Preventive and Protective Measures Against Insider Threats at Nuclear Facilities
Project Type
Coordinated Research ProjectProject Code
CRP
Approved Date
2016/07/14Project Status
ClosedStart Date
2019/01/01Expected End Date
2023/12/31Completed Date
2026/02/16Participating Countries
Egypt, Ghana, Greece, Indonesia, Pakistan, Russian Federation, Sweden, TunisiaDescription
The objective of the Coordinated Research Project is to enhance existing preventive and protective measures against insider adversaries to reduce the risk of theft of nuclear material and sabotage at nuclear facilities.
Objectives
To develop training, methodologies, and enhanced measures against insiders to reduce the risk of theft or sabotage at nuclear facilities.
Specific Objectives
To develop a predictive model using psychosocial data that will improve trustworthiness programs at nuclear facilities. The predictive model (e.g., database, spreadsheet, graph) will use psychosocial data (personality, psychological, and social state of an individual) for trustworthiness programs at nuclear facilities in order to more effectively screen applicants for access and to increase the probability of detecting changes in behavior of individuals during employment that could indicate an insider threat.
Develop tools and methods for optimizing the use of nuclear material process monitoring to increase the probability of detecting theft. Develop tools and methods for application of process monitoring for nuclear security to improve detection capability for theft or diversion. Identify where improvement may be needed in existing process designs, instrumentation, or analysis algorithms in order to meet current and potentially enhanced detection goals in high throughput facilities.
Develop a risk-based analysis tool for selecting nuclear material accounting and control measures for specific facility types (e.g., research reactors, research laboratories, nuclear power plants, etc.).
Conduct research and development on technologies that will enhance the control of nuclear material and personnel at nuclear facilities. To research and develop technologies that will enhance the control of nuclear material and personnel at nuclear facilities, including the two person rule. This study should examine improvements in technologies for: tracking or controlling nuclear material; access to nuclear material or controlled objects (e.g., sensitive equipment or equipment prone to sabotage or theft); and access to sensitive areas by personnel, including control and tracking of personnel movements and enforcing implementation of the two-person rule.
Develop a predictive model for identifying colluding insider adversaries and improve measures against colluding insider adversaries. The predictive model (e.g., database, spreadsheet, graph) will aid in identifying colluding insiders that will determine how to apply measures against the insider threat that focuses on the colluding insider (a colluding insider refers to collusion between two or more insider adversaries and collusion between insider and outsider adversaries).
Impact
The project on enhancing the two person rule demonstrated that enhanced security, improved efficiency, and increased reliability can be achieved through the integration of advanced technology such as biometric and facial recognition software. The integration of behavioral models allows for the identification of suspicious patterns and behaviors exhibited by individuals within an organization. By analyzing data related to employee visits, durations, and access patterns, these models can highlight anomalies and red flags that may indicate unauthorized activities or potential threats. This proactive approach enables security teams to intervene swiftly and prevent security breaches.
Relevance
Insider threats, presently considered as a highly challenging issue, can pose a great hazard for nuclear facilities. Understanding the critical pathway to insider threat and the human factors associated, maintaining strong sccess control plays a significant role in preventing and detecting insider activity. By leveraging the strengths of both human intelligence and advanced technology, organizations can enhance their security measures, identify potential risks early on, and mitigate the impact of insider threats. With ongoing advancements in technology and continued adherence to ethical principles, the fight against insider threats can be further strengthened, ensuring the security and integrity of organizations and their sensitive information.