Vulnerability of nuclear plants to attack

On September 9, 1980, Daniel Berrigan (above), his brother Philip, and six others (the "Plowshares Eight") began the Plowshares Movement. They illegally trespassed onto the General Electric Nuclear Missile facility in King of Prussia, Pennsylvania, where they damaged nuclear warhead nose cones and poured blood onto documents and files. They were arrested and charged with over ten different felony and misdemeanor counts.[1]

The vulnerability of nuclear plants to deliberate attack is of concern in the area of nuclear safety and security. Nuclear power plants, civilian research reactors, certain naval fuel facilities, uranium enrichment plants, fuel fabrication plants, and even potentially uranium mines are vulnerable to attacks which could lead to widespread radioactive contamination. The attack threat is of several general types: commando-like ground-based attacks on equipment which if disabled could lead to a reactor core meltdown or widespread dispersal of radioactivity; and external attacks such as an aircraft crash into a reactor complex, or cyber attacks.[2]

The United States 9/11 Commission has said that nuclear power plants were potential targets originally considered for the September 11, 2001 attacks. If terrorist groups could sufficiently damage safety systems to cause a core meltdown at a nuclear power plant, and/or sufficiently damage spent fuel pools, such an attack could lead to widespread radioactive contamination. The Federation of American Scientists have said that if nuclear power use is to expand significantly, nuclear facilities will have to be made extremely safe from attacks that could release massive quantities of radioactivity into the community. New reactor designs have features of passive nuclear safety, which may help. In the United States, the NRC carries out "Force on Force" exercises at all nuclear power plant sites at least once every three years.[2]

Nuclear reactors become preferred targets during military conflict and, over the past three decades, have been repeatedly attacked during military air strikes, occupations, invasions and campaigns.[3] Various acts of civil disobedience since 1980 by the peace group Plowshares have shown how nuclear weapons facilities can be penetrated, and the group's actions represent extraordinary breaches of security at nuclear weapons plants in the United States. The National Nuclear Security Administration has acknowledged the seriousness of the 2012 Plowshares action. Non-proliferation policy experts have questioned "the use of private contractors to provide security at facilities that manufacture and store the government's most dangerous military material".[4] Nuclear weapons materials on the black market are a global concern,[5][6] and there is concern about the possible detonation of a dirty bomb by a militant group in a major city.[7][8]

The number and sophistication of cyber attacks is on the rise. Stuxnet is a computer worm discovered in June 2010 that is believed to have been created by the United States and Israel to attack Iran's nuclear facilities. It switched off safety devices, causing centrifuges to spin out of control.[9] The computers of South Korea's nuclear plant operator (KHNP) were hacked in December 2014. The cyber attacks involved thousands of phishing emails containing malicious code, and information was stolen.[10]

Attacks on nuclear power plants

Terrorists could target nuclear power plants in an attempt to release radioactive contamination into the community. The United States 9/11 Commission has said that nuclear power plants were potential targets originally considered for the September 11, 2001 attacks. If terrorist groups could sufficiently damage safety systems to cause a core meltdown at a nuclear power plant, and/or sufficiently damage spent fuel pools, such an attack could lead to a widespread radioactive contamination. According to a 2004 report by the U.S. Congressional Budget Office, "The human, environmental, and economic costs from a successful attack on a nuclear power plant that results in the release of substantial quantities of radioactive material to the environment could be great."[11] An attack on a reactor’s spent fuel pool could also be serious, as these pools are less protected than the reactor core. The release of radioactivity could lead to thousands of near-term deaths and greater numbers of long-term fatalities.[2]

If nuclear power use is to expand significantly, nuclear facilities will have to be made extremely safe from attacks that could release massive quantities of radioactivity into the community. New reactor designs have features of passive safety, such as the flooding of the reactor core without active intervention by reactor operators. But these safety measures have generally been developed and studied with respect to accidents, not to the deliberate reactor attack by a terrorist group. However, the US Nuclear Regulatory Commission does now also require new reactor license applications to consider security during the design stage.[2]

In the United States, the NRC carries out "Force on Force" (FOF) exercises at all Nuclear Power Plant (NPP) sites at least once every three years. The FOF exercise, which is typically conducted over 3 weeks, "includes both tabletop drills and exercises that simulate combat between a mock adversary force and the licensee’s security force. At an NPP, the adversary force attempts to reach and simulate damage to key safety systems and components, defined as "target sets" that protect the reactor’s core or the spent fuel pool, which could potentially cause a radioactive release to the environment. The licensee’s security force, in turn, interposes itself to prevent the adversaries from reaching target sets and thus causing such a release".[2]

