recommended reading

Drill tests law enforcement's ability to respond to a nuclear threat

The National Nuclear Security Administration is turning to technology to help train law enforcement officials on how to respond to terrorist threats involving hazardous materials.

During a tabletop exercise last week at the Massachusetts Institute of Technology, NNSA showed state and local law enforcement officials PowerPoint presentations and videos that staged fictitious threat scenarios involving terrorists attempting to steal high-activity radiological and nuclear materials from laboratories at the university. Such materials could be used in radiological dispersal devices, which are more commonly known as dirty bombs. The law enforcement officials and faculty and staff from MIT walked through the steps they would take to respond to such an event. Forty participants took part in the exercise, while another 160 people observed.

"The tabletop is the culmination of multiple efforts we're doing domestically to help secure high-activity radiological and nuclear materials at civilian sites," said Kenneth Sheely, deputy director of NNSA's Global Threat Reduction Initiative. "We simulate an event, running through the evolution of alarms that would go off and the procedures [officials on-site and off-site] would need to take to respond in the case of an actual event."

Specifically, the tabletop exercise tests law enforcement's response to alarms a remote-monitoring system sends over the Internet when it detects critical threats involving hazardous materials. Signals to law enforcement officers are encrypted to ensure terrorists can't hack the system either from inside or outside the facility and, for example, prevent alarms from sounding during an attempted theft. The monitoring system also sends a periodic statement to confirm it's up and running.

"This is a sophisticated system in a box that integrates multiple sensors and prioritizes alarms to on-site and off-site monitoring centers to ensure an appropriate response," said Ioanna Iliopulos, director of GTRI's Office of North and South America. So, law enforcement might not be notified when someone enters a facility, but would be alerted if sensors detected tampering with a container of hazardous materials or found elevated levels of radiation in the room.

"Many medical and research facilities allow students to do important research at all hours, and they have authorized access to facilities that house these radiological devices," Iliopulos added. "If I'm a student that has gone rogue, I may not set off any access control alarms, but I'd still have a hard time spoofing the system with all of the additional detection systems on the device itself."

For security reasons, NNSA couldn't comment on whether a legitimate radiological or nuclear threat ever has been detected at either a government or civilian site.

NNSA, in partnership with the FBI, has conducted the tabletop exercises and used the remote-monitoring system at government facilities for nearly one decade, and extended the program to civilian sites during the past two years. While hospitals and universities often maintain hazardous materials on-site for research and medical purposes, Sheely noted, they rarely have armed guards who are properly trained to respond to a threat. This makes partnership with local law enforcement crucial.

"In any facility, whether civilian or military, you need to have a balanced security approach to protect not only against those attacking from outside, but those inside who are more knowledgeable of procedures," Sheely said.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.