Engineering Safety Aspects of the Protection of Nuclear Power Plants Against Sabotage


Book Description

The result of extensive dialogue among safety and security specialists, this report provides guidelines for evaluating the engineering safety aspects of the protection of nuclear power plants against sabotage. The guidance takes into account the existing robustness of structures, systems and components, and emphasizes those aspects of sabotage protection that work synergistically with the protection against extreme external occurrences of accidental origin, such as earthquakes, tornadoes and human induced events. The report introduces a defense approach to sabotage protection, with layers comprising safety and security related systems and activities, and promotes self-assessment by the licensee in cooperation with the required interfaces with the competent authorities.--Publisher's description.




Science and Technology to Counter Terrorism


Book Description

This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of Advanced Science (NIAS) and the U.S. Committee on International Security and Arms Control (CISAC). During the workshop, Indian and U.S. experts examined the terrorist threat faced in both countries and elsewhere in the world, and explored opportunities for the U.S. and India to work together. Bringing together scientists and experts with common scientific and technical backgrounds from different cultures provided a unique opportunity to explore possible means of preventing or mitigating future terrorist attacks.




Identification of Vital Areas at Nuclear Facilities


Book Description

This publication provides detailed guidance with regard to the identification of vital areas at nuclear facilities. It presents a structured approach to identifying those areas that contain equipment, systems and components to be protected against sabotage. The process for selection of a specific set of vital areas to be protected is based on consideration of the potential radiological consequences of sabotage, and on the design, operational and safety features of a nuclear facility. The method builds upon safety analysis to develop logic models for sabotage scenarios that could cause unacceptable radiological consequences. The sabotage actions represented in the logic models are linked to the areas from which they can be accomplished. The logic models are then analysed to determine areas that should be protected to prevent these unacceptable radiological consequences. The publication is part of a set of supporting publications in the IAEA Nuclear Security Series with the aim of assisting States in the design, implementation and evaluation of their physical protection systems for nuclear material and nuclear facilities.




NUREG/CR.


Book Description




Countering Cyber Sabotage


Book Description

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.




Insider Threats


Book Description

"This compendium of research on insider threats is essential reading for all personnel with accountabilities for security; it shows graphically the extent and persistence of the threat that all organizations face and against which they must take preventive measures." — Roger Howsley, Executive Director, World Institute for Nuclear Security High-security organizations around the world face devastating threats from insiders—trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. Insider Threats offers detailed case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. Matthew Bunn and Scott D. Sagan outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize "worst practices" from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose. Insider threats pose dangers to anyone who handles information that is secret or proprietary, material that is highly valuable or hazardous, people who must be protected, or facilities that might be sabotaged. This is the first book to offer in-depth case studies across a range of industries and contexts, allowing entities such as nuclear facilities and casinos to learn from each other. It also offers an unprecedented analysis of terrorist thinking about using insiders to get fissile material or sabotage nuclear facilities. Contributors: Matthew Bunn, Harvard University; Andreas Hoelstad Dæhli, Oslo; Kathryn M. Glynn, IBM Global Business Services; Thomas Hegghammer, Norwegian Defence Research Establishment, Oslo; Austin Long, Columbia University; Scott D. Sagan, Stanford University; Ronald Schouten, Massachusetts General Hospital and Harvard Medical School; Jessica Stern, Harvard University; Amy B. Zegart, Stanford University




Nuclear Reactor Security Against Sabotage


Book Description




Nuclear Terrorism


Book Description

A leading strategist opens our eyes to the greatest terrorist threat of all-and how to prevent it before it's too late Americans in the twenty-first century are keenly aware of the many forms of terrorism: hijackings, biological attacks, chemical weapons. But rarely do we allow ourselves to face squarely the deadliest form of terrorism, because it is almost too scary to think about-a terrorist group exploding a nuclear device in an American city. In this urgent call to action, Graham Allison, one of America's leading experts on nuclear weapons and national security, presents the evidence for two provocative, compelling conclusions. First, if policy makers in Washington keep doing what they are currently doing about the threat, a nuclear terrorist attack on America is likely to occur in the next decade. And if one lengthens the time frame, a nuclear strike is inevitable. Second, the surprising and largely unrecognized good news is that nuclear terrorism is, in fact, preventable. In these pages, Allison offers an ambitious but feasible blueprint for eliminating the possibility of nuclear terrorist attacks. The United States once relied on the threat of mutually assured destruction to deter the Soviet Union from launching a nuclear strike. But in today's fragmented world, a new strategy is needed, especially with nuclear material vulnerable to theft or sale through black-market channels. The choice is ours: to grab this beast by the horns or to be impaled on those horns. We do not have the luxury of hoping the problem will go away, and Allison shows why.




The Perfect Weapon


Book Description

NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An important—and deeply sobering—new book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend the 2016 U.S. election from interference by Russia, with Vladimir Putin drawing on the same playbook he used to destabilize Ukraine. Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger reveals a world coming face-to-face with the perils of technological revolution, where everyone is a target. “Timely and bracing . . . With the deep knowledge and bright clarity that have long characterized his work, Sanger recounts the cunning and dangerous development of cyberspace into the global battlefield of the twenty-first century.”—Washington Post




Countdown to Zero Day


Book Description

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility. In these pages, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making. But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.