Publications

4 Results

Search results

Jump to search filters

Vulnerability assessment using two complementary analysis tools

Paulus, W.K.

To analyze the vulnerability of nuclear materials to theft or sabotage, Department of Energy facilities have been using, since 1989, a computer program called ASSESS, Analytic System and Software for Evaluation of Safeguards and Security. During the past year Sandia National Laboratories has began using an additional program, SEES, Security Exercise Evaluation Simulation, enhancing the picture of vulnerability beyond what either program achieves alone. ASSESS analyzes all possible paths of attack on a target and, assuming that an attack occurs, ranks them by the probability that a response force of adequate size can interrupt the attack before theft or sabotage is accomplished. A Neutralization module pits, collectively, a security force against the interrupted adversary force in a fire fight and calculates the probability that the adversaries are defeated. SEES examines a single scenario and simulates in detail the interactions among all combatants. Its output includes shots fired between shooter and target, and the hits and kills. Whereas ASSESS gives breadth of analysis, expressed statistically and performed relatively quickly, SEES adds depth of detail, modeling tactical behavior. ASSESS finds scenarios that exploit the greatest weaknesses of a facility. SEES explores these scenarios to demonstrate in detail how various tactics to nullify the attack might work out. Without ASSESS to find the facility weaknesses, it is difficult to focus SEES objectively on scenarios worth analyzing. Without SEES to simulate the details of response vs. adversary interaction, it is not possible to test tactical assumptions and hypotheses. Using both programs together, vulnerability analyses achieve both breadth and depth.

More Details

Vulnerability assessment using two complementary analysis tools

Paulus, W.K.

To analyze the vulnerability of nuclear materials to theft or sabotage, Department of Energy facilities have been using, since 1989, a computer program called ASSESS, Analytic System and Software for Evaluation of Safeguards and Security. During the past year Sandia National Laboratories has begun using an additional program, SEES, Security Exercise Evaluation Simulation, enhancing the picture of vulnerability beyond what either program achieves alone. Assess analyzes all possible paths of attack on a target and, assuming that an attack occurs, ranks them by the probability that a response force of adequate size can interrupt the attack before theft or sabotage is accomplished. A Neutralization module pits, collectively, a security force against the interrupted adversary force in a fire fight and calculates the probability that the adversaries are defeated. SEES examines a single scenario and simulates in detail the interactions among all combatants. its output includes shots fired between shooter and target, and the hits and kills. Whereas ASSESS gives breadth of analysis, expressed statistically and performed relatively quickly, SEES adds depth of detail, modeling tactical behavior. ASSESS finds scenarios that exploit the greatest weakness of a facility. SEES explores these scenarios to demonstrate in detail how various tactics to nullify the attack might work out. Without ASSESS to find the facility weakness, it is difficult to focus SEES objectively on scenarios worth analyzing. Without SEES to simulate the details of response vs. adversary interaction, it is not possible to test tactical assumptions and hypotheses. Using both programs together, vulnerability analyses achieve both breadth and depth.

More Details

An improved user interface for ASSESS/Neutralization

Paulus, W.K.

The ASSESS Neutralization Analysis module (Neutralization) is part of Analytic System and Software for Evaluation of Safeguards and Security, ASSESS, a vulnerability assessment tool. Neutralization models a fire fight engagement between security inspectors (SIs) and adversaries. Since version 1.0 of Neutralization was released in 1989, experience has shown that several features of the user interface should be improved. This report describes the improvements that have been implemented, which simplify operation by consolidating all capabilities under a single mode of operation, remove many restrictions on editing, and concentrate more information into fewer types of printed reports. Every adversary and SI combatant is named and described individually. Time to communicate orders is specified for each SI combatant. Adversaries and SIs can be reinforced. SI posting as well deployment destination is labeled. Scenario details can be revised without losing all completed event information. New on-screen summaries spell out characteristics, minimizing abbreviations. Neutralization will read files created by the previous version and permit the user to enter the additional labels supported in the new version. As described here, Neutralization now has an interface that handles more information, but is easier and faster to use.

More Details

The ASSESS Neutralization Analysis module

Paulus, W.K.

The ASSESS Neutralization Analysis module (Neutralization) is part of Analytic System and Software for Evaluation of Safeguards and Security, ASSESS, a vulnerability assessment tool. Neutralization models a fire fight engagement security inspectors (SIs) and adversaries. Results are based on probability of neutralization, P(N), which estimates the likelihood that SIs will win, given that SIs interrupt the attackers and begin an armed engagement. The calculating engine of the module is the Brief Adversary Threat Loss Estimator, BATLE. Engagements can have as many as thirty combatants on a side. Reinforcements may be introduced or combatant characteristics may be changed as many as ten times in one engagement. Inputs may be made with or without programmed guidance to the user. Combatant characteristics come from a modifiable library. Seven different characteristics can be independently specified for each combatant. Graphs of time distributions and studies of the sensitivity of P(N) to any combatant characteristic of either SIs or adversaries can be requested. Output files from Neutralization are used by Outsider Analysis to produce probability of security system win. 4 refs., 12 figs., 2 tabs.

More Details
4 Results
4 Results