Technical challenges and Opportunities in Future Multilateral Nuclear Disarmament Verification Conference Title:Workshop Meeting, Vienna Name:David Keir.

Slides:



Advertisements
Similar presentations
Key Stage 3 National Strategy
Advertisements

Science Subject Leader Training
1 Welcome Safety Regulatory Function Handbook April 2006.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
The Missile Technology Control Regime
The Managing Authority –Keystone of the Control System
ISPM 6: Guidelines for Surveillance
Health and Safety Executive Health and Safety Executive CDM 2007 Training Package Session 2 - Clients Version: September 07.
Harmonized support to scaling up the national AIDS response Ini Huijts 7 th June 2006 ODI meeting, London.
IAEA Training in Emergency Preparedness and Response Module L-051 General Concepts of Exercises to Test Preparedness Lecture.
Premier-ESA Enabled by EXCEED. Empowered by Microsoft. One of a kind service agreement that brings you a perfect balance of services and support. Premier-ESA.
EMS Checklist (ISO model)
Episode 3 / CAATS II joint dissemination event Gaming Techniques Episode 3 - CAATS II Final Dissemination Event Patricia López Aena Episode 3 Brussels,
Effectively applying ISO9001:2000 clauses 6 and 7.
Effective Contract Management Planning
OOAD – Dr. A. Alghamdi Mastering Object-Oriented Analysis and Design with UML Module 3: Requirements Overview Module 3 - Requirements Overview.
1 Trade facilitation: Benefits and Capacity Building for Customs UNECE International Forum on Trade Facilitation, May 2003 Kunio Mikuriya Deputy.
Checking & Corrective Action
Major Accident Prevention Policy (MAPP) and Safety Management System (SMS) in the Context of the Seveso II Directive.
How to commence the IT Modernization Process?
1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
1 Phase III: Planning Action Developing Improvement Plans.
1 Technical Meeting on Managing the Development of a National Infrastructure for Nuclear Power SECURITY STATUS IN CHILE Mauricio Lichtemberg Chilean Nuclear.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
SAE AS9100 Quality Systems - Aerospace Model for Quality Assurance
CEET Conference 2008 Is Quality Assurance Improving? Rob Fearnside, Deputy Director VRQA.
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
How ISO 9001 Fits Into The Software World? Management of Software Projects and Personnel CIS 6516 March 6, 2006 Prepared by Olgu Yilmaz Swapna Mekala.
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Challenges in Verification of Nuclear Weapons Reduction Treaties ANS Section.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Introduction to ISO New and modified requirements.
Andrew Monteith Division of Technical Support Department of Safeguards
ISO 9001:2000 QUALITY MANAGEMENT SYSTEM REQUIREMENTS
LEGAL FRAMEWORK & REGULATORY SYSTEM f or introduction of NPP into Vietnam Le Chi Dung (VARANS, Vietnam) Vienna, December 2008.
1 REQUIREMENT ENGINEERING Chapter 7. 2 REQUIREMENT ENGINEERING Definition Establishing what the customer requires from a software system. OR It helps.
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
Report on the recent IAEA Workshop on Antineutrino Detection for Safeguards Applications Andrew Monteith Division of Technical Support Department of Safeguards.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Port Security Safeguarding ISPS Drills & Exercises Workshop
Programme Objectives Analyze the main components of a competency-based qualification system (e.g., Singapore Workforce Skills) Analyze the process and.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Regulatory Authority.
0 ©2015 U.S. Education Delivery Institute While there is no prescribed format for a good delivery plan, it should answer 10 questions What a good delivery.
Requirement engineering & Requirement tasks/Management. 1Prepared By:Jay A.Dave.
Agreement concerning the adoption of uniform conditions for periodical technical inspections of wheeled vehicles and the reciprocal recognition of such.
OUTLINE Why is MC&A Important? Purpose of MC&A: To provide assurance that nuclear materials are accounted for properly. To detect theft or diversion.
Laboratory equipment Dr. W. Huisman Cairo, November 21th 2012.
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 6 CH 5 ISO MANAGEMENT RESPONSIBILITY Philippe Bauwin Medical.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
International Atomic Energy Agency Workshop on Topical Issues on Infrastructure Development: Managing the Development of a National Infrastructure for.
Agreement concerning the adoption of uniform conditions for periodical technical inspections of wheeled vehicles and the reciprocal recognition of such.
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
External Validation of Quality Programs
A Fissile Materials Cut-off Treaty: french views
International Partnership for Nuclear Disarmament Verification
International Partnership for Nuclear Disarmament Verification
The Nuclear Weapons Convention
Operationalizing Export Certification and Regionalization Programmes
Nuclear Inspections in the Matrix
Portfolio, Programme and Project
External Validation of Quality Programs
THE WAY AHEAD – KEY LESSONS LEARNED AND UNRESOLVED ISSUES
SAFEGUARDS CAPACITY BUILDING ARGENTINE EXPERIENCE
Authentication of Electronics for Arms Control
About the IPNDV More than 25 countries with and without nuclear weapons which are: Identifying challenges of nuclear disarmament verification Developing.
Presentation transcript:

