EXCEL assists in the design, testing, and validation of the various systems and programs that make up the physical security components of the client’s facility and operation. EXCEL can support the client from conceptual stages of design, through operation of the facility in a safe mode, through decommissioning, and can provide regulatory support based on the government agencies requirements of oversight.
Reducing Regulatory Burden: From defensive positions and armed responders to selected systems, a revised protective strategy can achieve both: (a) equal or higher effectiveness and (b) reduced cost in daily operations. Many of these modifications have been effected under 10 CFR 50.54(p) or other regulatory schemes, consistent with EXCEL’s regulatory analysis and familiarity with the international regulators’ review process.
Mock security inspections: Includes reviews of specific areas or whole plant security programs, including mock inspections to identify vulnerabilities, deficiencies, and areas for improvement. Records of past performance, equipment maintenance, security officer training, and other matters that impact the overall performance of the training program can be included. EXCEL consultants have extensive experience as inspectors in commercial and government security sectors, including U.S. and international sectors.
Blast Effects: EXCEL conducts blast effects of existing structures and/or proposed buildings based on the Single-degree-of-freedom Blast Effects Design Spreadsheet (SBEDS). This is particularly important whenever new regulatory requirements or construction modifications indicate the need to move the vehicle barrier system components, including at decommissioning plants.
Target Set Analysis: Proper target set analysis and formulation is critical to the development of a protective strategy and the physical security plan. EXCEL uses systems engineers with PRA experience and familiarity with the needs of the security program, teamed with senior security analysts to create new and/or review existing target sets.
Regulatory/Enforcement Advice: Advising the client on compliance issues concerning development of the security program, including support for issues regarding compliance of the implemented security program. Provided by EXCEL consultants with expertise in the code appropriate to the specific critical infrastructure sector.
Force-on-Force Preparation and Training: Includes review of site’s process for target set analysis, development of viable scenarios, force-on-force preparation and training, controller training, and exercise evaluation and follow up. Review also includes organizational support and/or leadership in these areas, and continuing presence and support during regulatory inspections if requested. Vulnerability assessments of target sets and real-time validation of protective strategy during tabletops and drills will be added at client’s request.
Efficiency/Effectiveness Reviews: Providing the expected level of security can be accomplished with a combination of personnel, equipment, and procedures. At some facilities, due to regulatory or other pressures, the operator may apply a combination of these three components in a more efficient manner. EXCEL has performed optimization studies to reduce the overall cost of security, frequently using advanced technologies to replace security officers on post, and redesigned the security programs at critical infrastructure facilities to raise efficiency and lower cost.
Compliance Verification and Validation Studies: EXCEL merges its experience as nuclear regulatory inspectors, license reviewers, and experience in the broader field of national security to assess compliance with regulatory requirements. This service is tailored to meet the specific needs of the licensee, and will incorporate EXCEL’s experience as members of NEI Task Forces on new regulation.
Vulnerability Assessments: These assessments evaluate and quantify the risk and vulnerability of the facility to a specified threat. Included in this effort would be a preliminary review of the facility, inspection of the installation/implementation of security components, review of procedures, recommendation on areas for improvement, and virtual testing of the program.