WorldWideScience

Sample records for spanning nuclear threats

  1. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats

    International Nuclear Information System (INIS)

    Nelson, K.; Sokkappa, P.

    2008-01-01

    This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the

  2. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  3. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  4. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  5. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  6. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  7. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  8. Truck bomb and insider threats to nuclear facilities

    International Nuclear Information System (INIS)

    Hirsch, D.

    1987-01-01

    In the nuclear field, two the these weak links in the security chain are the truck bomb threat and the insider threat. The risks associated with terrorist use of vehicular bombs against nuclear targets surfaced (actually, resurfaced) followed the terrorist attacks on the US Embassy annex and the Marine compound in Leb Concern was expressed that similar attacks against nuclear facilities could result in substantial damage and release of radioactivity. Since the current regulations of the NRC require licensees to protect only against attacks on foot (and even then, only against very small attacking forces), shortly after the Lebanon bombings, that agency commenced an urgent rulemaking to require its licensees to protect against truck bombs. Inexplicably, that rulemaking was called off after research results indicated that the truck bomb threat to nuclear facilities was even more serious than previously thought. Even were nuclear facilities adequately protected against external attack, be the aim theft or sabotage, the greatest security risk to these sites - the threat of action by insiders - would remain. The traditional methods of protecting against the insider threat - such as the two-person rule, strict compartmentalization of vital areas, and design features that make damage to two or more redundant systems by one individual difficult - are generally expensive and have encountered substantial resistance from the nuclear industry, which has restrained the NRC from requiring them

  9. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Abbott, Shannon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, and proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.

  10. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  11. Living in the Nuclear Age: Families and the threat of nuclear war

    International Nuclear Information System (INIS)

    Demorest, D.M.

    1991-01-01

    The main interest of this research was to add to the body of knowledge about the possible psychological impact of the nuclear threat on the family unit. Data were utilized from the Family Interaction, Stress and Nuclear War study conducted by Jules Riskin, M.D. and Victoria Dickerson, Ph.D. at the Mental Research Institute in Palo Alto, California. The sample consisted of ten families who were recruited for this study. In order to examine family-interaction variables and the impact of the threat of nuclear war, a standardized semi-structured family interview was conducted. Topics ranged from ordinary activities to external, non-nuclear stresses such as landslides or hurricanes, to the topic of nuclear war. A distinction is drawn between a family's level of nuclear concern while they discuss nuclear issues and a family's level of nuclear concern when viewed in the context of their overall pattern of family communication. In terms of family coping, family nuclear concern was found to be significantly related to two family-coping strategies. Families who utilized the coping strategies of seeking spiritual support and mobilizing the family to acquire and accept help were significantly less concerned about the threat of nuclear war

  12. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  13. Current nuclear threats and possible responses

    Science.gov (United States)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  14. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  15. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  16. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  17. Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David; Nuclear Threats and Security Challenges

    2015-01-01

    With the dissolution of the Soviet Union the nuclear threats facing the world are constantly evolving and have grown more complex since the end of the Cold War. The diversion of complete weapon systems or nuclear material to rogue nations and terrorist organizations has increased. The events of the past years have proved the necessity to reevaluate these threats on a level never before considered.  In recognition that no single country possesses all of the answers to the critical scientific, institutional and legal questions associated with combating nuclear and radiological terrorism, the NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” and this proceeding was structured to promote wide-ranging, multi-national exploration of critical technology needs and underlying scientific challenges to reducing the threat of nuclear/radiological terrorism; to illustrate through country-specific presentations how resulting technologies were used in national programs; and to outli...

  18. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  19. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  20. Society for Promotion of Peaceful Applications of Nuclear in Kenya (SPANS)

    International Nuclear Information System (INIS)

    2006-01-01

    The seminar was organized by the National Council for Science and Technology in collaboration with International Atomic Energy Agency (IAEA) to achieve the following objectives; create public awareness on Peaceful use of Nuclear Science and Technology discuss and adopt the draft constitution for the Society for the Promotion of Nuclear Science in Kenya SPANS (K). The National Council for Science and Technology identified highly qualified resource persons who are competent enough in the area of nuclear applications who prepared relevant topics based on their knowledge and experiences in the field of nuclear science. The presentations covered topics of nuclear applications in the areas of agriculture, health, pollution and a draft of SPANS Constitution. The Council is in the process of compiling and publishing the proceedings whose details will be submitted later to INIS once it is ready

  1. Raising consciousness about the nuclear threat through music

    Energy Technology Data Exchange (ETDEWEB)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  2. Legality of the threat or use of nuclear weapons

    International Nuclear Information System (INIS)

    Chang Yenchiang

    2009-01-01

    This paper examines international treaties in relation to the threat or use of nuclear weapons including the 1968 Nuclear Non-Proliferation Treaty and the 1996 Comprehensive Test Ban Treaty. It can be concluded that the effect of the aforesaid international treaties is still in doubt without explicit enforcement mechanisms and penalty for non-compliance. This paper also reviews the International Court of Justice's advisory opinion on the legality of the threat or use of nuclear weapons and comments that a clear explanation on the legality of use of nuclear weapons in 'extreme circumstances of self-defence' is required. Examples from current state practice in relation to nuclear non-proliferation efforts are also provided, with special attention to China, North Korea and Iran. This paper suggests that China as a leader of developing countries should extend its efforts on nuclear non-proliferation and conduct communication between North Korea and Iran and other nuclear weapons states to reduce or prohibit nuclear weapons.

  3. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  4. Survey of threat studies related to the nuclear power industry

    International Nuclear Information System (INIS)

    Wagner, N.R.

    1977-08-01

    A considerable effort has been directed toward the determination of threat characteristics, resulting in a voluminous collection of documents. This report summarizes several of the major studies in order to make the information more accessible. This summary includes only studies involving attacks on nuclear material, plus those incidents which because of their objectives, resources, or motivations may lend insight into potential threat against nuclear facilities or material

  5. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  6. The threat of nuclear terrorism: from analysis to precautionary measures

    International Nuclear Information System (INIS)

    Schneider, M.

    2003-01-01

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  7. The threat of nuclear terrorism: from analysis to precautionary measures

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, M

    2003-07-01

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  8. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  9. Nuclear security: A global response to a global threat

    International Nuclear Information System (INIS)

    Amano, Yukiya

    2016-01-01

    The threat of nuclear terrorism is real. The possibility of criminals getting hold of nuclear and other radioactive material cannot be ruled out. Much progress has been made in tackling this threat nationally, regionally and globally, but more needs to be done. International cooperation is vital. As the global platform for cooperation in nuclear security, the IAEA helps countries to establish and maintain robust and sustainable national nuclear security regimes. We help ensure that measures are taken to protect nuclear and other radioactive material, as well as the facilities in which such material is housed, from malicious acts. This has been an important year for nuclear security with the entry into force of the Amendment to the Convention on the Physical Protection of Nuclear Material. This establishes legally binding commitments for countries to protect nuclear facilities as well as nuclear material in domestic use, storage and transport. I encourage all countries that have not yet done so to adhere to this Amendment and thereby contribute to a stronger global nuclear security regime. In this edition of the IAEA Bulletin, you will learn about the different areas of security where our work is making a real difference. We highlight the progress made in a number of countries.

  10. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  11. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Doo [KINAC, Daejeon (Korea, Republic of)

    2016-05-15

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats.

  12. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    International Nuclear Information System (INIS)

    Kim, Hyun Doo

    2016-01-01

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats

  13. A study of insider threat in nuclear security analysis using game theoretic modeling

    International Nuclear Information System (INIS)

    Kim, Kyo-Nam; Yim, Man-Sung; Schneider, Erich

    2017-01-01

    Highlights: • Implications of an insider threat in nuclear security were quantitatively analyzed. • The analysis was based on of a hypothetical nuclear facility and using game theoretic approach. • Through a sensitivity analysis, vulnerable paths and important parameters were identified. • The methodology can be utilized to prioritize the implementation of PPS improvements in a facility. - Abstract: An Insider poses a greater threat to the security system of a nuclear power plant (NPP) because of their ability to take advantage of their access rights and knowledge of a facility, to bypass dedicated security measures. If an insider colludes with an external terrorist group, this poses a key threat to the safety-security interface. However, despite the importance of the insider threat, few studies have been conducted to quantitatively analyze an insider threat. This research examines the quantitative framework for investigating the implications of insider threat, taking a novel approach. Conventional tools assessing the security threats to nuclear facilities focus on a limited number of attack pathways. These are defined by the modeler and are based on simple probabilistic calculations. They do not capture the adversary’s intentions nor do they account for their response and adaptation to defensive investments. As an alternative way of performing physical protection analysis, this research explores the use of game theoretic modeling of Physical Protection Systems (PPS) analysis by incorporating the implications of an insider threat, to address the issues of intentionality and interactions. The game theoretic approach has the advantage of modeling an intelligent adversary and insider who has an intention to do harm and complete knowledge of the facility. Through a quantitative assessment and sensitivity analysis, vulnerable but important parameters in this model were identified. This made it possible to determine which insider threat is more important. The

  14. Nuclear weapons: new threats, new challenges

    International Nuclear Information System (INIS)

    Durand, D.

    2005-01-01

    After a brief history of the Iranian nuclear crisis since 2003, the author discusses the four aspects of this crisis which make it a textbook case: a country which wants to control the whole nuclear process and therefore may reach the capacity to produce military-grade uranium (this raises the question of the relationship between nuclear energy and disarmament), the validity and efficiency of international controls is at stake, divergence may appear on the ways to have international treaties respected (different approaches between Europe and the USA), a country which is looking for nuclear weapon for matters of regional security and power (this raises the issue of a new approach to security). Then, the author describes the new nuclear threats: proliferating states, terrorist groups, and states with nuclear weapons (attitude of the USA, China, Russia, France and the United Kingdom, perspective of a nuclear disarmament of Europe). He gives an overview of the current status of disarmament and of treaties (START, NPT), and discusses the opportunities to save the non proliferation treaty from collapsing in 2005

  15. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    Energy Technology Data Exchange (ETDEWEB)

    Pederson, Ann C. [ORNL; Snow, Catherine L. [ORNL; Townsend, Jeremy [ORNL; Shannon, Michael [ORNL

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  16. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  17. Nuclear threats in the vicinity of the Nordic countries. Final report of the Nordic Nuclear Safety Research project SBA-1

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.

    2002-11-01

    The acute phase of a nuclear accident and the possibility of high exposure of the populations are always the most important threats in the emergency preparedness work. Radioactive contamination from an accident can however also cause long term effects for land use and enhanced doses to special population groups and economic problems for agriculture, reindeer industry, hunting, tourism and recreation. For planning purposes it is always valuable to be aware of surrounding radiation hazards and other potential threats. Thus, mapping such threats in a Nordic context is an important factor in emergency preparedness in the area. This report presents a cross-disciplinary study from the NKS research program 1998-2001.The scope of the project was to prepare a 'base of knowledge' regarding possible nuclear threats in the vicinity of the Nordic countries. This base of knowledge will, by modere information technology as different websites, be made available to authorities, media and the population. The users of the websites can easily get information on different types of nuclear installations and threats. The users can get an overview of the situation and, if they so wish, make their own judgements. The project dealt with a geographical area including North-west Russia and the Baltic states. The results from the different activities in the project were generated in a web based database called the 'the base of knowledge'. Key words Nuclear threats, Nordic countries, nuclear power plants, nuclear ship, nuclear waste, literature database, base of knowledge, webaccessed information, atmospheric transport, decommissioning of submarines, nuclear installations, waste management, radioactive contamination in marine environment, radioactive sources, criticality analysis. (au)

  18. Nuclear threats in the vicinity of the Nordic countries. Final report of the Nordic Nuclear Safety Research project SBA-1

    Energy Technology Data Exchange (ETDEWEB)

    Eikelmann, I.M.H. [Norwegian Radiation Protection Authority (Norway)

    2002-11-01

    The acute phase of a nuclear accident and the possibility of high exposure of the populations are always the most important threats in the emergency preparedness work. Radioactive contamination from an accident can however also cause long term effects for land use and enhanced doses to special population groups and economic problems for agriculture, reindeer industry, hunting, tourism and recreation. For planning purposes it is always valuable to be aware of surrounding radiation hazards and other potential threats. Thus, mapping such threats in a Nordic context is an important factor in emergency preparedness in the area. This report presents a cross-disciplinary study from the NKS research program 1998-2001.The scope of the project was to prepare a 'base of knowledge' regarding possible nuclear threats in the vicinity of the Nordic countries. This base of knowledge will, by modere information technology as different websites, be made available to authorities, media and the population. The users of the websites can easily get information on different types of nuclear installations and threats. The users can get an overview of the situation and, if they so wish, make their own judgements. The project dealt with a geographical area including North-west Russia and the Baltic states. The results from the different activities in the project were generated in a web based database called the 'the base of knowledge'. Key words Nuclear threats, Nordic countries, nuclear power plants, nuclear ship, nuclear waste, literature database, base of knowledge, webaccessed information, atmospheric transport, decommissioning of submarines, nuclear installations, waste management, radioactive contamination in marine environment, radioactive sources, criticality analysis. (au)

  19. The nuclear threat; La menace nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2011-01-26

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  20. Reducing the threat of nuclear theft and sabotage

    International Nuclear Information System (INIS)

    Bunn, Matthew; Bunn, George

    2001-01-01

    The appalling events of September II, 2001 make clear that the threat of well-organized global terrorist groups bent on causing mass destruction is not hypothetical but real. There is evidence that Osama bin Laden's Al Quaida organization is seeking weapons of mass destruction, and has attempted to purchase stolen nuclear material from the former Soviet Union for use in nuclear explosives. Ensuring that the technologies and materials of weapons of mass destruction - especially weapons-usable nuclear materials, do not fall into the hands of terrorist groups or hostile states must therefore be a central element of the coming global battle to prevent mass-destruction terrorism. At the same time, nuclear facilities and radioactive materials - along with a wide range of other especially hazardous facilities and materials - must be protected from mass-consequence sabotage. Limited access to fissile materials, the essential ingredients of nuclear weapons, is the principal technical barrier to nuclear proliferation in the world today. The international community has an overwhelming interest in seeing that all such material is secure and accounted for. These events highlight the urgent need to: Dramatically expand international cooperation to upgrade security and accounting for weapons- usable nuclear material, in the former Soviet Union and worldwide, with the goal of ensuring that all such material is protected to stringent standards within a few years; Ensure that all nuclear facilities and materials (and other particularly hazardous facilities) are secure from mass-consequence sabotage; Strengthen national and international standards for security of nuclear materials and facilities; Greatly expand international efforts to interdict nuclear smuggling, including the difficult but essential task of strengthening efforts to share intelligence in this critical area; Reduce the number of sites where significant quantities of weapons-usable nuclear material exist, and the size

  1. Nuclear theft and sabotage. Priorities for reducing new threats

    International Nuclear Information System (INIS)

    Bunn, Matthew; Bunn, George

    2001-01-01

    The appalling attacks of 11 September 2001 in the United States make clear that the threat of large, well-organized global terrorist groups bent on causing mass destruction is not hypothetical but real. The attackers achieved horrifying destruction with box-cutters. The results could have been even more horrific if the attackers would have had access to, and used, weapons of mass destruction. Ensuring that technologies and materials for weapons of mass destruction - especially weapons-usable nuclear materials, whose acquisition is the most difficult part of making a nuclear bomb - do not fall into the hands of terrorist groups or hostile States must be a central element of the coming global effort to prevent catastrophic terrorism. At the same time, nuclear facilities and materials - along with a wide range of other especially hazardous facilities and materials must be protected from mass-consequence sabotage. Securing these materials and facilities must be a top priority on the international agenda - pursued at every opportunity, at every level of authority, until the job is done. At the same time, the threats against which we must defend have to be fundamentally reconsidered. On 11 September, the threat revealed itself to be bigger, smarter, better organized, and more deadly than the threats most of the world's security systems were designed to defend against. We must ensure that our defensive response is every bit as intelligent and capable as the September attackers. And we may have to rethink some of the approaches to nuclear energy that the world has been pursuing or contemplating. Every reasonable effort must be made to ensure that nuclear materials and facilities are effectively secured. In the past, many scenarios with enormously high consequences were dismissed as too unlikely to contribute much to overall risk - but now many of these probability estimates will have to be revised. A far-reaching new effort is needed to strengthen security for nuclear

  2. NATO Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David

    2015-01-01

    The nuclear crisis in Fukushima and growing threats of nuclear terrorism must serve as a wake-up call, prompting greater action to prepare ourselves for nuclear and radiological disasters. Our strategy to prepare for these threats is multi-layered and the events of these past years have proved the necessity to re-evaluate the national and international preparedness goals on a scale never before considered. The programme of NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” has been focused on science and technology challenges associated with our need to improve the national and international capacity and capability to prevent, protect against, mitigate the effects of, respond to, and recover from the nuclear and radiological disasters, including nuclear and radiological accident, terrorist attack by Improvised Nuclear Device (IND) or by “Dirty Bomb”-Radiological Dispersal Device (RDD), that pose the greatest risk to the national and international security and safety...

  3. The nuclear terrorist, radiological, biological, chemical threat. Medical approach

    International Nuclear Information System (INIS)

    Gourmelon, P.; Vidal, D.; Renaudeau, C.

    2005-01-01

    This book illustrates the cooperation of the civil and the military experts in the domain of the NBRC (nuclear, biological, radiological and chemical threat). The different aspects bond to the use of nuclear, biological and chemical weapons, are discussed. Al topics of each domains (NRBC) are presented: historical and fundamental aspects, diagnostic, therapeutic and prevention. (A.L.B.)

  4. Role of nuclear material accounting and control on nuclear security. Countermeasure against insider threat

    International Nuclear Information System (INIS)

    Osabe, Takeshi

    2014-01-01

    Possibility on unauthorized removal (theft) of nuclear material by a facility insider is a recognized as a serious threat. An insider could take advantage or knowledge of control system and access to nuclear material to intercept facility's system designed to protect theft of nuclear material by an insider. This paper will address how the facility level Nuclear Material Accounting and Control (NMAC) System should be designed and implemented to enhance deterring and detect theft of nuclear material by a facility insider. (author)

  5. Nuclear threats and emergency preparedness in Finland; Ydinuhkat ja varautuminen

    Energy Technology Data Exchange (ETDEWEB)

    Mustonen, R; Aaltonen, H; Laaksonen, J; Lahtinen, J; Rantavaara, A; Reponen, H; Rytoemaa, T; Suomela, M; Toivonen, H; Varjoranta, T

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.).

  6. Prevention and preparedness for response to nuclear and radiological threats

    International Nuclear Information System (INIS)

    Pradeepkumar, K.S.

    2016-01-01

    Challenges from smuggled or illegally transported radioactive sources with malevolent intention of causing potential threats to the society are much higher to those potential radiological emergencies from misplaced, orphan or lost radioactive sources. Large number of radioactive sources world over is transported for its application in various fields. The emergency preparedness and response system is less developed for potential radiological emergencies caused by them compared to those at nuclear facilities which are kept in readiness to respond to any kind of emergency. After the terrorist attack on WTC of 2001, there is significant concern world over about the malicious use of nuclear and other radioactive material. This calls for prevention of stealing/smuggling of radioactive materials and improving the emergency response system. Use of Radiological Dispersal Device (RDD) and Improvised Nuclear Device (IND) are considered as possible radiological and nuclear threats, can lead to large area contamination in addition to the injuries caused by blast and thermal effects. (author)

  7. Transmitting the sum of all fears: Iranian nuclear threat salience among offspring of Holocaust survivors.

    Science.gov (United States)

    Shrira, Amit

    2015-07-01

    Many Israelis are preoccupied with the prospect of a nuclear-armed Iran, frequently associating it with the danger of annihilation that existed during the Holocaust. The current article examined whether offspring of Holocaust survivors (OHS) are especially preoccupied and sensitive to the Iranian threat, and whether this susceptibility is a part of their increased general image of actual and potential threats, defined as the hostile world scenario (HWS). Study 1 (N = 106) showed that relative to comparisons, OHS reported more preoccupation with the Iranian nuclear threat. Moreover, the positive relationship between the salience of the Iranian threat and symptoms of anxiety was stronger among OHS. Study 2 (N = 450) replicated these findings, while focusing on the Iranian nuclear threat salience and symptoms of psychological distress. It further showed that OHS reported more negative engagement with the HWS (i.e., feeling that surrounding threats decrease one's sense of competence), which in turn mediated their increased preoccupation with the Iranian threat. The results suggest that intergenerational transmission of the Holocaust trauma includes heightened preoccupation with and sensitivity to potential threats of annihilation, and that the specific preoccupation with threats of annihilation reflects a part of a more general preoccupation with surrounding threats. (c) 2015 APA, all rights reserved).

  8. Nuclear threats in the vicinity of the Nordic countries. Supplementary final report of the Nordic Nuclear Safety research

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.

    2006-04-01

    The purpose of this project was to continue the cross-disciplinary study SBA-1 'base of knowledge' in the NKS research program 1998-2001 regarding possible nuclear threats in the vicinity of the Nordic countries. The main task for the project was to expand and envelope this database. Finding information to be placed in the database and identifying and filling gaps in knowledge were prioritised. This is a continuous process which extends beyond the end of this project, in order to have an operating and updated database also in the years to come. In this project work has been done making information systems in Norway that can take care of the database in the future. The scope of the preceding project was to prepare a base of knowledge regarding possible nuclear threats in the vicinity of the Nordic countries. The database, including a literature database, is presented on the website 'Nuclear threats in the vicinity of the Nordic Countries'. The utilisation of modern information technology gives the user of the database easy access to information on different types of nuclear installations and threats. The project focused on potential events at nuclear installations and the consequences for the Nordic countries, especially with regards to vulnerable food chains, doses to man, environmental contamination and emergency preparedness systems. The geographical area dealt with includes North-west Russia and the Baltic states and the nuclear installations investigated are nuclear power plants, ship reactors and storage and handling of used fuel and radioactive waste. (au)

  9. Nuclear threats in the vicinity of the Nordic countries

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.; Moeller, B.

    1999-01-01

    This project is one of the new cross-disciplinary studies in the NKS (Nordic Nuclear Safety) research program 1998-2001. The main task for the project is to aggregate knowledge of nuclear threats in the vicinity of the Nordic countries, a 'base of knowledge', and make this available for the Nordic authorities as a supplement for the national emergency preparedness work. The project will focus on potential events in nuclear installations and the consequences for the Nordic countries especially on: vulnerable food chains; doses to man; environmental contamination; the emergency preparedness system. (au)

  10. Illicit trafficking of nuclear and other radioactive material: The 'net' security threat

    International Nuclear Information System (INIS)

    Zaitseva, L.; Steinhausler, F.

    2006-01-01

    Illicit trafficking in nuclear and other radioactive material, which could be used for building a nuclear weapon or a radiological dispersal device, has been a subject of concern for more than a decade. A major obstacle to assessing the actual security threat due to nuclear trafficking is the inclusion in the analysis of incidents that do not represent a security threat, in the sense of being a possible pre-stage to a clandestine nuclear weapons programme or a terrorist operation involving a crude nuclear device or a radiological dispersal device. International transport of contaminated scrap metal, or discovery of lost or abandoned radioactive sources are examples of such incidents, which have little or no security relevance. This paper analyses the global data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (DSO) using special filters to discriminate between incidents that are of security relevance and those that are not. (author)

  11. The nuclear threat. 6. enl. ed.

    International Nuclear Information System (INIS)

    Anders, G.

    1993-01-01

    This is the sixth edition of 'The last days and end of time', augmented by a foreword, which was first published in 1972. The reflections it contains cannot become outdated because their object: the risk of global catastrophe, persists. But it continues to exist not only because we can never now hope to efface what knowledge we have of self-annihilation methods, but also because we have become frighteningly used to the fact of being threatened. What we fight is not this or that adversary who attacks, or might be got rid of, by nuclear means, but the nuclear situation as such. Since this enemy is the enemy of all human beings, those who up to now have considered each other as adversaries should rally as allies against the common threat. (orig./HP) [de

  12. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  13. Establishing design basis threats for the physical protection of nuclear materials and facilities

    International Nuclear Information System (INIS)

    Chetvergov, S.

    2001-01-01

    In the area of nuclear energy utilization, the Republic of Kazakhstan follows the standards of international legislation and is a participant of the Nuclear Weapons Non-proliferation Treaty as a country that does not have nuclear weapons. In the framework of this treaty, Kazakhstan provides for the measures to ensure the regime of nonproliferation. The Republic signed the Agreement with the IAEA on the guarantee that was ratified by the Presidential Decree in 1995. Now the Government of the RK is considering the Convention on Physical Protection of Nuclear Materials. Kazakhstan legislation in the area of nuclear energy utilization is represented by a set of laws: the main of them is the Law of the Republic of Kazakhstan 'On the utilization of atomic energy', dated April 14, 1997. According to the Law, the issues of physical protection are regulated by interdepartmental guideline documents. Nuclear science and industry of RK include: Enterprises on uranium mining and processing; Ulba metallurgical plant, manufacturing fuel pellets of uranium dioxide for heat release assemblies of RBMK and WWR reactor types, with the enrichment on U235 1.6-4.4%; Power plant in Aktau for heat and power supply and water desalination, based on fast breeder reactor BN-350; Research reactors of National Nuclear Center: WWR-K - water-water reactor, with 10 MW power, uses highly enriched uranium (up to 36% of U-235); IVG.1M - water-water heterogeneous reactor of vessel type on thermal neutrons, maximum power is 35 MW; IGR - impulse homogeneous graphite reactor on thermal neutrons, with graphite reflector; RA - high temperature gas cooled reactor on thermal neutrons, 0.5 MW power. The establishment of design basis threats for nuclear objects in the Republic of Kazakhstan is an urgent problem because of the developing military-political situation in the region. It is necessary to specify important elements affecting the specific features of the design basis threat: military operations of

  14. Climate change, nuclear risks and nuclear disarmament. From security threats to sustainable peace

    Energy Technology Data Exchange (ETDEWEB)

    Scheffran, Juergen [Hamburg Univ. (Germany). Research Group Climate Change and Security

    2009-07-01

    In the future, nuclear and climate risks may interfere with each other in a mutually enforcing way. Con-flicts induced by climate change could contribute to global insecurity and create more incentives for states to rely on military force, including nuclear weapons. Rather than being a direct cause of war, cli-mate change significantly affects the delicate balance between social and environmental systems in a way that could undermine human security and societal stability with potentially grave consequences for international security. Increased reliance on nuclear energy to reduce carbon emissions will contribute to the risks of nuclear proliferation. A renewed nuclear arms race would consume considerable resources and undermine the conditions for tackling the problem of climate change in a cooperative manner. Nuclear war itself would severely destabilize human societies and the environment, not to speak of the possibility of a nuclear winter that would disrupt the atmosphere. On the other hand, finding solutions to one problem area could help to find solutions in the other. Pre-venting the dangers of climate change and nuclear war requires an integrated set of strategies that ad-dress the causes as well as the impacts on the natural and social environment. Institutions are needed to strengthen common, ecological and human security, build and reinforce conflict-resolution mechanisms and low-carbon energy alternatives, and create sustainable lifecycles that respect the capabilities of the living world. This article examines the linkages between nuclear and climate risks, identifies areas where both threats converge, and offers an approach to move from living under these security threats to building sustain-able peace. By bringing to light the multidimensional interplay between climate change, nuclear risks and nuclear disarmament, this study aims to help the reader grasp their interconnectedness and recognize its critical implications for the strategic security

  15. Climate change, nuclear risks and nuclear disarmament. From security threats to sustainable peace

    International Nuclear Information System (INIS)

    Scheffran, Juergen

    2009-01-01

    In the future, nuclear and climate risks may interfere with each other in a mutually enforcing way. Con-flicts induced by climate change could contribute to global insecurity and create more incentives for states to rely on military force, including nuclear weapons. Rather than being a direct cause of war, cli-mate change significantly affects the delicate balance between social and environmental systems in a way that could undermine human security and societal stability with potentially grave consequences for international security. Increased reliance on nuclear energy to reduce carbon emissions will contribute to the risks of nuclear proliferation. A renewed nuclear arms race would consume considerable resources and undermine the conditions for tackling the problem of climate change in a cooperative manner. Nuclear war itself would severely destabilize human societies and the environment, not to speak of the possibility of a nuclear winter that would disrupt the atmosphere. On the other hand, finding solutions to one problem area could help to find solutions in the other. Pre-venting the dangers of climate change and nuclear war requires an integrated set of strategies that ad-dress the causes as well as the impacts on the natural and social environment. Institutions are needed to strengthen common, ecological and human security, build and reinforce conflict-resolution mechanisms and low-carbon energy alternatives, and create sustainable lifecycles that respect the capabilities of the living world. This article examines the linkages between nuclear and climate risks, identifies areas where both threats converge, and offers an approach to move from living under these security threats to building sustain-able peace. By bringing to light the multidimensional interplay between climate change, nuclear risks and nuclear disarmament, this study aims to help the reader grasp their interconnectedness and recognize its critical implications for the strategic security

  16. Anguishes caused by the nuclear threat. Results of international psychological research

    International Nuclear Information System (INIS)

    Schmidt, F.; Boehnke, K.

    1990-01-01

    The conference of December 10th and 11th, 1987 dealt with life under the nuclear threat and the perspectives of pedagogic-psychological research. The individual contributions are in condensed form; they are discussed from the angle of how the psyche of individuals copes with military and non-military nuclear hazards. (DG) [de

  17. Salience of the Nuclear Threat: Operationalization through Spontaneous Concern.

    Science.gov (United States)

    Mayton, Daniel M., II

    An indirect/nonreactive technique of assessing spontaneous concern should be used to examine the salience of the threat of nuclear war. Direct/reactive techniques may produce inconsistent results and inadvertently enhance a false consensus. The procedures for the administration, scoring, and interpretation of a spontaneous concern measure along…

  18. Nuclear proliferation and the potential threat of nuclear terrorism

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The Director General of the International Atomic Energy Agency emphasises that security strategies can no longer be effective based solely on the concept of national boundaries. The article describes the security problems which have grown along with the development of 'internationalism' and the author defines the need for cooperation, assistance, regional and international networks to combat the threat quoting the IAEA's nuclear security plan as an example of how this may be achieved. In stressing the urgency Dr ElBaradei concludes: 'May it not ultimately be said of our civilisation that we created the inventions that led to our own demise'. (author)

  19. Nuclear proliferation and the potential threat of nuclear terrorism. 8 November 2004, Sydney, Australia, Asia-Pacific Nuclear Safeguards and Security Conference

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Today, the focus of the world is on nuclear proliferation and the potential threat of nuclear terrorism in Asia and the Pacific, and this address is presenting the perspectives on the challenges IAEA faces, and how the IAEA is working to strengthen nuclear security and the nuclear non-proliferation regime. But one would emphasize at the outset that, while much of our work must begin locally and regionally, we must not forget to think globally, because ultimately the existence of a nuclear threat anywhere is a threat everywhere, and as a global community, we will win or lose this battle together. This presentation, discusses cooperation, assistance, regional and international networks, and the importance of learning from each other. In effect, the focal subject is 'security culture', a mindset that, while providing the impetus for local and regional action, thinks globally and is fully capable of extending across borders. Sixty years ago, on a day in August, the dawn of the Nuclear Age in Asia left nearly a quarter of a million people dead, with two devices considered crude by modern standards. For six decades, we have managed to avoid a repeat of that event, but remain haunted by the prospect. It is my firm belief that we cannot move out from under the shadow of Hiroshima and Nagasaki until we are ready to make that move collectively, and build a system of security that transcends borders, that focuses on the equal value of every human life, and in which nuclear weapons have no place. May it not ultimately be said of our civilization that we created the inventions that led to our own demise

  20. Thinking about the threat of nuclear war: relevance to mental health

    International Nuclear Information System (INIS)

    Goldenberg, S.; LaCombe, S.; Levinson, D.; Parker, K.R.; Ross, C.; Sommers, F.

    1985-01-01

    Ontario students in grades 7-13 responded to open-ended and multiple-choice questions about future concerns, particularly unemployment, job/career plans, and the nuclear threat. Although worries about nuclear war were more frequent than those in other areas, their expression was associated with a sense of social efficacy rather than with feelings of helplessness

  1. Hope, connectedness, and action: responses of adolescents and young adults to the threat of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Fernald, M.C.

    1985-01-01

    This study undertook to assess the degree to which a person's sense of interconnectedness with others may have a mediating effect on whether one reacts to the consciousness of nuclear threat with feelings of despair (helplessness and hopelessness) or with a sense of empowerment (hope, efficacy, and action for change). Subjects included 119 public high school students and 14 Friends' school students, ranging from 12-18 years of age; 58 university students ranging from 18-25 years of age; and 24 parents of public school students, 10 adult Friends, and 38 members of Physicians for Social Responsibility, ranging from 20-83 years of age. A self-rating questionnaire was administered to assess subjects' conscious level of concern about nuclear issues, feelings of connectedness with others in general and about nuclear concerns, feelings of hope and efficacy in general and with regard to nuclear issues, and participation in activities reflecting concerns about nuclear threat. Correlational analyses (multiple regression, Spearman Rho, Kendall's Tau) showed that general feelings of hope, level of activity, and feelings of connectedness about nuclear concerns were the best predictors of hope about nuclear concerns. Conscious level of concern and feelings of connectedness about nuclear concerns, along with age and SES were the best predictors of an active response to nuclear threat; additionally, parents' level of concern about nuclear issues was predictive of their children's degree of activity in response to nuclear threat. Adolescents' level of concern and degree of connectedness with others was predicted by their parents' degree of connectedness.

  2. Soviet children and the threat of nuclear war: a preliminary study

    International Nuclear Information System (INIS)

    Chivian, E.; Mack, J.E.; Waletzky, J.P.; Lazaroff, C.; Doctor, R.; Goldenring, J.M.

    1985-01-01

    This study, the first undertaken by Western researchers with Soviet children on the subject of nuclear weapons, compared the questionnaire responses of 293 Soviet youngsters with those of 201 age-matched Californians. Interviews were conducted to supplement the questionnaire findings. Similarities and differences between the two samples are discussed in the context of how young people today perceive the threat of nuclear war

  3. Nuclear proliferation and the potential threat of nuclear terrorism

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M. [International Atomic Energy Agency, Vienna (Austria)

    2005-01-15

    The Director General of the International Atomic Energy Agency emphasises that security strategies can no longer be effective based solely on the concept of national boundaries. The article describes the security problems which have grown along with the development of 'internationalism' and the author defines the need for cooperation, assistance, regional and international networks to combat the threat quoting the IAEA's nuclear security plan as an example of how this may be achieved. In stressing the urgency Dr ElBaradei concludes: 'May it not ultimately be said of our civilisation that we created the inventions that led to our own demise'. (author)

  4. Nuclear threat. A clear and present danger

    International Nuclear Information System (INIS)

    Kikuchi, Masahiro; Nakagome, Yoshihiro

    2005-01-01

    It was disappointed at the discussion in the review conference of the NPT held in 2005. The fact may be caused by the estrangement between the international urgent issues related to the non-proliferation and the effectiveness of archaic measures through the NPT. However, it should not be recognized that the international obligation and worth of NPT has been gone. The NPT referred the typical international situation under the cold war era. Although several permanent issues of the nuclear non-proliferation exist in current discussions, the activities relevant to the NPT may not be effect against newly unstable situations after the September 11th of 2001. Urgent challenges to be taken are that we must strictly analyze the interventions between 'the clear and present danger' of our world and the nuclear herms, and must take appropriate actions toward them without influences from previous international situations that might be subsisted in current international treaties and agreements. This paper identified the features of nuclear threats based on the four categories and examined the possibilities of nuclear terrorism from previous facts with the inductive inference. The results identified the possibility of nuclear facility attack and of radioactive materials theft by the Polico-Religious Groups and others are stood out. The authors would suggest the important of urgent recognition to establish the certain security system against nuclear terrorism. (author)

  5. Nuclear Terrorism: Assessing the Threat, Developing a Response

    Science.gov (United States)

    2009-01-01

    milling facilities to crush the ore and extract the uranium concentrate, a process that yields what is often called yellowcake. The yellowcake would then...issued by the Baker-Cutler Task Force described the threat, “In a worst-case scenario, a nuclear engineer graduate with a grapefruit -sized lump of HEU...stealing spent power reactor fuel or fresh (unirradiated) MOX fuel, both of which would need to have their plutonium chemically extracted . While separating

  6. A New Framework to Minimize Insider Threats in Nuclear Power Operations

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    In a 2008 report, IAEA presented preventive and protective measures against such threat. These are summarized as : (1) Exclude potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, prior to allowing them access; (2) Exclude further potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, after they have access; (3) Minimize opportunities for malicious acts by limiting access, authority and knowledge, and by other measures; (4) Detect, delay and respond to malicious acts. The nuclear security risk, i.e. insider threat, has concerned continuously because the existing physical protection system is only for outsider threats. In addition, with high possibility of use of multicultural workforce in newcomers' NPPs, the detection and prediction of insider threat is a hot potato. Thus, this paper suggested a new framework for predicting and detecting the insider threat. This framework integrates the behavioral indicators, stimulus monitoring and cognitive monitoring. This framework open a chance to detect and predict the insider before commits a crime accurately. This model can be direct application to reduce the security risks in multicultural environment.

  7. A New Framework to Minimize Insider Threats in Nuclear Power Operations

    International Nuclear Information System (INIS)

    Suh, Young A; Yim, Man-Sung

    2016-01-01

    In a 2008 report, IAEA presented preventive and protective measures against such threat. These are summarized as : (1) Exclude potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, prior to allowing them access; (2) Exclude further potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, after they have access; (3) Minimize opportunities for malicious acts by limiting access, authority and knowledge, and by other measures; (4) Detect, delay and respond to malicious acts. The nuclear security risk, i.e. insider threat, has concerned continuously because the existing physical protection system is only for outsider threats. In addition, with high possibility of use of multicultural workforce in newcomers' NPPs, the detection and prediction of insider threat is a hot potato. Thus, this paper suggested a new framework for predicting and detecting the insider threat. This framework integrates the behavioral indicators, stimulus monitoring and cognitive monitoring. This framework open a chance to detect and predict the insider before commits a crime accurately. This model can be direct application to reduce the security risks in multicultural environment

  8. Illicit trafficking of nuclear and other radioactive material: the 'net' security threat

    International Nuclear Information System (INIS)

    Zaitseva, L.; Steinhaeusler, F.

    2005-01-01

    Full text: Illicit trafficking in nuclear and other radioactive material, which could lead to the creation of a nuclear device or a radiological dispersal device (RDD), has been a subject of concern for more than a decade now. This concern became even more pronounced after the September 11 th attacks in the United States, which demonstrated that modern day terrorists are willing and capable of inflicting mass casualties among civilian population in target countries in order to further their goals. The problem of illicit trafficking - intentional diversion and smuggling of nuclear fissile material and radioactive sources - has been closely watched and studied by several national institutions and international organizations. This resulted in the establishment of several nuclear smuggling databases, tracking illicit trafficking incidents. The number of such incidents for a given period varies widely between the different databases, reflecting the different sources of information used, the different geographical regions covered, as well as the different methodologies applied to data mining and data analysis. One major obstacle to assessing the actual security threat due to illicit trafficking is the inclusion of incidents in the analysis, which do not represent a security threat in the sense of being the pre-stage of a terrorist operation or a malevolent act. Such incidents mainly involve inadvertent movement of illegally disposed of radioactive sources in scrap metal or contaminated goods across international borders and discoveries of so called 'orphan' radiation sources. This paper analyzes the global data contained in the database on nuclear smuggling, theft and orphan radiation sources (DSTO) operated by the University of Salzburg, using special filters to discriminate between illicit trafficking incidents involving a criminal intent and those that do not. Thereby, the net security threat of illicit trafficking will be determined to help provide a realistic

  9. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    International Nuclear Information System (INIS)

    Heineke, J.M.

    1978-01-01

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed

  10. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  11. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    Energy Technology Data Exchange (ETDEWEB)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  12. Research on classification of nuclear and radiological accident from IAEA threat category with estimation of INES scale

    International Nuclear Information System (INIS)

    Cha, Seok Ki; Kim, Siu

    2017-01-01

    As there is increasing use of nuclear energy and radiation while information on nuclear related accidents are accumulated, international interest in nuclear and radiation incidents is increasing rapidly. Because of the specificity of nuclear energy and radiation, the damage caused by such accidents will be spread to the larger area around the accident point due to the radiation and cause biological damage and mental-psychological damage. The purpose of this study is to categorize historical incidents using the Threat Category concept described in the publication of IAEA Safety Guide GS-G-2.1. In addition to categorizing actual events and accidents into Threat Categories, causes of occurrences, the type of radioactive source which leads to the main threats, the type of radiation exposure, and the type of patient are organized in detail. As a result of the analysis of representative historical cases, most accident cases caused by 'Nuclear Energy-Related Business Operator' correspond to 1 (Anomaly) ~ 4 (Accident with Local Consequences) in the INES Scale by IAEA. From the some accident cases, while the radiological damage can be seen to be local, but it can be seen that the possibility of 6 (Serious Accident) can not be absolutely excluded.

  13. Nuclear industry powering up to tackle potential threats from cyberspace

    International Nuclear Information System (INIS)

    Shepherd, John

    2015-01-01

    In June 2015, the International Atomic Energy Agency (IAEA), in cooperation with international agencies including the crime-fighting organisation Interpol, will host a major conference on the protection of computer systems and networks that support operations at the world's nuclear facilities. According to the IAEA, the use of computers and other digital electronic equipment in physical protection systems at nuclear facilities, as well as in facility safety systems, instrumentation, information processing and communication, ''continues to grow and presents an ever more likely target for cyber-attack''. The international nuclear industry is right to take heed of ever-evolving security threats, deal with them accordingly, and be as open and transparent as security allows about what is being done, which will reassure the general public. However, the potential menace of cyberspace should not be allowed to become such a distraction that it gives those who are ideologically opposed to nuclear another stick with which to beat the industry.