In the U.S., plants are surrounded by a double row of tall fences which are electronically monitored. The plant grounds are patrolled by a sizeable force of armed guards.[12]

Military attacks

Nuclear reactors become preferred targets during military conflict and, over the past three decades, have been repeatedly attacked during military air strikes, occupations, invasions and campaigns:[3]

After several incidents in Pakistan in which terrorists attacked three of its military nuclear facilities, it became clear that there emerged a serious danger that they would gain access to the country’s nuclear arsenal, according to a journal published by the US Military Academy at West Point.[14] In January 2010, it was revealed that the US army was training a specialised unit "to seal off and snatch back" Pakistani nuclear weapons in the event that militants would obtain a nuclear device or materials that could make one. Pakistan supposedly possesses about 80 nuclear warheads. US officials refused to speak on the record about the American safety plans.[15]

Nuclear terrorism

Main article: Nuclear terrorism

Amory Lovins says that the United States has for decades been running on energy that is "brittle" (easily shattered by accident or malice) and that this poses a grave and growing threat to national security, life, and liberty.[16] Lovins' claims that these vulnerabilities are increasingly being exploited. His book Brittle Power documents many significant assaults on energy facilities, other than during a war, in forty countries and within the United States, in some twenty-four states.[17]

Lovins further claims that in 1966, twenty natural uranium fuel rods were stolen from the Bradwell nuclear power station in England, and in 1971, five more were stolen at the Wylfa Nuclear Power Station. In 1971, an intruder wounded a night watchman at the Vermont Yankee reactor in the USA. The New York University reactor building was broken into in 1972, as was the Oconee Nuclear Station's fuel storage building in 1973. In 1975, the Kerr McGee plutonium plant had thousands of dollars worth of platinum stolen and taken home by workers. In 1975, at the Biblis Nuclear Power Plant in Germany, a Member of Parliament demonstrated the lack of security by carrying a bazooka into the plant under his coat.[18]

Nuclear plants were designed to withstand earthquakes, hurricanes, and other extreme natural events. But deliberate attacks involving large airliners loaded with fuel, such as those that crashed into the World Trade Center and Pentagon, were not considered when design requirements for today's fleet of reactors were determined. It was in 1972 when three hijackers took control of a domestic passenger flight along the east coast of the U.S. and threatened to crash the plane into a U.S. nuclear weapons plant in Oak Ridge, Tennessee. The plane got as close as 8,000 feet above the site before the hijackers' demands were met.[19][20]

In February 1993, a man drove his car past a check point the Three Mile Island Nuclear plant, then broke through an entry gate. He eventually crashed the car through a secure door and entered the Unit 1 reactor turbine building. The intruder, who had a history of mental illness, hid in a building and was not apprehended for four hours. Stephanie Cooke asks: "What if he'd been a terrorist armed with a ticking bomb?"[21]

Fissile material may be stolen from nuclear plants and this may promote the spread of nuclear weapons. Many terrorist groups are eager to acquire the fissile material needed to make a crude nuclear device, or a dirty bomb. Nuclear weapons materials on the black market are a global concern,[5][6] and there is concern about the possible detonation of a small, crude nuclear weapon by a militant group in a major city, with significant loss of life and property.[7][8] It is feared that a terrorist group could detonate a radiological or "dirty bomb", composed of any radioactive source and a conventional explosive. The radioactive material is dispersed by the detonation of the explosive. Detonation of such a weapon is not as powerful as a nuclear blast, but can produce considerable radioactive fallout. Alternatively, a terrorist group may position some of its members, or sympathisers, within the plant to sabotage it from inside.[22]

The IAEA Illicit Nuclear Trafficking Database notes 1,266 incidents reported by 99 countries over the last 12 years, including 18 incidents involving HEU or plutonium trafficking:[23]

Sabotage by insiders

Insider sabotage regularly occurs, because insiders can observe and work around security measures. In a study of insider crimes, the authors repeatedly said that successful insider crimes depended on the perpetrators' observation and knowledge of security vulnerabilities. Since the atomic age began, the U.S. Department of Energy's nuclear laboratories have been known for widespread violations of security rules. During the Manhattan Project, physicist Richard Feynman was barred from entering certain nuclear facilities; he would crack safes and violate other rules as pranks to reveal deficiencies in security. A better understanding of the reality of the threat will help to overcome complacency and is critical to getting countries to take stronger preventive measures.[31]

