international response training vehicle-borne explosive device. section one: introduction ......
Post on 28-Apr-2018
215 Views
Preview:
TRANSCRIPT
3
Table of Contents
Acronyms .......................................................................................................................................... 4
Section One: Introduction ……………………………………………………………………………………………………… .... 5
Module One: Course Overview ......................................................................................................... 5
Module Two: Office of Radiological Security...………………………………………………………………..……… .... 8
Section Two: Preparation ……………………………………………………………………………………………………… ... 14
Module Three: Radiation Hazards for Security Responders ........................................................... 14
Checks on Learning Items …............................................................................................................ 23
Module Four: The Threat ................................................................................................................ 24
Module Five: Physical Protection Systems and Timelines ………………………………………………….. ...... 37
Checks on Learning Items ……………………………………………………………………………………………………… ... 50
Section Three: Contingency Plan ……………………………………………………………………………………………... 51
Module Six: Part One - Target Folder ……….…………………………………………………………………………… ... 51
Checks on Learning ………………………………………………………………………………………………………………….. 63
Module 6: Part Two Site Response Plan ………….………………………………………………………………… ....... 64
Checks on Learning Items ……………………………………………………………………………………………………… ... 75
Glossary ........................................................................................................................................... 80
References ...................................................................................................................................... 81
4
Acronyms
BMS Balanced Magnetic Switch
CAS Central Alarm Station
Ci Curie
Co-60 Cobalt-60
CP Contingency Plan
Cs-137 Cesium-137
GBq Gigabecquerel
GPS Global Positioning System
HEU Highly Enriched Uranium
HRP Human Reliability Program
IAEA International Atomic Energy Agency
IDD In-Device Delay
IED Improvised Explosive Device
Ir-192 Iridium-192
LEU Low-Enriched Uranium
MOU Memorandum of Understanding
ORS Office of Radiological Security
RED Radiological Explosive Device
RDD Radiological Dispersal Device
RMS Remote Monitoring System
SRP Site Response Plan
SSP Site Security Plan
TBq Terabecquerel
TF Target Folder
TTX Tabletop Exercise
VA Vulnerability Assessment
VBIED Vehicle-Borne Explosive Device
Section One: Introduction
Module One: Course Overview
Slide 1
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 2
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
IRTCourse
IntroductionCourseOverview
ORSProgram
PreparationTheThreat
Physical ProtectionSystems
ContingencyPlan
TargetFolder Folder
SiteResponsePlan
1
2
3
Hazards ofRadiation forSecurityResponders
TabletopExercise
6
Slide 3
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 4
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
At the completion of the course, the participant
will be able to:
• Understand the ORS Program;
• Identify radioactive sources of concern;
• Explain Physical Protection and understand
physical protection upgrades;
• Explain protection strategies for security
responders must follow in the event of
radiation exposure/contamination;
• Understand the presence and the nature of
potential threats;
• Understand the elements of a Contingency
Plan, create a Plan for a facility, and evaluate
its effectiveness.
GoalofIRT
• ThisworkshopisdesignedtoassistpartneringCountrieswithestablishingandmaintainingeffectiveresponsecapabilitiesintheeventofanattemptedtheftofradiologicalmaterial.• ResponseTraining• FacilitateStakeholderDiscussions• CollaborativeResponsePlanningActivities• AwarenessforResponders
• HazardsofRadiation• LocationsofSources• Threats• SecuritySystem
IRTCourseObjectives
4
• ExplaintheOfficeofRadiologicalSecurityProgram
• Explainanddiscussthepotentialhazardsofradiationtosecurityresponders
• IdentifytheThreat
• DescribePhysicalProtectionSystemsandhowtheyrelatetoAdversaryTimelines
• ExplainanddraftsitespecificContingencyPlans
• EvaluatetheContingencyPlansinaTabletopExercise
7
Slide 5
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 6
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s)
You will introduce yourself to the class, stating
your name, organization, current position and all
relevant experience. This is designed to allow
each participant to become familiar with, and
understand, the level of expertise available to
the class.
InstructionalMethods
• Presentations
• CaseStudies
• GroupExercises§ TargetFolder§ SiteResponsePlan
§ TabletopExercise§ ScenarioBased
4
8
Slide 7
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Module Two: Office of Radiological Security
Slide 1
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
InternationalResponseTraining
TheOfficeofRadiologicalSecurity
SAND2016-3986TR
9
Slide 2
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 3
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s)
In the wrong hands, sources can pose a severe danger
to the public. In order to secure the public and prevent
an adversary from obtaining materials for malicious
uses, it is necessary to ensure the safeguard of
radioactive materials whether they are located at a
fixed site or present during transportation.
