Nuclear Facility Surveillance Problems Revealed

Author: Carlton Purvis, Published on Oct 14, 2013

Nuclear facilities clearly demand maximum security but how do they implement it and what challenges do they face? In this exclusive interview with a nuclear facility security official, IPVM reveals the key problems and fundamental approaches the facility takes in managing security and video surveillance, including the use of video analytics, the problem with wildlife and manned response

Primary Role of Surveillance at a Nuclear Facility

*** ******* ***** ** ******** ******* ** * ******* ******** are ********* ********** *** *********** ********* ******* **** * ********. The ******* *** ******* **** *** ************ ** ****** ** fixed ********* *** ** ********** ****** *******.

“**’** ****** ******* *** ******* ** ****** *** ***** ** trying ** ********** ***** *** ********. *** **** **** **** talk ***** ** ********* ** ‘********’ -- ******** **** ***** ***** harm ** *** ***** *** *** ****** *** **** ****** the *****. ****’* **** **’** ******* *** ******* ******** ********* ** ******* ****** ** *** ***,” ** ****. ***, stands *** ********** *********** *** ** *********** **** ******* ** how ******** *******, ***** **** ********* *** ********** *********** ********. 

Hundreds ** ***** ****** ******** ******** 

**** **** ***** ** ** *****, ** ******* *** ** visually ******* *** ****. ** ***** ****** “*** ******* ****” to ******* ** ** ***** ** *** ******** ** *** facility. ***** *** ***** ******* ***** ****** *** ****. 

******* ** *** ********, *** ******** *** * ******** *******. “That [*********] **** ** ** ********* **** **** * ****** web **** ***** **** ** ** * ****** ******* ** it **** *** *** ** *****. ** ********* ******* *** wire, ***** ** ** *****.” ** ****. 

"** ******* ***** ** ** *** ***** ****, **** *******'* ** there, *** **** ******* **** ******** ** *** ** ***** fences ** **** ****** ** ******** *******," ** ****. “**** ** we *** *** ** *** ****** **** **'* * **** or **** * **** ****** ** *********, ** ***** **** to **** * ****** *** ** ***** **. **’* * pain ********* ********** *** **** **** **'* ***** *** **** crazy.” There ** ** **** ** *** ***** **** ***** ******* tend ** ****** **** **** *** * *** ** ******.

***** * ******* ****** ** ****** ****** ** * ********* **** period, **** **** ** ** * ******** ********* *********** *** a ******** ***** ** *** ****** ******. ** **** ******* if **** *** *** *** ** ******* ** *** **** the ******* ***** *** ***** ***** *** **** ********** ** **** * **** *** ** ******** ******.

*** ** **** *** ** **** ** **** ***** ******? "The ****** ** ****, * ***'* ****," ** ****. "**** want *** **** ** *** ****. **** **** ** **** if ******** ** ****** ** ** ****** *** *** ** *** small ** ** **** ** ** **** ***** **** ********." 

Detection ******* ********** 

********* ****

**** ** *** ******* ***** ******-********* ********* *** **** ** them *** ********** **** *** ********’* ********* ********* ******. * wire ***** *** ***** **** **** ******* ****** ***** ****** back ** *** ******** ******* ****.

*******

**** **** ***** ***** ** ** ***** *** *** **** from *** ****** ***** ****** *** ******** **** ************* ******** on *** ******. ** *** **** ** *** ******** **** were ***** *** ****** *** ******. *** ******* *** *** ********** to ** **** ** ********* ******* ****** **** **** ** ** animal.

********* *** ****** 

*** ****** **** ******** ********* ********* *** **********. *** ****** are ******* **** ** "****** ************ ** * ****** ** space," ********* ** *** ******* ********** ********** *******.

***** ** **** * *****-***** ********* ****** **** ****** ****** the **** *** ** ******* ** ********* ******* ******** ** the ***** *********** *** *****. ********, “**** * ****** **** that ***** **’* ** ***** *** ****,” ** ****. “*****'* like * ***** **** *** ***** ***** ** **** *** water ** ** **** *** ********. ** ***** ** ******** that **** *** *****. ** *** * *** ** **** ****** in *****, ***, ** ** ******* ***** ** **** **** close ** ** ***’* *** ** **** *****, **** **** will.”

Inclement *******

** ***** ** ***** ********** **** **** **** ** ****** views *** ****** ********** ******** ******** ********** *** **** ** supplement.

***********

*** **** *** *** *** ***** ** *********** **** **** solely ** ******** ****** **********. ** * ****** **** ****, the ******* ** ********* ***** ****** ** ****. ****** **** downtime * ********** ****** ** ***** ** ***** **** ******’* sector *** ****** *** ***** ********** *** **** ***** *** repair ** *********.

**********

****** *** ******* ********** ***** ****** * ***** ** ** one ***** ***** *** ******* *** **** **** * *** hours ** * ****.

Cameras ***** ****

*** ***** **** * *********** ** ***** *** *** ******* to ***** *** ********* *** *** ******. *******, ** ******** to ******* ******* ** *** ****** ** *** ***. *** majority ** *** ******* *** ******** **** *** ** ***** ** ******. **** *** ******* throughout *** **** *** **** ** ******* *********** ** ********** guards ** *** ****** *** ** ******* *********** ********.

**** ***** *** ********* ** *** ******** **** ***** *******. He **** ******* ***** ***** ********* *********** ** ****** *** and ***** *******.

