Publication Date: 4/1/80
Pages: 39 Date Entered: 2/23/84 Title: STANDARD FORMAT AND CONTENT OF A LICENSEE PHYSICAL PROTECTION PLAN FOR STRATEGIC SPECIAL NUCLEAR MATERIAL IN TRANSIT April 1980 U.S. NUCLEAR REGULATORY COMMISSION REGULATORY GUIDE OFFICE OF STANDARDS DEVELOPMENT REGULATORY GUIDE 5.60 STANDARD FORMAT AND CONTENT OF A LICENSEE PHYSICAL PROTECTION PLAN FOR STRATEGIC SPECIAL NUCLEAR MATERIAL IN TRANSIT Use of the Standard Format The licensee should follow, as nearly as possible, the numbering system of the Standard Format in Parts I and II of this guide. if certain subsections are not applicable, this should be clearly stated and sufficient information should be provided to support that conclusion. The licensee may expand on the information provided, as necessary, to adequately cover any safeguards measures unique to the licensee's operation. Upon completing the plan, the licensee should use the table of contents of the Standard Format as a checklist to ensure that each subject has been addressed. Style and Composition A table of contents should be included in each submittal. The licensee should clearly and concisely present all information. Confusing or ambiguous statements and general statements of intent should be avoided. Definitions and abbreviations should be consistent throughout the submittal and in keeping with generally accepted usage. Wherever possible, duplication of information should be avoided. Thus, information already included in other NRC-required physical protection plans, e.g., the licensee's Site Physical Protection Plan and Safeguards Contingency Plan, may be covered by specific reference to the appropriate sections of those documents. Drawings, diagrams, maps, and tables should be used when information may be presented more adequately or conveniently by such means. These illustrations should be located in the section where they are first referenced or in appropriately referenced appendices. All information presented in drawings should be legible, symbols should be defined, and drawings should be large enough (not unduly reduced) to be read by an individual having normal vision. Physical Specifications of Submittals All material submitted in an application should conform to the following physical dimensions of page size, quality of paper and inks, numbering of pages, etc.: a. Paper Size Text pages: 8-1/2 x 11 inches. Drawings and graphics: 8-1/2 x 11 inches is preferred; however, a larger size is acceptable if the finished copy when folded does not exceed 8-1/2 x 11 inches. b. Paper Stock and Ink There should be suitable quality in substance, paper color, and ink density for handling and for reproduction by microfilming. c. Page Margins A margin of no less than 1 inch should be maintained on the top, bottom, and binding side of all pages submitted. d. Printing Composition: text pages should be single spaced. Type face and style: must be suitable for microfilming. Reproduction: may be mechanically or photographically reproduced. All pages of the text may be printed on both sides. Images should be printed head to head. e. Binding Pages should be punched for looseleaf ring binding. f. Page Numbering Pages should be numbered sequentially within each section. Do not number the entire report sequentially. g. Format References References to this Standard Format should be made by part, chapter, and section number. Procedures for Updating or Revising Pages The updating or revising of data and text should be on a replacement-page basis. The changed or revised portions of each page should be highlighted by a vertical line. The line should be in the margin opposite the binding margin for each line changed or added. All pages submitted to update, revise, or add pages to the report should indicate the date of the change. The transmittal letter should include an index page listing the pages to be inserted and the pages to be removed. When major changes or additions are made, pages for a revised table of contents should be provided. Number of Copies, Address, and Schedule for Submittal The licensee should submit six copies of his Physical Protection Plan to the Director, Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission, Washington, D.C. 20555, in accordance with the provisions of paragraph 73.20(c) of 10 CFR Part 73. Public Disclosure and Classification The NRC has determined that the public disclosure of the details of physical protection plans and programs is not in the public interest. Such details are withheld in accordance with paragraph 2.790(d) of 10 CFR Part 2. INTRODUCTION This regulatory guide describes the standard format and content suggested by the Nuclear Regulatory Commission (NRC) for use in preparing Physical Protection Plans for strategic special nuclear material (SSNM) in transit. By using this guide for preparing a Physical Protection Plan and Physical Protection Arrangements for Specific Shipments, the licensee will minimize administrative problems associated with the submittal, review, and approval of the plan. Conformance with this guide is not required by the NRC. A licensee who uses a format that will provide an equal level of completeness and detail and that will satisfy the requirements of the applicable NRC regulations may use his own format. However, the format and content herein presented are acceptable to the NRC staff. The Atomic Energy Act of 1954, as amended, directed the Atomic Energy Commission (AEC) to regulate the receipt, manufacture, production, transfer, possession, use, import, and export of special nuclear material (SNM) in order to protect the public health and safety and to provide for the common defense and security. The Energy Reorganization Act of 1974 transferred all the licensing and related regulatory functions of the AEC to the NRC. The principal requirements for physical protection of licensed activities against theft and radiological sabotage of SSNM in transit are contained in 10 CFR Part 50, "Domestic Licensing of Production and Utilization Facilities," Part 70, "Domestic Licensing of Special Nuclear Material," and Part 73, "Physical Protection of Plants and Materials." Paragraph 50.34(c) of 10 CFR Part 50 and paragraphs 70.22(g) and 70.22(h) of 10 CFR Part 70 identify the physical protection information that must be provided in a Physical Protection Plan as part of a license application. This plan is required in order for the licensee to comply with specific physical protection requirements of 10 CFR Part 73 and must be submitted with each application for a licensee to possess or process SSNM or for a license authorizing the transport or delivery of SSNM. The information in this guide applies to any the NRC licensee or applicant for an NRC license who anticipates transporting or delivering uranium-235 (contained in uranium enriched to 20 percent or more in the U-235 isotope), uranium-233, or plutonium alone or in any combination in a quantity of 5000 grams or more, computed by the formula: grams = (grams contained U-235) + 2.5 (grams U-233 + grams plutonium). As developments and changes in the nuclear industry occur, the Commission's requirements for information may need modification. Revisions to this Standard Format will be made, as necessary, to accommodate these changes. Purpose and Applicability This regulatory guide has been prepared as an aid to uniformity and completeness in preparing and reviewing the Physical Protection Plan, which is a prerequisite for a license for transporting or delivering SSNM. Amplification and clarification of the protection arrangements to be made for each individual shipment of SSNM are also provided. The information requested in this Standard Format is the minimum necessary for an acceptable Physical Protection Plan. Additional information may be required during the staff review of a particular plan. It is also the licensee's responsibility to be awaae of applicable new and revised NRC regulations. The information provided should be up to date with respect to the state