
Contents
-
-
-
-
-
-
-
-
-
-
Introduction Introduction
-
Illustrative Cases Illustrative Cases
-
Theft of Highly Enriched Uranium, Russia, 1992 Theft of Highly Enriched Uranium, Russia, 1992
-
Explosives on Reactor Pressure Vessels, South Africa, 1982 Explosives on Reactor Pressure Vessels, South Africa, 1982
-
Shooting of Guards, India, 2014 Shooting of Guards, India, 2014
-
Destruction of a Reactor’s Turbine, Belgium, 2014 Destruction of a Reactor’s Turbine, Belgium, 2014
-
-
Categories of Insiders Categories of Insiders
-
Insider Motivations Insider Motivations
-
Nuclear Terrorism and Insider Threats Nuclear Terrorism and Insider Threats
-
Challenges of Mitigating the Insider Threat Challenges of Mitigating the Insider Threat
-
International Action on Mitigating the Insider Threat International Action on Mitigating the Insider Threat
-
Good Practices at Nuclear Organizations Good Practices at Nuclear Organizations
-
Focusing the Organization on Insider Threats Focusing the Organization on Insider Threats
-
Screening and Monitoring Staff Screening and Monitoring Staff
-
Training and Motivating Staff Training and Motivating Staff
-
Controlling, Monitoring, and Accounting for Protected Material and Areas Controlling, Monitoring, and Accounting for Protected Material and Areas
-
Conducting Investigations Conducting Investigations
-
Minimizing Opportunities for Insider Adversaries to Succeed Minimizing Opportunities for Insider Adversaries to Succeed
-
Assessment, Testing, and Learning Assessment, Testing, and Learning
-
-
Conclusion Conclusion
-
Notes Notes
-
Suggested Reading Suggested Reading
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
7 Insider Threats to Nuclear Security
Get accessMatthew Bunn is the James R. Schlesinger Professor of the Practice of Energy, National Security, and Foreign Policy in the Harvard Kennedy School at Harvard University.
-
Published:20 June 2023
Cite
Abstract
Threats from insiders—individuals with authorized access to protected locations, materials, and information—represent the most serious threats to nuclear organizations around the world. Insider threats are rare but can be devastating. Nearly all the cases of nuclear theft in which the circumstances of the theft are known were perpetrated either by insiders or with the help of insiders, as were nearly all the known cases of sabotage of nuclear facilities. Insiders pose substantial threats because they have access inside many of the layers of an organization’s security; they may understand the security system and its vulnerabilities; they are able to plan, collect intelligence from inside the facility, and recruit for months at a time; and they are known and trusted individuals, which often makes the organization slow to detect and react to possible indicators of a threat. The chapter describes several illustrative cases of devastating insider threats, outlines the categories of insider actions and motivations, and describes some of the organizational challenges of mitigating the threat. The chapter also highlights how nuclear organizations must find ways to protect against insider threats while building internal trust and cooperation needed for their success. It discusses some of the recent steps the international community has taken to address the insider issue, as well as the good practices organizations are already implementing.
Sign in
Personal account
- Sign in with email/username & password
- Get email alerts
- Save searches
- Purchase content
- Activate your purchase/trial code
- Add your ORCID iD
Purchase
Our books are available by subscription or purchase to libraries and institutions.
Purchasing informationMonth: | Total Views: |
---|---|
June 2023 | 11 |
July 2023 | 2 |
August 2023 | 6 |
September 2023 | 9 |
October 2023 | 8 |
November 2023 | 6 |
December 2023 | 1 |
February 2024 | 11 |
March 2024 | 6 |
April 2024 | 8 |
May 2024 | 7 |
June 2024 | 8 |
July 2024 | 8 |
August 2024 | 6 |
September 2024 | 5 |
October 2024 | 4 |
November 2024 | 13 |
December 2024 | 11 |
January 2025 | 7 |
February 2025 | 4 |
March 2025 | 7 |
April 2025 | 6 |
Get help with access
Institutional access
Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:
IP based access
Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.
Sign in through your institution
Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.
If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.
Sign in with a library card
Enter your library card number to sign in. If you cannot sign in, please contact your librarian.
Society Members
Society member access to a journal is achieved in one of the following ways:
Sign in through society site
Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:
If you do not have a society account or have forgotten your username or password, please contact your society.
Sign in using a personal account
Some societies use Oxford Academic personal accounts to provide access to their members. See below.
Personal account
A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.
Some societies use Oxford Academic personal accounts to provide access to their members.
Viewing your signed in accounts
Click the account icon in the top right to:
Signed in but can't access content
Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.
Institutional account management
For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.