Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Vulnerability of nuclear facilities to attack

From Wikipedia, the free encyclopedia
(Redirected fromVulnerability of nuclear plants to attack)

An ongoing concern in the area ofnuclear safety and security is the possibility thatterrorist organizations may attack facilities possessingradioactive material in order to cause widespreadradioactive contamination or to constructnuclear weapons. Such facilities may includenuclear power plants, civilian research reactors,uranium enrichment plants, fuel fabrication plants, uranium mines, and military bases where nuclear weapons are stored. The attack threat is of several general types: commando-like ground-based attacks on equipment which if disabled could lead to a reactorcore meltdown or widespread dispersal of radioactivity, external attacks such as an aircraft crash into a reactor complex, or cyber attacks.[1]

The United States 9/11 Commission has said that nuclear power plants were potential targets originally considered for theSeptember 11, 2001 attacks. If terrorist groups could sufficiently damage safety systems to cause a core meltdown at a nuclear power plant, and/or sufficiently damagespent fuel pools, such an attack could lead to widespread radioactive contamination. TheFederation of American Scientists have said that if nuclear power use is to expand significantly, nuclear facilities will have to be made extremely safe from such attacks. New reactor designs have features ofpassive nuclear safety, which may help. In the United States, theNuclear Regulatory Commission carries out "Force on Force" exercises at all nuclear power plant sites at least once every three years.[1]

Nuclear power plants become preferred targets duringmilitary conflict and, over the past three decades, have been repeatedly attacked during military air strikes, occupations, and invasions.[2] Various acts ofcivil disobedience since 1980 by the peace groupPlowshares have demonstrated extraordinary breaches of security at nuclear weapons plants in the United States. TheNational Nuclear Security Administration has acknowledged the seriousness of the 2012 Plowshares action.Non-proliferation policy experts have questioned "the use of private contractors to provide security at facilities that manufacture and store the government's most dangerous military material".[3] Nuclear weapons materials on theblack market are a global concern,[4][5] and there is concern about the possible detonation of adirty bomb by a militant group in a major city.[6][7]

The number and sophistication of cyber attacks is on the rise.Stuxnet is acomputer worm discovered in June 2010 that is believed to have been created by the United States and Israel to attack Iran's uranium enrichment facilities. It caused major damage to the facility by operating thecentrifuges in erratic and unintended ways.[8] The computers of South Korea's nuclear plant operator (KHNP) were hacked in December 2014. The cyber attacks involved thousands ofphishing emails containing malicious code, and information was stolen.[9] Neither of these attacks directly involved nuclear reactors or their facilities.

Military attacks

[edit]

Nuclear reactors become preferred targets during military conflict and, over the past three decades, have been repeatedly attacked during military air strikes, occupations, invasions and campaigns:[2]

Vulnerabilities of nuclear reactors and waste-sites within war-zones

[edit]

Risks of nuclear energy systems aren't limited to deliberate bombing/shelling of or near nuclear energy plants – nuclear energy systems within war-zones in general have various additional vulnerabilities. Deliberate or unintentional bombing/shelling of or nearradioactive waste-sites[15] is a further concern. These risks have become clearerduring the 2022 Russian invasion of Ukraine. For example, when Russian forces occupied the inactive nuclear plant atChernobyl, it still required "a crew of workers to maintain and monitor it to prevent any further nuclear incidents" and before occupation, fatigue of workers, which may not be allowed to freely come and go, may make mistakes more likely.[16][17][18]

Nuclear terrorism

[edit]
Main article:Nuclear terrorism

The EU Commission’s research center (JRC) investigated in spring 2021 in a report and concluded that the terrorist risk of nuclear power plants is vanishingly small, and that even successful terrorism will have relatively insignificant consequences. JRC, finds that hydropower/dams and oil and gas infrastructure pose a significantly greater terrorist risk, although this is still an extremely unlikely hypothetical scenario[19]

American physicist and nuclear energy criticAmory Lovins, in his 1982 bookBrittle Power, argued that theenergy generation and distribution system of the United States is "brittle" (easily shattered by accident or malice) and that this poses a grave and growing threat to national security, life, and liberty.[20] Lovins claims that these vulnerabilities are increasingly being exploited. His book documents many significant assaults on energy facilities, other than during a war, in 40 countries and, within the United States, in some 24 states.[21] Following 9/11, he re-released this book.

