The Internet of Things: Revolutionizing the Next Generation of Safeguards and Arms Control Verification KIT CONKLIN GLOBAL SECURITY TECHNOLOGY & POLICY PACIFIC NORTHWEST NATIONAL LABORATORY 1
Introduction Key Challenge Integrating cyber and physical capabilities Objective Internet of Things Introduce a new concept that could transform the way we think about safeguards and, eventually, arms control verification. Areas Examined Nuclear Safeguards Arms Control Verification Photo: PNNL - PACRAT 2
Scene Setter: Internet of Things (IOT) What is IOT? Ubiquitous network of remote monitoring sensors capable of thinking, feeling, and talking to each other. Context-aware computing Smart Homes & Grid Goal: Centralized application capable of monitoring and controlling all aspects of a home s security, entertainment, energy, and communications systems. Apply the IOT concept to nuclear safeguards and arms control verification. Photo: General Electric Reports & Visualizations http://www.gereports.com/ges-ces-debut-smart-homes-evs-aninteractive-desert-quest/ 3
Areas Examined: IAEA Safeguards Safeguards Objectives: Timely detection of diversion of significant quantities of nuclear material Deterrence of such diversion by the risk of early detection Challenges Nuclear Renaissance Stagnant IAEA budget: IAEA Needs 2013-14: 0.3% real increase 2015: zero real growth vs. 14 Regime transition: criteria-based information-driven Continued development of remote monitoring systems Improve inspection efficiency Increase analytical capabilities Cyber Security Safeguards By Design Understand cyber security threats 4
IOT-based Applications Centralized Remote Monitoring Capabilities Containment and Surveillance, Environmental Sampling, Nuclear Material Accountancy and Control Real-time facility and state-level bulk nuclear materials monitoring Networked, Facility-level Smart Sensors: Volume/density, flows, scales, distributed measurement of radiation levels, liquid presence detection, asset control, etc. Pioneer Systems Already Exist IOT is not reinventing the wheel. It s just connecting the wheel to the axel, transmission, engine, breaks, and steering column. 5
IOT Pioneers Generations of IOT Supply Chain Surveillance Remote Monitoring and Control Radio Frequency Identification (RFID) Smart Tags Canisters of Nuclear Material Give IAEA data on all canisters, not just a few. K-Area Material Storage (KAMS) Facility at Savannah River Site Monitor shock, drum-lid closure, temperature, radiation levels. Multi-sensor Data Fusion Unattended cylinder verification station Improved plutonium canister assay systems (ipcas) Photo: Yung Liu, Packaging Certification and Life-cycle Management, Argonne National Laboratory http://www.dis.anl.gov/projects/rfid.html 6
Initial Findings Improved Inspection Efficiency Continuous and secure real-time data could lower number of required inspections. Lower time needed in-facility. Increased Analytical Efficiency Analysts: Improved access to facility data, NM location, etc. Expedited processing Improved Systems Security Trigger things to turn on and off in response to an event. Automated alerts if seals/sensors/cameras detect an anomaly. 7
Technical Readiness Levels Today TRL 1-2: Basic principles observed and tools being developed for simulation and analysis Focus on safeguards Research flexibility Supports immediate need Planned Next Steps Proof of Concept verification Begin applied Arms Control Verification research once safeguards concepts are demonstrated in a prototype environment Photo: IAEA http://www.iaea.org/technicalcooperation/mulitmedia/pod casts-radio/ 8
Areas Examined: Arms Control Verification Information Age Paradigm Shift Data Creation & Security Near-term Applications Chain of Custody Monitoring Fission Product Tagging Behavior Monitoring Future Treaties Cells-based Approach Identity Verification Systems Remote Control of Distant Objects Photo: U.S. Embassy Beijing - Department of State http://iipdigital.usembassy.gov/st/english/inbrief/2013/09/20130919283 179.html#axzz2n6JmiYov 9
Challenges Data Issues Security: Data integrity throughout the monitoring, converting, reporting, and storage processes Stovepipes: Surveillance systems, radiation detectors, barcode readers, electronic scales, applicationprogramming interface (API), time synchronization, and continuous data flows Big Data: What do we do with data? On-site/remote station/iaea HQ? Information Barriers Photo: PNNL Radiological Detection and Nuclear Sciences Group http://www.technet.pnnl.gov/sensors/nuclear/projects/es4infobar.stm Protect proprietary/sensitive info Compartmentalization 10
Conclusions: A New Age Paradigm Shift Inspection-based vs. Information Driven Connecting Cyber & Physical Transitional Period Technology is outpacing policy Tremendous opportunities Questions Remain Can the IOT concept be applied to other nonproliferation and arms control problem spaces? Photo: PNNL 11