IRTCourse
IntroductionCourseOverview
ORSProgram
PreparationTheThreat
Physical ProtectionSystems
ContingencyPlan
TargetFolder
SiteResponsePlan
1
2
3
Hazards ofRadiation forSecurityResponders
TabletopExercise
10
Slide 4
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
There are four radiological sources of key concern: Cobalt
(Co-60), Cesium (Cs-137), Americium (Am-241), and
Iridium (Ir-192). These sources are used for legitimate
purposes in tele therapy and gamma knife units (cancer
treatment); panoramic irradiation (sterilization); blood
and sterilization irradiators; oil well-logging; and
radiography.
Slide 5
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
The mission of the Office of Radiological Service (ORS)
is to enhance global security by protecting the sources and preventing terrorist acts involving high activity
radioactive materials.
This is accomplished by:
1. Protecting the sources;
11
2. Removing/disposing of disused radioactive
sources;
3. Reducing the reliance on radioactive sources.
Slide 6
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
ORS has partners throughout the world. Some receive
technological assistance and physical protection upgrades
while others engage in collaboration.
Slide 7
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Several processes can be implemented to protect
the material. 1. Detection and alarm equipment and
multi factor access controls; 2. Delays to extend the
time it takes adversaries to access the material; 3.
Methods to provide prompt awareness and
response; and 4. Opportunities for security and
response training.
12
REMOVE:International
• Repatriation§ SupportreturnofU.S.-originlegacysourcesona
case-by-casebasis
§ ORShasrecoveredover60000Ci(approximately3000sources)since2005.
§ SourcesrecoveredfromHighIncomeCountries*arefullyfundedbythatcountry
§ SourcerepatriationisconsistentwithIAEACodeofConductandJointConventionontheSafetyofSpentFuelManagementandoftheSafetyofRadioactiveWasteManagement
• Consolidation§ Supporttheconsolidationofdisusedsourceintoin-
countrysecurestorage
9
ReduceMission
• Seekstoconvertandreplacedevicesthatusradioactivematerialwithnon-radioactivesource-baseddevicesandachievepermanentriskreductionbyreducingthefootprintofrisk-significantradiologicalmaterials.
• Commerciallyavailable,non-isotopicalternativesexistformostofthemajorapplicationsofradioactivematerials(bloodandresearchirradiation,radiotherapy,andindustrialsterilization).
• NNSAconsiderationsforalternativetechnology:
– Non-isotopic(non-radioactive)source-basedalternativetechnologiesthataretechnically,economically,andoperationallyfeasiblefortheuser.
– Seekresearchandindustryengagementifreplacementtechnologiesarenotyetfeasibleasalternatives.
– Mayincludedevicesthatproduceionizingradiation(xrays)orthosethatdon’t(UVpathogenreduction).
– Not“alternateforms”or“lowerrisk/activity”radionuclides.
10
PathogenreductionusingUVlightplusriboflavinhasbeenshowntoreducetheriskfortransfusiontransmittedinfectionsandisanalternativetobloodirradiationbygammasources.
Slide 8
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Removal of sources can be accomplished through
Repatriation- the return of the radioactive material to the
source’s country of origin; and Consolidation- storing the
disused material in a centralized secure location in-
country.
Slide 9
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
To permanently reduce the risk associated with high active
radiological material, countries are replacing the material
with non-radiological source based alternative
technologies. These include devices which produce
ionizing radiation (X-rays) or reduce the UV pathogen.
13
Review
• Needforsecurity
• Sourcesofconcern
• ORSMissionAreas:Protect,Remove,Reduce
10
Slide 10
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
1.The threat of the intentional use of radiological
material is present.
2. There is a need to keep the material secure.
3. Countries must do their part to protect, remove
and reduce the use of radiological material.
14
InternationalResponseTraining
RadiationHazardsforSecurityResponders
SAND2016-3986TR
Section Two: Preparation
Module Three: Radiation Hazards for Security Responders
Slide 1
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 2
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
IRTCourse
IntroductionCourseOverview
ORSProgram
PreparationTheThreat
Physical ProtectionSystems
ContingencyPlan
TargetFolder
SiteResponsePlan
1
2
3
HazardsofRadiationforSecurityResponders
TabletopExercise
15
Slide 3
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 4
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Radiation is energy in motion. Radiation is given off by
different matter in two forms: pure energy or particle radiation.
• Examples pure radiation includes the sun, x-
rays radar, and radio waves.
• Particle radiation is fast‐moving and is
produced by alpha, beta, and neutron particles.
16
Slide 5
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Radiation is very common in our everyday lives.
This chart shows the percentage of radiation which
we are exposed to on a daily basis.
