摘要 :
POST is a subroutine which a safeguards analyst may use to find multiple-target sabotage paths through a fixed-site facility. This subroutine accepts the same weighted digraph facility model as does ADPATH, the single-target adver...
展开
POST is a subroutine which a safeguards analyst may use to find multiple-target sabotage paths through a fixed-site facility. This subroutine accepts the same weighted digraph facility model as does ADPATH, the single-target adversary path code. Given a list of potential starting nodes and a list of one set of target nodes together with their respective guard-response times, POST computes an adversary's minimum interruption probability path. This path begins at one of the starting nodes and passes through all of the given target nodes in such a way as to minimize the adversary's probability of being detected while the guards still have time to respond to an alarm and interrupt the sabotage.
收起
摘要 :
Evaluation of security systems effectiveness requires a definition of adversary capabilities,but an objective basis for such a definition has been lacking. A system of adversary attributes is proposed in which any desired adversar...
展开
Evaluation of security systems effectiveness requires a definition of adversary capabilities,but an objective basis for such a definition has been lacking. A system of adversary attributes is proposed in which any desired adversary may be synthesized by selection of the appropriate level of capability from each attribute or category. In use,the synthesized adversaries will be pitted against a security system in an evaluation model,thus allowing comparison of other adversary or security system configurations. (ERA citation 01:022945)
收起
摘要 :
There has been much discussion and public debate concerning the effectiveness of the national system of safeguards against malevolent acts involving nuclear materials. Useful dialogue on this subject has been hampered by the lack ...
展开
There has been much discussion and public debate concerning the effectiveness of the national system of safeguards against malevolent acts involving nuclear materials. Useful dialogue on this subject has been hampered by the lack of well-defined objectives,system parameters and boundary conditions as a framework for communication. This study provides such a framework. Expressing the safeguards objective in terms of societal risk represents a change in focus,rather than intent,from the earlier view of safeguards as a system for protecting nuclear material against theft or diversion. The study defines both the safeguards problem and the safeguards system in terms that can be related to the general safeguards objective. It is axiomatic that the first step to an effective solution is a careful definition of the problem. The significant and immediate value of this study lies in the rigorous definition and systematic organization of recognized elements into a coherent and comprehensive pattern. Although the title specifically addresses design and evaluation,the framework provided by the study will be a useful management tool for safeguards implementation and administration as well.
收起
摘要 :
A technical review is presented of experiment activities and state of knowledge on air-borne, radiation source terms resulting from explosive sabotage attacks on spent reactor fuel subassemblies in shielded casks. Current assumpti...
展开
A technical review is presented of experiment activities and state of knowledge on air-borne, radiation source terms resulting from explosive sabotage attacks on spent reactor fuel subassemblies in shielded casks. Current assumptions about the behavior of irradiated fuel are largely based on a limited number of experimental results involving unirradiated, depleted uranium dioxide surrogate fuel. The behavior of irradiated nuclear fuel subjected to explosive conditions could be different from the behavior of the surrogate fuel, depending on the assumptions made by the evaluator. Available data indicate that these potential differences could result in errors, and possible orders-of-magnitude overestimates of aerosol dispersion and potential health effects from sabotage attacks. Furthermore, it is suggested that the current assumptions used in arriving at existing regulations for the transportation and storage of spent fuel in the U.S. are overly conservative. This, in turn, has led to potentially higher-than-needed operating expenses for those activities. A confirmatory experimental program is needed to develop a realistic correlation between source terms of irradiated fuel and unirradiated fuel. The motivations for performing the confirmatory experimental program are also presented.
收起
摘要 :
Left-wing extremism is 'alive and well' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several...
展开
Left-wing extremism is 'alive and well' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.
收起
摘要 :
Left-wing extremism is 'alive and well' both in the US and internationally.Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several ...
展开
Left-wing extremism is 'alive and well' both in the US and internationally.Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.
收起
摘要 :
The purpose of this research was to determine the effectiveness of sabotage as a means of unconventional warfare by historically analyzing previous conflicts to determine the role and impact sabotage played. In order to accomplish...