  14. Nuclear industry powering up to tackle potential threats from cyberspace

    Energy Technology Data Exchange (ETDEWEB)

    Shepherd, John [nuclear 24, Brighton (United Kingdom)

    2015-06-15

    In June 2015, the International Atomic Energy Agency (IAEA), in cooperation with international agencies including the crime-fighting organisation Interpol, will host a major conference on the protection of computer systems and networks that support operations at the world's nuclear facilities. According to the IAEA, the use of computers and other digital electronic equipment in physical protection systems at nuclear facilities, as well as in facility safety systems, instrumentation, information processing and communication, ''continues to grow and presents an ever more likely target for cyber-attack''. The international nuclear industry is right to take heed of ever-evolving security threats, deal with them accordingly, and be as open and transparent as security allows about what is being done, which will reassure the general public. However, the potential menace of cyberspace should not be allowed to become such a distraction that it gives those who are ideologically opposed to nuclear another stick with which to beat the industry.

  15. Simulated ICJ Judgment : Revisiting the Lawfulness of the Threat or Use of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Winston P. Nagan

    2012-04-01

    Full Text Available The author prepared this simulated judgment at the request of Cadmus editors to demonstrate that there is ample ground for revisiting and revising the landmark 1996 advisory opinion of the ICJ on the legality of nuclear weapons. The ICJ failed to anticipate the proliferation of nuclear weapons, which expands the evolution of the concept of sovereignty, the potential cataclysmic impact of nuclear war on climate change, the multiplication of nuclear-weapon-free zones as evidence of a widespread rejection, mounting evidence regarding the physical and psychological harm, and unwillingness of the nuclear weapons states to fulfill their obligations under the NPT. This article challenges the notion that a few sovereign states should be the sole arbiters of international law and affirms the legitimate claim of the global community of protection from the existential threat posed by nuclear weapons. The use or threat of use undermines foundational values of the international legal system and the specific rules of self-defense and humanitarian law. The contribution seeks to give an accentuated role for the explicit use of the fundamental values of international legal order, in crafting an innovative methodology for the formulation of the judgment. The very existence of these weapons undermines the rights of all of humanity. The ICJ should be moved to categorically declare the use and possession of nuclear weapons a crime against humanity.

  16. Design basis threat analysis and implementation of the physical protection system at Nuclear Facility of BATAN Yogyakarta

    International Nuclear Information System (INIS)

    Syarip

    2005-01-01

    An analysis to determine the design basis threat (DBT) and its follow-up through the implementation of physical protection system at the nuclear facility of BATAN Yogyakarta has been done. Methodology used for the analysis is based on the IAEA guidance for the development and maintenance of a DBT. Based on the analysis results, it can be concluded that the threat motivation is influenced by political situation (related to the government policy), criminal, sabotage and theft. The characteristics of threats are: not so well organized, terror, theft of materials information, involving insider (collusion), and intimidation to workers. Potential threat could from guests/students who take a practical job or laboratory exercise. Therefore, it is necessary to be anticipated the possibility and its impact of turmoil/demonstrators such as destruction of: lighting, road, fence, sabotage on the electric and communication lines, surrounding the Yogyakarta nuclear facility

  17. Nuclear crime - a threat? Trade with nuclear explosives in Europe, political and social background

    International Nuclear Information System (INIS)

    Baumann, W.; Becker, D.; Brunner, H.; Fechner, J.; Frenzel, E.; Kaul, A.; Kesten, J.; Koschel, P.; Mattausch, E.; Mertens, D.; Nosske, D.; Stoll, W.; Willuhn, K.

    1995-01-01

    Nuclear Crime defined as illegal trade, transport and possession of fissille and other radioactive material, increasingly keeps government and public in suspense. As shown already by the two parts of the term, both Radiation Protection and Prosecution Authorities are concerned. In the focal theme of this issue, their opinions and experiences will be compiled with the aim of treating this really explosive topic critically, but factually correct from all sides. This intention requires answering several broad questions: -Where does the nuclear material come from? - What experiences with nuclear crime do exist? - What countermeasures are we able and ready to take? - What measurement techniques are at hand to recognize and avert the danger? and, with particular reference to the nuclear weapons material Plutonium: - Who is producing Pu, and in what shape and mixtures? - What is the real radiological risk of the 'ultra-poison' Pu? - What possibilities exist to remove Pu contaminations, and to decomparate it? The following contributions of competent authors from Germany and Switzerland convey a comprehensive picture of the present situation demonstrating equally that means and knowledge exist in both countries to efficiently overt the threat of Nuclear Crime. (orig.) [de

  18. Research on classification of nuclear and radiological accident from IAEA threat category with estimation of INES scale

    Energy Technology Data Exchange (ETDEWEB)

    Cha, Seok Ki [Dept. of Nuclear engineering, Univ of SeJong, Seoul (Korea, Republic of); Kim, Siu [Korea Nuclear International Cooperation Foundation, Daejeon (Korea, Republic of)

    2017-04-15

    As there is increasing use of nuclear energy and radiation while information on nuclear related accidents are accumulated, international interest in nuclear and radiation incidents is increasing rapidly. Because of the specificity of nuclear energy and radiation, the damage caused by such accidents will be spread to the larger area around the accident point due to the radiation and cause biological damage and mental-psychological damage. The purpose of this study is to categorize historical incidents using the Threat Category concept described in the publication of IAEA Safety Guide GS-G-2.1. In addition to categorizing actual events and accidents into Threat Categories, causes of occurrences, the type of radioactive source which leads to the main threats, the type of radiation exposure, and the type of patient are organized in detail. As a result of the analysis of representative historical cases, most accident cases caused by 'Nuclear Energy-Related Business Operator' correspond to 1 (Anomaly) ~ 4 (Accident with Local Consequences) in the INES Scale by IAEA. From the some accident cases, while the radiological damage can be seen to be local, but it can be seen that the possibility of 6 (Serious Accident) can not be absolutely excluded.

  19. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  20. Introduction to Special Edition (of the Journal of Nuclear Materials Management) on Reducing the Threat from Radioactive Materials

    International Nuclear Information System (INIS)

    Mladineo, Stephen V.

    2007-01-01

    Introductory article for special edition of the JOURNAL OF NUCLEAR MATERIALS MANAGEMENT outlining the Institute of Nuclear Materials Management Nonproliferation and Arms Control Technical Division. In particular the International Nuclear and Radiological Security Standing Committee and its initial focus covering four topical areas--Radiological Threat Reduction, Nuclear Smuggling and Illicit Trafficking, Countering Nuclear Terrorism, and Radiological Terrorism Consequence Management

  1. A research on threat (hazard) categorization method for nuclear facilities

    International Nuclear Information System (INIS)

    Tang Rongyao; Xu Xiaoxiao; Zhang Jiangang; Zhao Bin; Wang Xuexin

    2011-01-01

    The threat categorization method suggested by International Atomic Energy Agency (IAEA) and hazard categorization standard by the Department of Energy of United States (USDOE) for nuclear facilities are compared and discussed in this paper. The research shows the two types of categorization method for nuclear facilities are similar, though each has its own specialty. The categorization method suggested by IAEA for the purpose of emergency planning is quite completed and updated. The categorization method of DOE is advanced in its operability, and fits for safety surveillance. But the dispersible radioactive material thresholds used for categorization need to be updated. The threshold of category 3 is somewhat disputable for many reasons. The recommended categorization method for China is also given in this paper. (author)

  2. Nuclear reactor control with fuzzy logic approaches - strengths, weakness, opportunities, and threats

    International Nuclear Information System (INIS)

    Ruan, Da

    2004-01-01

    As part of the special track on 'Lessons learned from computational intelligence in nuclear applications' at the forthcoming FLINS 2004 conference on Applied Computational Intelligence (Blankenberge, Belgium, September 1-3, 2004), research experiences on fuzzy logic techniques in applications of nuclear reactor control operation are critically reviewed in this presentation. Assessment of four real fuzzy control applications at the MIT research reactor in the US, the FUGEN heavy water reactor in Japan, the BR1 research reactor in Belgium, and a TRIGA Mark III reactor in Mexico will be examined thought a SWOT analysis (strengths, weakness, opportunities, and threats). Special attention will be paid to the current cooperation between the Belgian Nuclear Research Centre (SCK-CEN) and the Mexican Nuclear Centre (ININ) on the fuzzy logic control for nuclear reactor control project under the partial support of the National Council for Science and Technology of Mexico (CONACYT). (Author)

  3. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  4. Anguishes caused by the nuclear threat. Results of international psychological research. Bedrohungsaengste. Ergebnisse internationaler psychologischer Forschung

    Energy Technology Data Exchange (ETDEWEB)

    Schmidt, F.; Boehnke, K. (Freie Univ. Berlin (Germany). Inst. fuer Allgemeine und Vergleichende Erziehungswissenschaft); Macpherson, M.J. (Freie Univ. Berlin (Germany))

    1990-04-01

    The conference of December 10th and 11th, 1987 dealt with life under the nuclear threat and the perspectives of pedagogic-psychological research. The individual contributions are in condensed form; they are discussed from the angle of how the psyche of individuals copes with military and non-military nuclear hazards. (DG).

  5. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  6. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  7. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  8. The Application of Neutron Transport Green's Functions to Threat Scenario Simulation

    Science.gov (United States)

    Thoreson, Gregory G.; Schneider, Erich A.; Armstrong, Hirotatsu; van der Hoeven, Christopher A.

    2015-02-01

    Radiation detectors provide deterrence and defense against nuclear smuggling attempts by scanning vehicles, ships, and pedestrians for radioactive material. Understanding detector performance is crucial to developing novel technologies, architectures, and alarm algorithms. Detection can be modeled through radiation transport simulations; however, modeling a spanning set of threat scenarios over the full transport phase-space is computationally challenging. Previous research has demonstrated Green's functions can simulate photon detector signals by decomposing the scenario space into independently simulated submodels. This paper presents decomposition methods for neutron and time-dependent transport. As a result, neutron detector signals produced from full forward transport simulations can be efficiently reconstructed by sequential application of submodel response functions.

  9. Assessing Detecting and Deterring the Threat of Maritime Nuclear and Radiological Smuggling in the Western Indian Ocean Region

    Energy Technology Data Exchange (ETDEWEB)

    Khan, M. Umer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cooperative Monitoring Center

    2017-03-01

    This paper proposes that current maritime smuggling routes in the western Indian Ocean region are similar to those in the past and that the motivations of terrorist groups and the presence of radioactive sources in the Indian Ocean littoral and other states present a significant security threat. The majority of regional terrorist groups have a hybrid structure, piggybacking on criminal activity to fund their terror activities. Additionally, states have used maritime routes in the Indian Ocean region to transport nuclear materials and missiles. Thus, the maritime dimension of such threats remains, and may be increasing. This paper focuses on issues, motivations, pathways, and methods to detect and interdict nuclear and radiological trafficking. It analyzes the potential use of maritime technology applications for radiation detection and presents recommendations for states and multinational nonproliferation advocacy organizations to address the threat in the Indian Ocean region.

  10. Protection of confidential information and countermeasures against insider threat in nuclear industry. Some practices in U.S. nuclear industry and their implication for Japan

    International Nuclear Information System (INIS)

    Tanabe, Tomoyuki

    2008-01-01

    In Japan, after law amendment of the Law for the Regulation of Nuclear Source Material, Nuclear Fuel Material and Reactors was implemented aiming for reinforcement of physical protection in 2005, there still remain a number of practical issues of how the nuclear administration applies the regulations in detail and how nuclear undertakers cope with the regulations. This report looks at how protection of confidential information and countermeasures against insider threat are regulated and handled in the United States civil nuclear energy industry, and extracts its implications for Japanese regulations and practical business affairs. This report points our four characteristics of protection of confidential information and countermeasures against insider threat in the United States commercial power industry: (1) regulatory contents are prescribed in detail within a specific scope, (2) private bureaucracy such as NEI provides support of compliance programs of nuclear undertakers, (3) strict protection and management system about Safeguards Information (SGI) has been developed in both sides of regulations and compliance programs, and (4) employee private information of a broad content including sensitive data such as financial status or the criminal record is acquired and used at the aim of security clearance by nuclear undertakers. These characteristics, especially point (2) serve as a reference in regulation enforcement in Japan while careful attentions should be paid in harmonizing with existing legislation. (author)

  11. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  12. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  13. Differentiating the threat of radiological/nuclear terrorism: Motivations and constraints

    Energy Technology Data Exchange (ETDEWEB)

    Post, J M [Elliott School of International Affairs, George Washington University, Washington, DC (United States)

    2001-07-01

    Full text: Reviewing the spectrum of terrorist groups in terms of motivation, incentives and constraints, for nearly all groups, nuclear terrorism could be highly counter-productive. The constraints are particularly severe for large-scale mass casualty terrorism for groups that are concerned with their constituents--social revolutionary and nationalist separatist terrorists--although discriminate low level attacks are possible. Right-wing extremists, including individuals who are members of the right-wing virtual community of hatred, represent a distinct danger for low level discriminate attacks against their targets. Religious fundamentalist terrorist groups represent a particular threat, because they are not trying to influence the West but to expel Western modernizing influences. Moreover, they believe that their acts of violence are given sacred significance. The severe constraints against catastrophic terrorism for most groups argues for continuing to protect against the greatest danger - conventional terrorism - and to devote significantly increased resources to monitoring more closely the groups at greatest risk for nuclear terrorism. (author)

  14. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  15. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  16. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  17. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  18. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  19. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    International Nuclear Information System (INIS)

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development

  20. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development.

  1. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  2. The meaning of nuclear war to adult men: A developmental approach

    Energy Technology Data Exchange (ETDEWEB)

    Miles, P.B.

    1991-01-01

    The study investigated the contextual and thematic meaning of nuclear war. Age-related differences were also investigated by sampling 36 male subjects in three age groups (20-27, 40-50, and above 60). Contextual meaning was measured by asking subjects to rate the meaning of nuclear war and three other threats (personal death, earthquake, and economic depression) on two questionnaires designed to explore personal meaning. Thematic meaning was measured by asking subjects to answer two open-ended questions. In terms of contextual meaning, the study found that, when compared to all other threats, nuclear war has a more extreme emotional meaning. In addition, meaning of nuclear war was found to shift across the adult lift span. In terms of thematic meaning, the study identified five themes describing causation and five themes describing effects. Age differences were found in thematic meaning. Oldest subjects emphasized rational causation, while middle-aged and younger subjects emphasized hopelessness and the impact on either inter-generational or intra-generational relationships. Age differences in meaning are discussed in terms of Eriksonian theory of adult development.

  3. The meaning of nuclear war to adult men: A developmental approach

    International Nuclear Information System (INIS)

    Miles, P.B.

    1991-01-01

    The study investigated the contextual and thematic meaning of nuclear war. Age-related differences were also investigated by sampling 36 male subjects in three age groups (20-27, 40-50, and above 60). Contextual meaning was measured by asking subjects to rate the meaning of nuclear war and three other threats (personal death, earthquake, and economic depression) on two questionnaires designed to explore personal meaning. Thematic meaning was measured by asking subjects to answer two open-ended questions. In terms of contextual meaning, the study found that, when compared to all other threats, nuclear war has a more extreme emotional meaning. In addition, meaning of nuclear war was found to shift across the adult lift span. In terms of thematic meaning, the study identified five themes describing causation and five themes describing effects. Age differences were found in thematic meaning. Oldest subjects emphasized rational causation, while middle-aged and younger subjects emphasized hopelessness and the impact on either inter-generational or intra-generational relationships. Age differences in meaning are discussed in terms of Eriksonian theory of adult development

  4. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  5. Achieving competitive excellence in nuclear energy: The threat of proliferation; the challenge of inertial confinement fusion

    International Nuclear Information System (INIS)

    Nuckolls, J.H.

    1994-06-01

    Nuclear energy will have an expanding role in meeting the twenty-first-century challenges of population and economic growth, energy demand, and global warming. These great challenges are non-linearly coupled and incompletely understood. In the complex global system, achieving competitive excellence for nuclear energy is a multi-dimensional challenge. The growth of nuclear energy will be driven by its margin of economic advantage, as well as by threats to energy security and by growing evidence of global warming. At the same time, the deployment of nuclear energy will be inhibited by concerns about nuclear weapons proliferation, nuclear waste and nuclear reactor safety. These drivers and inhibitors are coupled: for example, in the foreseeable future, proliferation in the Middle East may undermine energy security and increase demand for nuclear energy. The Department of Energy's nuclear weapons laboratories are addressing many of these challenges, including nuclear weapons builddown and nonproliferation, nuclear waste storage and burnup, reactor safety and fuel enrichment, global warming, and the long-range development of fusion energy. Today I will focus on two major program areas at the Lawrence Livermore National Laboratory (LLNL): the proliferation of nuclear weapons and the development of inertial confinement fusion (ICF) energy

  6. Promoting nuclear security: What the IAEA is doing. The Agency is implementing a comprehensive programme aimed at stemming the threat of nuclear terrorism

    International Nuclear Information System (INIS)

    2003-01-01

    The threat to public safety and security posed by some form of nuclear terrorism is not new. But in the wake of recent highly organized terrorist attacks in Kenya, Tanzania, the US, Indonesia, Saudi Arabia, Morocco and numerous other nations, the international community has come to recognize that new and stronger measures must be taken to protect against and prepare for a diverse range of terrorist scenarios. Given the multiplicity of targets and scenarios for terrorists, States must consider a comprehensive approach to combating nuclear terrorism. Among the key priorities: Adequate physical protection of all nuclear materials, radioactive materials and facilities plus transport systems; Proper regulatory control of nuclear and radioactive material; Effective detection and interdiction of illicit trafficking in nuclear and radioactive materials; Integration of nuclear safety and security systems for maximum benefits; and Readiness for implementing emergency response plans. The IAEA is assisting its Member States with these challenges in many ways. Through well-established activities, the Agency has been heavily involved in providing assistance and technical support to States in all these areas. The IAEA has established several advisory services to help Member States to assess the effectiveness and the need for improvement of their national physical oversight systems. The IAEA provides peer reviews in related areas such as regulatory or control infrastructures, and also supplies expert technical advice on the required upgrades. Several of these specialized services aim directly at protecting against terrorist threats. The International Nuclear Security Advisory Service is a new initiative that is providing specialized services promoting enhanced nuclear security. The International SSAC Advisory Service (ISSAS) is another new initiative providing advice to Member States in strengthening their SSAC. The IAEA also offers the EPREV (Emergency Preparedness REView

  7. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    Aslanian, G.; Kouzminov, V.; Martellini, M.; Santesso, R.

    1998-01-01

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  8. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  9. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Ickhyun; Kwon, Kookheui [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2013-05-15

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference.

  10. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    International Nuclear Information System (INIS)

    Shin, Ickhyun; Kwon, Kookheui

    2013-01-01

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference

  11. Nuclear routing networks span between nuclear pore complexes and genomic DNA to guide nucleoplasmic trafficking of biomolecules

    Science.gov (United States)

    Malecki, Marek; Malecki, Bianca

    2012-01-01

    In health and disease, biomolecules, which are involved in gene expression, recombination, or reprogramming have to traffic through the nucleoplasm, between nuclear pore complexes (NPCs) and genomic DNA (gDNA). This trafficking is guided by the recently revealed nuclear routing networks (NRNs). In this study, we aimed to investigate, if the NRNs have established associations with the genomic DNA in situ and if the NRNs have capabilities to bind the DNA de novo. Moreover, we aimed to study further, if nucleoplasmic trafficking of the histones, rRNA, and transgenes’ vectors, between the NPCs and gDNA, is guided by the NRNs. We used Xenopus laevis oocytes as the model system. We engineered the transgenes’ DNA vectors equipped with the SV40 LTA nuclear localization signals (NLS) and/or HIV Rev nuclear export signals (NES). We purified histones, 5S rRNA, and gDNA. We rendered all these molecules superparamagnetic and fluorescent for detection with nuclear magnetic resonance (NMR), total reflection x-ray fluorescence (TXRF), energy dispersive x-ray spectroscopy (EDXS), and electron energy loss spectroscopy (EELS). The NRNs span between the NPCs and genomic DNA. They form firm bonds with the gDNA in situ. After complete digestion of the nucleic acids with the RNases and DNases, the newly added DNA - modified with the dNTP analogs, bonds firmly to the NRNs. Moreover, the NRNs guide the trafficking of the DNA transgenes’ vectors - modified with the SV40 LTA NLS, following their import into the nuclei through the NPCs. The pathway is identical to that of histones. The NRNs also guide the trafficking of the DNA transgenes’ vectors, modified with the HIV Rev NES, to the NPCs, followed by their export out of the nuclei. Ribosomal RNAs follow the same pathway. To summarize, the NRNs are the structures connecting the NPCs and the gDNA. They guide the trafficking of the biomolecules between the NPCs and the gDNA. PMID:23275893

  12. Elderhostelers' coping with nuclear threat: peacemaking and Perception of Lifeworld

    International Nuclear Information System (INIS)

    McCarthy, S.V.

    1988-01-01

    37 persons whose mean age was 71.1 yr., volunteered from an Elderhostel program to participate in a quasiexperimental study of the effect of strategy for coping with nuclear threat on a planetary or lifeworld view. Coping strategy was assessed by the score on 10 forced-choice items of the Peacemaking questionnaire. When 14 high and 10 low scorers were compared on Perception of Lifeworld scores, only chance differences were noted. For this small sample, many scores reached ceiling value because of the insensitivity of the Peacemaking questionnaire. Highly truncated data were also attributed to the fact that Elderhostelers had lived through periods of war and peace. Also, this pilot study coincided with stories in the media in commemoration of the fortieth anniversary of the bombing of Hiroshima and Nagasaki. Replication was recommended

  13. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  14. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, D.

    2005-01-01

    Full text: In support of United States Government (USG) and International Atomic Energy Agency (IAEA) nuclear security programs, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been developed and implemented as the basis for a performance-based methodology for the design and evaluation of physical protection systems against a design basis threat (DBT) for theft and sabotage of nuclear and/or radiological materials. Integrated systems must include technology, people, and the man-machine interface. A critical aspect of the human element is training on the systems-approach for all the stakeholders in nuclear security. Current training courses and workshops have been very beneficial but are still rather limited in scope. SNL has developed two primary international classes - the international training course on the physical protection of nuclear facilities and materials, and the design basis threat methodology workshop. SNL is also completing the development of three new courses that will be offered and presented in the near term. They are vital area identification methodology focused on nuclear power plants to aid in their protection against radiological sabotage, insider threat analysis methodology and protection schemes, and security foundations for competent authority and facility operator stakeholders who are not security professionals. In the long term, we envision a comprehensive nuclear security curriculum that spans policy and technology, regulators and operators, introductory and expert levels, classroom and laboratory/field, and local and offsite training options. This training curriculum will be developed in concert with a nuclear security series of guidance documents that is expected to be forthcoming from the IAEA. It is important to note that while appropriate implementation of systems based on such training and documentation can improve the risk reduction, such a

  15. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  16. Reducing the Threat of Nuclear Terrorism- A Report Card on the Obama Administration’s Efforts

    Science.gov (United States)

    2016-12-01

    using methods that did not require HEU and the recovery of roughly 750 radioisotope thermoelectric...Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE ...December 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE REDUCING THE THREAT OF NUCLEAR TERRORISM—A REPORT CARD ON

  17. Nuclear threat initiative - Kazakhstan project on elimination of high-enriched uranium. 8 October 2005, Ust Kamenogorsk, Kazakhstan

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    Since its establishment in 2001, NTI (Nuclear Threat Initiative) has made important contributions towards securing weapon-usable nuclear material and reducing the threat of nuclear terrorism. Shortly after the terrorist attacks of September 2001, NTI pledged $1.15 million to the Agency?s Nuclear Security Fund, which has been used to achieve tangible nuclear security improvements: upgrades to physical protection of nuclear facilities and nuclear and radioactive material; urgently needed training in nuclear security for national officials; enhanced detection capabilities at border crossings; and improved national and international readiness for responding to terrorist acts. NTI has consistently sought to target its contributions to address areas of high priority. A primary point of focus has been to secure (and, where possible, eliminate) material that could be diverted for weapons purposes. In P roject Vinca , NTI committed $5 million in 2002 to help remove high enriched uranium fuel from a research reactor near Belgrade, for return to Russia. With support from Russia, the United States and NTI, seven transfers of fresh fuel back to Russia have been made since 2002 - a total of 112 kilograms of HEU. Current plans foresee further shipments of fresh HEU from another three countries in the next 15 months. The IAEA is also continuing to work on arrangements for the repatriation of spent research reactor fuel of Russian origin. In 2001, Sam Nunn and NTI president Charles Curtis approached the Kazakh Government to offer support for the safe transportation of the unused nuclear fuel from the shutdown BN-350 reactor - nearly 3000 kilograms - to the Ulba Metallurgical Plant JSC (UMP), where it could be dismantled and down-blended into LEU (NTI-Kazakhstan project). By the end of this year, 2897 kilograms of HEU - enough to produce dozens of nuclear bombs - will have been down-blended to LEU and placed in safe storage. Throughout the project, the IAEA has been implementing

  18. Final report from the NKS NordThreat seminar in Asker

    Energy Technology Data Exchange (ETDEWEB)

    Eikelmann, I M.H.; Selnaes, OE G [eds.; Norwegian Radiation Protection Authority (Norway)

    2009-11-15

    Changes in the international security environment have lead to an increased attention towards the need to revise various threat assessments in the Nordic countries. Together with recent events such as incidents at Nordic nuclear power plants, orphan sources and accidents involving nuclear powered vessels, this has given a good opportunity for an exchange of information and opinions. The NKS-B NordThreat seminar took place at Sem gjestegaard in Asker outside Oslo, Norway on 30 - 31 October 2008. Main topics in the seminar were: 1) National threat assessments 2) Potential hazards 3) Experience from previous incidents 4) Public perception of nuclear and radiological threats and information challenges 5) Challenges for future preparedness. There were about 40 participants at the seminar. These were mainly members of the NKS organisations, invited speakers and representatives from various Norwegian emergency preparedness organisations. (author)

  19. Comparison and discussion of two types of threat (Hazard) categorization method for nuclear facilities

    International Nuclear Information System (INIS)

    Tang, Rongyao; Xu, Xiaoxiao; Zhang, Jiangang; Zhao, Bin

    2008-01-01

    The emergency threat categorization method suggested by international atomic energy agency (IAEA) and hazard categorization standard by the Department of Energy of United States (USDOE) for nuclear facilities are compared and discussed in this paper. The research shows the two types of categorization method for nuclear facility are similar, though each has its own speciality. The categorization method suggested by IAEA is quite completed and sound in scientific basis. The thresholds of radioactive material are connected with the quantity of dangerous source, and the latest radiobiological effect research results are taken in setting the thresholds. While the main purpose is put on emergency management, some of the categorization criteria do not fit for safety surveillance of nuclear facilities. The categorization method of DOE is advanced in its operability, and it fits for safety surveillance. The disadvantage is that the thresholds of radioactive material need to be updated because the parameters used in calculation is outdated, and also the threshold of category 3 is somewhat disputable for many reasons. We should take advantage of both methods and adjust the standards according to the application purpose while establishing the categorization standard of nuclear facilities in China. (author)

  20. Physical protection: threat response and performance goals as applied at the nuclear material inspection and storage (NMIS) building

    International Nuclear Information System (INIS)

    Sanford, T.H.

    1982-01-01

    Only one aspect of nuclear security has been discussed here, a disciplined approach to physical protection systems (PPS) design. The best security against a multitude of threats to the nuclear industry is a dynamic and multifaceted safeguards program. It is one that combines PPS design with employee screening, reliability or behavioral observation programs, procedural control, assessment techniques, response capabilities, and security hardware. To be effective, such a program must be supported by management and applied uniformly to all personnel, including the safeguards and security staff

  1. Clandestine nuclear trade and the threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Spector, L.S.

    1987-01-01

    The nuclear netherworld may ultimately contribute to the danger of nuclear terrorism in at least three ways. First, as national governments exploit this underground market and nuclear weapons spread to additional states, the possibility that terrorists will gain access to them will grow. Such weapons in nuclear threshold countries are likely to be more vulnerable to terrorist seizure than they are in today's more advanced nuclear weapons states. Second, terrorist groups might seek to exploit the nuclear gray market themselves, using the same subterfuges that national governments use. Although in today's nuclear netherworld, subnational groups cannot obtain nuclear arms or nuclear weapons material and cannot hope to build the complex installations needed to produce the latter, they might be able to engage in a form of barter with sympathetic emerging nuclear states (for example, offering raw materials or needed nuclear hardware in return for nuclear weapons material. Finally, there is always the risk that nuclear arms or nuclear weapon materials will someday become available on the nuclear black market. There is evidence indicating that terrorist organizations might well be interested in acquiring such items. Understanding underground nuclear commerce in its current form is essential to prevent such future dangers

  2. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  3. The Nuclear Age: Context for Family Interaction.

    Science.gov (United States)

    Ptacek, Carmen

    1988-01-01

    Suggests that concerns regarding the nuclear threat are prevalent among family members; parents and children feel powerless in response to the nuclear threat; response to the nuclear threat is a family issue; responding to the nuclear threat requires empowering families and changing the social context; and nuclear concerns need to be addressed in…

  4. Final report from the NKS NordThreat seminar in Asker, Norway

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.; Selnaes, Oe.G.

    2009-11-01

    Changes in the international security environment have lead to an increased attention towards the need to revise various threat assessments in the Nordic countries. Together with recent events such as incidents at Nordic nuclear power plants, orphan sources and accidents involving nuclear powered vessels, this has given a good opportunity for an exchange of information and opinions. The NKS-B NordThreat seminar took place at Sem gjestegaerd in Asker outside Oslo, Norway on 30 - 31 October 2008. Main topics in the seminar were: 1) National threat assessments 2) Potential hazards 3) Experience from previous incidents 4) Public perception of nuclear and radiological threats and information challenges 5) Challenges for future preparedness. There were about 40 participants at the seminar. These were mainly members of the NKS organisations, invited speakers and representatives from various Norwegian emergency preparedness organisations. (author)

  5. Nuclear blackmail and nuclear balance

    International Nuclear Information System (INIS)

    Betts, R.K.

    1987-01-01

    This book raises pointed questions about nuclear saber rattling. More than a dozen cases since the bombing of Hiroshima and Magasaki in which some sort of nuclear threat was used as a sparring technique in tense confrontations are cited. Each incident is described and analyzed. Two theories offered to explain America's use of nuclear threats, the balance of interest theory and the balance of power theory, are contrasted throughout the book. This book helps to fill the gap in the understanding of nuclear weapons and their uses, while pointing out that nuclear bravado could lead to an unintended unleashing of these weapons

  6. Development, use and maintenance of the design basis threat. Implementing guide

    International Nuclear Information System (INIS)

    2009-01-01

    In response to a resolution by the IAEA General Conference in September 2002, the IAEA adopted an integrated approach to protection against nuclear terrorism. This approach coordinates IAEA activities concerned with physical protection of nuclear material and nuclear installations, nuclear material accountancy, detection of and response to trafficking in nuclear and other radioactive material, the security of radioactive sources, security in the transport of nuclear and other radioactive material, emergency response and emergency preparedness in Member States and at the IAEA, and promotion of adherence by States to relevant international instruments. The IAEA also helps to identify threats and vulnerability related to the security of nuclear and other radioactive material. However, it is the responsibility of the States to provide for the physical protection of nuclear and other radioactive material and associated facilities, to ensure the security of such material in transport, and to combat illicit trafficking and the inadvertent movement of radioactive material. Physical protection systems are intended to prevent unacceptable consequences arising from malicious activities. The more serious the consequences, the more important it is to have a high degree of confidence that physical protection will be effective as planned. The need for a high level of confidence in the effectiveness of physical protection has long been recognized by those concerned about nuclear material and nuclear facilities. Nuclear material and facilities have the potential for a variety of unacceptable radiological and proliferation consequences if subjected to a malicious act. The highest level of confidence in physical protection demands a close correlation between protective measures and the threat. This approach is firmly grounded in the fundamental principle that physical protection of nuclear assets under the jurisdiction of a State should be based on the State's evaluation of the

  7. Severe accidents and terrorist threats at nuclear reactors

    International Nuclear Information System (INIS)

    Pollack, G.L.

    1987-01-01

    Some of the key areas of uncertainty are the nature of the physical and chemical interactions of released fission products and of the interactions between a molten core and concrete, the completeness and validity of the computer codes used to predict accidents, and the behavior of the containment. Because of these and other uncertainties, it is not yet possible to reliably predict the consequences of reactor accidents. It is known that for many accident scenarios, especially less severe ones or where the containment is not seriously compromised, the amount of radioactive material expected to escape the reactor is less, even much less, than was previously calculated. For such accidents, the predictions are easier and more reliable. With severe accidents, however, there is considerable uncertainty as to the predicted results. For accidents of the type that terrorists might cause - for example, where the sequence of failure would be unexpected or where redundant safety features are caused to fail together - the uncertainties are still larger. The conclusion, then, is that there are potential dangers to the public from terrorist actions at a nuclear reactor; however, because of the variety of potential terrorist threats and the incompleteness of the knowledge about the behavior of reactor components and fission products during accidents, the consequences cannot yet be assessed quantitatively

  8. Inclusion of Premeditated Threats in the Safety Methodology for NPPs

    International Nuclear Information System (INIS)

    Levanon, I.

    2014-01-01

    During the last decade the global effort to prevent terrorism or to mitigate its harm, if prevention fails, has increased. The nuclear power community was involved in this effort trying to prevent terrorist attacks on NPPs (Nuclear Power Plants). A natural extension of terror restraining is the prevention of any premeditated damage to the plant, including acts of state. The pre-feasibility study of an Israeli NPP, conducted by the Ministry of National Infrastructures, has identified the risk of hostile damage to the NPP as a major obstacle to the establishment of nuclear power in Israel, second only to the refusal of nuclear exporting nations to sell an NPP to Israelv. The General Director of the Ministry and the Head of the IAEC (Israeli Atomic Energy Commission) have approved continuation of the pre-feasibility study. This synopsis presents a study, regarding premeditated threats to NPPs, commissioned by the Ministry of National Infrastructures as part of the continuation. It focuses on the safety aspect of premeditated threats originating outside the plant, although a significant part of the analysis can be extended to other subjects such as theft or diversion of strategic materials. The study deals only with methodology and does not encompass specific threats or protection measures. Conclusions and recommendations and marked by bold italics Arial font. The theory of nuclear safety regarding non-premeditated safety events (equipment failures, human errors, natural events, etc.) is well developed. The study refers to these events and the theory attached to them as c lassical , distinguishing them from premeditated events. The study defines two postulates, related to premeditated threats: Correspondence – We should adopt the classical methodology whenever possible. Regulation – The safety of an NPP from premeditated threats requires examination, approval and inspection by a regulator. Key issues of the methodology with substantial differences from the

  9. Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations.

    Energy Technology Data Exchange (ETDEWEB)

    Cochran, John Russell; Ouchi, Yuichiro (Japan Atomic Energy Agency, Japan); Furaus, James Phillip; Marincel, Michelle K.

    2008-03-01

    This report summarizes the results of three detailed studies of the physical protection systems for the protection of nuclear materials transport in Japan, with an emphasis on the transportation of mixed oxide fuel materials1. The Japanese infrastructure for transporting nuclear fuel materials is addressed in the first section. The second section of this report presents a summary of baseline data from the open literature on the threats of sabotage and theft during the transport of nuclear fuel materials in Japan. The third section summarizes a review of current International Atomic Energy Agency, Japanese and United States guidelines and regulations concerning the physical protection for the transportation of nuclear fuel materials.

  10. What About the Children? The Threat of Nuclear War and Our Responsibility to Preserve this Planet for Future Generations.

    Science.gov (United States)

    Hawkes, Glenn W.

    Part of a global effort, this brochure was written to increase understanding of the threat nuclear war poses to children. Several issues are raised and briefly discussed, including (1) the present capacity for annihilating the next generation or ending human life on this planet, (2) the inadequacy of deterrence, (3) the suffering of children after…

  11. Managing threats from emerging technologies: can safeguards show the way?

    International Nuclear Information System (INIS)

    Leffer, Teri N.

    2014-01-01

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  12. Illegal handling of radioactive and nuclear materials. Threats and suggestions for measures

    International Nuclear Information System (INIS)

    Oliver, Lena; Melin, Lena; Prawitz, Jan; Ringbom, Anders; Sandstroem, Bjoern; Wigg, Lars; Wirstam, Jens

    2004-01-01

    This project deals with threats from smuggling or other illegal transportation of radioactive or nuclear materials across the borders to Sweden, and with the security of handling such materials in Sweden. The project has included studies of relevant documentation; visits and interviews at industries, hospitals, research institutes and military institutions in Sweden that handle radioactive materials; a pilot study at the Stockholm freeport, where equipment for detection of radioactive materials has been tested for six months; an analysis of incidents reported to the IAEA database; and an analysis of Swedish incidents. The following conclusions are drawn: Stricter rules regarding the physical protection of radiation sources and radioactive materials should be implemented in Sweden. The recommendations recently issued by IAEA should serve as a point of departure for working out such rules

  13. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  14. Nuclear Security and the Way Forward

    International Nuclear Information System (INIS)

    Mrabit, Khammar

    2013-01-01

    Nuclear security has always been taken seriously. There is ample evidence that traditional deterrence does not necessarily obstruct those with malicious intent, who can also operate across borders. This understanding of the threat has highlighted the need to adopt a vigorous approach to protecting nuclear materials, associated facilities and activities in order to strengthen nuclear security worldwide. States recognize that there is a credible threat of nuclear or other radioactive material falling into the wrong hands and that this threat is global. An international legal framework for nuclear security, national nuclear security infrastructures, and the IAEA's leading role are some of the building blocks of an effective international nuclear security framework that contributes to effectively addressing this threat

  15. 75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Science.gov (United States)

    2010-05-28

    ... management; c. Nuclear deterrence transformation; d. Weapons effects; and e. Other Office of the Under... Reduction Agency on the following: a. Reducing the threat posed by nuclear, biological, chemical...

  16. Nuclear threats in the vicinity of the Nordic countries. A database, Nordic Nuclear Safety Research

    International Nuclear Information System (INIS)

    Margrethe, I.; Eikelmann, H.

    2003-01-01

    The acute phase of an accident and the possibility of high exposure of the populations are always the most important threats in the emergency preparedness work. Radioactive contamination from an accident can however also cause long time effects for land use and enhanced doses to special population groups and economic problems for agriculture, grazing animals, reindeer industry, hunting, freshwater fishing, tourism and recreation. For planning purposes it is always valuable to be aware of potential radiation hazard and other potential threats in the vicinity of the Nordic countries. Thus, mapping such threats in a Nordic context is an important factor in emergency preparedness in the Nordic countries. The project has dealt with threats from the north west of Russia and the Baltic states. The results from the different activities in the project is generated in a web based database called the 'the base of knowledge'. (orig.)

  17. Taking Steps to Protect Against the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Noah Gale [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Martha [Tetra Tech HEI; Powell, TN (United States); Lewis, Joel [Gregg Protection Services; Lynchburg, VA (United States); Pham, Thomas [United States Nuclear Regulatory Commission; CHattanooga, TN (United States)

    2015-10-16

    Research reactors are required (in accordance with the Safeguards Agreement between the State and the IAEA) to maintain a system of nuclear material accounting and control for reporting quantities of nuclear material received, shipped, and held on inventory. Enhancements to the existing accounting and control system can be made at little additional cost to the facility, and these enhancements can make nuclear material accounting and control useful for nuclear security. In particular, nuclear material accounting and control measures can be useful in protecting against an insider who is intent on unauthorized removal or misuse of nuclear material or misuse of equipment. An enhanced nuclear material accounting and control system that responds to nuclear security is described in NSS-25G, Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities, which is scheduled for distribution by the IAEA Department of Nuclear Security later this year. Accounting and control measures that respond to the insider threat are also described in NSS-33, Establishing a System for Control of Nuclear Material for Nuclear Security Purposes at a Facility During Storage, Use and Movement, and in NSS-41, Preventive and Protective Measures against Insider Threats (originally issued as NSS-08), which are available in draft form. This paper describes enhancements to existing material control and accounting systems that are specific to research reactors, and shows how they are important to nuclear security and protecting against an insider.

  18. Assessment of the Emerging Biocruise Threat

    Science.gov (United States)

    2000-08-01

    more about Los Angeles than they do about Taiwan.”15 And obviously believing in the efficacy of their long-range nuclear missile capability in... vaccinated against anthrax. Apparently, Hussein was deterred from using his WMD by U.S. and Israeli threats of nuclear retaliation. The credibility of the...gangrene, aflatoxin, trichothecene mycotoxins, wheat cover smut, ricin, hemorrhagic conjunctivitis virus, rotavirus , camel pox Israel Researching

  19. Development, Use and Maintenance of the Design Basis Threat. Implementing Guide (Arabic Edition)

    International Nuclear Information System (INIS)

    2009-01-01

    In response to a resolution by the IAEA General Conference in September 2002, the IAEA adopted an integrated approach to protection against nuclear terrorism. This approach coordinates IAEA activities concerned with physical protection of nuclear material and nuclear installations, nuclear material accountancy, detection of and response to trafficking in nuclear and other radioactive material, the security of radioactive sources, security in the transport of nuclear and other radioactive material, emergency response and emergency preparedness in Member States and at the IAEA, and promotion of adherence by States to relevant international instruments. The IAEA also helps to identify threats and vulnerability related to the security of nuclear and other radioactive material. However, it is the responsibility of the States to provide for the physical protection of nuclear and other radioactive material and associated facilities, to ensure the security of such material in transport, and to combat illicit trafficking and the inadvertent movement of radioactive material. Physical protection systems are intended to prevent unacceptable consequences arising from malicious activities. The more serious the consequences, the more important it is to have a high degree of confidence that physical protection will be effective as planned. The need for a high level of confidence in the effectiveness of physical protection has long been recognized by those concerned about nuclear material and nuclear facilities. Nuclear material and facilities have the potential for a variety of unacceptable radiological and proliferation consequences if subjected to a malicious act. The highest level of confidence in physical protection demands a close correlation between protective measures and the threat. This approach is firmly grounded in the fundamental principle that physical protection of nuclear assets under the jurisdiction of a State should be based on the State's evaluation of the

  20. Protecting the source. Securing nuclear material and strong radiation sources. New threats of terrorism are prompting the need for swift action to better secure nuclear material and strong radiation sources. Are measures already in place enough? The Stanford-Salzburg initiative suggests not

    International Nuclear Information System (INIS)

    Steinhausler, F.; Bunn, G.