A fire caused 5–10 million dollars worth of damage to New York's Indian Point Energy Center in 1971. The arsonist turned out to be a plant maintenance worker. Sabotage by workers has been reported at many other reactors in the United States: at Zion Nuclear Power Station (1974), Quad Cities Nuclear Generating Station, Peach Bottom Nuclear Generating Station, Fort St. Vrain Generating Station, Trojan Nuclear Power Plant (1974), Browns Ferry Nuclear Power Plant (1980), and Beaver Valley Nuclear Generating Station (1981). Many reactors overseas have also reported sabotage by workers. Suspected arson has occurred in the USA and overseas.[18]

On 8 January 1982, the 70th anniversary of the formation of the African National Congress, Umkhonto we Sizwe, the armed wing of the ANC attacked Koeberg Nuclear Power Station while it was still under construction.[32] Damage was estimated at R 500 million and the commissioning of the plant was put back by 18 months.[33] In 1998 a group of workers at one of Russia's largest nuclear weapons facilities attempted to steal 18.5 kilograms of HEU—enough for a bomb.[18]

Civil disobedience

Various acts of civil disobedience since 1980 by the peace group Plowshares have shown how nuclear weapons facilities can be penetrated, and the group's actions represent extraordinary breaches of security at nuclear weapons plants in the United States. On July 28, 2012, three members of Plowshares cut through fences at the Y-12 National Security Complex in Oak Ridge, Tennessee, which manufactures US nuclear weapons and stockpiles highly enriched uranium. The group spray-painted protest messages, hung banners, and splashed blood.[4]

The National Nuclear Security Administration has acknowledged the seriousness of the 2012 Plowshares action, which involved the protesters walking into a high-security zone of the plant, calling the security breach "unprecedented." Independent security contractor, WSI, has since had a weeklong "security stand-down," a halt to weapons production, and mandatory refresher training for all security staff.[4]

Non-proliferation policy experts are concerned about the relative ease with which these unarmed, unsophisticated protesters could cut through a fence and walk into the center of the facility. This is further evidence that nuclear security—the securing of highly enriched uranium and plutonium—should be a top priority to prevent terrorist groups from acquiring nuclear bomb-making material. These experts have questioned "the use of private contractors to provide security at facilities that manufacture and store the government's most dangerous military material".[4]

In 2010, there was a security breach at a Belgian air force base which possessed U.S. nuclear warheads. The incident involved six anti-nuclear activists entering Kleine Brogel Air Base. The activists stayed in the snow-covered base for about 20 minutes, before being arrested. A similar event occurred in 2009.[34]

On December 5, 2011, two anti-nuclear campaigners breached the perimeter of the Cruas Nuclear Power Plant, escaping detection for more than 14 hours, while posting videos of their sit-in on the internet.[35]

Cyber attacks

Stuxnet is a computer worm discovered in June 2010 that is believed to have been created by the United States and Israel to attack Iran's nuclear facilities.[9] It switched off safety devices, causing centrifuges to spin out of control. Stuxnet initially spreads via Microsoft Windows, and targets Siemens industrial control systems. While it is not the first time that hackers have targeted industrial systems,[36] it is the first discovered malware that spies on and subverts industrial systems,[37] and the first to include a programmable logic controller (PLC) rootkit.[38][39]

Different variants of Stuxnet targeted five Iranian organizations,[40] with the probable target widely suspected to be uranium enrichment infrastructure in Iran;[41][42] Symantec noted in August 2010 that 60% of the infected computers worldwide were in Iran.[43] Siemens stated that the worm has not caused any damage to its customers,[44] but the Iran nuclear program, which uses embargoed Siemens equipment procured secretly, has been damaged by Stuxnet.[45][46] Kaspersky Lab concluded that the sophisticated attack could only have been conducted "with nation-state support".[47]

Idaho National Laboratory ran the Aurora Experiment in 2007 to demonstrate how a cyber attack could destroy physical components of the electric grid.[48] The experiment used a computer program to rapidly open and close a diesel generator's circuit breakers out of phase from the rest of the grid and explode. This vulnerability is referred to as the Aurora Vulnerability.

