Leveraging Drones to Improve Nuclear Facility Security and Safety

nuclear.jpg

Hinkley Point B Power Station in Bridgwater, southwest England 

The growing uptake of drones, or unmanned aerial vehicles (UAVs), brings both unprecedented challenges and opportunities. Drones simultaneously represent a threat to privacy and a potential commercial boon (e.g. for parcel delivery); they serve concomitantly as weapons and as vital tools of military intelligence. This same mix of threat and opportunity is apparent in the nuclear industry. Drones pose important security challenges to nuclear power plants. Yet if the technology is harnessed properly, drones might not only be able to solve the problems they have created but also provide additional security benefits.

Illicit drone flights over nuclear power plants in France and Belgium in recent months – along with similar incidents in the United States that were not made public – have revealed the lack of adequate defences against drones at nuclear facilities. Shooting drones down is difficult and jamming them risks interfering with nuclear plant operations. Conventional radar cannot detect small drones that fly low to the ground. Moreover, UAVs could carry payloads capable of damaging spent fuel pools.

However, news media reports on a prototype for an ‘intercept drone’ designed to take down other drones. The intercept drone has cameras pointing in all directions that scan for nearby drones. It then flies above a target drone, dropping a cord that tangles the target drone’s rotor blades and causes it to crash. While the company’s marketing strategy is focused on celebrities and others concerned with protecting their privacy, such devices could potentially also be used by the nuclear industry to prevent drone flyovers.

The technology is still in an early phase, and has a number of challenges to overcome. The speed, agility and real-time image processing required to catch the target drone drains battery power rapidly, giving the intercept drone a flight time of about two minutes. The technology is also ineffective against ‘fixed wing’ drones that lack rotor blades. And using them over nuclear plants would be risky. The target drone would need to be taken down before it reached the plant perimeter, as a crash over the plant itself could damage equipment on the ground. Nonetheless, the concept holds promise.

Beyond enabling the interception of drone flyovers, new drones fitted with devices such as cameras, radiation sensors and heat sensors have applications in perimeter monitoring, radiation detection and disaster response. They can provide a complement to current perimeter monitoring measures at nuclear facilities. Most nuclear plants use a combination of CCTV cameras and vehicle and foot patrols to monitor for unauthorized intrusions or other anomalies. However, CCTV coverage may have ‘blind spots’. Patrols cannot always be present given the size of nuclear facilities, or access certain areas either by vehicle or by foot. Several UK nuclear facilities are evaluating the use of camera drones to provide coverage to fill these gaps.

Drones can also supplement radiation monitoring at nuclear plants. Nuclear facilities currently use static monitoring points to detect radiation leaks.  However, they do not offer complete coverage and are susceptible to false alarms. For example, a static monitoring point recently detected radiation at the Sellafield nuclear reprocessing site in Britain, causing the facility to shut down temporarily. However, the radiation was later found to be from a naturally occurring source outside the site, having been blown in by the wind. In such an instance, using new drones equipped with radiation sensors could rapidly and more accurately identify the source, thus avoiding a costly shutdown.

Furthermore, UAVs can be used in disaster response and clean-up operations at nuclear facilities where it would not be safe to send a human. Following the 2011 earthquake and tsunami that triggered the Fukushima nuclear plant meltdown, responders initially relied on manned helicopters to gather radiation, imaging and temperature data – the tsunami destroyed 23 of the plant’s 24 static monitoring points – to evaluate the effectiveness of efforts to cool the reactors. This exposed the crew to radiation. Drones outfitted with sensors and cameras were subsequently deployed, as unmanned aircraft can safely get much closer to the ground and thus provide more accurate and detailed readings and imaging. They can be operated from up to 10 kilometres away, and their relatively low cost also means they can be replaced if they become contaminated. Several new models are currently being tested in the ongoing clean-up operations.

Drones currently represent equal parts threat and opportunity for nuclear facilities. Given that drone capabilities are increasing rapidly, the effects of whichever predominates now will be amplified in the future. It is thus essential to tip the balance in favour of UAV technologies that will enhance nuclear security and safety.

Caroline Baylon is Research Associate, Science, Technology & Cyber Security,
International Security Department. 
Royal Institute of International Affairs
 
See more at: http://ow.ly/PGvej
 
 
« New Dutch Law Would Allow Bulk Surveillance
Bitcoins Berlin Launch for Cashless Greeks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

Hassans International Law Firm

Hassans International Law Firm

Hassans is the largest law firm in Gibraltar, providing a full range of legal services across corporate and commercial law including Data Protection and GDPR compliance.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

ZoobeTek

ZoobeTek

ZoobeTek are a company focused on preventing leaks related to the security of business information3.