    2003-01-01

    At a time of growing concern over threats of terrorism, the security of nuclear and radioactive material is an urgent and serious issue. Working with a range of partners, the IAEA has put into place a multi-faceted Action Plan to help countries upgrade their capabilities. But more needs to be done to counter new types of threats. One particular area that needs to be strengthened is the physical protection of nuclear and radioactive material. The attacks of 11 September 2001 opened our eyes to i he urgent need to strengthen national physical protection (PP) practices for nuclear and other radioactive material. The principle that highly radioactive material will protect itself does not apply to the newest generation of terrorists. Existing PP systems were not designed to deal with the threat of suicidal terrorists commanding the numbers, skills, training, and resources available to those who carried out the attacks in the US. Moreover, because there are no mandatory international standards for domestic PP systems for nuclear or radioactive material, protection measures vary greatly from country to country. The IAEA recommended standards (Inference/225/Rev. 4) were not designed with the new terrorist threats in mind and national practices often fall short of even these recommendations. The result is inadequate protection against the new form of terrorism. Few argue the point that national physical protection practices for nuclear and other radioactive material need to be strengthened. This article summarizes a Stanford-Salzburg plan developed by experts from Stanford University's Center for International Security and Cooperation, (USA) and revised at the EU-Physical Protection NUMAT Conference in September 2002 in Salzburg, Austria. It includes six recommended elements to consider in addition to what the IAEA is now doing to improve PP practices around the world: Establish a global list of physical protection priorities; Create a multilateral security cooperation

  1. The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices

    International Nuclear Information System (INIS)

    Maerli, Morten Bremer

    2001-01-01

    Full text: Conventional weaponry and tactics are likely to remain the primary terrorist means for a definitive majority of sub-national groups. No non-state actors have ever deployed or used a nuclear device. However, recent developments in international terrorism may point in the direction of future terrorist uses of weapons of mass destruction, including nuclear devices. Some terrorist groups with a high international profile have showed disturbing interests in acquiring nuclear weapon capabilities. As the 'terrorist nuclear weapon standards' are likely to be lower than the strict requirements for traditional state nuclear weapons, technical barriers should not be considered sufficient to avoid future nuclear terrorist violence. Preventing any extremist group from achieving their goals of large-scale nuclear killing is likely best done by preventing the access to fissile materials through state compliances to rigorous standards of Material Protection, Control and Accountability (MPC and A). (author)

  2. Corruption analysis and life span forecast research on sylphon bellows of nuclear-powered steam system of ship

    International Nuclear Information System (INIS)

    Song Chao; Chen Lisheng; Song Meicun; Wang Wei

    2012-01-01

    The fracture of the corrugated pipe has a dad effect to the operation of reactor which can cause the small-break LOCA. The corrosion is the key reason of the fracture. On the base of the analysis on corruption reason of the sylphon bellows and combine the characteristic of the limited sample point of it, the Grey theory was used in the assessment of corrosion life span of corrugated pipe in nuclear steam system. Through applying the GM (1, 1) model in inferring the discipline of corrosion quantity and combining traditional statistical method, the corrosion life of steam pipe was evaluated. It indicates that the model is precise, simple and the result is reliable. (authors)

  3. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  4. A review on nuclear forensic methodology for analysis of nuclear material of unknown origin

    International Nuclear Information System (INIS)

    Deshmukh, A.V.; Raghav, N.K.; Fatangare, N.M.; Jagtap, S.S.

    2014-01-01

    With the growing use of nuclear power and threat from illegal nuclear smuggling nuclear forensic provides an aid to the law enforcement to trace back modus operandi of such threats. Extensive nuclear proliferation, race among countries to acquire nuclear capability and global terrorism scenario has mandated Nuclear Forensic Science technology to tackle nuclear threats. Gamma spectrometry, alpha spectrometry, thermal ionization mass spectrometry, inductively coupled plasma mass spectrometry are employed for characterization and relative isotopic composition determinant of Nuclear material and techniques like SEM transmission electron TEM, FT-IR, GC-MS, Electrophoretic technique are used to characterize the contaminated materials in order to deceive investigative agencies. The present paper provide systematic forensic methodology for nuclear and radioactive materials encountered at any crime scene due to any accidental discharges or military activities. (author)

  5. The nuclear threat, ethics and Pugwash

    International Nuclear Information System (INIS)

    Smith, P.B.

    1999-01-01

    When nuclear weapon states had succeeded in guaranteeing their continued, unchallenged, monopoly on the possession of nuclear weapons in the negotiations for a Comprehensive Test Ban, the process of achieving nuclear disarmament was slowed down. Fortunately when some 60 retired generals and admirals from all over the world called for elimination of nuclear weapons there arose some hope. The role of Pugwash movement concerning disarmament an be concisely formulated by the following oath: I will not use my scientific training for any purpose which I believe is intended to harm human beings; I shall strive for peace, justice, freedom and the betterment of the human condition

  6. Defense Threat Reduction Agency Radiochemical Needs

    Science.gov (United States)

    Walsh, Michael A. R.; Velazquez, Daniel L.

    2009-08-01

    The United States Government (USG) first developed nuclear forensics-related capabilities to analyze radiological and nuclear materials, including underground nuclear test debris and interdicted materials. Nuclear forensics is not a new mission for Department of Defense (DoD). The department's existing nuclear forensics capability is the result of programs that span six (6) decades and includes activities to assess foreign nuclear weapons testing activities, monitor and verify nuclear arms control treaties, and to support intelligence and law enforcement activities. Today, nuclear forensics must support not only weapons programs and nuclear smuggling incidents, but also the scientific analysis and subsequent attribution of terrorists' use of radiological or nuclear materials/devices. Nuclear forensics can help divulge the source of origin of nuclear materials, the type of design for an interdicted or detonated device, as well as the pathway of the materials or device to the incident. To accomplish this mission, the USG will need trained radiochemists and nuclear scientists to fill new positions and replace the retiring staff.

  7. Defense Threat Reduction Agency Radiochemical Needs

    International Nuclear Information System (INIS)

    Walsh, Michael A. R.; Velazquez, Daniel L.

    2009-01-01

    The United States Government (USG) first developed nuclear forensics-related capabilities to analyze radiological and nuclear materials, including underground nuclear test debris and interdicted materials. Nuclear forensics is not a new mission for Department of Defense (DoD). The department's existing nuclear forensics capability is the result of programs that span six (6) decades and includes activities to assess foreign nuclear weapons testing activities, monitor and verify nuclear arms control treaties, and to support intelligence and law enforcement activities. Today, nuclear forensics must support not only weapons programs and nuclear smuggling incidents, but also the scientific analysis and subsequent attribution of terrorists' use of radiological or nuclear materials/devices. Nuclear forensics can help divulge the source of origin of nuclear materials, the type of design for an interdicted or detonated device, as well as the pathway of the materials or device to the incident. To accomplish this mission, the USG will need trained radiochemists and nuclear scientists to fill new positions and replace the retiring staff.

  8. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  9. Views of the state customs committee of Russian Federation to system approach to threat evaluation and development of a national system of counteraction of the illicit trafficking of nuclear and/or radioactive materials (nuclear facility - territory - border)

    International Nuclear Information System (INIS)

    Vasiliev, I.; Kravchenko, N.; Babich, D.

    2002-01-01

    Full text: It is well known that until recently the efforts of the national structures and international organizations were focused on nuclear objects to provide conditions preventing non-proliferation of nuclear materials. However, various countries possess plenty of radioactive materials (nuclear and other kind of radioactive materials) used in different areas (medicine, crack detection, oil and gas production, mining, science, etc.). Those materials are used and stored within the objects, which lack a strict monitoring system of non-proliferation control. Therefore, for every country three areas of threat of illicit trafficking of radioactive materials (ITRM) can be pointed out: an object containing radioactive materials, the territory of the country, the border. Each area must have the bodies responsible for ITRM prevention, which are appointed by the national legislation. Within the first area: competent body in the field of atomic power application; owners of enterprises (not only state structures); the structure of the Ministry of Defense; police; intelligence services. Within the second area: police; intelligence services. Within the third area: customs; border guards. Analyzing possible threat of ITRM within these three interrelated areas, one can specify a number of specific threats for each responsibility area: at an object, on the territory of the country, at the border. (author)

  10. Potential for nuclear terrorism

    International Nuclear Information System (INIS)

    Jenkins, B.M.

    1977-05-01

    The question of whether or not terrorists will ''go nuclear'' is discussed. It is possible, although there is no historical evidence that any criminal or terrorist group ever made any attempt to acquire nuclear material for use in an explosive or dispersal device. In terms of intentions, psychotics are potential nuclear terrorists, but in terms of capabilities, they are the farthest away from being able to acquire a nuclear weapon. The history of nuclear incidents in the U.S. and abroad is reviewed. As the nuclear industry expands, the number of low-level incidents (bomb threats, pilferage, etc.) will increase also, but not necessarily escalate to more serious incidents. Terrorists may ''go nuclear'' solely for the publicity value; nuclear hoaxes may be attenpted. Nuclear terrorism seems more attractive as a threat than as an action. But the nature of the threat may change in the future, and the danger of imitation of a successful nuclear terrorist act is pointed out

  11. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  12. Consideration on Measures against Insiders Threats in ROK

    International Nuclear Information System (INIS)

    Lee, Seungmin; Yim, Hobin; Hong, Yunjeong

    2015-01-01

    They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. Because of these reasons, IAEA published 'The Implementing Guide Preventive and Protective Measures against Insider Threats, IAEA Nuclear Security Series No. 8' to help understanding of the Member States. This paper focus on the current status of the measures to prevent, detect and respond to potential insiders at nuclear facilities in Republic of KOREA. Insiders are able to take advantage of their access rights and knowledge of facilities where they are working or have worked to bypass dedicated security measures. Therefore, insiders can be the most dangerous threats to cyber security, safety measures, and material control and accountancy of nuclear facilities. Preventive and protective measures against the potential insiders in the nuclear facilities are yet insufficient according to the security inspection results. Especially, preventive and protective measures for unauthorized removal of nuclear material by insiders are the weakest area of whole security systems and should be further strengthened

  13. Consideration on Measures against Insiders Threats in ROK

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Seungmin; Yim, Hobin; Hong, Yunjeong [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. Because of these reasons, IAEA published 'The Implementing Guide Preventive and Protective Measures against Insider Threats, IAEA Nuclear Security Series No. 8' to help understanding of the Member States. This paper focus on the current status of the measures to prevent, detect and respond to potential insiders at nuclear facilities in Republic of KOREA. Insiders are able to take advantage of their access rights and knowledge of facilities where they are working or have worked to bypass dedicated security measures. Therefore, insiders can be the most dangerous threats to cyber security, safety measures, and material control and accountancy of nuclear facilities. Preventive and protective measures against the potential insiders in the nuclear facilities are yet insufficient according to the security inspection results. Especially, preventive and protective measures for unauthorized removal of nuclear material by insiders are the weakest area of whole security systems and should be further strengthened.

  14. Preventing radiological threat in the Republic of Azerbaijan

    International Nuclear Information System (INIS)

    Gabulov, I.A.

    2005-01-01

    Full text: Azerbaijan is a developing and transit country in the Caucasus, connecting East and West. In addition, Azerbaijan is neighboring countries with pronounced political instability, some of which have extensive nuclear infrastructure or try to develop nuclear infrastructure. Furthermore, in the recent past fundamentalist religious terrorism has taken roots in some of these countries. Therefore, in spite of the fact that the Republic of Azerbaijan has no nuclear facilities or nuclear materials in its own territory, it could be interesting for terrorist groups trying to develop a crude radiological dispersal device using radioactive sources that are widely used in everyday life especially in such areas as oil industry, medicine, agriculture and scientific researches. The issues of reduction and prevention of both radiological and nuclear terrorism threat are one of the main global challenges around the world. The Republic of Azerbaijan is a part of world community and so we are concerned that radioactive sources used for peaceful applications could be stolen by the terrorist groups and used in the development of radiological dispersal devices sometimes referred to as a 'dirty bomb'. It is obvious that using highly radioactive materials in radiological dispersal devices could be very disruptive to society, causing panic, environmental contamination, and large financial losses. One of the ways for reduction and prevention of radiological threat for the countries like Azerbaijan with underdeveloped nuclear security and radiation safety infrastructure is closely participation in the international cooperation programs. As an example of such cooperation, I would like to present the United States Department of Energy's International Radiological Threat Reduction (IRTR) Program. Good progress has made in the field of radiological security within the framework of this program that was started 2003. Actually, in comparison with any IAEA programs, the progress reached by

  15. Strengths, weaknesses, opportunities and threats – swot analysis regarding the romanian participation in euratom programmes on nuclear safety topic

    International Nuclear Information System (INIS)

    Apostol, M.; Constantin, M.; Diaconu, D.

    2013-01-01

    In the frame of FP7 - NEWLANCER project, SWOT analysis (Strengths, Weaknesses, Opportunities and Threats) was performed by each partner from New Member States (NMS) in order to provide valuable input for the development of policies aimed to increase the participation of the NMS in Euratom programmes on the following topics: Generation III and IV systems and materials, Nuclear safety, Radioprotection, Radioactive waste management, and Education and training. The final objective of SWOT analysis performed by National Expert Groups on Nuclear Safety (NS) topic was to propose strategies, in order to reduce the influence of identified negative factors and to enhance influence of identified positive factors, regarding Romanian participation in Euratom programmes. (authors)

  16. Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    Nuclear material accounting and control (NMAC) works in a complementary fashion with the international safeguards programme and physical protection systems to help prevent, deter or detect the unauthorized acquisition and use of nuclear materials. These three methodologies are employed by Member States to defend against external threats, internal threats and both state actors and non-state actors. This publication offers guidance for implementing NMAC measures for nuclear security at the nuclear facility level. It focuses on measures to mitigate the risk posed by insider threats and describes elements of a programme that can be implemented at a nuclear facility in coordination with the physical protection system for the purpose of deterring and detecting unauthorized removal of nuclear material

  17. Nuclear emergency preparedness in the Nordic and Baltic Sea countries

    Energy Technology Data Exchange (ETDEWEB)

    Jaworska, A. [Norwegian Radiation Protection Authority (Norway)

    2002-07-01

    Radiation emergency preparedness systems must be able to deal with the threats posed to each country and the region as a whole. The threats from nuclear accidents differ in the various countries of the region. The most serious nuclear threats are those with cross-border implications and are generally assumed to be due to the presence of nuclear reactors of various kinds. Some countries in the region, Finland, Germany, Lithuania, the Russian Federation and Sweden, have nuclear power plants, and several countries in the region possess smaller research reactors. Other nuclear threats arise from nuclear powered naval vessels or submarines, and from nuclear powered satellites. Production, transportation, use, and disposal of radioactive materials constitute potential local nuclear hazards. Finally, terrorist use of radioactive material poses a nuclear threat to all countries. (au)

  18. Nuclear emergency preparedness in the Nordic and Baltic Sea countries

    International Nuclear Information System (INIS)

    Jaworska, A.

    2002-01-01

    Radiation emergency preparedness systems must be able to deal with the threats posed to each country and the region as a whole. The threats from nuclear accidents differ in the various countries of the region. The most serious nuclear threats are those with cross-border implications and are generally assumed to be due to the presence of nuclear reactors of various kinds. Some countries in the region, Finland, Germany, Lithuania, the Russian Federation and Sweden, have nuclear power plants, and several countries in the region possess smaller research reactors. Other nuclear threats arise from nuclear powered naval vessels or submarines, and from nuclear powered satellites. Production, transportation, use, and disposal of radioactive materials constitute potential local nuclear hazards. Finally, terrorist use of radioactive material poses a nuclear threat to all countries. (au)

  19. Planning a radar system for protection from the airborne threat

    International Nuclear Information System (INIS)

    Greneker, E.F.; McGee, M.C.

    1986-01-01

    A planning methodology for developing a radar system to protect nuclear materials facilities from the airborne threat is presented. Planning for physical security to counter the airborne threat is becoming even more important because hostile acts by terrorists are increasing and airborne platforms that can be used to bypass physical barriers are readily available. The comprehensive system planning process includes threat and facility surveys, defense hardening, analysis of detection and early warning requirements, optimization of sensor mix and placement, and system implementation considerations

  20. Strengthened implementation of physical protection of nuclear material and nuclear facilities in the Republic of Korea

    International Nuclear Information System (INIS)

    Shim, H.-W.; Lee, J.-U.

    2005-01-01

    Full text: Since the 9.11 terror, strengthening physical protection has been an accelerated trend internationally. IAEA has been requesting that member states implement a strengthened physical protection of nuclear facilities on the basis of threat assessments. In order to cope with this demand, the Korean government promulgated the 'Law for Physical Protection and Radiological Emergency Preparedness (LPPRE)' as a substantial countermeasure against possible threats. Pursuant to LPPRE, which entered into force on February 16, 2004, nuclear enterprisers are obliged to implement an effective physical protection of nuclear materials, get approval for its physical protection system, and be constantly inspected on. The Ministry of Science and Technology (MOST) approved physical protection regulations of 24 domestic facilities operated by 14 enterprisers. National Nuclear management and Control Agency (NNCA) is entrusted with physical protection related duty and has been conducting physical protection inspection on nuclear materials in use, storage and transport. In addition, NNCA has established the methodology of threat assessment that entails organizing the threat assessment working group to develop a design basis threat (DBT). Korea is putting its best efforts to construct the threat assessment system and strengthen domestic physical protection regime in cooperation with competent authorities. (author)

  1. The application of nuclear and national security safeguard strategies to the insider threat in the private sector

    International Nuclear Information System (INIS)

    Campbell, G.K.

    1991-01-01

    This paper reports that the insider threat in commercial enterprises represents multi-billion dollar losses on an annual basis. While much of this experience is in low value, theft-related shrinkage, there are a growing number of organizations where the loss or compromise of critical assets or interruption of vital systems cannot be tolerated. In very real ways, the survival of the organization may turn on the hostile acts of knowledgeable insiders. The nuclear and National security information operations environments represents a baseline of experience from which the corporate world can draw for cost-effective, alternative approaches to this threat. However, it is equally clear that there are a variety of subtle and obvious constraints imposed by the private sector's mission, service delivery, lifestyle and cost-benefit requirements which dictate careful planning and user involvement in safeguards development and application. Where protection of our National security assets are grounded in a consequence-driven set of policies and standards, the private sector is often subject to the lack of a similar (but directly analogous) policy foundation

  2. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  3. Age Differences in Selective Memory of Goal-Relevant Stimuli Under Threat.

    Science.gov (United States)

    Durbin, Kelly A; Clewett, David; Huang, Ringo; Mather, Mara

    2018-02-01

    When faced with threat, people often selectively focus on and remember the most pertinent information while simultaneously ignoring any irrelevant information. Filtering distractors under arousal requires inhibitory mechanisms, which take time to recruit and often decline in older age. Despite the adaptive nature of this ability, relatively little research has examined how both threat and time spent preparing these inhibitory mechanisms affect selective memory for goal-relevant information across the life span. In this study, 32 younger and 31 older adults were asked to encode task-relevant scenes, while ignoring transparent task-irrelevant objects superimposed onto them. Threat levels were increased on some trials by threatening participants with monetary deductions if they later forgot scenes that followed threat cues. We also varied the time between threat induction and a to-be-encoded scene (i.e., 2 s, 4 s, 6 s) to determine whether both threat and timing effects on memory selectivity differ by age. We found that age differences in memory selectivity only emerged after participants spent a long time (i.e., 6 s) preparing for selective encoding. Critically, this time-dependent age difference occurred under threatening, but not neutral, conditions. Under threat, longer preparation time led to enhanced memory for task-relevant scenes and greater memory suppression of task-irrelevant objects in younger adults. In contrast, increased preparation time after threat induction had no effect on older adults' scene memory and actually worsened memory suppression of task-irrelevant objects. These findings suggest that increased time to prepare top-down encoding processes benefits younger, but not older, adults' selective memory for goal-relevant information under threat. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  4. Threats and benefits updated information on local opinions regarding the spent nuclear fuel repository in Finland - 16128

    International Nuclear Information System (INIS)

    Kojo, Matti; Kari, Mika; Litmanen, Tapio

    2009-01-01

    The aim of the paper is to provide updated information on local opinion regarding the siting of a spent nuclear fuel repository in Finland. The main question is how the residents of the municipality perceive the threats and benefits of the repository. In accordance with the Decision in Principle by the Council of State passed in 2000, the Olkiluoto area in Municipality of Eurajoki was chosen as the location for the repository to accommodate spent nuclear fuel produced in Finland. Updated information on local opinions is needed as the siting process is approaching the next phase, the application for a construction license by 2012. The nuclear waste management company Posiva, owned by the utilities Teollisuuden Voima and Fortum Power and Heat, has also applied for a new Decision in Principle (DiP) for expansion of the repository. The data provided in this paper is based on a survey carried out in June 2008. The respondents were selected from the residents of the municipality of Eurajoki and the neighbouring municipalities using stratified random sampling (N=3000). The response rate of the survey was 20% (N=606). The paper is part of a joint research project between the University of Jyvaeskylae and the University of Tampere. The research project 'Follow-up research regarding socio-economic effects and communication of final disposal facility of spent nuclear fuel in Eurajoki and its neighbouring municipalities' is funded by the Finnish Research Programme on Nuclear Waste Management (KYT2010). (authors)

  5. Nuclear fear and children: the impact of parental nuclear activism, responsivity, and fear

    Energy Technology Data Exchange (ETDEWEB)

    LaGuardia, M.R.

    1986-01-01

    This study examines the extent to which parental nuclear fear, parental activism, and parental responsivity is associated with children's (age 10) nuclear fear. Other associated variables investigated include: nuclear denial, general anxiety and fear, and the personal characteristics of sex, socio-economic status, and academic aptitude. Findings indicate that children attend to nuclear issues when their parents attend to a significant degree. Children's hopelessness about the arms race is increased as parents' worry about nuclear war increases. Children's fear about not surviving a nuclear war increases as parents' worry about survivability decreases. Children who have more general fears also indicated that they have a high level of hopelessness, pervasive worry, and much concern about being able to survive a nuclear war. Children with a high degree of general anxiety did not indicate high degrees of nuclear fears. Children with high academic aptitude were more knowledgeable about nuclear issues and expressed more fears about the nuclear threat. Boys demonstrated more knowledge about nuclear issues than girls, and girls expressed much more frequent fear and worry about the nuclear threat than boys. Parents of lower socio-economic statues (SES) expressed more denial about the nuclear threat and were more pro-military than the higher SES parents.

  6. Computer Security of NPP Instrumentation and Control Systems: Cyber Threats

    International Nuclear Information System (INIS)

    Klevtsov, A.L.; Trubchaninov, S.A.

    2015-01-01

    The paper is devoted to cyber threats, as one of the aspects in computer security of instrumentation and control systems for nuclear power plants (NPP). The basic concepts, terms and definitions are shortly addressed. The paper presents a detailed analysis of potential cyber threats during the design and operation of NPP instrumentation and control systems. Eleven major types of threats are considered, including: the malicious software and hardware Trojans (in particular, in commercial-off-the-shelf software and hardware), computer attacks through data networks and intrusion of malicious software from an external storage media and portable devices. Particular attention is paid to the potential use of lower safety class software as a way of harmful effects (including the intrusion of malicious fragments of code) on higher safety class software. The examples of actual incidents at various nuclear facilities caused by intentional cyber attacks or unintentional computer errors during the operation of software of systems important to NPP safety.

  7. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  8. Estimating the Nucleotide Diversity in Ceratodon purpureus (Ditrichaceae from 218 Conserved Exon-Primed, Intron-Spanning Nuclear Loci

    Directory of Open Access Journals (Sweden)

    Stuart F. McDaniel

    2013-04-01

    Full Text Available Premise of the study: We developed and tested primers for 218 nuclear loci for studying population genetics, phylogeography, and genome evolution in bryophytes. Methods and Results: We aligned expressed sequence tags (ESTs from Ceratodon purpureus to the Physcomitrella patens genome sequence, and designed primers that are homologous to conserved exons but span introns in the P. patens genome. We tested these primers on four isolates from New York, USA; Otavalo, Ecuador; and two laboratory isolates from Austria (WT4 and GG1. The median genome-wide nucleotide diversity was 0.008 substitutions/site, but the range was large (0–0.14, illustrating the among-locus heterogeneity in the species. Conclusions: These loci provide a valuable resource for finely resolved, genome-wide population genetic and species-level phylogenetic analyses of C. purpureus and its relatives.

  9. Lab-to-Lab Cooperative Threat Reduction

    Science.gov (United States)

    Hecker, Siegfried S.

    2017-11-01

    It is difficult to imagine today how dramatically global nuclear risks changed 25 years ago as the Soviet Union disintegrated. Instead of the threat of mutual nuclear annihilation, the world became concerned that Russia and the other 14 former Soviet states would lose control of their huge nuclear assets - tens of thousands of nuclear weapons, more than a million kilograms of fissile materials, hundreds of thousands of nuclear workers, and a huge nuclear complex. I will describe how scientists and engineers at the DOE laboratories, with a focus on Los Alamos, Lawrence Livermore and Sandia national laboratories, joined forces with those at the Russian nuclear weapon institutes for more than 20 years to avoid what looked like the perfect nuclear storm - a story told in the two-volume book Doomed to Cooperate1 published in 2016. Due to an internal processing error, an incorrect version of this article was published on 15 November 2017 that omitted the footnotes. AIP Publishing apologizes for this error. An updated version of this article, including the missing footnotes, was published on 21 November 2017.

  10. Assessing the integrity of local area network materials accountability systems against insider threats

    International Nuclear Information System (INIS)

    Jones, E.; Sicherman, A.

    1996-07-01

    DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems

  11. The Threat of War and the Energy Problem

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This document is part of the conference proceedings of the Pugwash conference 1977, held in Munich. The text written by E. Broda is about the threat of war (with a focus on nuclear war) and the prospective, worldwide energy problems. (nowak)

  12. Efficacy of nuclear forensics

    International Nuclear Information System (INIS)

    Kazi, Reshmi

    2011-01-01

    In a strange turn of history, the threat of global nuclear war has gone down, but the risk of a nuclear attack has gone up. The danger of nuclear terrorism and ways to thwart it, tackle it and manage it in the event of an attack is increasingly gaining the attention of nuclear analysts all over the world. There is rising awareness among nuclear experts to develop mechanisms to prevent, deter and deal with the threat of nuclear terrorism. Nuclear specialists are seeking to develop and improve the science of nuclear forensics so as to provide faster analysis during a crisis. Nuclear forensics can play an important role in detecting illicit nuclear materials to counter trafficking in nuclear and radiological materials. An effective nuclear forensic and attribution strategy can enable policy makers, decision makers and technical managers to respond to situations involving interception of special nuclear materials

  13. The IAEA Nuclear Security Programme Combating Nuclear Terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    Discusses the four threats of nuclear terrorism,which are theft of a nuclear weapon, theft of material to make an improvised nuclear explosive device,theft of other radioactive material for an Radiological dispersal device and sabotage of a facility or transport. The IAEA Nuclear Security programme combating Nuclear Terrorism therefore adopts a comprehensive approach. The programme addresses the need to cover nuclear and other radioactive materials, nuclear facilities and transports, non-nuclear, medical and industrial applications of sources

  14. Nuclear Terrorism: US Policies to Reduce the Threat of Nuclear Terror

    National Research Council Canada - National Science Library

    Finlay, Brian D

    2008-01-01

    The study below acknowledges that the US government has taken important steps to prevent nuclear proliferation and to detect and interdict the international transfer of potentially dangerous nuclear materials...

  15. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Walsh, R.

    1989-01-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  16. Span of control matters.

    Science.gov (United States)

    Cathcart, Deb; Jeska, Susan; Karnas, Joan; Miller, Sue E; Pechacek, Judy; Rheault, Lolita

    2004-09-01

    Prompted by manager concerns about span of control, a large, integrated health system set out to determine if span of control really mattered. Was there something to it, or was it just an excuse for poor performance? A team of middle managers studied the problem and ultimately demonstrated a strong relationship between span of control and employee engagement. Consequently, it was decided to add 4 management positions to note the effect. One year later, positive changes were observed in employee engagement scores in all 4 areas. This study suggests careful review of manager spans of control to address the untoward effects of large spans of control on employee engagement.

  17. Helping Children Deal with the Nuclear Threat.

    Science.gov (United States)

    Schirmer, Peggy

    1982-01-01

    Suggests how elementary school teachers can address the topic of nuclear warfare with young children. Emphasizes that educating children for peace requires that parents and teachers (1) recognize and deal with the anxieties provoked by nuclear war and that (2) they provide role models by participating in the antinuclear movement. (GC)

  18. A resurgence of the nuclear threat in Europe?

    International Nuclear Information System (INIS)

    Hautecouverture, Benjamin

    2014-09-01

    The first months of the Ukraine crisis were observed without any real consideration of the nuclear aspect of what will undoubtedly go down as an historical event. Several recent pieces of evidence mean that can no longer be the case. Firstly, nuclear weapons are now an integral part of Russian discourse in the framework of this crisis. Speaking at the end of August at the Seliger 2014 10. National Youth Forum, President Putin said, 'Let me remind you that Russia is one of the world's biggest nuclear powers. These are not just words - this is the reality. What's more, we are strengthening our nuclear deterrent capability and developing our armed forces. They have become more compact and effective and are becoming more modern in terms of the weapons at their disposal. We are continuing to work to build up our potential and will keep doing so (...)'. Certain Russian generals have alluded to the option of a limited use of nuclear weapons, even the option of preemptive use. The latest NATO summit in Newport reaffirmed the centrality of nuclear deterrence in the Alliance's security configuration. Moreover, the Ukraine crisis is continuing whereas bilateral nuclear arms control is at a standstill; over the summer, the United States accused Russian of violating its obligations under the Intermediate Nuclear Forces (INF) Treaty, and Russian diplomats are no longer concealing the country's desire to suspend its disarmament efforts. Finally, the modernisation of Russian forces is continuing while Russia's doctrinal re-evaluation is scheduled for the end of this year. The use of nuclear weapons in Europe is difficult to envisage. However, whether we like it or not, events over the past few months have confirmed that nuclear defence is still one of the factors of international relations on the continent. Have we been appearing to forget this fact in recent years, as the number of warheads and delivery systems in nuclear arsenals has declined, as has the role of nu-clear weapons

  19. Standoff Methods for the Detection of Threat Agents: A Review of Several Promising Laser-Based Techniques

    Directory of Open Access Journals (Sweden)

    J. Bruce Johnson

    2014-01-01

    Full Text Available Detection of explosives, explosive precursors, or other threat agents presents a number of technological challenges for optical sensing methods. Certainly detecting trace levels of threat agents against a complex background is chief among these challenges; however, the related issues of multiple target distances (from standoff to proximity and sampling time scales (from passive mines to rapid rate of march convoy protection for different applications make it unlikely that a single technique will be ideal for all sensing situations. A number of methods for spanning the range of optical sensor technologies exist which, when integrated, could produce a fused sensor system possessing a high level of sensitivity to threat agents and a moderate standoff real-time capability appropriate for portal screening of personnel or vehicles. In this work, we focus on several promising, and potentially synergistic, laser-based methods for sensing threat agents. For each method, we have briefly outlined the technique and report on the current level of capability.

  20. U.S. Nuclear Declaratory Policy The Question of Nuclear First Use

    National Research Council Canada - National Science Library

    Gompert, David

    1995-01-01

    The motivation behind this reexamination of American nuclear declaratory policy is the striking absence of deterrence from the debate over how to counter the widening threat from nuclear, biological...

  1. The continuing nuclear challenge

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    This paper reports that Declining threat perceptions in the superpower relationship make the need for compellent threats less pressing and reduce demands upon the credibility of extended deterrence. Nuclear arms control and reductions can create survivable forces forestalling all but irrational incentives for a first strike. Conventional arms control can restructure national armies to such an extent that crises can be weathered without recourse to arms, thus reducing the risk of nuclear escalation. The post-cold war era presents an opportunity to make meaningful progress in these areas and should serve to remind states that their security may not need to be based on the threat to use nuclear weapons. States that place a high status value on nuclear weapons and those at the nuclear threshold may not agree with this assessment. But if co-operative security structures can be found and acted upon, the allure of nuclear status may also decline. And, with an improving US-Soviet relationship, regional security problems that have led states to acquire nuclear weapons may become more amenable to solution by joint diplomatic initiatives. None of these measures are easily achievable not are they likely to be undertaken in a concerted fashion. However, unlike in the past, the post-cold war environment makes these steps feasible

  2. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyonam; Kim, So Young; Yim, Mansung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Schneider, Erich [Univ. of Texas at Austin, Texas (United States)

    2014-05-15

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  3. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    International Nuclear Information System (INIS)

    Kim, Kyonam; Kim, So Young; Yim, Mansung; Schneider, Erich

    2014-01-01

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  4. Mahdi and the Iranian Nuclear Threat

    National Research Council Canada - National Science Library

    Crytzer, Kurt S

    2007-01-01

    .... The Iranians refuse to fold to international pressures concerning their nuclear program, covertly and overtly back radical Shiite Groups, and respond with ever increasing confidence to any international...

  5. The concept of risk in the design basis threat

    International Nuclear Information System (INIS)

    Reynolds, J.M.

    2001-01-01

    Full text: Mathematically defined, risk is a product of one or more probability factors and one or more consequences. Actuarial analysis of risk requires the creation of a numeric algorithm that reflects the interaction of different probability factors, where probability data usually draws on direct measurements of incidence. For physical protection purposes, the algorithms take the general form: Risk = Probability of successful attack x Consequence where the overall probability of a successful attack will be determined by the product of, amongst other things, the probability of there being sufficient intent, the probability of there being available hostile resources, the probability of deterrence, and the probability that a hostile act will be detected and prevented. Deliberate, malevolent acts against nuclear facilities are rare. In so far as it is possible to make an actuarial type of judgement, the probability of malevolent activity against a nuclear facility is almost zero. This creates a problem for a numerical assessment of risk for nuclear facilities where the value (consequence) term could be almost infinite. As can be seen from the general equation above, a numerical algorithm of risk of malevolent activity affecting nuclear facilities could only yield a zero or infinite result. In such circumstances, intelligence-based threat assessments are sometimes thought of as a substitute for historic data in the determination of probability. However, if the paucity of historic data reflects the actual threat - which by and large it should - no amount of intelligence is likely to yield a substantially different conclusion. This mathematical approach to analysing risk appears to lead us either to no risk and no protection or to an infinite risk demanding every conceivable protective measure. The Design Basis Threat (DBT) approach offers a way out of the dilemma. Firstly, it allows us to eliminate from further consideration all zero or near zero probabilities

  6. Boundary Spanning

    DEFF Research Database (Denmark)

    Zølner, Mette

    The paper explores how locals span boundaries between corporate and local levels. The aim is to better comprehend potentialities and challenges when MNCs draws on locals’ culture specific knowledge. The study is based on an in-depth, interpretive case study of boundary spanning by local actors in...... approach with pattern matching is a way to shed light on the tacit local knowledge that organizational actors cannot articulate and that an exclusively inductive research is not likely to unveil....

  7. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  8. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  9. THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT

    Science.gov (United States)

    2016-04-01

    Putin’s intent. What we can do is learn from his actions, and what we see suggests growing Russian capabilities, significant military modernization...AU/ACSC/POWELL, N/AY16 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT...The methodology focuses on Russian capability, capacity, and intention to threaten NATO members’ existence. While Russia does possess nuclear weapons

  10. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  11. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  12. Nuclear rights - nuclear wrongs

    Energy Technology Data Exchange (ETDEWEB)

    Paul, E.F.; Miller, F.D.; Paul, J.; Ahrens, J.

    1986-01-01

    This book contains 11 selections. The titles are: Three Ways to Kill Innocent Bystanders: Some Conundrums Concerning the Morality of War; The International Defense of Liberty; Two Concepts of Deterrence; Nuclear Deterrence and Arms Control; Ethical Issues for the 1980s; The Moral Status of Nuclear Deterrent Threats; Optimal Deterrence; Morality and Paradoxical Deterrence; Immoral Risks: A Deontological Critique of Nuclear Deterrence; No War Without Dictatorship, No Peace Without Democracy: Foreign Policy as Domestic Politics; Marxism-Leninism and its Strategic Implications for the United States; Tocqueveille War.

  13. Gender differences and the influence of classroom discussion on adolescents' relationship to the threat of nuclear war after international crisis

    International Nuclear Information System (INIS)

    Berger, G.B.

    1987-01-01

    The purpose of this research was to explore the differences in attitudes of females and males to the stress of living under the threat of nuclear war with respect to sex and nuclear education. The differences in attitudes of 231 adolescents, from five California schools, aged 15-18, were analyzed. They were asked three questions regarding nuclear war within 2 weeks of the shooting down of Korean Airliner 007 in 1983. A quantitative content analysis was used to assess gender and educational influences on the responses to the three questions which were: Do I think there will be a war? Do I care? Why? and What do I think about fallout shelters? Theoretical constructs of Chodorow and Gilligan were used to relate recent developments in the psychology of women to issues of war and peace. There were significant gender differences with respect to adolescents' opinions on nuclear war. Compared to males, the expression of loss of family or friends, fear, humanitarian concerns, and blaming was significantly higher in females, while knowledge of fallout shelters was significantly lower. For both males and females, verbal anger was expressed equally. One hundred twelve students who had no education on nuclear war were compared with 119 students who had informal classroom discussion on nuclear war. With informal nuclear education, females had decreased expression of local loss and males increased expression of self loss. Both males and females with informal nuclear education had decreased their expression of blame. For females, the knowledge of fallout shelters was increased. Both males and females cited the shooting down of KAL/007, only 12.6% suggesting that psyche numbing can occur for knowledge as well as affect. Both males and females offered few solutions to nuclear war, a possible manifestation of an attitude of hopelessness in our youth

  14. Long Span Bridges in Scandinavia

    DEFF Research Database (Denmark)

    Gimsing, Niels Jørgen

    1998-01-01

    The first Scandinavian bridge with a span of more than 500 m was the Lillebælt Suspension Bridge opened to traffic in 1970.Art the end of the 20th century the longest span of any European bridge is found in the Storebælt East Bridge with a main span of 1624 m. Also the third longest span in Europe...... is found in Scandinavia - the 1210 m span of the Höga Kusten Bridge in Sweden.The Kvarnsund Bridge in Norway was at the completion in 1991 the longest cable-stayed bridge in the world, and the span of 530 m is still thge longest for cable-stayed bridges in concrete. The Øresund Bridge with its sapn of 490...

  15. Controlling Threats to Nuclear Security: A Hollistic Model

    National Research Council Canada - National Science Library

    Ford, James

    1997-01-01

    ... emanated from the bipolar hostility of the previous 50 years. Among these challenges is the marked increase in the theft of and illegal trafficking in nuclear materials, often referred to as nuclear smuggling...

  16. [Leaking: Frequency and correlates of announcements and threats of homicidal violence reported by Berlin schools between 1996 and 2007].

    Science.gov (United States)

    Leuschner, Vincenz; Bondü, Rebecca; Allroggen, Marc; Scheithauer, Herbert

    2016-01-01

    Threats and announcements of homicidal violence at schools may have massive consequences like evacuations, police searches, criminal investigations, or loss of the sense of security by students, teachers, and parents. However, there is a lack of systematic studies about that phenomenon. The present article would like to contribute to closing the research gap. It presents results about the frequency and structure of threats and announcements of homicidal violence in schools in Berlin. The study is based on an official dataset from school administration reports of violent acts in Berlin schools which has been studied within the Berlin Leaking-Projekt. The sample consists of 427 threats and announcements of homicidal violence between 1996 and 2007. The study is an exceptional analysis of the phenomenon: it presents crosscutting results about frequency and characteristics of threats and the threatening students as well as results of a longitudinal analysis about the development of threats and announcements. Results show a rate of 0,3 threats and announcements per 1 000 student and year. During the observation time span a steady increase of threats and announcements – year by year, influenced by imitation effects after school shootings – has been observed.

  17. Emergency management and the nuclear terrorism threat

    International Nuclear Information System (INIS)

    DeVito, D.A.; Suiter, L.

