927 research outputs found

    A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes

    Get PDF
    Insider threats are perhaps the most serious challenges that nuclear security systems face. All of the cases of theft of nuclear materials where the circumstances of the theft are known were perpetrated either by insiders or with the help of insiders; given that the other cases involve bulk material stolen covertly without anyone being aware the material was missing, there is every reason to believe that they were perpetrated by insiders as well. Similarly, disgruntled workers from inside nuclear facilities have perpetrated many of the known incidents of nuclear sabotage. The most recent example of which we are aware is the apparent insider sabotage of a diesel generator at the San Onofre nuclear plant in the United States in 2012; the most spectacular was an incident three decades ago in which an insider placed explosives directly on the steel pressure vessel head of a nuclear reactor and then detonated them.While many such incidents, including the two just mentioned, appear to have been intended to send a message to management, not to spread radioactivity, they highlight the immense dangers that could arise from insiders with more malevolent intent. As it turns out, insiders perpetrate a large fraction of thefts from heavily guarded non-nuclear facilities as well. Yet organizations often find it difficult to understandand protect against insider threats. Why is this the case?Part of the answer is that there are deep organizational and cognitive biases that lead managers to downplay the threats insiders pose to their nuclear facilities and operations. But another part of the answer is that those managing nuclear security often have limited information about incidents that have happened in other countries or in other industries, and the lessons that might be learned from them.The IAEA and the World Institute for Nuclear Security (WINS) produce"best practices" guides as a way of disseminating ideas and procedures that have been identified as leading to improved security. Both have produced guides on protecting against insider threats.5 But sometimes mistakes are even moreinstructive than successes.Here, we are presenting a kind of "worst practices" guide of serious mistakes made in the past regarding insider threats. While each situation is unique, and serious insider problems are relatively rare, the incidents we describe reflect issues that exist in many contexts and that every nuclear security manager should consider. Common organizational practices -- such as prioritizing production over security, failure to share information across subunits, inadequate rules or inappropriate waiving of rules, exaggerated faith in group loyalty, and excessive focus on external threats -- can be seen in many past failures to protect against insider threats

    Securing the Bomb: An Agenda for Action

    Get PDF
    Grades current efforts to prevent nuclear terrorism and recommends new actions to more effectively keep nuclear weapons and materials out of terrorist hands

    Guardians at the Gates of Hell : estimating the risk of nuclear theft and terrorism -- and identifying the highest-priority risks of nuclear theft

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology, Management, and Policy Program, 2007.Includes bibliographical references (p. 419-466).Methods are presented to assess the global risk of nuclear theft and nuclear terrorism, to identify the nuclear facilities and transport legs that pose the highest-priority risks of nuclear theft, and to evaluate policy approaches to strengthening security and accounting for nuclear stockpiles worldwide. First, a qualitative assessment outlines the demand for black-market nuclear weapons and materials; the plausibility of terrorist construction of an improvised nuclear device; the global stocks and flows of nuclear weapons, plutonium, and highly enriched uranium (HEU), with the global distribution of facilities where they exist; and the widely varying standards of physical protection, control, and accounting in place to prevent theft. Particular dangers of nuclear theft in Russia, Pakistan, and from HEU-fueled research reactors are highlighted. Second, a mathematical model of the global risk of nuclear terrorism is presented, with detailed assessments of what is known about the values of each of the parameters, and of policies that could change each of the parameters to reduce risk.(cont.) Third, a methodology for identifying the nuclear facilities and transport legs posing the highest risks of nuclear terrorism is presented, combining the security levels for each facility or transport leg, the levels of threat they face, and the quantity and quality of nuclear weapons or weapons-usable material they contain. Fourth, the global nuclear security system is described and assessed as a complex, large-scale, integrated, open system (CLIOS). Based on past experiences with different policy tools from negotiated international standards to on-the-ground technical cooperation to install improved security equipment, options to improve system performance in reducing the risk of nuclear terrorism are assessed. A final chapter offers conclusions and recommendations.by Matthew Bunn.Ph.D
    • …
    corecore