U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

EVALUATING THE VULNERABILITY AND DETECTION PROBABILITY OF DETECTION MECHANISMS

NCJ Number
59826
Journal
NUCLEAR MATERIAL MANAGEMENT Volume: 6 Issue: 3 Dated: (FALL 1977) Pages: 601-610
Author(s)
J E GLANCY; C S POLICHAR; T GOZANI; A UNIONE
Date Published
1977
Length
8 pages
Annotation
A PROCEDURAL FRAMEWORK FOR EVALUATING THE PERFORMANCE OF DETECTION MECHANISMS IN PROTECTING AGAINST THEFT OR SABOTAGE OF NUCLEAR MATERIALS IS PRESENTED IN THIS REPORT FROM THE PROCEEDINGS OF AN ANNUAL CONFERENCE.
Abstract
THE FIRST STEP IN DETERMINING THE EFFECTIVENESS OF A DETECTION MECHANISM IS TO BREAK THE MECHANISM INTO ITS FUNCTIONAL ELEMENTS. FOR IDENTITY/ACCESS AUTHORIZATION (I/AA) SYSTEMS, THIS BREAKDOWN IS IN THE FORM OF A CLOSED LOOP STARTING WITH THE FIELD OF VIEW AND ENDING WITH THE PORTAL CONTROL DEVICE, USUALLY SOME FORM OF REMOTELY OPERATED DOOR STRIKE. SUCH A BREAKDOWN OF FUNCTIONAL ELEMENTS IS DEPICTED. EACH INDIVIDUAL ELEMENT IS THEN TESTED TO DETERMINE IF TAMPERING OR COMPLETE CIRCUMVENTION IS CREDIBLE (THE TACTICS FOR DEFEATING EACH FUNCTIONAL ELEMENT OF THE I/AA MECHANISM ARE LISTED). THIS VULNERABILITY ANALYSIS STEP, A KEY FACTOR IN THE OPERATION OF MOST I/AA SYSTEMS, IS QUALITATIVE, AND THE RESULT IS TO SET THE DETECTION PROBABILITY EQUAL TO ZERO IF A VULNERABILITY IS DISCOVERED. IF NO CLEAR VULNERABILITY EXISTS, A PROBABILITY ANALYSIS SHOULD BE PERFORMED. IF THE SYSTEM IS WELL-CHARACTERIZED MATHEMATICALLY, IT CAN BE MODELED AND THE DETECTION PROBABILITY CALCULATED. IF THE SYSTEM IS NOT WELL-CHARACTERIZED, IT CAN BE STUDIED EXPERIMENTALLY, AND THE DETECTION PROBABILITY CAN BE MEASURED. AS A FURTHER TEST OF THIS PROCEDURAL FRAMEWORK, THREE OTHER DETECTION MECHANISMS ARE EVALUATED: A (SPECIAL NUCLEAR MATERIAL) PORTAL MONITOR, AN INTERNAL INTRUSION DEVICE, AND A MATERIAL BALANCE ACCOUNTING SYSTEM. IN ALL THREE EXAMPLES, MODELING THE MECHANISMS AIDED THE PREPARATION OF A LIST OF TACTICS TO EXPLOIT VULNERABILITIES. TABLES AND REFERENCES ARE INCLUDED. (WJR)