Lovins further claims that in 1966, 20natural uranium fuel rods were stolen from theBradwell nuclear power station in England, and in 1971, five more were stolen at theWylfa Nuclear Power Station. In 1971, an intruder wounded a night watchman at theVermont Yankee reactor in the US. TheNew York University reactor building was broken into in 1972, as was theOconee Nuclear Station's fuel storage building in 1973. In 1975, theKerr McGee plutonium plant had thousands of dollars' worth of platinum stolen and taken home by workers. In 1975, at theBiblis Nuclear Power Plant in Germany, a Member of Parliament demonstrated the lack of security by carrying a bazooka into the plant under his coat.[22]

Nuclear plants were designed to withstand earthquakes, hurricanes, and other extreme natural events. But deliberate attacks involving large airliners loaded with fuel, such as those that crashed into theWorld Trade Center andthe Pentagon, were not considered when design requirements for today's fleet of reactors were determined. It was in 1972 when three hijackerstook control of a domestic passenger flight along the east coast of the U.S. and threatened to crash the plane into a U.S. nuclear weapons plant in Oak Ridge, Tennessee. The plane got as close as 8,000 feet above the site before the hijackers' demands were met.[23][24]

In February 1993, a man drove his car past a checkpoint at the Three Mile Island Nuclear plant, then broke through an entry gate. He eventually crashed the car through a secure door and entered the Unit 1 reactor turbine building. The intruder, who had a history of mental illness, hid in a building and was not apprehended for four hours.Stephanie Cooke asks: "What if he'd been a terrorist armed with a ticking bomb?"[25]

Fissile material may be stolen from nuclear plants and this may promote the spread of nuclear weapons. Many terrorist groups are eager to acquire the fissile material needed to make a crude nuclear device, or adirty bomb. Nuclear weapons materials on theblack market are a global concern,[4][5] and there is concern about the possible detonation of a small, crude nuclear weapon by amilitant group in a major city, with significant loss of life and property.[6][7] It is feared that a terrorist group could detonate a radiological or "dirty bomb", composed of any radioactive source and a conventional explosive. The radioactive material is dispersed by the detonation of the explosive. Detonation of such a weapon is not as powerful as a nuclear blast, but can produce considerableradioactive fallout. Alternatively, a terrorist group may position some of its members, or sympathisers, within the plant to sabotage it from inside.[26]

The IAEA Incident and Trafficking Database (ITDB) notes 1,266 incidents reported by 99 countries over the last 12 years, including 18 incidents involving HEU or plutonium trafficking:[27]

  • There have been 18 incidents of theft or loss ofhighly enriched uranium (HEU) andplutonium confirmed by the IAEA.[28]
  • British academicShaun Gregory alleged in 2009 thatal-Qaeda and theTaliban had attacked Pakistani nuclear facilities three times; twice in 2007 and once in 2008.[29] However, Pakistan's military rejected the allegations.Talat Masood, a political analyst, said that the nuclear link was "absolute nonsense".[30] All three attacks were suicide and appeared to aim at causing maximum damage and not seizing weapons.[31]
  • In November 2007, burglars with unknown intentions infiltrated thePelindaba nuclear research facility near Pretoria, South Africa. The burglars escaped without acquiring any of the uranium held at the facility.[32][33]
  • In June 2007, theFederal Bureau of Investigation released to the press the name ofAdnan Gulshair el Shukrijumah, allegedly the operations leader for developing tactical plans for detonating nuclear bombs in several American cities simultaneously.[34]
  • In November 2006,MI5 warned that al-Qaeda were planning on using nuclear weapons against cities in the United Kingdom by obtaining the bombs viaclandestine means.[35]
  • In February 2006,Oleg Khinsagov ofRussia was arrested inGeorgia, along with three Georgian accomplices, and convicted of attempting to smuggle 79.5 grams of 89% enriched HEU from the breakaway republic ofSouth Ossetia.[28]
  • TheAlexander Litvinenko poisoning with radioactive polonium "represents an ominous landmark: the beginning of an era of nuclear terrorism," according to Andrew J. Patterson.[36]
  • In June 2002, U.S. citizenJosé Padilla was arrested for allegedly planning a radiological attack onChicago; however, he was never charged with such conduct. He was instead convicted of charges that he conspired to "murder, kidnap and maim" people overseas.

Anti-terrorism preparedness in the United States

[edit]

Terrorists could target nuclear power plants in an attempt to releaseradioactive contamination into the community. The United States9/11 Commission has said that nuclear power plants were potential targets originally considered for theSeptember 11, 2001 attacks. If terrorist groups could sufficiently damage safety systems to cause acore meltdown at a nuclear power plant, and/or sufficiently damage spent fuel pools, such an attack could lead to a widespread radioactive contamination. According to a 2004 report by the U.S.Congressional Budget Office, "The human, environmental, and economic costs from a successful attack on a nuclear power plant that results in the release of substantial quantities of radioactive material to the environment could be great."[37] An attack on a reactor'sspent fuel pool could also be serious, as these pools are less protected than the reactor core. The release of radioactivity could lead to thousands of near-term deaths and greater numbers of long-term fatalities.[1]

If nuclear power use is to expand significantly, nuclear facilities will have to be made extremely safe from attacks that could release massive quantities of radioactivity into the community. New reactor designs have features ofpassive safety, such as the flooding of the reactor core without active intervention by reactor operators. But these safety measures have generally been developed and studied with respect to accidents, not to the deliberate reactor attack by a terrorist group. However, the USNuclear Regulatory Commission does now also require new reactor license applications to consider security during the design stage.[1]

In the United States, the NRC carries out "Force on Force" (FOF) exercises at all nuclear power plant (NPP) sites at least once every three years. The FOF exercise, which is typically conducted over 3 weeks, "includes both tabletop drills and exercises that simulate combat between a mock adversary force and the licensee’s security force. At an NPP, the adversary force attempts to reach and simulate damage to key safety systems and components, defined as "target sets" that protect the reactor's core or the spent fuel pool, which could potentially cause a radioactive release to the environment. The licensee's security force, in turn, interposes itself to prevent the adversaries from reaching target sets and thus causing such a release".[1]

In the U.S., plants are surrounded by a double row of tall fences which are electronically monitored. The plant grounds are patrolled by a sizeable force of armed guards.[38]

In 2009, a paper published in theUnited States Military Academy's journal alleged thatPakistan's nuclear sites had been attacked byal-Qaeda and theTaliban at least three times.[29] However, the then Director GeneralISPRAthar Abbas said the claims were "factually incorrect", adding that the sites were "military facilities, not nuclear installations".[30][31] In January 2010, it was revealed that the US military was training a specialised unit "to seal off and snatch back" Pakistani nuclear weapons in the event that militants would obtain a nuclear device or materials that could make one. Pakistan supposedly possesses about 160 nuclear warheads. US officials refused to speak on the record about the American safety plans.[39]

Sabotage by insiders

[edit]

Insider sabotage regularly occurs, because insiders can observe and work around security measures. In a study of insider crimes, the authors repeatedly said that successful insider crimes depended on the perpetrators' observation and knowledge of security vulnerabilities. Since theatomic age began, theU.S. Department of Energy's nuclear laboratories have been known for widespread violations of security rules. During theManhattan Project, physicistRichard Feynman was barred from entering certain nuclear facilities; he would crack safes and violate other rules as pranks to reveal deficiencies in security.[40]

A deliberate fire caused between $5m and $10m worth of damage to New York'sIndian Point Energy Center in 1971. The arsonist turned out to be a plant maintenance worker. Sabotage by workers has been reported at many other reactors in the United States: atZion Nuclear Power Station (1974),Quad Cities Nuclear Generating Station,Peach Bottom Nuclear Generating Station,Fort St. Vrain Generating Station,Trojan Nuclear Power Plant (1974),Browns Ferry Nuclear Power Plant (1980), andBeaver Valley Nuclear Generating Station (1981). Many reactors overseas have also reported sabotage by workers. Suspected arson has occurred in the United States and overseas.[22]

In 1998 a group of workers at one of Russia's largest nuclear weapons facilities attempted to steal 18.5 kilograms of HEU—enough for a bomb.[22]