Slide 6
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Radioactivity refers to the particles which are
emitted from nuclei as a result of nuclear instability.
Because the nucleus experiences the intense
conflict between the two strongest forces in nature,
it should not be surprising that there are many
nuclear isotopes which are unstable and emit some
kind of radiation.
Whatisradioactivity?
Aradioactiveisotope(radioisotope)isanatomthathasanunstablenucleusandemitsradiation(suchasgammaraysorxrays)duringitsdecaytoastableatom.
Mostcommonradioisotopesofconcerntousare:
• Cobalt-60(Co-60)
• Cesium-137(Cs-137)
• Iridium-192(Ir-192)
• Americium-241(Am-241)
6
Source:http://upload.wikimedia.org/wikipedia/commons/e/e0/Cobalt-60_Decay_Scheme.svg
Nucleus
17
Slide 7
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
A sealed source is a container of encapsulated radioactive
material. The material is sealed strong enough to prevent
radioactive material from leaking out under conditions of normal
use. Sealed sources do not remove the threat of radioactive
exposure and require safe handling.
Slide 8
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
A source of radiation which is not encapsulated or otherwise
contained. If uncontrolled, an unsealed source can lead to
contamination.
Unsealed sources are utilized in biological research and
medicine. Unsealed sources are concerning as the material can
be readily dispersed.
18
Acute&ChronicDose
9
ACUTEDOSE=
• Significantdoseoverashortperiodoftime
• Concernisdamagetobloodcells,severeskinburns,severeinfections,anddeath.
CHRONICDOSE=
• Smallerdoses(cumulative)overlongerperiodoftime.
• Concernisincreasedincidenceofcancer.
• TypicaldosemeasurementunitistheSievert(Sv)
§ Backgroundradiation:2– 6mSv annually
§ Limitforradiationworker:50mSv annually
Slide 9
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
An acute exposure to radiation occurs over a short period of
time. The dose of radiation exposed to can vary: small dose
from a dental x-ray, or a large dose from a radiological accident.
Acute dose is measured in Grays (Gy).
Chronic radiation exposure is a smaller dose which occurs
over a longer period of time, e.g., continuous exposure or
exposure which occurs off and on over a long period of time.
Chronic dose is measured in Sieverts (Sv).
Slide 10
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Contamination occurs when radiation is released into the
environment and is then ingested, inhaled or deposited
on the body surface.
Exposure occurs when all or part of the body
absorbs
19
the penetrating radiation from an external source.
Exposure also occurs when radiation is ingested,
inhaled or absorbed into the blood stream.
Slide 11
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
General protection strategies will most likely
provide adequate protection from radioactive
material. The risks posed from contaminated
individuals is minimal provided the basic protection
strategies are followed.
Slide 12
___________________________________________
___________________________________________
___________________________________________
___________________________________________
___________________________________________
___________________________________________
___________________________________________
Key Point(s):
Immediately engage in decontamination procedures
if you encounter radioactive material. This includes
all clothing worn, equipment used and a full
decontamination of the body.
20
Slide 13
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Time, distance and shielding measures minimize any
exposure. To avoid undue exposure to radiation,
follow these principles:
• Time: Limit or minimizing the exposure time
reduces the dose from the radiation source.
• Distance: The intensity and the dose of
radiation decreases dramatically as the
distance from the source increases.
• Shielding: Barriers of lead, concrete, or
water provide good protection from
penetrating radiation such as gamma rays
and neutrons.
21
MaximizeDistance
15
• Dosewilldecreaseby1/(distance)2
• Example:Doublingdistancefromaradiationsourcewilldecreasedoseby4.
50mSv/hr at0.5m
12.5mSv/hr at1m
3.12mSv/hr at2m
Slide 14
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Limiting the amount of exposure time dramatically
reduces the risks associated with the radiation dose.
Slide 15
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Increasing the distance from the source will likewise
have a dramatic impact on the exposure to
radiation. Doubling the distance from the source will
decrease the radiation dose by a factor of 4.
22
UseShielding
16
• Useshieldingbetweenyourselfandthesourceifpossible.
• Shieldmaybenearyouornearthesource.
Review
• WhatisRadiation?
• Whatdoesaradioactivesourcelooklike?
• Describeradiationexposureversuscontamination?
• Whataresomeoftheeffectsofradiationexposure?
• Whatcanyoudotoprotectyourselffromradiationintheeventofasecurityevent/attack?
17
Slide 16
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Shielding from a contaminated source should be
between you and the source.
Slide 17
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Protecting yourself from a radiological source is only
one concern. As a law enforcement officer, you
must also be aware of the location of the adversary,
the presence of weapons, information from the
Central Alarm Station and cover vs. concealment.
23
Checks on Learning Items:
What is radiation?
_____________________________________________________________________________________
_____________________________________________________________________________________
What does a radioactive source look like?
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Describe radiation exposure vs. contamination.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
What are some of the effects of radiation exposure?
_____________________________________________________________________________________
What can you do to protect yourself from radiation in the event of a security event/attack?
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
24
Module Four: The Threat
Slide 1
____________________________________________
____________________________________ ________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 2
InternationalResponseTraining
TheThreat
SAND2016-3986TR
IRTCourse
IntroductionCourseOverview
ORSProgram
PreparationTheThreat
Physical ProtectionSystems
ContingencyPlan
TargetFolder
SiteResponsePlan
1
2
3
Hazards ofRadiation forSecurityResponders
TabletopExercise
25
Slide 3
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Threats can include both Outsider threat and Insider
threat.
Terrorists - High level threat
Criminals - Moderate level threat
Insider threats can include an active or passive
motive.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
A terrorist is a person or group of people who use
violence of the threat of violence to further their
political agenda.
Slide 4
26
Terrorists typically operate in small groups for
their own security. They may be part of larger
organizations which may or may not have a cell
structure. They can be highly skilled and well
informed about intelligence and security matters
and difficult for intelligence and law enforcement
agencies to penetrate.
Organizations may be well‐funded and
staffed. As terrorists are considered to be a
high‐level threat, it is expected that they
have the best weaponry of any of the
potential threat groups.
______________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
A criminal is motivated by personal gain. The threat
is reduced if there is no market for the sale or barter
of the material.
The criminal threat will use automatic weapons and
small quantities of explosives-though it is not
anticipated criminals possess sophisticated use of
explosives.
Criminals are not typically willing to die or be
captured.
Slide 5
27
Slide 6
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
An emerging trend is the use of suicide assault
teams (suicide bombers) and teams using multiple
attackers with automatic weapons. This raises a
greater concern for the safety and security of onsite
personnel as well as first responders.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
ISIL/ISIS continue to be a worldwide threat. In 2016,
ISIL/ISIS has been responsible:
70 terrorist attacks in 20 countries
Over 1300 fatalities and 1700 injured
S lide 7
28
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s)
ISIL/ISIS 2016 attacks occurred every 84 hours, with
the greatest casualties in Turkey, Afghanistan and
Pakistan.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 8
Slide 9
29
Slide 10
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
A VBIED loaded with 2,000 kg of ammonium nitrate
fertilizer with fuel oil in front of the Federal Building
in Oklahoma City, OK. 168 people were killed,
including 19 children.
Two anti-government radicals were arrested, tried
and convicted of the terrorist act.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
ISIS planned a terrorist attack at the Tihange Nuclear
Power Plant, 40 miles south-east of Brussels,
Belgium.
Slide 11
30
The plan included the kidnapping and torture of a
plant employee in order to gain access to the
radioactive material.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
The Nuclear Power Plant contained both low
enriched uranium and highly enriched uranium.
Planned to make a dirty bomb to spread the
radioactive material throughout an urban area.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
An American citizen with ties to Al Qaeda was
arrested in June 2002 at a US airport on suspicion of
planning to build a dirty bomb. FBI suspected him of
receiving training in Pakistan regarding the
Slide 12
Slide 13
31
construction and detonation of a dirty bomb. At the
time of his arrest he had $10,000 in a suitcase and
was believed to be on a reconnaissance mission for
a future RDD attack.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Thieves attempt to steal a container of radioactive
material from the Radon Special Combine Chemical
Factory in Grozny, Chechnya.
One of the suspects died after only a brief exposure
to the material trying to carry it out of the factory.
The other suspect was arrested after being
hospitalized.
Chechen officials did not release details of the case.
Slide 14
32
___________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Chechen rebels contacted the media that they
buried radioactive material in a Moscow park.
Officials located the material, identified as Cesium.
Neither the individuals responsible nor the source of
the cesium was determined.
The first attempt at radiological terrorism.
Slide 16
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Organized Crime groups may be interested in
obtaining radiological material due to an economic
benefit derived from the illegal acquisition of such
material, which could cause a very real threat.
S lide 15
33
___________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
A coordinated attack on two vans containing jewels
occurred near a tollbooth between Paris and Lyon.
Gas was introduced into the vans and a mechanical
digger was found with its arm inside the van.
The vans were burned.