展开
The purpose of this research was to determine the effectiveness of sabotage as a means of unconventional warfare by historically analyzing previous conflicts to determine the role and impact sabotage played. In order to accomplish this research, answers to the following questions had to be found: 1) What is the definition of sabotage. 2) What is the definition of unconventional warfare. 3) What form has sabotage taken previously (e.g., bombings, tamperings). 4) What were the targets in previous acts of sabotage (e.g., power stations, transportation, communications facilities). 5) How much did forces rely on sabotage (i.e., was sabotage their main instrument of force, used seldomly, etc.). 6) Is there a correlation between the type of force committing the sabotage, the manner in which sabotage was attempted, and the target picked. 7) How reliable were the acts of sabotage (e.g., the number of successful acts of sabotage compared to the total number attempted). 8) How effective were any countermeasures encountered by saboteurs in preventing the sabotage. What remained was to determine its effectiveness based on its usage in history.
收起
摘要 :
ADPATH is a subroutine which safeguards analysts can use to find adversary paths in fixed-site facility safeguard studies. It was developed primarily to become a pathfinding module in SAFE, the Safeguards Automated Facility Evalua...
展开
ADPATH is a subroutine which safeguards analysts can use to find adversary paths in fixed-site facility safeguard studies. It was developed primarily to become a pathfinding module in SAFE, the Safeguards Automated Facility Evaluation process. The subroutine accepts a weighted digraph as a model of the facility and its safeguards system. Given a list of sabotage and/or theft targets and appropriate guard-response times, ADPATH calculates an adversary's minimum interruption probability path for each target. These are paths that minimize the adversary's probability of being detected while the guards still have time to respond to an alarm and interrupt the theft or sabotage.
收起
摘要 :
This multinational, multi-phase spent fuel sabotage test program is quantifying the aerosol particles produced when the products of a high energy density device (HEDD) interact with and explosively particulate test rodlets that co...
展开
This multinational, multi-phase spent fuel sabotage test program is quantifying the aerosol particles produced when the products of a high energy density device (HEDD) interact with and explosively particulate test rodlets that contain pellets of either surrogate materials or actual spent fuel. This program has been underway for several years. This program provides source-term data that are relevant to some sabotage scenarios in relation to spent fuel transport and storage casks, and associated risk assessments. This document focuses on an updated description of the test program and test components for all work and plans made, or revised, primarily during FY 2005 and about the first two-thirds of FY 2006. It also serves as a program status report as of the end of May 2006. We provide details on the significant findings on aerosol results and observations from the recently completed Phase 2 surrogate material tests using cerium oxide ceramic pellets in test rodlets plus non-radioactive fission product dopants. Results include: respirable fractions produced; amounts, nuclide content, and produced particle size distributions and morphology; status on determination of the spent fuel ratio, SFR (the ratio of respirable particles from real spent fuel/respirables from surrogate spent fuel, measured under closely matched test conditions, in a contained test chamber); and, measurements of enhanced volatile fission product species sorption onto respirable particles. We discuss progress and results for the first three, recently performed Phase 3 tests using depleted uranium oxide, DUO(sub 2), test rodlets. We will also review the status of preparations and the final Phase 4 tests in this program, using short rodlets containing actual spent fuel from U.S. PWR reactors, with both high- and lower-burnup fuel. These data plus testing results and design are tailored to support and guide, follow-on computer modeling of aerosol dispersal hazards and radiological consequence assessments. This spent fuel sabotage--aerosol test program, performed primarily at Sandia National Laboratories, with support provided by both the U.S. Department of Energy and the Nuclear Regulatory Commission, had significant inputs from, and is strongly supported and coordinated by both the U.S. and international program participants in Germany, France, and the U.K., as part of the international Working Group for Sabotage Concerns of Transport and Storage Casks, WGSTSC.
收起
摘要 :
The review and analysis of the Trusted Software Methodology (TSM) by a panel of experts in various areas of computer science, computer security, and engineering are reported. The approach to the conduct of the review is described,...
展开
The review and analysis of the Trusted Software Methodology (TSM) by a panel of experts in various areas of computer science, computer security, and engineering are reported. The approach to the conduct of the review is described, and a brief introduction to the TSM is provided. The findings from the review fall into three categories: achievements, desirable additions, and changes. In addition, several recommendations are made with respect to application of the TSM within the purview of the Ballistic Missile Defense Organization.
收起