It can be argued that Pakistan's whole nuclear program was jump-started due to sabotage by insiders. Following India's first nuclear weapons test,URENCO scientistA.Q. Khan wrote a letter to the Pakistani Prime Minister,Zulfiqar Ali Bhutto, offering to help start a nuclear weapons program for his home country. Soon after their conversations, Khan started delivering instructions and blueprints to Pakistan, which he got access to through his work translating the sophisticated G-1 and G-2 centrifuge designs from German to Dutch. Khan also acquired the essential expertise for running centrifuge operations from URENCO, which he would later relay back to scientists in Pakistan. When his coworkers at URENCO started to suspect something was going on, Khan had already fled back to his guaranteed safety in Pakistan. After just six years, Khan said his plants were “producing substantial quantities of uranium”.[41] Due to his help getting Pakistan the blueprints needed to start enriching uranium within their borders, Khan is widely regarded to as "the father of Pakistan’s nuclear weapons program".[42]

Civil disobedience

[edit]

Various acts ofcivil disobedience since 1980 by the peace groupPlowshares have shown how nuclear weapons facilities can be penetrated, and the group's actions represent extraordinary breaches of security at nuclear weapons plants in the United States. On July 28, 2012, three members of Plowshares cut through fences at theY-12 National Security Complex in Oak Ridge, Tennessee, which manufactures US nuclear weapons and stockpiles highly enriched uranium. The group spray-painted protest messages, hung banners, andsplashed blood.[3]

TheNational Nuclear Security Administration has acknowledged the seriousness of the 2012 Plowshares action, which involved the protesters walking into a high-security zone of the plant, calling the security breach "unprecedented." Independent security contractor, WSI, has since had a weeklong "security stand-down," a halt to weapons production, and mandatory refresher training for all security staff.[3]

Non-proliferation policy experts are concerned about the relative ease with which these unarmed, unsophisticated protesters could cut through a fence and walk into the center of the facility. This is further evidence that nuclear security—the securing of highly enriched uranium and plutonium—should be a top priority to prevent terrorist groups from acquiring nuclear bomb-making material. These experts have questioned "the use of private contractors to provide security at facilities that manufacture and store the government's most dangerous military material".[3]

In 2010, there was a security breach at aBelgian Air Force base which possessed U.S. nuclear warheads. The incident involved sixanti-nuclear activists enteringKleine Brogel Air Base. The activists stayed in the snow-covered base for about 20 minutes, before being arrested. A similar event occurred in 2009.[43]

On December 5, 2011, twoanti-nuclear campaigners breached the perimeter of theCruas Nuclear Power Plant in France, escaping detection for more than 14 hours, while posting videos of their sit-in on the internet.[44]

Cyber attacks

[edit]

Stuxnet is acomputer worm discovered in June 2010 that is believed to have been created by theUnited States andIsrael to attack Iran's nuclear facilities.[8] It switched off safety devices, causing centrifuges to spin out of control. Stuxnet initially spreads viaMicrosoft Windows, and targetsSiemensindustrial control systems. While it is not the first time that hackers have targeted industrial systems,[45] it is the first discoveredmalware that spies on and subverts industrial systems,[46] and the first to include aprogrammable logic controller (PLC)rootkit.[47][48]

Different variants of Stuxnet targeted five Iranian organizations,[49] with the probable target widely suspected to beuranium enrichment infrastructure inIran;[50][51]Symantec noted in August 2010 that 60% of the infected computers worldwide were in Iran.[52] Siemens stated that the worm has not caused any damage to its customers,[53] but theIran nuclear program, which usesembargoed Siemens equipment procured secretly, has been damaged by Stuxnet.[54][55]Kaspersky Lab concluded that the sophisticated attack could only have been conducted "with nation-state support".[56]

Idaho National Laboratory ran theAurora Experiment in 2007 to demonstrate how a cyber attack could destroy physical components of the electric grid.[57] The experiment used a computer program to rapidly open and close adiesel generator's circuit breakers out of phase from the rest of the grid and explode. This vulnerability is referred to as theAurora Vulnerability.

