Secure Transportation Management



From this document you will learn the answers to the following questions:

What is the main concern of the course?

What is the main focus of the STMC course?

What does the training and qualifications of instructors need to have?

Similar documents
Testing of Kaonetics Devices at BNL

Asynchronous data change notification between database server and accelerator control systems

Dynamic Vulnerability Assessment

A SHORT HISTORY OF CSISRS

Nuclear Reaction and Structure Databases of the National Nuclear Data Center

The U.S./IAEA Workshop on Software Sustainability for Safeguards Instrumentation

LLNL-TR SAVANT Status Report. Arden Dougan. November 6, 2009

HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution) model analysis. Cory Welch. Hydrogen Analysis Workshop, August 9-10 Washington, D.C.

The Value of RECs in Renewable Project Financing

Penetration Testing of Industrial Control Systems

Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

Y-12 National Security Complex

Behaviors and Actions That Support Leadership and Team Effectiveness, by Organizational Level

Up to $750 (or 30% of the project cost, whichever is less), for

Science Goals for the ARM Recovery Act Radars

Drupal Automated Testing: Using Behat and Gherkin

A Systems Approach to HVAC Contractor Security

Panel Session #4 Smart Grid Workforce Training and Education: Identifying the Industry Perspective

This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy.

Small Modular Nuclear Reactors: Parametric Modeling of Integrated Reactor Vessel Manufacturing Within A Factory Environment Volume 1

How To Find Out If The Winds From The Oak Ridge Site Are Calm

Development of High Stability Supports for NSLS-II RF BPMS

CISM (Certified Information Security Manager) Document version:

WET BULB GLOBE TEMPERATURE MEASUREMENT AT THE Y-12 NATIONAL SECURITY COMPLEX

Microgrids. EEI TDM Meeting Charleston, South Carolina October 7, Neal Bartek Smart Grid Projects Manager

Early Fuel Cell Market Deployments: ARRA and Combined (IAA, DLA, ARRA)

Food Service Technology Center

Y-12 EMBOS Medical Lab Interface Batch Loader

LIMITATIONS ON HIGH DATA RATE OPTICAL FIBER TRAN-SMISSION SYSTEMS DUE TO TRANSMISSION IMPAIRMENT

DHS National Technical Nuclear Forensics Program FY 10 Summary Report: Graduate Mentoring Assistance Program (GMAP)

A STUDY OF THE APPLICABILITY OF ISO/IEC AND THE GERMAN BASELINE PROTECTION MANUAL TO THE NEEDS OF SAFETY CRITICAL SYSTEMS

Confocal μ-xrf for 3D analysis of elements distribution in hot environmental particles

Time Domain Reflectometry for Evaluating Detonator Cable Assemblies in the NEP

September, Collider-Accelerator Department. Brookhaven National Laboratory P.O. Box 5000 Upton, NY www. bnl.gov

W. C. Reinig. Savannah River Laboratory E. I. du Pent de Nemours and Company Aiken, South Carolina 298o1

Energy Systems Integration

Measurement of BET Surface Area on Silica Nanosprings

Terms and Conditions

Training Management System Requirements (TPCP)

Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012

NEI 06-13A [Revision 0] Template for an Industry Training Program Description

Situated Usability Testing for Security Systems

WinMagic Encryption Software Installation and Configuration

NREL Job Task Analysis: Crew Leader

Food Service Technology Center

COMPARISON OF INDIRECT COST MULTIPLIERS FOR VEHICLE MANUFACTURING

ACOT WEBSITE PRIVACY POLICY

Amorphous Transparent Conducting Oxides (TCOs) Deposited at T 100 C

PROSPECTUS. International Training Course on Preventive and Protective Measures against Insider Threats. Place:

MTConnect Institute Public Comment and Evaluation License Agreement

Cloud-based Architecture Capabilities Summary Report

Synchro-Phasor Data Conditioning and Validation Project Phase 3, Task 1. Report on

CASE STUDIES OF STATE SUPPORT

NEAMS Software Licensing, Release, and Distribution: Implications for FY2013 Work Package Planning

Regional Field Verification Operational Results from Four Small Wind Turbines in the Pacific Northwest

Analysis of Costs-Benefits Tradeoffs of Complex Security Systems. M. J. Hicks Security Systems Analysis and Development Department, 5845.

Climate-Weather Modeling Studies Using a Prototype Global Cloud-System Resolving Model

Sensitive Unclassified Data Encryption and Networking Applications

Requesting Nodes, Processors, and Tasks in Moab

Derived Intervention Levels for Tritium Based on Food and Drug Administration Methodology Using ICRP 56 Dose Coefficients (U)

Terrorist Protection Planning Using a Relative Risk Reduction Approach*

This document has been provided by the International Center for Not-for-Profit Law (ICNL).

IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary

S.L. Chang, S.A. Lottes, C.Q. Zhou,** B. Golchert, and M. Petrick

File System-Aware Job Scheduling with Moab

OUTSOURCING YOUR GUARD SERVICE

Integrated Tools for Multifamily Green Asset Management. Energy Upgrade CA Web Portal Funding Finder Compass Portfolio Tracker Webinar May 22, 2012

Nuclear Engineering Enrollments and Degrees Survey, 2013 Data

Analysis of Ultracapacitor-VRLA Energy Storage Systems for Mild Hybrids

This document has been provided by the International Center for Not-for-Profit Law (ICNL).