The number and sophistication of cyber attacks is on the rise. The computers of South Korea's nuclear plant operator (KHNP) were hacked in December 2014. The cyber attacks involved thousands of phishing emails containing malicious code, and information was stolen.[10]

Population surrounding plants

Population density is one critical lens through which risks have to be assessed, says Laurent Stricker, a nuclear engineer and chairman of the World Association of Nuclear Operators:[49]

The KANUPP plant in Karachi, Pakistan, has the most people—8.2 million—living within 30 kilometres of a nuclear plants have populations larger than 3 million within that radius.[49] plant, although it has just one relatively small reactor with an output of 125 megawatts. Next in the league, however, are much larger plants—Taiwan's 1,933-megawatt Kuosheng plant with 5.5 million people within a 30-kilometre radius and the 1,208-megawatt Chin Shan plant with 4.7 million; both zones include the capital city of Taipei.[49]

172,000 people living within a 30 kilometre radius of the Fukushima Daiichi nuclear power plant, have been forced or advised to evacuate the area. More generally, a 2011 analysis by Nature and Columbia University, New York, shows that some 21 nuclear plants have populations larger than 1 million within a 30-km radius, and six plants have populations larger than 3 million within that radius.[49]

Implications

In his book, Normal accidents, Charles Perrow says that multiple and unexpected failures are built into society's complex and tightly-coupled nuclear reactor systems. Such accidents are unavoidable and cannot be designed around.[50]

In the 2003 book, Brittle Power, Amory Lovins talks about the need for a resilient, secure, energy system:

The foundation of a secure energy system is to need less energy in the first place, then to get it from sources that are inherently invulnerable because they're diverse, dispersed, renewable, and mainly local. They're secure not because they're American but because of their design. Any highly centralised energy system—pipelines, nuclear plants, refineries—invite devastating attack. But invulnerable alternatives don't, and can't, fail on a large scale.[51]