The number and sophistication of cyber attacks is on the rise. The computers ofSouth Korea's nuclear plant operator (KHNP) were hacked in December 2014. The cyber attacks involved thousands ofphishing emails containing malicious code, and information was stolen.[9] Nothing important was hacked at the plant, so the group was unable to threaten the operation of the reactor. Releasing personnel files and business data doesn’t compromise nuclear safety, even if it embarasses the company.[58]


In December 2017 it was reported that the safety systems of an unidentified power station, believed to be inSaudi Arabia were compromised when theTriconex industrial safety technology made by Schneider Electric SE was targeted in what is believed to have been a state sponsored attack. The computer security companySymantec claimed that the malware, known asTriton exploited a vulnerability in computers running theMicrosoft Windows operating system.[59]

Population surrounding plants

[edit]

Population density is one critical lens through which risks have to be assessed, says Laurent Stricker, a nuclear engineer and chairman of theWorld Association of Nuclear Operators:[60]

TheKANUPP plant inKarachi, Pakistan, has the most people—8.2 million—living within 30 kilometres, although it has just one relatively small reactor with an output of 125 megawatts. Also very densely populated is e.g. the chineseQinshan Nuclear Power Plant.

172,000 people living within a 30 kilometre radius of theFukushima Daiichi nuclear power plant have been forced or advised to evacuate the area. More generally, a 2011 analysis byNature andColumbia University shows that some 21 nuclear plants have populations larger than 1 million within a 30-km radius, and six plants have populations larger than 3 million within that radius.[60]

However, government plans for remote siting of nuclear plants in rural areas, and the transmission of electricity byhigh-voltage direct current lines to industrial regions would enhance safety and security.

On the other hand, nuclear plant security would be at elevated risk during a natural or man-madeelectromagnetic pulse event, and the ensuing civil disorder in surrounding areas.

Implications

[edit]

In his bookNormal Accidents,Charles Perrow says that multiple and unexpected failures are built into society's complex and tightly coupled nuclear reactor systems. Such accidents are unavoidable and cannot be designed around.[61]

In the 2003 bookBrittle Power,Amory Lovins talks about the need for a resilient, secure, energy system:

The foundation of a secure energy system is to need less energy in the first place, then to get it from sources that are inherently invulnerable because they're diverse, dispersed, renewable, and mainly local. They're secure not because they're American but because of their design. Any highly centralised energy system—pipelines, nuclear plants, refineries—invite devastating attack. But invulnerable alternatives don't, and can't, fail on a large scale.[62]

See also

[edit]

Further reading

[edit]

