Security at San Onofre



Similar documents
ABA Section of Public Utility, Communications & Transportation Law Safety and Security in Transport

3.0 Nonsystem Based Design Descriptions and ITAAC

Select Agent Program Workshop November 16, Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC)

Nuclear Plant Security Systems

How to Solve the Most Persistent Problem in Perimeter Security Systems

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

Backgrounder Office of Public Affairs Telephone: 301/

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

U.S. DoD Physical Security Market

About the Port Authority

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

NRC Cyber Security Regulatory

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

A Risk Assessment Methodology (RAM) for Physical Security

Physical Security Reliability Standard Implementation

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

Physical Security for Drinking Water Facilities

DOT HAZMAT SECURITY AWARENESS TRAINING

Ten Tips for Completing a Site Security Plan

FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II

Nuclear Security Glossary

VULNERABILITY ASSESSMENT. Correctional Facilities Are Only as Secure as Their Weakest Point

Statement of objective MALLS & MULTIPLEXES

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland

A Cost-Efficient Approach to High Cyber Security Assurance in Nuclear Power Plants

How To Ensure Security At A Site Security Site

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

NRC Cyber Security Policy &

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft

WHITE PAPER PROPOSED CONSEQUENCE-BASED PHYSICAL SECURITY FRAMEWORK FOR SMALL MODULAR REACTORS AND OTHER NEW TECHNOLOGIES

C-TPAT Importer Security Criteria

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Summary of NRC s Review of the Recent Security Issues at the Shearon Harris Nuclear Plant

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Headquarters, Department of the Army

Mt. San Antonio College Campus Emergency Response and Evacuation Plan

SYRACUSE CITY SCHOOL DISTRICT

Aerodrome Advisory Circular

Safety & Security October 2015

Security Requirements for Spent Fuel Storage Systems 9264

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS

BEST PRACTICES FOR COMMERCIAL COMPLIANCE

Court Security Guidelines

Intermec Security Letter of Agreement

APPENDIX B DEPARTMENT OF THE INTERIOR FACILITY SECURITY STANDARDS

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

E3211. DOT Hazmat Security Awareness. Leader s Guide

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Security Guidelines for. Agricultural distributors

Homeland Security Preparedness Survey

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING

City of Calabasas Emergency Communications. Prepared for the Public Safety Commission May 21, 2007

DISCRETE-EVENT SIMULATION FOR THE DESIGN AND EVALUATION OF PHYSICAL PROTECTION SYSTEMS

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

Palm Beach State College Security Plan

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Conducting Security System Site Surveys

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN

NUCLEAR REGULATORY COMMISSION. 10 CFR Part 73 [NRC ] RIN 3150-AJ37. Cyber Security Event Notifications

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

3.09 Public Safety and Security

APPENDIX B SUPPLEMENTAL INSPECTION PROGRAM A. OBJECTIVES AND PHILOSOPHY OF THE SUPPLEMENTAL INSPECTION PROGRAM

PHYSICAL SECURITY FOR THE GALENA 4S NUCLEAR POWER GENERATION FACILITY

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)

The Design Process of Physical Security as Applied to a U.S. Border Port Of Entry

EMERGENCY MANAGEMENT IN SCHOOLS

National Infrastructure Protection Center

SURVEY OF UNITED STATES TRANSIT SYSTEM SECURITY NEEDS AND FUNDING PRIORITIES SUMMARY OF FINDINGS. April 2004

Security Criteria for C-TPAT Foreign Manufacturers in English

Sam Docknevich, PSP, Security Service Portfolio Manager. Are You Prepared? The impending impact of Code on Servicing Security Systems

Insights of the Periodic Reviews Regarding the Physical Protection of Nuclear Power Plants Designed to Earlier Standards