** *** *** **** ** ******** *** ****** ** ******* at *** ****, *** ********* **** ** *** **** **** 100. There *** **** ***** ******* ** **** ******* ***** **** are ********* ********* ** *** ******* **** (*** ********). 

Oak ***** ******

**** ****** **** **** ***** ***** ** *********, *** **** for ******* ********** ** ***** **** **** ** ****** ****** verify ***** (*** ****** ****** *****) ***** ** *********. **** ******** may **** ****** **** ********* ***** * **** ******** ** Oak ***** ******** (****** *** *********** *** *** ******* ** a ******** ** *** ****) . ** **** ******, * **** of ******* ********** *** ******* *** ***** *** **** ***** way **** *** *******, ***** ******** *** ******* ******* ** the **** ****** ***** ** *** ******, ******* **** ********** any ******. ***** *******, * ********** ** ****** ****************** **** ****** *** ******* *** ******, ****** ** *** alarm *** *** ****** *********** **** ****** *** **********. ***** ***** the ********, *** ******** ******* *** ***** ***** **** ******* officers.

Comments (6)

"Why do they put up with so many false alerts? "The answer to that, I don't know," he said. "They want the best of the best. They want to know if anything is coming in no matter how big or how small it is even if it does cause more problems." "

Hear thta folks. They don't need any advanced analytics or detection system. The most basic motion detection camera will go off at the drop of a hat when set on maximum sensitivity. Just set it up so a spider makes it go off and you're good to go.

If they really deploy proper maintenance staff, performance should be just as high a priority as camera downtime. When properly configured, typical perimeter detection systems deployed at nuke plants won't give off so many false alarms. In past experiences with nuke plants, it is far to common for these poor performing and broken systems.

I agree with Brian on this. I have worked in many different environments in perimeter protection and each site and system has it's own unique challenges. I have used all of the technologies mentioned and without exception encountered false alarm triggers when setting systems up. There will always be false alerts but these can be minimised by the following:

1. Correct systems design in the first instance. This requires a holistic approach for perimeter protection to maximise the potential for the technology to work efficiently. An extensive site survey should also highlight environmental issues which will be the main factors in false alerts

2. High quality installation and commissioning processes to ensure that the technology being used is both fit for purpose and tested to ensure that the technology is being installed in compliance with the manufacturers specifications. Many false alarms are as a result of poor installation in the first place.

3. Planned and responsive maintenance.This is not just maintenance of the surveillance and PIDS technology, although this is critical, but also good house keeping. Making sure that trees and bushes and other environmental issues that are controllable are regularly addressed and not allowed to become "background noise" in the alert system.

4. Performance review and testing. Regular system walk tests are the only way to ensure that the system still complies with the original operational requirement. A regular review of the alarms generated false or positive and an action plan to deal with false alarms is essential.

It is frustrating to hear an end user accepting false alarms and poor performance. I have seen this over the the course of my career in surveillance. A steady erosion of the system performance gradually eats away at the effectiveness of the system. False alarms are a fact of life but can be controlled and minimised. This requires a lot of effort on the part of the end user, installation / maintenance company working as a team. Uncontrolled false alarms lead to apathy on the part of control room staff as they are bombarded with nuisance alarms which eventually are seen as noise and are ingnored. Nuisance alarms do not have to be a fact of life.

I'm really surprised you got to interview the guy. I presume he doesn't work in a nuclear facility anymore.

Well you're right about that. But it's because much of the security staff was furloughed or laid off because of the shutdown.

Interestingly, a recent review by the Nuclear Regulatory Comission of separate site than this also found issues with it's perimeter detection system during drills"

A faulty perimeter detection system, which made it impossible for defenders to know where “terrorists” were breaking into the plant site and where they were on the grounds. As a result of being technologically blind during a drill monitored by the NRC on October 11, 2011, the suit states “all of the ‘terrorists’ successfully breached the perimeter and the identified target sets located inside of Indian Point and succeeded in causing a total nuclear meltdown. Not one terrorist was killed by any security personnel during the drill.”

The main issue they found during the drills though was that someone was jamming their communications systems and recording their transmissions.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Most Recent Industry Reports

'Secure Channel' OSDP Access Control Examined on Jun 21, 2018
Despite claiming to be better than Wiegand, OSDP's initial releases did not address the lack of encryption between reader and controller, leaving...
Most Wanted Improvements In Manufacturer Technical Support (Statistics) on Jun 21, 2018
5 key areas of improvement and 1 clear wanted support feature were voiced by 140+ integrator responses to: What improvement in manufacturer...
Last Chance - Save $50 - July 2018 IP Networking Course on Jun 20, 2018
Today, Thursday the 21st is the last chance to save $50 on registration. Register now and save. This is the only networking course designed...
GDPR / ICO Complaint Filed Against IFSEC Show Facial Recognition on Jun 20, 2018
IPVM has filed a complaint against IFSEC’s parent company UBM based on our concern that the conference violates core GDPR principles on...
IFSEC Final Show Report on Jun 20, 2018
IPVM is live from London reporting on the IFSEC show. The Chinese have taken over the UK, centered on Hikvision, flanked by Dahua, Huawei and a...
Mobotix Releases 'Move' Into 21st Century on Jun 20, 2018
For years, Mobotix stood resolutely against, well, every other manufacturer, selling it as a virtue: MOBOTIX equipment is designed with no...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
Axis Guardian - Cloud VMS And Alarm Monitoring - Released on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...
IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact