Determination of System Effectiveness for Physical Protection Systems of a Nuclear Energy Centre

Size: px
Start display at page:

Download "Determination of System Effectiveness for Physical Protection Systems of a Nuclear Energy Centre"

Transcription

1 Science and Technology 2014, 4(2): 9-16 DOI: /j.scit Determination of System Effectiveness for Physical O. D. Oyeyinka 1,*, L. A. Dim 2, M. C. Echeta 1, A. O. Kuye 1 1 Centre for Nuclear Energy Studies, of Port Harcourt, Port Harcourt, Nigeria 2 Centre for Energy Research and Training, Ahmadu Bello, Zaria, Nigeria Abstract Critical infrastructure, which includes nuclear and radiation facilities, power, banks, transportation, national gas and oil distribution and telecommunications systems, are the bedrock of modern societies; their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. Our dependence on critical infrastructure makes them attractive targets for attack. A deliberate act against a nuclear and radiation facility could directly or indirectly endanger public health and safety through exposure to radiation. Physical Security Systems (PPS) are deployed to prevent or mitigate loss of valuable assets. The effectiveness of physical security systems is evaluated as the probability that the security system defeats an adversary along a given path. This work examined the structure of the PPS of a Nuclear Energy Centre (NEC) in Nigeria. NEC consists of three main assets (asset 1 - nuclear science and engineering laboratory; asset 2 - thermal hydraulic laboratory and asset 3 - a research reactor). Estimation of Adversary Sequence Interruption (EASI) and Dai et al [1] models were used for quantitative evaluation of the PPS of the NEC. The probability of interruption obtained for the security systems is using EASI model. The results of system effectiveness using Dai et al [1] model for asset 1, 2 and 3 were , and respectively. The corresponding associated risks for asset 1, 2 and 3 were , and respectively and total risk of the NEC multiple assets is The results showed that the security system is high (low associated risk for the assets) since the Probability of interruption is greater than the medium security system range of This work will serve as base guidelines for the decision makers for the application and evaluation of PPS and provision of counter measure strategies in the nuclear energy centre and other nuclear/radiation facilities in Nigeria. Keywords Security System, EASI Model, Information Entropy, Physical Protection System, Risk Assessment 1. Introduction The significance of security to mankind cannot be over-emphasized as the socio-economic structure of any society or organization depends on the security system available in such society or organization [2]. Physical Security Systems are deployed to prevent or mitigate loss of valuable assets (e.g., property or life) [3]. Hence, human beings and societies since the beginning of time have developed measures to safeguard themselves and their properties against threat [2]. A Physical Protection System (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage or other malevolent attacks [2, 4, 5; 6]. Kano, Zaria, Ile-Ife and other ancient city walls built hundreds of years ago in Nigeria confirmed the recognition of physical protection in Nigeria before the advent of the modern security technology. However, a change in the way in which houses were built * Corresponding author: lanre442003@yahoo.com (O. D. Oyeyinka) Published online at Copyright 2014 Scientific & Academic Publishing. All Rights Reserved within the walls indicates that the first occupants may have been conquered. This means some adversaries devised a method to defeat the protection offered by those first walls. Also, the cycle of violence being unleashed on Nigerians by religious extremists has heightened fears among the populace and the international community that the hostility has gone beyond religions or political colouration. The insecurity challenge has become a great source of worry as security experts affirm that what is on ground has shifted to the realm of terrorism [7]. After the September 11, 2001 attacks, the U.S. Nuclear Regulatory Commission (NRC) determined 1that additional security measures should be put in place during the transport of spent nuclear fuel (SNF) and those current security regulations should be enhanced to further protect SNF during transport [6]. During the past decade, the need for improving physical protection of nuclear material has been felt increasingly in science and international security. Concerns about the security of nuclear materials have been raised in view of a wide distribution of orphan radiation sources [7, 8] and a dramatic increase in the illicit trafficking of nuclear materials worldwide, doubling the 1996 annual rate of reported incidents in less than half a decade [9], with threats

2 10 O. D. Oyeyinka et al.: Determination of System Effectiveness for Physical of international nuclear terrorism rapidly developing [10]. Many factors can lead to loss of control of radioactive sources, including ineffective regulations and regulatory oversight; the lack of management commitment or worker training; poor source design; and poor physical protection of sources during storage or transport [11]. The challenge is to address this wide range of risks with effective actions [12]. Effective physical protection requires a designed mixture of hardware (security devices), procedures (including the organization of the guards and the performance of their duties) and facility design (including layout) [1]. Nuclear and radiation facilities may be vulnerable to adversary attack and in extreme cases lead to substantial releases of radioactive materials with consequent loss of lives, radiation sickness and psycho trauma, extensive destruction and economic disruption. Therefore, there is a need to have an effective physical protection system design and evaluation that can protect the facilities against terrorism, sabotage and natural disaster. The aim of this work is to ensure the desired degree of physical security to prevent the accomplishment of overt and covertly malevolent actions at a Nuclear Energy Centre (NEC) in Nigeria. The specific objectives include evaluation of the current status of the physical protection system and the quantitative risk assessment for assets within NEC. 2. Methodology NEC is located within a. The has two main entrances. NEC can be accessed through any of these university entrances. The NEC facility, which is shown in Figure 1, is fenced and consists of three main assets. The assets are: Asset 1: Nuclear science and engineering building Asset 2: Thermal hydraulics building Asset 3: Research reactor building Each asset has a main door, a reception door and a door for each room where specialized and sensitive equipment or nuclear materials are housed. In addition, a second protective door is provided for the research reactor. Access to the NEC is through the main entrance A, vehicular entrance B and a pedestrian entrance C. There are also plans to build two other laboratory buildings; these are designated as Lab2 and Lab3 in Figure 1. Generator/Power Plant for Facility Factory Research Reactor Hostel Lab3 Recreational Centre Lab2 Footpath Footpath Water Tank Water Tank Generator Nuclear Thermal Hydraulic Lab Strip Dimensions 34885mm x 5554mm Stall width 2500mm. Stall length 5000mm. Stall angle 70deg. No. Stalls 12 Strip Dimensions 36000mm x 5554mm Stall width 2500mm Stall length Stall angle 70deg No. Stalls 12 Gate House Nuclear Science and Engineering Lab Access Road Access Road Stall width 2500mm. Stall length 5000mm. Curve radius 30000mm. No. Stalls 27 Angle Span 71.64deg. Figure 1. Diagram of Security System in the Nuclear Energy Centre Scenario