The Objectives of this Rulemaking

Best Practices For. Supply Chain Security

Physical security management guidelines

Emergency Preparedness

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

Global Supply Chain Security Recommendations

SCHEME OF EXAMINATION PG DIPLOMA IN CORPORATE AND INDUSTRIAL SECURITY MANAGEMENT (PGDCISM) ONE YEAR PROGRAMME

Why All Data Centers are Not Created Equal

Implanting Large Security Systems in Seaports

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

Security for Independent Spent Fuel Storage Installations (ISFSI)

Security Guidance for Commercial Buildings

Basic Terminology C.A. Pickett

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM

Site Security Standards and Strategy

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management

GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response

ISRAEL HomeLand Security Industry

MODERN SECURITY SYSTEMS FOR PERIMETER PROTECTION OF AIRPORTS

SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY

Transcription:

Security at San Onofre April 16, 2015 Ross Quam Security Manager

Overview 1. Mission 2. Adversary Characteristics 3. Plans and Procedures 4. Insider Mitigation 5. Local Law Enforcement Agency Support 2

Mission Protect public health and safety against the threat of Radiological Sabotage Well trained and highly qualified Armed Security Force State of the art intrusion detection systems and cameras Hardened defensive positions 3

Objectives & Requirements (10 CFR 73.55) Physical protection program to address the design basis threat of radiological sabotage Capability to detect, assess, interdict, and neutralize threats Program to demonstrate effective implementation of the protective strategy 4

Sabotage/Theft Sabotage/Theft: Deliberate acts that could endanger the public by exposure to radiation Threat: Determined violent external assault, attack by stealth, or deceptive actions, including diversionary actions, by an adversary force Single group attacking through one entry point Multiple groups attacking through multiple entry points 5

Adversary Characteristics (10 CFR 73.1) Well-trained and dedicated individuals with sufficient knowledge to identify specific equipment or locations necessary for attack Active or passive insider Suitable weapons Hand-carried equipment Land and waterborne vehicle bomb assault Cyber attack 6

Security Plans Define how SONGS implements regulatory requirements such as: Responsibilities and chain of command Compensatory Requirements Training and qualification of security personnel Predetermined response plans and strategies 7

Procedures Provide site-specific details to ensure consistent implementation of security plans, including: Equipment maintenance and testing Training and qualification (includes Drills and Exercises) Search Requirements Post Responsibilities Tactical Response Procedures 8

Protection of Plans Protect security plans and security-related information against unauthorized disclosure Physical Security Plan Training and Qualification Plan Safeguards Contingency Plan Cyber Security Plan Security implementing procedures 9

Defense-in-Depth Owner Controlled Area Early Warning System Protected Area Vital Area Protection Physical Building Structure TARGET 10

Owner Controlled Area 11

OCA Access and Barricaded Gates Armed Security Officers Vehicle Barriers CCTV Monitoring Roving Patrols 12

Hardened Defensive Positions 13

Vehicle Barrier System 14

U2/3 Protected Area 15

Delay Fences and Gates Hardened Fighting Positions 16

Vital Protection Area Concrete floors, walls, ceilings Steel doors locked, alarmed Key card access Delay barriers Anti-Grenade and/or Explosive Screens Defensive Channeling and Traps 17

Security System Monitoring EWZ, PA and VA alarm monitoring, assessment and response EWZ and PA CCTV and video capture Multiple communication capabilities 18

Insider Mitigation Program must contain elements from: Access authorization program (73.56) Fitness-for-duty program (10 CFR part 26) Physical protection program 19

Integrated Law Enforcement Agency Support FBI - Primary Law Enforcement Agency (LEA) Maintains the SONGS Integrated Law Enforcement Response Plan which outlines response actions for: U.S. Coast Guard FAA U.S. Border Patrol CA State Park Rangers CA State Highway Patrol Orange County Sheriff San Diego County Sheriff USMC Provost Marshal s Office 20

Communications Interoperability Organization Methods of Contact FBI Telephone Radio Cell Phone CHP Telephone Radio Cell Phone USMC Telephone Radio Cell Phone State Parks Telephone Radio Cell Phone Border Patrol Telephone Radio Cell Phone Additional SONGS radios are staged for incoming law enforcement personnel 21

CEP Comments & Questions