See also

Further reading

References

  1. Commonwealth v. Berrigan, 501 A.2d 226, 509 Pa. 118 (1985)
  2. 1 2 3 4 5 Charles D. Ferguson & Frank A. Settle (2012). "The Future of Nuclear Power in the United States" (PDF). Federation of American Scientists.
  3. 1 2 3 Benjamin K. Sovacool (2011). Contesting the Future of Nuclear Power: A Critical Global Assessment of Atomic Energy, World Scientific, p. 192.
  4. 1 2 3 4 Kennette Benedict (9 August 2012). "Civil disobedience". Bulletin of the Atomic Scientists.
  5. 1 2 Jay Davis. After A Nuclear 9/11 The Washington Post, March 25, 2008.
  6. 1 2 Brian Michael Jenkins. A Nuclear 9/11? CNN.com, September 11, 2008.
  7. 1 2 Orde Kittrie. Averting Catastrophe: Why the Nuclear Non-proliferation Treaty is Losing its Deterrence Capacity and How to Restore It May 22, 2007, p. 338.
  8. 1 2 Nicholas D. Kristof. A Nuclear 9/11 The New York Times, March 10, 2004.
  9. 1 2 "Legal Experts: Stuxnet Attack on Iran Was Illegal 'Act of Force'". Wired. 25 March 2013.
  10. 1 2 Penny Hitchin, "Cyber attacks on the nuclear industry", Nuclear Engineering International, 15 September 2015.
  11. "Congressional Budget Office Vulnerabilities from Attacks on Power Reactors and Spent Material".
  12. U.S. NRC: "Nuclear Security – Five Years After 9/11". Accessed 23 July 2007
  13. When Iran Bombed Iraq's Nuclear Reactor, Iraq's Osirak Destruction.
  14. Blakely, Rhys (August 11, 2009), "Terrorists 'have attacked Pakistan nuclear sites three times'", Times Online, London
  15. "Elite US troops ready to combat Pakistani nuclear hijacks", Times
  16. Brittle Power, Chapter 1, p. 1.
  17. Brittle Power, Chapter 1, p. 2.
  18. 1 2 3 Amory Lovins (2001). Brittle Power (PDF). pp. 145–146.
  19. Threat Assessment: U.S. Nuclear Plants Near Airports May Be at Risk of Airplane Attack (Link Defunct), Global Security Newswire, June 11, 2003.
  20. Newtan, Samuel Upton (2007). Nuclear War 1 and Other Major Nuclear Disasters of the 20th Century, AuthorHouse, p.146.
  21. Stephanie Cooke (March 19, 2011). "Nuclear power is on trial". CNN.
  22. Frank Barnaby (2007). "Consequences of a Nuclear Renaissance" (PDF). International Symposium.
  23. Bunn, Matthew. "Securing the Bomb 2010: Securing All Nuclear Materials in Four Years" (PDF). President and Fellows of Harvard College. Retrieved 28 January 2013.
  24. 1 2 Bunn, Matthew & Col-Gen. E.P. Maslin (2010). "All Stocks of Weapons-Usable Nuclear Materials Worldwide Must be Protected Against Global Terrorist Threats" (PDF). Belfer Center for Science and International Affairs, Harvard University. Retrieved July 26, 2012.
  25. Rhys Blakeley, "Terrorists 'have attacked Pakistan nuclear sites three times'," Times Online (August 11, 2009).
  26. http://www.pretorianews.co.za/?fSectionId=&fArticleId=vn20071109061218448C528585
  27. Washington Post, December 20, 2007, Op-Ed by Micah Zenko
  28. "Feds Hoped to Snag Bin Laden Nuke Expert in JFK Bomb Plot". Fox News. June 4, 2007.
  29. http://politics.guardian.co.uk/terrorism/story/0,,1947295,00.html
  30. "Ushering in the era of nuclear terrorism," by Patterson, Andrew J. MD, PhD, Critical Care Medicine, v. 35, p.953–954, 2007.
  31. Matthew Bunn and Scott Sagan (2014). "A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes". The American Academy of Arts & Sciences.
  32. "History of MK". African National Congress. Archived from the original on 4 April 2007. Retrieved 14 May 2007.
  33. Helen Bamford (11 March 2006). "Koeberg: SA's ill-starred nuclear power plant". Cape Argus. Retrieved 14 May 2007.
  34. Kevin Dougherty (February 6, 2010). "Belgian base breach sparks nuclear worries". Stars and Stripes.
  35. Tara Patel (December 16, 2011). "Breaches at N-plants heighten France's debate over reactors". Seattle Times.
  36. "Building a Cyber Secure Plant". Siemens. 30 September 2010. Retrieved 5 December 2010.
  37. Robert McMillan (16 September 2010). "Siemens: Stuxnet worm hit industrial systems". Computerworld. Retrieved 16 September 2010.
  38. "Last-minute paper: An indepth look into Stuxnet". Virus Bulletin.
  39. "Stuxnet worm hits Iran nuclear plant staff computers". BBC News. 26 September 2010.
  40. "Stuxnet Virus Targets and Spread Revealed". BBC News. 15 February 2011. Retrieved 17 February 2011.
  41. Steven Cherry; with Ralph Langner (13 October 2010). "How Stuxnet Is Rewriting the Cyberterrorism Playbook". IEEE Spectrum.
  42. Beaumont, Claudine (23 September 2010). "Stuxnet virus: worm 'could be aimed at high-profile Iranian targets'". London: The Daily Telegraph. Retrieved 28 September 2010.
  43. MacLean, William (24 September 2010). "UPDATE 2-Cyber attack appears to target Iran-tech firms". Reuters.
  44. ComputerWorld (14 September 2010). "Siemens: Stuxnet worm hit industrial systems". Computerworld. Retrieved 3 October 2010.
  45. "Iran Confirms Stuxnet Worm Halted Centrifuges". CBS News. 29 November 2010.
  46. Ethan Bronner & William J. Broad (29 September 2010). "In a Computer Worm, a Possible Biblical Clue". NYTimes. Retrieved 2 October 2010."Software smart bomb fired at Iranian nuclear plant: Experts". Economictimes.indiatimes.com. 24 September 2010. Retrieved 28 September 2010.
  47. "Kaspersky Lab provides its insights on Stuxnet worm". Kaspersky. Russia. 24 September 2010.
  48. "Mouse click could plunge city into darkness, experts say", CNN, September 27, 2007. Source: http://www.cnn.com/2007/US/09/27/power.at.risk/index.html
  49. 1 2 3 4 Declan Butler (21 April 2011). "Reactors, residents and risk". Nature.
  50. Daniel E Whitney (2003). "Normal Accidents by Charles Perrow" (PDF). Massachusetts Institute of Technology.
  51. Amory B. Lovins and L. Hunter Lovins. "Terrorism and Brittle Technology" in Technology and the Future by Albert H. Teich, Ninth edition, Thomson, 2003, p. 169.
This article is issued from Wikipedia - version of the 11/20/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.