    1987-01-01

    Counterterrorism is not the province of the emergency manager. Generally law enforcement has that role. Instead, the emergency manager's role is crisis management; the responsibility is to be the focal point for the chief executive officer (mayor, governor, or national executive) regarding the protection of the population. Managers must be able to gather and synthesize sufficient information, rapidly and accurately, on which to base sound decisions. To do so, they must have a highly efficient, coordinated emergency management organization in place at the state and local levels of government, and there must be a workable plan for emergency operations that integrates all public safety forces into an effective response to all types of emergencies. A major goal of emergency management is to ensure that government is in control and that the public perceives that the system is working. All states have an emergency management organization at the state level, as do most counties and large cities. However, some states and local governments, particularly those that have nuclear power plants within their borders, are better staffed, equipped, and trained than others to deal with nuclear incidents. States with nuclear facilities have an emergency management organization, an emergency plan, and adequate communications, equipment, and trained personnel to handle a nuclear accident or incident at a plant. 21 references

  18. Consideration on Preventive and Protective Measures Against Insider Threats at R.O.K. Nuclear Facilities

    International Nuclear Information System (INIS)

    Lee, Seung Min; Lee, Jung Ho; Koh, Moon Sung

    2016-01-01

    This paper focuses on the current status of measures used to prevent, detect and respond to potential insiders at nuclear facilities in the Republic of KOREA. Measures against insiders are then analyzed based on IAEA guidelines. Insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. An insider threat is a great risk to a security system because of the access, authority, and special knowledge that someone within a facility possesses. Therefore, it is imperative that effective measures be taken to prevent insider incidents. A combination of preventive and protective measures offers the best solution to mitigating rogue elements within a facility

  19. Consideration on Preventive and Protective Measures Against Insider Threats at R.O.K. Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Seung Min; Lee, Jung Ho; Koh, Moon Sung [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    This paper focuses on the current status of measures used to prevent, detect and respond to potential insiders at nuclear facilities in the Republic of KOREA. Measures against insiders are then analyzed based on IAEA guidelines. Insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. An insider threat is a great risk to a security system because of the access, authority, and special knowledge that someone within a facility possesses. Therefore, it is imperative that effective measures be taken to prevent insider incidents. A combination of preventive and protective measures offers the best solution to mitigating rogue elements within a facility.

  20. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  1. Nuclear and radiological Security: Introduction

    International Nuclear Information System (INIS)

    Miller, James Christopher

    2016-01-01

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  2. Risk Informed Approach for Nuclear Security Measures for Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to States for developing a risk informed approach and for conducting threat and risk assessments as the basis for the design and implementation of sustainable nuclear security systems and measures for prevention of, detection of, and response to criminal and intentional unauthorised acts involving nuclear and other radioactive material out of regulatory control. It describes concepts and methodologies for a risk informed approach, including identification and assessment of threats, targets, and potential consequences; threat and risk assessment methodologies, and the use of risk informed approaches as the basis for informing the development and implementation of nuclear security systems and measures. The publication is an Implementing Guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, law enforcement agencies and experts from competent authorities and other relevant organizations involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures related to nuclear and other radioactive material out of regulatory control

  3. Open literature review of threats including sabotage and theft of fissile material transport in Japan

    International Nuclear Information System (INIS)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-01-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty

  4. Research prototype of remote controlled engineering vehicle system for CBRN threat. Phase 2

    International Nuclear Information System (INIS)

    Uemura, Keisuke; Naruse, Masahiro; Shigematsu, Kosuke; Morishita, Masahiro

    2015-01-01

    This research was triggered by the nuclear accident that successively happened after the Great East Japan Earthquake. The project focuses on the Remote Controlled Engineering Vehicle System that can be used for multi purposes such as debris/obstacle clearing operation, various reconnaissance operation, under CBRN threat. In this report, we describe research prototype of remote controlled engineering vehicle system for CBRN threat (phase 2). (author)

  5. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  6. Preliminary regulatory assessment of nuclear power plants vulnerabilities

    International Nuclear Information System (INIS)

    Kostadinov, V.; Petelin, S.

    2004-01-01

    Preliminary attempts to develop models for nuclear regulatory vulnerability assessment of nuclear power plants are presented. Development of the philosophy and computer tools could be new and important insight for management of nuclear operators and nuclear regulatory bodies who face difficult questions about how to assess the vulnerability of nuclear power plants and other nuclear facilities to external and internal threats. In the situation where different and hidden threat sources are dispersed throughout the world, the assessment of security and safe operation of nuclear power plants is very important. Capability to evaluate plant vulnerability to different kinds of threats, like human and natural occurrences and terrorist attacks and preparation of emergency response plans and estimation of costs are of vital importance for assurance of national security. On the basis of such vital insights, nuclear operators and nuclear regulatory bodies could plan and optimise changes in oversight procedures, organisations, equipment, hardware and software to reduce risks taking into account security and safety of nuclear power plants operation, budget, manpower, and other limitations. Initial qualitative estimations of adapted assessments for nuclear applications are shortly presented. (author)

  7. Protective Alternatives of SMR against Extreme Threat Scenario – A Preliminary Risk Analysis

    International Nuclear Information System (INIS)

    Shohet, I.M.; Ornai, D.; Gal, E.; Ronen, Y.; Vidra, M.

    2014-01-01

    The article presents a preliminary risk analysis of the main features in NPP (Nuclear Power Plant) that includes SMR - Small and Modular Reactors, given an extreme threat scenario. A review of the structure and systems of the SMR is followed by systematic definitions and analysis of the threat scenario to which a preliminary risk analysis was carried out. The article outlines the basic events caused by the referred threat scenario, which had led to possible failure mechanisms according to FTA (Fault-Tree-Analysis),critical protective circuits, and todetecting critical topics for the protection and safety of the reactor

  8. History of the nuclear menace

    International Nuclear Information System (INIS)

    Le Guelte, G.

    1997-01-01

    For a half century, the nuclear conflict represents a permanent menace for the whole humanity. Through the crisis of Cuba rockets, Israel weapons, Indian explosion, Pakistan equipment, the dismantling of South Africa weapons, the discovery of the clandestine program of Iraq or the North Korean crisis, we understand nuclear threat. 178 countries decided to extend the non proliferation treaty for an indefinite period. But some questions are still to be studied: how it is possible to avoid the clandestine making of nuclear weapons, or if it is possible to convince recalcitrant countries to adhere to a treaty and only when all the questions will find an answer, the nuclear threat will be eliminated. (N.C.)

  9. Gender differences and the influence of classroom discussion on adolescents' relationship to the threat of nuclear war after international crisis

    Energy Technology Data Exchange (ETDEWEB)

    Berger, G.B.

    1987-01-01

    The purpose of this research was to explore the differences in attitudes of females and males to the stress of living under the threat of nuclear war with respect to sex and nuclear education. The differences in attitudes of 231 adolescents, from five California schools, aged 15-18, were analyzed. They were asked three questions regarding nuclear war within 2 weeks of the shooting down of Korean Airliner 007 in 1983. A quantitative content analysis was used to assess gender and educational influences on the responses to the three questions which were: Do I think there will be a war Do I care Why and What do I think about fallout shelters Theoretical constructs of Chodorow and Gilligan were used to relate recent developments in the psychology of women to issues of war and peace. There were significant gender differences with respect to adolescents' opinions on nuclear war. Compared to males, the expression of loss of family or friends, fear, humanitarian concerns, and blaming was significantly higher in females, while knowledge of fallout shelters was significantly lower. For both males and females, verbal anger was expressed equally. One hundred twelve students who had no education on nuclear war were compared with 119 students who had informal classroom discussion on nuclear war. With informal nuclear education, females had decreased expression of local loss and males increased expression of self loss. Both males and females with informal nuclear education had decreased their expression of blame. For females, the knowledge of fallout shelters was increased. Both males and females cited the shooting down of KAL/007, only 12.6% suggesting that psyche numbing can occur for knowledge as well as affect. Both males and females offered few solutions to nuclear war, a possible manifestation of an attitude of hopelessness in our youth.

  10. Romanian experience and approach in developing the design basis threat concept

    International Nuclear Information System (INIS)

    Ionescu, D.S.

    2002-01-01

    Full text: Physical protection systems required to protect the nuclear facilities and materials has to be able to respond at least to the design base threat (DBT). First, the DBT is defined as a minimum set of characteristics of a probable adversary in order to give to the security designer the necessary information to design the Physical Protection System (PPS) subsystems at least at the level to assure complete protection of the nuclear material and facilities against certain attacks. The secondary role of a DBT is to evaluate the effectiveness of an already built PPS facing with a threat having the general characteristic described by DBT. Romanian process to define the natural DBT started effectively with a workshop organized by AIEA and the Romanian Nuclear Regulatory Commission (CNCAN). There participated all the Romanian institution involved in the field of protection of nuclear material and facilities (Romanian Intelligence, Military, Police, CNCAN) as well the representatives of main nuclear operators. The workshop scope was to emphasize the methodology to build a DBT instead to define that. The participants were able to understand the necessary steps to define DBT and the importance of the teamwork. After that meeting, under CNCAN coordination started a process to achieve information from the state institution and nuclear operators. Various meeting has been held to refine the information achieved. Those meetings constituted an important step in the process, helping the parts to understand each other (before that, due to the different organizations where the participants come from was difficult to achieve a common language in this respect). Lots of specific or general analyses and materials have been evaluated, refined and integrated in a special report. Two main constrains of DBT has been identified: the DBT must be 'strong' enough to permit a powerful response of the PPS to any credible attack; also the DBT should consider the equilibrium between the

  11. Nuclear security and challenges at nuclear power plants. Part 1. Basis of nuclear security

    International Nuclear Information System (INIS)

    Demachi, Kazuyuki

    2017-01-01

    The tsunami that occurred in March 2011 associated with the 2011 off the Pacific coast of Tohoku Earthquake hit TEPCO Fukushima Daiichi Nuclear Power Station (1F). The 1F got into station blackout situation, and fell into reactor core meltdown due to inability of cooling down the reactor, eventually leading to the emission accident of radioactive substances over a wide range into the atmosphere, soil, seawater and the like. Through various media such as newspapers, TVs, and the Internet after the accident, important facilities for safety were explained with illustrations. Some of them included the contents that can suggest the causes that trigger the same accident as the 1F accident. It is an urgent task to strengthen security against the terrorism aimed at nuclear power facilities including nuclear power plants, and its realization is a serious problem in each country. This paper summarized nuclear security issues and solutions including explanation on the circumstances of the threat increase of nuclear terrorism that had begun before the 1F accident. The recent nuclear security summit reaffirmed that nuclear security is the basic responsibility of each country, and also reaffirmed the responsibility and importance of IAEA for international cooperation. This paper explains the definition of nuclear security, threat of terrorism, and the contents of the IAEA Nuclear Security Series (NSS), and points out that NSS is considered as the basis among basis that all the countries should share. (A.O.)

  12. Prospects for stability in a nuclear subcontinent

    International Nuclear Information System (INIS)

    Rajagopal, S; Chari, Sridhar K.

    2003-01-01

    This book explore the prospects for stability in a nuclear sub-continent. The nonproliferation regimes and nuclear threat reduction, nonproliferation regimes and south asia - is there a meeting point?; maintaining a threshold of strategic autonomy at least cost: continuity in the evolution of India's nuclear policies; role of nuclear doctrines and the state of the armed forces in South Asia; nuclear weapons, deterrence and stability in the international system: South Asian dynamics; assessing China's Asian role and security policies; Kargil war to current threat of war: prospects for stability; discussion; international terrorism and its impact on South Asian stability; a view from Bangladesh etc. are some of the topics covered

  13. Prevention of nuclear war

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    Removing the threat of a nuclear war-as the General Assembly formally stated in the Final Document of its first special session devoted to disarmament, in 1978-is considered to be the task of the present day. In that Document, the General Assembly sought to establish principles, guidelines and procedures for preventing nuclear war. It declared that to that end, it was imperative to remove the threat of nuclear weapons, to halt and reverse the nuclear-arms race until the total elimination of nuclear weapons and their delivery systems had been achieved (see chapter iv), and to prevent the proliferation of nuclear weapons (see chapter VII). At the same time, it called for other measures designed to prevent the outbreak of nuclear war and to lessen the danger of the treat or use of nuclear weapons. The Assembly's clear call for action was dictated by the awareness that there was no insuperable barrier dividing peace from war and that, unless nations brought the spiralling nuclear-arms race to an end, the day might come when nuclear weapons would actually be used, with catastrophic consequences. In adopting the Final Document, the international community achieved, for the first time, a consensus on an international disarmament strategy having as its immediate goal the elimination of the danger of a nuclear war and the implementation of measures to halt and reverse the arms race. The General Assembly, at its second special session on disarmament, in 1982, reaffirmed the validity of the 1978 Final Document. This paper reports that nuclear issues and in particular the prevention of nuclear war remain, however, major concerns of all States. Undoubtedly, all nations have a vital interest in the negotiation of effective measures for her prevention of nuclear war, since nuclear weapons pose a unique threat to human survival. If nuclear war were to occur, its consequences would be global, not simple regional

  14. IAEA to hold special session on nuclear terrorism

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA this week for an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. The Special Session, which will bring together experts on nuclear terrorism from around the world, will deal with the following issues: The Psychology of terrorism; Intelligence, police and border protection; Guarding nuclear reactors and material from terrorists and thieves; The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices; The threat of nuclear terrorism: Intentional dispersal of radioactive material - Sabotage of fixed installations or transport systems; The Legal Framework: Treaties and Conventions, Laws; Regulations and Codes of Practice; IAEA Nuclear Security and Safety Programmes

  15. Nuclear attitudes and reactions: associations with depression, drug use, and quality of life

    Energy Technology Data Exchange (ETDEWEB)

    Newcomb, M.D.

    1986-05-01

    For 40 years the world has lived with the threat of nuclear war and, recently, with the possibility of nuclear power plant accidents. Although virtually every generation must confront various national or international crises, the threat of nuclear war is unprecedented in its destructive potential. This study is an attempt to assess attitudes and amount of distress associated with the ever-present threat of nuclear war and the possibility of accidents at nuclear power plants. The Nuclear Attitudes Questionnaire (NAQ) consists of 15 items and was administered to 722 young adults who have grown up in the nuclear age. The items were found to reflect four latent factors of nuclear concern, nuclear support, fear of the future, and nuclear denial, all of which in turn represent a second-order construct of nuclear anxiety. Women reported significantly more nuclear concern, less nuclear support, more fear of the future, and less nuclear denial than did men. In latent-variable models, nuclear anxiety was found to be significantly associated with less purpose in life, less life satisfaction, more powerlessness, more depression, and more drug use. It is concluded that the threat of nuclear war and accidents is significantly related to psychological distress and may disturb normal maturational development.

  16. Nuclear attitudes and reactions: associations with depression, drug use, and quality of life

    International Nuclear Information System (INIS)

    Newcomb, M.D.

    1986-01-01

    For 40 years the world has lived with the threat of nuclear war and, recently, with the possibility of nuclear power plant accidents. Although virtually every generation must confront various national or international crises, the threat of nuclear war is unprecedented in its destructive potential. This study is an attempt to assess attitudes and amount of distress associated with the ever-present threat of nuclear war and the possibility of accidents at nuclear power plants. The Nuclear Attitudes Questionnaire (NAQ) consists of 15 items and was administered to 722 young adults who have grown up in the nuclear age. The items were found to reflect four latent factors of nuclear concern, nuclear support, fear of the future, and nuclear denial, all of which in turn represent a second-order construct of nuclear anxiety. Women reported significantly more nuclear concern, less nuclear support, more fear of the future, and less nuclear denial than did men. In latent-variable models, nuclear anxiety was found to be significantly associated with less purpose in life, less life satisfaction, more powerlessness, more depression, and more drug use. It is concluded that the threat of nuclear war and accidents is significantly related to psychological distress and may disturb normal maturational development

  17. Intelligence and the prevention of nuclear terrorism

    International Nuclear Information System (INIS)

    Despres, J.

    1987-01-01

    The paper first defines intelligence and nuclear terrorism and analyzes the nature of the problem from both a specifically US and a more generally Western viewpoint. As used here, intelligence refers broadly to the collection and reporting of information, the production of assessments, and the presentation of judgments by intelligence specialists who work for public and national security authorities. Intelligence encompasses the entire range of investigative and reporting activities at all levels of government - from local police units to allied military commands - that could contribute to the discovery and disarming of nuclear terrorists. Nuclear terrorism, in contrast, refers only to credible threats or acts of extreme violence by forces outside the direct control of any state through false threats or actual use of a nuclear bomb. This definition excludes other highly menacing or damaging activities involving nuclear materials, facilities, weapons, or phobias such as poisoning the air or water supplies with radioactive substances; stealing nuclear materials, sabotaging nuclear powerplants, occupying a facility or seizing a vehicle with nuclear weapons, or inflaming public fears in the event of a nuclear accident. These events can be extremely frightening, as in the case of public reactions throughout Europe to the nuclear accident at Chernobyl in the Ukraine. However, their potential destructiveness and exploitability by terrorists do not match the threat of nuclear explosion

  18. Design Basis Threat (DBT) Approach for the First NPP Security System in Indonesia

    International Nuclear Information System (INIS)

    Ign Djoko Irianto

    2004-01-01

    Design Basis Threat (DBT) is one of the main factors to be taken into account in the design of physical protection system of nuclear facility. In accordance with IAEA's recommendations outlined in INFCIRC/225/Rev.4 (Corrected), DBT is defined as: attributes and characteristics of potential insider and/or external adversaries, who might attempt unauthorized removal of nuclear material or sabotage against the nuclear facilities. There are three types of adversary that must be considered in DBT, such as adversary who comes from the outside (external adversary), adversary who comes from the inside (internal adversary), and adversary who comes from outside and colludes with insiders. Current situation in Indonesia, where many bomb attacks occurred, requires serious attention on DBT in the physical protection design of NPP which is to be built in Indonesia. This paper is intended to describe the methodology on how to create and implement a Design Basis Threat in the design process of NPP physical protection in Indonesia. (author)

  19. Advance features in the SPAN and SPAN/XRF gamma ray and X ray spectrum analysis software

    International Nuclear Information System (INIS)

    Wang Liyu

    1998-01-01

    This paper describes the advanced techniques, integral peak background, experimental peak shape and complex peak shape, which have been used successfully in the software packages SPAN and SPAN/XRF to process gamma ray and X ray spectra from HPGe and Si(Li) detector. Main features of SPAN and SPAN/XRF are also described. The software runs on PC and has convenient graphical capabilities and a powerful user interface. (author)

  20. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  1. Nuclear-piping-repair planning today needs skill, organization

    International Nuclear Information System (INIS)

    O'Keefe, W.

    1986-01-01

    Nuclear power plant piping continues to experience failures and imminent threat of failure, despite a high level of care in design, analysis, fabrication, or installation. Continual inspection and surveillance and letter-by-letter following of procedures are not completely effective remedies, either. Both short-time-frame accidents and slowly progressing insidious complaints have caused loss of capacity, availability, and even confidence that the unit will work at close-to-expected performance. The fixes for nuclear-piping complaints cover a wide span, from mere carrying out of well-known repair procedures on either small scale or large, all the way to highly engineered solutions to a problem, with months of study and analysis followed by weighing of alternative methods. With some of the problems, little special planning is necessary. The repair is understood, and the time it needs is well within the envelope of a scheduled outage. Radiation exposure of personnel will not exceed expected moderate limits. And if the repair is a repeat performance of a recent similar one, little can go wrong. The planning for many other repairs, however, is so essential that even a minor failing in it will bring a debacle, with over-run, losses in revenue, and senseless expenditure of man-rems. Look at two types of planning for nuclear piping repair, as revealed at a recent American Welding Society conference on maintenance welding in nuclear power plants

  2. Reflections on nuclear security. The USA's top nuclear regulator reviews the 9/11 response

    International Nuclear Information System (INIS)

    Meserve, R.A.

    2002-01-01

    There are three fundamental points related to nuclear security that should be emphasized. First, the physical protection at nuclear power plants was strong before September 11. Second, there have been no specific credible threats of a terrorist attack on nuclear power plants since September 11. Third, in light of the events of September 11, the NRC has recognized the need to reexamine past security strategies to ensure that we have the right protections in place for the long term. Following the attacks, the NRC issued over 30 safeguards and threat advisories to the major licensed facilities, placing them on the highest security level. Security across the nuclear industry was enhanced as a result of these actions, and many of the strengthened security measures are now requirements as a result of subsequently issued NRC Orders. One should note that nuclear facilities are the strongest and most well protected civilian facilities in our country. But the need to enhance those protections must be recognized. The NRC is dedicated to meeting the obligation to protect the public health and safety and the common defense and security from threats of all kinds. Much has been accomplished over the last year, but there is more to be done. Put in place within months of the September 2001 terrorist attacks, the IAEA's Action Plan on Nuclear Security is now being implemented on many fronts worldwide

  3. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  4. Preventing nuclear terrorism: the report and papers of the International Task Force on Prevention of Nuclear Terrorism

    International Nuclear Information System (INIS)

    Leventhal, P.; Alexander, Y.

    1987-01-01

    The International Task Force on Prevention of Nuclear Terrorism, formed in 1985 under the Nuclear Control Institute, commissioned 26 studies and produced an extensive report on the problem and prevention of nuclear terrorism, Part I of this book is the full report, and part II contains the individual studies under two section: (A) Defining the Threat (8 studies); and (B) Strategies for Dealing with the Threat (18 studies). Detailed recommendations are made, in many of the studies, for better protection of nuclear weapons, materials, and facilities; greater cooperation among national intelligence agencies; tighter controls on nuclear transfers; more effective arms control initiatives; and emergency management programs. A separate abstract was prepared for the report and each of the 26 studies

  5. A motorway threat to nuclear democracy

    International Nuclear Information System (INIS)

    Grove-White, R.

    1980-01-01

    The wider implications of Britain's nuclear power programme of the recent ruling in the House of Lords against objectors to the M40 and M42 motorways are discussed. In combination with the UK government's stated intentions this judgement is seen as a move toward planning methods more closed and autocratic than those to which United Kingdom residents have hitherto been accustomed. (UK)

  6. Kaposi's sarcoma-associated herpesvirus latency-associated nuclear antigen prolongs the life span of primary human umbilical vein endothelial cells.

    Science.gov (United States)

    Watanabe, Takahiro; Sugaya, Makoto; Atkins, April M; Aquilino, Elisabeth A; Yang, Aparche; Borris, Debra L; Brady, John; Blauvelt, Andrew

    2003-06-01

    Tumor spindle cells in all clinical types of Kaposi's sarcoma (KS) are infected with Kaposi's sarcoma-associated herpesvirus (KSHV). Although KSHV contains more than 80 genes, only a few are expressed in tumor spindle cells, including latency-associated nuclear antigen (LANA) and k-cyclin (kCYC). To assess the oncogenic potential of LANA and kCYC, primary human umbilical vein endothelial cells (HUVEC) and murine NIH 3T3 cells were stably transduced by using recombinant retroviruses expressing these genes or the known viral oncogene simian virus 40 large T antigen (LTAg). Interestingly, LANA-transduced HUVEC proliferated faster and demonstrated a greatly prolonged life span (mean +/- standard deviation, 38.3 +/- 11.0 passages) than untransduced cells and vector-transduced cells (<20 passages). By contrast, kCYC-transduced HUVEC did not proliferate faster or live longer than control cells. LANA- and kCYC-transduced HUVEC, but not LTAg-transduced HUVEC, retained the ability to form normal vessel-like structures in an in vitro model of angiogenesis. In cellular assays of transformation, LANA- and kCYC-transduced NIH 3T3 cells demonstrated minimal or no anchorage-independent growth in soft agar and no tumorigenicity when injected into nude mice, unlike LTAg-transduced NIH 3T3 cells. Lastly, gene expression profiling revealed down-regulation, or silencing, of a number of genes within LANA-transduced HUVEC. Taken together, these results suggest that KSHV LANA is capable of inducing prolonged life span, but not transformation, in primary human cells. These findings may explain why LANA-expressing spindle cells proliferate within KS tumors, yet most often do not demonstrate biologic characteristics of transformation or true malignant conversion.

  7. Applications of Nuclear Physics

    OpenAIRE

    Hayes, Anna C.

    2017-01-01

    Today the applications of nuclear physics span a very broad range of topics and fields. This review discusses a number of aspects of these applications, including selected topics and concepts in nuclear reactor physics, nuclear fusion, nuclear non-proliferation, nuclear-geophysics, and nuclear medicine. The review begins with a historic summary of the early years in applied nuclear physics, with an emphasis on the huge developments that took place around the time of World War II, and that und...

  8. Iranian Nuclear Program: a Threat or a Demand for Equality?

    Directory of Open Access Journals (Sweden)

    Primož Šterbenc

    2013-06-01

    Full Text Available Ever since 2002 relations between the West and Israel on the one hand and Iran on the other have been deteriorating due to the contentious issue of Iranian nuclear programme. Israel and the US have been claiming that there has been a secret Iranian nuclear weapons program, on the grounds that Iran has persisted in its effort to acquire independent uranium enrichment capability and has since 2006 allowed only limited inspections by the International Atomic Energy Agency. Iran has been claiming that its nuclear program is entirely peaceful. Today, one certainly cannot exclude possibility of a military attack on Iranian nuclear facilities. However, one cannot properly understand the problem without taking into account the historical and structural dimensions. Namely, Iran's nuclear policy has been guided by country's determination that it will become independent and self-reliant in every possible field – a result of its very negative historical experience. Thus, Iran has been determined to fully exercise its right to peaceful nuclear development, to which it is entitled according to the Treaty on the Non-Proliferation of Nuclear Weapons. Iran has been striving to overcome the structural dependence of developing countries in the field of nuclear energy, as they have been denied the possibility of comprehensive nuclear development for peaceful purposes by countries possessing developed nuclear industries. The latter have prevented balanced implementation of the Treaty on the Non-Proliferation of Nuclear Weapons.

  9. The possibility of nuclear war: Appraisal, coping and emotional response

    International Nuclear Information System (INIS)

    Kanofsky, S.

    1989-01-01

    This study used Lazarus and Folkman's (1984) model of appraisal and coping to explore people's emotional response to the possibility of nuclear war. Sixty-seven women and 49 men participated in a questionnaire study. The sample represented a cross-section of Americans by age and ethnic group but had more education and higher occupational status scores than is typical for the greater population. Sampling limitations and the political climate at the time of questionnaire administration suggested that the present findings be interpreted cautiously. Nevertheless, results suggested the importance of appraisal, defined in this study as the estimated probability of nuclear war and beliefs that citizen efforts to reduce the likelihood of nuclear war can be effective, and coping as factors in people's nuclear threat related emotional response. Six of the study's 11 hypotheses received at least partial confirmation. One or more measures of nuclear threat-related emotional distress were positively correlated with probability estimates of nuclear war, individual and collective response efficacy beliefs, and seeking social support in regard to the nuclear threat. Negative correlations were found between measures of threat-related distress and both trust in political leaders and distancing. Statistically significant relationships contrary to the other five hypotheses were also obtained. Measures of threat-related distress were positively, rather than negatively, correlated with escape avoidance and positive reappraisal coping efforts. Appraisal, coping, and emotion variables, acting together, predicted the extent of political activism regarding the nuclear arms race. It is useful to consider attitudes toward the nuclear arms race, distinguishing between intensity and frequency of emotional distress, and between measures of trait, state, and concept-specific emotionality in understanding emotional responses

  10. Emerging nuclear security issues for transit countries

    International Nuclear Information System (INIS)

    Gabulov, I.A.

    2003-01-01

    Full text: Tragic events of September eleventh have made nuclear terrorism dangers more evident. In the light of increased terrorism preventing the spread of nuclear and nuclear related items as well as radioactive materials that can be used for production so-called 'dirty bomb'is an urgent global claim. Nuclear Security issues cover multiple aspects of the security and first of all the threat from nuclear terrorism, detection and protection of illicit trafficking of nuclear materials and other radioactive sources, legal shipment of such type materials as well as nuclear related dual use items. In the face of emerging threats the prevention of proliferation by the development of effective national system of nuclear export controls is hugely important for transit countries like Azerbaijan with underdeveloped export controls and strategic locations along trade and smuggling routes between nuclear suppliers States and countries attempting to develop nuclear weapons or any nuclear explosive devices. Thus, in the face of increasing international threat from nuclear terrorism the role and place of Azerbaijan Republic in the struggle against terrorism increases. In this context it is very important to establish effective national capabilities for detection and prevention of illicit trafficking of radioactive and nuclear materials as well as nuclear related dual use items across Azerbaijan's borders. One of the ways for enhancing and strengthening existing activities in this field is carrying out joint actions between scientists and enforcement officials in order to improve knowledge of the front-line customs and border guard inspectors concerning multiple aspects of Nuclear Security

  11. Radiation Detection System for Prevention of Radiological and Nuclear Terrorism

    International Nuclear Information System (INIS)

    Kwak, Sung-Woo; Yoo, Ho-Sik; Jang, Sung-Sun; Kim, Jae-Kwang; Kim, Jung-Soo

    2007-01-01

    After the September 11 terrorist attack, the threat of a potential for a radiological or nuclear terrorist attack became more apparent. The threats relating to radiological or nuclear materials include a Radiological Dispersion Device (RDD), an Improved Nuclear Device (IND) or a State Nuclear Device (such as a Soviet manufactured suitcase nuclear weapon). For more effective countermeasures against the disaster, multilayer protection concept - prevention of smuggling of radioactive or nuclear material into our country through seaports or airports, detection and prevention of the threat materials in transit on a road, and prevention of their entry into a target building - is recommended. Due to different surrounding circumstances of where detection system is deployed, different types of radiation detection systems are required. There have been no studies on characteristics of detection equipment required under Korean specific conditions. This paper provides information on technical requirements of radiation detection system to achieve multi-layer countermeasures for the purpose of protecting the public and environment against radiological and nuclear terrorism

  12. Nuclear security in a transformed world

    International Nuclear Information System (INIS)

    Gottfried, K.; Dean, J.

    1991-01-01

    In the wake of the failed coup attempt in the Soviet Union, the world stands hopeful that a new era of international peace and cooperation lies ahead. President Bush's unilateral reductions in tactical nuclear weapons and in the alert levels of US forces, coupled with President Gorbachev's largely reciprocal actions, are important steps toward realizing that hope. While bold in the context of recent arms control history, however, these actions are modest in the face of the current enormous opportunity and the shifting threats the world now faces. Even with these welcome unilateral actions, the likely continued presence of thousands of nuclear weapons throughout many of the Soviet republics, the temporary uncertainty over central government command during the coup, and fuller knowledge of Iraq's aggressive efforts to build a nuclear bomb serve as stark reminders that the danger of nuclear catastrophe has not disappeared. Although a deliberate attack by the Soviet Union against the US or Europe is now almost inconceivable, nuclear weapons continue to pose significant threats to US security and world peace. These threats fall into three broad categories: a persistent risk of regional nuclear war involving countries other than the Soviet Union that are already in possession of nuclear weapons or capable of building them; the spread of nuclear weapons to other countries; accidental or unauthorized use. To meet this new challenge, three key steps must be taken: reduce dramatically Soviet and US nuclear arsenals; negotiate restrictions on the arsenals of other nuclear powers; strengthen the nuclear nonproliferation regime

  13. New nuclear power in the UK: A strategy for energy security?

    International Nuclear Information System (INIS)

    Watson, Jim; Scott, Alister

    2009-01-01

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  14. New nuclear power in the UK. A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim; Scott, Alister [Sussex Energy Group, SPRU, The Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security - the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made. (author)

  15. New nuclear power in the UK: A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim, E-mail: w.j.watson@sussex.ac.u [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom); Scott, Alister [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  16. Classifying threats with a 14-MeV neutron interrogation system.

    Science.gov (United States)

    Strellis, Dan; Gozani, Tsahi

    2005-01-01

    SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.

  17. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  18. performance-based approach to design and evaluation of nuclear security systems for Brazilian nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Tavares, Renato L. A.; Filho, Josélio S. M., E-mail: renato.tavares@cnen.gov.br, E-mail: joselio@cnen.gov.br [Comissão Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioproteção e Segurança Nuclear. Divisão de Normas e Segurança Física; Fontes, Gladson S.; Fiel, J.C.B., E-mail: gsfontes@hotmail.com, E-mail: fiel@ime.eb.br [Instituto Militar de Engenharia (SE-7/IME), Rio de Janeiro, RJ (Brazil). Seção de Engenharia Nuclear

    2017-07-01

    This study presents an application of a performance-based approach to definition of requirements, design and evaluation of physical protection systems for nuclear facilities. Such approach considers a probabilistic analysis of the threat, equipment, systems and response forces used to prevent, dissuade and detain malicious acts against the integrity of facilities and the nuclear materials inside them. Nowadays, in the context of Brazilian nuclear facilities licensing, a mostly prescriptive approach is adopted, which despite having advantages such as simplified inspections and homogeneous regulatory requisites amid different fuel cycle facility types, does not consider evolution, dynamism and capacities of external or internal threats to facilities and to Brazilian Nuclear Program itself, neither provides metrics to evaluate system performance facing such threats. In order to preserve actual plans and systems confidentiality, a facility hypothetical model is created, including a research reactor and a waste storage facility. It is expected that the methodology and results obtained in this study serve in the future as a basis to Brazilian nuclear operators, in elaboration process of their Physical Protection Plans, which must comply with future regulation CNEN-NN 2.01, a revision of CNEN-NE 2.01, once that regulation will include performance requisites. (author)

  19. performance-based approach to design and evaluation of nuclear security systems for Brazilian nuclear facilities

    International Nuclear Information System (INIS)

    Tavares, Renato L. A.; Filho, Josélio S. M.; Fontes, Gladson S.; Fiel, J.C.B.

    2017-01-01

    This study presents an application of a performance-based approach to definition of requirements, design and evaluation of physical protection systems for nuclear facilities. Such approach considers a probabilistic analysis of the threat, equipment, systems and response forces used to prevent, dissuade and detain malicious acts against the integrity of facilities and the nuclear materials inside them. Nowadays, in the context of Brazilian nuclear facilities licensing, a mostly prescriptive approach is adopted, which despite having advantages such as simplified inspections and homogeneous regulatory requisites amid different fuel cycle facility types, does not consider evolution, dynamism and capacities of external or internal threats to facilities and to Brazilian Nuclear Program itself, neither provides metrics to evaluate system performance facing such threats. In order to preserve actual plans and systems confidentiality, a facility hypothetical model is created, including a research reactor and a waste storage facility. It is expected that the methodology and results obtained in this study serve in the future as a basis to Brazilian nuclear operators, in elaboration process of their Physical Protection Plans, which must comply with future regulation CNEN-NN 2.01, a revision of CNEN-NE 2.01, once that regulation will include performance requisites. (author)

  20. ITAC, an insider threat assessment computer program

    International Nuclear Information System (INIS)

    Eggers, R.F.; Giese, E.W.

    1988-01-01

    The insider threat assessment computer program, ITAC, is used to evaluate the vulnerability of nuclear material processing facilities to theft of special nuclear material by one or more authorized insider adversaries. The program includes two main parts: one is used to determine the timeliness of nuclear material accounting tests for loss of special nuclear material, and the other determines pathway aggregate detection probabilities for physical protection systems and material control procedures that could detect the theft. Useful features of ITAC include its ability to (1) evaluate and quantify the timeliness of material accounting tests, (2) analyze branching systems of physical pathways and adversary strategies, (3) analyze trickle or abrupt theft situations for combinations of insiders, (4) accept input probabilities and times in the form of ranges rather than discrete points, and (5) simulate input data using Monte Carlo methods to produce statistically distributed aggregate delay times and detection probabilities. The ITAC program was developed by the Security Applications Center of Westinghouse Hanford Comapny and Boeing Computer Services, Richland, WA

  1. An integrated approach to adapt physical protection to the new terrorism threats

    International Nuclear Information System (INIS)

    Steinhaeusler, F.; Braun, C.; Bunn, G.

    2002-01-01

    Full text: New terrorism (NT) differs significantly from the traditional form of terrorism insofar as it has the capability to: train and deploy suicide commandos; use sophisticated logistics; implement transnational terrorist operations; infiltrate security and diplomatic communities; and commit acts of mass disturbance and mass killings. NT does not engage in negotiations: it does not discriminate in its attacks between children, adult civilians or military personnel; and it is willing to deploy weapons of mass destruction. These characteristics require that the conventional approach to physical protection of installations dealing with nuclear and other radioactive materials (e.g., Design Basis Threat (DBT)) be adapted accordingly. This integrated approach should encompass: at the international level: revised legally binding conventions and recommendations which are more specific than current versions, providing practically applicable advice reflecting the new threat scenarios; at the national level: introducing an element of transparency for validating the national threat perception and supra-national review of the effectiveness of the counteractions taken such as regulatory approaches implementing these international agreements; at the operational level: enhancing security-related co-operation at the command and control level between the on-site security forces at nuclear installations, the response force, police and the military, as well as upgrading of the force-on-force training; and at the research level: R and D in physical protection technology and practices to keep abreast of the threats posed by the NT. (author)

  2. Planning for countering nuclear terrorism. Chapter 1. Motivation and redirection: rationale and achievements in the russian closed nuclear cities

    International Nuclear Information System (INIS)

    Kaser, G.

    2006-01-01

    The non-proliferation rationale and achievements of the collaboration between the UK and Russia for a personnel redirection programme in the Closed Nuclear Cities is described. A framework for the interaction between demand and supply dimensions of proliferation threats is developed to show how redirection programmes to enable WMD (weapons of mass destruction) specialists move into civilian activities reduce these same threats. Early results from the UK-Russia Closed Nuclear Cities Partnership are presented and compared with the parallel US funded Nuclear Cities Initiative and similar local economic development measures

  3. Global nuclear cleanout initiative 2004

    International Nuclear Information System (INIS)

    Edlow, J.; Gruber, G.

    2004-01-01

    Full text: During more than 50 years of Atoms for Peace programmes nuclear materials were spread out worldwide. Stranded nuclear materials from nuclear research are left over without any safe back-end solution. 'Dirty Bombs' or so-called 'Radioactive Dispersal Devices (RDD)' are no longer science fiction since the world experienced the 9/11 attack. Governmental, NGO's and private industry organizations having discussed Global Nuclear Cleanout since then and start to take actions. The US Department of Energy (DOE) has announced to establish a dedicated organization in cooperation with IAEA and start the 'Global Threat Reduction Initiative (GTRI)'. The US government will allocate to that program USD 450 M over the next 10 years. Besides the historical development the paper will focus on the progress of the different initiatives and perspectives to threat reduction. (author)

  4. Determinantal spanning forests on planar graphs

    OpenAIRE

    Kenyon, Richard

    2017-01-01

    We generalize the uniform spanning tree to construct a family of determinantal measures on essential spanning forests on periodic planar graphs in which every component tree is bi-infinite. Like the uniform spanning tree, these measures arise naturally from the laplacian on the graph. More generally these results hold for the "massive" laplacian determinant which counts rooted spanning forests with weight $M$ per finite component. These measures typically have a form of conformal invariance, ...

  5. Ose evaluation of delay systems in a high threat environment

    International Nuclear Information System (INIS)

    Rich, B.L.; Cook, B.G.

    1988-01-01

    The Office of Security Evaluations (OSE) has in place an Evaluation Program to assist the Department of Energy (DOE) Headquarters and operations office managers by assessing specific elements of protection programs and informing the managers of common strengths and weaknesses of these elements. This information is provided so that sufficient and cost effective protection programs are maintained or enhanced. The subject of this paper is the evaluation of delay systems in the high-threat environment defined for sensitive DOE security interests such as special nuclear materials, nuclear weapons, and related classified devices and information

  6. Thermodynamics and life span estimation

    International Nuclear Information System (INIS)

    Kuddusi, Lütfullah

    2015-01-01

    In this study, the life span of people living in seven regions of Turkey is estimated by applying the first and second laws of thermodynamics to the human body. The people living in different regions of Turkey have different food habits. The first and second laws of thermodynamics are used to calculate the entropy generation rate per unit mass of a human due to the food habits. The lifetime entropy generation per unit mass of a human was previously found statistically. The two entropy generations, lifetime entropy generation and entropy generation rate, enable one to determine the life span of people living in seven regions of Turkey with different food habits. In order to estimate the life span, some statistics of Turkish Statistical Institute regarding the food habits of the people living in seven regions of Turkey are used. The life spans of people that live in Central Anatolia and Eastern Anatolia regions are the longest and shortest, respectively. Generally, the following inequality regarding the life span of people living in seven regions of Turkey is found: Eastern Anatolia < Southeast Anatolia < Black Sea < Mediterranean < Marmara < Aegean < Central Anatolia. - Highlights: • The first and second laws of thermodynamics are applied to the human body. • The entropy generation of a human due to his food habits is determined. • The life span of Turks is estimated by using the entropy generation method. • Food habits of a human have effect on his life span

  7. Reading Ability and Memory Span: Long-Term Memory Contributions to Span for Good and Poor Readers.

    Science.gov (United States)

    McDougall, Sine J. P.; Donohoe, Rachael

    2002-01-01

    Investigates the extent to which differences in memory span for good and poor readers can be explained by differences in a long-term memory component to span as well as by differences in short-term memory processes. Discusses the nature of the interrelationships between memory span, reading and measures of phonological awareness. (SG)

  8. Performance test of remote controlled engineering vehicle system for CBRN threat. Countermeasure performance for CBRN-environment

    International Nuclear Information System (INIS)

    Naruse, Masahiro; Uemura, Keisuke; Morishita, Masahiro

    2015-01-01

    A research of 'remote controlled engineering vehicle system for CBRN threat' was triggered by the nuclear accident that successively happened after the Great East Japan Earthquake. This project focuses on the remote controlled engineering system that can be used for multi purposes such as debris/obstacle clearing operation or various reconnaissance operation, under CBRN threat. For the remote-controlled engineering vehicle, we conducted a series of validation tests for countermeasure performance for CBRN-environment. As a result, it is proved that the vehicle possess required performances for CBRN threat. (author)

  9. Life Span Developmental Approach

    Directory of Open Access Journals (Sweden)

    Ali Eryilmaz

    2011-03-01

    Full Text Available The Life Span Developmental Approach examines development of individuals which occurs from birth to death. Life span developmental approach is a multi-disciplinary approach related with disciplines like psychology, psychiatry, sociology, anthropology and geriatrics that indicates the fact that development is not completed in adulthood, it continues during the life course. Development is a complex process that consists of dying and death. This approach carefully investigates the development of individuals with respect to developmental stages. This developmental approach suggests that scientific disciplines should not explain developmental facts only with age changes. Along with aging, cognitive, biological, and socioemotional development throughout life should also be considered to provide a reasonable and acceptable context, guideposts, and reasonable expectations for the person. There are three important subjects whom life span developmental approach deals with. These are nature vs nurture, continuity vs discontinuity, and change vs stability. Researchers using life span developmental approach gather and produce knowledge on these three most important domains of individual development with their unique scientific methodology.