3 Science and Technology 2014, 4(2): Risk Assessement for Single Assets The risk assessment methodology used for security systems that protect single asset consists of a number of steps; the steps are as follows: Step I: Identify the threat(s) to be evaluated. Step II: Obtain physical and operational data as well as analyse facilities and operations. Step III: Develop the threat specific path sequence diagram. Step IV: Apply the Estimate of Adversary Sequence Interruption (EASI) model to predict the likelihood that the threat will succeed. EASI is a fairly simple calculation tool developed by Sandia National Laboratories, USA. It quantitatively illustrates the effect of changing physical protection parameters along a specific path. It uses detection, delay, response, and communication values to compute the probability of interruption P 1. Since EASI is a path-level model, it can only analyze one adversary path or scenario at a time. It can also perform sensitivity analyses and analyze physical protection system interactions and time trade-offs along that path. In this model, input parameters are the physical protection functions of detection, delay, and response and communication likelihood of the alarm signal. Detection and communication inputs are in form of probabilities (P D and P C respectively) that each of these total functions will be performed successfully. Delay and response inputs are in form of mean times (T delay and RFT respectively) and standard deviation for each element. All inputs refer to a specific adversary path [4]. The output is the P 1, or the probability of interrupting the adversary before any theft or sabotage occurs. P I is given as: P I = P C * P D (1) Where P C is Probability of Guard communication, P D is Probability of sensor detection. Evaluation of many systems designed and implemented by Sandia National Laboratories indicates that most systems operate with a P C of at least This value was used for the present work. It should, however, be noted that P C is influenced by factors such as lack of training in use of communication equipment, poor maintenance, dead spots in radio communication, or the stress experienced during an actual attack. The values of probability of detection are based on the availability/non-availability of sensor(s) on the adversary paths. Delay and response values, in form of mean times and standard deviation for each element are purely expert opinion based on security guards drills [12, 22]. Step V: Evaluate the acceptability or otherwise of the assesssed risk. If necessary, revise the facility design, operations, technology and/or assumptions Risk Assessement for Simultaneous Multiple Assets This methodology used for assessing security systems that protect multiple assets are presented in details by Dai et al [1]. The main steps are: 1. Identify the assets, security units and intrusion paths; 2. Determine the protection effectiveness of the security unit using equation: n 1 U j = wilog j = 1, 2... m (2) i= 1 1 R i Where R i = Probabilities of i (i=detection, delay or response). The probability is 1 when the protection task is fully met. The probability is 0 when the task is absolutely not met. n w i = R/ i Ri i= 1 3. Determine the protection effectiveness of an intrusion path: C(Path(U 1, U 2... U i ) = C(U 1 ) + C(U 2 ) C(U 1 ) i = 1,2,..., k (3) 4. Assess the risk of the security system. The most vulnerable path is the minimum cost of intrusion paths for each asset. Hence, the protection effectiveness for each asset is given as E(Asset) = Min(C(Path i ), C(Path 2 ),... C(Path i ) (4) 5. Compute the risk of the security system using [19]: Risk = P(A) * P(r) * C (5) Where P(A) is the probability of attack against a critical asset during the time frame of the analysis which can be assessed by experts. C is consequence; P(r) is the probability of successful attack that is also called the probability of protection invalidation. It can also be shown that [1]: P(r) = EXP (-E(Asset)) (6) 3. Results and Discussions 3.1. Measuring the Effectiveness of the Physical Protection System Using EASI Model The main assets are the three buildings at NEC. As stated earlier, these assets consist of equipment and research reactor. The paths to each of the assets are also shown in Figure 1. The general threat specific path sequence diagram for sabotaging and/or theft of any of these assets is as shown in Figure 2.

4 12 O. D. Oyeyinka et al.: Determination of System Effectiveness for Physical Break fence Run to the Centre Inner fence Penetrate the Centre Inner fence Run to the Laboratory/ Nuclear Research Reactor Building Area Break the building main door Run to the reception door Break the reception door Run to the laboratory door Break the laboratory Door Sabotage the equipment/nuclear Research Reactor RRRRReRRReactor Figure 2. A PSD diagram for any asset in the NEC Using Figure 1, the path of an adversary is shown in Table 1, 2 and 3 for Assets 1, 2 and 3 respectively. Also shown are the expected probability of detection values; delay times; response force time; detector location and the calculated probability of interruptions. In these tables B means that only cameras are used as detectors and are located at the beginning of each protection element. The standard deviation (SD) for the response force time and the adversary mean delay time are the values are calculated by the EASI program when the other values are entered as indicated in the tables. As can be seen the SD values are approximately 30% of the corresponding mean values. The probability of interrupting the adversary before any theft or sabotage occurs at asset 1, 2 and 3 are , and respectively. The results showed that the security system is high (low associated risk for the assets) since the probability of interruption is greater than the medium security system range of [4]. Table 1. Results of Estimate Adversary Sequence Interruption (EASI) Analysis of the Asset 1 Estimate of Probability of Adversary Guard Response Force Time (s) Sequence Communication Mean Standard Deviation Interruption Delays (in Seconds): Task Protection Element P(Detection) Location Mean: Standard Deviation 1 Break fence 0.1 B Run to NEC fence 0.2 B Break NEC fence 0.8 B Run to the building 0.8 B Break the building door 0.8 B Run to the reception door 0.8 B Break the reception door 0.8 B Run to the lab 0.8 B Break the lab door 0.8 B Sabotage the equipment 0.8 B Probability of Interruption:

5 Science and Technology 2014, 4(2): Table 2. Results of Estimate Adversary Sequence Interruption (EASI) Analysis of the Asset 2 Estimate of Probability of Adversary Guard Response Force Time (s) Sequence Communication Mean Standard Deviation Interruption Delays (in Seconds): Task Protection Element P(Detection) Location Mean: Standard Deviation 1 Break fence 0.1 B Run to NEC fence 0.2 B Break NEC fence 0.8 B Run to the building 0.8 B Break the building door 0.8 B Run to the reception door 0.8 B Break the reception door 0.8 B Run to the lab 0.8 B Break the lab door 0.8 B Sabotage the equipment 0.9 B 30 9 Probability of Interruption: Table 3. Results of Estimate Adversary Sequence Interruption (EASI) Analysis of the Asset 3 Estimate of Probability of Adversary Guard Response Force Time (s) Sequence Communication Mean Standard Deviation Interruption Delays (s): Task Protection Element P(Detection) Location Mean: Standard Deviation 1 Break fence 0.1 B Run to NEC fence 0.2 B Break NEC fence 0.8 B Run to Nuclear Research Reactor ( NRR) Area 0.8 B Break NRR main building door 0.8 B Run to the reception door 0.8 B Break the reception door 0.8 B Run to the 2nd last door to NRR 0.8 B Break the 2nd last door to NRR 0.8 B Run to the last door to N RR 0.8 B Break the last door to NRR 0.8 B Sabotage NRR 0.9 B Probability of Interruption: Measuring the Effectiveness of the Physical Protection System Using Dai et al [1] Model As indicated in Figure 1, there are three paths to access any of the three assets from outside NEC fence. These are penetrations of the adversary through vehicle entrance A, vehicle entrance B and the pedestrian gate C. Table 4 shows the possible paths an adversary may take to attack the nuclear energy centre.

6 14 O. D. Oyeyinka et al.: Determination of System Effectiveness for Physical Table 4. The protection elements of each intrusion path Intrusion Path Path 1 for Asset 1 Path 2 for Asset 1 Path 3 for Asset 1 Path 1 for Asset 2 Path 2 for Asset 2 Path 3 for Asset 2 Path 1 for Asset 3 Path 2 for Asset 3 Path 3 for Asset 3 Protection Elements Vehicle A Main Door E Reception Door H Lab Door K - Vehicle B Main Door E Reception Door H Lab Door K - Pedestrian Gate C Main Door E Reception Door H Lab Door K - Vehicle A Main Door F Reception Door I Lab Door L - Vehicle B Main Door F Reception Door I Lab Door L - Pedestrian Gate C Main Door F Reception Door I Lab Door L - Vehicle A Main Door G Reception Door J Vehicle B Main Door G Reception Door J Pedestrian Gate C Main Door G Reception Door J 2 nd to the last door of RR M 2 nd to the last door of RR M 2 nd to the last door of RR M Last door to RR N Last door to RR N Last door to RR N The effectiveness of each element was calculated using equation (2) and shown in Table 5. The probabilities of detection, delay and response were based on expert judgments of the performance of the detectors, delay and response functions when evaluated through security drill exercises. Element Table 5. Effectiveness of Each of the Security Element Detection i=1 Delay i=2 Response i=3 Effectivenesss A NEC B NEC C Pedestrian D Main door E Main door F Main door G Reception Door H Reception Door I Reception Door J Lab Door K Lab door L RR 2 nd to last DoorM RR last Door N Table 6. The Effectiveness of Each Intrusion Path Intrusion Path Effectiveness Path 1 for Asset Path 2 for Asset Path 3 for Asset Path 1 for Asset Path 2 for Asset Path 3 for Asset Path 1 for Asset Path 2 for Asset Path 3 for Asset The calculated effectiveness for each intrusion path in Table 4 using equation (3) is shown in Table 6. Table 6 shows the protection capabilities of each of the intrusion paths, the higher the number of security units in an intrusion path; the greater the cost an attacker must pay to be successful at the nuclear energy centre. From Equation (4) the effectiveness of the security system are: E(asset 1) is ; E(Asset 2) is ; and E(Asset 3) is Assuming that the annual rate of occurrence of attack for the asset 1 is 0.8, for asset 2 is 0.8 and Asset 3 is also 0.8; the calculated risk for each asset are shown in Table 7. From Table 7, the total risk based on the three Assets of the Nuclear Energy Centre security system can be calculated as Table 7. The risk of each Asset Parameter i = 1 i = 2 i = 3 E(Asset i ) P(Ai) Ci Riski

