Leveraging Drones to Improve Nuclear Facility Security and Safety

nuclear.jpg

Hinkley Point B Power Station in Bridgwater, southwest England 

The growing uptake of drones, or unmanned aerial vehicles (UAVs), brings both unprecedented challenges and opportunities. Drones simultaneously represent a threat to privacy and a potential commercial boon (e.g. for parcel delivery); they serve concomitantly as weapons and as vital tools of military intelligence. This same mix of threat and opportunity is apparent in the nuclear industry. Drones pose important security challenges to nuclear power plants. Yet if the technology is harnessed properly, drones might not only be able to solve the problems they have created but also provide additional security benefits.

Illicit drone flights over nuclear power plants in France and Belgium in recent months – along with similar incidents in the United States that were not made public – have revealed the lack of adequate defences against drones at nuclear facilities. Shooting drones down is difficult and jamming them risks interfering with nuclear plant operations. Conventional radar cannot detect small drones that fly low to the ground. Moreover, UAVs could carry payloads capable of damaging spent fuel pools.

However, news media reports on a prototype for an ‘intercept drone’ designed to take down other drones. The intercept drone has cameras pointing in all directions that scan for nearby drones. It then flies above a target drone, dropping a cord that tangles the target drone’s rotor blades and causes it to crash. While the company’s marketing strategy is focused on celebrities and others concerned with protecting their privacy, such devices could potentially also be used by the nuclear industry to prevent drone flyovers.

The technology is still in an early phase, and has a number of challenges to overcome. The speed, agility and real-time image processing required to catch the target drone drains battery power rapidly, giving the intercept drone a flight time of about two minutes. The technology is also ineffective against ‘fixed wing’ drones that lack rotor blades. And using them over nuclear plants would be risky. The target drone would need to be taken down before it reached the plant perimeter, as a crash over the plant itself could damage equipment on the ground. Nonetheless, the concept holds promise.

Beyond enabling the interception of drone flyovers, new drones fitted with devices such as cameras, radiation sensors and heat sensors have applications in perimeter monitoring, radiation detection and disaster response. They can provide a complement to current perimeter monitoring measures at nuclear facilities. Most nuclear plants use a combination of CCTV cameras and vehicle and foot patrols to monitor for unauthorized intrusions or other anomalies. However, CCTV coverage may have ‘blind spots’. Patrols cannot always be present given the size of nuclear facilities, or access certain areas either by vehicle or by foot. Several UK nuclear facilities are evaluating the use of camera drones to provide coverage to fill these gaps.

Drones can also supplement radiation monitoring at nuclear plants. Nuclear facilities currently use static monitoring points to detect radiation leaks.  However, they do not offer complete coverage and are susceptible to false alarms. For example, a static monitoring point recently detected radiation at the Sellafield nuclear reprocessing site in Britain, causing the facility to shut down temporarily. However, the radiation was later found to be from a naturally occurring source outside the site, having been blown in by the wind. In such an instance, using new drones equipped with radiation sensors could rapidly and more accurately identify the source, thus avoiding a costly shutdown.

Furthermore, UAVs can be used in disaster response and clean-up operations at nuclear facilities where it would not be safe to send a human. Following the 2011 earthquake and tsunami that triggered the Fukushima nuclear plant meltdown, responders initially relied on manned helicopters to gather radiation, imaging and temperature data – the tsunami destroyed 23 of the plant’s 24 static monitoring points – to evaluate the effectiveness of efforts to cool the reactors. This exposed the crew to radiation. Drones outfitted with sensors and cameras were subsequently deployed, as unmanned aircraft can safely get much closer to the ground and thus provide more accurate and detailed readings and imaging. They can be operated from up to 10 kilometres away, and their relatively low cost also means they can be replaced if they become contaminated. Several new models are currently being tested in the ongoing clean-up operations.

Drones currently represent equal parts threat and opportunity for nuclear facilities. Given that drone capabilities are increasing rapidly, the effects of whichever predominates now will be amplified in the future. It is thus essential to tip the balance in favour of UAV technologies that will enhance nuclear security and safety.

Caroline Baylon is Research Associate, Science, Technology & Cyber Security,
International Security Department. 
Royal Institute of International Affairs
 
See more at: http://ow.ly/PGvej
 
 
« New Dutch Law Would Allow Bulk Surveillance
Bitcoins Berlin Launch for Cashless Greeks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

Lacework

Lacework

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.