This publication provides detailed guidance with regard to the identification of vital areas at nuclear facilities. It presents a structured approach to identifying those areas that contain equipment, systems and components to be protected against sabotage. The process for selection of a specific set of vital areas to be protected is based on consideration of the potential radiological consequences of sabotage, and on the design, operational and safety features of a nuclear facility. The method builds upon safety analysis to develop logic models for sabotage scenarios that could cause unacceptable radiological consequences. The sabotage actions represented in the logic models are linked to the areas from which they can be accomplished. The logic models are then analysed to determine areas that should be protected to prevent these unacceptable radiological consequences. The publication is part of a set of supporting publications in the IAEA Nuclear Security Series with the aim of assisting States in the design, implementation and evaluation of their physical protection systems for nuclear material and nuclear facilities.
This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.
This publication provides guidance specific to nuclear facilities on implementing a computer security programme and evaluating existing programmes. The use of computer systems to cover an increasing range of functions at nuclear facilities introduces new vulnerabilities that could seriously endanger nuclear security if not addressed in a rigorous and balanced manner. Digital systems are increasingly being introduced in safety, safety related and security systems throughout facilities. Non-availability or malfunction of these systems can seriously impact nuclear safety and security, and potentially facilitate sabotage of the facility and/or theft of material. Computer security must, therefore, be a key component of overall facility security.
Higher education plays an essential role in nuclear security capacity building. It ensures the availability of experts able to provide the necessary competencies for effective national nuclear security oversight of nuclear and other radioactive material and to establish and maintain an appropriate nuclear regime in a State. This publication presents both the theoretical knowledge and the practical skills necessary to meet the requirements described in the international framework for nuclear security. Emphasis is placed on the implementation of these requirements and recommendations in States. On the basis of this guidance, a university should be able to develop its own academic programme tailored to suit State specific educational needs in the area of nuclear security and to meet national requirements.
There are concerns that terrorist or criminal groups could gain access to high activity radioactive sources and use these sources maliciously. The IAEA is working with Member States to increase control, accounting and security of radioactive sources to prevent their malicious use and the associated potential consequences. Based on extensive input from technical and legal experts, this Implementing Guide sets forth guidance on the security of sources and will serve as a useful tool for legislators and regulators, physical protection specialists, and facility and transport operators, as well as for law enforcement officers.
This publication provides guidance on how to develop, use and maintain a design basis threat (DBT). It is intended for decision makers from organizations with roles and responsibilities for the development, use and maintenance of the DBT. This Implementing Guide describes a DBT; identifies and recommends the roles and responsibilities of organizations that should be involved in the development, use and maintenance of a DBT; describes how to conduct a national threat assessment as a precursor to a DBT; explains how a DBT can be developed; explains how a DBT is incorporated into a State’s nuclear security regime; and explains the conditions for review of the DBT, and how the review and update are conducted.
This publication addresses the vulnerability of radioactive material during transport. Given the international concern over acts of nuclear terrorism, it is imperative to have a well defined plan for the security of sensitive materials during transport. This publication provides guidance on implementing, maintaining or enhancing a State’s nuclear security regime to protect radioactive material in transport against theft, sabotage or other malicious acts. It will be of use to regulators and to operating personnel engaged in the transport of such material.
This Implementing Guide presents a comprehensive methodology for the development of preventive and protective measures against insider threats to nuclear facilities and nuclear material transport operations of all types. Institutional insiders who are privy to the inner workings of security systems present a unique challenge to the establishment of effective control systems for nuclear material. They generally possess access rights which, together with their authority and knowledge of facilities, grant them far greater opportunity than any outsider to bypass dedicated physical protection elements or other provisions such as safety systems and operating procedures. Furthermore, insiders, as trusted persons, are capable of methods of defeat that are not available to outsiders. This publication provides guidance and measures for reducing these and other risks posed by insiders.
This publication defines the basic concepts and elements of nuclear security culture, with the aim of providing Member States with international consensus guidance on planning and implementing a programme to improve nuclear security culture. Particular emphasis is placed on areas such as regulation, government institutions and general public awareness. The report provides an overview of the necessary attributes of an effective nuclear security culture and emphasizes that its success is ultimately dependent on individuals: policy makers, regulators, managers, individual employees and, to a certain extent, members of the general public. Practical methods to assess and improve the effectiveness of security culture are also included.
This publication is intended for individuals and organizations that may be called upon to deal with the detection of and response to criminal or unauthorized acts involving nuclear or other radioactive material. It will also be useful for legislators, law enforcement agencies, government officials, technical experts, lawyers, diplomats and users of nuclear technology. In addition, the manual emphasizes the international initiatives for improving the security of nuclear and other radioactive material, and considers a variety of elements that are recognized as being essential for dealing with incidents of criminal or unauthorized acts involving such material.
This manual has been produced as part of the IAEA’s Action Plan for the Safety of Radiation Sources and Security of Radioactive Material. It is intended to: assist in the recognition and identification of objects thought to be radioactive devices, sources and transport packages; provide instruction on what to do and how to obtain further help; enhance awareness of the existence of radioactive devices, sources and transport packages; and provide information on the International Catalogue of Sealed Radioactive Sources and Devices through regulatory authorities in IAEA Member States. It will also help in identifying sources involved in events that are reported for inclusion in the IAEA’s Illicit Trafficking Database.
This publication provides guidelines for evaluating the engineering safety aspects of the protection of nuclear power plants against sabotage. The guidance, which is the result of extensive dialogue among safety and security specialists, takes into account the existing robustness of structures, systems and components and emphasizes those aspects of sabotage protection that work synergistically with the protection against extreme external occurrences of accidental origin, such as earthquakes, tornadoes and human induced events. The report introduces a defence in depth approach to sabotage protection, with layers comprising safety and security related systems and activities, and promotes self-assessment by the licensee in cooperation with the competent authorities.