81
1 INTERNATIONAL RESPONSE TRAINING VERSION 2.0 April 2017

INTERNATIONAL RESPONSE TRAINING Vehicle-Borne Explosive Device. Section One: Introduction ... International Response Training Radiation Hazards for Security Responders SAND2016-3986TR

  • Upload
    volien

  • View
    215

  • Download
    1

Embed Size (px)

Citation preview

1

INTERNATIONAL

RESPONSE TRAINING

VERSION 2.0

April 2017

2

STUDENT GUIDE

SAND2016‐3986TR

This page intentionally left blank.

3

Table of Contents

Acronyms .......................................................................................................................................... 4

Section One: Introduction ……………………………………………………………………………………………………… .... 5

Module One: Course Overview ......................................................................................................... 5

Module Two: Office of Radiological Security...………………………………………………………………..……… .... 8

Section Two: Preparation ……………………………………………………………………………………………………… ... 14

Module Three: Radiation Hazards for Security Responders ........................................................... 14

Checks on Learning Items …............................................................................................................ 23

Module Four: The Threat ................................................................................................................ 24

Module Five: Physical Protection Systems and Timelines ………………………………………………….. ...... 37

Checks on Learning Items ……………………………………………………………………………………………………… ... 50

Section Three: Contingency Plan ……………………………………………………………………………………………... 51

Module Six: Part One - Target Folder ……….…………………………………………………………………………… ... 51

Checks on Learning ………………………………………………………………………………………………………………….. 63

Module 6: Part Two Site Response Plan ………….………………………………………………………………… ....... 64

Checks on Learning Items ……………………………………………………………………………………………………… ... 75

Glossary ........................................................................................................................................... 80

References ...................................................................................................................................... 81

4

Acronyms

BMS Balanced Magnetic Switch

CAS Central Alarm Station

Ci Curie

Co-60 Cobalt-60

CP Contingency Plan

Cs-137 Cesium-137

GBq Gigabecquerel

GPS Global Positioning System

HEU Highly Enriched Uranium

HRP Human Reliability Program

IAEA International Atomic Energy Agency

IDD In-Device Delay

IED Improvised Explosive Device

Ir-192 Iridium-192

LEU Low-Enriched Uranium

MOU Memorandum of Understanding

ORS Office of Radiological Security

RED Radiological Explosive Device

RDD Radiological Dispersal Device

RMS Remote Monitoring System

SRP Site Response Plan

SSP Site Security Plan

TBq Terabecquerel

TF Target Folder

TTX Tabletop Exercise

VA Vulnerability Assessment

VBIED Vehicle-Borne Explosive Device

Section One: Introduction

Module One: Course Overview

Slide 1

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 2

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

IRTCourse

IntroductionCourseOverview

ORSProgram

PreparationTheThreat

Physical ProtectionSystems

ContingencyPlan

TargetFolder Folder

SiteResponsePlan

1

2

3

Hazards ofRadiation forSecurityResponders

TabletopExercise

6

Slide 3

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 4

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

At the completion of the course, the participant

will be able to:

• Understand the ORS Program;

• Identify radioactive sources of concern;

• Explain Physical Protection and understand

physical protection upgrades;

• Explain protection strategies for security

responders must follow in the event of

radiation exposure/contamination;

• Understand the presence and the nature of

potential threats;

• Understand the elements of a Contingency

Plan, create a Plan for a facility, and evaluate

its effectiveness.

GoalofIRT

• ThisworkshopisdesignedtoassistpartneringCountrieswithestablishingandmaintainingeffectiveresponsecapabilitiesintheeventofanattemptedtheftofradiologicalmaterial.• ResponseTraining• FacilitateStakeholderDiscussions• CollaborativeResponsePlanningActivities• AwarenessforResponders

• HazardsofRadiation• LocationsofSources• Threats• SecuritySystem

IRTCourseObjectives

4

• ExplaintheOfficeofRadiologicalSecurityProgram

• Explainanddiscussthepotentialhazardsofradiationtosecurityresponders

• IdentifytheThreat

• DescribePhysicalProtectionSystemsandhowtheyrelatetoAdversaryTimelines

• ExplainanddraftsitespecificContingencyPlans

• EvaluatetheContingencyPlansinaTabletopExercise

7

Slide 5

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 6

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s)

You will introduce yourself to the class, stating

your name, organization, current position and all

relevant experience. This is designed to allow

each participant to become familiar with, and

understand, the level of expertise available to

the class.

InstructionalMethods

• Presentations

• CaseStudies

• GroupExercises§ TargetFolder§ SiteResponsePlan

§ TabletopExercise§ ScenarioBased

4

8

Slide 7

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Module Two: Office of Radiological Security

Slide 1

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

InternationalResponseTraining

TheOfficeofRadiologicalSecurity

SAND2016-3986TR

9

Slide 2

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 3

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s)

In the wrong hands, sources can pose a severe danger

to the public. In order to secure the public and prevent

an adversary from obtaining materials for malicious

uses, it is necessary to ensure the safeguard of

radioactive materials whether they are located at a

fixed site or present during transportation.

IRTCourse

IntroductionCourseOverview

ORSProgram

PreparationTheThreat

Physical ProtectionSystems

ContingencyPlan

TargetFolder

SiteResponsePlan

1

2

3

Hazards ofRadiation forSecurityResponders

TabletopExercise

10

Slide 4

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

There are four radiological sources of key concern: Cobalt

(Co-60), Cesium (Cs-137), Americium (Am-241), and

Iridium (Ir-192). These sources are used for legitimate

purposes in tele therapy and gamma knife units (cancer

treatment); panoramic irradiation (sterilization); blood

and sterilization irradiators; oil well-logging; and

radiography.

Slide 5

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

The mission of the Office of Radiological Service (ORS)

is to enhance global security by protecting the sources and preventing terrorist acts involving high activity

radioactive materials.

This is accomplished by:

1. Protecting the sources;

11

2. Removing/disposing of disused radioactive

sources;

3. Reducing the reliance on radioactive sources.

Slide 6

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

ORS has partners throughout the world. Some receive

technological assistance and physical protection upgrades

while others engage in collaboration.

Slide 7

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Several processes can be implemented to protect

the material. 1. Detection and alarm equipment and

multi factor access controls; 2. Delays to extend the

time it takes adversaries to access the material; 3.

Methods to provide prompt awareness and

response; and 4. Opportunities for security and

response training.

12

REMOVE:International

• Repatriation§ SupportreturnofU.S.-originlegacysourcesona

case-by-casebasis

§ ORShasrecoveredover60000Ci(approximately3000sources)since2005.

§ SourcesrecoveredfromHighIncomeCountries*arefullyfundedbythatcountry

§ SourcerepatriationisconsistentwithIAEACodeofConductandJointConventionontheSafetyofSpentFuelManagementandoftheSafetyofRadioactiveWasteManagement

• Consolidation§ Supporttheconsolidationofdisusedsourceintoin-

countrysecurestorage

9

ReduceMission

• Seekstoconvertandreplacedevicesthatusradioactivematerialwithnon-radioactivesource-baseddevicesandachievepermanentriskreductionbyreducingthefootprintofrisk-significantradiologicalmaterials.

• Commerciallyavailable,non-isotopicalternativesexistformostofthemajorapplicationsofradioactivematerials(bloodandresearchirradiation,radiotherapy,andindustrialsterilization).

• NNSAconsiderationsforalternativetechnology:

– Non-isotopic(non-radioactive)source-basedalternativetechnologiesthataretechnically,economically,andoperationallyfeasiblefortheuser.

– Seekresearchandindustryengagementifreplacementtechnologiesarenotyetfeasibleasalternatives.

– Mayincludedevicesthatproduceionizingradiation(xrays)orthosethatdon’t(UVpathogenreduction).

– Not“alternateforms”or“lowerrisk/activity”radionuclides.

10

PathogenreductionusingUVlightplusriboflavinhasbeenshowntoreducetheriskfortransfusiontransmittedinfectionsandisanalternativetobloodirradiationbygammasources.

Slide 8

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Removal of sources can be accomplished through

Repatriation- the return of the radioactive material to the

source’s country of origin; and Consolidation- storing the

disused material in a centralized secure location in-

country.

Slide 9

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

To permanently reduce the risk associated with high active

radiological material, countries are replacing the material

with non-radiological source based alternative

technologies. These include devices which produce

ionizing radiation (X-rays) or reduce the UV pathogen.

13

Review

• Needforsecurity

• Sourcesofconcern

• ORSMissionAreas:Protect,Remove,Reduce

10

Slide 10

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

1.The threat of the intentional use of radiological

material is present.

2. There is a need to keep the material secure.

3. Countries must do their part to protect, remove

and reduce the use of radiological material.

14

InternationalResponseTraining

RadiationHazardsforSecurityResponders

SAND2016-3986TR

Section Two: Preparation

Module Three: Radiation Hazards for Security Responders

Slide 1

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 2

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

IRTCourse

IntroductionCourseOverview

ORSProgram

PreparationTheThreat

Physical ProtectionSystems

ContingencyPlan

TargetFolder

SiteResponsePlan

1

2

3

HazardsofRadiationforSecurityResponders

TabletopExercise

15

Slide 3

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 4

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Radiation is energy in motion. Radiation is given off by

different matter in two forms: pure energy or particle radiation.

• Examples pure radiation includes the sun, x-

rays radar, and radio waves.

• Particle radiation is fast‐moving and is

produced by alpha, beta, and neutron particles.

16

Slide 5

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Radiation is very common in our everyday lives.

This chart shows the percentage of radiation which

we are exposed to on a daily basis.

Slide 6

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Radioactivity refers to the particles which are

emitted from nuclei as a result of nuclear instability.

Because the nucleus experiences the intense

conflict between the two strongest forces in nature,

it should not be surprising that there are many

nuclear isotopes which are unstable and emit some

kind of radiation.

Whatisradioactivity?

Aradioactiveisotope(radioisotope)isanatomthathasanunstablenucleusandemitsradiation(suchasgammaraysorxrays)duringitsdecaytoastableatom.

Mostcommonradioisotopesofconcerntousare:

• Cobalt-60(Co-60)

• Cesium-137(Cs-137)

• Iridium-192(Ir-192)

• Americium-241(Am-241)

6

Source:http://upload.wikimedia.org/wikipedia/commons/e/e0/Cobalt-60_Decay_Scheme.svg

Nucleus

17

Slide 7

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

A sealed source is a container of encapsulated radioactive

material. The material is sealed strong enough to prevent

radioactive material from leaking out under conditions of normal

use. Sealed sources do not remove the threat of radioactive

exposure and require safe handling.

Slide 8

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

A source of radiation which is not encapsulated or otherwise

contained. If uncontrolled, an unsealed source can lead to

contamination.

Unsealed sources are utilized in biological research and

medicine. Unsealed sources are concerning as the material can

be readily dispersed.

18

Acute&ChronicDose

9

ACUTEDOSE=

• Significantdoseoverashortperiodoftime

• Concernisdamagetobloodcells,severeskinburns,severeinfections,anddeath.

CHRONICDOSE=

• Smallerdoses(cumulative)overlongerperiodoftime.

• Concernisincreasedincidenceofcancer.

• TypicaldosemeasurementunitistheSievert(Sv)

§ Backgroundradiation:2– 6mSv annually

§ Limitforradiationworker:50mSv annually

Slide 9

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

An acute exposure to radiation occurs over a short period of

time. The dose of radiation exposed to can vary: small dose

from a dental x-ray, or a large dose from a radiological accident.

Acute dose is measured in Grays (Gy).

Chronic radiation exposure is a smaller dose which occurs

over a longer period of time, e.g., continuous exposure or

exposure which occurs off and on over a long period of time.

Chronic dose is measured in Sieverts (Sv).

Slide 10

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Contamination occurs when radiation is released into the

environment and is then ingested, inhaled or deposited

on the body surface.

Exposure occurs when all or part of the body

absorbs

19

the penetrating radiation from an external source.

Exposure also occurs when radiation is ingested,

inhaled or absorbed into the blood stream.

Slide 11

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

General protection strategies will most likely

provide adequate protection from radioactive

material. The risks posed from contaminated

individuals is minimal provided the basic protection

strategies are followed.

Slide 12

___________________________________________

___________________________________________

___________________________________________

___________________________________________

___________________________________________

___________________________________________

___________________________________________

Key Point(s):

Immediately engage in decontamination procedures

if you encounter radioactive material. This includes

all clothing worn, equipment used and a full

decontamination of the body.

20

Slide 13

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Time, distance and shielding measures minimize any

exposure. To avoid undue exposure to radiation,

follow these principles:

• Time: Limit or minimizing the exposure time

reduces the dose from the radiation source.

• Distance: The intensity and the dose of

radiation decreases dramatically as the

distance from the source increases.

• Shielding: Barriers of lead, concrete, or

water provide good protection from

penetrating radiation such as gamma rays

and neutrons.

21

MaximizeDistance

15

• Dosewilldecreaseby1/(distance)2

• Example:Doublingdistancefromaradiationsourcewilldecreasedoseby4.

50mSv/hr at0.5m

12.5mSv/hr at1m

3.12mSv/hr at2m

Slide 14

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Limiting the amount of exposure time dramatically

reduces the risks associated with the radiation dose.

Slide 15

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Increasing the distance from the source will likewise

have a dramatic impact on the exposure to

radiation. Doubling the distance from the source will

decrease the radiation dose by a factor of 4.

22

UseShielding

16

• Useshieldingbetweenyourselfandthesourceifpossible.

• Shieldmaybenearyouornearthesource.

Review

• WhatisRadiation?

• Whatdoesaradioactivesourcelooklike?

• Describeradiationexposureversuscontamination?

• Whataresomeoftheeffectsofradiationexposure?

• Whatcanyoudotoprotectyourselffromradiationintheeventofasecurityevent/attack?

17

Slide 16

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Shielding from a contaminated source should be

between you and the source.

Slide 17

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Protecting yourself from a radiological source is only

one concern. As a law enforcement officer, you

must also be aware of the location of the adversary,

the presence of weapons, information from the

Central Alarm Station and cover vs. concealment.

23

Checks on Learning Items:

What is radiation?

_____________________________________________________________________________________

_____________________________________________________________________________________

What does a radioactive source look like?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Describe radiation exposure vs. contamination.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

What are some of the effects of radiation exposure?

_____________________________________________________________________________________

What can you do to protect yourself from radiation in the event of a security event/attack?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

24

Module Four: The Threat

Slide 1

____________________________________________

____________________________________ ________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 2

InternationalResponseTraining

TheThreat

SAND2016-3986TR

IRTCourse

IntroductionCourseOverview

ORSProgram

PreparationTheThreat

Physical ProtectionSystems

ContingencyPlan

TargetFolder

SiteResponsePlan

1

2

3

Hazards ofRadiation forSecurityResponders

TabletopExercise

25

Slide 3

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Threats can include both Outsider threat and Insider

threat.

Terrorists - High level threat

Criminals - Moderate level threat

Insider threats can include an active or passive

motive.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

A terrorist is a person or group of people who use

violence of the threat of violence to further their

political agenda.

Slide 4

26

Terrorists typically operate in small groups for

their own security. They may be part of larger

organizations which may or may not have a cell

structure. They can be highly skilled and well

informed about intelligence and security matters

and difficult for intelligence and law enforcement

agencies to penetrate.

Organizations may be well‐funded and

staffed. As terrorists are considered to be a

high‐level threat, it is expected that they

have the best weaponry of any of the

potential threat groups.

______________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

A criminal is motivated by personal gain. The threat

is reduced if there is no market for the sale or barter

of the material.

The criminal threat will use automatic weapons and

small quantities of explosives-though it is not

anticipated criminals possess sophisticated use of

explosives.

Criminals are not typically willing to die or be

captured.

Slide 5

27

Slide 6

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

An emerging trend is the use of suicide assault

teams (suicide bombers) and teams using multiple

attackers with automatic weapons. This raises a

greater concern for the safety and security of onsite

personnel as well as first responders.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

ISIL/ISIS continue to be a worldwide threat. In 2016,

ISIL/ISIS has been responsible:

70 terrorist attacks in 20 countries

Over 1300 fatalities and 1700 injured

S lide 7

28

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s)

ISIL/ISIS 2016 attacks occurred every 84 hours, with

the greatest casualties in Turkey, Afghanistan and

Pakistan.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 8

Slide 9

29

Slide 10

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

A VBIED loaded with 2,000 kg of ammonium nitrate

fertilizer with fuel oil in front of the Federal Building

in Oklahoma City, OK. 168 people were killed,

including 19 children.

Two anti-government radicals were arrested, tried

and convicted of the terrorist act.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

ISIS planned a terrorist attack at the Tihange Nuclear

Power Plant, 40 miles south-east of Brussels,

Belgium.

Slide 11

30

The plan included the kidnapping and torture of a

plant employee in order to gain access to the

radioactive material.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

The Nuclear Power Plant contained both low

enriched uranium and highly enriched uranium.

Planned to make a dirty bomb to spread the

radioactive material throughout an urban area.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

An American citizen with ties to Al Qaeda was

arrested in June 2002 at a US airport on suspicion of

planning to build a dirty bomb. FBI suspected him of

receiving training in Pakistan regarding the

Slide 12

Slide 13

31

construction and detonation of a dirty bomb. At the

time of his arrest he had $10,000 in a suitcase and

was believed to be on a reconnaissance mission for

a future RDD attack.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Thieves attempt to steal a container of radioactive

material from the Radon Special Combine Chemical

Factory in Grozny, Chechnya.

One of the suspects died after only a brief exposure

to the material trying to carry it out of the factory.

The other suspect was arrested after being

hospitalized.

Chechen officials did not release details of the case.

Slide 14

32

___________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Chechen rebels contacted the media that they

buried radioactive material in a Moscow park.

Officials located the material, identified as Cesium.

Neither the individuals responsible nor the source of

the cesium was determined.

The first attempt at radiological terrorism.

Slide 16

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Organized Crime groups may be interested in

obtaining radiological material due to an economic

benefit derived from the illegal acquisition of such

material, which could cause a very real threat.

S lide 15

33

___________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

A coordinated attack on two vans containing jewels

occurred near a tollbooth between Paris and Lyon.

Gas was introduced into the vans and a mechanical

digger was found with its arm inside the van.

The vans were burned.

Slide 18

___________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

December 2, gunmen forced two truck drivers who had

taken a nap at a gas station on the outskirts of Mexico

City to surrender their vehicle. The thieves took off

with the truck’s heavy and hazardous cargo: a

decommissioned tele therapy unit still containing 1,

Slide 17

34

InsiderThreat

• InsiderDefinition§ Anyindividualwithauthorizedaccesstoradiologicalfacilities,materials,and/ortransportwhomightattemptunauthorizedremovalorsabotage,orwhocouldaidoutsiderstodoso

19

11e+11 Becquerel (3,000 curies) of cobalt‐60 source.

Two days later, the police found the radioactive

capsule abandoned in a corn field.

There were no immediate reports of serious injuries

and no contamination found in the area nearby.

There were no immediate reports of serious injuries

and no contamination found in the area nearby.

Slide 19

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

In addition to Outsider threats, Insiders also pose a

threat to your site. An insider is any one with any

combination of access, knowledge, and authority at

your site. An insider may act alone, or in collusion

with outsider threats. At a facility, it’s important to

include the insider threat as part of the threat

process as the protection measures for an insider

may differ slightly than those for your outsider

threats.

35

___________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

___________________________________________

Slide 21

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Individuals may be exposed to radiation without any

knowledge. The dangers of an RED depend on:

• The type and amount of material used;

• The time a person spends near the device;

• What parts of the body are exposed to the

material?

Slide 20

36

Slide 22

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Radioactive sources can be a solid, aerosol, gas, or

liquid.

Contamination can occur via air, water, soil or food.

Dispersal methods can be an explosive device, aircraft,

industrial sprayers and passive/active dispersion

including deposit in soil or water.

The health and environmental consequences will

depend on the design of the device and the

type/quantity of the radioactive material.

Radioactive decontamination may be required of all

persons and areas affected.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 23

Review

• DescribethedifferencesbetweenInsidervs.OutsiderThreats.

• WhataresomeofthecharacteristicsfromaTerroristThreatGroup?

• WhatisthemotivationofaCriminalThreatGroup?

• WhatarethepossibleimpactsofaRadiologicalDispersalDevice?

• WhatarethepossibleimpactofaRadiologicalExposureDevice?

23

37

Module Five: Physical Protection Systems and Timelines

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 1

Slide 2

IRTCourse

IntroductionCourseOverview

ORSProgram

PreparationTheThreat

Physical ProtectionSystems

ContingencyPlan

TargetFolder

SiteResponsePlan

1

2

3

Hazards ofRadiation forSecurityResponders

TabletopExercise

38

Slide 3

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Should be aware of the security at a location:

-Detection of the threat

-Delays in place

-Response time

Slide 4

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Protection of materials requires establishing effective

material controls, such as material accountancy

program and physical protection systems. Two main

components of PPS:

-Deter the adversary

-Defeat the adversary

39

Slide 5

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s)Three functions of a PPS: detection, delay and response. To be well protected, a facility should test all

three elements.

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

:

Slide 6

Key Point(s) : Detection is the discovery of adverse action

40

Slide 7

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

Passive sensors only detect vibration, heat, sound

which occurs in the physical environment. Examples

include photographic, thermal, light and seismic.

An active sensor is a device which transmits a signal

which is bounced off of a target and utilizes the

return signal to detect activity. Examples include

radar and infrared sensors.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

________________________________________

Key Point(s):

A passive infrared sensor (PIR) is an electronic

sensor which measures infrared light radiating from

objects within its field. The alarm is triggered when

an object passes in front of the background, thereby

causing a temperature change. This change is

converted to voltage, setting off the alarm.

Slide 8

41

Slide 9

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

An active sensor continually sends out transmissions

and relies on the feedback to detect changes, thus it

utilizes a significantly larger amount of energy

compared to passive sensors.

.

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

There are four actions need to happen in order for

detection to occur successfully. Detection is not just

the activation of a sensor, but having the signal

initiated and reported to an alarm station, and

finally a human assessing whether the alarm is real

or a nuisance alarm.

You notice that the actuation of a sensor AND

assessment are tied together. If we just had a sensor

Slide 10

Key Point(s) :

42

actuated, we need to verify or assess the alarm

before we call the police force out to respond.

An alarm without assessment is not detection.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Points(s):

Delay is listed after detection because in order for

us to account for delay, we need to first have

detection of an incident. Delay can come in

several forms: • Guards

• Physical barriers (doors, windows, and walls)

• Dispensable barriers (pop-up vehicle barriers,

smoke, aqueous foam, and tear gas).

The performance measure for delay is time - time that

a barrier or guard delays the adversary on his/her

path to the critical asset.

Slide 11

Slide 12

43

Slide 13

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

The goal of the adversary is to gain access to the

material through whatever means available. This

will include determining the most vulnerable point

of the site and determining which barrier can be

penetrated most readily.

The use of multiple barriers of different design and

function will provide greater delay times.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

____________________________________________

Key Point(s):

An adversary will utilize a variety of tools in order to

defeat a barrier. Shown in the slide are some

examples of the types of tools which have been

used in previous penetration attempts.

Slide 14

44

However, it should be noted that anything could

potentially be a tool which can defeat the barriers in

place.

Slide 15

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Key Point(s):

Multiple barriers should be used to increase the

penetration time required to access the material.

___________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

Slide 16

45

Slide 17

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

Fog or smoke serves as an obscurant which makes it

more difficult for an adversary to maneuver and be

able to carry out the intended act.

Slide 18

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

Response is the third component. It relies on

available and accessible information, contingency

plans and training and exercises.

46

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

The time to respond and deploy is one of the major

factors in the effectiveness of the response force.

The performance measures used to evaluate the

effectiveness of the response force, are all related

to getting response to the asset as quickly as

possible and then evaluating their effectiveness

once they are there.

Communicating the need for the response force is a

limiting value of the overall effectiveness. If they are

not called, they will never arrive! If the response

time from the local town to a remote site is 50

minutes, then chances are the adversary has plenty

of time to do what he wants to the asset and

escape. Response effectiveness (i.e., neutralization)

depends on the types of weapons, training, and

numbers of responders compared to the adversary.

Slide 19

47

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

PPS is dependent upon early detection,

appropriate delays and an efficient response. The

goal of PPS is to allow the response force to

interrupt the adversary prior to the completion of

the task.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

If the assessment of the situation is rapid, the

response force is able then to appropriately

address the threat and mitigate the attack. If

the assessment is delayed, the response force

will arrive too late to be able to interrupt the

attackers.

Slide 20

Slide 21

48

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 23

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Note the number of tasks required by the adversary

to successfully perform its mission.

Slide 24

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 22

Key Point(s) :

49

Key Point(s):

The PPS timelines depend on the type of threat, the

type of actor responsible for the threat and the

tools and capabilities of the attackers.

Slide 25

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Review

• Whatarethreecomponentsofeffectivesecurity?

• WhatconstrainstheresponsetimeofLawEnforcement?

• WhatinformationfromphysicalsecuritycaninfluenceResponsePlans?

25

50

Checks on Learning Items: 1. What are the three major initiatives of the ORS program?

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

2. Name the four sources of key concern to the ORS program.

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

3. Name three ways in which you can protect yourself from radiation.

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

4. Provide an example of devices of concern?

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

5. How often are we exposed to radiation?

_________________________________________________________________________________

6. What are the three classifications of outsider threats?

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

7. What is the most difficult threat to the PPS to counter?

_________________________________________________________________________________

8. List the three elements that together make up an effective PPS:

________________________________________________________________________________________

________________________________________________________________________________________

________________________________________________________________________________________

51

Section Three: Contingency Plan

Module 6: Part One – Target Folder

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

___________________________________________

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 1

Slide 2

52

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Target folders provide sufficient target specific

information to assist site response forces and

outside agencies in planning and conducting

interagency compatible tactical operations at a

specific site.

As much information about how and where to

respond to our target facility should be collected.

This will increase the chances of success in

protecting the radioactive sources at the facility.

Slide 3

Slide 4

Key Point(s) :

53

Slide 5

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

Target folders should be developed and maintained

by sites requiring tactical directives and/or those

with radiological theft or sabotage concerns.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s): Site response force personnel, fire,

medical and safety responders.

Local, State, Federal and Military response personnel.

Slide 7

Slide 6

54

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

________________________________________

Key Point(s):

The Target Folder can be produced by any agency

requiring multi agency response to an incident at a

specific site.

For a specific site alarm response, site

security/management will usually produce the

Target Folder with the help of all response

agencies and various subject matter experts

___________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

Response force members from responsible

organizations and facility employees with detailed

knowledge and understanding of work processes,

conduct facility walk downs, compiling key

information on the target facility.

Using a systematic approach to conduct the facility

walk down and then ensuring all the pertinent

information is included in the target folder ensures

that important information is not overlooked.

Slide 8

55

Slide 9

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

been created should they have access to it. It must

be protected

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s) :

Th e best possible attack plan for an adversary has

Slide 10

56

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

S lide 11

Slide 12

Slide 13

57

Mission:

• Providecomprehensiveemergencyandpreventivehealthcarefor

thepublic

• Singlelocationinregionforoncologytreatment

FacilityOverview

15

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 15

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 14

58

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

______________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 16

Slide 17

59

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 18

Slide 19

60

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 20

Slide 21

Slide 22

61

Slide 24

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 25

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 23

62

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

S lide 26

63

Checks on Learning Items: 1. What is a target folder?

________________________________________________________________________________________

________________________________________________________________________________________

2. Who are some of the users of a Target folder?

_________________________________________________________________________________

_________________________________________________________________________________

3. Are facility subject matter experts the only individuals responsible for the developing a target folder?

________________________________________________________________________________________

________________________________________________________________________________________

4. What are typical routes of entry that should be considered when working on a facility description?

________________________________________________________________________________________

________________________________________________________________________________________

________________________________________________________________________________________

5. In addition to a text description of the facility, what else should be included in your facility documentation?

________________________________________________________________________________________

________________________________________________________________________________________

________________________________________________________________________________________

6. What are three possible response strategies?

________________________________________________________________________________________

________________________________________________________________________________________

________________________________________________________________________________________

7. What are the three elements of the PPS that you should characterize?

________________________________________________________________________________________

________________________________________________________________________________________

________________________________________________________________________________________

8. What are some examples of operational considerations for interior and exterior response forces?

________________________________________________________________________________________

________________________________________________________________________________________

9. Why should target folders be protected?

________________________________________________________________________________________

________________________________________________________________________________________

________________________________________________________________________________________

64

Contingency Plan: Part Two - Site Response Plan

______________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 27

Slide 28

IRTCourse

IntroductionCourseOverview

ORSProgram

PreparationTheThreat

Physical ProtectionSystems

ContingencyPlan

TargetFolder

SiteResponsePlan

1

2

3

Hazards ofRadiation forSecurityResponders

TabletopExercise

65

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

The IAEA Code of Conduct for the safety and

security of radioactive sources recommends that

facilities have a Site Security Plan, a Site Response

Plan (SRP), and Target Folder in order to help

respond to a radiological emergency.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

____________________________________________

Key Points(s):

The SRP is a very specific, detailed document

which will provide the responders with all of the

necessary information to appropriately respond

to a threat.

The SRP will also provide a guide to the proper

methods the response team will use, the tactics

required and the resources available.

Slide 29

Key Point(s) :

Slide 30

66

______________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

To be effective and beneficial, the SRP must be a

collaborative document, with input required from

all relevant responding agencies.

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 31

Slide 32

67

Slide 33

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

Specific attention must be paid to the type of attack

involved, the material utilized and the

implementation of the perimeter in order to ensure

safety.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

The Target identification is a component of the SRP

and can be obtained from the information

contained in the Target Folder.

There may be many targets that a facility chooses to

protect; however, in this workshop the focus is the

prevention of the theft of radioactive materials. It

addresses the topics of identifying the protected

Slide 34

68

material within the facility and articulating the

means to protect it. This will include:

Containment Strategies;

Denial of access to the target/completion of task;

Pursuit of the adversary if necessary and safe; and

Methods to recapture/recovery of the target.

Slide 35

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

The primary response indicates the first members of

the response team to respond to the

alarm/notification. This is typically the security

personnel on-site and possibly law

enforcement/military assigned to the site. The SRP

should specifically indicate the number and type

(armed/unarmed) personnel who will respond,

and an accurate assessment of the time it will take

for them to arrive

69

___________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

The secondary response includes law enforcement

agencies and departments which have been notified

of the incident and respond accordingly. Typically,

these agencies will be located in the vicinity of the

facility and have agreed to respond to the site in the

event of a threat/incident occurring at the location.

Again, it is very important to include correct

information concerning the number of responders,

the time to respond, and the functions each officer

will perform upon arrival. Identifying and

documenting this prior to the incident will prevent

confusion in the event a response is required.

Slide 37

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 36

70

Key Point(s):

The tertiary response is included in the SRP. This

includes assets which require greater time to

respond to the event. These resources will typically

coordinate the National Response Plan and long

term logistical support, and also assist in the

Consequence Management of the situation, working

to help the facility/community return to normal.

Slide 38

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

The Command and Control structure of an incident

should be a part of the SRP. Deciding who will be in

charge and identifying the proper protocol for

providing direction within multiple different

agencies/departments is important.

During the crisis, communication is an essential

element to the successful operation. A clear line of

communication should be established between

Command and Control, first line responders and all

tactical assets.

71

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

The critical roles of the first responders must be

explicitly articulated and the tasks should be

assigned to those entities who will respond to the

situation. In this manner, the threat will hopefully

be addressed and mitigated, rather than waiting to

decide who or what department will be responsible

for addressing the specific need.

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

Operability verification determines whether the equipment

or security personnel operate in a manner which will

properly protect the facility?

Slide 39

Slide 40

72

Effectiveness testing is more comprehensive and

evaluates if the equipment and response

procedures found to be effective during the testing

program.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Once the SRP has been completed and is close to

finalization, take it out and walk it down.

This is part of your review process.

A walk down means to take the document and follow

it step by step as if the site were experiencing and

emergency response. Go to each response agency

and ensure their response will occur as it is planned

in the SRP.

Once the SRP has been confirmed by all the stake

holders, then evaluate it through performance

testing or Vulnerability Assessments.

Slide 41

Key Point(s) :

73

____________________________________________

____________________________________________

____________________________________________

____________________________________________

____________________________________________

The operator should submit amendments for

prior approval to the competent authority

before making significant modifications,

including temporary changes, to arrangements

detailed in the approved SRP.

Compliance: The competent authority should verify the operator’s compliance with the security plan.

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Key Point(s):

The SRP contains specific information regarding an

emergency response. This information must be

properly protected.

Slide 42

Key Point(s) :

Slide 43

74

Slide 44

_____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 46

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

• TheSiteResponsePlancontainsdetailsthespecificmannerinwhicharesponseforcewillrespondtoatargetandtheprotectionstrategyassignedtothattarget

• Acomprehensivesiteresponseplancontainsinformationonthetarget,facilityoperations,threat,responseforcecapabilities,command,control&communications

Review

44

75

Checks on Learning Items: 1. What is a site response plan?

_________________________________________________________________________________

_________________________________________________________________________________

2. What are some of the operational states which should be considered during the documentation of the

SPR?

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

3. What are the three physical protection measures that may be in place during any of the operational

states?

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

4. What is the general content organization of a SRP?

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

5. Who is primarily responsible for the production of the SRP?

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

6. Why is it important to identify and characterize the target?

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

7. Where can information regarding the target be found?

_________________________________________________________________________________

_________________________________________________________________________________

8. Identify the potential protection strategies for a response force:

_________________________________________________________________________________

_________________________________________________________________________________

9. True or False: The information within the SRP does not require protection?

_________________________________________________________________________________

_______________________________________________________________________________

76

IRTCourse

IntroductionCourseOverview

ORSProgram

PreparationTheThreat

Physical ProtectionSystems

ContingencyPlan

TargetFolder

SiteResponsePlan

1

2

3

Hazards ofRadiation forSecurityResponders

TabletopExercise

48

InternationalResponseTraining

ContingencyPlan

PartThree

(TabletopExercise)

SAND2016-3986TR

Contingency Plan: Part Three – Tabletop Exercise

Slide 47

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 48

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

77

Slide 49

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 50

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 51

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

78

Slide 52

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 53

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

79

Questions?

45

Slide 54

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 55

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

Slide 56

____________________________________________

____________________________________________

____________________________________________

____________________________________________

________________________________________

80

Glossary Alarm - a warning from a sensor or sensor system that a sensor has been triggered or activated,

usually signaled by light or sound; it may indicate a false alarm, nuisance alarm, or valid alarm.

Alarm assessment – security determines cause of an alarm; process of determining an alarm

condition status; appraisal of the credibility, reliability, pertinence, accuracy, or usefulness of an

indicated alarm

Best practice – as a method or technique that has consistently shown results superior to those

achieved with other means containment - preventing adversaries from leaving site with asset(s).

Contingency measure - A contingency plan is a plan devised for an outcome other than in the

usual (expected) plan.

Compensatory measure - Temporary safeguards or security activity designed to afford

equivalent protection for safeguards or security interests when a protection system element has failed or new requirement or vulnerability has been identified

Delay - the element of a physical protection system designed to impede adversary penetration

into or exit from the protected area.

Denial - preventing adversaries from getting to an asset.

Detection - discovery of an unauthorized adversary action communicated to appropriate

authority and/or a protective force (detection does not exist without assessment).

Guard forces - Persons entrusted with responsibility for patrolling, monitoring, assessing,

escorting individuals during transport, controlling access, and/or providing initial response.

Memorandum of understanding - formal agreement between two or more parties. Organizations can use a memorandum of understanding to establish official partnerships

Physical protection system - integrated system of security equipment/hardware/ technology,

personnel, and procedures designed to protect selected assets

Radiological dispersal device - a weapon designed to spread radioactive material

Response forces - persons, onsite or off site, who are armed and appropriately equipped and

trained to counter an attempted unauthorized removal of nuclear material or an act of sabotage.

security - an integrated system of activities, systems, programs, facilities, and policies for the

protection of classified information or matter, sensitive information, nuclear materials, nuclear

weapons and nuclear weapon components, and contractor facilities, property, and equipment.

Sensor - a device that responds to a stimulus associated with an unauthorized action, such as an

intrusion into a protected area or an attempt to smuggle contraband through an entry.

Target – something that is subject to danger, risk of harm, or loss.

81

References

Code of Conduct on the Safety of Radioactive Sources IAEA

DOE Target Folder Format, June 2012

DOE Order 473.3, Protection Program Operations, June 2011.

Lafluer, J, The Perfect Heist, Sandia National Laboratories, SAND No. 2014-1790. (U)

Nuclear Security Recommendations on Physical Protection of Nuclear Materials and Nuclear Facilities

(NSS-13) IAEA Nuclear Security Series 13 (INFCIRC/225)

Development, Use and Maintenance of the Design Basis Threat IAEA Nuclear Security Series 10