Vulnerability of nuclear plants to attack

The vulnerability of nuclear plants to deliberate attack is of concern in the area of nuclear safety and security. Nuclear power plants, civilian research reactors, certain naval fuel facilities, uranium enrichment plants, fuel fabrication plants, and even potentially uranium mines are vulnerable to attacks which could lead to widespread radioactive contamination. The attack threat is of several general types: commando-like ground-based attacks on equipment which if disabled could lead to a reactor core meltdown or widespread dispersal of radioactivity; and external attacks such as an aircraft crash into a reactor complex, or cyber attacks.The KANUPP plant in Karachi, Pakistan, has the most people—8.2 million—living within 30 kilometres, although it has just one relatively small reactor with an output of 125 megawatts. Next in the league, however, are much larger plants—Taiwan's 1,933-megawatt Kuosheng plant with 5.5 million people within a 30-kilometre radius and the 1,208-megawatt Chin Shan plant with 4.7 million; both zones include the capital city of Taipei.The foundation of a secure energy system is to need less energy in the first place, then to get it from sources that are inherently invulnerable because they're diverse, dispersed, renewable, and mainly local. They're secure not because they're American but because of their design. Any highly centralised energy system—pipelines, nuclear plants, refineries—invite devastating attack. But invulnerable alternatives don't, and can't, fail on a large scale. The vulnerability of nuclear plants to deliberate attack is of concern in the area of nuclear safety and security. Nuclear power plants, civilian research reactors, certain naval fuel facilities, uranium enrichment plants, fuel fabrication plants, and even potentially uranium mines are vulnerable to attacks which could lead to widespread radioactive contamination. The attack threat is of several general types: commando-like ground-based attacks on equipment which if disabled could lead to a reactor core meltdown or widespread dispersal of radioactivity; and external attacks such as an aircraft crash into a reactor complex, or cyber attacks. The United States 9/11 Commission has said that nuclear power plants were potential targets originally considered for the September 11, 2001 attacks. If terrorist groups could sufficiently damage safety systems to cause a core meltdown at a nuclear power plant, and/or sufficiently damage spent fuel pools, such an attack could lead to widespread radioactive contamination. The Federation of American Scientists have said that if nuclear power use is to expand significantly, nuclear facilities will have to be made extremely safe from attacks that could release massive quantities of radioactivity into the community. New reactor designs have features of passive nuclear safety, which may help. In the United States, the Nuclear Regulatory Commission carries out 'Force on Force' exercises at all nuclear power plant sites at least once every three years. Nuclear reactors become preferred targets during military conflict and, over the past three decades, have been repeatedly attacked during military air strikes, occupations, invasions and campaigns. Various acts of civil disobedience since 1980 by the peace group Plowshares have shown how nuclear weapons facilities can be penetrated, and the group's actions represent extraordinary breaches of security at nuclear weapons plants in the United States. The National Nuclear Security Administration has acknowledged the seriousness of the 2012 Plowshares action. Non-proliferation policy experts have questioned 'the use of private contractors to provide security at facilities that manufacture and store the government's most dangerous military material'. Nuclear weapons materials on the black market are a global concern, and there is concern about the possible detonation of a dirty bomb by a militant group in a major city. The number and sophistication of cyber attacks is on the rise. Stuxnet is a computer worm discovered in June 2010 that is believed to have been created by the United States and Israel to attack Iran's nuclear facilities. It switched off safety devices, causing centrifuges to spin out of control. The computers of South Korea's nuclear plant operator (KHNP) were hacked in December 2014. The cyber attacks involved thousands of phishing emails containing malicious code, and information was stolen. Terrorists could target nuclear power plants in an attempt to release radioactive contamination into the community. The United States 9/11 Commission has said that nuclear power plants were potential targets originally considered for the September 11, 2001 attacks. If terrorist groups could sufficiently damage safety systems to cause a core meltdown at a nuclear power plant, and/or sufficiently damage spent fuel pools, such an attack could lead to a widespread radioactive contamination. According to a 2004 report by the U.S. Congressional Budget Office, 'The human, environmental, and economic costs from a successful attack on a nuclear power plant that results in the release of substantial quantities of radioactive material to the environment could be great.' An attack on a reactor’s spent fuel pool could also be serious, as these pools are less protected than the reactor core. The release of radioactivity could lead to thousands of near-term deaths and greater numbers of long-term fatalities. If nuclear power use is to expand significantly, nuclear facilities will have to be made extremely safe from attacks that could release massive quantities of radioactivity into the community. New reactor designs have features of passive safety, such as the flooding of the reactor core without active intervention by reactor operators. But these safety measures have generally been developed and studied with respect to accidents, not to the deliberate reactor attack by a terrorist group. However, the US Nuclear Regulatory Commission does now also require new reactor license applications to consider security during the design stage. In the United States, the NRC carries out 'Force on Force' (FOF) exercises at all Nuclear Power Plant (NPP) sites at least once every three years. The FOF exercise, which is typically conducted over 3 weeks, 'includes both tabletop drills and exercises that simulate combat between a mock adversary force and the licensee’s security force. At an NPP, the adversary force attempts to reach and simulate damage to key safety systems and components, defined as 'target sets' that protect the reactor’s core or the spent fuel pool, which could potentially cause a radioactive release to the environment. The licensee’s security force, in turn, interposes itself to prevent the adversaries from reaching target sets and thus causing such a release'. In the U.S., plants are surrounded by a double row of tall fences which are electronically monitored. The plant grounds are patrolled by a sizeable force of armed guards. In 2009, a paper published in West Point Military Academy's journal alleged that Pakistan's nuclear sites had been attacked by al-Qaeda and the Taliban at least three times. However, the then Director General ISPR Athar Abbas said the claims were 'factually incorrect', adding that the sites were 'military facilities, not nuclear installations'. In January 2010, it was revealed that the US army was training a specialised unit 'to seal off and snatch back' Pakistani nuclear weapons in the event that militants would obtain a nuclear device or materials that could make one. Pakistan supposedly possesses about 80 nuclear warheads. US officials refused to speak on the record about the American safety plans.

[ "Nuclear energy policy", "Nuclear decommissioning", "Nuclear renaissance" ]
Parent Topic
Child Topic
    No Parent Topic