DP- MS PROPER STATISTICAL TREATMENT OF SPECIES-AREA DATA. Savannah River Laboratory Aiken, SC

Prospectus J0-TR Title: International Training Course on the Physical Protection of Nuclear Material and Nuclear Facilities.

Non-Proprietary User Agreement BETWEEN

Building Analytics. Managed Services. Better Building Alliance Department of Energy April 17, 2015

Enhanced Oil Recovery (EOR) in Tight Oil: Lessons Learned from Pilot Tests in the Bakken

Isolation of Battery Chargers Integrated Into Printed Circuit Boards

UBC Mitacs-Accelerate Internship and Mitacs Elevate Fellowships Project Terms & Non-Disclosure Agreements

IAEA Support for the Establishment of Nuclear Security Education

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

The CERT Top 10 List for Winning the Battle Against Insider Threats

SMARSH WEBSITE & HOSTING REPRESENTATIVE TERMS & CONDITIONS

WEBSITE TERMS & CONDITIONS. Last updated March 27, 2015

Laser Safety Audit and Inventory System Database

Telematics. ARI White Paper / Driven.

South China Insurance Architects and Engineers Professional Liability Insurance

Software Quality Assurance Plan for the Hydrologic Evaluation of Landfill Performance (HELP) Model. Author: Mark A. Phifer OCTOBER, 2006

Technical Support for ENERGY STAR Windows Version 6.0 Specification Revision. Gregory K. Homan, Christian Kohler, Emily Zachery* and Dariush Arasteh

Outage Notification. "Acknowledgment: This material is based upon work supported by the Department of Energy under Award Number DE-OE

Comment on "Observational and model evidence for positive low-level cloud feedback"

REMOVE THIS COVER PAGE WHEN DOCUMENT IS READY FOR REVIEW AND SIGNATURE.

SOFTWARE USAGE AGREEMENT (SUA)

Payment Card Industry (PCI) Data Security Standards (DSS) The Prevailing Standard for Digital Transactions

If a Client and a Freelancer enter an independent contractor relationship, then this Freelancer Agreement ( Freelancer Agreement ) will apply.

APPLIED SCIENCE COOPERATIVE AGREEMENT STANDARD OPERATING PROCEDURES FOR PTRs, GRANTS & TECHNOLOGY TRANSFER STAFF

Terms of Submission In order to participate, you must be at least eighteen (18) years old.

Vice President Sales Operations Job Description

Small PV Systems Performance Evaluation at NREL's Outdoor Test Facility Using the PVUSA Power Rating Method

Distribution of Terminal Lung and Liver Dose Rates in United States Transuranium and Uranium Registries Registrants

Automated Transportation Management System

Status And Future Plans. Mitsuyoshi Tanaka. AGS Department.Brookhaven National Laboratory* Upton NY 11973, USA INTRODUCTION

Transcription:

Secure Transportation Management Philip Gibbs Brookhaven National Laboratory October 2014 Nonproliferation and National Security Department Brookhaven National Laboratory U.S. Department of Energy National Nuclear Security Administration Office of International Material Protection and Cooperation BNL-106286-2014-IR Notice: This manuscript has been authored by employees of Brookhaven Science Associates, LLC under Contract No. DE-AC02-98CH10886 with the U.S. Department of Energy. The publisher by accepting the manuscript for publication acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes.

DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, nor any of their contractors, subcontractors, or their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or any third party s use or the results of such use of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof or its contractors or subcontractors. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.

Secure Transportation Management Workshop Overview October 2014

Course Information Course Title Secure Transportation Management Course (STMC) Course Length Option 1 5 days Option 2 11 days (additional exercises) Week 1 - Mon Sat Week 2 Mon - Fri 4

Mission and Purpose The STMC course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. The information presented is reinforced through the use of numerous practical exercises. Each practical exercise is a building block for the next exercise, designed to defend against the identified threat. 5

Mission and Purpose (continued) Following the final lesson there will be three practical convoy exercises. These exercises consist of three different routes, conducted over three days. Note: Only in 2 week version 6

7 Scope The course focuses on the following topical areas from a managers perspective: Understanding the regulatory framework for secure transportation of special nuclear materials Identifying the insider and outsider threat(s) to secure transportation

8 Scope (continued) Organization of a secure transportation unit Management and supervision of secure transportation units Equipment and facilities required Training and qualification needed

9 Scope (continued) Communications on a national, convoy, and individual level Documentation of practical exercises Vulnerability assessments of secure transportation units/convoys Conduct of convoy operations Three practical exercises in convoy operations

Lesson 1: Regulatory Framework Goal: A working level knowledge of the secure transportation nuclear regulatory framework. Objectives: Discuss the regulations that govern the security and transportation of nuclear material. Discuss the organizational alignment for those responsible for nuclear transport. 10