References

[edit]
  1. ^abcdeCharles D. Ferguson & Frank A. Settle (2012)."The Future of Nuclear Power in the United States"(PDF).Federation of American Scientists.
  2. ^abcBenjamin K. Sovacool (2011).Contesting the Future of Nuclear Power: A Critical Global Assessment of Atomic Energy, World Scientific, p. 192.
  3. ^abcdKennette Benedict (9 August 2012)."Civil disobedience".Bulletin of the Atomic Scientists.
  4. ^abJay Davis.After A Nuclear 9/11The Washington Post, March 25, 2008.
  5. ^abBrian Michael Jenkins.A Nuclear 9/11?CNN.com, September 11, 2008.
  6. ^abOrde Kittrie.Averting Catastrophe: Why the Nuclear Non-proliferation Treaty is Losing its Deterrence Capacity and How to Restore ItArchived 2010-06-07 at theWayback Machine May 22, 2007, p. 338.
  7. ^abNicholas D. Kristof.A Nuclear 9/11The New York Times, March 10, 2004.
  8. ^ab"Legal Experts: Stuxnet Attack on Iran Was Illegal 'Act of Force'". Wired. 25 March 2013.
  9. ^abPenny Hitchin, "Cyber attacks on the nuclear industry",Nuclear Engineering International, 15 September 2015.
  10. ^Estrella Roja Nº19, p. 10.
  11. ^Richter, Rodolfo Vicente (2015)."Guerra Revolucionaria en Argentina (1965–1973)"(PDF). p. 145. Retrieved3 July 2019.
  12. ^When Iran Bombed Iraq's Nuclear Reactor, Iraq's Osirak Destruction.
  13. ^"History of MK". African National Congress. Archived fromthe original on 4 April 2007. Retrieved14 May 2007.
  14. ^"Koeberg: SA's ill-starred nuclear power plant | IOL News".www.iol.co.za. Retrieved2019-07-03.
  15. ^"Radioactive waste disposal site near Kyiv hit by airstrike, Ukraine officials say".news.yahoo.com. Retrieved18 April 2022.
  16. ^"Russia's war in Ukraine raises nuclear risks, physicists warn".Science News. 7 March 2022. Retrieved18 April 2022.
  17. ^"expert reaction to Russian attacks at the Zaporizhzhia Nuclear Power Plant | Science Media Centre". Retrieved18 April 2022.
  18. ^"Experts predict lasting environmental damage from Russia's invasion of Ukraine".ABC News. Retrieved27 April 2022.
  19. ^Clea (2021-04-07)."JRC concludes nuclear does not cause significant harm".SNETP. Retrieved2024-01-30.
  20. ^"Brittle Power, Chapter 1, p. 1"(PDF). Archived fromthe original(PDF) on 2016-04-02. Retrieved2014-02-23.
  21. ^"Brittle Power, Chapter 1, p. 2"(PDF). Archived fromthe original(PDF) on 2016-04-02. Retrieved2014-02-23.
  22. ^abcAmory Lovins (2001).Brittle Power(PDF). pp. 145–146. Archived fromthe original(PDF) on 2016-04-02. Retrieved2014-02-23.
  23. ^Threat Assessment: U.S. Nuclear Plants Near Airports May Be at Risk of Airplane Attack (Link Defunct)Archived 2010-11-10 at theWayback Machine, Global Security Newswire, June 11, 2003.
  24. ^Newtan, Samuel Upton (2007).Nuclear War 1 and Other Major Nuclear Disasters of the 20th Century, AuthorHouse, p. 146.
  25. ^Stephanie Cooke (March 19, 2011)."Nuclear power is on trial". CNN.
  26. ^Frank Barnaby (2007)."Consequences of a Nuclear Renaissance"(PDF).International Symposium.
  27. ^Bunn, Matthew."Securing the Bomb 2010: Securing All Nuclear Materials in Four Years"(PDF). President and Fellows of Harvard College. Retrieved28 January 2013.
  28. ^abBunn, Matthew & Col-Gen. E.P. Maslin (2010)."All Stocks of Weapons-Usable Nuclear Materials Worldwide Must be Protected Against Global Terrorist Threats"(PDF). Belfer Center for Science and International Affairs, Harvard University. RetrievedJuly 26, 2012.
  29. ^abNelson, Dean (11 August 2009)."Pakistan's nuclear bases targeted by al-Qaeda".The Daily Telegraph. Retrieved18 September 2017.
  30. ^abWalsh, Declan (12 August 2009)."Pakistan denies al-Qaida targeting nuclear facilities".The Guardian. Retrieved18 September 2017.
  31. ^ab"Pakistan denies militants attacked nuclear sites".Dawn. 12 August 2009. Retrieved18 September 2017.
  32. ^"IOL | Pretoria News".
  33. ^Washington Post, December 20, 2007, Op-Ed byMicah Zenko
  34. ^"Feds Hoped to Snag Bin Laden Nuke Expert in JFK Bomb Plot". Fox News. June 4, 2007.
  35. ^Dodd, Vikram (14 November 2006)."Al-Qaida plotting nuclear attack on UK, officials warn".The Guardian.
  36. ^"Ushering in the era of nuclear terrorism," by Patterson, Andrew J. MD, PhD,Critical Care Medicine, v. 35, pp. 953–954, 2007.
