed by NUTEK Inc.
The safety culture development program was created by NUTEK Inc in order to contribute to improve industrial safety and occupational health status in newcomers by building a «safety culture training »...
As wholly owned subsidiary of the UK’s Nuclear Decommissioning Authority (NDA), International Nuclear Services (INS) has extensive and proven experience in the transportation of nuclear materials both in the UK and around the world. INS and its subsidiary, Pacific Nuclear Transport Limited (PNTL), are recognised as the world’s most experienced nuclear shipping company having delivered over 180...
Nuclear Security Detection Architecture on National Nuclear Security Regulation – Case Study Indonesia
Hermawan Puji Yuwana
h.puji@bapeten.go.id
Nuclear Energy Regulatory Agency of Indonesia (BAPETEN)
Abstract
Nuclear Security Detection Architecture on National Nuclear Security Regulation - Case Study Indonesia. The objective of a nuclear security regime is to protect persons, property,...
Radiation sources and ionising radiation are widely used in various sectors of the Ghanaian economy which includes but not limited to Medical (General X-ray Units, CT Scanners, Dental, Fluoroscopy Units, Mammography, Radiotherapy and Nuclear Medicine), Industry (Moisture/density gauges, level gauges, thickness gauges, X-ray and gamma scanners), Agriculture, mineral mining, Oil and gas...
Nuclear security is fundamental in the management of nuclear technology and in applications where nuclear material or other radioactive material is used or transported. It is the responsibility of the states to establish, maintain and sustain effective nuclear security regimes. Every state’s regime comprises of a set of policy and technical nuclear security measures. It is essential to have...
Morocco is an active member of the IAEA and has signed all the protocols and conventions relating to nuclear security and the non-proliferation. Since 2016, Morocco has created its regulatory authority for Nuclear and Radiological Safety and Security and has continued to undertake activities to establish a reliable nuclear security program concerning the use of radioactive sources and nuclear...
The use of sealed radioactive sources in industrial applications, with different purposes, is a practice widely implemented in several facilities in Argentina. In this context, for nuclear security, it is of special interest due to their own characteristics, the case of sources used in mobile devices, such as equipment for industrial gammagraphy or well logging (Category 2 and 3 sources...
This paper explores pathways toward building a robust framework for nuclear security governance in the Asia-Pacific, building out from the nuclear security cooperation framework and progress in Southeast Asia. It argues that that the progress made in Southeast Asia on building nuclear security cooperation can be expanded to the broader Asia-Pacific region. It explores potential policy...
The responsibility of Nuclear Security in Chile is of the State and the Chilean Nuclear Energy Commission, among other organizations, has been working this topic in the country. In 2012, Chile received a mission of the International Atomic Energy Agency (IAEA), for the National Strengthening of Nuclear Security, which main objective was to conduct a diagnosis of the six functional areas of the...
Regulatory oversight for nuclear security: practices and challenges
The Nuclear Regulatory Authority of the Slovak Republic (UJD) is responsible, inter alia, for state supervision upon nuclear safety and physical protection. In recent years we have been facing new challenges and practices, changes in threat environment and new threats have to be taken into consideration, when carrying out our...
Argentina has been in a continuous and wide development process in the nuclear activity areas since the 1950s. The use of this strategic resource was assumed as a State Challenge due to its multiple applications to the human beings life style, referred to health and industrial uses including electricity production by Nuclear Power Plants (NPPs).
Nowadays, in Argentina, there are more than...
The potential consequences of an act of terrorism using radioactive sources can be gauged from the consequences of serious accidents that have occurred involving radioactive sources. These include fatal and injurious radiation exposures, contamination of the environment, and serious economic and psychosocial costs the total effect of which is mass disruption. Steps are being taken to improve...
Hungary is rich in radioactivity related activities as there is a nuclear power plant operating with four reactors, a spent fuel interim storage facility, a research and a training reactors, and two radioactive disposal facilities next to the around four hundred radioactive source users. Because of the amount of possible inspection locations the Hungarian Atomic Energy Authority (HAEA), having...
Abstract
The U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA), International Atomic Energy Agency (IAEA), U.S. Department of State (DOS), and the Panamanian Chemical, Biological, Radiological and Nuclear (CBRN) response teams unified and coordinated an approach that demonstrated best practices for nuclear security measures for Major Public Events (MPEs), as...
Under the topic for technical session appendix:
“Nuclear security of nuclear fuel cycle facilities: emerging technologies and associated challenges and complex threats.”
One of the objectives pursued within the regulatory function is to ensure that nuclear materials are used only for peaceful purposes and prevent and deter unauthorized access to such materials that could cause hazardous...
The objective of a States nuclear security regime is to protect persons, property, society, and the environment from the harmful consequences of a nuclear security event. To accomplish this aim States exert enough efforts in establishing, implementing, maintaining and sustaining an effective and appropriate nuclear security regime to prevent, detect and respond to such nuclear security events....
ABSTRACT
Radioactive disused sources with high activity constitute a high risk for people and the environment if they are not managed in an adequate way until their final disposal. In Peru, are produced this type of disused sources due to their use in radiotherapy, into medical applications. There is a history of terrible accidents that have occurred in other countries due to this kind of...
Effective implementation of nuclear security in a country requires a proper regulatory framework to be in place. Regulations makes an important element of the regulatory framework. Regulations provides requirements to be followed by users to achieve nuclear security.
This paper therefore aims at exploring the efforts being taken in Malawi in ensuring nuclear security regulations are in...
Control of nuclear material is important part of nuclear security measures. Control of nuclear material can be part of NMAC (nuclear material control and accounting) measures or PP (physical protection) or both. NSS 20 identifies (as part of Essential element 3: legislative and regulatory framework) that the legislative and regulatory framework, and associated administrative measures, to...
Small Modular Reactors (SMRs) and other Advanced Nuclear Technologies (ANTs) offer potential advantages in respect of being quickly deployable and requiring lower capital investments. However, in respect of security, what benefit can a competent authority (CA) take from another CA’s assessment of security (including security by design - passively engineered) in a reactor technology, especially...
This paper presents the process of the licence for operation of Unit 1 of Barakah Nuclear Power Plant (NPP) that has been followed by Federal Authority for Nuclear Regulation (FANR) in regards with the nuclear security requirements of the United Arab Emirates (UAE). FANR, the nuclear regulator of the UAE in accordance with the Federal Law by Decree No. 6 of 2009 on Peaceful Uses of Nuclear...
The Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facility (INFCIRC/225/Revision 5) Fundamental Principle E: Responsibilities of the Licence Holder: identifies that the operator should have a security plan. In the United Kingdom an approved Nuclear Site Security Plan (NSSP) is a requirement under Regulation 4 of the Nuclear Industries Security...
Within the Convention on the Physical Protection of Nuclear Material (CPPNM/A) Fundamental Principle (FP) A identifies the Responsibility of the State and FP C covers the Legislative and Regulatory Framework.
The IAEA Nuclear Security Series (NSS) document NSS13 “Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5) provides that “the...
Uranium radiochronometry is of great interest to the nuclear forensics community [1–3]. The $^{235}$U/$^{231}$Pa isotope pair can be used to calculate the separation age of samples containing enriched $^{235}$U; a comparison with another radiochronometric pair, $^{234}$U/$^{230}$Th, can provide additional information about the processing history of the material. Accurate dating using the...
The digitalization of Instrumentation and Control (I&C) systems in nuclear facilities introduces the potential for cyber-attacks to result in operational effects on critical systems. There have been several high-profile incidents that have demonstrated this potential, including the Stuxnet virus in 2010 [1], which targeted the nuclear sector, and the cyber-attacks to electrical distribution...
Software plays an ever-increasing trusted role in all aspects of life: from door locks to self-driving cars to fish tanks. We† trust the software in our smart locks to keep intruders out of our houses. We† trust the software in self-driving cars to get us to our destination safely. We† even trust the software in our smart fish tank to feed our goldfish. The software running nuclear...
Terrorism is a growing trend nowadays. Radioactive materials can become explicit targets for crimes and for terrorist organizations, as they can be used in various weapons (such as explosives capable of dispersing radioactive material) resulting effective panic and serious economic damage Increasing terrorism serves growing chance to have different nuclear security events like radiological...
Indonesia is the largest archipelego state in the world, approximately two thirds of which is water. In the perspective of radioactive sources utilization, especially on security aspect with that large territory and with many different cultures and local rules, the Indonesian goverment should have the right strategy to implement a security requirement that is set on Government Regulation and...
Abstract
As emerging technologies pose new attack vectors to critical infrastructure, including nuclear facilities, the nuclear sector must navigate a business environment that is growing heavily tech-dependent while maintaining security of highly sensitive information and materials. In particular, operators must cultivate a sense of trust with key stakeholders – shareholders, regulators, the...
The International Atomic Energy Agency (IAEA) through its publications had emphasised that the responsibility of nuclear security within a state rest entirely with the state in ensuring security of nuclear materials and other radioactive materials. In that regard, owners of nuclear facilities owns the state the responsibility of protecting such materials against theft, sabotage, unauthorized...
The World Nuclear Transport Institute (WNTI) was founded in 1998 by British Nuclear Fuels plc (BNFL), now International Nuclear Services (INS) of the United Kingdom, COGEMA now Orano of France, and the Federation of Electric Power Companies (FEPC) of Japan to represent the collective interests of the radioactive materials transport sector, and those who rely on safe, effective and reliable...
Gamma-ray and neutron imaging technologies have many potential applications in nuclear security, safeguards, waste management and decommissioning. In particular, gamma-ray imaging enables one to remotely locate, identify, and quantify gamma emitting radionuclides, including; Naturally Occurring Radioactive Materials (NORM), industrial, medical or special nuclear materials (masked or shielded)....
Phosphate fertilizers are produced from phosphate rocks that is one of the most mined materials, by quantity, on this planet. Phosphate rocks can contain considerable amounts of accompanying natural uranium that can exceed concentrations found at commercial uranium mines. Recovering uranium from phosphate rocks during fertilizer production is a technically mature process that was used on an...
Since late 2011, Kenya has seen an upsurge in violent terrorist attacks. According to Kenyan security experts, the bulk of the attacks were increasingly carried out by radicalized youths who were hired for the purpose. Kenya’s hope of improving its ranking on the global terrorism index (GTI) have been dealt a blow because of these attacks. According to the Global Terrorism Index by the...
Abstract:
The six major stages in the lifetime of a nuclear facility and of the associated licensing process are siting, design, construction, commissioning, operation, and decommissioning. The decommissioning stage includes activities that will ultimately lead to the removal of nuclear and other radioactive materials from the nuclear facility.
There are a number of destroyed sites within...
Abstract: The Atomic Energy Licensing Board (AELB) seek to strengthen the capabilities and knowledge in nuclear security through the enhancement of roles and functions of our national Nuclear Security Support Centre (NSSC) with the support and cooperation from the International Atomic Energy Agency (IAEA). Through this effort and cooperation, a Physical Protection Laboratory for Radioactive...
The Nuclear Regulatory Authority (ARN) was established as an autonomous body reporting to the Presidency of Argentina by Act 24804 (known as the Nuclear Activity National Act), which came into force in 1997, and is empowered to regulate and control the nuclear activity in Argentina. Its objective is to establish, develop and enforce a regulatory system applicable to all nuclear activities...
Tajikistan has legislation in place which regulates all aspects of the peaceful use of nuclear energy, i.e. radiation protection, safety, physical protection, accounting for and control of nuclear materials and import/export control of strategic goods, including nuclear materials and technology. This legislation provides the basis for Nuclear and Radiation Safety Agency of RT (NRSA) and other...
PHYSICAL PROTECTION OF SPENT RADIOACTIVE SOURCES
A. Chilulu a
a Radiation Protection Authority (RPA), P.O Box 50002, Lusaka
Email address: abigailsimwina2016@gmail.com
SYNOPSIS
In an effort to further enhance the physical protection of spent radiological materials stored in the Radiation Waste Storage Building (RWSB), an agreement was signed by ZCCM-Investments Holding through the Ministry...
Abstract - Physical security in nuclear fuel cycle facility means detection, prevention and response to threat, theft, sabotage, unauthorized access and illegal transfer involving radioactive and nuclear material. This paper proposes a physical security system designing concepts to reduce the risk associated with variant threats to nuclear fuel fabrication pilot plant. So, we will study the...
The “Joint Statement on Mitigating Insider Threats” circulated by the International Atomic Energy Agency (IAEA) as Information Circular (INFCIRC) 908 emphasizes the elevated threat to nuclear and radioactive materials and facilities posed by insiders. To support States in mitigating this threat, INFCIRC 908 includes a commitment by the subscribers to support the IAEA in developing and...
The IAEA Code of Conduct on the Safety and Security of Radioactive Sources describes that in a State, the regulatory body should have the authority to monitor at all appropriate check points for detecting the orphan sources during their course of operation and to ensure proper storage of such radioactive sources. PNRA has developed various regulations for the effective control of radioactive...
The U.S. Department of Energy’s Office of Radiological Security (ORS) cooperates with partner countries throughout the world to enhance the security of radioactive sources used for legitimate purposes. A large number of these sources are within hospitals, universities and other public establishments. High activity Cesium-137 is one of the primary isotopes used to irradiate blood for the...
The continued presence of highly-enriched uranium (HEU) fuel in civilian installations such as research and test reactors poses a threat to national and international security. Minimization, and ultimately elimination, of HEU in civilian research and test reactors worldwide has been a goal of policy in many countries, including in the United States, since 1978. In order to reduce the threat...
Insider threat mitigation programs have traditionally focused on preventative and protective measures to mitigate insider threats (and resulting malicious acts) to nuclear facilities. Preventive measures—including pre-employment background investigations—are those implemented before trusted access is provided to nuclear facilities. Protective measures—including the two-person rule for...
The current state of portable and handheld radiation detection instruments and systems used to detect a criminal or an unauthorized act with nuclear security implications involving nuclear or other radioactive material that is out of regulatory control is often inadequate to meet the nuclear security needs of the users within States. This paper focuses on one important, and often overlooked,...
Nuclear security for major public events (MPEs), such as a sporting event or a high-level political meeting is very important for each country, and the organization of these events presents unique security challenges, including possible threats involving nuclear or other radioactive material. Understanding these challenges, Viet Nam requested support from the International Atomic Energy Agency...
Abstract: As attempts by terrorists to obtain nuclear and radiological weapons and materials increases, it is important to plan and prepare for terrorists detonating an R/N bomb. A key preparation component is a national nuclear response framework (NNRF), which details the policies, procedures, capabilities, and priorities for responding to a nuclear terrorist attack. Defining the roles and...
Today, tens of thousands of high activity radioactive sources are used in over 100 countries. They are used in medicine, industry, agriculture, academic, and government facilities for a variety of beneficial purposes. Many of these sources are poorly secured, vulnerable to mishandling or even theft by terrorist organizations seeking the materials needed for a radiological dispersal device...
The aim of this synopsis is preventive action aimed at the identification of illegal transportation of radioactive material. It is to be expected that smugglers will avoid border crossings and checkpoints where radioactive radiation can be detected. This work aims to create additional devices that send the status of the Personal Radiation Detector (PRD) alarm via the mobile telephony network,...
Synopsis of the technical paper to be presented at the:
International Atomic Energy Agency International Conference on Nuclear Security: Sustaining and Strengthening Efforts
IAEA Headquarters, Vienna, Austria
10-14 February 2020
Prepared by:
K. Nadeau
Inorganic Chemical Metrology
NRC Metrology Research Center
National Research Council Canada
Ottawa, Ontario, Canada
Z. Mester
Inorganic...
. The Global Initiative to Counter Nuclear Terrorism (GICNT) is a voluntary partnership of 88 countries and six international observer organizations that are committed to strengthening global capacity to prevent, direct, and respond to countering nuclear terrorism by conducting multilateral activities that strengthen the plans, policies, procedures, and interoperability of partner nations. The...
Venezuela is a country that does not have high power nuclear reactors, until now a cyclotron and a Cobalt-60 sterilization plant which is located in the Instituto Venezolano de Investigaciones Científicas (IVIC), both located in the Greater Caracas.
The only way to obtain radioactive materials for medical, industrial and research use is through acquisitions to foreign suppliers. Buyers must...
The Nuclear Energy for Peace Act 2016 (BE2559) delegates nuclear and radiation regulatory authorities to Office of Atoms for Peace (OAP). Article 107 of this act empowers OAP designated inspectors with regulatory oversight and early phase enforcement activities. However, this act does not allow nor specify the qualifications of these designated inspectors. Hence the Government Administration...
In this communication, Electricité de France (EDF) and the Gendarmerie Nationale (French Military Forces) will provide an update of the organization we have in France since 10 years for the Physical Protection of EDF Nuclear Power Plants (NPP).
Protecting French NPP relies on sharing of responsibilities between the French State and Nuclear Plant Operator (NPO). The State defines the threats...
As is widely recognised, there is not always a direct threat concerning the misuse of RN-materials during the planning of a major public event or whilst a major public event is in progress. However, if the competent security authorities deem it necessary, mobile radiation detection technology can be deployed at major public events. The radiation detection capability can be deployed by a...
Historically, compliance-oriented computer security programs were built with a ‘set it and forget it’ mentality when it came to security control implementation in computing environments. Typically, the security control implementation would be revisited on a set multi-year recurring basis (e.g. every three years) where the security program would reevaluate the effectiveness of the security...
To reduce the amount of abandoned radioactive sources, minimize terrorist threats, as well as threats to life and health of citizens, in Ukraine there was launched the project “Public Outreach and Information Campaign about the Amnesty of Ionizing Radiation Sources”.
Improper handling of ionizing radiation sources (hereinafter IRS) poses a serious danger to human life. The influence of such...
Abstract
The safety and security of a radiological facility share a common objective-ensure the protection of population and environment from undue radiation hazard. Historically, many analytical methods have been developed and implemented to support safety-based risk assessment and decision analysis. Adapting and extending risk assessment to security applications has been limited because of...
The ARG-US (meaning “Watchful Guardian”) TRAVELER [1] has been developed under the auspices of the U.S. Department of Energy (DOE) Packaging Certification Program, Office of Packaging and Transportation, Office of Environmental Management. It is the latest innovative product in the family of ARG-US remote monitoring systems technology for risk-significant materials in cargo conveyances during...
Recent changes in National Legislative and Regulatory Framework for the Physical Protection of Nuclear Material in Use, Storage and Transport and for Nuclear Facilities: Finland
T. Hack, P. Karhu
Radiation and Nuclear Safety Authority (STUK)
Laippatie 4, P.O. Box 14, 00881 Helsinki, Finland
Abstract. Regulatory framework for the physical protection of nuclear material in use, storage and...
Many countries in South-East Asia are seeking to develop capabilities in nuclear forensics. This is part of an overall strengthening of nuclear security architectures in response to increased use of nuclear and other radioactive materials regionally and globally. As a result, there is substantial demand in the region for training and other capability development support. With over two decades...
The probabilistic risk assessment (PRA) methodology qualitatively can be applied as a most practical tool to address the problem of nuclear terrorism and efforts to reduce risk in the region of concern where roots of smuggling can be traced by constructing event trees. PRA can also be used as a tool for mitigating the consequences in case of occurrence of a unwanted attack
The problem we have...
The overarching objective of nuclear safety and nuclear security is to protect the public, property, society and environment from harmful effects of ionizing radiation. The focus of nuclear safety is to prevent nuclear accidents arising from the unintentional and inadvertent acts by implementing protection and mitigation measures at nuclear installation. Whereas, nuclear security aims to...
As the threat profile changed rapidly against nuclear and radiological facilities and activities over the last few years, and the emerging of new techniques by terrorist groups in conducting attacks, it becomes crucial to incorporate the threat assessment and design basis threats outcomes in the regulatory requirements for nuclear security for prevention and protection of nuclear and...
Drafting regulations for transport safety and transport security achieve two separate objectives, which can lead to divergent outcomes. With transport safety, the goal is to protect the public from the effects of ionizing radiation, while in contrast, the goal of transport security is to protect the material from malicious actors. While many Member States may have transport safety...
Fostering and sustaining a strong nuclear security culture serves as the basis for achieving effective nuclear security. While the effort for nuclear security culture should be implemented by each organization responsible for nuclear security, this effort may not be sufficient to continuously support nuclear security, if it is made merely based on organization’s initiative alone. A...
Report on the Technical Meeting on Advancing Maintenance and Calibration of Radiation Detection Equipment for Nuclear Security Systems.
By
Arome Kingsley Inyanda
Nuclear technology center
Nigeria Atomic Energy Commission
Email: aromeking@gmail.com, arome.inyanda@ntc.nigatom.org.ng
Tel: +2348030523014, +2348172810581
Executive Summary.
The Technical meeting on advancing maintenance and...
This paper will discuss the challenges posed in confidently adjudicating alarms when nuclear materials or other potential threat materials are detected in secondary inspection. Primary radiation detection systems are installed at three seaports in Spain. Each of these seaports have a spectroscopic portal monitor (SPM) that is used for secondary inspection. Two additional seaports in Spain have...
Olympic Games will be held in Tokyo in July 2020 and prior to the Olympic Games, several major international events would also be held in Japan. Against this background Government of Japan has been making big efforts to proceed with the preparation for the measures against cyber-attacks to computer based systems and networks that control critical infrastructure.
Regarding protection against...
Computer security within a nuclear security regime requires continuous improvement of computer security measures to face ever increasing adversary capabilities. For this one key factor is exchange of information (e. g. application of effective methods, technolo-gies and tools in new and innovative ways) and identification of good practices nation-ally, regionally and globally. With this...
An efficient non-intrusive inspection (NII) of containerised freight is critical for customs, as freight containers are potential means of smuggling, illegal immigration or even trafficking nuclear material and chemical warfare agents. Thousands of freight containers and trucks pass every day at any small to medium port or border within the EU which potentially makes them an ideal means for...
In the Russian Federation, physical protection of nuclear facilities (nuclear installations, radiation sources, storage facilities, nuclear materials and radioactive substances) is defined as an independent activity in the field of atomic energy use at the level of federal legislation. The Federal Environmental, Industrial and Nuclear Supervision Service of Russia (Rostechnadzor) is...
Radioactive Material (RM) is used in various areas like research, medicine, industry, agriculture and education for wide range of applications in Pakistan. All necessary security measures are taken to prevent acquisition of radioactive sources in use and in storage against any malicious act causing any radiological hazard which may harm public, property, society and environment. By applying...
The U.S. Nuclear Regulatory Commission (NRC) has increased its efforts to risk inform security regulatory approaches. This paper will highlight some of the ongoing activities as well as lessons learned. The goal of the NRC’s initiative to risk-inform security is to ensure the staff is applying the appropriate level of regulation and establish requirements for security that are commensurate...
Malaysia has transparently reported 22 cases of material out of regulatory control (MORC) since 2007 to the International Atomic Energy Agency (IAEA), Incident Trafficking Database (ITDB). Records of data, has shown 14 cases of MORC were reported occurred at the border while the remaining eight (8) cases took place within the interior of the state. In most of border detection cases, the...
The Nuclear Regulatory Authority Act, 2015 (Act 895) established the Nuclear Regulatory Authority (NRA) to provide for the regulation and management of activities and practices for the peaceful use of nuclear material or energy, radioactive material or radiation; to provide for the protection of persons and the environment against the harmful effects of radiation hazards; to ensure the...
This paper emphasizes capability of the IAEA to tickle a broad range of tasks in the area of peaceful use of atomic energy and its role in coordination of international cooperation and providing technical support to its Member States, upon their requests, in building their national nuclear security regimes. The paper notes importance and expresses support to this activity.
This paper...