Saturday, April 27, 2024

Design Basis Threat DBT Order DOE Directives, Guidance, and Delegations

design basis threat

The NRC believes that individual fire protection exemptions have had a small impact on plant risk. The NRC agrees that a credible, well-trained, and consistent mock adversary force is vital to the NRC's FOF program. Therefore, the NRC has worked with the nuclear industry to develop a composite adversary force (CAF) that is trained to the standards issued by the Commission.

Design Basis Threat Development is Key to Proper “Blackstart” Grid Capability

Security professionals at Oak Ridge, Amarillo honored - Oakridger

Security professionals at Oak Ridge, Amarillo honored.

Posted: Fri, 19 Nov 2021 08:00:00 GMT [source]

The DBT rule has been amended in several significant respects to reflect the current physical, cyber, biochemical, and other terrorist threats. For example, the radiological sabotage DBT has been enhanced to reflect the requirement that the licensees have a capability to defend against attackers with the ability to operate in several modes of attack, including as multiple groups, attacking from multiple entry points. Additionally, in § 73.1(a)(1)(i)(C), the phrase “up to and including” was changed to simply “including” to provide flexibility in defining the range of weapons available to the composite adversary force. However, these limitations on weapons and defensive systems available to private security forces do not undermine the Commission's confidence in those forces to provide adequate protection. The defense of our nation's critical infrastructure is a shared responsibility between the NRC, the DOD, the DHS, Federal and State law enforcement, and other Federal agencies.

Assessing Pakistan's Nuclear Security Upgrades after ratification of the 2005 CPPNM Amendment • Stimson Center - Stimson Center

Assessing Pakistan's Nuclear Security Upgrades after ratification of the 2005 CPPNM Amendment • Stimson Center.

Posted: Fri, 08 Oct 2021 07:00:00 GMT [source]

XIV. Regulatory Analysis

In the Commission's view, establishing set boundaries demarcating a division of responsibilities is neither possible nor desirable. Currently, these integrated response planning efforts include prearranged plans with local law enforcement and emergency planning coordination. Licensees also must comply with event reporting requirements to the NRC so that a Federal response is readily available, if necessary. Further, multiple commenters expressed concerns regarding the vulnerabilities of nuclear power plants and other licensed facilities to terrorist waterborne attacks. Commenters suggested that the revised DBTs should require nuclear power plants and other licensed facilities situated on navigable waterways to be equipped with visible, engineered physical barriers. After careful consideration, the Commission also chose not to adopt elements related to some EPAct factors as part of the rule text.

NNSA recognizes Design Basis Threat Implementation Team as 2020 Security Team of the Year

After soliciting and receiving comments from Federal, State, and local agencies, and industry stakeholders, and reviewing an analysis of intelligence information regarding the trends and capabilities of potential adversaries, the NRC imposed supplemental DBT requirements by order on April 29, 2003. The Commission deliberated on the responsibilities of the local, State, and Federal stakeholders to protect the nation and the responsibility of the licensees to protect individual nuclear facilities before issuing the April 29, 2003 DBT Orders. The DBT requirements in 10 CFR 73.1 describe general adversary characteristics that designated licensees must defend against with high assurance.

Directives, Guidance, and Delegations

“The nuclear security measures a country adapts should always correspond to the threat posed to nuclear and other radioactive materials. The revised guidance provides a specific methodology for identifying physical and computer security threats applicable to both nuclear and other radioactive materials. On the basis of this updated methodology, the IAEA can tailor bespoke assistance focussing on a country’s specific needs and available resources,” said Kristof Horvath, Head of the IAEA’s Nuclear Material Security Unit.

Group I: Consideration of the 12 Factors in the Energy Policy Act

design basis threat

Although authority recently granted the Commission under the EPAct of 2005 will allow the Commission to authorize the use of more sophisticated weaponry, the most powerful weapons and defensive systems will remain reserved for use only by the military and law enforcement. Thus, it would be unreasonable to establish a DBT that could only be defended against with weapons unavailable to private security forces. In addition, the Commission previously decided not to require licensees to defend against attacks by “Enemies of the State” as defined by 10 CFR 50.13. Finally, aircraft attack, another threat likely to result in fires was also considered and studies analyzing the consequences of successful commercial airline attacks were performed.

