Nuclear plants meet deadline for security improvements

The main trade organization for the U.S. nuclear industry announced Friday that all 103 U.S. nuclear power plants have implemented increased security measures in response to changes made by the Nuclear Regulatory Commission as to the type of terrorist threat plants must be able to defend against.

There are concerns, though, regarding the commission's ability to review the new security plans in place at U.S. nuclear plants and regarding plans by the nuclear industry to use private contractors to conduct mock attacks to evaluate security efforts.

In April 2003, the NRC ordered that all U.S. nuclear plants have in place by Oct. 29, 2004 new security plans to reflect changes made by the commission to the Design Basis Threat - the size and type of a potential terrorist force nuclear plants must be able to defend against. While details of the new DBT are classified, NRC spokesman Dave McIntyre said Monday that the threat was revised to reflect the new security threat following the Sept. 11, 2001, terrorist attacks.

Over the past 18 months, U.S. nuclear plants have implemented a number of new security measures, according to the Nuclear Energy Institute, such as increased guard forces and training, "substantial" physical improvements to defend against car bombs and the creation of a "rigorous" mock attack regime to evaluate security plans. Since 2001, the U.S. nuclear industry has spent more than $1 billion on efforts to improve security, the institute said in a press release.

"These security enhancements will continue to make nuclear power plants the most secure industrial facilities in America," NEI Chief Nuclear Office Marvin Fertel said in a statement.

In September, however, the Government Accountability Office raised concerns over the NRC's ability to adequately evaluate the new security plans in place at nuclear power plants.

In testimony before a House Government Reform subcommittee, senior GAO official Jim Wells described the commission's efforts to evaluate new plant security plans as largely a "paper review" that was not detailed enough to adequately determine whether the plans could defend against the new design basis threat. For example, Wells told lawmakers that GAO officials found that plant security plans were often based on a template and lacked site-specific information.

McIntyre dismissed GAO's criticisms of the commission's security review efforts, saying they were "way off the mark."

"It's a hand's on, day-in, day-out inspection process," he said.

Concerns also have been raised over the NRC's plans to rely on mock attack exercises to evaluate the new security plans, with the GAO saying in September that it will take three years for such exercises to be conducted at all plants.

NEI also came under fire this summer for its decision to hire the Wackenhut Corp. security company to train and manage two permanent adversarial teams that would be used in the mock attack exercises because the company also provides security personnel for about half of U.S. nuclear plants.

Both the NRC and NEI have defended plans to use Wackenhut personnel in the mock attack exercises, noting the experience the company has in providing nuclear plant security and the strict scrutiny to which the exercises will be subjected.

In its statement Friday, NEI called for increased focus to be placed on efforts to integrate police and emergency responders with nuclear plant security forces. To help such efforts, a Nuclear Sector Government Coordinating Council, consisting of industry and government officials, has been created and held its first meeting earlier this month, NEI said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.