7 Science and Technology 2014, 4(2): Table 8. Suggested improvements for PPS at NEC Detection Delay Response Asset 1 Asset 2 Asset 3 1. Vibration sensor, Glass break sensor, Duress button, Motion light. 2. Connect alarms to video monitors for all sensors 1. Balanced magnetic switch (door-device), Microwave sensor, Passive Infra Red (PIR) sensors, Duress button, Sources sensor, Camera and Motion light. 2. Radiation detectors 3. Connect alarms to video monitors for all sensors 1. Place a barb wire on the current concrete block fence 2. Provide hardened door with key control doors in the entrances as well as steel protectors on the doors and windows 3. High security hardened door with keypad and lock (password key) for equipment rooms. 4. Two well -trained Guards are to be present in each of the building housing the asset 1. Develop a Memorandum of Understanding (MOU) between security and Nigeria Police Force, 2. Effective training of Security Officers, 3. Implementation of the authorized security devices to permit fast response, 4. Documentation for all procedures Suggested Improvements in the PPS and Design Criteria The results presented in Sections 3.1 and 3.2 indicate that the risks are low. However, a critical look at NEC reveals that possible threats to NEC assets include theft, sabotage, radiological dispersion/radionuclide contamination, criminal activity, natural disasters and terrorist s acts. In line with global best practices an effective PPS would address the following factors: i. Access control - minimum access to and the number of access points into the protected area and vital area(s). ii. Predetermination of trustworthiness - to require unescorted employees to have a security clearance or an authorization appropriate to their level of access. iii. Vehicle search and forceful intrusions - to check the vehicles and take measures to reduce the risk of forced vehicle penetration into a nuclear facility. iv. Tampering of equipment and records - to detect tampering or interference with equipment system or devices and take special precautions during and following shutdown or maintenance. v. Placement security guards - to establish an armed response force available at all times and capable of making an immediate and effective intervention to counter threats to NEC. vi. Contingency planning, drills and exercises - to test physical protection systems through regular drills, and develop and exercise contingency plans to manage anticipated security related emergencies. vii. Detecting equipment - to maintain the operation of alarm systems, alarm assessment systems, and the various essential monitoring equipments in the security monitoring room. viii. Communication system to consistently communicate within and outside the facility [14, 23]. With these factors taken into consideration, suggestions for improving the detection, delay and response functions for assets 1, 2 and 3 are summarized in Table Conclusions The ultimate goal of a PPS is to prevent the accomplishment of overt and covert malevolent actions. This work developed an analytical methodology for PPS evaluation. Effectiveness of the physical protection system in a nuclear energy centre was determined using the computerized Estimation of adversary Sequence Interruption (EASI) model for single protected asset and Dai et al [1] model for multiple protected assets. The probability of interruption obtained for the security systems is using EASI model. The results of system effectiveness using Dai et al [1] model for asset 1, 2 and 3 were , and respectively. The corresponding associated risks for asset 1, 2 and 3 were , and respectively and total risk of the system as multiple assets is The results showed that the security system is high (low associated risk for the assets) since the Probability of interruption is greater than the medium security system range of This work will serve as base guidelines for the decision makers for the application and evaluation of Physical Protection systems (PPS) and provision of counter measure strategies in the nuclear energy centre and other nuclear/radiation facilities in Nigeria. ACKNOWLEDGEMENTS The authors are grateful to the Nigeria Atomic Energy Commission (NAEC) for sponsoring this research work. REFERENCES [1] Dai, J; Ruimin, H; Chen, J; Cai, Q (2012). Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy, Entropy, 14(3), pp [2] Omotoso, O; Aderinto A. A (2012). Assessing the

8 16 O. D. Oyeyinka et al.: Determination of System Effectiveness for Physical Performance of Corporate Private Security Organizations in Crime Prevention in Lagos State, Nigeria, Journal of Physical Security Vol.6:1, pp [3] Graves, G.H (2006). Analytical foundations of physical security system assessment. Ph.D. Thesis, Texas A&M : College Station, TX, USA, pp [4] Garcia, M. L (2007). The Design and Evaluation of Physical Protection Systems, Second edition, Sandia National Laboratories, pp [5] Jangs, S.S; Kwak, S; Yoo, J.K; Yoon,W (2009). Development of a Vulnerability Assessment Code for a Physical Protection System: Systematic Analysis of Physical Protection (SAPE). IN: Nuclear Engineering and Technology, VOL.41, pp [6] Yang, Z (2011). Research on the Effectiveness evaluation and Risk Optimization of Crime prevention system based on Fuzzy Theory and AHP model, Journal of Computers, Vol 6:2.pp [7] Achumba, I.C. Ighomereho, O. S. Akpor-Robaro, M. O. M. (2013). Security Challenges in Nigeria and the Implications for Business, Journal of Economics and Sustainable Development, Vol.4, No.2, 2013 pp [8] Ortiz, P.; Friederich, V; Wheatley, J; Oresegun, M. (1999). Lost and found dangers: orphan radiation sources raise global concern. IAEA Bulletin 41: 3, pp [9] Geiger, G; Schaefer, A (2004). Approaches to Quantitative Risk Assessment with Applications to physical protection of nuclear Materials, Journal of Physical Security Vol 1 No 1:4, pp [10] IAEA, (2001). Nuclear Security and Safeguards. IAEA Bulletin 43, No. 4.pp2. [11] Nielsson, A. (2001). Security of material: the changing context of the IAEA s programme. IAEA Bulletin 43, No. 3, pp [12] Bakr, W.F; Hamed, A.A (2009). Upgrading the Physical Protection System (PPS) to improve the Response to Radiological Emergencies involving Malevolent Action Journal of Physical Security Vol.3, pp [13] ElBaradei, M. (IAEA Director General) (2003). Address at the International Conference on Security of Radioactive Sources, Vienna, pp [14] IAEA (1999) INFCIRCL 225/ rev.4 Corrected, "The Physical Protection of Nuclear Materials and Nuclear Facilities, pp.1-9. [15] Sandia National Laboratory, SAND (2007). Nuclear Power Plant Security Assessment Technical Manual, Albuquerque, pp [16] US Department of Homeland Security. National Infrastructure Protection plan. Available online: dhs.gov/xlibrary/assets/nipp_plan.pdf (accessed on 28 April, 2013). [17] Fischer, R.J and Green, G.(2004). Introduction to Security,7 Th ed.; Elsevier: Burlington, MA,USA, pp [18] Golan, A.; Maasoumi, (2008). Information theoretic and entropy methods: An Overview. Economet. Rev.27, [19] Hicks, M. J. Snell, M. S. Sandoval, J. S. and Potter, C. S. (1998). Cost and performance analysis of physical protection systems a case study, in Proceedings 32nd Annual International Carnahan Conference on Security Technology, Alexandria, Virginia, pp [20] IAEA-TECDOC-1355(2003).Security of radioactive sources Interim guidance for comment, pp.1. [21] Gonalez, A.J. (2001), Security of Radioactive Sources. The Evolving New International Dimensions. IAEA Bulletin: 43, 4. [22] Chapman, L.D and Harlon, C.P (1985). EASI (Estimate of adversary sequence interruption on an IBM PC: SAND ; Sandia Labs: Albuquerque, NM, USA, pp [23] IAEA (2011) Nuclear Security Recommendations of Nuclear material and Nuclear facilities (INFCIRC/2Recomndas 225/Rev5) Nuclear Security Series No 13 pp1-50.

DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)

DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE) DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE) SUNG SOON JANG *, SUNG-WOO KWAK, HOSIK YOO, JUNG-SOO KIM

More information

A Risk Assessment Methodology (RAM) for Physical Security

A Risk Assessment Methodology (RAM) for Physical Security A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to

More information

Security at San Onofre

Security at San Onofre Security at San Onofre April 16, 2015 Ross Quam Security Manager Overview 1. Mission 2. Adversary Characteristics 3. Plans and Procedures 4. Insider Mitigation 5. Local Law Enforcement Agency Support 2

More information

Site Security Standards and Strategy

Site Security Standards and Strategy Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards

More information

Dynamic Vulnerability Assessment

Dynamic Vulnerability Assessment SANDIA REPORT SAND2004-4712 Unlimited Release Printed September 2004 Dynamic Vulnerability Assessment Cynthia L. Nelson Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,

More information

VULNERABILITY ASSESSMENT. Correctional Facilities Are Only as Secure as Their Weakest Point

VULNERABILITY ASSESSMENT. Correctional Facilities Are Only as Secure as Their Weakest Point VULNERABILITY ASSESSMENT Correctional Facilities Are Only as Secure as Their Weakest Point Today's correctional security system is a complex configuration of personnel, procedures, detection, delay and

More information

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories

More information

Physical Security for Drinking Water Facilities

Physical Security for Drinking Water Facilities Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland

More information

ABA Section of Public Utility, Communications & Transportation Law Safety and Security in Transport

ABA Section of Public Utility, Communications & Transportation Law Safety and Security in Transport ABA Section of Public Utility, Communications & Transportation Law Safety and Security in Transport Commercial Nuclear Power Plants Stan Blanton Nuclear Power Subcommittee The Regulatory Landscape NRC

More information

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland B. Wieland Swiss Federal Office of Energy, CH 3003 Berne, Switzerland ABSTRACT: The presentation describes the

More information

Nuclear Security and Incident Response

Nuclear Security and Incident Response Hitachi Review Vol. 62 (2013), No. 3 168 Nuclear Security and Incident Response Kazuhiko Tanimura Hisayuki Ito Hiroyuki Kimura OVERVIEW: Since the Great East Japan Earthquake, there has been a requirement

More information

During the Clinton administration, the

During the Clinton administration, the 8 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129, PAGES 8-12, OCTOBER 2004 Assessing the Vulnerabilities of U.S. Drinking Water Systems Jeffrey J. Danneels and Ray E. Finley Sandia National Laboratories

More information

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department

More information

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0 MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:

More information

Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov

Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a

More information

AN ESTIMATION OF A PASSIVE INFRA-RED SENSOR'S PROBABILITY OF DETECTION

AN ESTIMATION OF A PASSIVE INFRA-RED SENSOR'S PROBABILITY OF DETECTION Proceedings of the 7 th Conference on Nuclear and Particle Physics, 11-15 Nov. 2009, Sharm El-Sheikh, Egypt AN ESTIMATION OF A PASSIVE INFRA-RED SENSOR'S PROBABILITY OF DETECTION E.A. Osman¹, M.I. El-Gazar¹,

More information

Science/Safeguards and Security. Funding Profile by Subprogram

Science/Safeguards and Security. Funding Profile by Subprogram Safeguards and Security Safeguards and Security Funding Profile by Subprogram (dollars in thousands) Protective Forces 35,059 37,147 Security Systems 11,896 10,435 Information Security 4,655 4,595 Cyber

More information

Nuclear Plant Security Systems

Nuclear Plant Security Systems Nuclear Plant Security Systems Course Description Gary W Castleberry, PE This course will introduce the student into the design of security systems for commercial nuclear power plants. An overview of plant

More information

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE 1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million

More information

Intelligent Home Automation and Security System

Intelligent Home Automation and Security System Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology

More information

CYBER SECURITY RISK ANALYSIS FOR PROCESS CONTROL SYSTEMS USING RINGS OF PROTECTION ANALYSIS (ROPA)