Technical challenges and Opportunities in Future Multilateral Nuclear Disarmament Verification Conference Title:Workshop Meeting, Vienna Name:David Keir 1 Date:May 2012

Future Nuclear Disarmament Verification Scenarios 1.Verifying retirement of nuclear warheads by removal from delivery systems and storage of warheads in a jointly-monitored store; 2.Verifying dismantlement of a declared batch of nuclear warheads of declared type (output to be fissile components for monitored storage); 3.Verifying dismantlement – as above - followed by reduction of the fissile components to bulk, unclassified material; 4.Verifying decommissioning and permanent retirement of weapons production facilities. 2

Future Nuclear Disarmament Verification Scenarios 1.Verifying retirement of nuclear warheads by removal from delivery systems and storage of warheads in a jointly-monitored store; 2.Verifying dismantlement of a declared batch of nuclear warheads of declared type (output to be fissile components for monitored storage); 3.Verifying dismantlement – as above - followed by reduction of the fissile components to bulk, unclassified material; 4.Verifying decommissioning and permanent retirement of weapons production facilities. 3

Focusing on No. 2 – possibly the most challenging – a future treaty on warhead dismantlement 1.Essential that a team of inspectors is formed in advance, well-briefed and given the opportunity of working together – even if this is in the form of simulation exercises. 2.Essential to get advance information from the hosts, at an early stage in treaty negotiations: DECLARATIONS of what is there and where it is to be located AGREEMENT on access and ground rules INFORMATION about the facility, and the process flow that the declared items will follow; ESTABLISHMENT of a jointly-co-operative technical basis. 4

For multi-lateral verification Who should the inspectors be? 1.The inspection team needs to credibly represent the states who are stakeholders to the dismantlement operation and be technically credible also. This means: Formed of personnel recognised as competent to carry out the agreed verification measures; Formed of personnel who do not have any other conflicted affiliations; (in the special case where weapons design information may be intentionally revealed) – one or more inspectors may have to be from an NPT Nuclear Weapons State. 5

Homing in on the need to track items through dismantlement, ensuring no material diversion: 1.Requirement to secure boundaries and sweep the dismantlement areas as free from radioactive sources, before and after process; 2.Requirement to take custody of declared items and establish confidence that they are genuine warheads, as declared (NDA measurements); 3.Requirement to verify Tamper-indicating Devices (e.g. by imaging/change-detection) & control opening of containers; 4.Requirement to maintain chain-of-custody through re-packaging and movement of accountable, fissile, items (NDA again, plus TID protocols). 6

THREE KEY REQUIREMENTS 1. Taking custody and applying Tamper Indicating Devices 7

