Appendix E
List of Collaboration Topics Suggested by Workshop Participants
Overview
Following the joint India-U.S. workshop on technical aspects of civilian nuclear materials security, the workshop organizers from the National Academy of Sciences (NAS) and the National Institute for Advanced Studies (NIAS) received from the participants the following suggestions of potential topics and mechanisms for enhanced collaboration between scientists from India and the United States.
This is an initial list of topics generated during the workshop; subsequent topics may follow. The order in which these topics are listed does not in any way imply a prioritization. There are obvious topical overlaps, and overlaps in approaches, which can be further clarified.
This list is based on the technical opportunities identified by the participants, and does not necessarily reflect the desires and priorities of either government.
A. Personnel Reliability and Insider Threats
A1. Training: Human Reliability Program
A2. Training: Training Management
A3. Insider-Insider Protection Program
A4. Insider/Cyber-Insider Vulnerability Analysis
A5. Physical Protection-Performance Assurance Program
A6. Physical-Cybersecurity Integration
B. Cybersecurity
B1. Cybersecurity guidance for security controls at nuclear power plant facilities
B2. Cybersecurity guidance for security controls at other types of nuclear facilities
B3. Cybersecurity guidance for equipment acquisition
B4. Guidance for cybersecurity self-assessments
B5. Guidance for administrating and monitoring the performance of firewalls and intrusion detection/protection systems
B6. Investigate tools, technologies, and approaches for electronic testing of control systems for potential cyber vulnerabilities
B7. Guidance for deploying and maintaining defensive architectures
B8. Sharing/Exporting cybersecurity technologies
B9. Sharing threat and vulnerability information
B10. Guidance on cybersecurity inspection procedures
B11. Guidance on separation of duties for key information system insiders
B12. Guidance on how to integrate physical and cybersecurity programs
C. Nuclear Forensics
C1. Detection of uranium and plutonium in environmental matrices
C2. Age-dating of uranium-rich materials
C3. Round robin sample exchange
C4. National nuclear forensic libraries
D. Modeling and Simulations (Vulnerability Assessments)
D1. Methodology Tool Types: applications, strengths and weaknesses
D2. Training
D3. A path forward for possible joint cooperation
E. Physical Security
E1. Guard Forces: Composition, Training, Testing, Rotation, etc.
E2. Technologies for Physical Protection
E3. Integration of Technologies and Methodologies to Physical Protection
E4. Physical Protection as part of a systems approach to facility security (including personnel reliability programs, vulnerability assessments, etc.)
F. Material Measurements and Characterizations
F1. Material measurements and characterizations
F2. How they fit into materials characterization and accounting methodologies
G. Safety, Security, Safeguards
G1. Develop technology-neutral methods for estimating the frequency of attack for security
G2. Harmonize metrics for consequences between nuclear security and nuclear safety/safeguards
G3. Develop secure information technologies that would permit communication resources at a nuclear installation to be jointly used for safeguards and security
POSSIBLE MECHANISMS FOR FURTHER COOPERATION
• Training courses, either joint, reciprocal, phased, integrated, etc.
• Visiting scholars programs for students and/or young professionals at universities or laboratories
• Longer-term technical exchanges of experts to laboratories for joint work
• Workshops, either facilitated by the laboratories, NAS-NIAS, or other appropriate groups
• Site visits for specific scientific/technical purposes with well-defined objectives