The IAEA trains experts from numerous countries on using DBT and RTS by providing practical workshops. Using examples of potential physical and cyber threats, scenarios, and case studies, as well as interactive exercises based on a hypothetical nuclear facility, the workshops allow the IAEA to assist participants build their capacity in nuclear security. Attendees, therefore, gain experience in how to adapt the methodologies outlined in the guidance to their national specificities and consider situations beyond their national borders.

Thus, they suggest that because the proposed rule did not contain specifics of the DBTs, the NRC is free to change the specific requirements without notice to the public, effectively conducting a secret rulemaking in violation of the APA. National Guard, local law enforcement and other non-licensee security personnel already stationed at the owner-controlled boundary or entry portals of some licensee facilities are not part of the licensee workforce and not subject to NRC regulatory authority; hence, they are considered beyond the scope of the DBTs. Typically, these organizations have their own internal screening procedures to determine reliability and trustworthiness. The NRC recognizes that those processes exist and provide an appropriate level of assurance against an insider threat to that organization. Furthermore, first responders, law enforcement, and National Guard personnel are not given unescorted access to the Protected Area (PA).

Webinar on National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements

The NRC FOF exercise program is designed to provide a realistic evaluation of the proficiency of licensee security forces against a threat consistent with the supplemented DBTs reflected in the orders issued by the Commission on April 29, 2003. After the attacks of September 11, 2001, the agency has expanded and refined its FOF program to make the exercises more realistic. These changes have significantly increased the level of complexity for each exercise in terms of planning, preparation, and logistical support. It should also be noted that most RTRs possess limited quantities of nuclear material on-site, and that the nature and form of this material is not easily dispersed or handled. As a result, the NRC has determined that RTRs pose a relatively low risk to public health and safety from potential radiation exposure and has tailored the security requirements and oversight for these facilities consistent with their relatively low risk.

The Commission's consideration, public comments, and responses to the public comments are provided for the 12 factors described in Section A. Finally, the International Physical Protection Advisory Service (IPPAS) is a critical component of the IAEA’s work in nuclear security. IPPAS missions review the threat assessment methodology employed by the host nation and assist the strengthening of national nuclear security systems and measures. Potential external adversaries include terrorists and other criminals who might seek to use nuclear or other radioactive material for malicious purposes, or to sabotage a facility. Insiders are individuals with authorized access to facilities, activities or sensitive information who could commit malicious acts or help external adversaries to do so.

The amendments to 10 CFR 73.1 reflect requirements currently in place under existing NRC regulations and orders. As of February 18, 2006, all power reactor licensees have implemented the enhancements to their EP programs with the exception of the drill and exercise program. A majority of nuclear power plant licensees indicated that adoption of the security-based EP drill and exercise program is contingent on NRC and the Department of Homeland Security (DHS) endorsement.

As shown by the unavailability of a number of blackstart generating units in ERCOT this past February, it is far from clear that the existing blackstart infrastructure is sufficient to rapidly recover from these new and emerging threats. All Transmission Operators are required to have blackstart plans in order to restart their systems and eventually tie each restarted system into a stable, interconnected grid.[3] These plans, which are updated as blackstart resources retire, new resources are added, and system topology changes, have been in place for decades. One change is being made to the rule to add a cyber threat as an explicit element of the DBT rule for both external and internal adversaries. The NRC has granted and continues to grant exemptions when a licensee meets the criteria of 10 CFR 50.12 and demonstrates that the alternate means provide an adequate level of fire safety.

Furthermore, transportation of the MOX fuel assemblies to Catawba will be done by the Department of Energy's (DOE's) Office of Secure Transportation, that has legal responsibility for the MOX fuel assemblies until custody is transferred to the licensee. Afterwards, the spent MOX fuel is cooled and stored like other spent fuel on site and is subject to the radiological sabotage DBT while stored in the spent fuel pool inside the Protected Area of the plant. NNSA’s security risk management philosophy is based on establishing and maintaining a graded approach and defense-in-depth safeguards. The DBT policy the team developed is designed to represent a set of goals for the planning and implementation of Departmental safeguards and security programs for the next three to five years. Developing a series of DBTs can help ensure that grid planners have a reasonable basis to plan for blackstart to rapidly recover from successful attacks.

No comments:

Post a Comment

Inclusive Design: Definitions, Principles & Examples

Table Of Content Inclusive Design vs Universal Design vs Design For All vs Accessibility: Related but Distinct Concepts Think about the diff...