Vulnerability Assessment of Nuclear Security Systems in Kenya

vulnerability assessment of nuclear security n.w
1 / 13
Embed
Share

This International Conference on Nuclear Security in Kenya discusses the importance of vulnerability assessments in achieving design-based mitigation of security threats. The overview of nuclear security systems in Kenya, potential targets and threats, vulnerability assessment by competent authorities, and recommendations are explored. The legal and regulatory framework, including the transition from the Radiation Protection Act to the Nuclear Regulatory Act, is also highlighted. The presence of over 4,000 radioactive materials in use across various sectors underscores the critical need for robust security measures in Kenya's nuclear industry.

  • Nuclear Security
  • Vulnerability Assessment
  • Kenya
  • International Conference
  • Regulatory Authority

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Vulnerability Assessment of Nuclear Security Systems in Kenya International Conference on Nuclear Security, 10 14 Mercy Muriithi & Isaac Mundia Kenya Nuclear Regulatory Authority February 2020 International Conference on Nuclear Security

  2. Contents Why vulnerability assessment? Overview of Nuclear Security Systems in Kenya Potential targets and Threats International Conference on Nuclear Security, 10 14 Kenya s Threat profile Vulnerability assessment by the competent authority Recommendations February 2020

  3. Why vulnerability assessment? Vulnerability assessment is an effective process in achieving design- based mitigation of threat. Risk- Likelihood of unacceptable consequence.= Vulnerability x Threat x Asset criticality. International Conference on Nuclear Security, 10 14 Risk= Vulnerability exposed to threat February 2020

  4. Overview of Nuclear Security Systems in Kenya Nuclear and radioactive materials are utilized all sectors of our economy. Number of radioactive materials are in increase due to development currently there are over 4,000 radioactive material in use. socio-economic International Conference on Nuclear Security, 10 14 Health, Mining, Research, Agriculture, Oil and gas exploration, Industry etc. Kenya is also an embarking country. Kenya is a party to CPPNM/A and ICSANT February 2020

  5. Up to December 2019, the legal and regulatory framework security was based on the Radiation Protection Act Cap 243 Nuclear Security Systems in Kenya for nuclear It established Radiation Protection Board as the competent authority. International Conference on Nuclear Security, 10 14 Radiation Protection Act Cap 243 was repealed by the Nuclear Regulatory Act 2019. The new Act transforms RPB to Kenya Nuclear Regulatory Authority. The previous act did not exhaustively provide necessary security February 2020 provisions for

  6. Nuclear Security Systems in Kenya, cont d There is a national nuclear security coordinating mechanism Kenya Nuclear Security Coordination Centre (KNSCC) It comprises 18 Government agencies. International Conference on Nuclear Security, 10 14 The competent authority Regional CBRN Secretariat for Eastern & Central Africa February 2020

  7. More 4000 radioactive materials are in use in Kenya Potential Targets and threats Several Category I and II sources Large number of portable RMs There is also a Central Radioactive Waste Processing Facility holding category I and II disused RMs International Conference on Nuclear Security, 10 14 Kenya has a designated POC for IAEA-ITDB, and has reported several cases through this forum. Including: Unauthorized trade (2 Cases) Unauthorized Movement (1 Case) Theft (2 Cases) Unauthorized Possession (3 Cases) Discovery (1 Case) and Scam/Fraud (4 Cases) February 2020

  8. There have been several terrorist attacks in Kenya. Kenya s Threat Profile Attacks have been carried out by well known terrorist groups such as Al Qaeda and Al Shabaab. International Conference on Nuclear Security, 10 14 The groups have large source of funding and trained paramilitary personnel. It is purported that some of these adversaries have been actively pursuing nuclear/radioactive material which they could use to make INDs or RDD. Other adversaries include criminal gangs, separatist movements and politically aligned networks. February 2020

  9. Kenyas Threat Profile International Conference on Nuclear Security, 10 14 February 2020

  10. Physical Protection Systems in place Kenya has benefited from various physical security upgrade initiatives. Global (GTRI)at CRWPF Threat Reduction Initiative International Conference on Nuclear Security, 10 14 Mega Ports Initiative (MPI) at Port Kilindini February 2020

  11. Vulnerability Assessment The competent authority periodically conducts vulnerability assessment of key facilities This regulatory requirements includes compliance with the International Conference on Nuclear Security, 10 14 Both Performance based and prescriptive inspections are done. Evaluation of procedures, access control systems, intrusion detection systems, identification systems, elements among other February 2020

  12. Recommendations by the authority Conducting assessment and design basis threat, periodically reviewing and updating it comprehensive threat Continuous testing and force on force exercises on the physical barriers to identify areas of weakness. International Conference on Nuclear Security, 10 14 Continuous training and capacity building Comprehensive NMAC Cooperation among stakeholders Adapting LINAC instead of teletherapy units alternate technologies e.g. February 2020

  13. International Conference on Nuclear Security, 10 14 THANK YOU SHUKRANI February 2020

Related


More Related Content