Goal: Lesson 2: Threats to Nuclear Materials in Transport A working level knowledge of the threats to nuclear materials convoys and facilities and the impact these threats have on transportation security operations. Objectives: Discuss the purpose of a Design Basis Threat. 11

Lesson 2: Threats to Nuclear Materials in Transport (continued) Objectives: (continued) Discuss the three questions that any good threat definition should answer. Discuss the types of adversaries which may threaten a nuclear material convoy or facility. Discuss tactics employed by adversaries. Discuss the capabilities of potential adversaries. 12

Lesson 2: Threats to Nuclear Materials in Transport (continued) Practical Exercise: Threat Identification Exercise Provide an awareness of the threats that convoys may face, and to provide practical experience developing threat tables. 13

Goal: Lesson 3: Organization of a Secure Transportation Unit A working level knowledge of how to organize a secure transportation unit. Objectives: Discuss the organization created to provide safe and secure transportation of nuclear weapons, nuclear weapon components, and special nuclear material (SNM). 14

Lesson 3: Organization of a Secure Transportation Unit (continued) Practical Exercise: Secure Transportation Organizational Structure Exercise Design and discuss the organizational structure of a secure transportation unit. 15

Lesson 4: Management and Supervision Goal: A working level knowledge of hiring and retention practices, and the management and supervision structure as related to secure transportation personnel. Objectives: Discuss the selection process to ensure quality candidates 16

Lesson 4: Management and Supervision (continued) Objectives: (continued) Discuss candidate entry level training Discuss using a systematic approach to training to achieve performance based metrics Discuss the management and supervision organizational structure 17

Lesson 4: Management and Supervision (continued) Practical Exercise Secure Transportation Protective Force Type and Size Determine the required size and makeup of a secure transportation protective force necessary to guard a materials transport. 18

Lesson 5: Equipment and Facilities Goal: A working level knowledge of the equipment and facilities needed to support convoy operations Objectives: Discuss vehicles needed for convoy operations Discuss the equipment each agent needs for convoy operations Discuss the facilities needed to support convoy operations 19

Lesson 5: Equipment and Facilities (continued) Practical Exercise: Equipment Needs Exercise Determine the equipment required to support a secure transportation unit. 20

Lesson 6: Training and Qualifications Goal: A working level knowledge of the importance of training and qualifications in an effective and efficient secure transportation operation Objectives: Discuss the requirements for training and qualification programs 21

Lesson 6: Training and Qualifications (continued) Objectives: Discuss the importance of a systematic performance-based training process Discuss required instructor qualifications Discuss the types of training required Practical Exercise: Training Requirements Determine the training required to support a secure transportation unit. 22

Lesson 7: Communications Goal: A working level knowledge of convoy operation communication needs. Objectives: Discuss the types of communications needed to track a convoy 23

Lesson 7: Communications (continued) Objectives: Discuss communications between the communication center and each convoy Discuss vehicle to vehicle communications Discuss individual portable communications Discuss radio communication procedures 24

Lesson 7: Communications (continued) Practical Exercise: Tactical Communications Introduce the concept of tactical communications. 25

Lesson 8: Documentation Goal: A working level knowledge of plans and orders and the purpose of a Transportation Security Plan Objectives: Discuss characteristic of good plans and orders Discuss types of plans and orders 26

Lesson 8: Documentation (Continued) Objectives: Discuss requirements for well documented plans and orders Discuss the purpose and application of a Transportation Security Plan Practical Exercise: Transportation Security Plan Write a Transportation Security Plan using the IAEA format. 27

Lesson 9: Vulnerability Assessments on Secure Transportation Goal: A working level knowledge of vulnerability analysis techniques as applied to Secure Transportation Management Objective: Discuss the VA process and the specific tool used in this course (VISA) 28

Lesson 9: Vulnerability Assessments on Secure Transportation (continued) Objectives: Conduct practical exercises using identified theft scenarios and the VISA tool to define various levels of conditional risk for each scenario Conduct a characterization of a notional road convoy focusing on physical security elements 29

Lesson 9: Vulnerability Assessments on Secure Transportation (continued) Practical Exercises: 1) Transportation Security Pre-Convoy Operations; 2) Adversary Timeline; 3) Table Top Exercise Documentation Report; 4) Short Convoy Provide an awareness of the process associated with performing a transportation vulnerability analysis and to provide practical experience developing check lists, timelines and analysis matrixes. 30

Goal Lesson 10: Convoy Operations (2 week version only) A working level knowledgeable of convoy operations Objectives Discuss the transportation element under normal operations 31

Lesson 10: Convoy Operations (continued) Objectives Discuss the response element under normal operations Discuss convoy and vehicle assignments Discuss convoy departure and arrival times Discuss the pre-trip briefings 32

Lesson 10: Convoy Operations (continued) Objectives Discuss the convoy activities during stops Discuss interaction with outside agencies Discuss accepting and releasing cargo responsibilities Discuss destination arrival activities Discuss convoy reactions to an attack 33

Lesson 10: Convoy Operations (continued) Practical Exercises Convoy Operations Provide the opportunity to observe and participate in simulated convoy operations. 34