Reality of TID (tags, seals and tamper-indication enclosures) – status of technology 1.Despite talk, in the New START follow-up context, of “applying unique identifiers to warheads and containers”, there are no such unique identifiers which are: Demonstrated to be tamper-proof (note there is not even a protocol of types of attack on TIDs which they can be assessed against); Authenticated and certified for use in a nuclear facility (note the requirement for ‘reader’ hardware, cameras, laptop computers and sometimes change-detection software). 2. Policy people need to know this level of detail. Assuming that the chain of custody challenge can be met by current technology is a mistake. 8

2. Establishing identity, along the way, via verification of declared attributes using radiometric NDA 9

Reality of current NDA technology available for verification of warheads and components 1.Non-Destructive Assay is a fairly mature technology field. Well- understood for Safeguards; 2.The issue is in the special application to identifying nuclear warheads or fissile components; that of intrusiveness; 3.Information barriers have been developed over the years but none is yet fit for purpose – especially as regards authentication. None has yet been shown capable of handling NDA data sufficient for determining conformity to attribute declarations while, in an authenticated fashion protecting classified data ( NPT Article 1 issue); Again, policy people need to be aware of this level of detail. 10

3. Radiation sweeping the ‘before and after’ empty disassembly areas and containers 11

Reality of current NDA technology for radiation sweeping areas, containers and personnel 1.Better news here. The technologies available are well-developed and characterised. The equipment is also simple enough to be certified and authenticated using current technology. 2.However, certification and authentication of specific equipment must be completed before they are fit for purpose in a real verification scenario. May take up a year per item of technology. 3.A comprehensive and multilaterally-agreed ‘protocol for use’ would be required for each type of technology in a genuine scenario. Model protocols should be developed and trialled in a realistic exercise. 12

Preparation for the activities above, in a future treaty scenario Requirement for Host and Inspector teams to reach agreement on technical issues: What equipment is to be used and how is it to be authenticated and certified for use in the facility?, including: i.NDA measurement equipment; ii.Radiation sweep equipment iii.Tamper-indicating devices iv.Cameras v.Computers and software. 13

Method and timing of joint preparations in a future treaty scenario 1.Possibly by joint technical Working Groups, in parallel with negotiations of the treaty, or agreement. 2.An ideal scenario would be an already-established, multilateral verification body (possibly an IGO), with: An established and well characterised set of equipment; A well-understood set of verification protocols; A system for regularly updating the above; A system for interacting effectively with dismantler states, through initial engagement, joint protocol agreement and resolution of technical differences. 14

What kind of capability building for the future now? – Identifying possible work streams 1.Technology development in multilateral collaboration – areas identified above; 2.Grasp the nettle of demonstrating authentication of real hardware (and software if applicable); 3.Technical personnel training – (including areas relevant to other scenarios, e.g. shape-destruction of components, reduction to bulk material, - and even reprocessing plant de-militarisation, enrichment plant de-militarisation and decommissioning); 4.Focussed collaboration on protocols for use of NDA equipment and Chain-of-Custody technologies and procedures; with multilaterally- agreed goals; 15

What kind of capability building possible work streams - continued 5.Training of future inspectorate via collaborative research projects (like the UK-Norway initiative), plus targeted training courses in state nuclear facilities – (e.g. BNFL/Nuclear Decommissioning Authority), plus: 6.Running a realistic multilateral verification exercise – partly as a shop window and proving ground for the outputs of 1. and 2. above. Around 2015? 7.Personnel training on negotiation of technical issues and liaison with policy negotiators. 16

2009 Exercise in Norway 17

Conclusions 1.Significant technology development in the last thirty years; but it has been unilateral (mostly US national Labs.) or bilateral at best; 2.There is much more to be done to develop usable technology and it needs to been done with multilaterally-agreed goals; 3.There are hard physics constraints which mean that perfect solutions are unlikely; 4.People need to be trained and protocols need to be devised and tested, alongside equipment development; 5.We have identified possible work-streams. May 2012NPT Side Meeting18