  10. Nuclear terrorism

    International Nuclear Information System (INIS)

    Watson, C.

    2005-01-01

    This article is aimed at those professional scientists and engineers who believe that issues of international peace and security are too important to be left to the politicians. Nuclear Terrorism is a hostile act (or a threat of such an act) involving nuclear materials (fissile or radioactive) performed by a terrorist, a term which covers a wide range of individuals. What they all have in common is that, for some reason they have become motivated to hurt or destroy sections of society which they have come to regard as the enemy; their motivation varies enormously. They also vary enormously in the extent and nature of their technical/scientific education. There are 'PhD terrorists' and 'Peasant terrorists', and they differ greatly in the threat that they represent, and the steps which can appropriately be taken to counter it. The most serious threat comes from the potential ability of terrorists to steal or manufacture nuclear weapons of mass destruction (e.g. capable of causing thousands of deaths). Unless the underlying causes of terrorism can be quickly removed, we have a duty to mankind to make terrorist access to such weapons, and to the nuclear materials which are their essential ingredients, as difficult as possible. Improvements in the arrangements for denying unauthorised access to radioactive material should be made such that the protective measures made are proportionate to the number of Curies at risk and the likelihood of a terrorist initiative. The preventative measures, sadly, need to take account of the possibility that the terrorist will use lethal force to access the material. (author)

  11. The puzzle of nuclear wastes. Radioactive threat to your health..

    International Nuclear Information System (INIS)

    2007-01-01

    This document, published by the French association 'Sortir du nucleaire' (Get out of nuclear), gives some information on what is radioactivity, the radioactive materials as a risk for living organisms, nuclear wastes all over France (list and map of the storage sites, power plants and fuel cycle centers), nuclear wastes at every step of the nuclear connection, the insolvable problem of high activity wastes, burying nuclear wastes in order to better forget them, radioactivity as a time bomb for our health, radioactive effluents as an under-estimated risk, artificial radioactivity already responsible for the death of 61 million people in the world, and so on

  12. Protection against nuclear terrorism: the IAEA response

    International Nuclear Information System (INIS)

    Dodd, B.

    2002-01-01

    Full text: As a result of the events of 11 September 2001, the International Atomic Energy Agency (IAEA) identified possible threats from acts of nuclear terrorism. A report to the Board of Governors in November 2001 summarized the IAEA's ongoing work in areas relevant to the prevention and mitigation of the consequences of such acts and outlined proposals for a number of new and/or enhanced activities. Four main threats were addressed: theft of a nuclear weapon; acquisition of nuclear material; acquisition of other radioactive material; and violent acts against nuclear facilities. These proposals have been further refined and the new plan was approved in principle at the March 2002 board meeting. In the beginning, implementation will be dependent on member state contributions to a voluntary fund. Proposed new or enhanced activities are grouped into eight areas: I. Physical protection of nuclear material and nuclear facilities; II. Detection of malicious activities involving nuclear and other radioactive materials; III. State systems for nuclear material accountancy and control; IV. Security of radioactive material other than nuclear material; V. Assessment of safety/security related vulnerability of nuclear facilities; VI. Response to malicious acts, or threats thereof; VII. Adherence to and implementation of international agreements, guidelines and recommendations; VIII. Nuclear security co-ordination and information management. After an overview, this paper focuses on activity area IV, which deals with the radiological terrorism issues involving radioactive sources. A strategy for evaluation of the IAEA's role is presented, covering an analysis of the likely threats and possible scenarios. This leads to an assessment of the most desirable sources from a terrorist's viewpoint. The strategy then examines how terrorists might acquire such sources and attempts to determine the best ways to prevent their acquisition. Further activities are proposed to prevent the use

  13. Nuclear deterrence and the Alliance in the 21. century

    International Nuclear Information System (INIS)

    Grand, Camille

    2016-01-01

    For more than two decades, nuclear debates had vanished from the heart of Western strategic debates. The general perception within the Alliance was that NATO was not facing direct threats on its territory and borders. NATO was surrounded by multiple 'partners', many of which were aspiring to membership. The threat of nuclear weapons seemed remote, and debates focused on the risks of proliferation or the prospects of a world free of nuclear weapons. This situation has changed dramatically in the last few years. Major and regional powers are modernising their nuclear forces and giving them a central role in their broader strategic posture. In such a context, deterrence is back and NATO needs to re-establish a robust and credible defence and deterrent vis-a-vis multiple and diverse threats, a topic which will be high on the agenda at NATO's summit in Warsaw in early July. There is a strong nuclear component to this debate. Reprint of a paper published in 'Nato Review', 2016

  14. Nuclear and hazardous material perspective

    International Nuclear Information System (INIS)

    Sandquist, Gary M.; Kunze, Jay F.; Rogers, Vern C.

    2007-01-01

    The reemerging nuclear enterprise in the 21. century empowering the power industry and nuclear technology is still viewed with fear and concern by many of the public and many political leaders. Nuclear phobia is also exhibited by many nuclear professionals. The fears and concerns of these groups are complex and varied, but focus primarily on (1) management and disposal of radioactive waste [especially spent nuclear fuel and low level radioactive waste], (2) radiation exposures at any level, and (3) the threat nuclear terrorism. The root cause of all these concerns is the exaggerated risk perceived to human health from radiation exposure. These risks from radiation exposure are compounded by the universal threat of nuclear weapons and the disastrous consequences if these weapons or materials become available to terrorists or rogue nations. This paper addresses the bases and rationality for these fears and considers methods and options for mitigating these fears. Scientific evidence and actual data are provided. Radiation risks are compared to similar risks from common chemicals and familiar human activities that are routinely accepted. (authors)

  15. Terrorist threat, chemical, biological, radiological, nuclear medical approach

    International Nuclear Information System (INIS)

    Revel, Th. de; Gourmelon, P.; Vidal, D.; Renaudeau, C.

    2005-01-01

    The different aspects linked to the use of nuclear, radiological, biological and or chemical weapons are gathered in this work. They concern history, fundamental aspect, diagnosis, therapy and prevention. The part devoted to the nuclear aspect concern the accidents in relation with ionizing radiations, the radiation syndrome, the contribution and limits of dosimetry, the treatment of medullary aplasia, the evaluation and treatment of an internal contamination, new perspectives on the use of cytokine for the treatment of accidental irradiated persons, alternative to the blood transfusion. (N.C.)

  16. Nuclear disarmament and the elimination of nuclear dangers

    International Nuclear Information System (INIS)

    Daerr, Hans-Joachim

    2002-01-01

    ... today's threats to security and stability have become less predictable and require at the same time a joint response. They illustrate the need for a new international order organized around shared values, common norms of behaviour and the rule of law. Disarmament, arms control, and non-proliferation are indispensable elements of this cooperative international order... We have to make sure that the functions that are today attributed to nuclear weapons become dispensable ... Nuclear disarmament is the counterpart of the renunciation of nuclear weapons by non-nuclear-weapons states. This bargain must not be undermined ... The NPT is no licence to perpetuate the status of the nuclear 'haves' versus the nuclear 'have nots.' (author)

  17. The Complexity of Threats to Nuclear Strategic Deterrence Posture

    Science.gov (United States)

    2017-02-07

    India and Pakistan, and concludes “…South Asian nuclear adversaries are believed to make each of the four dangers of inadvertent use of nuclear...directed energy, unmanned systems, and artificial intelligence ( AI ).”50 Ultimately, the promulgation of either of these technologies in a mature or

  18. Probabilistic assessment of nuclear safety and safeguards

    International Nuclear Information System (INIS)

    Higson, D.J.

    1987-01-01

    Nuclear reactor accidents and diversions of materials from the nuclear fuel cycle are perceived by many people as particularly serious threats to society. Probabilistic assessment is a rational approach to the evaluation of both threats, and may provide a basis for decisions on appropriate actions to control them. Probabilistic method have become standard tools used in the analysis of safety, but there are disagreements on the criteria to be applied when assessing the results of analysis. Probabilistic analysis and assessment of the effectiveness of nuclear material safeguards are still at an early stage of development. (author)

  19. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  20. The Revenge of the Melians: Asymmetric Threats and the Next QDR

    Science.gov (United States)

    2000-01-01

    agents are even more volatile and susceptible to biodegradation and corruption than chemical agents. They are also more difficult to dis- perse over a wide...recent movies and books, such as The Cobra Event by Richard Preston, have highlighted this threat, and it joins nuclear attack at the most-dangerous

  1. Climatic threat, energy crisis, and illusions of a nuclear revival

    International Nuclear Information System (INIS)

    2008-10-01

    While considering the example of the French nuclear reactor fleet, and while indicating various data concerning energy savings, CO 2 emissions, energy consumption in France and in other European countries, and also the occurrence of incidents in nuclear plants, this publication discusses the context of a climatic crisis, energy crisis, and of a possible nuclear revival boosted by the decreasing use of fossil energies to comply with the objective of reduction of greenhouse gases. It discusses the relationship a nuclear revival would have with climate change, with energy safety and with energy transition

  2. A Versatile System for the In-Field Non-Destructive Characterization of Radioactive Waste Packages and of Objects in the Defense against Nuclear Threats

    International Nuclear Information System (INIS)

    Buecherl, T.; Gostomski, Ch.-Lierse-von

    2013-06-01

    In-filed non-destructive characterization of radioactive waste packages and of objects in the defense of nuclear threats requires purpose-built but similar equipment. Based on commercially available measuring devices like dose-rate and gamma detectors, X-ray and gamma-transmission sources etc. a versatile and mobile mechanical positioning system for these devices is designed, assembled and operated facilitating basic to even complex measuring procedures. Several in-field measuring campaigns resulted in its further optimization. Today an highly mobile and flexible mechanical manipulator system is available supporting nearly all types of required measuring devices thus rising to nearly all occasions. (authors)

  3. The national nuclear material tracking system. A Korea's countermeasure against nuclear terrorism

    International Nuclear Information System (INIS)

    Moon, Joo Hyun

    2011-01-01

    Since nuclear terrorism has been identified as a real threat, the Korean government has earnestly developed elementary technologies and sub-systems for establishing an integrated defensive system against nuclear terrorism, which is based on the concept of defense-in-depth. This paper introduces the gist and implications of the studies that have been conducted in building the national nuclear material tracking system for preventing and intercepting the illicit trafficking and transporting of nuclear material in Korea. (orig.)

  4. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  5. American security perspectives: public views on energy, environment, nuclear weapons and terrorism: 2008

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from matching national surveys of the US general public on US energy and environmental security administered by telephone and Internet in mid-2008. Key areas of investigation include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alter-native sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include evolving perspectives on global climate change and relationships among environmental issues and potential policy options. We also report findings from an Internet survey of the general public conducted in mid-2008 that investigates assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism.

  6. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    Science.gov (United States)

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  7. Sabotage at Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Purvis, James W.

    1999-07-21

    Recently there has been a noted worldwide increase in violent actions including attempted sabotage at nuclear power plants. Several organizations, such as the International Atomic Energy Agency and the US Nuclear Regulatory Commission, have guidelines, recommendations, and formal threat- and risk-assessment processes for the protection of nuclear assets. Other examples are the former Defense Special Weapons Agency, which used a risk-assessment model to evaluate force-protection security requirements for terrorist incidents at DOD military bases. The US DOE uses a graded approach to protect its assets based on risk and vulnerability assessments. The Federal Aviation Administration and Federal Bureau of Investigation conduct joint threat and vulnerability assessments on high-risk US airports. Several private companies under contract to government agencies use formal risk-assessment models and methods to identify security requirements. The purpose of this paper is to survey these methods and present an overview of all potential types of sabotage at nuclear power plants. The paper discusses emerging threats and current methods of choice for sabotage--especially vehicle bombs and chemical attacks. Potential consequences of sabotage acts, including economic and political; not just those that may result in unacceptable radiological exposure to the public, are also discussed. Applicability of risk-assessment methods and mitigation techniques are also presented.

  8. Sabotage at Nuclear Power Plants

    International Nuclear Information System (INIS)

    Purvis, James W.

    1999-01-01

    Recently there has been a noted worldwide increase in violent actions including attempted sabotage at nuclear power plants. Several organizations, such as the International Atomic Energy Agency and the US Nuclear Regulatory Commission, have guidelines, recommendations, and formal threat- and risk-assessment processes for the protection of nuclear assets. Other examples are the former Defense Special Weapons Agency, which used a risk-assessment model to evaluate force-protection security requirements for terrorist incidents at DOD military bases. The US DOE uses a graded approach to protect its assets based on risk and vulnerability assessments. The Federal Aviation Administration and Federal Bureau of Investigation conduct joint threat and vulnerability assessments on high-risk US airports. Several private companies under contract to government agencies use formal risk-assessment models and methods to identify security requirements. The purpose of this paper is to survey these methods and present an overview of all potential types of sabotage at nuclear power plants. The paper discusses emerging threats and current methods of choice for sabotage--especially vehicle bombs and chemical attacks. Potential consequences of sabotage acts, including economic and political; not just those that may result in unacceptable radiological exposure to the public, are also discussed. Applicability of risk-assessment methods and mitigation techniques are also presented

  9. Children's reactions to the threat of nuclear plant accidents

    International Nuclear Information System (INIS)

    Schwebel, M.; Schwebel, B.

    1981-01-01

    In the wake of Three Mile Island nuclear plant accident, questionnaire and interview responses of children in elementary and secondary schools revealed their perceptions of the dangers entailed in the continued use of nuclear reactors. Results are compared with a parallel study conducted close to 20 years ago, and implications for mental health are examined

  10. QA programs in nuclear power plants

    International Nuclear Information System (INIS)

    Ellingson, A.C.

    1976-01-01

    As an overview of quality assurance programs in nuclear power plants, the energy picture as it appears today is reviewed. Nuclear power plants and their operations are described and an attempt is made to place in proper perspective the alleged ''threats'' inherent in nuclear power. Finally, the quality assurance programs being used in the nuclear industry are described

  11. Structuring Cooperative Nuclear RIsk Reduction Initiatives with China.

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, Larry [Stanford Univ., CA (United States); Reinhardt, Jason Christian [Stanford Univ., CA (United States); Hecker, Siegfried [Stanford Univ., CA (United States)

    2017-03-01

    The Stanford Center for International Security and Cooperation engaged several Chinese nuclear organizations in cooperative research that focused on responses to radiological and nuclear terrorism. The objective was to identify joint research initiatives to reduce the global dangers of such threats and to pursue initial technical collaborations in several high priority areas. Initiatives were identified in three primary research areas: 1) detection and interdiction of smuggled nuclear materials; 2) nuclear forensics; and 3) radiological (“dirty bomb”) threats and countermeasures. Initial work emphasized the application of systems and risk analysis tools, which proved effective in structuring the collaborations. The extensive engagements between national security nuclear experts in China and the U.S. during the research strengthened professional relationships between these important communities.

  12. Life Span Developmental Approach

    OpenAIRE

    Ali Eryilmaz

    2011-01-01

    The Life Span Developmental Approach examines development of individuals which occurs from birth to death. Life span developmental approach is a multi-disciplinary approach related with disciplines like psychology, psychiatry, sociology, anthropology and geriatrics that indicates the fact that development is not completed in adulthood, it continues during the life course. Development is a complex process that consists of dying and death. This approach carefully investigates the development of...

  13. Nuclear knowledge management

    International Nuclear Information System (INIS)

    2007-01-01

    The management of nuclear knowledge has emerged as a growing challenge in recent years. The need to preserve and transfer nuclear knowledge is compounded by recent trends such as ageing of the nuclear workforce, declining student numbers in nuclear-related fields, and the threat of losing accumulated nuclear knowledge. Addressing these challenges, the IAEA promotes a 'knowledge management culture' through: - Providing guidance for policy formulation and implementation of nuclear knowledge management; - Strengthening the contribution of nuclear knowledge in solving development problems, based on needs and priorities of Member States; - Pooling, analysing and sharing nuclear information to facilitate knowledge creation and its utilization; - Implementing effective knowledge management systems; - Preserving and maintaining nuclear knowledge; - Securing sustainable human resources for the nuclear sector; and - Enhancing nuclear education and training

  14. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  15. Domestic safeguards in the nuclear industry

    International Nuclear Information System (INIS)

    Uhrig, R.E.

    1979-01-01

    The Energy Reorganization Act of 1974 brought about markedly increased security requirements at nuclear power plants. NRC established a threat level against which the security forces were expected to defend. It is asserted that an inadequate legal basis exists for the NRC requirement that nuclear plants be defended by the use of deadly force, if necessary, and that complex issues such as apprehension, retention, and pursuit of intruders are left vague. Security measures patterned after the airline industry, resolution of the deadly force issue, and definition of a creditable threat level are proposed

  16. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  17. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  18. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  19. US and Russian academies forge ties for nuclear security

    International Nuclear Information System (INIS)

    Eldridge, Christopher A.

    2005-01-01

    In response to the growing threats of nuclear terrorism and proliferation, the US National Academies (NA) and the Russian Academy of Sciences (RAS) initiated a series of joint projects in early 2002 that bring their concerted expertise to bear on the challenges of cooperation between their two countries on nuclear non-proliferation. The IAEA has lent its talent and support to this inter-academy collaboration by hosting workshops that were jointly organized by the NA and RAS with financial support from the US-based Nuclear Threat Initiative. The two workshops, held at IAEA headquarters in September 2003, shed valuable light on both the obstacles and opportunities being faced. The first workshop explored ways of overcoming impediments to cooperation between the US and Russia on nuclear non-proliferation. Participants included current and former US and Russian government officials with responsibility for cooperative programs as well as experts from non-governmental organizations in the two countries. The second workshop convened a multinational group of experts on nuclear materials protection, control, and accounting (MPC and A) to discuss practices and procedures in light of the evolving threats of nuclear proliferation and terrorism

  20. Crossed glances at a nuclearized Iran; Regards croises sur un Iran nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-11-01

    Nuclearizing Iran is a sensible topic which disturbs the established deterrence equilibrium of the main nuclearized powers and the interests of all signatories of the non-proliferation treaty. This book analyses the Iranian nuclear crisis, the US perception of the Iranian threat, the perception of the threat against Israel, and in parallel, the perspectives of evolution of the Iranian economy. The question of a possible change of the European Union and US standpoints with respect to the Iranian nuclear activity is addressed

  1. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  2. An integrated approach to risk assessment and mitigating the CBRN threat

    International Nuclear Information System (INIS)

    Bokan, S.

    2009-01-01

    CBRN mass casualty events threat mitigation remains today the highest international priority. Although significant progress has been made, the national security requirements for efforts to combat Weapons of Mass Destruction and Weapons of Mass Disruption will be of the highest national priority in the near future. An integration of a number of approaches is essential in the risk assessment and mitigating the CBRN treat. Preparedness measures and procedures, engineering, science and technology, policy, medical, and emergency response are essential to reduce the threat from the proliferation and use of weapons of mass destruction (WMD). Improved coordination between international, public and private security entities is also essential task to hopefully prevent the terrorist attacks. In this lecture, it will be presented very important scientific approach to risk assessment of potential use of nuclear, radiological, biological or chemical weapons in terrorist actions. An integrated approach for mitigating the CBRN threat, crisis management and preparedness measures for prevention and reduction of potential consequences, will be presented.(author)

  3. Does having children extend life span? A genealogical study of parity and longevity in the Amish.

    Science.gov (United States)

    McArdle, Patrick F; Pollin, Toni I; O'Connell, Jeffrey R; Sorkin, John D; Agarwala, Richa; Schäffer, Alejandro A; Streeten, Elizabeth A; King, Terri M; Shuldiner, Alan R; Mitchell, Braxton D

    2006-02-01

    The relationship between parity and life span is uncertain, with evidence of both positive and negative relationships being reported previously. We evaluated this issue by using genealogical data from an Old Order Amish community in Lancaster, Pennsylvania, a population characterized by large nuclear families, homogeneous lifestyle, and extensive genealogical records. The analysis was restricted to the set of 2,015 individuals who had children, were born between 1749 and 1912, and survived until at least age 50 years. Pedigree structures and birth and death dates were extracted from Amish genealogies, and the relationship between parity and longevity was examined using a variance component framework. Life span of fathers increased in linear fashion with increasing number of children (0.23 years per additional child; p =.01), while life span of mothers increased linearly up to 14 children (0.32 years per additional child; p =.004) but decreased with each additional child beyond 14 (p =.0004). Among women, but not men, a later age at last birth was associated with longer life span (p =.001). Adjusting for age at last birth obliterated the correlation between maternal life span and number of children, except among mothers with ultrahigh (>14 children) parity. We conclude that high parity among men and later menopause among women may be markers for increased life span. Understanding the biological and/or social factors mediating these relationships may provide insights into mechanisms underlying successful aging.

  4. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  5. Global Vigilence. Strengthening Nuclear Security Worldwide

    International Nuclear Information System (INIS)

    Amano, Yukiya

    2013-01-01

    Nuclear terrorism is a continuing threat. Progress has been made in recent years in ensuring that nuclear and other radioactive material, as well as associated facilities, are properly protected everywhere in the world. But much remains to be done

  6. Unravelling the nuclear matrix proteome

    DEFF Research Database (Denmark)

    Albrethsen, Jakob; Knol, Jaco C; Jimenez, Connie R

    2009-01-01

    The nuclear matrix (NM) model posits the presence of a protein/RNA scaffold that spans the mammalian nucleus. The NM proteins are involved in basic nuclear function and are a promising source of protein biomarkers for cancer. Importantly, the NM proteome is operationally defined as the proteins...

  7. Global Risk of Nuclear Terrorism

    Directory of Open Access Journals (Sweden)

    Emily Diez

    2010-01-01

    Full Text Available The emergence of nuclear terrorism, a threat that President Obama called "the gravest danger we face," has signaled a paradigm shift in international security. Since the collapse of the Soviet Union, sensitive nuclear technologies and materials have become increasingly available. Globalization and the inadequate enforcement of treaties and export controls have allowed the proliferation of nuclear weapons materials. Today, international terrorist organizations seek to employ weapons of mass destruction (WMD as a means to influence national policies around the world. AlQaida spokesman Suleiman Abu Gheith declared that in order to balance the injustices that have been inflicted on the Muslim population worldwide, al-Qaida's new objective is "to kill 4 million Americans–2 million of them children." As political scientist Graham Allison notes, this could be achieved with either 1,334 attacks similar in magnitude to those of 9/11, or one nuclear bomb.Building a nuclear program is an arduous task that requires tacit knowledge, the recruitment of nuclear scientists, engineers, and machinists, and the resources and time to obtain nuclear materials and components. While it is unlikely that terrorist organizations have the capacity to develop full-fledged programs in the near term, terrorist development and acquisition of nuclear weapons remains a long-term threat that requires international action.

  8. Families and the prospect of nuclear attack/holocaust

    Energy Technology Data Exchange (ETDEWEB)

    Marciano, T.; Sussman, M.B.

    1986-01-01

    This volume addresses the issues attending the continuing threat of a nuclear holocaust and the effect this threat has on the behavior of families. It examines topics such as denial, involvement in community program social movements and other political actions.

  9. Find and neutralize clandestine nuclear weapons

    International Nuclear Information System (INIS)

    Canavan, G.H.

    1997-09-01

    The objective of finding nuclear material at entry portals is to provide a secure perimeter as large as a weapon damage radius so that operations could be conducted within it relatively unencumbered. The objective of wide area search for nuclear material to provide a safe zone of similar dimensions in an area in which it is not possible to maintain a secure perimeter, to provide assurance for civilians living at an area at risk, or to provide rapid, wide area search of regions that could conceal nuclear threats to forces in the field. This rapid, wide-area, and confident detection of nuclear materials is the essential first step in developing the ability to negate terrorist nuclear assemblies or weapons. The ability to detect and negate nuclear materials are necessary to prevent the forced, massive evacuation of urban populations or the disruption of military operations in response to terrorist threats. This paper describes the limitations to current sensors used for nuclear weapon detection and discusses a novel approach to nuclear weapon detection using a combination of directional information (imaging) and gamma ray energy (color) to produce a gamma ray color camera

  10. Nuclear power, the great illusion. Promises, setbacks and threats

    International Nuclear Information System (INIS)

    Marignac, Y.

    2008-01-01

    In the context of high oil, gas and coal prices, and of ever deepening and more specific anxieties about global warming, France seems to have decided to use its EU presidency from July to December 2008 to do everything to persuade its European partners that a massive resurgence in nuclear energy is absolutely necessary. This will, of course, be to the great benefit of France's industry. Nicolas Sarkozy has made it a key point of the 'energy/climate package' whose negotiation he hopes to have completed by the end of his European mandate. He has received significant support from the current President of the European Commission for this initiative, which has been widely debated across Europe. More widely, the French President has undertaken nothing short of an international crusade on the subject, focusing in particular on Mediterranean countries such as Morocco and Algeria, to whom he has proposed active collaboration with French industry and the French Government, stressing the advantages of such cooperation in the 'war on terror'. In so doing, he is relying on the global reputation which France and its industry has acquired in this field by tirelessly extolling the virtues of energy independence and the economic boost that large-scale nuclear electricity production can bring to a country's energy system, while being environmentally harmless and perfectly safe, secure and long-lasting. This line of argument, developed over decades by French governments both right and left, and the nuclear lobby which is closely linked to them, has managed to take hold in a France weak in independent expertise. This weakness has been deliberately maintained by the authorities and the elites, who prefer the comfort of an almost religious consensus to the debate which would inevitably be triggered by an independent and unrestricted evaluation. The French President is counting on the self-declared virtues of nuclear energy and the exemplary nature of the French experience to convince

  11. Age Differences in Memory Span

    Science.gov (United States)

    Chi, Michelene T. H.

    1977-01-01

    Three experiments were conducted to determine processes underlying age differences in the level of recall in a memory-span task. Five-year-olds recalled fewer items than adults in memory-span tasks involving both familiar and unfamiliar faces, even though the use of rehearsal and recoding strategies was minimized for adults. (MS)

  12. Frontiers in nuclear chemistry

    International Nuclear Information System (INIS)

    Sood, D.D.; Reddy, A.V.R.; Pujari, P.K.

    1996-01-01

    This book contains articles on the landmarks in nuclear and radiochemistry which takes through scientific history spanning over five decades from the times of Roentgen to the middle of this century. Articles on nuclear fission and back end of the nuclear fuel cycle give an insight into the current status of this subject. Reviews on frontier areas like lanthanides, actinides, muonium chemistry, accelerator based nuclear chemistry, fast radiochemical separations and nuclear medicine bring out the multidisciplinary nature of nuclear sciences. This book also includes an article on environmental radiochemistry and safety. Chapters relevant to INIS are indexed separately

  13. Nuclear accidents and protection

    International Nuclear Information System (INIS)

    Biocanin, R.; Amidzic, B.

    2005-01-01

    The numerous threats are our cruel reality. There is a great arsenal of nuclear weapons. Nuclear terrorism and nuclear accidents are always possible, especially during the transport and handling different nuclear material. Terrorist organisation also goes for coming into the possession of the nuclear means. Specific and important problem is human radioactive contamination in using nuclear energy for peaceful and military purpose. So, realisation of the universal and united system of NBCD gives us a possibility by using the modern communication equipment and very effective mobile units to react in a real time and successfully perform monitoring, alarming, protection and decontamination. (author) [sr

  14. Re-examining the 1996 ICJ Advisory Opinion: Concerning the Legality of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Jasjit Singh

    2012-10-01

    Full Text Available The primary objections raised against total elimination of nuclear weapons are built around a few arguments mostly of non-technical nature.Nuclear weapons and the strategies for their use have resulted in the establishment of a vicious circle within which the international community is trapped.The argument that the world will be unsafe without nuclear weapons is only meant to further the narrow self-interest of the nuclear weapon states and their allies.The World Court’s far-reaching 1996 advisory opinion concluded that almost any use or threat of use of nuclear weapons would violate international humanitarian law and law applicable in armed conflict, undermining most claims of nuclear weapon states regarding the legitimacy of possession, use or threat of use of nuclear weapons. The next logical step would be an initiative for a nuclear convention banning the use and threat of use of nuclear weapons in Asia and the adjoining oceans. But as long as the dominant elites in society and the nation-state believe in the utility of nuclear weapons for national security or as the currency of power, abolition of nuclear weapons will remain a mirage.

  15. On the size of monotone span programs

    NARCIS (Netherlands)

    Nikov, V.S.; Nikova, S.I.; Preneel, B.; Blundo, C.; Cimato, S.

    2005-01-01

    Span programs provide a linear algebraic model of computation. Monotone span programs (MSP) correspond to linear secret sharing schemes. This paper studies the properties of monotone span programs related to their size. Using the results of van Dijk (connecting codes and MSPs) and a construction for

  16. The national nuclear material tracking system. A Korea's countermeasure against nuclear terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Joo Hyun [Dongguk Univ., Gyeongbuk (Korea, Republic of)

    2011-07-15

    Since nuclear terrorism has been identified as a real threat, the Korean government has earnestly developed elementary technologies and sub-systems for establishing an integrated defensive system against nuclear terrorism, which is based on the concept of defense-in-depth. This paper introduces the gist and implications of the studies that have been conducted in building the national nuclear material tracking system for preventing and intercepting the illicit trafficking and transporting of nuclear material in Korea. (orig.)

  17. London SPAN version 4 parameter file format

    International Nuclear Information System (INIS)

    2004-06-01

    Powernext SA is a Multilateral Trading Facility in charge of managing the French power exchange through an optional and anonymous organised trading system. Powernext SA collaborates with the clearing organization LCH.Clearnet SA to secure and facilitate the transactions. The French Standard Portfolio Analysis of Risk (SPAN) is a system used by LCH.Clearnet to calculate the initial margins from and for its clearing members. SPAN is a computerized system which calculates the impact of several possible variations of rates and volatility on by-product portfolios. The initial margin call is equal to the maximum probable loss calculated by the system. This document contains details of the format of the London SPAN version 4 parameter file. This file contains all the parameters and risk arrays required to calculate SPAN margins. London SPAN Version 4 is an upgrade from Version 3, which is also known as LME SPAN. This document contains the full revised file specification, highlighting the changes from Version 3 to Version 4

  18. The NNSA global threat reduction initiative's efforts to minimize the use of highly enriched uranium for medical isotope production

    International Nuclear Information System (INIS)

    Staples, Parrish

    2010-01-01

    The mission of the National Nuclear Security Administration's (NNSA) Office of Global Threat Reduction (GTRI) is to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. GTRI is a key organization for supporting domestic and global efforts to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civilian nuclear applications. GTRI implements the following activities in order to achieve its threat reduction and HEU minimization objectives: Converting domestic and international civilian research reactors and isotope production facilities from the use of HEU to low enriched uranium (LEU); Demonstrating the viability of medical isotope production technologies that do not use HEU; Removing or disposing excess nuclear and radiological materials from civilian sites worldwide; and Protecting high-priority nuclear and radiological materials worldwide from theft and sabotage. This paper provides a brief overview on the recent developments and priorities for GTRI program activities in 2010, with a particular focus on GTRI's efforts to demonstrate the viability of non-HEU based medical isotope production technologies. (author)

  19. Nuclear export and armament. New threats and peace perspectives

    International Nuclear Information System (INIS)

    Kubbig, B.W.; Mueller, H.

    1993-02-01

    The authors give a condensed analysis of safety and politico-economic dimensions regarding the further proliferation of nuclear weapons and carrier systems with which nuclear blasting charges can be transported. From the content: - Proliferation and non-proliferation: technology, economy and (international) law in a political historic survey. - Missile defense: appropriate technological answer to the political proliferation problem? -export strategies: USA and FRG in comparison, interest and policy of the European Community. - Components for an extensive proliferation strategy. (orig./HP) [de

  20. Psychometric and demographic predictors of the perceived risk of terrorist threats and the willingness to pay for terrorism risk management programs.

    Science.gov (United States)

    Mumpower, Jeryl L; Shi, Liu; Stoutenborough, James W; Vedlitz, Arnold

    2013-10-01

    A 2009 national telephone survey of 924 U.S. adults assessed perceptions of terrorism and homeland security issues. Respondents rated severity of effects, level of understanding, number affected, and likelihood of four terrorist threats: poisoned water supply; explosion of a small nuclear device in a major U.S. city; an airplane attack similar to 9/11; and explosion of a bomb in a building, train, subway, or highway. Respondents rated perceived risk and willingness to pay (WTP) for dealing with each threat. Demographic, attitudinal, and party affiliation data were collected. Respondents rated bomb as highest in perceived risk but gave the highest WTP ratings to nuclear device. For both perceived risk and WTP, psychometric variables were far stronger predictors than were demographic ones. OLS regression analyses using both types of variables to predict perceived risk found only two significant demographic predictors for any threat--Democrat (a negative predictor for bomb) and white male (a significant positive predictor for airline attack). In contrast, among psychometric variables, severity, number affected, and likelihood were predictors of all four threats and level of understanding was a predictor for one. For WTP, education was a negative predictor for three threats; no other demographic variables were significant predictors for any threat. Among psychometric variables, perceived risk and number affected were positive predictors of WTP for all four threats; severity and likelihood were predictors for three; level of understanding was a significant predictor for two. © 2013 Society for Risk Analysis.

  1. HEU core conversion of Russian production reactors: a major threat to the international RERTR regime

    International Nuclear Information System (INIS)

    Kuperman, Alan J.; Leventhal, Paul L.

    1998-01-01

    This paper calls the attention for the major threat to the International Reduced Enrichment for Research and Test Reactors (RERTR) program, represented by the HEU core conversion of russian production reactors. This program aims to reduce and eventually eliminate international civilian commerce in nuclear weapons-usable, highly enriched uranium , and thereby significantly lower risks of the material being stolen or diverted by terrorist or states for producing nuclear weapons

  2. Public views on multiple dimensions of security: nuclear weapons, terrorism, energy, and the environment: 2007

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  3. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  4. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  5. The Fukushima Nuclear Accident: What has been learned from it?

    Science.gov (United States)

    Ohska, Tokio

    2014-05-01

    The ill-fated Fukushima nuclear reactors are still in a state in which Japanese are struggling to find the end of the tunnel. They are now facing with the highly contaminated radioactive water. It is polluting the world unless confined in a small space for an incredibly long time. There have been many cases such as the crude oil leak from a deep-sea oil well polluting ocean or many volcanic eruptions that had globally polluted air. Why the Fukushima nuclear accident should be treated in a different way when these radioactive materials were originally from ground and they will eventually find their way back into a soil? The reality is not as simple and a remarkable difference needs to be put into consideration: nuclear wastes are highly condensed because humans worked to make them that way so that they can be used as nuclear fuel or atomic bomb. Trouble is that one finds in nuclear waste many radioactive substances with very long half-life times that would stay hazardous for many future generations. Most ashes from big volcanic eruption find their way to the ground within several years or so. Once they landed the surface of the ground, they are no different from the soil and will become basically harmless dusts. On the contrary, for some part of nuclear waste it will take over 10,000 years to become almost harmless. In general any human being does not feel a real threat on anything that would happen far beyond his/her life span. People usually are optimistic by saying that someone in a future would come up with a perfect solution to take care of the problems associated with nuclear waste. This argument reflects a very irresponsible attitude of people working on the project involving nuclear fuel. The problems in Fukushima nuclear accidents are mainly resulting from such an irresponsible attitude. Is it ever possible to see a happy end with any nuclear power station based on such a human mentality?

  6. Comparison on the heat requirements of a four-span greenhouse with a melting snow system and a single-span greenhouse

    International Nuclear Information System (INIS)

    Furuno, S.; Sase, S.; Ishii, M.

    2004-01-01

    The heat requirements were measured and compared between a four-span greenhouse with a melting snow system and a typical single-span greenhouse with no melting snow system. Generally, single-span greenhouses require no melting snow system because snow drops off naturally from the roofs by gravity. The results for the four-span greenhouse showed that the provided heat by a heater for melting snow increased with an increase in snowfall, and there was a high correlation between them. The heat requirement per unit floor area of the four-span greenhouse was slightly less than that of the single-span greenhouse. This suggests that the decrease in heat requirement for internal air because of the larger floor/surface area ratio of the four-span greenhouse was more than the increase in heat requirement for melting snow. The measured heat requirement of the four-span greenhouse with the melting snow system was equal to the estimated heat load based on a common calculation procedure. On the other hand, that of the single-span greenhouse was slightly smaller than the estimated heat load. These suggest that the estimated heat load based on the common calculation procedure was slightly overestimated and larger than the actual heat requirement excluding the heat for the melting snow in snowy area. This is likely due to the fact that the parameters in the common calculation procedure were determined under the condition of larger net radiation than that in snowy area

  7. Why there is a need to revise the design basis threat concept

    International Nuclear Information System (INIS)

    Kondratov, S.; Steinhaeusler, F.

    2005-01-01

    Full text: The coordinated terrorist attacks in the United States on September 11, 2001, necessitated the review of the proven concept of the Design Basis Threat (DBT) for nuclear installations. It is safe to assume that revised and upgraded DBT will result in costly technical solutions. Since infrastructure deficits and financial limitations in many countries have already limited the practical application of the DBT in many instances, the revised threat assessment is likely to worsen the current dissatisfactory situation further. Therefore, a new realism in the use of the DBT concept is proposed, based on a three-level approach. This will enable countries to tailor the design of their physical protection systems in accordance with their means by implementing either a minimum required security level protecting only against the most probable threat, or aiming for an intermediate protection level reflecting the newly introduced AHARA - as high as reasonably achievable - principle, or providing the optimum protection level based on an externally reviewed, fully comprehensive DBT. (author)

  8. Why there is a need to revise the Design Basis Threat concept

    International Nuclear Information System (INIS)

    Kondratov, S.; Steinhausler, F.

    2006-01-01

    The terrorist attacks in the USA on 11 September 2001 necessitated a review of the proven concept of the Design Basis Threat (DBT) for nuclear installations. It can be assumed that revised and upgraded DBT will result in costly technical solutions. Since infrastructure deficits and financial limitations in many countries have already limited the practical application of the DBT, the revised threat assessment is likely to worsen the current unsatisfactory situation. Therefore, a new realism in the use of the DBT concept is proposed based on a three-level approach. This will enable countries to tailor the design of their physical protection systems in accordance with their means by implementing either a minimum required security level protecting only against the most probable threat, or an intermediate protection level reflecting the newly introduced AHARA (As High As Reasonably Achievable) principle, or the optimum protection level based on an externally reviewed, fully comprehensive DBT. (author)

  9. Linking crowding, visual span, and reading.

    Science.gov (United States)

    He, Yingchen; Legge, Gordon E

    2017-09-01

    The visual span is hypothesized to be a sensory bottleneck on reading speed with crowding thought to be the major sensory factor limiting the size of the visual span. This proposed linkage between crowding, visual span, and reading speed is challenged by the finding that training to read crowded letters reduced crowding but did not improve reading speed (Chung, 2007). Here, we examined two properties of letter-recognition training that may influence the transfer to improved reading: the spatial arrangement of training stimuli and the presence of flankers. Three groups of nine young adults were trained with different configurations of letter stimuli at 10° in the lower visual field: a flanked-local group (flanked letters localized at one position), a flanked-distributed group (flanked letters distributed across different horizontal locations), and an isolated-distributed group (isolated and distributed letters). We found that distributed training, but not the presence of flankers, appears to be necessary for the training benefit to transfer to increased reading speed. Localized training may have biased attention to one specific, small area in the visual field, thereby failing to improve reading. We conclude that the visual span represents a sensory bottleneck on reading, but there may also be an attentional bottleneck. Reducing the impact of crowding can enlarge the visual span and can potentially facilitate reading, but not when adverse attentional bias is present. Our results clarify the association between crowding, visual span, and reading.

  10. Designing a Physical Security System for Risk Reduction in a Hypothetical Nuclear Facility

    International Nuclear Information System (INIS)

    Saleh, A.A.; Abd Elaziz, M.

    2017-01-01

    Physical security in a nuclear facility means detection, prevention and response to threat, the ft, sabotage, unauthorized access and illegal transfer involving radioactive and nuclear material. This paper proposes a physical security system designing concepts to reduce the risk associated with variant threats to a nuclear facility. This paper presents a study of the unauthorized removal and sabotage in a hypothetical nuclear facility considering deter, delay and response layers. More over, the study involves performing any required upgrading to the security system by investigating the nuclear facility layout and considering all physical security layers design to enhance the weakness for risk reduction

  11. Opposing the nuclear threat: The convergence of moral analysis and empirical data

    International Nuclear Information System (INIS)

    Hehir, J.B.