Slide 18
___________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
December 2, gunmen forced two truck drivers who had
taken a nap at a gas station on the outskirts of Mexico
City to surrender their vehicle. The thieves took off
with the truck’s heavy and hazardous cargo: a
decommissioned tele therapy unit still containing 1,
Slide 17
34
InsiderThreat
• InsiderDefinition§ Anyindividualwithauthorizedaccesstoradiologicalfacilities,materials,and/ortransportwhomightattemptunauthorizedremovalorsabotage,orwhocouldaidoutsiderstodoso
19
11e+11 Becquerel (3,000 curies) of cobalt‐60 source.
Two days later, the police found the radioactive
capsule abandoned in a corn field.
There were no immediate reports of serious injuries
and no contamination found in the area nearby.
There were no immediate reports of serious injuries
and no contamination found in the area nearby.
Slide 19
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
In addition to Outsider threats, Insiders also pose a
threat to your site. An insider is any one with any
combination of access, knowledge, and authority at
your site. An insider may act alone, or in collusion
with outsider threats. At a facility, it’s important to
include the insider threat as part of the threat
process as the protection measures for an insider
may differ slightly than those for your outsider
threats.
35
___________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
___________________________________________
Slide 21
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Individuals may be exposed to radiation without any
knowledge. The dangers of an RED depend on:
• The type and amount of material used;
• The time a person spends near the device;
• What parts of the body are exposed to the
material?
Slide 20
36
Slide 22
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Radioactive sources can be a solid, aerosol, gas, or
liquid.
Contamination can occur via air, water, soil or food.
Dispersal methods can be an explosive device, aircraft,
industrial sprayers and passive/active dispersion
including deposit in soil or water.
The health and environmental consequences will
depend on the design of the device and the
type/quantity of the radioactive material.
Radioactive decontamination may be required of all
persons and areas affected.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 23
Review
• DescribethedifferencesbetweenInsidervs.OutsiderThreats.
• WhataresomeofthecharacteristicsfromaTerroristThreatGroup?
• WhatisthemotivationofaCriminalThreatGroup?
• WhatarethepossibleimpactsofaRadiologicalDispersalDevice?
• WhatarethepossibleimpactofaRadiologicalExposureDevice?
23
37
Module Five: Physical Protection Systems and Timelines
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 1
Slide 2
IRTCourse
IntroductionCourseOverview
ORSProgram
PreparationTheThreat
Physical ProtectionSystems
ContingencyPlan
TargetFolder
SiteResponsePlan
1
2
3
Hazards ofRadiation forSecurityResponders
TabletopExercise
38
Slide 3
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Should be aware of the security at a location:
-Detection of the threat
-Delays in place
-Response time
Slide 4
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Protection of materials requires establishing effective
material controls, such as material accountancy
program and physical protection systems. Two main
components of PPS:
-Deter the adversary
-Defeat the adversary
39
Slide 5
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s)Three functions of a PPS: detection, delay and response. To be well protected, a facility should test all
three elements.
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
:
Slide 6
Key Point(s) : Detection is the discovery of adverse action
40
Slide 7
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
Passive sensors only detect vibration, heat, sound
which occurs in the physical environment. Examples
include photographic, thermal, light and seismic.
An active sensor is a device which transmits a signal
which is bounced off of a target and utilizes the
return signal to detect activity. Examples include
radar and infrared sensors.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
________________________________________
Key Point(s):
A passive infrared sensor (PIR) is an electronic
sensor which measures infrared light radiating from
objects within its field. The alarm is triggered when
an object passes in front of the background, thereby
causing a temperature change. This change is
converted to voltage, setting off the alarm.
Slide 8
41
Slide 9
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
An active sensor continually sends out transmissions
and relies on the feedback to detect changes, thus it
utilizes a significantly larger amount of energy
compared to passive sensors.
.
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
There are four actions need to happen in order for
detection to occur successfully. Detection is not just
the activation of a sensor, but having the signal
initiated and reported to an alarm station, and
finally a human assessing whether the alarm is real
or a nuisance alarm.
You notice that the actuation of a sensor AND
assessment are tied together. If we just had a sensor
Slide 10
Key Point(s) :
42
actuated, we need to verify or assess the alarm
before we call the police force out to respond.
An alarm without assessment is not detection.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Points(s):
Delay is listed after detection because in order for
us to account for delay, we need to first have
detection of an incident. Delay can come in
several forms: • Guards
• Physical barriers (doors, windows, and walls)
• Dispensable barriers (pop-up vehicle barriers,
smoke, aqueous foam, and tear gas).
The performance measure for delay is time - time that
a barrier or guard delays the adversary on his/her
path to the critical asset.
Slide 11
Slide 12
43
Slide 13
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
The goal of the adversary is to gain access to the
material through whatever means available. This
will include determining the most vulnerable point
of the site and determining which barrier can be
penetrated most readily.
