Vulnerability of nuclear plants to attack

The vulnerability of nuclear plants to deliberate attack is of concern in the area of nuclear safety and security. Nuclear power plants, civilian research reactors, certain naval fuel facilities, uranium enrichment plants, fuel fabrication plants, and even potentially uranium mines are vulnerable to attacks which could lead to widespread radioactive contamination. The attack threat is of several general types: commando-like ground-based attacks on equipment which if disabled could lead to a reactor core meltdown or widespread dispersal of radioactivity; external attacks such as an aircraft crash into a reactor complex, or cyber attacks.[1]

The United States 9/11 Commission has said that nuclear power plants were potential targets originally considered for the September 11, 2001 attacks. If terrorist groups could sufficiently damage safety systems to cause a core meltdown at a nuclear power plant, and/or sufficiently damage spent fuel pools, such an attack could lead to widespread radioactive contamination. The Federation of American Scientists have said that if nuclear power use is to expand significantly, nuclear facilities will have to be made extremely safe from attacks that could release massive quantities of radioactivity into the community. New reactor designs have features of passive nuclear safety, which may help. In the United States, the Nuclear Regulatory Commission carries out "Force on Force" exercises at all nuclear power plant sites at least once every three years.[1]

Nuclear reactors become preferred targets during military conflict and, over the past three decades, have been repeatedly attacked during military air strikes, occupations, invasions and campaigns.[2] Various acts of civil disobedience since 1980 by the peace group Plowshares have shown how nuclear weapons facilities can be penetrated, and the group's actions represent extraordinary breaches of security at nuclear weapons plants in the United States. The National Nuclear Security Administration has acknowledged the seriousness of the 2012 Plowshares action. Non-proliferation policy experts have questioned "the use of private contractors to provide security at facilities that manufacture and store the government's most dangerous military material".[3] Nuclear weapons materials on the black market are a global concern,[4][5] and there is concern about the possible detonation of a dirty bomb by a militant group in a major city.[6][7]

The number and sophistication of cyber attacks is on the rise. Stuxnet is a computer worm discovered in June 2010 that is believed to have been created by the United States and Israel to attack Iran's uranium enrichment facilities. It caused major damage to the facility by operating the centrifuges in erratic and unintended ways.[8] The computers of South Korea's nuclear plant operator (KHNP) were hacked in December 2014. The cyber attacks involved thousands of phishing emails containing malicious code, and information was stolen.[9] Neither of these attacks directly involved nuclear reactors or their facilities.

  1. ^ a b Charles D. Ferguson & Frank A. Settle (2012). "The Future of Nuclear Power in the United States" (PDF). Federation of American Scientists.
  2. ^ Benjamin K. Sovacool (2011). Contesting the Future of Nuclear Power: A Critical Global Assessment of Atomic Energy, World Scientific, p. 192.
  3. ^ Kennette Benedict (9 August 2012). "Civil disobedience". Bulletin of the Atomic Scientists.
  4. ^ Jay Davis. After A Nuclear 9/11 The Washington Post, March 25, 2008.
  5. ^ Brian Michael Jenkins. A Nuclear 9/11? CNN.com, September 11, 2008.
  6. ^ Orde Kittrie. Averting Catastrophe: Why the Nuclear Non-proliferation Treaty is Losing its Deterrence Capacity and How to Restore It Archived 2010-06-07 at the Wayback Machine May 22, 2007, p. 338.
  7. ^ Nicholas D. Kristof. A Nuclear 9/11 The New York Times, March 10, 2004.
  8. ^ "Legal Experts: Stuxnet Attack on Iran Was Illegal 'Act of Force'". Wired. 25 March 2013.
  9. ^ Penny Hitchin, "Cyber attacks on the nuclear industry", Nuclear Engineering International, 15 September 2015.

© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search