    1986-01-01

    This paper examines the concept of nuclear winter from the perspective of religious and moral values. The objective is to identify points of intersection between the empirical arguments about nuclear winter and ethical perspectives on nuclear war. The analysis moves through three steps: (1) the context of the nuclear debate; (2) the ethical and empirical contributions to the nuclear debate; and (3) implications for policy drawn from the ethical-empirical data

  12. Reframing the debate against nuclear weapons

    International Nuclear Information System (INIS)

    Tyson, Rhianna

    2005-01-01

    'Some 35,000 nuclear weapons remain in the arsenals of the nuclear powers, with thousands still deployed on hair-trigger alert. Whatever rationale these weapons may once have had has long since dwindled. Political, moral, and legal constraints on actually using them further undermine their strategic utility without, however, reducing the risks of inadvertent war or proliferation. The objective of nuclear non-proliferation is not helped by the fact that the nuclear weapon States continue to insist that those weapons in their hands enhance security, while in the hands of others they are a threat to world peace. If we were making steady progress towards disarmament, this situation would be less alarming. Unfortunately, the reverse is true.' - United Nations Secretary-General Kofi Annan. 'Something is wrong with the nuclear disarmament and non-proliferation regime. Although seemingly well-equipped with an arsenal of legal and political mechanisms, such as the Nuclear Non-Proliferation Treaty (NPT), the 1996 Advisory Opinion of the International Court of Justice (ICJ), decades' worth of General Assembly (GA) resolutions and even a recent slew of ad-hoc, plurilateral initiatives such as the Proliferation Security Initiative, the regime created to prevent the catastrophe of nuclear war remains inadequate. This insufficiency is even starker when viewed in relation to the regimes controlling other weapons of mass destruction. Despite its own challenges, the Organization for the Prohibition on Chemical Weapons remains relatively well-funded and well-situated to facilitate the implementation of the Chemical Weapons Convention (CWC). Even the Biological and Toxin Weapons Convention (BTWC), while still lacking the necessary verification mechanisms, has managed to effectively criminalize not just the use and threat of use of biological weapons, but also their production, development and stockpiling. Meanwhile, the anti-nuclear regime seems to be faltering. Progress made in

  13. Detailed free span assessment for Mexilhao flow lines

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, Antonio; Franco, Luciano; Eigbe, Uwa; BomfimSilva, Carlos [INTECSEA, Houston, TX (United States); Escudero, Carlos [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil)

    2009-07-01

    The subsea gas production system of Mexilhao Field SPS-35, Santos Basin, offshore Brazil, is composed basically of two rigid 12.75 inches production flow lines approximately 21 km long installed in a fairly rough seabed. During the basic design, the free span assessment was performed considering the maximum allowable free span length determined by the response model proposed by DNV-RP-F105. This approach resulted in a large number of predicted free span requiring corrections, leading to a higher capital cost for the project. In this sense, a detailed free span VIV fatigue assessment was proposed, considering multi-spans and multi-mode effects and also the post lay survey data. The assessment followed the DNV-RP-F105 recommendations for multi-spans and multi-mode effects, using Finite Element Analysis to determine the natural frequencies, mode shapes and corresponding stresses associated with the mode shapes. The assessment was performed in three stages, the first during the detailed design as part of the bottom roughness analysis using the expected residual pipelay tension. The second stage was performed after pipelay, considering the post-lay survey data, where the actual requirements for span correction were determined. Actual pipelay tension was used and seabed soil stiffness adjusted in the model to match the as-laid pipeline profile obtained from the survey data. The first and second stage assessments are seamlessly automated to speed up the evaluation process and allow for quick response in the field, which was important to keep the construction vessel time minimized. The third stage was performed once the corrections of the spans were made and the purpose was to confirm that the new pipeline configuration along the supported spans had sufficient fatigue life for the temporary and operational phases. For the assessment of all three stages, the probability of occurrence and directionality of the near bottom current was considered to improve prediction of the

  14. The nuclear revival after Fukushima

    International Nuclear Information System (INIS)

    Montfort, Julie; Du Castel, Viviane

    2012-12-01

    This bibliographical note presents a book in which the author questions the role of nuclear energy (energy supply security or diplomatic weapon, pretext for geo-strategic ambitions), discusses the various political aspects of nuclear energy (between progressive phasing out and rehabilitation, question of the existence of a European model and of Africa as a main actor), and discusses the conflicting character of nuclear energy (threat or stake, instrument of reconciliation or objective at whatever price, issues of terrorism and nuclear proliferation)

  15. Nuclear energy, a point for discussion

    International Nuclear Information System (INIS)

    Seibel, W.

    1977-01-01

    In a world no longer believing in a life after death, life on this world becomes an absolute value and death an absolute threat. The irrational parts of the resistence against nuclear energy, this worry for the saving of this value and the fear of this threat are seen. Such fears cannot be met with tables about accident frequency and risk factors. Therefore in the author's opinion, also the churches are requested to give a concerning answer to the question of the meaning of life, for these fears not to arise repeatedly, namely today in protests against technical development and nuclear energy, and tomorrow somewhere else. (GL) [de

  16. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  17. Global Threat Reduction Initiative International Partners' Conference. Summary of the proceedings and findings of the conference

    International Nuclear Information System (INIS)

    2004-01-01

    The Global Threat Reduction Initiative (GTRI) International Partners' Conference took place in Vienna, Austria, from September 18-19, 2004. More than 590 representatives from 100 International Atomic Energy Agency (IAEA) Member States attended the GTRI International Partners' Conference on September 18-19, 2004, in Vienna, Austria. Representatives from ten non-governmental and international organizations were also present during the conference. The Governments of the United States and the Russian Federation co-sponsored the International Partners Conference, with support from the International Atomic Energy Agency. The purpose of the International Partners' Conference was to build and broaden international support for efforts by national authorities to identify, secure, recover, and/or facilitate the disposition of high-risk nuclear and radioactive materials that pose a potential threat to the international community. One of the significant outcomes of the International Partners Conference was reaching agreement on the Findings of the Conference (enclosed in this document) by participating Member States that outlined a broadly shared opinion of participating Member States on efforts to reduce the potential threat posed by vulnerable, unsecured nuclear and other radioactive material. It is hoped that this document can be used as a framework to consolidate, expand, and accelerate domestic, regional, and IAEA programs that address unsecured vulnerable nuclear and radioactive materials, as deemed necessary by Member States. As a first step, participating members states urged the international community to note additional opportunities to further build support for activities related to GTRI

  18. On China's Nuclear Doctrine

    Directory of Open Access Journals (Sweden)

    Xia Liping

    2015-12-01

    Full Text Available Nuclear weapons have played an important role in China's national strategy. China’s nuclear doctrine has a very strong continuity. Nevertheless, China has made readjustments in its nuclear doctrine according to the changes of its internal and external situation and its general strategic threat perception. China’s nuclear doctrine has experienced a process of evolution from anti-nuclear blackmail to minimum deterrence. There are five major parts in China's nuclear doctrine: policy of declaration, nuclear development, nuclear deployment, nuclear employment, and nuclear disarmament. Because China is faced with a different situation from other nuclear powers and has its own strategic culture, China has a nuclear doctrine with its own characteristics. China’s nuclear doctrine has been affiliated with and has served the national development strategy, national security strategy, national defense policy and military strategy of China.

  19. International Nuclear Security Situation And China’s Approach

    Institute of Scientific and Technical Information of China (English)

    Liu Chong

    2016-01-01

    Since 2010,the three Nuclear Security Summits have made a number of achievements,but the international nuclear security situation is still not relaxed.The rapid development of China’s domestic nuclear facilities and a large amount of nuclear and radioactive materials related to nuclear power,active international nuclear black market in China’s surrounding regions,rather serious domestic and international terrorist threats as well as the emerging technology development bring about new challenges to nuclear security.Facing the complicated and long-term nuclear security situation,China from the perspective of monitoring mechanism,laws and regulations system,technical capability-building and nuclear emergency preparedness,takes a series of effective measures to build the national nuclear security capacity,and strictly fulfills its international obligations,actively participates in upgrading the international nuclear non-proliferation regime and relevant international rules,and actively takes part in the Nuclear Security Summit process,strengthens bilateral cooperation on nuclear security with major countries especially the United States of America,and jointly organizes various training with International Atomic Energy Agency,which has made great contributions to upgrading the global nuclear security level.At the end of the Nuclear Security Summit process,China should continue to strengthen its domestic nuclear security capacity building,and promote the international community to treat the root causes and symptoms,adopt a comprehensive strategy,and work together,effectively prevent and dissolve the nuclear terrorist threats.

  20. Soviet Nuclear Strategy form Stalin to Gorbachev

    International Nuclear Information System (INIS)

    Catudal, H.M.

    1989-01-01

    This book examines the nature of the Soviet nuclear threat and how it has evolved over the years. Too often in the past U.S. officials, in shaping and directing plans for American nuclear forces, have tended to see Soviet military forces and strategy as a reflection of their own stance or simply as projecting the worst plausible case of Soviet intentions and capabilities. The result has been a distorted if not dangerous portrayal of the real threat. Soviet nuclear strategy, as explained in this detailed book, has evolved significantly since the days when the Soviets first possessed nuclear weapons under Joseph Stalin. Today there is in development a new Soviet military and strategic doctrine reflected in Gorbachev's words, We require a radical break with traditions of political thinking. This new doctrine promises to have a profound impact on European security and the overall East-West relationship

  1. Definition of Nuclear Material in Aspects of Nuclear Nonproliferation and Security

    International Nuclear Information System (INIS)

    Jeon, Ji Hye; Lee, Chan Suh

    2014-01-01

    Nuclear safety accidents directly affect human health but nuclear security incidents indirectly influence human, which demonstrates the reason why security receives less attention. However, it is acknowledged that nuclear terrorism is indeed one of the most dreadful threat humanity faces. As part of strengthening nuclear security as well as nonproliferation to response to the threat, we need a better understanding of the nuclear material which needs to be safe under the objective of nuclear security. In reality, practitioners implement safeguards and physical protection in compliance with the regulation text in domestic legislation. Thus, it is important to specify nuclear material clearly in law for effective implementation. Therefore, the definition of terminology related to nuclear material is explored herein, within the highest-level legislation on the safeguards and physical protection. First the definition in Korean legislation is analyzed. Then, so as to suggest some improvements, other international efforts are examined and some case studies are conducted on other states which have similar level of nuclear technology and industry to Korea. Finally, a draft of definition on nuclear material in perspective of nuclear nonproliferation and security is suggested based on the analysis below. The recommendation showed the draft nuclear material definition in nuclear control. The text will facilitate the understanding of nuclear material in the context of nuclear nonproliferation and security. It might provide appropriate provision for future legislation related to nuclear nonproliferation and security. For effective safeguards and physical protection measures, nuclear material should be presented with in a consistent manner as shown in the case of United Kingdom. It will be much more helpful if further material engineering studies on each nuclear material are produced. Multi-dimensional approach is required for the studies on the degree of efforts to divert

  2. Definition of Nuclear Material in Aspects of Nuclear Nonproliferation and Security

    Energy Technology Data Exchange (ETDEWEB)

    Jeon, Ji Hye; Lee, Chan Suh [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-10-15

    Nuclear safety accidents directly affect human health but nuclear security incidents indirectly influence human, which demonstrates the reason why security receives less attention. However, it is acknowledged that nuclear terrorism is indeed one of the most dreadful threat humanity faces. As part of strengthening nuclear security as well as nonproliferation to response to the threat, we need a better understanding of the nuclear material which needs to be safe under the objective of nuclear security. In reality, practitioners implement safeguards and physical protection in compliance with the regulation text in domestic legislation. Thus, it is important to specify nuclear material clearly in law for effective implementation. Therefore, the definition of terminology related to nuclear material is explored herein, within the highest-level legislation on the safeguards and physical protection. First the definition in Korean legislation is analyzed. Then, so as to suggest some improvements, other international efforts are examined and some case studies are conducted on other states which have similar level of nuclear technology and industry to Korea. Finally, a draft of definition on nuclear material in perspective of nuclear nonproliferation and security is suggested based on the analysis below. The recommendation showed the draft nuclear material definition in nuclear control. The text will facilitate the understanding of nuclear material in the context of nuclear nonproliferation and security. It might provide appropriate provision for future legislation related to nuclear nonproliferation and security. For effective safeguards and physical protection measures, nuclear material should be presented with in a consistent manner as shown in the case of United Kingdom. It will be much more helpful if further material engineering studies on each nuclear material are produced. Multi-dimensional approach is required for the studies on the degree of efforts to divert

  3. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  4. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  5. The threat of nuclear terrorism: Assessment and preventive action

    International Nuclear Information System (INIS)

    Nilsson, A.

    2001-01-01

    In the light of the events of 11 September, the General Conference requested the IAEA Director General to review thoroughly the activities and programmes of the Agency with a view to strengthening the Agency's work relevant to preventing acts of terrorism involving nuclear materials and other radioactive materials. That review is ongoing and the results will be presented in March to the Board of Governors, including proposals for revisions and updates on relevant programmes. It is underlined that preventing nuclear terrorism requires cooperation between States and with international organizations. The problem must be addressed in a comprehensive manner. The international community should therefore strive for strong, comprehensive, internationally accepted security systems

  6. Combating nuclear terrorism in India: preventive nuclear forensic perspectives

    International Nuclear Information System (INIS)

    Raghav, N.K.; Lad, J.S.; Deshmukh, A.V.; Jagtap, S.S.

    2014-01-01

    Nuclear terrorism is constant threat to India by many terrorist organization and neighboring country. These organizations are directly or indirectly aided with nuclear material by terrorism supporting country. Such organization has a significant potential source for acquiring nuclear and other radioactive material. Possibility of leakage is widely feared because of the deteriorating law and order condition, great spur of nuclear proliferation after the cold war and disintegration of USSR. Terrorist could gain access to Nuclear and radioactive material and smuggle to India through porous borders. Preventive forensic approach in screening and searching nuclear and radioactive material will play cardinal role to prevent nuclear disaster happening in India. Future plans could be extracted from terrorists through their narco-tests, brain fingerprinting and a data base on this could be prepared, which could later be used to help prevent any attacks. In present paper authors strongly recommend setting up Preventive Forensic Units in India so that any internal or external nuclear attack could be aborted. (author)

  7. Problems of deontology in the assessment of psychological consequences of nuclear war

    International Nuclear Information System (INIS)

    Gus'kova, A.K.; Chinkina, O.V.

    1987-01-01

    A person's psychological reactions, conditioned by nuclear bombardment of the Japanese cities in 1945 and subsequent era of constant threat of nuclear disaster recurrence, as well as the reactions of population social community are considered. Occurence of various psychical and psychophathological distruction in people who have directly overcome a nuclear blast, as well as among the population of the region, involved into a nuclear conflict, is referred to indirect effects of nuclear war. These consequences will as well take place among the population of states, which have not directly participated in the nucelar conflict. In this connection, the struggle against the nuclear war threat appears to be the professional duty of physicians in their struggle for physical, psychical health of contemporary and future generations

  8. Fear of nuclear war

    International Nuclear Information System (INIS)

    Radil, T.

    1987-01-01

    Problem of psychological consequences of nuclear war threat is considered. Two categories of persons are distinguished: persons who are not decision-making but whose life is threatened, and persons who make decisions but are not responsible for them. An active approach to problems, related to a possible nuclear disaster, appears to be a powerfull socio-political means against nuclear danger and also has both psychotherapeutic and preventive meaning from the viewpoint of at least a partial liberation and protecion of people against the fear of nuclear death. By their effective activity among people, physicians and psychologists can effectively struggle against the fear of nuclear death

  9. Nuclear Reign: Providing a Nuclear Umbrella to United States Pacific Partners

    Science.gov (United States)

    2017-04-06

    business (obviously, a veiled economic threat levied against Lotte).66 In a more hawkish report given the same day in the Global Times, Shuang was...in 2016 and both continue to do so today . The new administration must make the U.S. Nuclear Posture Review a top priority in 2017. Specifically...a regional hegemon and global power may result in new nuclear doctrine emphasizing first use and a counter force approach, versus its current

  10. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  11. L-fuzzy/span> fixed points theorems for L-fuzzy/span> mappings via βℱL-admissible pair.

    Science.gov (United States)

    Rashid, Maliha; Azam, Akbar; Mehmood, Nayyar

    2014-01-01

    We define the concept of βℱL-admissible for a pair of L-fuzzy/span> mappings and establish the existence of common L-fuzzy/span> fixed point theorem. Our result generalizes some useful results in the literature. We provide an example to support our result.

  12. Nuclear power in perspective

    International Nuclear Information System (INIS)

    Addinall, E.; Ellington, H.

    1982-01-01

    The subject is covered in chapters: (the nature of nuclear power) the atomic nucleus - a potential source of energy; how nuclear reactors work; the nuclear fuel cycle; radioactivity - its nature and biological effects; (why we need nuclear power) use of energy in the non-communist world -the changing pattern since 1950; use of energy - possible future scenarios; how our future energy needs might be met; (a possible long term nuclear strategy) the history of nuclear power; a possible nuclear power strategy for the Western World; (social and environmental considerations) the hazards to workers in the nuclear power industry; the hazards to the general public (nuclear power industry; reactor operation; transport of radioactive materials; fuel reprocessing; radioactive waste disposal; genetic hazards); the threat to democratic freedom and world peace. (U.K.)

  13. Losing nuclear knowledge - A safety concern and a threat to development

    International Nuclear Information System (INIS)

    Adamov, E.O.

    2002-01-01

    Full text: In the initial period of nuclear engineering development, the sector enjoyed a strong governmental support and had ample resources at its disposal. It could afford and actually practiced comprehensive verification of computational results and field validation of design parameters. Completion of the main programmes for creation of nuclear weapons, successful development of nuclear power in the 1970s and its premature shift to the sphere of purely commercial interests, national and international concentration on nonproliferation issues, all these later realities, found in the context of abounding new sources of fossil fuel and aggravated by severe accidents at TMI and Chernobyl, added up to cause stagnation of nuclear technologies and dramatic dwindling of intellectual and experimental resources. With the new challenges seemingly exhausted and with virtually all the effort focused on traditional technologies, engineers became the dominating species in the nuclear sector, while the younger generation of physicists and systems analysts became increasingly more attracted to other spheres of development and application of knowledge in basic science. The early experimentation practice was governed by exclusively utilitarian objectives, and it was not even contemplated that the data might be processed and archived so as to make them available for much broader purposes, other than those dictated by the specific task in hand. Some of the existing databases need to be checked for validity, and access to specific information - via common or commercial channels - has to be improved. The number of research reactors, experimental facilities and test rigs suffered a huge reduction. Vigorous computerisation in the last decade is not a cure-all to make up for the entire loss of the resources that were originally available for nuclear technology progress. The tendency towards revival of nuclear technology development primarily for energy production, which seems to be

  14. Sexual conflict, life span, and aging.

    Science.gov (United States)

    Adler, Margo I; Bonduriansky, Russell

    2014-06-17

    The potential for sexual conflict to influence the evolution of life span and aging has been recognized for more than a decade, and recent work also suggests that variation in life span and aging can influence sexually antagonistic coevolution. However, empirical exploration of these ideas is only beginning. Here, we provide an overview of the ideas and evidence linking inter- and intralocus sexual conflicts with life span and aging. We aim to clarify the conceptual basis of this research program, examine the current state of knowledge, and suggest key questions for further investigation. Copyright © 2014 Cold Spring Harbor Laboratory Press; all rights reserved.

  15. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  16. Turkey's response to threats of weapons of mass destruction

    OpenAIRE

    Al, Guray.

    2001-01-01

    Unlike most of its NATO allies, Turkey did not emerge from the Cold War with enhanced security. The acquisition of weapons of mass destruction (WMD) and ballistic missiles by its neighbors in the Middle Eastâ Iran, Iraq and Syriaâ creates a serious security concern for Turkey. This thesis analyzes the numerous threats posed to Turkey by its neighborsα nuclear, chemical and biological weapons programs and their ballistic missiles. It evaluates Turkeyαs defense options to counter these thre...

  17. The 'World Institute for Nuclear Security' - News note

    International Nuclear Information System (INIS)

    Hautecouverture, Benjamin

    2008-12-01

    This article comments the creation of the World Institute for Nuclear Security (WINS) in September 2008 in Vienna. The creation of this institution is the result of a project initiated by the USA in 2004. The author recalls the process which leaded to this creation: workshops organised by the Nuclear Threat Initiative (NTI) and the Institute for Nuclear Materials Management (INMM), creation of a coordination committee, and expert meeting in Baden. He indicates how the WINS is financed (by the NTI, the US DoE, and Norway) and its future costs. He briefly describes its structure and operation, its mission, scope and activities (11 fields of activity have been defined). He recalls the various international instruments (conventions, resolutions, institutions, initiatives) related to nuclear security and to the struggle against nuclear threat and terrorism, and indicates how the WINS considers them (an insufficient and inefficient, but existing support). He finally indicates issues to be addressed to better define the WINS' role

  18. SOVT analysis of the nuclear industry in Mexico; Analisis FODA de la industria nuclear en Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez R, E.; Hernandez B, M. C., E-mail: edelmiraf@yahoo.com [Instituto Tecnologico de Toluca, Division de Estudios de Posgrado, Av. Instituto Tecnologico s/n, Ex-rancho La Virgen, 52140 Metepec, Estado de Mexico (Mexico)

    2011-11-15

    In this work the analysis of strengths, opportunities, vulnerabilities and threats (SOVT) of the nuclear industry in Mexico is presented. This industry presents among its strengths that Mexico is a highly electrified country and has a good established normative mark of nuclear security. Although the Secretaria de Energia in Mexico, with base to the exposed in the Programa Sectorial de Energia 2007-2012, is analyzing the convenience of the generation starting from this source, considering the strong technological dependence of the exterior and the limited federal budget dedicated to this field. As a result of the analysis of the SOVT matrix, were found a great number of strengths that threats, although the vulnerabilities list is major to the strengths, the opportunities list is the bigger. Therefore, the nuclear industry can be a sustainable industry, taking the necessary decisions and taking advantage of the detected opportunities. (Author)

  19. The practical experience with assistance programs: view from a non-nuclear weapons-state with a significant nuclear infrastructure

    International Nuclear Information System (INIS)

    Chetvergov, S.

    2002-01-01

    nuclear materials for the period since 1994 till now under the support of International Atomic Energy Agency and international grants of donor countries. An estimation of existing physical protection measures and upgrades of such systems for all the nuclear facilities was performed. Important attention was paid to providing technical means of physical protection for the protection of 1st category of nuclear materials, located in the nuclear facilities' storage sites. A set of expert reviews was performed with the support of Sweden and Germany to assess legislation documents and to organize physical protection of nuclear fuel manufacturing at Ulba Metallurgical Plant; a set of training seminars on physical protection organization, in a framework of IAEA recommendations (INFCIRC/225/Rev.3,4) was prepared and carried out. A practical seminar to assess the vulnerability of the physical protection system for the Nuclear Physics Institute with the participation of the US Department of Energy and Nuclear Regulatory Commission was also carried out. In May 1999 - Kazakhstan participated in a training seminar by Sandia National Laboratory for designing and assessment of physical protection systems at Brno, Czech Republic. Kazakhstan regards evolution and establishing the design basis threats for nuclear materials and nuclear facilities and institutes of Kazakhstan as very important direction for development of measures for physical protection and it's an urgent problem because: 1) many important nuclear objects are located in Kazakhstan 2) dual use materials are being produced in Kazakhstan, 3) and the dangerous political situations in the neighboring region. The basis for the investigation of design based threat in Kazakhstan was for the identification of the objects attractiveness for nuclear sabotage with radiological consequences for environment and population. Also the threat of nuclear sabotage and/or the theft of special nuclear material to create a critical mass and

  20. Development of Cyber Security Scheme for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Choi, Y. S.; Cho, J. W. (and others)

    2009-12-15

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures.

  1. Development of Cyber Security Scheme for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Choi, Y. S.; Cho, J. W.

    2009-12-01

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures

  2. Spanning forests and the vector bundle Laplacian

    OpenAIRE

    Kenyon, Richard

    2011-01-01

    The classical matrix-tree theorem relates the determinant of the combinatorial Laplacian on a graph to the number of spanning trees. We generalize this result to Laplacians on one- and two-dimensional vector bundles, giving a combinatorial interpretation of their determinants in terms of so-called cycle rooted spanning forests (CRSFs). We construct natural measures on CRSFs for which the edges form a determinantal process. ¶ This theory gives a natural generalization of the spanning tre...

  3. The terrorist threat nuclear, radiological, biological, chemical - a medical approach

    International Nuclear Information System (INIS)

    Revel, M.C. de; Gourmelon, M.C.S.; Vidal, P.C.; Renaudeau, P.C.S.

    2005-01-01

    Since September 11, 2001, the fear of a large scale nuclear, biological and/or chemical terrorism is taken again into consideration at the highest level of national policies of risk prevention. The advent of international terrorism implies a cooperation between the military defense and the civil defense. The nuclear, radiological, biological and chemical (NRBC) experts of the health service of army and of civil defense will have to work together in case of major terror attack. This book presents this cooperation between civil and military experts in the NRBC domain: risk analysis, national defense plans, crisis management, syndromes and treatments. The different aspects linked with the use of nuclear, biological and chemical weapons are analyzed by the best experts from French medical and research institutes. All topics of each NRBC domain are approached: historical, basic, diagnostic, therapeutic and preventive. (J.S.)

  4. Nuclear weapons industry

    International Nuclear Information System (INIS)

    Bertsch, K.A.; Shaw, L.S.

    1984-01-01

    This unique study was written specifically as a reference source for institutional investors concerned about the threat posed to their stock portfolios by the debate over nuclear arms production. The authors focus their analysis on the 26 leading companies in the field. The perspective is neutral and refreshing. Background information on strategic policy, arms control and disarmament, and the influence of the industry on defense policy and the economy is presented rationally. The study also discusses the economic significance of both the conversion from military to civilian production and nuclear freeze initiatives. An appendix contains a fact-filled guide to nuclear weapon systems

  5. Is it possible to limit or control a nuclear war

    International Nuclear Information System (INIS)

    Voigt, K.D.

    1983-01-01

    A controlled response after a limited aggression by using strategic nuclear weapons is improbable alone for reasons relating to political institutions and political psychology. As long as it is in the least possible that a threat with selective nuclear strikes may result in a great atomic war and by that in mutual destruction the threat itself is - according to rational standards - unbelievable. Plans to prepare oneself technically and politically to make a nuclear war for several months at an controlled extent are the expression of a wrong way of peaceful policy and military strategy. The money spent for such plannings is at best wasted money. (orig./HSCH) [de

  6. Threat of nuclear violence at the non-governmental level

    International Nuclear Information System (INIS)

    Feld, B.T.

    1982-01-01

    Safeguarding nuclear weapons from falling into the hands of non-governmental terrorist groups is discussed. Political and technical solutions are seen as necessary before international action can be achieved

  7. NRC Response to an Act or Threat of Terrorism at an NRC-Licensed Facility

    International Nuclear Information System (INIS)

    Frank Congel

    2000-01-01

    The mandated response to a threat or act of terrorism at a U.S. Nuclear Regulatory Commission (NRC)-licensed facility was examined through a tabletop exercise in May 2000 and a limited field exercise in August 2000. This paper describes some of the new issues addressed and lessons learned from those exercises

  8. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  9. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  10. A regional proposal for reinforcing nuclear and radiological security

    International Nuclear Information System (INIS)

    Puig, Diva

    2008-01-01

    This paper gives information about the phenomenon of globalization and the regional process of integration that have generated new and challenging characteristics in criminal actions, that has generated a trans national dimension. In this frame, the illicit trafficking of radioactive material is a matter of concern. After the terrorist attacks of September 11, 2001, it is a new reality that for certain terrorist groups, exposition to radiation ionizing with the purpose of committing a terrorist act is not more an obstacle. The use of a 'dirty bomb'. by terrorists is considered probable. The orphan sources represent a serious threat to security and must be: identified, located, recovered, and assured. Many radioactive materials with hundreds of applications in medicine, research and industry are lost or robbed. There are countries that have not a registry of such orphan sources. The IAEA Illicit Trafficking Data Base (ITDB) was established in 1993.There were 103 confirmed incidents of illicit trafficking and other unauthorized activities involving nuclear and radioactive materials in 2005. Nevertheless INTERPOL registers a much greater number of cases. The IAEA tries to increase the capacity of Member States to protect their facilities and nuclear fuels, storage and transport against acts of nuclear terrorism. In this paper I propose the creation of an Inter-American Committee Specialized in the Prevention and Control of the Illicit Trafficking of Radioactive and Nuclear Material at Pan-American level and within the framework of O.A.S., according to the Chart of the Organization of American States , and considering the respect to the sovereignty of the States and the principle of not intervention, with the purpose of developing the cooperation in order to prevent and to prevent and to control the illicit trafficking of radioactive and nuclear material. Its principal objective would be to develop a cooperation and a common approach of nuclear and radiological

  11. Introduction of regulatory guide on cyber security of L and C systems in nuclear facilities

    International Nuclear Information System (INIS)

    Kang, Y.; Jeong, C. H.; Kim, D. I.

    2008-01-01

    In the case of unauthorized individuals, systems and entities or process threatening the instrumentation and control systems of nuclear facilities using the intrinsic vulnerabilities of digital based technologies, those systems may lose their own required functions. The loss of required functions of the systems can seriously affect the safety of nuclear facilities. Consequently, digital instrumentation and control systems, which perform functions important to safety, should be designed and operated to respond to cyber threats capitalizing on the vulnerabilities of digital based technologies. To make it possible, the developers and licensees of nuclear facilities should perform appropriate cyber security activities throughout the whole life cycle of digital instrumentation and control systems. Under the goal of securing the safety of nuclear facilities, this paper presents the regulatory on cyber security activities to remove the cyber threats that exploit the vulnerabilities of digital instrumentation and control systems and to mitigate the effect of such threats. Presented regulatory guide includes establishing the cyber security policy and plan, analyzing and classifying the cyber threats and cyber security assessment of digital instrumentation and control systems. (authors)

  12. Span efficiency in hawkmoths.

    Science.gov (United States)

    Henningsson, Per; Bomphrey, Richard J

    2013-07-06

    Flight in animals is the result of aerodynamic forces generated as flight muscles drive the wings through air. Aerial performance is therefore limited by the efficiency with which momentum is imparted to the air, a property that can be measured using modern techniques. We measured the induced flow fields around six hawkmoth species flying tethered in a wind tunnel to assess span efficiency, ei, and from these measurements, determined the morphological and kinematic characters that predict efficient flight. The species were selected to represent a range in wingspan from 40 to 110 mm (2.75 times) and in mass from 0.2 to 1.5 g (7.5 times) but they were similar in their overall shape and their ecology. From high spatio-temporal resolution quantitative wake images, we extracted time-resolved downwash distributions behind the hawkmoths, calculating instantaneous values of ei throughout the wingbeat cycle as well as multi-wingbeat averages. Span efficiency correlated positively with normalized lift and negatively with advance ratio. Average span efficiencies for the moths ranged from 0.31 to 0.60 showing that the standard generic value of 0.83 used in previous studies of animal flight is not a suitable approximation of aerodynamic performance in insects.

  13. Nuclear Winter: Implications for civil defense

    Energy Technology Data Exchange (ETDEWEB)

    Chester, C.V.; Perry, A.M.; Hobbs, B.F.

    1988-05-01

    ''Nuclear Winter'' is the term given to the cooling hypothesized to occur in the Northern Hemisphere following a nuclear war as the result of the injection of smoke from burning cities into the atmosphere. The voluminous literature on this subject produced since the paper was published in 1983 by Turco, Toon, Ackerman, Pollack, and Sagen (TTAPS) has been reviewed. Three-dimensional global circulation models have resulted in reduced estimates of cooling---15 to 25/degree/C for a summer war and a few degrees for a winter war. More serious may be the possibility of suppression of convective precipitation by the altered temperature profiles in the atmosphere. However, very large uncertainties remain in input parameters, the models, and the results of calculations. We believe the state of knowledge about nuclear winter is sufficiently developed to conclude: Neither cold nor drought is likely to be a direct threat to human survival for populations with the wherewithal to survive normal January temperatures. The principal threat from nuclear winter is to food production, and this could present problems to third parties who are without food reserves. Loss of a crop year is neither a new nor an unexpected threat from nuclear war to the United States and the Soviet Union. Both have at least a year's food reserve at all times. Both face formidable organizational problems in distributing their reserves in a war-damaged environment. The consequences of nuclear winter could be expected to fall more heavily on the Soviet Union than the United States due to its higher latitude and less productive agriculture. This may be especially true if disturbances of rainfall amounts and distribution persist for more than a year.

  14. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  15. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  16. Fictions of nuclear disaster

    Energy Technology Data Exchange (ETDEWEB)

    Dowling, D.

    1987-01-01

    This work is critical study of literary interpretations of the nuclear holocaust. The author examines more than 250 stories and novels dealing with the theme of nuclear power and its devastating potential implications. Addressing such topics as the scientist and Armageddon, the role of religion, future evolution and mutation, and the postnuclear society, the author assesses the response of Bradbury, Lessing, Malamud, Shute, Huxley, Vonnegut, Heinlein, and others to the threat of nuclear apocalypse, with in-depth analyses of Alter Miller's A canticle for Leibowitz and Russell Hoban's Riddley Walker.

  17. Many Species, Many Threats: A Composite Risk Assessment of Climate Impacts for Salmonids in the Pacific Northwest

    Science.gov (United States)

    Graham, M. C.; Greene, C.; Beechie, T. J.; Raymond, C.

    2016-02-01

    The life cycles of salmonid species span freshwater, estuarine, and marine environments, exposing these economically, ecologically, and culturally important species to a wide variety of climate change threats. The diverse life histories of salmonids make them differentially vulnerable to climate change based on their use of different habitat types and the variability in climate change threats across these habitat types. Previous studies have focused mainly on assessing the vulnerability of particular life stages for a few species. Hence, we lack a broad perspective on how multiple climate threats are expected to impact the entire salmonid community, which spend much of their lives in marine waters. This lack of knowledge hampers our ability to prioritize various adaptation strategies for salmonid conservation. In order to conduct a more extensive vulnerability study of salmonids, we performed a life cycle-based risk assessment of climate change threats for nine species of salmonids (species within Oncorhynchus, Salvelinus, and Prosopium genera) inhabiting the Skagit River watershed, which is subject to an array of climate impacts. Our risk assessment integrated projections of impacts from various climate threats in freshwater, estuarine, and marine ecosystems with expert-based assessments of species-specific sensitivity and exposure. We found that projections (multiple global climate models under moderate emission scenarios) of both changes in magnitude and frequency of three flow-related freshwater impacts (flooding, low flows, and suspended sediment pulses) were more severe than threats in estuarine and marine habitats for which we could obtain projections. Combining projections with expert-based sensitivity and exposure scores revealed that these three threats exhibited the highest risk across all species. Of the nine species, the four most vulnerable were Chinook and coho salmon, steelhead, and bull trout. Even though these salmonids spend much of their lives

  18. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  19. Nuclear Winter: The implications for civil defense

    International Nuclear Information System (INIS)

    Chester, C.V.; Perry, A.M.; Hobbs, B.F.

    1987-01-01

    ''Nuclear Winter'' is the term given to hypothesized cooling in the northern hemisphere following a nuclear war due to injection of smoke from burning cities into the atmosphere. The voluminous literature on this subject produced since the original paper in 1983 by Turco, Toon, Ackerman, Pollack, and Sagen (TTAPS) has been reviewed. The widespread use of 3-dimensional global circulation models have resulted in reduced estimates of cooling; 15 to 25 0 C for a summer war and a few degrees for a winter war. More serious may be the possibility of suppression of convective precipitation by the altered temperature profiles in the atmosphere. However, very large uncertainties remain in input parameters, the models, and the results of calculations. We believe the state of knowledge about nuclear winter is sufficiently developed to conclude: Neither cold nor drought are likely to be direct threats to human survival for populations with the wherewithal to survive normal January temperatures; The principal threat from nuclear winter is to food production, and could present problems to third parties without food reserves; and Loss of a crop year is neither a new nor unexpected threat from nuclear war to the US and the Soviet Union. Both have at least a year's food reserve at all times. Both face formidable organizational problems in distributing their reserves in a war-damaged environment. The consequences of nuclear winter could be expected to fall more heavily on the Soviet Union than the US due to its higher latitude and less productive agriculture. This may be especially true if disturbances of rainfall amounts and distribution persist for more than a year. 6 refs

  20. Nuclear installations abroad the accident risks and their potential consequences

    Energy Technology Data Exchange (ETDEWEB)

    Turvey, F J [Radiological Protection Inst. of Ireland (Ireland)

    1996-10-01

    This paper endeavors to assess the threat to Ireland from severe accidents at civil nuclear installations. Among the various types of nuclear installations worldwide, reactors and reprocessing plants are considered to be the most threatening and so the paper focuses on these. The threat is assumed to be a function of the risk of severe accidents at the above types of installations and the probability of unfavourable weather conditions carrying the radioactive releases to Ireland. Although nuclear installations designed in eastern Europe and Asia are less safe than others, the greatest threat to Ireland arises from nearby installations in the UK. The difficulty of measuring the probabilities and consequences of severe nuclear accidents at nuclear installations in general is explained. In the case of the UK installations, this difficulty is overcome to some degree by using values of `tolerable` risk adopted by the national nuclear regulator to define the radiotoxic releases from nuclear accidents. These are used as input to atmospheric dispersion models in which unfavourable weather conditions for Ireland are assumed and radiation doses are calculated to members of the Irish public. No countermeasures, such as sheltering, are assumed. In the worst cast scenario no deaths would be expected in Ireland in the immediate aftermath of the accident however, an increase in cancers over a period of 25 years or so would be expected assuming present-day models for the effect of low level radiation are valid.

  1. Nuclear installations abroad the accident risks and their potential consequences

    International Nuclear Information System (INIS)

    Turvey, F.J.

    1996-01-01

    This paper endeavors to assess the threat to Ireland from severe accidents at civil nuclear installations. Among the various types of nuclear installations worldwide, reactors and reprocessing plants are considered to be the most threatening and so the paper focuses on these. The threat is assumed to be a function of the risk of severe accidents at the above types of installations and the probability of unfavourable weather conditions carrying the radioactive releases to Ireland. Although nuclear installations designed in eastern Europe and Asia are less safe than others, the greatest threat to Ireland arises from nearby installations in the UK. The difficulty of measuring the probabilities and consequences of severe nuclear accidents at nuclear installations in general is explained. In the case of the UK installations, this difficulty is overcome to some degree by using values of 'tolerable' risk adopted by the national nuclear regulator to define the radiotoxic releases from nuclear accidents. These are used as input to atmospheric dispersion models in which unfavourable weather conditions for Ireland are assumed and radiation doses are calculated to members of the Irish public. No countermeasures, such as sheltering, are assumed. In the worst cast scenario no deaths would be expected in Ireland in the immediate aftermath of the accident however, an increase in cancers over a period of 25 years or so would be expected assuming present-day models for the effect of low level radiation are valid

  2. Malingering in Toxic Exposure. Classification Accuracy of Reliable Digit Span and WAIS-III Digit Span Scaled Scores

    Science.gov (United States)

    Greve, Kevin W.; Springer, Steven; Bianchini, Kevin J.; Black, F. William; Heinly, Matthew T.; Love, Jeffrey M.; Swift, Douglas A.; Ciota, Megan A.

    2007-01-01

    This study examined the sensitivity and false-positive error rate of reliable digit span (RDS) and the WAIS-III Digit Span (DS) scaled score in persons alleging toxic exposure and determined whether error rates differed from published rates in traumatic brain injury (TBI) and chronic pain (CP). Data were obtained from the files of 123 persons…

  3. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    International Nuclear Information System (INIS)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante

    2017-01-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  4. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante, E-mail: barreto@unifor.br, E-mail: midredcb@hotmail.com [Universidade de Fortaleza (UNIFOR), CE (Brazil)

    2017-07-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  5. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  6. Signal Enhancement with Variable Span Linear Filters

    DEFF Research Database (Denmark)

    Benesty, Jacob; Christensen, Mads Græsbøll; Jensen, Jesper Rindom

    This book introduces readers to the novel concept of variable span speech enhancement filters, and demonstrates how it can be used for effective noise reduction in various ways. Further, the book provides the accompanying Matlab code, allowing readers to easily implement the main ideas discussed....... Variable span filters combine the ideas of optimal linear filters with those of subspace methods, as they involve the joint diagonalization of the correlation matrices of the desired signal and the noise. The book shows how some well-known filter designs, e.g. the minimum distortion, maximum signal......-to-noise ratio, Wiener, and tradeoff filters (including their new generalizations) can be obtained using the variable span filter framework. It then illustrates how the variable span filters can be applied in various contexts, namely in single-channel STFT-based enhancement, in multichannel enhancement in both...

  7. Nuclear Arms and National Security. 1983 National Issues Forum.

    Science.gov (United States)

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  8. Remixing the ‘Appropriate Mix’: Reassessing NATO’s Deterrence and Defense Posture in the Face of New Threats

    Energy Technology Data Exchange (ETDEWEB)

    Juarez, Anthony [Univ. of California, Berkeley, CA (United States). Richard and Rhoda Goldman School of Public Policy

    2016-05-31

    The North Atlantic Treaty Organization (NATO) and the countries of Europe face a renewed challenge from the east vis-à-vis the Putin regime in Moscow. In the face of these new challenges, NATO must reconsider its deterrence and defense posture in order to deter conflict in Europe. Unfortunately, Russian attempts to rewrite the rules of the post-Cold War international order by force have been coupled with nuclear saber rattling and overt nuclear threats. Russia’s nuclear threats, in addition to provocative changes to Russia’s nuclear posture in its Military Doctrine, are methods to make up for Russia’s conventional military inferiority relative to NATO and the United States. Some have described Moscow’s actions as laying the groundwork for a nuclear coercion strategy. While the decrease in the nuclear arsenals of Russia and the United States has reduced the likelihood of nuclear annihilation to an all-time low since the height of the Cold War, Russia’s nuclear coercion strategy is increasing the probability of nuclear employment in Europe. The probability of nuclear use is compounded by Russia’s tremendous local military advantage around its periphery in spite of U.S. global military primacy. This military advantage increases the incentive to use military force if Russian decision-makers conclude that a quick military victory is possible, or if Russian leaders miscalculate based on an incorrect assessment of military force balance or resolve of their adversary. The integration of Lithuania, Latvia, and Estonia (referred to as the Baltics in this paper) into the NATO alliance in 2004 makes Russia’s military advantage in its periphery increasingly relevant. Each NATO state is required to assist any NATO state that comes under attack per Article V of the North Atlantic Treaty. The Baltic states’ proximity to Russia, their weak indigenous militaries, their former status as Soviet Republics, large population of ethnic Russians, and Russian President

  9. Creating a comprehensive strategy to prevent nuclear smuggling

    International Nuclear Information System (INIS)

    Luongo, K.