The use of multiple barriers of different design and
function will provide greater delay times.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
____________________________________________
Key Point(s):
An adversary will utilize a variety of tools in order to
defeat a barrier. Shown in the slide are some
examples of the types of tools which have been
used in previous penetration attempts.
Slide 14
44
However, it should be noted that anything could
potentially be a tool which can defeat the barriers in
place.
Slide 15
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Key Point(s):
Multiple barriers should be used to increase the
penetration time required to access the material.
___________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Slide 16
45
Slide 17
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
Fog or smoke serves as an obscurant which makes it
more difficult for an adversary to maneuver and be
able to carry out the intended act.
Slide 18
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
Response is the third component. It relies on
available and accessible information, contingency
plans and training and exercises.
46
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
The time to respond and deploy is one of the major
factors in the effectiveness of the response force.
The performance measures used to evaluate the
effectiveness of the response force, are all related
to getting response to the asset as quickly as
possible and then evaluating their effectiveness
once they are there.
Communicating the need for the response force is a
limiting value of the overall effectiveness. If they are
not called, they will never arrive! If the response
time from the local town to a remote site is 50
minutes, then chances are the adversary has plenty
of time to do what he wants to the asset and
escape. Response effectiveness (i.e., neutralization)
depends on the types of weapons, training, and
numbers of responders compared to the adversary.
Slide 19
47
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
PPS is dependent upon early detection,
appropriate delays and an efficient response. The
goal of PPS is to allow the response force to
interrupt the adversary prior to the completion of
the task.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
If the assessment of the situation is rapid, the
response force is able then to appropriately
address the threat and mitigate the attack. If
the assessment is delayed, the response force
will arrive too late to be able to interrupt the
attackers.
Slide 20
Slide 21
48
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 23
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Note the number of tasks required by the adversary
to successfully perform its mission.
Slide 24
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 22
Key Point(s) :
49
Key Point(s):
The PPS timelines depend on the type of threat, the
type of actor responsible for the threat and the
tools and capabilities of the attackers.
Slide 25
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Review
• Whatarethreecomponentsofeffectivesecurity?
• WhatconstrainstheresponsetimeofLawEnforcement?
• WhatinformationfromphysicalsecuritycaninfluenceResponsePlans?
25
50
Checks on Learning Items: 1. What are the three major initiatives of the ORS program?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
2. Name the four sources of key concern to the ORS program.
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
3. Name three ways in which you can protect yourself from radiation.
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
4. Provide an example of devices of concern?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
5. How often are we exposed to radiation?
_________________________________________________________________________________
6. What are the three classifications of outsider threats?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
7. What is the most difficult threat to the PPS to counter?
_________________________________________________________________________________
8. List the three elements that together make up an effective PPS:
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
51
Section Three: Contingency Plan
Module 6: Part One – Target Folder
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
___________________________________________
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 1
Slide 2
52
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Target folders provide sufficient target specific
information to assist site response forces and
outside agencies in planning and conducting
interagency compatible tactical operations at a
specific site.
As much information about how and where to
respond to our target facility should be collected.
This will increase the chances of success in
protecting the radioactive sources at the facility.
Slide 3
Slide 4
Key Point(s) :
53
Slide 5
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
Target folders should be developed and maintained
by sites requiring tactical directives and/or those
with radiological theft or sabotage concerns.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s): Site response force personnel, fire,
medical and safety responders.
Local, State, Federal and Military response personnel.
Slide 7
Slide 6
54
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
________________________________________
Key Point(s):
The Target Folder can be produced by any agency
requiring multi agency response to an incident at a
specific site.
For a specific site alarm response, site
security/management will usually produce the
Target Folder with the help of all response
agencies and various subject matter experts
___________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
Response force members from responsible
organizations and facility employees with detailed
knowledge and understanding of work processes,
conduct facility walk downs, compiling key
information on the target facility.
Using a systematic approach to conduct the facility
walk down and then ensuring all the pertinent
information is included in the target folder ensures
that important information is not overlooked.
Slide 8
55
Slide 9
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
been created should they have access to it. It must
be protected
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s) :
Th e best possible attack plan for an adversary has
Slide 10
56
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
S lide 11
Slide 12
Slide 13
57
Mission:
• Providecomprehensiveemergencyandpreventivehealthcarefor
thepublic
• Singlelocationinregionforoncologytreatment
FacilityOverview
15
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 15
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 14
58
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
______________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 16
Slide 17
59
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 18
Slide 19
60
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 20
Slide 21
Slide 22
61
Slide 24
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 25
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 23
62
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
S lide 26
63
Checks on Learning Items: 1. What is a target folder?
________________________________________________________________________________________
________________________________________________________________________________________
2. Who are some of the users of a Target folder?
_________________________________________________________________________________
_________________________________________________________________________________
3. Are facility subject matter experts the only individuals responsible for the developing a target folder?
________________________________________________________________________________________
________________________________________________________________________________________
4. What are typical routes of entry that should be considered when working on a facility description?
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
5. In addition to a text description of the facility, what else should be included in your facility documentation?
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
6. What are three possible response strategies?
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
7. What are the three elements of the PPS that you should characterize?
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
8. What are some examples of operational considerations for interior and exterior response forces?
________________________________________________________________________________________
________________________________________________________________________________________
9. Why should target folders be protected?
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
64
Contingency Plan: Part Two - Site Response Plan
______________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 27
Slide 28
IRTCourse
IntroductionCourseOverview
ORSProgram
PreparationTheThreat
Physical ProtectionSystems
ContingencyPlan
TargetFolder
SiteResponsePlan
1
2
3
Hazards ofRadiation forSecurityResponders
TabletopExercise
65
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
The IAEA Code of Conduct for the safety and
security of radioactive sources recommends that
facilities have a Site Security Plan, a Site Response
Plan (SRP), and Target Folder in order to help
respond to a radiological emergency.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
____________________________________________
Key Points(s):
The SRP is a very specific, detailed document
which will provide the responders with all of the
necessary information to appropriately respond
to a threat.
The SRP will also provide a guide to the proper
methods the response team will use, the tactics
required and the resources available.
Slide 29
Key Point(s) :
Slide 30
66
______________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
To be effective and beneficial, the SRP must be a
collaborative document, with input required from
all relevant responding agencies.
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 31
Slide 32
67
Slide 33
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
Specific attention must be paid to the type of attack
involved, the material utilized and the
implementation of the perimeter in order to ensure
safety.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
The Target identification is a component of the SRP
and can be obtained from the information
contained in the Target Folder.
There may be many targets that a facility chooses to
protect; however, in this workshop the focus is the
prevention of the theft of radioactive materials. It
addresses the topics of identifying the protected
Slide 34
68
material within the facility and articulating the
means to protect it. This will include:
Containment Strategies;
Denial of access to the target/completion of task;
Pursuit of the adversary if necessary and safe; and
Methods to recapture/recovery of the target.
Slide 35
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
The primary response indicates the first members of
the response team to respond to the
alarm/notification. This is typically the security
personnel on-site and possibly law
enforcement/military assigned to the site. The SRP
should specifically indicate the number and type
(armed/unarmed) personnel who will respond,
and an accurate assessment of the time it will take
for them to arrive
69
___________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
The secondary response includes law enforcement
agencies and departments which have been notified
of the incident and respond accordingly. Typically,
these agencies will be located in the vicinity of the
facility and have agreed to respond to the site in the
event of a threat/incident occurring at the location.
Again, it is very important to include correct
information concerning the number of responders,
the time to respond, and the functions each officer
will perform upon arrival. Identifying and
documenting this prior to the incident will prevent
confusion in the event a response is required.
Slide 37
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 36
70
Key Point(s):
The tertiary response is included in the SRP. This
includes assets which require greater time to
respond to the event. These resources will typically
coordinate the National Response Plan and long
term logistical support, and also assist in the
Consequence Management of the situation, working
to help the facility/community return to normal.
Slide 38
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
The Command and Control structure of an incident
should be a part of the SRP. Deciding who will be in
charge and identifying the proper protocol for
providing direction within multiple different
agencies/departments is important.
During the crisis, communication is an essential
element to the successful operation. A clear line of
communication should be established between
Command and Control, first line responders and all
tactical assets.
71
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
The critical roles of the first responders must be
explicitly articulated and the tasks should be
assigned to those entities who will respond to the
situation. In this manner, the threat will hopefully
be addressed and mitigated, rather than waiting to
decide who or what department will be responsible
for addressing the specific need.
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
Operability verification determines whether the equipment
or security personnel operate in a manner which will
properly protect the facility?
Slide 39
Slide 40
72
Effectiveness testing is more comprehensive and
evaluates if the equipment and response
procedures found to be effective during the testing
program.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Once the SRP has been completed and is close to
finalization, take it out and walk it down.
This is part of your review process.
A walk down means to take the document and follow
it step by step as if the site were experiencing and
emergency response. Go to each response agency
and ensure their response will occur as it is planned
in the SRP.
Once the SRP has been confirmed by all the stake
holders, then evaluate it through performance
testing or Vulnerability Assessments.
Slide 41
Key Point(s) :
73
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
The operator should submit amendments for
prior approval to the competent authority
before making significant modifications,
including temporary changes, to arrangements
detailed in the approved SRP.
Compliance: The competent authority should verify the operator’s compliance with the security plan.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Key Point(s):
The SRP contains specific information regarding an
emergency response. This information must be
properly protected.
Slide 42
Key Point(s) :
Slide 43
74
Slide 44
_____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 46
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
• TheSiteResponsePlancontainsdetailsthespecificmannerinwhicharesponseforcewillrespondtoatargetandtheprotectionstrategyassignedtothattarget
• Acomprehensivesiteresponseplancontainsinformationonthetarget,facilityoperations,threat,responseforcecapabilities,command,control&communications
Review
44
75
Checks on Learning Items: 1. What is a site response plan?
_________________________________________________________________________________
_________________________________________________________________________________
2. What are some of the operational states which should be considered during the documentation of the
SPR?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
3. What are the three physical protection measures that may be in place during any of the operational
states?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
4. What is the general content organization of a SRP?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
5. Who is primarily responsible for the production of the SRP?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
6. Why is it important to identify and characterize the target?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
7. Where can information regarding the target be found?
_________________________________________________________________________________
_________________________________________________________________________________
8. Identify the potential protection strategies for a response force:
_________________________________________________________________________________
_________________________________________________________________________________
9. True or False: The information within the SRP does not require protection?
_________________________________________________________________________________
_______________________________________________________________________________
76
IRTCourse
IntroductionCourseOverview
ORSProgram
PreparationTheThreat
Physical ProtectionSystems
ContingencyPlan
TargetFolder
SiteResponsePlan
1
2
3
Hazards ofRadiation forSecurityResponders
TabletopExercise
48
InternationalResponseTraining
ContingencyPlan
PartThree
(TabletopExercise)
SAND2016-3986TR
Contingency Plan: Part Three – Tabletop Exercise
Slide 47
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 48
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
77
Slide 49
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 50
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 51
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
78
Slide 52
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 53
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
79
Questions?
45
Slide 54
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 55
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
Slide 56
____________________________________________
____________________________________________
____________________________________________
____________________________________________
________________________________________
80
Glossary Alarm - a warning from a sensor or sensor system that a sensor has been triggered or activated,
usually signaled by light or sound; it may indicate a false alarm, nuisance alarm, or valid alarm.
Alarm assessment – security determines cause of an alarm; process of determining an alarm
condition status; appraisal of the credibility, reliability, pertinence, accuracy, or usefulness of an
indicated alarm
Best practice – as a method or technique that has consistently shown results superior to those
achieved with other means containment - preventing adversaries from leaving site with asset(s).
Contingency measure - A contingency plan is a plan devised for an outcome other than in the
usual (expected) plan.
Compensatory measure - Temporary safeguards or security activity designed to afford
equivalent protection for safeguards or security interests when a protection system element has failed or new requirement or vulnerability has been identified
Delay - the element of a physical protection system designed to impede adversary penetration
into or exit from the protected area.
Denial - preventing adversaries from getting to an asset.
Detection - discovery of an unauthorized adversary action communicated to appropriate
authority and/or a protective force (detection does not exist without assessment).
Guard forces - Persons entrusted with responsibility for patrolling, monitoring, assessing,
escorting individuals during transport, controlling access, and/or providing initial response.
Memorandum of understanding - formal agreement between two or more parties. Organizations can use a memorandum of understanding to establish official partnerships
Physical protection system - integrated system of security equipment/hardware/ technology,
personnel, and procedures designed to protect selected assets
Radiological dispersal device - a weapon designed to spread radioactive material
Response forces - persons, onsite or off site, who are armed and appropriately equipped and
trained to counter an attempted unauthorized removal of nuclear material or an act of sabotage.
security - an integrated system of activities, systems, programs, facilities, and policies for the
protection of classified information or matter, sensitive information, nuclear materials, nuclear
weapons and nuclear weapon components, and contractor facilities, property, and equipment.
Sensor - a device that responds to a stimulus associated with an unauthorized action, such as an
intrusion into a protected area or an attempt to smuggle contraband through an entry.
Target – something that is subject to danger, risk of harm, or loss.
81
References
Code of Conduct on the Safety of Radioactive Sources IAEA
DOE Target Folder Format, June 2012
DOE Order 473.3, Protection Program Operations, June 2011.
Lafluer, J, The Perfect Heist, Sandia National Laboratories, SAND No. 2014-1790. (U)
Nuclear Security Recommendations on Physical Protection of Nuclear Materials and Nuclear Facilities
(NSS-13) IAEA Nuclear Security Series 13 (INFCIRC/225)
Development, Use and Maintenance of the Design Basis Threat IAEA Nuclear Security Series 10
top related