Security assessments support decision-makers' ability to evaluate current capabilities of high consequence facilities (HCF) to respond to possible attacks. However, increasing complexity of today's operational environment requires a critical review of traditional approaches to ensure that implemented assessments are providing relevant and timely insights into security of HCFs. Using interviews and focus groups with diverse subject matter experts (SMEs), this study evaluated the current state of security assessments and identified opportunities to achieve a more "ideal" state. The SME-based data underscored the value of a systems approach for understanding the impacts of changing operational designs and contexts (as well as cultural influences) on security to address methodological shortcomings of traditional assessment processes. These findings can be used to inform the development of new approaches to HCF security assessments that are able to more accurately reflect changing operational environments and effectively mitigate concerns arising from new adversary capabilities.
This article presents a global prioritization methodology that evaluates the relative risks of non-state actor acquisition of materials that could be used in chemical, biological, radiological, nuclear and high explosive Weapons of Mass Destruction (WMD) from the country’s relevant infrastructure. Prioritization is based on three domains: 1. Assessing relative scale of materials in each country, 2. The country’s corresponding security posture, and 3. The presence of threat actors. The output is a list of countries prioritized from greatest risk to least. Rather than providing an overall 1 to N ranking, however, the results are placed into tiers based upon their natural groupings within the three domains. The countries in the highest tiers are flagged as potential US national security concern; those scoring in the middle and at the bottom are flagged as posing lower US national security concern. A systematic approach assesses each country by leveraging many disciplines, such as risk and decision analysis, as well as expert judgement. A quantitative value model based on Multi-Attribute Value Theory (MAVT) organizes the objectives scoring criteria into a value tree using lessons learned from previous studies, published literature, and expert judgement. The article presents the prioritization categories and corresponding value model scoring criteria to include measurement type, weight, range, and value preference. Country names and data are notional in order to share the details on the underlying methodology and model without identification of actual security risks. A deliberative process addresses factors external to the model and scrutinizes inputs, methodology, model, and results.
China is endeavoring to build nuclear power plants (NPPs) in numerous countries around the globe - an initiative that has the potential to strengthen Chinas political and economic influences on those countries. This study provides an overview of the situation and considers the issues involved in such partnerships with China. In order to assess Chinas ability to follow through with its agreements, this study also presents a technical review of its NPP production capability.
Protecting high consequence facilities (HCF) from malicious attacks is challenged by today’s increasingly complex, multi-faceted, and interdependent operational environments and threat domains. Building on current approaches, insights from complex systems and network science can better incorporate multidomain interactions observed in HCF security operations. These observations and qualitative HCF security expert data support invoking a multilayer modeling approach for HCF security to shift from a “reactive” to a “proactive” paradigm that better explores HCF security dynamics and resilience not captured in traditional approaches. After exploring these multi-domain interactions, this paper introduces how systems theory and network science insights can be leveraged to describe HCF security as complex, interdependent multilayer directed networks. A hypothetical example then demonstrates the utility of such an approach, followed by a discussion on key insights and implications of incorporating multilayer network analytical performance measures into HCF security.
To date, chemical security education practices in postsecondary institutions are poorly understood. The purpose of this study is to provide an initial understanding of the practices, attitudes, and barriers toward chemical security education for undergraduate and graduate programs in the United States (US) by surveying representatives of American Chemical Society (ACS)-approved programs. All programs with ACS-approved undergraduate chemistry programs (n = 691) were contacted for participation: 21% (n = 148) fully completed and 6% (n = 41) partially completed the survey for a combined total of 27% complete and/or partially complete surveys (n = 189). We observed that most programs currently teach chemical safety (undergraduate >99%, graduate 73%); however, only about one-third of programs teach chemical security at any education level (undergraduate 32%, graduate 34%). We also observed that safety education is provided more frequently than security education. Further, ACS-approved programs reported that their chemical safety culture was stronger than chemical security culture and felt that safety should be taught differently than security. The overwhelming majority of respondents (96%) indicated that chemical safety should be mandatory at some level, while only about half of respondents (57%) indicated that chemical security should be mandatory at some level. More efforts are needed by the chemistry community to raise awareness of the importance of chemical security education so that more institutions commit to training their faculty and students on the topic. The authors suggest that adoption of chemical security education could be increased if ACS were to advocate for chemical security by including it in its guidelines for educational program approval.
