Using Fully Automated Combat Simulation
to Support Security by Design

Year
2023
Author(s)
Dan McCorquodale - RhinoCorps Ltd. Co
Matthew Talbot - RhinoCorps Ltd. Co
File Attachment
Abstract
Modeling and simulation tools are used extensively to support design and operational decisions at nuclear facilities across many domains. RhinoCorps provides support for vulnerability assessments using a fully automated combat simulation primarily at these types of facilities. The robust human model that is the core part of the Simajin/Vanguard software provides a set of innate abilities that allows analysts to rapidly model attack scenarios, defense strategies, and define highly detailed three-dimensional models of facilities and terrain. Using a Monte Carlo simulation approach analysts can explore a wide range of outcomes to evaluate the effectiveness of a physical protection system for nuclear or other high value facilities. This software has been used extensively for the last fifteen years to support vulnerability assessments at dozens of government sites and commercial sites throughout the United States and internationally. The use of Simajin/Vanguard has supported “Security by Design” for multiple organizations helping to inform construction requirements, defensive features, force size and composition, and other elements that support the physical protection system prior to construction of the facility. Although most of this support was for expansion/transition of government facilities it has also been employed in the commercial sector for at least one small modular reactor. This approach has provided large savings in time and money by incorporating a security mindset early in the design and construction process. This paper provides a roadmap for applying combat modeling and simulation tools for new plant designers as well as existing plants considering major changes in their facility. The roadmap identifies key challenges likely to be encountered when a real plant with a real protective force does not exist, as well as an approach to overcoming those challenges. The roadmap and underlying processes are iterative and support an evaluation of security during conceptual design, detailed design, construction, and operational phases of the facility. Included in the process are strong fundamental approaches to accreditation as each iterative step occurs, which is particularly important as many key performance measurements will be unavailable in the early stages.