security of iaea category 1 and 2 sources in the united · pdf filesecurity of iaea category 1...
Post on 17-Feb-2018
214 Views
Preview:
TRANSCRIPT
Security of IAEA Category 1 and 2 Sources
in the United States
Brian J. McDermott Director, Division of Materials Safety and State Agreements
U.S. Nuclear Regulatory Commission December 5, 2012
Overview
• Regulatory Arrangements and Program Scope
• Post September 11, 2001 Security Actions
• Incorporation of Security Requirements in Regulation
2
Regulatory Responsibility
• US regulation of radioactive materials began in 1946
• Byproduct, source, and limited special nuclear material can be regulated by Agreement States
• ~ 22,500 materials licensees nationally • ~ 1,300 licensees hold 75,000 Category 1 and 2
sources
• >> 100,000 of Category 3, 4 and 5 sources in the U.S.
3
Post 9/11 NRC Security Actions
• NRC Culture Shift – Goal of maintaining health & safety unchanged – Increased awareness of threat of malevolent use – Increased domestic & international efforts to enhance source control
and security
• Security Advisories and Orders
• Security Assessments – Irradiator – Manufacturing and distribution – Medical facilities – Universities – Radiographers and well loggers
• Rulemaking 4
NRC Security Requirements – Basis
• Prevent theft/diversion for malevolent use • Prompt detection, assessment, and reporting • Prompt law enforcement agency response • Confirmation of shipping/receiving • Additional security for sources in transit • Changes in the threat environment may warrant
additional security measures
5
NRC Security Requirements
6
Administrative - Background Investigations
- Document retention
- Information Protection
Security During Use - Access control - Monitor, detect, assess & respond
- Transportation security
- Portable & Mobile Device Controls
NRC Security Requirements - Administrative
• Background Investigations – Access limited, at all times, to approved individuals – Trustworthiness and reliability
• Documentation – Security Plans – Transportation Records – List of Approved Persons
• Information Protection - Access limited to those with a “need to know”
7
NRC Security Requirements - Security During Use
Monitor, detect, assess and respond • Identify Secure Zones or Radioactive Material Locations • Immediately detect and assess unauthorized access • Immediately response to an actual or attempted theft, sabotage, or
diversion – Pre-arranged plan with law enforcement for assistance and armed response – Contact appropriate Regulatory Authority (NRC or Agreement State)
8
NRC Security Requirements - Transportation
9
Cat 1 Cat 2 Coordinate Arrival Time and Confirm Receipt Continuous and Active Monitoring of Shipment Communication Center/Call-In, Backup Communication Package Tracking Systems Capability to Summon En-Route Assistance Plan and Coordinate Shipment with En-Route States Advance Notification to NRC and En-Route States Investigation of Past Due Shipments Report Lost, Missing or Stolen Material Notify Law Enforcement and NRC Accompanying Individual/No Casual Stops/Surveillance Training, Procedures and Instructions
Security Requirements – Portable & Mobile Devices
• Additional Controls for Portable and Mobile Devices – Two independent physical controls that form tangible barriers – Other requirements apply to these devices as they are
transported from job-site to job-site
10
Conclusion
• Security Requirements
• Security Culture Change – Heightened awareness – Compliance with security requirements
• Continuous Assessment of Security Program Adequacy is Necessary
11
top related