Nuclear Power

Rigorous Security Regulation

Security Issues & Policies

Since September 11, 2001 the nuclear energy community has lived on high alert, continuously upgrading staff, their training and security tools to protect the nuclear power plant infrastructure and ensure operational stability in the event of an attack. But like any utility, the balance of security tools, trained personnel and costs impact operational budgets.  Having tools that perform multiple security tasks or roles can save costs and improve security operation’s efficiency. Quantum’s seismic-acoustic solutions provide real-time awareness of pedestrian, vehicle, digging and gunshot activity around critical assets.

Interested in seeing our technology in action? View Demo Video

Security Applications for Nuclear Power

  • Land Approach
    • Plant Security
    • On/Off Property Monitoring
    • Railway Monitoring
  • Water Approach
    • Rivers and Tributaries Boat Monitoring
    • Beach Landings 
  • Light Aircraft Approach
    • Helicopter Monitoring
    • Ultralight Monitoring
nuclear power station physical security

3600 Situational Awareness

Most nuclear power plants have cleared Line-Of-Site for about 100 meters to the perimeter fence.  In cases where that clearing meets forested areas, rough or undulating terrain or wide open waterfront areas, sensing unseen movement outside that area can buy increased awareness and significant time to adequately respond.  A seismic-acoustic sensor is easily hidden and can detect that movement long before the intruder reaches the LOS perimeter. 

Quantum’s Vector Series addresses some of the key challenges of protecting Nuclear Plants:  

  • Integrate alerts to LOS devices like remote cameras or UAVs to drive operational efficiencies to investigate validated intrusions – strengthening the defense-in-depth posture  
  • Better understanding of the type of threat on the perimeter gives more information to the reaction teams to understand what threat they are facing
  • Clandestine installation keeps a low profile and makes the security system hard to detect.  
  • Cost effective security for hardening the perimeter for CIP/NEI compliance
  • Configurable as a perimeter to surround an asset or detection of movement in key choke points
  • – Develop pattern of life around an asset and detect anomalies to alert to abnormal activity