Skip to main content

Currently Skimming:

3 Physical Security at Civilian Nuclear Facilities
Pages 59-70

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 59...
... evaluate the physical protection system to assess whether it meets the performance requirements.  The most difficult adversaries to address using the physical protection system are terrorists, but activists and demonstrators are also difficult because of the ambiguity of their actions and intentions.
From page 60...
... In addition, India is a party to the Convention on the Physical Protection of Nuclear Material and its 2005 amendments.2 The major concern about nuclear material primarily derives from the fact that it can be used to make nuclear explosive devices, which can be highly catastrophic. Nuclear sabotage, a major concern for nuclear facilities like nuclear power plants, can also be catastrophic.
From page 61...
... 4 Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5)
From page 62...
... . India has a national DBT for the design of physical protection systems for all civilian nuclear power applications and civilian nuclear facilities.
From page 63...
... Depending on the requirements, the local police and some of the national response forces also may be called upon. Kumar noted that most of the technologies that are deployed in Indian nuclear installations for nuclear material security, as well as for nuclear facility security, are developed in-house by either the Bhabha Atomic Research Centre (BARC)
From page 64...
... Air Foorce began usiing a tool from f Lawrencee Livermore National Laboraatory called SE EES, which sim mulated fo orce-on-force exercises. e The tool evolved iinto Joint Techhnical Simulatiion (JTS)
From page 65...
... Finally, Sandia needed to develop a program that would support its own physical facilities, including one that stored Category I nuclear material. Sandia no longer stores Category I material and that facility is now a kind of museum and training ground to teach physical security.
From page 66...
... Constructive simulation utilizes computer models of the facility, the environment, and the protective force and adversaries to evaluate security. The first set of tools is called human-in-the-loop: real people behind computer screens control the behaviors of entities within a simulation; people playing adversaries and people playing defense forces.
From page 67...
... For example, STAGE can simulate the adversary force based on artificial intelligence and have actual guards from the facility control protective force in an interactive simulation for training. With STAGE, a user can simulate each piece of the physical protection system, examining the sensitivity of the system's performance to the performance or that component (a sensor)
From page 68...
... Other participants noted that artificial intelligence has been applied to image analysis or visual analytics, and there are tricks to mitigate complacency, such as having the software intentionally display false alarms, showing an image of a threat object that is not there, as a way of maintaining a certain level of attention. Participants asked how physical security systems distinguish different kinds of threats and interlocutors.
From page 69...
... For thermal cameras, this has been the practice and India is now developing such cameras in Mumbai. The protective force for civilian nuclear facilities is the CISF, which is a paramilitary force deployed for protection of several kinds of industrial facilities, including airports.
From page 70...
... Kumar explained that CISF is part of the response force, so those forces are part of the analysis, and the CISF organization (as distinguished from the guards) is involved in audits and any regulatory review process, including analysis of the DBT.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.