  37. ^"Congressional Budget Office Vulnerabilities from Attacks on Power Reactors and Spent Material".
  38. ^U.S. NRC: "Nuclear Security – Five Years After 9/11". Accessed 23 July 2007
  39. ^"Elite US troops ready to combat Pakistani nuclear hijacks"[dead link],Times
  40. ^Matthew Bunn andScott Sagan (2014)."A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes". The American Academy of Arts & Sciences.
  41. ^Corera, Gordon (2009).Shopping for bombs : nuclear proliferation, global insecurity, and the rise and fall of the A.Q. Khan network. Oxford University Press.ISBN 978-0-19-537523-7.OCLC 461245874.
  42. ^START Center, University of Maryland; MacCalman, Molly (March 2016)."A.Q. Khan Nuclear Smuggling Network".Journal of Strategic Security.9 (1):104–118.doi:10.5038/1944-0472.9.1.1506.ISSN 1944-0464.S2CID 147883571.
  43. ^Kevin Dougherty (February 6, 2010)."Belgian base breach sparks nuclear worries".Stars and Stripes.
  44. ^Tara Patel (December 16, 2011)."Breaches at N-plants heighten France's debate over reactors".Seattle Times.
  45. ^"Building a Cyber Secure Plant". Siemens. 30 September 2010. Archived fromthe original on 21 April 2021. Retrieved5 December 2010.
  46. ^Robert McMillan (16 September 2010)."Siemens: Stuxnet worm hit industrial systems". Computerworld. Archived fromthe original on 25 May 2012. Retrieved16 September 2010.
  47. ^"Last-minute paper: An indepth look into Stuxnet". Virus Bulletin.
  48. ^"Stuxnet worm hits Iran nuclear plant staff computers". BBC News. 26 September 2010.
  49. ^"Stuxnet Virus Targets and Spread Revealed". BBC News. 15 February 2011. Retrieved17 February 2011.
  50. ^Steven Cherry; with Ralph Langner (13 October 2010)."How Stuxnet Is Rewriting the Cyberterrorism Playbook".IEEE Spectrum. Archived fromthe original on October 17, 2010.
  51. ^Beaumont, Claudine (23 September 2010)."Stuxnet virus: worm 'could be aimed at high-profile Iranian targets'". London: The Daily Telegraph. Retrieved28 September 2010.
  52. ^MacLean, William (24 September 2010)."UPDATE 2-Cyber attack appears to target Iran-tech firms".Reuters.
  53. ^ComputerWorld (14 September 2010)."Siemens: Stuxnet worm hit industrial systems". Computerworld. Archived fromthe original on 15 December 2013. Retrieved3 October 2010.
  54. ^"Iran Confirms Stuxnet Worm Halted Centrifuges".CBS News. 29 November 2010.
  55. ^Ethan Bronner & William J. Broad (29 September 2010)."In a Computer Worm, a Possible Biblical Clue".The New York Times. Retrieved2 October 2010."Software smart bomb fired at Iranian nuclear plant: Experts". Economictimes.indiatimes.com. 24 September 2010. Retrieved28 September 2010.
  56. ^"Kaspersky Lab provides its insights on Stuxnet worm".Kaspersky. Russia. 24 September 2010.
  57. ^"Mouse click could plunge city into darkness, experts say",CNN, September 27, 2007. Source:http://www.cnn.com/2007/US/09/27/power.at.risk/index.html
  58. ^"Hacking of South Korean Nuclear Reactors Poses No Danger".Forbes.
  59. ^Gibbs, Samuel (2017-12-15)."Triton: hackers take out safety systems in 'watershed' attack on energy plant".The Guardian.ISSN 0261-3077. Retrieved2017-12-16.
  60. ^abDeclan Butler (21 April 2011)."Reactors, residents and risk".Nature.472 (7344):400–401.doi:10.1038/472400a.PMID 21525903.S2CID 4371109.
  61. ^Daniel E Whitney (2003)."Normal Accidents by Charles Perrow"(PDF).Massachusetts Institute of Technology.
  62. ^Amory B. Lovins and L. Hunter Lovins. "Terrorism and Brittle Technology" inTechnology and the Future by Albert H. Teich, Ninth edition, Thomson, 2003, p. 169.

External links

[edit]
Science
Fuel
Neutron
Power
Medicine
Imaging
Therapy
Processing
Weapons
Topics
Lists
Waste
Products
Disposal
Debate
Light water
Heavy water
bycoolant
D2O
H2O
Organic
CO2
Water (LWGR)
H2O
Gas
CO2
He
Molten-salt
Fluorides
Generation IV
Others
Magnetic
Inertial
Other
Lists of
disasters
and
incidents
Individual
accidents
and sites
Related
topics
Nuclear whistleblowers
General
Asia
Europe
North America
Oceania
Retrieved from "https://en.wikipedia.org/w/index.php?title=Vulnerability_of_nuclear_facilities_to_attack&oldid=1319504078"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp