NRC Probes Indian Point Security
By Roger Witherspoon
The Nuclear Regulatory Commission is investigating possibly major lapses in security at the Indian Point nuclear power plants, including the prospect that criminal elements are using parts of the plants’ emergency drills for their own terrorist training.
Records show that for more than a decade, officials at Indian Point have largely ignored instances where their internal security communications system was compromised and blocked by outside individuals. Whether the deliberate jamming of security communications is a decade-long prank or the result of individuals or groups using Indian Point safety drills as opportunities to test their own ability to cause mayhem during a terrorist attack is not known.
But the fact that deliberate jamming by “an individual or group of individuals” was first reported in 2003 by James Lee Witt in his analysis of emergency planning on behalf of the State of New York and has continued intermittently to the point where it forced the cancellation of emergency drills in November 2012 has prompted an investigation by the NRC.
Indeed, those who have hacked into Indian point’s security have lately become so brazen that they have recorded instructions made by plant security officials at the beginning of drills, and then jammed the network’s receivers by replaying those instructions over and over, according to participants, thus blocking any further use of the compromised security network. And the electronic intruders were apparently operating within a mile or two of the plant site.
The latest allegations were the most potentially explosive in a series of failures outlined by two former security officers – Lt. Skip Travis and Lt. Jason Hettler – in a suit filed in U.S. District Court in August against Entergy Nuclear , which owns the twin Indian Point plants in Westchester County some 25 miles from Manhattan. A spokesman for Entergy declined to discuss the subject.
There is no evidence in the public NRC record that there have been any problems with security operations or drills at the plant site in bucolic Buchanan, along the banks of the Hudson River about 10 miles south of West Point. The agency’s January, 2013 evaluation of Indian Point 2 and 3 gave the plants “green” or top ratings in every category, including security. ( http://www.nrc.gov/NRR/OVERSIGHT/ASSESS/pim_summary.html )
Indeed, despite a litany of complaints against the security operation at the plant, the NRC has noted but done little about problems delineated in the suit, including:
The falsification of work logs and fitness for duty reports, thus allowing security personnel to exceed the maximum permitted work hours per week despite being fatigued.
Jeopardizing the effectiveness of Force on Force drills by informing the security personnel of what routes the “invaders” would take to attack the plant.
A faulty perimeter detection system, which made it impossible for defenders to know where “terrorists” were breaking into the plant site and where they were on the grounds. As a result of being technologically blind during a drill monitored by the NRC on October 11, 2011, the suit states “all of the ‘terrorists’ successfully breached the perimeter and the identified target sets located inside of Indian Point and succeeded in causing a total nuclear meltdown. Not one terrorist was killed by any security personnel during the drill.”
A combination of faulty detection equipment and internal communications allowed “terrorists” to succeed in in reaching all of their targets in an NRC-monitored, Force on Force drill in April, 2013. Hettler and Travis contend that had the April drill “been an actual terrorist attack, the 20 million individuals who live and work in the 50-mile radius meltdown zone would have perished.”
An absence of backup power for the internal communications system. As a result, the security force could not communicate during station blackout conditions.
Agency spokesman Neil Sheehan said in an email note that “the NRC is aware of the issues raised in the filing. The agency is evaluating all of the plant safety and security issues described in the lawsuit that are under our jurisdiction. The NRC has an extensive plant oversight program to ensure that facility’s owner adequately adheres to federal safety and security requirements.”
Ever since the 9/11 terrorist attacks the NRC has had strict rules regarding what is public and what is considered “safeguard” information that cannot be released. According to the official 9/11 Report, Indian Point was scouted and selected as a backup target to the twin towers of the World Trade Center, whose upper floors may have been obscured had the region been blanketed with rain or fog. The Hudson River Flyway serving the region’s airports, on the other hand, begins just 500 feet above the water. The twin domes of Indian Point, jutting more than 300 feet in the air in the middle of a bend in the river, would be hard to miss even in bad weather.
Security issues in general and cyber security in particular are subjects that are not discussed with the public by NRC officials. Sheehan added, however, that “I would just note that part of our Reactor Oversight Process involves cyber security reviews. Via those reviews, we would be able to follow up on any earlier problems, including a company’s root cause evaluation of an issue.”
He could not, however, comment on whether or not the FBI or any other federal law enforcement or security agency had been consulted about the issues raised at Indian Point. A spokeswoman for the FBI said the agency does not confirm or deny participation in any investigations.
There has never been public acknowledgement of any NRC probe into the jamming revealed by the 2003 Witt Report ( http://bit.ly/gQjdK3 ) . There was widespread criticism at the time of Entergy’s response that the jamming was irrelevant because the leaders of the radiation detection teams had a roll of quarters and could find pay phones to call in their findings. That low tech work-around is no longer available.
Andrew Spano, who was the Westchester County Executive at the time, said in an interview this week that “Entergy has always handled these drills as if they were just something the company had to do. I don’t think they ever took them seriously. I’m not surprised at their current equipment problems. You can never underestimate either incompetency or equipment failure.”
The most extensively documented evidence of jamming disrupted a three-day drill held November, 2012 and monitored by NRC security evaluators. Part of the problem, recalled Hettler and Travis during a lengthy interview, lay in the fact that Entergy devises the scenario for the “surprise attacks” and the NRC monitors how well the teams react to the script as it unfolds. Under NRC rules, the participants are not to have any advance knowledge of the script, including where the attackers will break in, how many there are, or what their targets are.
“The drill was messed up from the start,” said Travis. “The operators had the script with all of the events, and they kept jumping the gun and getting ahead of the script by sending us to defend an area before the ‘attack’ had occurred. We had to start over three times.”
It was during the fourth try at defending Indian Point from an invading team of terrorists that the jamming began. “Someone was going over the frequency and playing back the drill sergeant’s voice,” said Travis. “Someone had recorded our earlier conversations and was playing the traffic back on our frequency. They halted the drill and did radio checks, thinking someone on the post was playing fictitious voices over the radio.
“But someone taped those checks and then played it back, jamming us again. Obviously the person was hearing our entire drill in real time and knew everything that was happening. They looked at the electronic identifier of the incoming signal, and could not identify it. It was not coming from anyone on the base. So we cancelled the drill.”
This wasn’t the first time signals had been jammed. It has occurred frequently enough that Entergy security officials have their own name for it: “spoofing.”
The problem lay with the antiquated equipment used by the security teams. “I have been on many shifts where there was jamming,” explained Travis, a 25-year security veteran and a crew leader at Indian Point. “You can’t tell anyone where to move because the system is jammed. Our consoles were not the type where you could hit a button and override the incoming signal. The radio communications in our bay stations are the originals that were installed when they built the plants 40 years ago.
“As a result, whoever is on the air owns the airwaves. If an individual opens his mike and tapes it open he owns the frequency till the battery goes dead. You can’t cut in. You can’t cut him off.”
Entergy updated some of the communications equipment towards the end of 2012, added Hettler. “But we continued to have bleeding, where one radio’s frequency bleeds over into another frequency. As a result, anyone with a 1,000 Megahertz Jammer – the kind you can buy publicly – can drown out all of the security frequencies at Indian Point. And you don’t even have to be onsite to do it.”
The problem of outside jamming is compounded by the failure of the plant site’s ARINCS detection system, the former security officers said.
“Within the first 15 minutes of going ‘hot’ the system crashed 14 times,” said Travis, “and it has been a failed system since that first night. It crashes whenever there is inclement weather – it’s a nonstop problem with respect to that.”
In their suit, the two security officers state that “between February 2011 and May 2013, ARINCS has had tens of thousands of ‘total failures’ wherein the ARINCS computer system froze, surveillance cameras froze, alarms failed to detect movement on the perimeter fence, alarms failed to sound, etc. and ARINCS continues to fail on a regular basis presently.”
The combination leaves security guards at Indian Point effectively deaf and blind.
Phil Musegaas, program director for Riverkeeper, an environmental group seeking to close the twin reactors, said Entergy’s tolerance of continued jamming is a serious issue that needs to be immediately addressed.
“It’s appalling,” Musegaas said. “This is a situation where you should assume the worst and get to the bottom of it as quickly as possible when you consider the stakes we are dealing with.
“In any other industry, if there were similar problems in their critical infrastructure, the plant would be shut down and an independent investigation would be conducted and they wouldn’t be allowed to operate until their security was proven to be effective. At this point, what is going on there sounds like a laughable situation.
“It would be laughable if it weren’t so serious and so dangerous.”
#911 #nuclearsafety #PhillipMusegaas #NuclearRegulatoryCommission #nuclearsafetydrill #Entergy #terroristattack #security #nuclearplantdefenses #hacking #JasonHettler #nuclearcatastrophe #radiojamming #AndrewSpano #terrorism #SkipTravis #ForceonForcedrill #IndianPoint #emergencyevacuationplanning #IndianPointnuclearpowerstation #JamesLeeWitt #NRC #radiologicalemergencydrill #WittReport