CYBER SECURITY RISK ANALYSIS FOR PROCESS CONTROL SYSTEMS USING RINGS OF PROTECTION ANALYSIS (ROPA) YBER SEURITY RISK ANALYSIS FOR PROESS ONTROL SYSTEMS USING RINGS OF PROTETION ANALYSIS (ROPA) by Paul Baybutt Primatech Inc. paulb@primatech.com 614-841-9800 www.primatech.com A version of this paper appeared

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary - Organization responsible for the review of physical security

More information

Terrorist Protection Planning Using a Relative Risk Reduction Approach*

Terrorist Protection Planning Using a Relative Risk Reduction Approach* BNL-71383-2003-CP Terrorist Protection Planning Using a Relative Risk Reduction Approach* Session VIII: Technology Forum Focus Groups Dr. Joseph P. Indusi Nonproliferation and National Security Department

More information

United Kingdom Nirex Limited CONTEXT NOTE. 4.5: Security. September 2005 Number: 484118

United Kingdom Nirex Limited CONTEXT NOTE. 4.5: Security. September 2005 Number: 484118 United Kingdom Nirex Limited CONTEXT NOTE 4.5: Security September 2005 Number: 484118 CONTEXT NOTE 4.5: Security September 2005 Number: 484118 Conditions of Publication This technical note is made available

More information

Risk-Informed Security: Summary of Three Workshops

Risk-Informed Security: Summary of Three Workshops Risk-Informed Security: Summary of Three Workshops N. Siu Office of Nuclear Regulatory Research U.S. Nuclear Regulatory Commission Presented at INMM/ANS Workshop on Safety-Security Risk-Informed Decision-Making

More information

Nuclear Security Plan 2014 2017

Nuclear Security Plan 2014 2017 Atoms for Peace Board of Governors General Conference GOV/2013/42-GC(57)/19 Date: 2 August 2013 For official use only Item 4(b) of the Board s provisional agenda (GOV/2013/37) Item 16 of the Conference's

More information

INTRUSION ALARM SYSTEM

INTRUSION ALARM SYSTEM INTRUSION ALARM SYSTEM Case studies reveal most burglars are deterred by the mere presence of an alarm system. Burglars attack unprotected premises considerably more often than ones protected by alarm

More information

MAJOR PLANNING CONSIDERATIONS CHECKLIST

MAJOR PLANNING CONSIDERATIONS CHECKLIST MAJOR PLANNING CONSIDERATIONS CHECKLIST The following checklist is provided as a guide to assure that relevant considerations are identified in the emergency management planning process. Use the blank

More information

DISCRETE-EVENT SIMULATION FOR THE DESIGN AND EVALUATION OF PHYSICAL PROTECTION SYSTEMS

DISCRETE-EVENT SIMULATION FOR THE DESIGN AND EVALUATION OF PHYSICAL PROTECTION SYSTEMS Proceedings of the 1998 Winter Simulation Conference D.J. Medeiros, E.F. Watson, J.S. Carson and M.S. Manivannan, eds. DISCRETE-EVENT SIMULATION FOR THE DESIGN AND EVALUATION OF PHYSICAL PROTECTION SYSTEMS

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

Nuclear Security Glossary

Nuclear Security Glossary IAEA NUCLEAR SECURITY SERIES NO. Nuclear Security Glossary Revision 3E Draft 17 March 2010 Page 1 of 16 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME] Page 2 of 16 Introduction The Nuclear

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

SCREENING FACILITIES FOR CYBER SECURITY RISK ANALYSIS. by Paul Baybutt Primatech Inc. paulb@primatech.com 614-841-9800 www.primatech.com.

SCREENING FACILITIES FOR CYBER SECURITY RISK ANALYSIS. by Paul Baybutt Primatech Inc. paulb@primatech.com 614-841-9800 www.primatech.com. SCREENING FACILITIES FOR CYBER SECURITY RISK ANALYSIS by Paul Baybutt Primatech Inc. paulb@primatech.com 614-841-9800 www.primatech.com Abstract Many chemical companies have performed security vulnerability

More information

Safeguards and Security

Safeguards and Security Safeguards and Security Overview The Safeguards and Security (S&S) program mission is to support Departmental research at Office of Science (SC) laboratories by ensuring appropriate levels of protection

More information

Implanting Large Security Systems in Seaports

Implanting Large Security Systems in Seaports Implanting Large Security Systems in Seaports The Role of the Security Consultant Presented by Yuval Alon Senior Maritime Security Expert 1 Company s History 37 YEARS International Activity in Homeland

More information

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX To ensure that policies, procedures, training and physical facilities improvements are implemented in a planned and logical

More information

Critical Infrastructure Protection and the Evaluation Process

Critical Infrastructure Protection and the Evaluation Process Critical Infrastructure Protection and the Evaluation Process Martin Hromada and Ludek Lukas Department of Security Engineering Faculty of Applied Informatics, Tomas Bata Univerzity in Zlín, Nad Stráněmi

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

International Symposium on Nuclear Security

International Symposium on Nuclear Security International Symposium on Nuclear Security The Nuclear Security actions taken in Mexico to get an effective protection system of nuclear and radioactive facilities RUBÉN RAMÍREZ GUERRERO rramirezg@cnsns.gob.mx

More information

STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS.

STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. 1. Background: Experience gained in handing terrorism in recent years has shown that with a view to gain widespread media

More information

Application Note. ipix A Gamma imager to support various applications

Application Note. ipix A Gamma imager to support various applications Application Note ipix A Gamma imager to support various applications Introduction ipix is a unique gamma imager that quickly locates low level radioactive sources from a distance and estimates the dose

More information

The Role of Clinical Laboratories During a Radiological Event

The Role of Clinical Laboratories During a Radiological Event Testimony Before the Committee on Science and Technology Subcommittee on Oversight and Investigations United States House of Representatives The Role of Clinical Laboratories During a Radiological Event

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Tobias Whitney, Manager of CIP Compliance (NERC) Carl Herron, Physical Security Leader (NERC) NERC Sub-Committee Meeting New Orleans, Louisiana CIP-014

More information

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7 Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section

More information

A Method to Assess the Vulnerability of U.S. Chemical Facilities

A Method to Assess the Vulnerability of U.S. Chemical Facilities NOV. 02 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special REPORT Final Version A Method to Assess the Vulnerability of U.S. Chemical Facilities U.S. Department

More information

Understanding Alarm Systems

Understanding Alarm Systems Understanding Alarm Systems A false alarm occurs when an alarm signal designed to elicit an immediate emergency Law Enforcement, Fire, or Medical response is activated, when in fact no emergency exists.

More information

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management State of New Hampshire Division of Homeland Security and Emergency Management Effective Solutions for Increased Security in NH Public Schools 33 Hazen Drive Concord, NH 03305 Effective Date: June 25, 2014

More information

Homeland Security for Schools: Threat Status Alert Worksheet

Homeland Security for Schools: Threat Status Alert Worksheet for Schools: Threat Status Alert Worksheet The Green Alert Status reflects a low risk of terrorist attacks. The primary goal of a safe school plan is to safeguard schools against crime, violence and disruption.

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

DOT IN-DEPTH HAZMAT SECURITY TRAINING PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow

More information

USDA Risk Management Approach. Office of Procurement and Property Management (OPPM) Richard C. Holman (202) 720-3901

USDA Risk Management Approach. Office of Procurement and Property Management (OPPM) Richard C. Holman (202) 720-3901 Office of Procurement and Property Management (OPPM) Richard C. Holman (202) 720-3901 INTRODUCTION Risk management is the technical procedure for identifying and evaluating security threats and vulnerabilities

More information

THE UNIVERSITY OF TEXAS AT AUSTIN HANDBOOK OF OPERATING PROCEDURES SECURITY SYSTEMS ALARM POLICY

THE UNIVERSITY OF TEXAS AT AUSTIN HANDBOOK OF OPERATING PROCEDURES SECURITY SYSTEMS ALARM POLICY THE UNIVERSITY OF TEXAS AT AUSTIN HANDBOOK OF OPERATING PROCEDURES Section I. General Policy Guidelines A. Policy Statement SECURITY SYSTEMS ALARM POLICY Part 2. Campus Services Section A. General Campus

More information

How to Solve the Most Persistent Problem in Perimeter Security Systems

How to Solve the Most Persistent Problem in Perimeter Security Systems How to Solve the Most Persistent Problem in Perimeter Security Systems Duane Thompson General Manager of Fiber SenSys Carrondo, Antonio Commercial Manager, Teleprinta Perimeter Security Challenging!! More

More information

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI Available online at www.apije.com ASIA PACIFIC INTERNATIONAL JOURNAL OF ENGINEERING SCIENCE Vol. 02 (01) (2016) 37 41 AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI A.Arun Raja

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over

More information

IAEA Nuclear Security Series

IAEA Nuclear Security Series IAEA Nuclear Security Series Miroslav Gregoric Panel Discussion 2-1 Nuclear Security International Forum on Peaceful Use of Nuclear Energy and Nuclear Non Proliferation 2-3 February 2011, Tokyo, Japan

More information

U.S. DoD Physical Security Market

U.S. DoD Physical Security Market U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

National Infrastructure Protection Center

National Infrastructure Protection Center National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS http://dx.doi.org/10.5516/net.04.2012.091 AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG *, JUNG-WOON LEE, GEE-YONG PARK, KEE-CHOON KWON,

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

Security Risk Assessment Tool

Security Risk Assessment Tool Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of

More information

Training in Emergency Preparedness and Response

Training in Emergency Preparedness and Response Working to Protect People, Society and the Environment Training in Emergency Preparedness and Response Nuclear Safety and Security Programme Nuclear Safety and Security Programme Training in Emergency

More information

Seoul Communiqué 2012 Seoul Nuclear Security Summit

Seoul Communiqué 2012 Seoul Nuclear Security Summit Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to

More information

DESIGN OF THE REGIONAL TRAINING CENTER FOR MATERIAL PROTECTION, CONTROL AND ACCOUNTING

DESIGN OF THE REGIONAL TRAINING CENTER FOR MATERIAL PROTECTION, CONTROL AND ACCOUNTING Panel 2-1 DESIGN OF THE REGIONAL TRAINING CENTER FOR MATERIAL PROTECTION, CONTROL AND ACCOUNTING KAEC, INP Tleu Dairbekov 1 PURPOSE OF TRAINING CENTER FOR MATERIAL PROTECTION, CONTROL AND ACCOUNTING Training

More information

Security System Owner s Manual

Security System Owner s Manual Security System Owner s Manual Interactive Technologies Inc. 2266 North 2nd Street North St. Paul, MN 55109 FCC Notices FCC Part 15 Information to the User Changes or modifications not expressly approved

More information

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one

More information

Recognizing Security Principles in the Access Control Point Design & Construction Process

Recognizing Security Principles in the Access Control Point Design & Construction Process Recognizing Security Principles in the Access Control Point Design & Construction Process This white paper examines the role security principles play in achieving a performance-based, systemic view of

More information

Select Agent Program Workshop November 16, 2012. Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC)

Select Agent Program Workshop November 16, 2012. Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC) Select Agent Program Workshop November 16, 2012 Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC) Revisions to Regulations 11 (a) through 11 (c)(7): (b) and (c)(2) changed

More information

Elements of the Russian Emergency Preparedness Program

Elements of the Russian Emergency Preparedness Program Elements of the Russian Emergency Preparedness Program Randolph L. Sullivan, NRC National Radiological EP Conference St. Louis, Missouri March 2006 2 3 4 5 6 Volgodonsk NPP 1000 MWe VVER, a PWR Large Staff

More information

BUSINESS CONTINUITY PLANNING

BUSINESS CONTINUITY PLANNING Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,

More information

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior GAO United States General Accounting Office Report to the Secretary of the Interior July 2001 INFORMATION SECURITY Weak Controls Place Interior s Financial and Other Data at Risk GAO-01-615 United States

More information

IAEA INTERNATIONAL FACT FINDING EXPERT MISSION OF THE NUCLEAR ACCIDENT FOLLOWING THE GREAT EAST JAPAN EARTHQUAKE AND TSUNAMI

IAEA INTERNATIONAL FACT FINDING EXPERT MISSION OF THE NUCLEAR ACCIDENT FOLLOWING THE GREAT EAST JAPAN EARTHQUAKE AND TSUNAMI IAEA INTERNATIONAL FACT FINDING EXPERT MISSION OF THE NUCLEAR ACCIDENT FOLLOWING THE GREAT EAST JAPAN EARTHQUAKE AND TSUNAMI Tokyo, Fukushima Dai-ichi NPP, Fukushima Dai-ni NPP and Tokai NPP, Japan 24

More information

Ten Steps for Preventing a terrorist Attack

Ten Steps for Preventing a terrorist Attack WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business

More information

Camera Use. Policy Statement and Purpose. Table of Contents

Camera Use. Policy Statement and Purpose. Table of Contents Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing

More information

1 of 5 4/18/2015 9:34 AM

1 of 5 4/18/2015 9:34 AM 1 of 5 4/18/2015 9:34 AM Market pressures continue to squeeze the residential alarm business with attrition and alternative solutions. Monitored outdoor protection, adding a layer of perimeter security

More information

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES Definitions 1. In these requirements: C-NLOPB means the Canada-Newfoundland and Labrador Offshore Petroleum Board; Chief Safety Officer means

More information

GSM ALARM SYSTEM USER MANUAL

GSM ALARM SYSTEM USER MANUAL GSM ALARM SYSTEM USER MANUAL 1. Instruction The alarm system is based on GSM network. With a GSM SIM card, it can be used wherever you want and no need to connect any wire, which is convenient and easy

More information

EMERGENCY MANAGEMENT IN SCHOOLS

EMERGENCY MANAGEMENT IN SCHOOLS EMERGENCY MANAGEMENT IN SCHOOLS Michelle Roberts and Mark Stephens Emergency and Security Management Branch Department of Education and Training Victoria Paper presented at the The Role of Schools in Crime

More information

APPENDIX B SUPPLEMENTAL INSPECTION PROGRAM A. OBJECTIVES AND PHILOSOPHY OF THE SUPPLEMENTAL INSPECTION PROGRAM

APPENDIX B SUPPLEMENTAL INSPECTION PROGRAM A. OBJECTIVES AND PHILOSOPHY OF THE SUPPLEMENTAL INSPECTION PROGRAM APPENDIX B SUPPLEMENTAL INSPECTION PROGRAM A. OBJECTIVES AND PHILOSOPHY OF THE SUPPLEMENTAL INSPECTION PROGRAM The supplemental inspection program is designed to support the NRC s goals of maintaining

More information

AN INFORMATION MANAGEMENT SYSTEM FOR A SPENT NUCLEAR FUEL INTERIM STORAGE FACILITY

AN INFORMATION MANAGEMENT SYSTEM FOR A SPENT NUCLEAR FUEL INTERIM STORAGE FACILITY AN INFORMATION MANAGEMENT SYSTEM FOR A SPENT NUCLEAR FUEL INTERIM STORAGE FACILITY Karl Horak 1, Todd Giles 1, Hong-Nian Jow 2, Robert Finch 1, Hsien-Lang Chiu 3 1 Sandia National Laboratories, P.O. Box

More information

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution

More information

Physical security management guidelines

Physical security management guidelines Physical security management guidelines Security zones and risk mitigation control measures Approved 21 June 2011 Version 1.4 i Commonwealth of Australia 2011 All material presented in this publication

More information

RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay

RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay RC-17 Radiation Protection in Waste Management and Disposal Implementing the Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management Alejandro V. Nader

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS

FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS IAEA NUCLEAR SECURITY SERIES NO. FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS Revision 17.04 Page 1 of 20 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME]

More information

MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY

MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY F. Shawki 1,2, M. El-Shahat. Dessouki 1,3, A. I. Elbasiouny 4, A.N. Almazroui 5, F. M. R. Albeladi 5 1 Assistant Professor, Electrical

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water

More information

Security for Railways and Metros

Security for Railways and Metros Security for Railways and Metros Security for Railways and Metros Security Management System Railways and Metros worldwide share a set of characteristics that make them very vulnerable to possible attacks,

More information

Crime Central Station Burglary Alarm Systems

Crime Central Station Burglary Alarm Systems Page 1 of 10 Scope Crime Central Station Burglary Alarm Systems This criteria is intended to provide Loss Control Representatives with specific guidelines and information for evaluating central station

More information

Assessing the Security Vulnerabilities of Correctional Facilities^

Assessing the Security Vulnerabilities of Correctional Facilities^ Assessing the Security Vulnerabilities of Correctional Facilities^ Debra S. Spencer a, G. Steve Morrison *i rti. _ ^* a Sandia National Laboratories, P.O. Box 5800, Albuquerque, NM 87185-0762 f\ c\ ''National

More information