This report summarizes the work performed as part of a Laboratory Directed Research and Development project focused on evaluating and mitigating risk associated with biological dual use research of concern. The academic and scientific community has identified the funding stage as the appropriate place to intervene and mitigate risk, so the framework developed here uses a portfolio-level approach and balances biosafety and biosecurity risks, anticipated project benefits, and available mitigations to identify the best available investment strategies subject to cost constraints. The modeling toolkit was designed for decision analysis for dual use research of concern, but is flexible enough to support a wide variety of portfolio-level funding decisions where risk/benefit tradeoffs are involved. Two mathematical optimization models with two solution methods are included to accommodate stakeholders with varying levels of certainty about priorities between metrics. An example case study is presented.
Rinderpest is a virus that can affect cattle and other even toes ungulates; evidence of outbreaks from over 10,000 years ago highlights the potential impact of this virus. During the 18th century, Rinderpest caused huge losses in cattle throughout Europe. Starting in the mid 1900’s vaccination efforts seemed feasible and work was initiated to vaccinate large populations of cattle. Walter Plowright received numerous awards for updating the Rinderpest vaccine which many believed would be the key to eradication. Vaccination of the disease lead to a massive drop in outbreaks and the last confirmed case of Rinderpest in Asia was in 2000 and in Africa in 2001.1 At this point, Rinderpest has been declared eradicated from nature. However, stocks of the virus are still in many laboratories.2 Rinderpest was investigated as a biological weapon agent during the Second World War. However, following WWII, rinderpest was not considered a high risk as a biological weapon as there was no direct military advantage. Now, with the concern of the use of biological agents as weapons in acts of terrorism, concern regarding rinderpest has resurfaced. Since the eradication of this virus, cattle populations are highly susceptibility to the virus and the economic impacts would be significant. This paper will discuss the specific nature of the terrorism risks associated with rinderpest; and based upon those risks provide recommendations regarding biosecurity management. The biosecurity management measures will be defined in a manner to align with the CWA 15793: the laboratory biorisk management document.
Laboratories that work with biological agents need to manage their safety risks to persons working the laboratories and the human and animal community in the surrounding areas. Biosafety guidance defines a wide variety of biosafety risk mitigation measures, which include measures which fall under the following categories: engineering controls, procedural and administrative controls, and the use of personal protective equipment; the determination of which mitigation measures should be used to address the specific laboratory risks are dependent upon a risk assessment. Ideally, a risk assessment should be conducted in a manner which is standardized and systematic which allows it to be repeatable and comparable. A risk assessment should clearly define the risk being assessed and avoid over complication.
Wireless networking can provide a cost effective and convenient method for installing and operating an unattended or remote monitoring system in an established facility. There is concern, however, that wireless devices can interfere with each other and with other radio systems within the facility. Additionally, there is concern that these devices add a potential risk to the security of the network. Since all data is transmitted in the air, it is possible for an unauthorized user to intercept the data transmissions and/or insert data onto the network if proper security is not in place. This paper describes a study being undertaken to highlight the benefits of wireless networking, evaluate interference and methods for mitigation, recommend security architectures, and present the results of a wireless network demonstration between Sandia National Laboratories (SNL) and the Joint Research Centre (JRC).
Wireless networking using the IEEE 802.11standards is a viable alternative for data communications in safeguards applications. This paper discusses the range of 802.11-based networking applications, along with their advantages and disadvantages. For maximum performance, safety, and security, Wireless networking should be implemented only after a comprehensive site survey has determined detailed requirements, hazards, and threats.