    1998-01-01

    The end of the Cold War has raised awareness in the international community about the threat posed by large, global stockpiles of weapon usable nuclear material. Particular focus has been directed at the level of protection provided to the fissile materials produced by the Soviet Union and concern has been raised about the growing stockpile of plutonium worldwide. Reported incidents of the diversion of nuclear material have raised the specter of potential nuclear terrorism and of countries of proliferation concern being provided a shortcut to the bomb. In order to address this problem, the international community needs to agree on the rapid implementation of a comprehensive, mutually reinforcing strategy to control existing stockpiles of fissile material, constrain future production and use of these materials, and address the underlying causes of this threat

  10. Nuclear forensics

    International Nuclear Information System (INIS)

    Venugopal, V.

    2010-01-01

    Increasing threat by terrorists for a possible nuclear attack is particularly alarming in recent years. The likelihood of such an event is highly uncertain but cannot be ruled out. The consequence of such an event would be highly disastrous and the implications could be far-reaching both socially and politically. It is feared that significant amount of nuclear weapons materials may be kept under poor security. Therefore, there is a greater demand with utmost priority to curb nuclear terrorism by adapting proper security measures. One of the most important measures is to stop illicit trafficking of nuclear materials which are the source of building nuclear explosive devices. According to the IAEA illicit trafficking database (ITDB) report, a total number of 252 incidents were reported in 2006, of which 150 occurred in 2006 and the remaining 102 had taken place prior to that year, mainly in 2005

  11. Nuclear deterrence, morality, and realism

    Energy Technology Data Exchange (ETDEWEB)

    Finnis, J.; Boyle, J.M. Jr.; Grisez, G.

    1987-01-01

    Nuclear deterrence deserves rigorous, objective ethical analysis. In providing it, the authors of this book face realities - the Soviet threat, possible nuclear holocaust, strategic imperatives - but they also unmask moral evasions - deterrence cannot be bluff, pure counterforce, the lesser (or greater) evil, or a step towards disarmament. They conclude that the deterrent is unjustifiable and examine the new questions of conscience that this raises for everyone.

  12. Transweb - real time transportation threat assessment analysis tool: look what the future may bring for energy related infrastructure?

    International Nuclear Information System (INIS)

    Dilger, F.; Ballard, J.D.

    2005-01-01

    Full text: Transweb is envisioned as a transportation threat assessment program and this real time GIS based web assessment too (a.k.a., GTA for GIS threat assessment) can be used to plan railroad or highway shipments of hazardous waste (e.g., toxic industrial chemicals - TIC's) and high-level nuclear waste materials (e.g., like those destined for Yucca Mountain - HLW) that may be used in energy production facilities. Transweb will become a vulnerability mapping and analysis tool that can be used by transportation planners, emergency response personnel, security/safety managers, and law enforcement to route such shipments, make contingency plans in the event of altered road or rail conditions, and/or to assist in the response to an accident or human initiated event like terrorism. The initial phase of the project will seek to establish the protocol on highway shipments and follow up phases will focus on rail GTA's. This paper will report on the initial development of this analytical technique, define the problems associated with such analysis, and offer examples of its analytical possibilities for threat assessment relative to energy related facilities like nuclear power generation stations. (author)

  13. Electrode spanning with partial tripolar stimulation mode in cochlear implants.

    Science.gov (United States)

    Wu, Ching-Chih; Luo, Xin

    2014-12-01

    The perceptual effects of electrode spanning (i.e., the use of nonadjacent return electrodes) in partial tripolar (pTP) mode were tested on a main electrode EL8 in five cochlear implant (CI) users. Current focusing was controlled by σ (the ratio of current returned within the cochlea), and current steering was controlled by α (the ratio of current returned to the basal electrode). Experiment 1 tested whether asymmetric spanning with α = 0.5 can create additional channels around standard pTP stimuli. It was found that in general, apical spanning (i.e., returning current to EL6 rather than EL7) elicited a pitch between those of standard pTP stimuli on main electrodes EL8 and EL9, while basal spanning (i.e., returning current to EL10 rather than EL9) elicited a pitch between those of standard pTP stimuli on main electrodes EL7 and EL8. The pitch increase caused by apical spanning was more salient than the pitch decrease caused by basal spanning. To replace the standard pTP channel on the main electrode EL8 when EL7 or EL9 is defective, experiment 2 tested asymmetrically spanned pTP stimuli with various α, and experiment 3 tested symmetrically spanned pTP stimuli with various σ. The results showed that pitch increased with decreasing α in asymmetric spanning, or with increasing σ in symmetric spanning. Apical spanning with α around 0.69 and basal spanning with α around 0.38 may both elicit a similar pitch as the standard pTP stimulus. With the same σ, the symmetrically spanned pTP stimulus was higher in pitch than the standard pTP stimulus. A smaller σ was thus required for symmetric spanning to match the pitch of the standard pTP stimulus. In summary, electrode spanning is an effective field-shaping technique that is useful for adding spectral channels and handling defective electrodes with CIs.

  14. Nuclear power and other energy

    International Nuclear Information System (INIS)

    Doederlein, J.M.

    1975-01-01

    A comparison is made between nuclear power plants, gas-fuelled thermal power plants and oil-fired thermal power plants with respect to health factors, economy, environment and resource exploitation, with special reference to the choice of power source to supplement Norwegian hydroelectric power. Resource considerations point clearly to nuclear power, but, while nuclear power has an overall economic advantage, the present economic situation makes its heavy capital investment a disadvantage. It is maintained that nuclear power represents a smaller environmental threat than oil or gas power. Finally, statistics are given showing that nuclear power involves smaller fatality risks for the population than many other hazards accepted without question. (JIW)

  15. Nuclear Cyber Security Case Study and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Park, Sunae [ChungNam National Univ., Daejeon (Korea, Republic of); Kim, Kyung doo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Due to the new trend in cyber attacks, there is an increased security threat towards every country's infrastructure. So, security measures are required now than ever before. Previous cyber attacks normal process consists of paralyzing a server function, data extraction, or data control into the IT system for trespassing. However, nowadays control systems and infrastructures are also targeted and attacking methods have changed a lot. These days, the virus is becoming increasingly serious and hacker attacks are also becoming more frequent. This virus is a computer virus produced for the purpose of destroying the infrastructure, such as power plants, airports, railways June 2010, and it was first discovered in Belarus. Israel, the US, and other countries are believed culprits behind Stuxnet attacks on other nations such as Iran. Recent malware distribution, such as website hacking threat is growing. In surveys today one of the most long-term posing security threats is from North Korea. In particular, North Korea has been caught launching ongoing cyber-attacks after their latest nuclear test. South Korea has identified national trends regarding North Korean nuclear tests and analyzed them in order to catch disclosed confidential information. Especially, many nuclear power plants in the world are found to be vulnerable to cyber-attacks. Industrial facilities should be more wary of the risk of a serious cyber attack in the middle is going to increase the reliance on universal and commercial digital systems (off the shelf) software, civilian nuclear infrastructure. Senior executives’ current risk rate levels are increasing. Digitalization of the perception of risk is lacking in nuclear power plants and workers are creating prevention methods to make them fully aware of the risks of cyber-attacks. It is suggested that it may be inappropriate to assume we are prepared for potential attacks. Due to advances in technology, a warning that the growing sense of crisis

  16. Nuclear Cyber Security Case Study and Analysis

    International Nuclear Information System (INIS)

    Park, Sunae; Kim, Kyung doo

    2016-01-01

    Due to the new trend in cyber attacks, there is an increased security threat towards every country's infrastructure. So, security measures are required now than ever before. Previous cyber attacks normal process consists of paralyzing a server function, data extraction, or data control into the IT system for trespassing. However, nowadays control systems and infrastructures are also targeted and attacking methods have changed a lot. These days, the virus is becoming increasingly serious and hacker attacks are also becoming more frequent. This virus is a computer virus produced for the purpose of destroying the infrastructure, such as power plants, airports, railways June 2010, and it was first discovered in Belarus. Israel, the US, and other countries are believed culprits behind Stuxnet attacks on other nations such as Iran. Recent malware distribution, such as website hacking threat is growing. In surveys today one of the most long-term posing security threats is from North Korea. In particular, North Korea has been caught launching ongoing cyber-attacks after their latest nuclear test. South Korea has identified national trends regarding North Korean nuclear tests and analyzed them in order to catch disclosed confidential information. Especially, many nuclear power plants in the world are found to be vulnerable to cyber-attacks. Industrial facilities should be more wary of the risk of a serious cyber attack in the middle is going to increase the reliance on universal and commercial digital systems (off the shelf) software, civilian nuclear infrastructure. Senior executives’ current risk rate levels are increasing. Digitalization of the perception of risk is lacking in nuclear power plants and workers are creating prevention methods to make them fully aware of the risks of cyber-attacks. It is suggested that it may be inappropriate to assume we are prepared for potential attacks. Due to advances in technology, a warning that the growing sense of crisis about

  17. Nuclear structure studies at Saha Institute of Nuclear Physics using ...

    Indian Academy of Sciences (India)

    In-beam gamma-ray spectroscopy, carried out at the Saha Institute of Nuclear Physics in the recent past, using heavy-ion projectiles from the pelletron accelerator centres in the country and multi-detector arrays have yielded significant data on the structure of a large number of nuclei spanning different mass regions.

  18. Scanning of vehicles for nuclear materials

    International Nuclear Information System (INIS)

    Katz, J. I.

    2014-01-01

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost and disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself

  19. Scanning of vehicles for nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Katz, J. I. [Dept. Physics and McDonnell Center for the Space Sciences, Washington University, St. Louis, MO 63130 (United States)

    2014-05-09

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost and disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.

  20. The plutonium nuclear file: threat on the living world

    International Nuclear Information System (INIS)

    Morichaud, J.P.

    2002-01-01

    This book wishes to demonstrate the uselessness and dangerousness of the use of plutonium in the nuclear industry. It makes a synthesis about this radioelement and gives some arguments to the debate on the French energy choices. (J.S.)

  1. The psychosocial aspects of nuclear threat and nuclear war: Analogies from disaster research

    International Nuclear Information System (INIS)

    Thompson, J.

    1987-01-01

    The report is about the human reaction to disasters. No disaster experienced in recorded history resembles the potential destruction of major nuclear war. Nevertheless, past disasters can give us pointers to the likely responses of those who survive the immediate effects. Refs, 1 tab

  2. Status of nuclear power programs in South America

    International Nuclear Information System (INIS)

    Spitalnik, J.

    2010-10-01

    Analysis of nuclear power plants construction in four South American countries - Argentina, Brazil, Chile and Uruguay - is made based on programs set up by government specialized agencies. In Argentina, in a time-span up to 2023, the nuclear power program considers a five-fold increase of the current installed capacity reaching some 5,000 M We. The Brazilian reference scenario will install additional 4,000 M We, up to 2030, to reach a total installed capacity of about 6,000 M We. Other scenarios could bring this total to some 8,000 - 10,000 M We. Chile and Uruguay have started strategic studies to place the nuclear power option in the future energy matrix of the country. The government of Chile set up, in 2007, a Task Group to determine whether nuclear power could be considered a viable option. This Group concluded that nuclear power is a mature, safe competitive, and low carbon emitter technology that could be considered a viable option. A Nuclear Advisory Group was created who made studies to install a nuclear power plant in the 2016-2021 time-span. In December 2008, the Uruguayan Government created a high level Working Group to establish the feasibility conditions for Nuclear Power Generation in the country. (Author)

  3. Joseph A. Burton Forum Award: Some Nuclear Weapons Dilemmas

    Science.gov (United States)

    May, Michael

    2014-03-01

    Nuclear weapons pose a combination of political and ethical dilemmas the solution to which has not been found. On one hand, in the view of both US government leaders and US allies, nuclear deterrence continues to play an essential part in the US role as the ultimate source of military strength for the alliances among the major democratic countries. It also continues to be in demand by countries that believe themselves to be isolated and threatened. On the other hand, nuclear weapons, besides being effective deterrents, can cause unprecedented loss of life and risk the demise of civilizations. No ban or technical precaution could prevent the rebuilding of nuclear weapons in a crisis. No diplomatic arrangement to date has erased the threat of invasion and war in the world. Only the abandonment of war and the threat of war as instruments of policy can make nuclear weapons obsolete. The slow, halting, risky road to that end remains the only hope for a world in which lasting solutions to the nuclear dilemmas are possible.

  4. Illicit trafficking of nuclear material and other radioactive sources

    International Nuclear Information System (INIS)

    Yilmazer, A.; Yuecel, A.; Yavuz, U.

    2001-01-01

    As it is known, for the fact that the illicit trafficking and trading of nuclear materials are being increased over the past few years because of the huge demand of third world states. Nuclear materials like uranium, plutonium, and thorium are used in nuclear explosives that have very attractive features for crime groups, terrorist groups and, the states that are willing to have this power. Crime groups that make illegal trade of nuclear material are also trying to market strategic radioactive sources like red mercury and Osmium. This kind of illegal trade threats public safety, human health, environment also it brings significant threat on world peace and world public health. For these reasons, both states and international organizations should take a role in dealing with illicit trafficking. An important precondition for preventing this kind of incidents is the existence of a strengthened national system for control of all nuclear materials and other radioactive sources. Further, Governments are responsible for law enforcement within their borders for prevention of illegal trading and trafficking of nuclear materials and radiation sources

  5. Nuclear security culture in comparison with nuclear safety culture. Resemblances and differences

    International Nuclear Information System (INIS)

    Kawata, Norio

    2015-01-01

    Since the terrorist attacks on the U.S. on September 11th, 2001, Nuclear Security has been focused on and treated as a global issue in the international community and it has also been discussed as a real and serious threat to nuclear power plants in the world since 'The Great East Japan Earthquake' in March, 2011. The International Atomic Energy Agency (IAEA) issued a document including Nuclear Security Recommendations (INFCIRC/225/Rev.5) (NSS 13) in the Nuclear Security Series and emphasized the necessity of fostering Nuclear Security Culture. Nuclear Security Culture has been frequently discussed at various kinds of seminars and events. Since the officials in charge of Nuclear Security are familiar with the area of Nuclear Safety, the relationships between Nuclear Safety Culture and Nuclear Security Culture have been the point in controversy. This paper clarifies relevance between Nuclear Safety and Security, considers resemblances and differences of their concepts and lessons learned for each culture from nuclear power plant accidents, and promotes deeper understanding of Nuclear Safety and Nuclear Security Culture. (author)

  6. Some recent studies on the main threats from the outside and safety recommendations adapted to the European situation

    International Nuclear Information System (INIS)

    Doury, A.; Barbreau, A.; Gerard, R.

    1975-01-01

    With a view to the formulation of safety recommendations accounting for any factors peculiar to the European situation in the matter of nuclear plant sites, the Nuclear Safety Department of the Commissariat a l'Energie Atomique is conducting a special research programme of a mainly meteorological and seismological nature. The most important of the studies now in progress concern the external threats or restrictions to which the plants may be subjected because of the site itself or its environment. The possible outside dangers to be taken most seriously in Europe are probably explosions of gas layers from the industrial environment, and severe earthquakes. The main features of recent or current research on these two kinds of threat are outlined, with an indication of the chief practical results already obtained or anticipated in the matter of safety improvement [fr

  7. Decision-based model development for nuclear material theft, smuggling, and illicit use

    International Nuclear Information System (INIS)

    Scott, B.

    2002-01-01

    Full text: Nuclear material is vulnerable to a range of theft, sabotage, smuggling and illicit use scenarios. These scenarios are dependent on the choices of individuals and organizations involved in these activities. These choices, in turn; are dependent on the perceived payoff vectors of the involved players. These payoff vectors can include monetary gain, ability to avoid detection, penalties for detection, difficulty of accomplishment, resource constraints, infrastructure support, etc. Threat scenarios can be developed from these individual choices, and the set of worst-case threat scenarios can be compiled into a threat definition. The implementation of physical protection controls is dependent on the developed threat scenarios. The analysis of the composition of the postulated threat can be based on the analysis of the postulated decisions of the individuals and organizations involved on theft, smuggling, and illicit use. This paper proposes a model to systematically analyze the significant decision points that an individual or organization addresses as result of its goals. The model's dependence on assumptions is discussed. Using these assumptions, a model is developed that assigns probabilities to a set of decisions performed by the individuals involved in theft/smuggling. The individual and organisation's decisions are based on the perceived cost/benefit of the decisions and the resource constraints. Methods for functionally obtaining decision probabilities from perceived cost/benefit are proposed. The treatment of high-consequence/low-probability events is discussed in terms of analysis of precursor events, and the use of sensitivity analysis is discussed. An example of a simplified model for nuclear material theft, smuggling, and illicit use is presented, and the results of this simplified model are evaluated. By attempting to model the potential distribution of nuclear material theft/smuggling events, this model increases the analytical tools available

  8. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  9. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  10. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  11. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  12. The SPAN cookbook: A practical guide to accessing SPAN

    Science.gov (United States)

    Mason, Stephanie; Tencati, Ronald D.; Stern, David M.; Capps, Kimberly D.; Dorman, Gary; Peters, David J.

    1990-01-01

    This is a manual for remote users who wish to send electronic mail messages from the Space Physics Analysis Network (SPAN) to scientific colleagues on other computer networks and vice versa. In several instances more than one gateway has been included for the same network. Users are provided with an introduction to each network listed with helpful details about accessing the system and mail syntax examples. Also included is information on file transfers, remote logins, and help telephone numbers.

  13. Radiation effects on life span in Caenorhabditis elegans

    International Nuclear Information System (INIS)

    Johnson, T.E.; Hartman, P.S.

    1988-01-01

    Wild-type and radiation-sensitive (Rad) mutants of Caenorhabditis elegans were irradiated using a 137 Cs source (2.7 krads/min.) at several developmental stages and subsequently monitored for life span. Acute doses of radiation ranged from 1 krad to 300 krads. All stages required doses above 100 krads to reduce mean life span. Dauers and third stage larvae were more sensitive, and 8-day-old adults were the most resistant. Occasional statistically significant but nonrepeatable increases in survival were observed after intermediate levels of irradiation (10-30 krads). Unirradiated rad-4 and rad-7 had life spans similar to wild-type; all others had a significant reduction in survival. The mutants were about as sensitive as wild-type to the effects of ionizing radiation including occasional moderate life span extensions at intermediate doses. We conclude that the moderate life span extensions sometimes observed after irradiation are likely to be mediated by a means other than the induction of DNA repair enzymes

  14. Global initiatives to prevent nuclear terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    The fight against nuclear and radiological terrorism - someone to blow up a nuclear weapon or spread radioactive material as a 'dirty bomb' that act of terrorism - is one of the most serious threats to international security. The Global Initiative to prevent nuclear terrorism is a Norwegian-sponsored initiative that is aimed directly at combating terrorism by non-state actors. NRPA follow up Norwegian measures, including in Kazakhstan, and verifies that they are implemented and functioning as intended. (AG)

  15. Review for the military application of nuclear energy

    International Nuclear Information System (INIS)

    Park, M. J.

    1998-01-01

    In order to understand the broad technology of nuclear energy, we have explored how our present knowledge of nuclear energy has been developed, and how some of this knowledge is applied. Techniques learned from nuclear physics are used the build fearsome weapons of mass destruction, whose proliferation is a constant threat to our future. To develop military applications of nuclear technology systematically, high level human resources and creative brains should be sufficiently trained and secured

  16. 23 CFR 650.809 - Movable span bridges.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Movable span bridges. 650.809 Section 650.809 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION ENGINEERING AND TRAFFIC OPERATIONS BRIDGES, STRUCTURES, AND HYDRAULICS Navigational Clearances for Bridges § 650.809 Movable span bridges. A fixed bridge...

  17. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  18. Signal enhancement with variable span linear filters

    CERN Document Server

    Benesty, Jacob; Jensen, Jesper R

    2016-01-01

    This book introduces readers to the novel concept of variable span speech enhancement filters, and demonstrates how it can be used for effective noise reduction in various ways. Further, the book provides the accompanying Matlab code, allowing readers to easily implement the main ideas discussed. Variable span filters combine the ideas of optimal linear filters with those of subspace methods, as they involve the joint diagonalization of the correlation matrices of the desired signal and the noise. The book shows how some well-known filter designs, e.g. the minimum distortion, maximum signal-to-noise ratio, Wiener, and tradeoff filters (including their new generalizations) can be obtained using the variable span filter framework. It then illustrates how the variable span filters can be applied in various contexts, namely in single-channel STFT-based enhancement, in multichannel enhancement in both the time and STFT domains, and, lastly, in time-domain binaural enhancement. In these contexts, the properties of ...

  19. The nuclear case book

    International Nuclear Information System (INIS)

    Stephenson, M.; Hearn, R.

    1983-01-01

    The subject is covered in sections, entitled: the truth about nukes; disarmament, arms control and arms limitation; directory of nuclear weapons; tables of principal nuclear weapons; points of view 1 (Anglican); proliferation of nuclear technology; the just war; preventing proliferation; the numbers business; war scenario 1 (the Gulf); points of view 2 (Roman Catholic); deterrence; European Nuclear Balance; war scenario 2 (Germany); arguing about war and peace; points of view 3 (Jewish); is there a Soviet military threat; the view from Omsk; points of view 4 (Pugwash); the British deterrent; points of view 5 (generals for peace and disarmament); 'broken arrows'; costs of nuclear weapons; war scenario 3 (Pakistan); nuclear weapons - what is the moral response; non-use of nuclear weapons; points of view 6 (women and families for defence); dear Mr. Heseltine; why acquire nuclear weapons; the effects of nuclear weapons; war scenario 4 (Central America and the Middle East); civil defence; alternatives to nuclear defence; points of view 7 (Quaker). (U.K.)

  20. Effects of nuclear electromagnetic pulse (EMP) on nuclear power plants

    International Nuclear Information System (INIS)

    Barnes, P.R.; Manweiler, R.W.; Davis, R.R.

    1977-09-01

    The electromagnetic pulse (EMP) from a high-altitude nuclear detonation consists of a transient pulse of high intensity electromagnetic fields. These intense fields induce current and voltage transients in electrical conductors. Although most nuclear power plant cables are not directly exposed to these fields, the attenuated EMP fields that propagate into the plant will couple some EMP energy to these cables. The report predicts the probable effects of the EMP transients that could be induced in critical circuits of safety-related systems. It was found that the most likely consequence of EMP for nuclear plants is an unscheduled shutdown. EMP could prolong the shutdown period by the unnecessary actuation of certain safety systems. In general, EMP could be a nuisance to nuclear power plants, but it is not considered a serious threat to plant safety

  1. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    Energy Technology Data Exchange (ETDEWEB)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  2. Physical Protection of Nuclear Safeguards Technology

    International Nuclear Information System (INIS)

    Hoskins, Richard

    2004-01-01

    IAEA's Nuclear Security Plan is established to assist Member States in implementing effective measures against nuclear terrorism. Four potential threats were identified: theft of nuclear weapon, nuclear explosive device, radiological dispersal device and an attack on radiation facility. In order to achieve effective protection of nuclear materials and facilities, the IAEA sponsored the Convention of the Physical Protection of Nuclear Materials which focuses on the protection of nuclear materials 'in international transport. The IAEA also promoted INFCIRC/255 entitled the Physical Protection of Nuclear Materials and Nuclear Facilities and published TECDOC/967 for the protection of nuclear materials and facilities against theft and sabotage and during transport. Assistance is available for the Member States through the International Physical Protection Advisory Service (IPPAS) and the International Nuclear Security Advisory Service (INSServ). (author)

  3. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  4. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  5. IAEA outlines measures to enhance protection against nuclear terrorism

    International Nuclear Information System (INIS)

    2001-01-01

    Mr. ElBaradei, head of the IAEA presented a report today to the Agency's Board of Governors, outlining plans for substantially expanding and strengthening IAEA programmes relevant to improving nuclear security. The report addresses the IAEA's response to the following threats from acts of nuclear terrorism by a subnational group: acquisition of a nuclear weapon; acquisition of nuclear material to construct a nuclear weapon or to cause a radiological hazard; acquisition of other radioactive materials to cause a radiological hazard; and violent acts against nuclear facilities to cause a radiological hazard. The report puts a price tag on its proposed programme upgrades at $30-50 million per year, representing an initial 10-15% increase in the IAEA's overall resources. Additionally, Mr. ElBaradei said the IAEA's budget is currently underfeed by about $40 million due to a budgetary policy over many years of 'zero real growth', and called on Member States to provide the resources required to cope with the newly emerging threat. 'In addition to the resources required for urgent international assistance,' Mr. ElBaradei said, 'the necessary global upgrades to meet the full range of possible threats would be in the range of hundreds of millions of dollars and would have to be carried out by individual States and through bilateral and multilateral assistance'. The IAEA would play a coordinating role in delivering this assistance.If States provide adequate funding, Mr. ElBaradei predicts that the enhanced and additional activities proposed in his report should lead over time to a powerful national and international security framework for nuclear facilities and material. The Summary of Report on 'Protection Against Nuclear Terrorism' presented to the IAEA Board of Governors on 30.11.2001 is attached

  6. Physical protection of special nuclear materials in the Federal Republic of Germany

    International Nuclear Information System (INIS)

    Rossnagel, A.

    1987-01-01

    Measures to protect special nuclear materials in West Germany are based on a relatively likely average threat and not on the less-likely but maximum credible threat. The reason is to avoid the costs of maintaining a very high level of security that is seldom needed. The concept of delayed action, which divides the responsibility for security between private protection forces and local police forces, would be insufficient in the event of the maximum credible threat. In principle, sufficient security is possible only when the facilities and transports are constantly protected by a police force large enough to deal with the maximum credible threat without assistance from outside. They must also be adequately armed to avert all possible attackers, and they must be paid by the licensees. The threat of an insider(s) diverting special nuclear material can be addressed only by strengthening the scope and depth of the checks on applicants and employees and the permanent work controls. It is recognized, however, that such security measures may not be compatible with constitutional civil liberties

  7. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  8. A Motivational Theory of Life-Span Development

    Science.gov (United States)

    Heckhausen, Jutta; Wrosch, Carsten; Schulz, Richard

    2010-01-01

    This article had four goals. First, the authors identified a set of general challenges and questions that a life-span theory of development should address. Second, they presented a comprehensive account of their Motivational Theory of Life-Span Development. They integrated the model of optimization in primary and secondary control and the…

  9. The use of passwords to introduce theconcepts of spanning set and span

    Directory of Open Access Journals (Sweden)

    Andrea Cárcamo

    2017-01-01

    Full Text Available The aim of this paper is to present a proposal for teaching linear algebra based on heuristic of emergent models and mathematical modelling. This proposal begins with a problematic situation  related  to  the  creation  and  use  of  secure  passwords,  which  leads  first-year  students  of  engineering  toward  the  construction  of  the  concepts  of  spanning  set  and  span. The  proposal  is  designed  from  the  results  of  the  two  cycles  of  experimentation  teaching, design-based  research,  which  give  evidence  that  allows  students  to  progress  from  a  situation in a real context to the concepts of linear algebra. This proposal, previously adapted, could have similar results when applied to another group of students.

  10. Rethinking the Unthinkable: Selective Proliferation and US Nuclear Strategy

    Science.gov (United States)

    2011-06-01

    the Trilateral Commission, The Triangle Papers; (Washington: Trilateral Commission, 2006), 13. 11 Graham T. Allison, Avoiding Nuclear Anarchy ...weapons could eventually be used with a resultant loss of life and long term ecological consequences previously unknown to mankind. The direct...Hindu, 23 December 2010. Books Allison, Graham T. Avoiding Nuclear Anarchy : Containing the Threat of Loose Russian Nuclear Weapons and Fissile

  11. The Nuclear Question. After Iran: Toward Nuclear Proliferation in the Middle East?

    International Nuclear Information System (INIS)

    Courmont, Barthelemy

    2008-01-01

    Iran's potential acquirement of the atomic bomb could lead to nuclear proliferation in the Middle East. Many countries in the region would be tempted to follow the Iranian example, in order to maintain their regional power. This development could produce significant geopolitical consequences in a region where relationships are already tense. In this context, one can envisage different crisis scenarios: support for terrorist acts, attacks on American bases in the region, threats against the state of Israel. Accelerated nuclear proliferation in the Middle East would also jeopardize the efforts undertaken by regional actors during the past four decades to create a Nuclear Weapon Free Zone (NWFZ)

  12. EU Regulation of E-Commercspan>e A Commentary

    NARCIS (Netherlands)

    Lodder, A.R.; Murray, A.D.

    2017-01-01

    For the last twenty years the European Union has been extremely active in the field of e-commercspan>e. This important new book addresses the key pieces of EU legislation in the field of e-commercspan>e, including the E-Commercspan>e Directive, the Services Directive, the Consumer Directive, the General Data

  13. Homemade nuclear bomb syndrome

    International Nuclear Information System (INIS)

    Meyer, W.; Loyalka, S.K.; Nelson, W.E.; Williams, R.W.

    1977-01-01

    With the publication of Nuclear Theft: Risks and Safeguards by Willrich and Taylor, significant attention has been focused by the media and the public on the possibility of fissile materials being stolen by a terrorist organization and diverted to the actual building, or the threat of building, of a nuclear explosive device. The implication has been created that one or several relatively inexperienced individuals could obtain the materials necessary and fabricate a low-yield nuclear explosive. This article examines these contentions in some detail. The safeguards and use-denial methods presently used in the nuclear fuel cycle are considered and the difficulties they present in obtaining significant amounts of strategic nuclear materials are examined. The characteristics of reactor-grade plutonium are discussed, and the difficulties associated with the assembly of an efficient nuclear explosive device are outlined

  14. Nuclear power and carbon dioxide; The fallacy of the nuclear industry's new propaganda

    Energy Technology Data Exchange (ETDEWEB)

    Mortimer, N. (Sheffield City Polytechnic (UK). School of Urban and Regional Studies)

    The increasingly beleaguered nuclear industry is now highlighting the threat of global warming as a justification for its continued expansion. The industry argues that it produces no carbon dioxide and that nuclear power is therefore a key element in any plan to reduce emissions of this greenhouse gas. However an analysis of the entire nuclear fuel cycle shows that nuclear power is responsible for much larger carbon dioxide emissions than several renewable energy options and efficiency measures. Furthermore, a major expansion of nuclear generating capacity would result in huge increases in CO{sub 2} emissions from the nuclear industry due to the need to mine and process progressively lower quality uranium ores. Nuclear power is an expensive, unsustainable, dangerous and ineffective option in any realistic strategy to combat global warming. (Author).

  15. Ministers at IAEA Conference Call for Stronger Nuclear Security

    International Nuclear Information System (INIS)

    2013-01-01

    Full text: Despite substantial progress in strengthening nuclear security in recent years, more needs to be done worldwide to defend against the threat of nuclear terrorism and other malicious acts involving nuclear or radiological material, a Ministerial Declaration at the IAEA's International Conference on Nuclear Security: Enhancing Global Efforts stated today. More than 1 300 participants at the Conference, which is open to all 159 IAEA Member States, will analyse past and current efforts and consider how future challenges can best be met to ensure effective and sustainable nuclear security worldwide. The Conference, which started in Vienna today and ends on Friday, includes representatives from 123 countries and 21 governmental and non-governmental organizations. The Ministerial Declaration, adopted at a plenary session attended by 34 government ministers and other Heads of Delegation including the Conference President, Hungarian Foreign Affairs Minister Janos Martonyi, says they ''remain concerned about the threat of nuclear and radiological terrorism and of other malicious acts or sabotage related to facilities and activities involving nuclear and other radioactive material.'' The Declaration - the first of its kind for nuclear security - notes that all States are responsible for their own nuclear security, but that international cooperation is important in supporting States' efforts to fulfil their responsibilities. It affirms the central role of the IAEA in strengthening nuclear security globally, and leading coordination of international activities in this field. ''We encourage all States to maintain highly effective nuclear security, including physical protection, for all nuclear and other radioactive material, their transport, use and storage and their associated facilities, as well as protecting sensitive information and maintaining the necessary nuclear security systems and measures to assess and manage their nuclear security effectively,'' the

  16. Can we do without nuclear?

    International Nuclear Information System (INIS)

    Cothier, Philippe

    2013-01-01

    The author first recalls the background of nuclear deterrence and the history of the French nuclear arsenal within the Cold War context. He comments the evolution of this arsenal after the US initiatives during the 1980's, and then analyses the situation at the beginning of the 21. century: end of the East-West confrontation, increase of NATO's interventions abroad, war against terrorism by the USA. But the Iranian and North-Korean nuclear programs gave a new momentum to the nuclear. The author discusses the various concepts and approaches of nuclear doctrines and deterrence, and wanders whether France still needs a doctrine relying on nuclear weapons as nuclear weapons are actually present, as the French deterrence doctrine is put in question again, and as some countries seem to be an actual nuclear threat (North Korea, Iran)

  17. Computer security at ukrainian nuclear facilities: interface between nuclear safety and security

    International Nuclear Information System (INIS)

    Chumak, D.; Klevtsov, O.

    2015-01-01

    Active introduction of information technology, computer instrumentation and control systems (I and C systems) in the nuclear field leads to a greater efficiency and management of technological processes at nuclear facilities. However, this trend brings a number of challenges related to cyber-attacks on the above elements, which violates computer security as well as nuclear safety and security of a nuclear facility. This paper considers regulatory support to computer security at the nuclear facilities in Ukraine. The issue of computer and information security considered in the context of physical protection, because it is an integral component. The paper focuses on the computer security of I and C systems important to nuclear safety. These systems are potentially vulnerable to cyber threats and, in case of cyber-attacks, the potential negative impact on the normal operational processes can lead to a breach of the nuclear facility security. While ensuring nuclear security of I and C systems, it interacts with nuclear safety, therefore, the paper considers an example of an integrated approach to the requirements of nuclear safety and security

  18. The Iranian nuclear programme-an equation with many unknowns

    International Nuclear Information System (INIS)

    Hamel, T.

    2007-01-01

    So, is Iran a threat or a victim? Although it has no previous history of aggression, Iran continues to disturb the international community with its nuclear programme, while declaring that it is under threat from its neighbours and the victim of propaganda. Yet why does a country with such large reserves of oil and gas need a nuclear industry? This question arose as long ago as the early 1970, and it arises again today. The Shah was a Gaullist, Khomenei a Gaullist ayatollah, and today it is not the Ayatollah but the Gaullist posture that is the more disturbing. A Blairite ayatollah will surely suit Washington nicely. (author)

  19. Guarding nuclear reactors and material from terrorists and thieves

    International Nuclear Information System (INIS)

    Bunn, George; Steinhausler, Fritz

    2001-01-01

    Full text: The May 2001 Final Report of Experts convened to consider revising CPPNM did not make recommendations on what standards an amendment extending the CPPNM to domestic use, storage and transport should cover except that it should apply to sabotage as well as theft. Many resist specific standards arguing that threats vary from place to place and that the design of protections for a particular facility should be based entirely upon the threats that facility faces - its own 'design-basis threat,' But the information now available on how countries perceive the threats against them shows great variation from country to country. If a country does not perceive any 'insider' threat of stealing even weapons-usable material, is it not a threat to other countries if the material is stolen? If some countries do not perceive any threat that a truck bomber will attack a nuclear power reactor that is located in their country, does that not constitute a possible threat to neighboring countries? As the Director General's preface to INFCIRC/225/Rev.4 says, although responsibility for physical protection rests with the state having the nuclear material or facility to be protected, 'it is not a matter of indifference to other States whether and to what extent that responsibility is fulfilled.' The May 2001 Final Report of Experts opposed any form of international oversight for physical protection. But if adequate protection by one state is not a matter of indifference to other states, should not some way be found for experts from other countries to discuss with the state providing protection what the threats are and what the best methods are for protecting against them are? What will be the point of adopting amendments if parties to the CPPNM can say: 'We have already done all that is necessary to comply with the new requirements. Our facilities meet all the threats that they will face. What we have done is confidential and of no business to anyone else.' (author)

  20. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  2. Diferença entre span verbal e visual nos gêneros: estudo piloto Difference between verbal and visual span in genders: pilot study

    Directory of Open Access Journals (Sweden)

    Mariana Cristina Pedrassa Sagrilo

    2012-01-01

    Full Text Available OBJETIVO: avaliar a memória de trabalho analisando a capacidade de retenção de estímulos auditivos (span verbal e visuais (span visual e estabelecer a relação com o gênero (masculino e feminino. MÉTODO: participaram deste estudo 20 crianças entre seis anos e cinco meses e sete anos, sendo 10 sujeitos do sexo masculino e 10 sujeitos do sexo feminino. Todos os sujeitos foram submetidos às provas de avaliação do span verbal e visual em ordem direta e inversa. RESULTADOS: apenas na prova de palavras dissílabas com fonologia semelhante e semântica diferente do span verbal, houve variância significante entre os gêneros. As crianças do sexo feminino apresentaram melhor desempenho em relação ao outro gênero, bem como maior capacidade de retenção de palavras dissílabas com fonologia e semântica diferentes. No span visual (ordem direta e inversa as crianças do sexo masculino obtiveram melhor desempenho, apesar de não ter diferenças significantes. Em relação à idade não houve diferença de retenção de estímulos. CONCLUSÃO: as crianças do sexo feminino, neste estudo, apresentaram tendência à melhor desempenho do span verbal e as crianças do sexo masculino tendência a melhor desempenho no span visual. No entanto, o estudo é limitado devido ao reduzido número de participantes na amostra.PURPOSE: to evaluate the working memory analyzing the retention ability of auditory stimuli (verbal span and visual stimuli (visual span, and to establish its relation to gender (male and female. METHOD: 20 subjects - 10 female children and 10 male children - from six and five months to seven years old took part in this study. All subjects were submitted to evaluation tests for both verbal and visual spans in direct and inverse orders. RESULTS: there was a significant variance between genders only in the test involving disyllabic words with phonology similar to and semantics different from verbal span. Female children showed a better

  3. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo

    2011-01-01

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  4. Spanning trees and the Eurozone crisis

    Science.gov (United States)

    Dias, João

    2013-12-01

    The sovereign debt crisis in the euro area has not yet been solved and recent developments in Spain and Italy have further deteriorated the situation. In this paper we develop a new approach to analyze the ongoing Eurozone crisis. Firstly, we use Maximum Spanning Trees to analyze the topological properties of government bond rates’ dynamics. Secondly, we combine the information given by both Maximum and Minimum Spanning Trees to obtain a measure of market dissimilarity or disintegration. Thirdly, we extend this measure to include a convenient distance not limited to the interval [0, 2]. Our empirical results show that Maximum Spanning Tree gives an adequate description of the separation of the euro area into two distinct groups: those countries strongly affected by the crisis and those that have remained resilient during this period. The measures of market dissimilarity also reveal a persistent separation of these two groups and, according to our second measure, this separation strongly increased during the period July 2009-March 2012.

  5. Threats to security and ischaemic heart disease deaths: the case of homicides in Mexico.

    Science.gov (United States)

    Lee, Eileen H; Bruckner, Tim A

    2017-02-01

    Ischaemic heart disease (IHD) ranks as the leading cause of death worldwide. Whereas much attention focuses on behavioural and lifestyle factors, less research examines the role of acute, ambient stressors. An unprecedented rise in homicides in Mexico over the past decade and the attendant media coverage and publicity have raised international concern regarding its potential health sequelae. We hypothesize that the rise in homicides in Mexico acts as an ecological threat to security and elevates the risk of both transient ischaemic events and myocardial infarctions, thereby increasing IHD deaths. We applied time-series methods to monthly counts of IHD deaths and homicides in Mexico for 156 months spanning January 2000 to December 2012. Methods controlled for strong temporal patterns in IHD deaths, the unemployment rate and changes in the population size at risk. After controlling for trend and seasonality in IHD deaths, a 1-unit increase in the logged count of homicides coincides with a 7% increase in the odds of IHD death in that same month (95% confidence interval: 0.04 - 0.10). Inference remains robust to additional sensitivity checks, including a state-level fixed effects analysis. Our findings indicate that the elevated level of homicides in Mexico serves as a population-level stressor that acutely increases the risk of IHD death. This research adds to the growing literature documenting the role of ambient threats, or perceived threats, to security on cardiovascular health. © The Author 2016; all rights reserved. Published by Oxford University Press on behalf of the International Epidemiological Association

  6. SOVT analysis of the nuclear industry in Mexico

    International Nuclear Information System (INIS)

    Fernandez R, E.; Hernandez B, M. C.

    2011-11-01

    In this work the analysis of strengths, opportunities, vulnerabilities and threats (SOVT) of the nuclear industry in Mexico is presented. This industry presents among its strengths that Mexico is a highly electrified country and has a good established normative mark of nuclear security. Although the Secretaria de Energia in Mexico, with base to the exposed in the Programa Sectorial de Energia 2007-2012, is analyzing the convenience of the generation starting from this source, considering the strong technological dependence of the exterior and the limited federal budget dedicated to this field. As a result of the analysis of the SOVT matrix, were found a great number of strengths that threats, although the vulnerabilities list is major to the strengths, the opportunities list is the bigger. Therefore, the nuclear industry can be a sustainable industry, taking the necessary decisions and taking advantage of the detected opportunities. (Author)

  7. The European legal framework regarding e-commercspan>e

    NARCIS (Netherlands)

    Schaub, M.Y.

    2004-01-01

    The year 2000 is a memorable year in the history of e-commercspan>e. This is the year of the so-called 'dot.com shake-out'. The year 2000 is also the year the European Union issued its e-commercspan>e directive. The directive means to regulate but also facilitate e-commercspan>e in the internal market, by laying

  8. The European Union face to the nuclear risks of the CIS

    International Nuclear Information System (INIS)

    Benoit, L.

    1997-01-01

    This paper deals with the nuclear disarmament, the risk of nuclear proliferation, the brain drain and the traffic of nuclear materials in the Community of Independent States (CIS) after the collapse of the Soviet Union, and the actions carried out by the European Union to solve these growing up threats. (J.S.)

  9. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    2010-04-01

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  10. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  11. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security.

  12. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Nuclear energy

    International Nuclear Information System (INIS)

    Lotter, A.C.

    1979-01-01

    The recent, terrifying threat of a major calamity at Pennsylvania's Three Mile Island power plant near Harrisburg reverberated across practically the whole of the civilised world. An almost incredible sequence of human and mechanical failures at this installation had stopped just short of disaster and had brought the unthinkable perilously close to happening. The accident had sprayed radioactive waste into the air and had led to the large scale evacuation of people from the endangered area, disrupted hundreds of thousands of lives and caused a crippling setback to the nuclear industry. In this article the author discusses the impact the Harrisburg incident has had on the nuclear industry

  14. Evaluating the efficiency of shortcut span protection

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Dittmann, Lars; Berger, Michael Stübert

    2010-01-01

    This paper presents a comparison of various recovery methods in terms of capacity efficiency with the underlying aim of reducing control plane load. In particular, a method where recovery requests are bundled towards the destination (Shortcut Span Protection) is evaluated can compared against tra...... traditional recovery methods. The optimization model is presented and our simulation results show that Shortcut Span Protection uses more capacity than the unbundled related methods, but this is compensated by easier control and management of the recovery actions.......This paper presents a comparison of various recovery methods in terms of capacity efficiency with the underlying aim of reducing control plane load. In particular, a method where recovery requests are bundled towards the destination (Shortcut Span Protection) is evaluated can compared against...

  15. Risk analysis of nuclear safeguards regulations

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Altman, W.D.; Judd, B.R.

    1982-06-01

    The Aggregated Systems Model (ASM), a probabilisitic risk analysis tool for nuclear safeguards, was applied to determine benefits and costs of proposed amendments to NRC regulations governing nuclear material control and accounting systems. The objective of the amendments was to improve the ability to detect insiders attempting to steal large quantities of special nuclear material (SNM). Insider threats range from likely events with minor consequences to unlikely events with catastrophic consequences. Moreover, establishing safeguards regulations is complicated by uncertainties in threats, safeguards performance, and consequences, and by the subjective judgments and difficult trade-offs between risks and safeguards costs. The ASM systematically incorporates these factors in a comprehensive, analytical framework. The ASM was used to evaluate the effectiveness of current safeguards and to quantify the risk of SNM theft. Various modifications designed to meet the objectives of the proposed amendments to reduce that risk were analyzed. Safeguards effectiveness was judged in terms of the probability of detecting and preventing theft, the expected time to detection, and the expected quantity of SNM diverted in a year. Data were gathered in tours and interviews at NRC-licensed facilities. The assessment at each facility was begun by carefully selecting scenarios representing the range of potential insider threats. A team of analysts and facility managers assigned probabilities for detection and prevention events in each scenario. Using the ASM we computed the measures of system effectiveness and identified cost-effective safeguards modifications that met the objectives of the proposed amendments

  16. Analysis of a Gross Counting Decision Metric for use in Threat Detection During Cargo Container Inspection

    International Nuclear Information System (INIS)

    Hall, J

    2006-01-01

    LLNL is actively engaged in the development of a variety of advanced technologies for use in detecting potential threats in sea-going cargo containers, particularly the presence of hidden special nuclear materials (SNM). One such project is the so-called ''Nuclear Car Wash'' (NCW), which uses a high-energy neutron probe to scan the container. High-energy, β-delayed γ-rays emitted during the decay of short-lived, neutron-induced fission products are then taken as a signature of fissionable material. There are a number of different threat decision metrics that one could imagine using in conjunction with an inspection system such as the NCW; however, the most straightforward approach might be to simply compare the total number of counts that our detector records during some suitably chosen time interval to the average background signal that one would expect from a ''clean'' container during the same interval. The purpose of this report is to describe the basic statistical properties of a decision metric of this sort and outline the procedures for using it in experimental practice

  17. On the cardinality of smallest spanning sets of rings | Boudi ...

    African Journals Online (AJOL)

    Let R = (R, +, ·) be a ring. Then Z ⊆ R is called spanning if the R-module generated by Z is equal to the ring R. A spanning set Z ⊆ R is called smallest if there is no spanning set of smaller cardinality than Z. It will be shown that the cardinality of a smallest spanning set of a ring R is not always decidable. In particular, a ring R ...

  18. Mitigating the Impact of Nurse Manager Large Spans of Control.

    Science.gov (United States)

    Simpson, Brenda Baird; Dearmon, Valorie; Graves, Rebecca

    Nurse managers are instrumental in achievement of organizational and unit performance goals. Greater spans of control for managers are associated with decreased satisfaction and performance. An interprofessional team measured one organization's nurse manager span of control, providing administrative assistant support and transformational leadership development to nurse managers with the largest spans of control. Nurse manager satisfaction and transformational leadership competency significantly improved following the implementation of large span of control mitigation strategies.

  19. The Signing of the U.S.-India Agreement Concerning Peaceful Uses of Nuclear Energy

    Directory of Open Access Journals (Sweden)

    Jörn Müller

    2009-02-01

    Definitions */ @page {mso-footnote-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" fs; mso-footnote-continuation-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" fcs; mso-endnote-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" es; mso-endnote-continuation-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" ecs;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 2.0cm 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} -->

    <span lang="EN-GB">On 10 October 2008, the US Secretary of State Condoleezza Rice and the Indian Minister of External Affairs Pranab Mukherjee signed the “Agreement for Cooperation between the Government of the United States of America and the Government of India Concerning Peaceful Uses of Nuclear Energy” (hereafter: US-India Agreement.<span class="MsoFootnoteReference"><span><span class="MsoFootnoteReference"><span style="font-size: 12pt; font-family: ";Times New Roman";;" lang="EN-GB">[1]

    <span lang="EN-GB">The text of the US-India Agreement had been agreed upon in summer 2007; the text was released on 3 August 2007. Preliminary assessments were mixed: Some scholars were highly critical, going so far as dubbing it a “debilitating blow to

  20. Nuclear terrorism - an unavoidable companion of nuclear fission?

    International Nuclear Information System (INIS)

    Mueller, H.

    1989-01-01

    Comparing the security measures provided for with regard to nuclear weapons or to the nuclear inventory of the civilian fuel cycle, it is shown that there are significantly lower standards applied to the storage, processing, and transport of the radioactive fuel material. The difference becomes most obvious when looking at the planning horizons of those responsible for the security measures. The NATO institutions establish their system of security measures on the basis of a dynamical 'threat analysis' reaching far into the future. In the civilian sector, risk analyses and the deduced security measures are well lagging behind the development of realistic risk scenarios. This makes life easier for the operators of nuclear fuel cycle facilities, who otherwise would be obliged to continuously backfit their installations. The cost advantage on the operator's part, however, is obtained at the expense of security. (orig./HSCH) [de

  1. Visual working memory span in adults with cochlear implants: Some preliminary findings

    Directory of Open Access Journals (Sweden)

    Aaron C. Moberly

    2017-12-01

    Full Text Available Objective: Neurocognitive functions, specifically verbal working memory (WM, contribute to speech recognition in postlingual adults with cochlear implants (CIs and normal-hearing (NH listener shearing degraded speech. Three hypotheses were tested: (1 WM accuracy as assessed using three visual span measures — digits, objects, and symbols — would correlate with recognition scores for spectrally degraded speech (through a CI or when noise-vocoded; (2 WM accuracy would be best for digit span, intermediate for object span, and lowest for symbol span, due to the increasing cognitive demands across these tasks. Likewise, response times, relating to processing demands, would be shortest for digit span, intermediate for object span, and longest for symbol span; (3 CI users would demonstrate poorer and slower performance than NH peers on WM tasks, as a result of less efficient verbally mediated encoding strategies associated with a period of prolonged auditory deprivation. Methods: Cross-sectional study of 30 postlingually deaf adults with CIs and 34 NH controls. Participants were tested for sentence recognition in quiet (CI users or after noise-vocoding (NH peers, along with WM using visual measures of digit span, object span, and symbol span. Results: Of the three measures of WM, digit span scores alone correlated with sentence recognition for CI users; no correlations were found using these three measures for NH peers. As predicted, WM accuracy (and response times were best (and fastest for digit span, intermediate for object span, and worst (and slowest for symbol span. CI users and NH peers demonstrated equivalent WM accuracy and response time for digit span and object span, and similar response times for symbol span, but contrary to our original predictions, CI users demonstrated better accuracy on symbol span than NH peers. Conclusions: Verbal WM assessed using visual tasks relates weakly to sentence recognition for degraded speech. CI users

  2. The state of nuclear forensics

    International Nuclear Information System (INIS)

    Kristo, Michael J.; Tumey, Scott J.

    2013-01-01

    Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.

  3. The state of nuclear forensics

    Energy Technology Data Exchange (ETDEWEB)

    Kristo, Michael J. [Chemical Sciences Division, Lawrence Livermore National Laboratory, P.O. Box 808, L-186, Livermore, CA 94551 (United States); Tumey, Scott J., E-mail: tumey2@llnl.gov [Center for Accelerator Mass Spectrometry, Lawrence Livermore National Laboratory, P.O. Box 808, L-397, Livermore, CA 94551 (United States)

    2013-01-15

    Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.

  4. Safety Assessment - Swedish Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Kjellstroem, B. [Luleaa Univ. of Technology (Sweden)

    1996-12-31

    After the reactor accident at Three Mile Island, the Swedish nuclear power plants were equipped with filtered venting of the containment. Several types of accidents can be identified where the filtered venting has no effect on the radioactive release. The probability for such accidents is hopefully very small. It is not possible however to estimate the probability accurately. Experiences gained in the last years, which have been documented in official reports from the Nuclear Power Inspectorate indicate that the probability for core melt accidents in Swedish reactors can be significantly larger than estimated earlier. A probability up to one in a thousand operating years can not be excluded. There are so far no indications that aging of the plants has contributed to an increased accident risk. Maintaining the safety level with aging nuclear power plants can however be expected to be increasingly difficult. It is concluded that the 12 Swedish plants remain a major threat for severe radioactive pollution of the Swedish environment despite measures taken since 1980 to improve their safety. Closing of the nuclear power plants is the only possibility to eliminate this threat. It is recommended that until this is done, quantitative safety goals, same for all Swedish plants, shall be defined and strictly enforced. It is also recommended that utilities distributing misleading information about nuclear power risks shall have their operating license withdrawn. 37 refs.

  5. Safety Assessment - Swedish Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kjellstroem, B.

    1996-01-01

    After the reactor accident at Three Mile Island, the Swedish nuclear power plants were equipped with filtered venting of the containment. Several types of accidents can be identified where the filtered venting has no effect on the radioactive release. The probability for such accidents is hopefully very small. It is not possible however to estimate the probability accurately. Experiences gained in the last years, which have been documented in official reports from the Nuclear Power Inspectorate indicate that the probability for core melt accidents in Swedish reactors can be significantly larger than estimated earlier. A probability up to one in a thousand operating years can not be excluded. There are so far no indications that aging of the plants has contributed to an increased accident risk. Maintaining the safety level with aging nuclear power plants can however be expected to be increasingly difficult. It is concluded that the 12 Swedish plants remain a major threat for severe radioactive pollution of the Swedish environment despite measures taken since 1980 to improve their safety. Closing of the nuclear power plants is the only possibility to eliminate this threat. It is recommended that until this is done, quantitative safety goals, same for all Swedish plants, shall be defined and strictly enforced. It is also recommended that utilities distributing misleading information about nuclear power risks shall have their operating license withdrawn. 37 refs

  6. Hot spots, weak links: Strengthening nuclear security in a changing world

    International Nuclear Information System (INIS)

    Taniguchi, Tomihiro; Nilsson, Anita

    2004-01-01

    Protection against nuclear terrorism is one of the critical issues facing the international community today. New and challenging security dimensions must be met. During the Cold War, the main international security concern was the fear of a nuclear war and the spread of nuclear weapons. The post-Cold War era presented new security challenges, which recognized the need to strengthen the international regime of physical protection of nuclear materials. In the post-9/11 period, threat perceptions include the potential terrorist use of an improvised nuclear explosive device, the use of a radiological dispersal device (RDD) and attacks against nuclear facilities, i.e. sabotage. These threats point to the need for an overall strengthening of the global nuclear security regime with attention to 'weak links' that may offer soft targets for terrorists or criminals. This article discusses some of the basic concepts and developments in the field of nuclear security; the legacy of the Cold War and the rise of new challenges to the global nuclear security agenda in the post-Cold War and post-9/11 periods; and efforts of the IAEA to strengthen the global nuclear security regime. The IAEA is filling an important and expanding role, yet more measures are needed

  7. Hardening techniques for nuclear generated EMPs: Pt. 1

    International Nuclear Information System (INIS)

    Anon.

    1987-01-01

    This article is intended as an introduction to the protection of electronic equipment against the effects of the electromagnetic pulse (EMP) generated by a nuclear explosion. For explosions at heights above 100 km the energy in the pulse is considerable over areas of many thousands of square metres. This constitutes a major threat to electronic equipments which have not been exposed to the consequences of closer nuclear explosions (namely blast, thermal and nuclear radiation)

  8. Redefining Maritime Security Threats in the Eastern Indian Ocean Region.

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Arjun [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    This occasional paper analyzes the general security issues and trends relating to maritime trafficking of radiological and nuclear material using small vessels, minor ports, and unchecked areas of coastline existing in the Eastern Indian Ocean Region today. By the Eastern Indian Ocean Region is meant the area starting from the tip of the Indian peninsula in the west to the Straits of Malacca in the east. It lays focus on the potential sources of nuclear or radiological material that may be trafficked here. It further undertakes a study of the terrorist groups active in the region as well as the multinational or national interdiction organizations that have been created to counter maritime threats. It also seeks to discern the various technologies for detecting materials of concern available in the area. Finally, it ascertains possible methods and technologies to improve the maritime security system in the region.

  9. Canadian national nuclear forensics capability project

    International Nuclear Information System (INIS)

    Ball, J.; Dimayuga, I.; Summerell, I.; Totland, M.; Jonkmans, G.; Whitlock, J.; El-jaby, A.; Inrig, E.

    2015-01-01

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  10. Establishment of nuclear business management system

    International Nuclear Information System (INIS)

    Ahn, Jong Hwan; Cho, Suk Hong; Oh, Du Sub; Kim, Sung Ki; Choi, Young Lok; Kim, Hwa Sup; Jun, Sang Jin; Yoon, Hyung Mo; Park, Jae Hong; Song, Tae Gil

    1991-01-01

    For the formulation of the technology development strategies the nuclear core technology, environmental analysis has been performed in four aspects: ecological environment, energy economy, nuclear policy and R and D environment. After analyzing the environment and identifying the opportunities and threats from the environment, the strategies on individual and organizational level have been developed for both of the short-term and long-term periods. For the betterment of nuclear business management, the management information system, management by objective and the mechanism for the enhancement of negotiation power in the international agreement have been studied. (Author)

  11. Knowledge preservation strategies for nuclear power plants

    International Nuclear Information System (INIS)

    Koruna, S.; Bachmann, H.

    2004-01-01

    The nuclear industry is currently facing several challenges. An internal threat to the safety and operations of nuclear power plants is the loss of those employees who hold knowledge that is either critical to operations or safety. This report discusses the possibilities to preserve knowledge in nuclear power plants. Dependent on the degree of tacitness two different knowledge preservation strategies can be discerned: personalization and codification. The knowledge preservation activities discussed are valued according to the criteria: cost, immediacy of availability and completeness

  12. Research on simulation technology for CBRN threat assessment system. Prediction technology for atmospheric dispersion of CBRN materials

    International Nuclear Information System (INIS)

    Miura, Hiroaki; Yano, Masanori; Nakata, Mitsuhiro; Takeda, Masaki

    2013-01-01

    The technical survey is conducted on the CBRN (Chemical, Biological, Radiological and Nuclear) Threat Assessment System Simulation Technology. The dispersion property of CBRN materials is summarized, and the current simulation techniques for CBRN materials dispersion are described. The effects of advection-diffusion, sedimentation by the gravity, buoyancy and wash-out by rainfall on the dispersion property of CBRN materials should be considered in the simulation modeling. The concentration distribution of CBRN materials is predicted through the meteorological analysis, the flow analysis and the dispersion analysis, and the hazard map will be produced from that. A selection of simulation method, model, domain and number of computational grid points is necessary to perform the simulation, considering the balance between calculation cost and prediction accuracy. For construction of CBRN Threat Assessment System, it is important how to integrate the developed simulation element technologies and threat assessment technologies. (author)

  13. Nuclear disarmament verification via resonant phenomena.

    Science.gov (United States)

    Hecla, Jake J; Danagoulian, Areg

    2018-03-28

    Nuclear disarmament treaties are not sufficient in and of themselves to neutralize the existential threat of the nuclear weapons. Technologies are necessary for verifying the authenticity of the nuclear warheads undergoing dismantlement before counting them toward a treaty partner's obligation. Here we present a concept that leverages isotope-specific nuclear resonance phenomena to authenticate a warhead's fissile components by comparing them to a previously authenticated template. All information is encrypted in the physical domain in a manner that amounts to a physical zero-knowledge proof system. Using Monte Carlo simulations, the system is shown to reveal no isotopic or geometric information about the weapon, while readily detecting hoaxing attempts. This nuclear technique can dramatically increase the reach and trustworthiness of future nuclear disarmament treaties.

  14. The composite complex span: French validation of a short working memory task.

    Science.gov (United States)

    Gonthier, Corentin; Thomassin, Noémylle; Roulin, Jean-Luc

    2016-03-01

    Most studies in individual differences in the field of working memory research use complex span tasks to measure working memory capacity. Various complex span tasks based on different materials have been developed, and these tasks have proven both reliable and valid; several complex span tasks are often combined to provide a domain-general estimate of working memory capacity with even better psychometric properties. The present work sought to address two issues. Firstly, having participants perform several full-length complex span tasks in succession makes for a long and tedious procedure. Secondly, few complex span tasks have been translated and validated in French. We constructed a French working memory task labeled the Composite Complex Span (CCS). The CCS includes shortened versions of three classic complex span tasks: the reading span, symmetry span, and operation span. We assessed the psychometric properties of the CCS, including test-retest reliability and convergent validity, with Raven's Advanced Progressive Matrices and with an alpha span task; the CCS demonstrated satisfying qualities in a sample of 1,093 participants. This work provides evidence that shorter versions of classic complex span tasks can yield valid working memory estimates. The materials and normative data for the CCS are also included.

  15. A Nuclear Submarine in the South Atlantic: The Framing of Threats and Deterrence

    Directory of Open Access Journals (Sweden)

    Mônica Herz

    Full Text Available Abstract In this article, we analyse one aspect of Brazilian nuclear policy during the tenure of the Workers Party (2003–2016: the development of a nuclear-propelled submarine. We propose that the project of building a nuclear-propelled submarine has become possible partly because of the mobilisation of a set of arguments for the construction of the South Atlantic as a strategic area, framed in terms of security and development. On the other hand, we contend that the need for a nuclear-propelled submarine is framed through the mobilisation of a specific notion of deterrence. In other words, we claim that the notions of ‘strategic area’, ‘general deterrence’, ‘conventional deterrence’, and ‘deterrence by denial’ can help us analyse the fundamental aspects involved in the framing of the South Atlantic as a security concern, justifying the nuclear-propelled submarine project.

  16. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  17. Nuclear Cyber Security Issues and Policy Recommendations

    International Nuclear Information System (INIS)

    Lee, Cheol-Kwon; Lee, Dong-Young; Lee, Na-Young; Hwang, Young-Soo

    2015-01-01

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities

  18. Visual-Attentional Span and Lexical ­Decision in Skilled Adult Readers

    Science.gov (United States)

    Holmes, Virginia M.; Dawson, Georgia

    2014-01-01

    The goal of the study was to examine the association between visual-attentional span and lexical decision in skilled adult readers. In the span tasks, an array of letters was presented briefly and recognition or production of a single cued letter (partial span) or production of all letters (whole span) was required. Independently of letter…

  19. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  20. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  1. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Jung, Myungtak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities.

  2. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    International Nuclear Information System (INIS)

    Koh, Moonsung; Jung, Myungtak

    2015-01-01

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities

  3. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  4. Nuclear Power and Sustainable Energy Policy: Promises and Perils

    OpenAIRE

    Ioannis N. Kessides

    2010-01-01

    The author examines the challenges and opportunities of nuclear power in meeting the projected large absolute increase in energy demand, especially electricity, throughout the industrialized and developing world, while helping to mitigate the threat of climate change. A significant global nuclear power deployment would engender serious risks related to proliferation, safety, and waste disposal. Unlike renewable sources of energy, nuclear power is an unforgiving technology because human lapses...

  5. How to realize a nuclear-free Korean peninsula

    International Nuclear Information System (INIS)

    Yun, Duk-min

    1992-01-01

    It is certain that, unless the nuclear issue is solved, there can be no progress in inter-Korean relations. To this end, comprehensive and intrusive mutual inspections of any suspicious sites, as well as IAEA inspections, should certainly be implemented. Once international and bilateral arrangements for nuclear inspection are agreed and implemented to the satisfaction of the parties concerned, this will not only solve the problem of nuclear proliferation, but also lay a firm foundation for greater confidence-building measures on the Korean peninsula. This could also be a valuable example for future arms control in Korea. However, even mutual inspection between the two Koreas cannot necessarily guarantee a nuclear-free Korea. The most effective way to ensure the denuclearization of Korea may be to remove elements that the two Koreas perceive as incentives to go nuclear, in parallel with operating a tight and stable verification regime based on mutual and international inspections. Since the major reasons to go nuclear in Korea are military threats and mutual distrust between the two Koreas, no efforts should be spared to rectify these situations. Therefore, confidence- and security-building measures, including full-scale arms control, must be carried out in order to realize and preserve a nuclear-free Korea. In the long run, the greatest contribution to reducing the threat of nuclear proliferation in the Korean peninsula will be through improving overall relations between South and North Korea

  6. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses. Addendum

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards ( including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  7. Examining the locus of age effects on complex span tasks.

    Science.gov (United States)

    McCabe, Jennifer; Hartman, Marilyn

    2003-09-01

    To investigate the locus of age effects on complex span tasks, the authors evaluated the contributions of working memory functions and processing speed. Age differences were found in measures of storage capacity, language processing speed, and lower level speed. Statistically controlling for each of these in hierarchical regressions substantially reduced, but did not eliminate, the complex span age effect. Accounting for lower level speed and storage, however, removed essentially the entire age effect, suggesting that both functions play important and independent roles. Additional evidence for the role of storage capacity was the absence of complex span age differences with span size calibrated to individual word span performance. Explanations for age differences based on inhibition and concurrent task performamce were not supported.

  8. WildSpan: mining structured motifs from protein sequences

    Directory of Open Access Journals (Sweden)

    Chen Chien-Yu

    2011-03-01

    Full Text Available Abstract Background Automatic extraction of motifs from biological sequences is an important research problem in study of molecular biology. For proteins, it is desired to discover sequence motifs containing a large number of wildcard symbols, as the residues associated with functional sites are usually largely separated in sequences. Discovering such patterns is time-consuming because abundant combinations exist when long gaps (a gap consists of one or more successive wildcards are considered. Mining algorithms often employ constraints to narrow down the search space in order to increase efficiency. However, improper constraint models might degrade the sensitivity and specificity of the motifs discovered by computational methods. We previously proposed a new constraint model to handle large wildcard regions for discovering functional motifs of proteins. The patterns that satisfy the proposed constraint model are called W-patterns. A W-pattern is a structured motif that groups motif symbols into pattern blocks interleaved with large irregular gaps. Considering large gaps reflects the fact that functional residues are not always from a single region of protein sequences, and restricting motif symbols into clusters corresponds to the observation that short motifs are frequently present within protein families. To efficiently discover W-patterns for large-scale sequence annotation and function prediction, this paper first formally introduces the problem to solve and proposes an algorithm named WildSpan (sequential pattern mining across large wildcard regions that incorporates several pruning strategies to largely reduce the mining cost. Results WildSpan is shown to efficiently find W-patterns containing conserved residues that are far separated in sequences. We conducted experiments with two mining strategies, protein-based and family-based mining, to evaluate the usefulness of W-patterns and performance of WildSpan. The protein-based mining mode

  9. Nuclear War Survival Skills

    Energy Technology Data Exchange (ETDEWEB)

    Kearny, C.H.

    2002-06-24

    The purpose of this book is to provide Americans with information and instructions that will significantly increase their chances of surviving a possible nuclear attack. It brings together field-tested instructions that, if followed by a large fraction of Americans during a crisis that preceded an attack, could save millions of lives. The author is convinced that the vulnerability of our country to nuclear threat or attack must be reduced and that the wide dissemination of the information contained in this book would help achieve that objective of our overall defense strategy.

  10. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  11. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  12. Outlook for nuclear fission energy

    International Nuclear Information System (INIS)

    Anderson, T.D.

    1978-01-01

    The electric utility industry has made a substantial commitment to nuclear power. The industrial capability to produce nuclear plants is large and well established. Nevertheless, nuclear energy in the United States is at the crossroad, and the direction it will take is not at all assured. The postponements, cancellations, and lack of orders for new plants over the past three years raise some serious questions about the future. The present problems of nuclear energy are primarily nontechnical in nature. If the nontechnical issues can be resolved, the future for nuclear looks bright indeed. The LWR and other converters could provide strong competition for coal and other electric power options for a half century or more. If development goals are met, the nuclear breeder offers the prospect of a very large supply of energy at stabilized prices over a time span of centuries

  13. Detecting Illicit Nuclear Materials

    International Nuclear Information System (INIS)

    Kouzes, Richard T.

    2005-01-01

    The threat that weapons of mass destruction might enter the United States has led to a number of efforts for the detection and interdiction of nuclear, radiological, chemical, and biological weapons at our borders. There have been multiple deployments of instrumentation to detect radiation signatures to interdict radiological material, including weapons and weapons material worldwide

  14. U.S.-origin nuclear material removal program

    International Nuclear Information System (INIS)

    Messick, C.E.; Galan, J.J.

    2014-01-01

    The United States (U.S.) Department of Energy (DOE) Global Threat Reduction Initiative's (GTRI) U.S.-Origin Nuclear Material Removal program, also known as the Foreign Research Reactor Spent Nuclear Fuel Acceptance Program (FRR SNF AP), was established by the U.S. Department of Energy in May 1996. The program's mission provides a disposition pathway for certain U.S. origin spent nuclear fuel and other weapons-grade nuclear material. The program will continue until May 2016 with an additional three year window for fuel cooldown and transportation. This paper provides an update on recent program accomplishments, current program initiatives and future activities.

  15. Mapping the developmental constraints on working memory span performance.

    Science.gov (United States)

    Bayliss, Donna M; Jarrold, Christopher; Baddeley, Alan D; Gunn, Deborah M; Leigh, Eleanor

    2005-07-01

    This study investigated the constraints underlying developmental improvements in complex working memory span performance among 120 children of between 6 and 10 years of age. Independent measures of processing efficiency, storage capacity, rehearsal speed, and basic speed of processing were assessed to determine their contribution to age-related variance in complex span. Results showed that developmental improvements in complex span were driven by 2 age-related but separable factors: 1 associated with general speed of processing and 1 associated with storage ability. In addition, there was an age-related contribution shared between working memory, processing speed, and storage ability that was important for higher level cognition. These results pose a challenge for models of complex span performance that emphasize the importance of processing speed alone.

  16. Performance, Career Dynamics, and Span of Control

    DEFF Research Database (Denmark)

    Smeets, Valerie Anne Rolande; Waldman, Michael; Warzynski, Frederic Michel Patrick

    that higher ability managers should supervise more subordinates, or equivalently, have a larger span of control. And although some of this theory’s predictions have been empirically investigated, there has been little systematic investigation of the theory’s predictions concerning span of control....... In this paper we first extend the theoretical literature on the scale-of-operations effect to allow firms’ beliefs concerning a manager’s ability to evolve over the manager’s career, where much of our focus is the determinants of span of control. We then empirically investigate testable predictions from......There is an extensive theoretical literature based on what is called the scale-of-operations effect, i.e., the idea that the return to managerial ability is higher the more resources the manager influences with his or her decisions. This idea leads to various testable predictions including...

  17. Perspectives of nuclear risk

    International Nuclear Information System (INIS)

    Dupont, R.L.

    1981-06-01

    In an analysis of the content of American television news coverage of nuclear power over 11 years the dominant issue was found to be fear of what could happen, not what actually did happen. The major issue confronting the nuclear industry is how to deal with this fear. People tend to fear unfamiliar things, things they cannot control, and concentrated threats. The industry can use the fact that fear rivets attention to motivate people to learn. It is important not to create a division between nuclear opponents and proponents, but to work together with the opposition. The public needs to become involved directly and personally with nuclear power, through plant tours, exposure to people working in the industry, and other means of education about the risks and benefits of all energy sources

  18. The evolution of legal approaches to controlling nuclear and radiological weapons and combating the threat of nuclear terrorism

    NARCIS (Netherlands)

    Herbach, J.

    2015-01-01

    This chapter traces the evolution of international law related to the weaponization of nuclear and other radioactive materials, focusing in particular on the law pertaining to preventing acts of nuclear terrorism. International efforts to control atomic energy have evolved substantially since the

  19. Process of licensing nuclear facilities (resume from the Spanish National Report for the Joint Convention, 2005)

    International Nuclear Information System (INIS)

    Prieto, N.

    2007-01-01

    The process of licensing both nuclear and radioactive facilities is governed by the Regulation on Nuclear and Radioactive Facilities (Span. Reglamento de Instalaciones Nucleares y Radiactivas, RINR), approved by Royal Decree 1836/1999, of 3 December. According to the RINR, these authorizations are granted by the Ministry of Industry, Tourism and Trade (Span. Ministerio de Industria, Turismo y Comercio, MITYC), to which the corresponding requests should be addressed, along with the documentation required in each case, The MITYC sends a copy of each request and accompanying documentation to the Nuclear Safety Council (Span. Consejo de Seguridad Nuclear, CSN) for its mandatory report.) The CSN reports are mandatory and binding, both were negative or withholding in nature with respect to the request and, when positive, as regards the conditions established. On receiving the report from the CSN, and following whatever decisions or further reports might be required in each case, the MITYC will adopt the appropriate resolution. System for the licensing of nuclear facilities. According to the definitions included in the RINR, the following are nuclear facilities: - Nuclear power plants. - Nuclear reactors. - Manufacturing facilities using nuclear fuels to produce nuclear substances and those at which nuclear substances are treated. - Facilities for the permanent storage of nuclear substances. In compliance with the RINR, the nuclear facilities require different permits or administrative authorizations for their operation, these being the preliminary or site authorization, the construction permit, the operating permit, the authorization for modification and the dismantling permit. The procedure for the awarding of each of these authorizations is regulated by the Regulation itself and is briefly described below. (author)

  20. Integrated systems approach to meet the insider threat

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1985-01-01

    This paper describes an approach to mitigating the insider threat by integrating and supplementing existing data systems and procedures without placing an undue burden on plant management and operating personnel. Nuclear facilities have plans to deal with any forseeable chain of events, and long-term records of activities are maintained to verify that the requirements are met. The integrated systems approach proposed in this paper does not change established facility practices; rather, the approach attempts to utilize the information generated by the system. This will provide real-time interaction between the documented work permits, the operating procedure system, and the security system so that controlled access authorizations are based on a need to enter and access is limited to specific times and places

  1. Approach for Establishing a National Nuclear Forensics System

    International Nuclear Information System (INIS)

    Kim, Jaekwang; Hyung, Sangcheol

    2014-01-01

    The increasing number could give rise to posing a potential threat to national infrastructure which is very vulnerable to radiological sabotage with the materials. International community has been emphasizing the importance of nuclear forensics through the Nuclear Security Summit process as a countermeasure against nuclear terrorism. Global Initiative to Combat Nuclear Terrorism(GICNT) and nuclear forensics International Technology Working Group(ITWG) suggest the establishment of national nuclear forensics system which has a law enforcement for forensic management and maintenance of nuclear forensics database including nuclear material and other radioactive materials. We suggest the legal and institutional system through this paper in an effort to set up a multi expert group and the nuclear forensics DB which can contribute to effective Core capabilities

  2. Approach for Establishing a National Nuclear Forensics System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jaekwang; Hyung, Sangcheol [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-05-15

    The increasing number could give rise to posing a potential threat to national infrastructure which is very vulnerable to radiological sabotage with the materials. International community has been emphasizing the importance of nuclear forensics through the Nuclear Security Summit process as a countermeasure against nuclear terrorism. Global Initiative to Combat Nuclear Terrorism(GICNT) and nuclear forensics International Technology Working Group(ITWG) suggest the establishment of national nuclear forensics system which has a law enforcement for forensic management and maintenance of nuclear forensics database including nuclear material and other radioactive materials. We suggest the legal and institutional system through this paper in an effort to set up a multi expert group and the nuclear forensics DB which can contribute to effective Core capabilities.

  3. Canadian national nuclear forensics capability project

    Energy Technology Data Exchange (ETDEWEB)

    Ball, J.; Dimayuga, I., E-mail: joanne.ball@cnl.ca [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Summerell, I. [Royal Canadian Mounted Police, Ottawa, Ontario (Canada); Totland, M. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Jonkmans, G. [Defence Research and Development Canada, Ottawa, Ontario (Canada); Whitlock, J. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); El-jaby, A. [Canadian Nuclear Safety Commission, Ottawa, Ontario (Canada); Inrig, E. [Defence Research and Development Canada, Ottawa, Ontario (Canada)

    2015-06-15

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  4. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  5. Cyber security issues imposed on nuclear power plants

    International Nuclear Information System (INIS)

    Kim, Do-Yeon

    2014-01-01

    Highlights: • Provide history of cyber attacks targeting at nuclear facilities. • Provide cyber security issues imposed on nuclear power plants. • Provide possible countermeasures for protecting nuclear power plants. - Abstract: With the introduction of new technology based on the increasing digitalization of control systems, the potential of cyber attacks has escalated into a serious threat for nuclear facilities, resulting in the advent of the Stuxnet. In this regard, the nuclear industry needs to consider several cyber security issues imposed on nuclear power plants, including regulatory guidelines and standards for cyber security, the possibility of Stuxnet-inherited malware attacks in the future, and countermeasures for protecting nuclear power plants against possible cyber attacks

  6. Strengthening nuclear security

    International Nuclear Information System (INIS)

    Kurihara, Hiroyoshi

    2003-01-01

    The international situation after the end of the Cold-War has been quite unstable, due to the occurrence of frequent regional conflicts and domestic wars based on ethnic, religious or racial reasons. Further, threats to the would peace and security by non-state actors, like international terrorist groups, have been recognized after 9.11 terrorist attacks to the World Trade Center buildings and to the Pentagon. Utilization of nuclear energy, which encompasses both peaceful uses and military ones, required an establishment of regulatory system, by which risks associated with the development of nuclear energy can be controlled. Accordingly, nuclear safety control system, and then non-proliferation control system has been developed, both in the international level and notional level. In recognition of the present unstable international situations, it is required to establish, maintain and strengthen a system which control nuclear security aspect, in addition to the present systems. (author)

  7. The long darkness: Psychological and moral perspectives on nuclear winter

    International Nuclear Information System (INIS)

    Grinspoon, L.

    1986-01-01

    The aftermath of nuclear war - a sustained period of devastation called nuclear winter - would threaten the survival of civilization, even of the human species. In this book some opponents of the arms race describe the consequences of nuclear warfare and offer explanations - drawn from their knowledge of psychiatry, history, religion, and biology - for the irrational behavior of political leaders who risk these consequences and for the reluctance of ordinary citizens to face the horror of the nuclear threat

  8. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  9. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  10. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  11. Nuclear Britain

    Energy Technology Data Exchange (ETDEWEB)

    Bunyard, P

    1981-01-01

    The subject is dealt with in chapters, entitled: (preface) the new resistance; (1) the weapons connection; (2) the AGR - a bungled programme; (3) reactor choice - a fearful dilemma; (4) the deadly atom (uranium - mining, processing, enrichment of U-235, political and international aspects); (5) the fast reactor - how safe; (6) radiation risk and cancer; (7) atomic waste - the industry's Achilles Heel; (8) accidents - the ever-present threat; (9) the growing opposition; (10) the nuclear state.

  12. Dynamics of investor spanning trees around dot-com bubble.

    Directory of Open Access Journals (Sweden)

    Sindhuja Ranganathan

    Full Text Available We identify temporal investor networks for Nokia stock by constructing networks from correlations between investor-specific net-volumes and analyze changes in the networks around dot-com bubble. The analysis is conducted separately for households, financial, and non-financial institutions. Our results indicate that spanning tree measures for households reflected the boom and crisis: the maximum spanning tree measures had a clear upward tendency in the bull markets when the bubble was building up, and, even more importantly, the minimum spanning tree measures pre-reacted the burst of the bubble. At the same time, we find less clear reactions in the minimal and maximal spanning trees of non-financial and financial institutions around the bubble, which suggests that household investors can have a greater herding tendency around bubbles.

  13. Dynamics of investor spanning trees around dot-com bubble.

    Science.gov (United States)

    Ranganathan, Sindhuja; Kivelä, Mikko; Kanniainen, Juho

    2018-01-01

    We identify temporal investor networks for Nokia stock by constructing networks from correlations between investor-specific net-volumes and analyze changes in the networks around dot-com bubble. The analysis is conducted separately for households, financial, and non-financial institutions. Our results indicate that spanning tree measures for households reflected the boom and crisis: the maximum spanning tree measures had a clear upward tendency in the bull markets when the bubble was building up, and, even more importantly, the minimum spanning tree measures pre-reacted the burst of the bubble. At the same time, we find less clear reactions in the minimal and maximal spanning trees of non-financial and financial institutions around the bubble, which suggests that household investors can have a greater herding tendency around bubbles.

  14. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  15. Developmental Dyslexia: The Visual Attention Span Deficit Hypothesis

    Science.gov (United States)

    Bosse, Marie-Line; Tainturier, Marie Josephe; Valdois, Sylviane

    2007-01-01

    The visual attention (VA) span is defined as the amount of distinct visual elements which can be processed in parallel in a multi-element array. Both recent empirical data and theoretical accounts suggest that a VA span deficit might contribute to developmental dyslexia, independently of a phonological disorder. In this study, this hypothesis was…

  16. Importance of the radioactive or nuclear component and its conjunction with conventional risks in social phenomena resulting from terrorist acts; Importancia da componente radioactiva e ou nuclear e sua conjuncao com riscos convencionais, em fenomenos sociais decorrentes de accoes terroristas

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, Francisco Miguel da Rocha Grave [Coronel, Portuguese Army, Ministerio da Defesa Nacional (Portugal)

    2009-05-15

    The current strategic environment has attenuated the traditional threats of military nature. However, several instability factors result on new risks and potential threats. A review is made on the current threats and risk scenarios and the capacities for intervention of the Portuguese Army in scenarios involving the use of nuclear, biological and chemical weapons.

  17. Noise Reduction with Optimal Variable Span Linear Filters

    DEFF Research Database (Denmark)

    Jensen, Jesper Rindom; Benesty, Jacob; Christensen, Mads Græsbøll

    2016-01-01

    In this paper, the problem of noise reduction is addressed as a linear filtering problem in a novel way by using concepts from subspace-based enhancement methods, resulting in variable span linear filters. This is done by forming the filter coefficients as linear combinations of a number...... included in forming the filter. Using these concepts, a number of different filter designs are considered, like minimum distortion, Wiener, maximum SNR, and tradeoff filters. Interestingly, all these can be expressed as special cases of variable span filters. We also derive expressions for the speech...... demonstrate the advantages and properties of the variable span filter designs, and their potential performance gain compared to widely used speech enhancement methods....

  18. Future World of Illicit Nuclear Trade: Mitigating the Threat

    Science.gov (United States)

    2013-07-29

    David Albright and Corey Gay , “Taiwan: Nuclear Nightmare Averted,” Bulletin of the Atomic Scientists, January/February 1998, vol. 54, issue 1, p. 54. 8...38 Figure 6: A photo of a model of the IR-1 centrifuge in Iran, showing four aluminum rotor tubes and three bellows. The top and bottom tubes ...are painted black, possibly intended to help control the temperatures along the rotor assembly. The small tubing wrapped around the outside of the

  19. Artificial intelligence in nuclear reactor operation

    International Nuclear Information System (INIS)

    Da Ruan; Benitez-Read, J.S.

    2005-01-01

    Assessment of four real fuzzy control applications at the MIT research reactor in the US, the FUGEN heavy water reactor in Japan, the BR1 research reactor in Belgium, and a TRIGA Mark III reactor in Mexico will be examined through a SWOT analysis (strengths, weakness, opportunities, and threats). Special attention will be paid to the current cooperation between the Belgian Nuclear Research Centre (SCK·CEN) and the Mexican Nuclear Centre (ININ) on AI-based intelligent control for nuclear reactor operation under the partial support of the National Council for Science and Technology of Mexico (CONACYT). (authors)

  20. Nuclear terrorism: Facts and fiction

    International Nuclear Information System (INIS)

    Kamp, K.H.

    1994-01-01

    The study tries to assess the risk of nuclear terrorism in the light of recent developments in the area of nuclear weapons proliferation, and to develop suggestions of how to cope with existing challenges. First of all the term of ''nuclear terrorism'' is defined and differentiated from other forms of nuclear crimes. In a second step the attempt is made to compile the findings and assessments of the past on the problem of nuclear terrorism. Since, as a rule, a threat potential is composed of 'intentions' and 'capabilities', a third part is dedicated to terrorist intentions and studies the degree of probability of terrorists considering nuclear weapons an appropriate means for their aims. In connection with 'capabilities' it is scrutinized whether terrorist groups will be able at all to procure, design or initiate nuclear warheads. This leads to the question as to which consequences result from nuclear safety shortcomings - in particular in Russia - with a view to nuclear terrorism. Based on the preceding considerations, several proposals for coping with the danger of nuclear terrorism are made. (orig./HP) [de