DHS seeks help investigating nuclear detection gaps

The Homeland Security Department plans to enlist experts both inside and outside the government to launch a program probing the vulnerabilities of the nation's nuclear detection network.

The assessment would take place even as the United States continues to develop its radiation detection systems and looks to invest more than $1 billion in next-generation detectors.

The Domestic Nuclear Detection Office, a division within DHS, is hoping that by employing independent experts it can garner a glimpse of the current nuclear and radiological detection approach from a terrorist's perspective, according to a description of the plan posted to a government Web site last week.

These "Red Teaming Assessments" would be based solely on publicly available information in order to identify vulnerabilities a terrorist group might be able to locate with the same data.

The government's concern, which has grown astronomically since the terrorist attacks of Sept. 11, 2001, is that a group or individual could smuggle either radiological or nuclear material into the United States for use in a "dirty bomb" or an improvised atomic weapon. The Domestic Nuclear Detection Office, just more than 2 years old, was launched to specifically counter this threat.

"The goal is to identify vulnerabilities in the technology and operational procedures and to identify sensitive open-source information that, while unclassified, would prove useful to anyone attempting to circumvent the global nuclear detection architecture," according to the program description.

DHS is currently scanning 90 percent of inbound sea cargo at U.S. ports for radiation. The department expects that number to reach 98 percent for cargo at major domestic ports by the end of 2007. By 2008, nearly all containers at U.S. ports are set to be scanned for radiation, DHS officials have said. Radiation detectors are also being deployed at major land border crossings into the United States.

Industry, academic and government experts would study existing gaps in nuclear detection and those that could arise as the system develops, according to the detection office's request for input. They would be able to supplement data gleaned from open-source documents with "surveillance, site penetration" and any other information they might be able to independently elicit.

The efforts would result in both annual assessments and shorter-term studies that would gauge potential vulnerabilities and suggest fixes on a quarterly basis.

The nuclear detection office is asking experts over the next month provide suggestions on the structure of such a study group and the technological backgrounds of its members.

The DHS is also asking for input on ways the experts in the group could collect information, conduct surveillance and probe the security at sites legally and safely. Such activities could include simulated smuggling or actual transport of radiological or nuclear material, according to the DHS description of the planned program.

Unofficial tests of the system have shown weaknesses in the past. In 2002 and again in 2003, ABC News packed 15 pounds of depleted uranium into a lead pipe and shipped it via sea container into the United States to test U.S. detection capabilities.

In effect, study group members might be asked to play terrorist, probing for information and physically testing the U.S. detection web. Homeland Security officials are looking for an "accurate emulation of potential threat actors, their likely source materials and courses of action," according to the DHS posting.

Red teaming, or employing government outsiders to play the role of adversaries, is a fairly regular exercise employed by U.S. agencies, said nuclear security expert Charles Ferguson, a fellow at the Council on Foreign Relations.

Several years ago, Ferguson was part of a red team that was called to consider how a terrorist group might launch a dirty bomb attack. During that exercise the government also tapped the imagination of author Brad Meltzer, a writer of popular thrillers set in Washington.

"I think it's a valuable exercise," Ferguson said. "It's a way to bring in outside experts and just poke holes in what the government is trying to do."

Jeffrey Lewis, director of the New America Foundation's Nuclear Strategy and Nonproliferation Initiative, disagrees, suggesting they are likely an ineffective way to predict real adversary responses.

"I just don't see any reason to assume that terrorists laboring under real operational constraints would reach the same conclusions as a predominantly white, male, sixty-something, upper-middle class panel dominated by Ivy League graduates chatting over pastries and coffee," said Lewis via e-mail. "Many of these individuals are brilliant, but none of them are terrorists."

The Domestic Nuclear Detection Office is testing three versions of a next-generation radiation detector that it hopes would be able to detect radiation and to identify the emitting isotope as harmless and naturally occurring or a material of concern such as highly enriched uranium.

Present detectors do not distinguish between radiation-emitting materials, requiring Customs and Border Protection officials to conduct secondary screenings with a handheld scanner to determine the source of the alert.

Lawmakers have questioned whether the new machines, which carry a total price tag of $1.2 billion, would serve to better protect the nation's borders. Funding has been put on hold until the detector's increased efficacy can be certified by DHS.

DHS officials say the next-generation technology would still be unable to detect shielded highly enriched uranium, what experts say would likely be the nuclear material of choice for a terror group trying to assemble a simple nuclear device. Highly enriched uranium emits a relatively weak nuclear signature.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.