of technology for the physical protection techniques and systems that the licensee proposes to use. Information and procedures that are delineated in the regulatory guides in Division 5, "Materials and Plant Protection," and that are appropriately contained in certain sections of the licensee's Physical Protection Plan for fixed sites may be incorporated by reference. Upon receipt of a Physical Protection Plan for review and approval, the NRC staff will perform a preliminary review to determine whether the plan is reasonably complete. The staff will use the Standard Format as a guideline to identify the necessary information. If a licensee does not provide a reasonably complete presentation of the necessary information, further review of the plan may be suspended until the needed information is provided. Organization of This Document This document is divided into two parts. Part I provides the standard format and content to be used for submittals of the Physical Protection Plans for SSNM in transit. Each section in Part I is referenced to the portions of the regulations that apply to that section, the reference provided in brackets following the section heading. Also, the sections in this part are divided into two subsections entitled "Intent" and "Content." The "Intent" subsections are exclusively explanatory in nature and are provided to give the licensee additional information regarding the purpose for including such provisions in the regulations and the relationships between the different provisions. Examples of subsystems and procedures that may be used in different situations to achieve the capabilities required in the regulations are also provided, including references to pertinent sections of the reference safeguards system described in section 73.26. This type of information should aid the licensee in designing a well-balanced, integrated physical protection system that can meet all the performance capability requirements. The "Content" subsections provide detailed guidance on the information to be included in the Physical Protection Plan submittals and the standard format to be used to ensure that the plans submitted are complete and in a form that can be easily reviewed by the NRC staff. Part II contains standard format and content information relating to submittals of Physical Protection Arrangements for Specific Shipments. These submittals are intended to supplement the Physical Protection Plan submittal with changes in physical protection subsystems and procedures that will be effective for a given shipment plus specific scheduling information and other arrangements that cannot be determined very far in advance of the date for a specific shipment. In addition to the Physical Protection Plan and the arrangements for specific shipments, licensees are also required to submit plans for guard qualification and training programs and Safeguards Contingency Plans. All these plans together comprise the physical protection system required to be provided by licensees who are involved in the transportation of strategic special nuclear material; therefore, they all should be consistent with one another. Thus the Physical Protection Plan for transport of SSNM and individual submittals of Physical Protection Arrangements for Specific Shipments should be appropriately marked and handled accordingly. Other related proprietary or classified information should be clearly identified and submitted in accordance with applicable directives. Each such submittal of proprietary or classified information should be accompanied by the licensee's detailed reasons and justifications for requesting exemption from public disclosure, as required in paragraph 2.790(b) of 10 CFR Part 2. Compatibility The licensee should ensure that the Physical Protection Plan for transport of SSNM is compatible with applicable parts of all other physical protection plans, including the Site Physical Protection Plan, separate submittals of Physical Protection Arrangements for Specific Shipments, the Safeguards Contingency Plan, and plans for guard qualification and training programs. Chapter 1 GENERAL ISSUES 1.1 Purpose and Scope Intent The primary purpose of a licensee's plan for the physical protection of strategic special nuclear material (SSNM) in transit is to assist in the NRC review of the adequacy of the licensee's physical protection system relative to the particular routes or itineraries proposed in the plan. However, after the plan has been approved by the NRC, it could become a guide for the licensee's security personnel in the implementation of the licensee's physical protection system for SSNM in transit. Content Describe the purpose of the Physical Protection Plan and characterize its contents. Indicate the additional types of information to be found in the Physical Protection Arrangements for Specific Shipments (prepared for each shipment in accordance with Part II of this guide) that would complete the description of the physical protection system for a given shipment and that would describe in detail the actual shipment itinerary and schedule. 1.2 Safeguards Contingency Plan [Section 73.25(d)(1)(ii), (d)(1)(iii), Appendix C to Part 73]Intent A predetermined plan to respond to safeguards contingency events is required to be prepared, based on personnel and other physical protection resources described in the Physical Protection Plan for SSNM in transit. Specific requirements for the contingency plan are provided in Appendix C, "Licensee Safeguards Contingency Plans," to 10 CFR Part 73. Regulatory Guide 5.56, "Standard Format and Content of Safeguards Contingency Plans for Transportation," provides guidance for the preparation of transportation contingency plans. The licensee is reminded that all three submissions--the Physical Protection Plan, the Physical Protection Arrangements for Specific Shipments, and the Safeguards Contingency Plan--together describe the system for physical protection of each particular shipment. They should be developed and maintained to be completely consistent with each other for each shipment. Content Describe briefly the Safeguards Contingency Plan prepared in accordance with Appendix C to 10 CFR Part 73. Relate it to the Physical Protection Plan and Physical Protection Arrangements for Specific Shipments. 1.3 Security Organization Training, Equipment, and Qualifications [Section73.25(d)(1)(i), (d)(1(iv), (d)(1)(v), Appendix B to Part 73]Intent The purpose of these requirements for the qualification and training of security organization personnel is to ensure that security organization members will be fully qualified, equipped, and trained and thoroughly familiar with the procedures and equipment they will use during the progress of a shipment. These requirements are detailed in Appendix B, "General Criteria for Security Personnel," to 10 CFR Part 73 and are cited also in the reference system [section73.26(d)(4) and (d)(5)]. The requirements generally are that each security organization member be able to perform at least those duties described in the Physical Protection Plan that he might reasonably be assigned. The specific description of qualification and training of security organization members will be provided as part of a separately prepared and submitted document entitled "Transportation Security Organization Training, Equipment, and Qualifications Plan." That plan should be consistent with the Physical Protection Plan with regard to the numbers of personnel, the equipment described, and the tasks to be performed by security organization personnel. In particular, the physical and performance characteristics of firearms carried by or immediately available to armed escorts and armed response personnel are described in Appendix B to 10 CFR Part 73. Although all three types of weapons described--semiautomatic rifles, shotguns, and sidearms--would normally be expected to be carried by, or immediately available to, these personnel for the physical protection of road and rail shipments and at transfer points, sidearms alone would normally be considered sufficient armament for armed escorts on aircraft and ships. Content Affirm that a Transportation Security Organization Training, Equipment, and Qualifications Plan has been submitted to the NRC according to the requirements set forth in Appendix B to 10 CFR Part 73. Affirm also that such plan is consistent with this plan as to equipment and the number of security personnel required to implement the physical protection system described herein. Briefly relate the two plans to ensure that all members of the security organization will be adequately qualified and trained to perform the duties normally assigned them. Refer to the Transportation Security Organization Training, Equipment, and Qualifications Plan to describe the equipment (e.g., armored escort vehicles, firearms, night vision equipment) that will be used by the escorts to protect themselves as well as to perform the tasks assigned to them. 1.4 Security Management [Section73.25(d)(1)(i)]Intent Security organization management is a crucial component of the physical protection system. Some specific security management considerations are provided in paragraphs 73.26(d)(2) and (d)(3) of the reference system. The management of the security organization is the vital link between the licensee and those responsible for direct implementation of the overall plan for physical protection of a shipment. Thus, it is necessary to have a detailed description of the licensee's plan for management of the security organization to understand fully how the Physical Protection Plan will be implemented. Content Refer to the Security Management section of the Transportation Security Organization Training, Equipment, and Qualifications Plan to briefly describe the security organization management structure. Affirm that this structure will ensure that the physical protection system will not fail to function for lack of the presence of a member of the security organization with proper authority to conduct security-related functions performed at the movement control center. 1.5 Testing and Maintenance Program [Section 73.20(b)(3)]Intent This provision requires a testing and maintenance program. This program is to ensure that all activities and devices on which the physical protection system depends to maintain shipment security continue to be available to the physical protection system in a reliable and effective manner. It also is intended to ensure that the level of protection represented in the Physical Protection Plan submitted does not deteriorate through neglect, disuse, or inappropriate substitution of system components. Content Describe the program to regularly test and inspect all components (design features, equipment, vehicles, and procedures) of the physical protection system to ensure that the design, construction, and operation of all security-related components will continue to be substantially as described in the currently approved Physical Protection Plans. Include a description of how these programs will be managed, the lines of authority for such management, and the schedule for licensee management review of the adequacy of the physical protection system. Describe the program to provide routine preventive maintenance for all security-related equipment, vehicles, and design features in the physical protection system. Include the components covered by the program and the operations and supervisory personnel who will implement the program. Also describe the capability of the escort force to make emergency repairs en route. Describe the circumstances under which such emergency repairs might be required. 1.6 Security Records [Section 73.70]Intent Certain types of records regarding shipments of SSNM must be kept (see Section 73.70). These requirements are intended to produce a verifiable record to show that appropriate detailed planning functions were carried out for each shipment and to expedite timely and efficient tracing of any missing shipment. Content Describe the recordkeeping program designed to keep track of all licensee personnel who were authorized access to SSNM in transit, other persons who were authorized access, other persons who may have had access to SSNM in transit, and other security-related matters. Include documentation of security assignments, tests, inspections, and audits performed on the physical protection system. Also include logs of previous shipments and other information relating to specific routes and modes of transport such as carriers, major roads used, or flight numbers, as specifically required by Section 73.70. 1.7 Reports to NRC [Section 73.71]Intent This provision is designed to ensure that the NRC will be apprised of all security-related incidents that occur during shipments of SSNM. Thus the NRC will be able to continually update its knowledge, both of threats posed to such shipments and of the ability of existing physical protection systems to deal with these threats. Content Describe the procedures to ensure that NRC is provided with a full accounting of all contingency incidents necessitating reports to the NRC, as detailed in Section 73.71. Include a description of the management structure and procedures to ensure compliance. 1.8 Redundancy and Diversity [Section 73.20(b)(2), Section 73.25(d)(4)]Intent It is required that the physical protection system be designed with redundant and diverse measures. This is to ensure that the system will remain capable of providing the necessary level of protection under adverse conditions that could cause the failure of some system elements. Redundancy means providing several measures (which may be the same measure duplicated) to perform the same function or subfunction. This would prevent failure of the entire system if there were failure of one or more system elements. Diversity means providing several different kinds or types of measures that contribute to the performance of a particular security function or subfunction. Providing different measures with differing characteristics (e.g., sensitivities, failure modes, strengths, weaknesses) ensures continued performance of a given capability despite adverse operational conditions, attempts at system sabotage, or exploitation of a given measure. The reference system provides redundancy in communications between the escort force and the movement control center (paragraph 73.26(i)(6) for road shipments and paragraph 73.26(k)(4) for rail shipments). The reference system also suggests "corrective action procedures and compensatory measures" to ensure that "the effectiveness of the physical protection system is not reduced by any single failure or other contingencies affecting the operation of the physical protection related equipment or structures" [paragraph 73.26(h)(5)]. The licensee also must be able to communicate with local law enforcement authorities if the escorts are attacked. Routine operating procedures must be designed to ensure that a single adversary attack cannot destroy the armed escorts' capability to notify the local law enforcement authorities of the need for assistance [paragraph 73.25(d)(4)]. (This would be accomplished in the case of road shipments, for example, by proper spacing and randomly varying the distances between the transport and the escort vehicles.) The assurance of the survivability of a communications capability would normally be included under the general redundancy and diversity requirements of paragraph 73.20(b)(2). However, the integrity of this particular communications capability is considered so crucial to the primary mission of the physical protection system that it has been stated as a separate capability in paragraph 73.25(d)(4). This capability is also referred to in the reference system [paragraph 73.26(f)(2)] in the context of transfer operations procedures. Generally, the licensee has the responsibility for determining where measures for redundancy and diversity may need to be designed into the physical protection system and for designing the system accordingly. Content Describe the portions of the physical protection system that have been reinforced with redundant or diverse measures to provide assurance of continued capability to protect a shipment during adverse conditions or attacks. Include, in particular, a description of physical protection subsystems and procedures that ensure that a single adversary attack cannot keep the armed escorts from notifying local law enforcement authorities of the need for assistance. PART I PHYSICAL PROTECTION PLAN Chapter 2 SHIPMENT PLANNING AND CONTROL 2.1 Preplanning of Shipment Itineraries [Sections 73.25(b)(1)(i) and (d)(3)]Intent The intent of this requirement for preplanning of shipment itineraries is to decrease the vulnerability of SSNM shipments and to increase the ability of response forces to assist the escorts if a problem arises. Route preplanning can help accomplish this objective. It can determine areas where a shipment would be vulnerable to attack (e.g., scenes of recent natural disasters, labor dispute areas) and avoid these areas. It can minimize the stops required. It can minimize layover (storage) time. It can select routes allowing minimum interruption in communications with the movement control center. The route itinerary and scheduling information resulting from preplanning can familiarize escort and movement control center personnel with the route for a particular shipment. This familiarity will help ensure quick response to any emergencies that may arise. Establishing liaison with local law enforcement authorities (LLEAs) to arrange for assistance along routes will ensure that the LLEAs are familiarized beforehand with the types of assistance they could be asked to provide SSNM carriers. The preplanning function will usually involve the determination and detailed consideration of several alternative routes and rest stops along each route that generally would be acceptable for SSNM shipments. However, the final selection of one of these alternative routes or of particular rest stops for a specific shipment will depend on the most current information available about conditions along each route. Such information will be obtained and maintained according to the procedures described in Section 2.2 of the Physical Protection Plan (see Section 2.2 of Part I of this guide). Sufficient flexibility should be incorporated in the planning of shipments to avoid regular patterns as suggested in the reference system [paragraph 73.26(b)(1)]. Other specific considerations related to the preplanning capability are in the following sections of the reference system: paragraphs 73.26(b)(2) and (3) and 73.26(c) for general information; paragraph 73.26(i)(1) for road shipments; paragraphs 73.26(j)(1), (2), (4), and (8) for air shipments; paragraphs 73.26(k)(1) and (3) for rail shipments; and paragraphs 73.26(l)(1), (2), (3), (5), (6), and (8) for shipments by sea. Content 1. Planning and Scheduling Considerations. Discuss provisions to ensure that the transit times of SSNM shipments will be minimized and that routes will be selected to avoid areas of natural disaster, civil disorder, or other similar threats to the security of the shipment. Also discuss provisions to ensure that shipments will encounter minimal, if any, storage times and that delivery will be made to the receiver as soon as possible after arrival at the final destination. 2. Itinerary Information. The itineraries (or routes) described in this section of the plan should show the following detail: (a) that the licensee has a comprehensive understanding of conditions and situations that may occur on the route, (b) that the licensee will use this knowledge to avoid areas imposing excessive and unnecessary demands on the escort force or unnecessarily increasing the vulnerability of the shipment, and (c) that the licensee will be prepared to take any necessary action when the shipment must pass through areas of high vulnerability. Information on planned itineraries routinely used in the transport of the SSNM covered by this Physical Protection Plan should be presented in this section, either directly or by referring to the pertinent appendices of the plan. For brevity and clarity of presentation in the body of the plan, this information is best presented in appendices. Information contained in the licensee's Safeguards Contingency Plan may be referenced to the extent it is applicable. Separate appendices or sections should be used for each itinerary. These may be referred to in preparing submittals of Physical Protection Arrangements for Specific Shipments while noting any changes or updating route information, as necessary. (See Regulatory Guide 5.57, "Shipping and Receiving Control of Special Nuclear Material." See also Regulatory Guide 5.56 for examples of charts and tables describing itineraries.) For each route, the itinerary information should include route segment identifications; pertinent time and distance factors; and locations of LLEA facilities, possible rest stops, transfer points, and points where there are changes in transportation mode. If some of the information requested is not available at the time the plan is submitted, it may be deferred and included instead in the Physical Protection Arrangements for Specific Shipments. Tables and charts needed for presentation of the itinerary information are described below: a. Route Overview--a graphic display of the overall route, including road, rail, air, and sea transportation segments. It may be presented on one or more sheets. It may be a line diagram or it may be depicted on a road or topographical map. The map or diagram should be large enough in scale to indicate clearly the pertinent information just described. The planned route segments should be indicated clearly on the display. They should be easily correlated with the pertinent LLEAs and recognized geographic features (e.g., roads, terminals, waterways) forming the boundaries of the segments or otherwise referred to in the plan. The segments may be defined according to the boundaries of the jurisdictions of the pertinent LLEAs. The origin and destination of the itinerary should be clearly indicated. Alternative route segments may be appropriately indicated as alternative route segments of the original route or may be described separately. Route segments should be numbered, or otherwise identified, by an appropriate code. b. Route Segment Descriptions--a table showing the following information for each route segment: (1) Number or identification code of the route segment. (2) Segment boundaries (start and end points). (3) Number of persons included in escort force. Describe also the source and number of armed response personnel other than escort force members expected to be available at transfer or other points included in the segment. Refer, if necessary, to the Transportation Security Organization Training, Equipment, and Qualifications Plan. (4) Average estimated time to complete the segment. (5) Provisions for escort force personnel to sleep or rest during traversal of the segment. Locations of possible refueling and rest stops on the route. (6) Departure points for leaving planned route and embarking upon alternative route segments. c. Liaisons with LLEAs--a table listing the LLEA information for each route segment. Include the LLEA organization name and the person contacted (plus his title and phone number within the organization). Briefly describe the arrangement that exists between the LLEA and the licensee concerning possible calls for assistance. Index this information to the numbering or other code used for identifying route segments above. The licensee should describe the information given LLEA organizations to familiarize their personnel with the unique types of challenges they may face if called to aid a shipment carrier within their jurisdiction. 2.2 Maintaining Knowledge of Route Conditions and Shipment Status [Section 73.25(b)(1)(ii) and (iii)]Intent The provision for updating route information is to ensure that the route selection process uses the most up-to-date information available to avoid placing the shipment on a course with unusual hazards to shipment security. After the shipment has begun to move, further updating of route information ensures that development of hazardous conditions that could affect shipment security is discovered soon enough that itinerary changes may be considered to allow the security organization to avoid, or prepare for coping with, such conditions. The provision for updating knowledge of shipment status is intended to ensure that the movement control center becomes aware of any unusual conditions encountered by the escort force during the shipment. This provision is also designed to allow a full understanding of reasons for any disruption in communications capability with the transport and its escort force because of emergency or equipment failure. Detailed guidance to response forces on where to begin looking for a missing SSNM shipment is also to be provided. Subsystems and procedures for maintaining knowledge of route conditions as the shipment progresses may include elements independent of the escort force itself to ensure that collection of such information is obtained in a timely fashion, despite other duties escorts will have to perform during the shipment. Such procedures may include contacts with LLEAs, local news media, wire services, or weather services. Also, in the case of road shipments, escorts may be dispatched ahead of the transport to ascertain that upcoming rest or fuel stations, transfer points, or other critical locations are free of suspicious activity, civil disorders, or other threatening conditions for which special precautions must be taken or preparations made. The physical protection system may include procedures for the movement control center to obtain shipment position and status information from the escort force on a prescheduled basis that has been mutually agreed on. This will allow determining as soon as possible when difficulties that prevent direct communications arise. Such procedures may involve, for example, check-in reports by the escort force at periodic time intervals or at predetermined milestones such as at all transport stops, at transfer points, or on crossing over from one route segment to another. These procedures may also incorporate a method for the movement control center to determine whether updating information they receive on the status of the shipment is authentic or is provided under duress. Also, various means may be employed to ensure that the movement control center becomes aware of when the updating information on the shipment status becomes critically overdue. The following sections in the reference system apply to the suggested capability for updating the information on the status of the shipment: paragraph 73.26(i)(6) for road shipments, paragraph 73.26(k)(4) for rail shipments, and paragraph 73.26(l)(7) for sea shipments. Note that although there is no suggestion for periodic check-in reports during the air segments of a shipment, the movement control center must still possess the capability for maintaining knowledge of the status of air shipments. This function, however, may be performed by periodic check-ins or, independently of the shipment, by the movement control center's monitoring flight status through airport authorities to determine if the flight is overdue or still on course. Also, check-in reports by the escort force immediately before takeoff and just after landing could narrowly circumscribe when the aircraft is in actual flight. Content Describe subsystems and procedures employed by the movement control center to maintain knowledge of route conditions from the time shortly before the shipment begins movement through the duration of the shipment and to determine the significance of such information for the continued safety and security of the shipment. This description should include the means employed to obtain information from diverse sources and to filter it to determine its significance, as well as the means to store and retrieve previously obtained information, if applicable. Describe procedures employed by members of the escort force to obtain, while en route, information regarding upcoming route conditions. Describe any means used to determine information source authenticity and whether information obtained directly from the escort force is being provided under duress. Also describe the process for ensuring that appropriate action will be taken if the required information is not obtained in a timely manner (i.e., according to preplanned schedule). Refer, if necessary, to the Responsibility Matrix and other parts of the Safeguards Contingency Plan. 2.3 Determination of Alternative Itineraries [Section 73.25(b)(1)(iv)]Intent During a shipment, events that would affect the shipment's security may occur, were the shipment to continue upon its predetermined itinerary. In such cases, prudence may dictate certain changes in the schedule or itinerary that would decrease the vulnerability of the shipment. This provision is designed to ensure that a capability to rapidly and intelligently determine and communicate such changes is established in advance. It would probably be most desirable if such changes were made within the context of alternative route plans already prepared for use in such contingencies and already familiar to the escort force and the movement control center. To ensure the continuity of the high level of protection provided the shipment, these procedures also will usually include contacting LLEAs to inform them of any changes in shipment schedule or itinerary that would affect them. Content Describe procedures to determine and implement alternative itineraries when such changes become necessary. Describe the process by which the decision to change an itinerary or schedule is made. Specify who has final authority to make such decisions. Refer, if desired, to the appropriate sections of the Safeguards Contingency Plan. Chapter 3 DETECTION AND DELAY OF UNAUTHORIZED ACCESS OR MATERIALS INTRODUCTION BY STEALTH OR FORCE These sections cover detection and delay of unauthorized access or introduction of materials into the vicinity of SSNM or SSNM transports by stealth or force when the transport is either moving or stationary. 3.1 Establishment of Controlled Access Areas [Section 73.25(b)(2)]Intent These provisions are designed to set up a restricted area surrounding the transport or the SSNM (when located outside the transport or aboard moving transports) in order to isolate the transport or SSNM and decrease the number of personnel, materials, equipment, and vehicles allowed to come in contact with the transport or the SSNM. This controlled access area simplifies preventing unauthorized access of persons or materials into the transport or into the immediate vicinity of the SSNM. It ensures that only persons or materials required to have such access to perform essential functions are in the area at any given time. Unauthorized persons would be discouraged from attempts at penetrating the controlled access area and normally would be detained at its perimeter. Establishing controlled access areas would have the following effects: (1) it would limit opportunities for attempted unauthorized access to the transport or SSNM by stealth, (2) it would increase the probability of detection of persons possessing significant amounts of tools, explosives, or other unauthorized materials useful for purposes of committing radiological sabotage or of gaining unauthorized access to the SSNM, and (3) it would ensure that attempts to penetrate the transport or to misappropriate SSNM by force will be resisted sooner with more chance of preventing theft or sabotage. Controlled access areas are defined in paragraph 73.2(z) in terms of two basic attributes: (1) there must be a means of demarcating the area's boundaries that is clear to both authorized and unauthorized personnel and (2) there must be some way of controlling access to the area at all times to ensure that unauthorized personnel are not admitted. The plan should address the establishment of controlled access areas, where applicable, in two somewhat different types of situations, i.e., both at transport stops and aboard moving transports. Some types of transports such as certain aircraft, rail cars, and road transports may not need to be protected by the establishment of a controlled access area while they are in motion. This is because the cargo compartments of such transports are not normally accessible to persons on board the moving transport and, further, would be inaccessible to persons on the ground by virtue of the transport's motion. Special provisions for protection may still be required in instances where the transport slows sufficiently to allow access (e.g., slow-moving trains, road transports at toll booths or traffic signals). Aboard trains or large ocean-going vessels where unauthorized persons may possibly gain access to the SSNM, controlled access areas may need to be established. A secured cargo compartment may serve as a controlled access area on board such moving transports. In considering the space to be included in a controlled access area aboard a moving transport, the precise object to be considered the "transport" may vary according to the mode of transportation involved. "Transport," as defined in paragraph 73.2(cc), includes any vehicle for "land, sea, or air conveyance or modules for these conveyances such as rail cars or standardized cargo containers." In the case of dedicated truck or aircraft, the entire vehicle can be considered the transport. Sometimes, a controlled access area must be established on board a nondedicated transport in order to isolate the SSNM from unauthorized persons occupying the remainder of the space on the transport (if it is physically possible for such persons to gain access to the SSNM while the transport is in motion). In the cases of large oceangoing vessels or a long train of rail cars, isolation of the entire conveyance may be impractical. Instead, aboard a specially designed ship (container ship), the standard multimode shipping container (which alternately serves as both a truck trailer or rail car mountable container) may be considered the transport. For rail transportation, the particular rail car containing the SSNM may be considered the transport. In these cases, the function of the controlled access area is to isolate the transport module (i.e., the rail car or standard shipping container) from the remainder of the conveyance of which it is a part. Alternatively, a secured cargo compartment may serve as a controlled access area aboard a moving transport. Access detection subsystems and procedures are required to detect penetrations of controlled access areas by unauthorized persons or materials. Detection is normally expected to occur at the time of penetration, which would permit a response sufficiently timely and effective to prevent the penetration (or attempted penetration) from resulting in the theft of SSNM and limit the opportunity for a potential adversary to complete actions of radiological sabotage. Of course, the considerations that persons or materials may already have been introduced aboard a moving transport for the purposes of sabotaging the transport, and that it may not be practical for the escorts to maintain effective control over the entire transport, limit the chances for protecting against sabotage to the entire transport. However, the physical protection system may effectively protect against actions of force and stealth aimed specifically at the SSNM or the transport module in which the SSNM is contained. This protection would be designed to limit the opportunities for a potential adversary to cause significant dispersals of SSNM by direct attack on the transport or on the SSNM through actions of stealth or force. Detection of unauthorized penetrations of controlled access areas at transport stops will normally be accomplished by escorts who will maintain constant surveillance over the SSNM or transport. For longer periods such as overnight storage, intrusion alarms may be useful. Storage of the shipment within a protected area maintained at a fixed site by an NRC licensee would satisfy the requirements for a controlled access area. The reference system delineates several safeguards measures that usually will be included in the physical protection system to satisfy the performance capability requirements for the detection of unauthorized penetrations of controlled access areas at transport stops and transfer points [paragraphs 73.26(f)(2), (i)(7), (j)(3), (k)(1), and (l)(4)]. Aboard moving transports, either guard surveillance (either direct or by using closed circuit television (CCTV)) or intrusion alarms may be used to detect unauthorized penetrations of the controlled access area. If a secured cargo compartment or a standard cargo container is used and is determined to be generally not accessible to unauthorized personnel (e.g., due to other containers stacked around and above it), a procedure for the use of tamperindicating seals and inspections may be a suitable means of access detection provided the SSNM is placed under constant surveillance whenever access by unauthorized persons becomes possible. Locks and seals on the containers would normally be examined at these times. (Locks and seals on individual packages or containers of SSNM could also be used to establish continued shipment integrity, should the shipping container seals be damaged in transit.) Communication and assessment functions associated with the access detection subsystems and procedures for controlled access areas should be capable of facilitating an appropriate response to detect penetration or attempted penetration of a controlled access area. This response is to be capable of meeting the threat described in paragraph 73.1(a). The details of the performance of these communications and assessment functions are to be discussed in the Safeguards Contingency Plan in the context of the overall response. Content 1. Controlled Access Areas at Transport Stops. Describe the different types of controlled access areas that will need to be established at transport stops, and describe the criteria to be used for selection of appropriate locations for such stops. Include those for rest stops and emergency stops for road transportation, intermediate ports of call for sea shipments, transfer points, etc. (Refer to the Safeguards Contingency Plan as necessary.) For each type of controlled access area described, include the transportation modes involved and the occasion for the transport stop being made. Briefly describe significant adverse conditions under which the controlled access area will be expected to function (e.g., crowds, traffic, availability of nearby cover). Provide for each of the different types of controlled access areas described, in combination or separately as appropriate, the following information: a. Demarcation of Controlled Access Areas. Describe how each controlled access area is to be demarcated in order to indicate to escort personnel and to other authorized and unauthorized persons that a particular area has been defined and that such area is restricted to authorized personnel only. Some examples include cordoning off the area with posted guards or erecting temporary barricades. b. Implementation Procedures. Describe procedures and criteria for escort personnel to select appropriate locations and arrangements (to the extent possible) for establishing controlled access areas. Describe procedures to be followed in establishing such areas with minimum delay when the specified occasion arises. The configuration and approximate dimensions of the controlled access area to be established in relationship to the transport or the SSNM should be included in this description. c. Access Control. Describe the barrier subsystems, procedures, or other devices employed to ensure that only authorized personnel will be allowed access to the controlled access area. These may include posted guards (escort personnel) responsible for detaining unauthorized persons or materials at the boundary of the controlled access area, appropriate physical barriers, or other means for delaying access to the controlled access area. d. Access Detection. Describe subsystems and procedures employed to detect and communicate any unauthorized penetration (or such attempts) of the controlled access area by persons, vehicles, or materials and to whom such detections would be communicated. Refer to the Responsibility Matrix of the Safeguards Contingency Plan as necessary. Discuss the interrelationship among the access control and detection subsystems and the procedures described above and the armed response capabilities in order to demonstrate that the combined systems can satisfy the general performance requirements of paragraph 73.20(a). 2. Controlled Access Areas Aboard Moving Transports. Provide descriptions of the types of controlled access areas to be established aboard moving transports. Include transportation mode involved, location of SSNM aboard the transport, and access points where unauthorized persons could gain access or unauthorized materials could be introduced into the vicinity of the SSNM in the absence of appropriate controls. Provide for each of the types of controlled access areas to be established aboard moving transports, in combination or separately as appropriate, the following information, similar to that included in descriptions of controlled access areas at transport stops: (a) demarcation of controlled access areas, (b) implementation procedures, (c) access control, and (d) access detection. Discuss the interrelationships among the access control and detection subsystems and procedures described above and the escort force (or other armed response personnel) response capabilities in order to demonstrate that the combined systems can satisfy the general performance requirements of paragraph 73.20(a). Refer to the Safeguards Contingency Plan as necessary. 3.2 Transport Features to Delay Access [Section 73.25(c)(2)(i)]Intent This provision is intended to ensure that the physical protection system takes into account in its overall scheme the degree of protection afforded by transport design features. Where possible, it is also intended to suggest the inclusion of design features in special-purpose transport vehicles that maximize the delay an adversary might encounter in attempting unauthorized penetration of the transport. Generally, only road transport vehicles will be specifically designed to include features that delay access to the cargo compartment in the event of attempted penetration through stealth or force. Such features in road transport vehicles are provided for in the reference system [paragraph 73.26(i)(3)]. However, licensees may also rely on the design features of other types of transports in the design of the overall physical protection system. Some examples are the structural strength of a particular type of rail car or affixing certain equipment to or temporarily altering the transport to improve its resistance to penetration. Additional locks may be installed. All such delay features may be considered as transport features relevant to this provision to the extent that they are specifically intended or relied on to delay the adversary's attempt at transport penetration. Content Describe transport(s) used to carry the SSNM. Describe design features affecting transport penetration resistance. State whether transportation vehicles or modules will be under the control of the licensee (owned, leased, or rented) or under the control of a contract or common carrier. Include drawings and specifications that describe the penetration-resistant features of the portion of the transport used to carry the SSNM (e.g., the means of securing access points and the construction of the transport's body shell). Penetration from all accessible points of attack, including the top and undersides of transports, should be considered. (See Regulatory Guide 5.31, "Specially Designed Vehicle with Armed Guards for Road Shipment of Special Nuclear Material.")3.3 Access Detection for Transports [Section 73.25(c)(2)(ii) and (c)(2)(iii)]Intent These provisions were designed to ensure that a detection capability that applies strictly to the transport, in addition to the detection capability associated with the controlled access area that may surround the transport, is provided in the physical protection system. This is to take into account that certain persons who may be authorized to enter the controlled access area may not be authorized to enter the transport itself. Some examples include transport operating crew members on ships, airplanes, and trains or transport service or maintenance personnel at stops. The smaller perimeter of the transport, in comparison with the controlled access area surrounding it, and the usually better-defined boundaries of the transport make practical a wider variety of access detection subsystems and procedures than might ordinarily be effectively employed in the case of a controlled access area. Access detection subsystems and procedures are needed under these provisions for many reasons. Unauthorized tampering with transports and cargo containers can be detected. Any unauthorized presence of persons or materials and any unauthorized attempt to penetrate the transport can be detected, assessed, and communicated so that the response can prevent SSNM theft. Tamper seals and inspections aid detection of tampering. Intrusion alarm systems and direct or remote (e.g., CCTV) surveillance aid detection of the actual presence of unauthorized persons within or adjacent to the transport or of attempts at unauthorized penetration. Seals do not detect SSNM theft during the act but do provide evidence that penetration has or has not occurred in the interims between inspections and can provide a useful record for tracing lost shipments should some SSNM be found missing. This nonpenetration assurance is also useful for eliminating the need to undertake more detailed inspection of transports in order to establish that there are no unauthorized persons or materials aboard a transport before loading if the transport has been previously inspected and sealed. Detection of unauthorized access to controlled access areas is generally limited to surveillance by escorts; however, remotely or locally annunciated intrusion alarm systems become practical and feasible for transports. The same individuals (escorts) may be made responsible for detecting unauthorized access to both the controlled access area and the transport contained within it. However, this provision makes the licensee responsible for demonstrating that these two functions can be adequately performed by the same personnel simultaneously. The licensee, for-example, would have to demonstrate that personnel within the controlled access area would not be likely to remain undetected in their attempts to covertly gain unauthorized access to the transport while the escorts were busy watching persons outside the controlled access area. Content 1. Tamper Indication [Section 73.25(c)(2)(ii)]. Describe the inspection and detection subsystems and procedures to detect unauthorized tampering with transports and cargo containers during transit and before loading. Include schedules for inspections and tamper-indicating features of transport and physical protection hardware. Acceptable devices and procedures for satisfying these provisions are contained in Regulatory Guide 5.15, "Security Seals for the Protection and Control of Special Nuclear Material." 2. Transport Access Detection [Section 73.25(c)(2)(iii)]. Describe the surveillance subsystems and procedures that will be used to detect, assess, and communicate any unauthorized presence of persons or materials within the transport and any unauthorized attempt to penetrate the transport. Also describe those that ensure that no unauthorized persons or materials are on board the transport before SSNM loading or on the escort vehicles (for road shipments) immediately before the trip begins. Specify which subsystems and procedures are to be used under given conditions and circumstances to ensure that a surveillance or detection capability exists at all times during shipment. If an alarm system is used, describe its tamper-resistant features and the location and means of annunciation. Relate the response to any annunciation of an alarm system or to any alarm transmitted by security personnel to the predetermined response indicated in the Safeguards Contingency Plan. Discuss the interrelationships and interdependencies of the transport access detection subsystems and procedures described here with other parts of the in-transit physical protection system, including the Safeguards Contingency Plan. Demonstrate how it will be ensured that detection of unauthorized access to or activities within the transport will allow a response timely and effective enough to prevent the unauthorized penetration or activity from resulting in SSNM theft. Chapter 4 DETECTION OF UNAUTHORIZED ACCESS OR MATERIALS INTRODUCTION BY DECEIT Access detection and control subsystems and procedures for protection against actions of stealth and force were described in Chapter 3 of the Physical Protection Plan (see Chapter 3 of Part I of this guide). They were designed to channel all materials and persons seeking introduction into controlled access areas or transports through established entry control points. The subsystems and procedures described in this chapter are designed to permit the screening of all persons and materials being introduced through such entry control points in order to determine whether they are duly authorized for such access. 4.1 Access Authorizations [Section 73.25(b)(3)(i) and (c)(1)(i)]Intent Access authorizations should be maintained and used with access control systems for controlled access areas and transports. Their purpose is to determine the persons who are authorized to be admitted to the controlled access area or transport and the criteria for their admittance. Access authorizations in the form of a written access authorization schedule enable escort personnel to quickly discriminate between those who are to be admitted to the controlled access area or transport at any given time and those who are to be excluded. Such a schedule may also provide information that can be used to verify the identities of those persons seeking access or of those materials, equipment, or vehicles presented for introduction. Access authorizations would normally name the individual to be granted access and provide the criteria (i.e., the time, place, circumstances, etc.) for admittance. The authorizations would be limited to the specific times when and places where the individual has the need to be admitted to the controlled access area or transport to perform his/her job. They may also specify the activities in which the individual would be authorized to engage while enjoying such access. The authorizations would normally be provided in written form and made available to the escort force personnel who would be responsible for implementing the access control system. In some situations, the security organization may authorize an individual access to controlled access areas or the transport on a temporary basis without specifying the individual's name or means of personal identification. This may be necessary to facilitate refueling or vehicle service at stops. Such individuals would normally be given escorts or placed under close surveillance to ensure that they perform only the tasks for which they have been specifically authorized. These provisions also apply to materials being introduced into controlled access areas or transports. Security-significant equipment, materials, or vehicles that may potentially have an adverse impact on the security of the shipment or that may be used to conceal such equipment or materials may be excluded unless specifically authorized for introduction into a controlled access area or transport. It is the licensee's responsibility to determine which individuals, materials, equipment, or vehicles should be given authorizations and to instruct accordingly the members of the escort force having responsibility for implementing the access control system. Content Describe the criteria to be used for determining which persons and materials are to be approved for authorization for access to or introduction into (1) controlled access areas and (2) transports. Categorize the criteria according to the different situations and conditions expected to apply at different times during shipment. Indicate in which cases persons granted access will require escorts or close surveillance by duly authorized personnel. Describe or refer to the escort or surveillance procedures used to the extent they are applicable. State which individuals in the security organization (position titles and names of individuals) may approve access authorizations. Describe procedures for processing authorizations and the forms used for documenting such authorizations (e.g., authorization lists, letters of authorization). Describe precautions taken to ensure that authorization documents will not be generated without the approval of the responsible individuals in security organization management and to ensure that they will be secured to prevent tampering or alteration. Describe procedures for ensuring that authorization lists will be constantly updated, as necessary, and that only the most current authorization lists will be used. 4.2 Access Control at Entry Control Points [Section 73.25(b)(3)(ii) and (c)(1)(ii)]4.2.1Identification and Verification Intent Access control subsystems and procedures must be implemented, under these provisions, to ensure that only authorized persons and materials are allowed access to or introduction into controlled access areas or transports. Usually these subsystems and procedures will include establishing entry control points, identifying authorized persons or materials, verifying such identifications, and assessing verified identifications against established authorization schedules. Entry control points should normally be few in number (generally not more than one per controlled access area) to ensure the greatest amount of control with the limited personnel and other physical protection resources available. Their objective is to cause each individual seeking entry to the area or transport to be channelled through a screening process for identification, verification, and authorization assessment before being allowed to enter. It is desirable to ensure that the detection of any attempted introduction of unauthorized persons or materials into controlled access areas or transports will be communicated to other escort force personnel so that appropriate measures described in the Safeguards Contingency Plan may be initiated to deny such unauthorized entries. Generally this might best be accomplished by routinely detaining persons attempting entry at the entry control point. Thus the communication of detections of unauthorized persons or materials being introduced can be accomplished before notifying the individual that he will not be admitted for lack of proper identification or authorization. This will provide as much warning as possible to other members of the security organization if the persons involved are in fact adversaries and are prepared to take violent measures upon failure of their deceit mode. One method that will usually accomplish the identification verification function is the use of a numbered picture badge identification procedure affecting all individuals who will have custody of the shipment. This procedure is described in Section 73.26(g)(1) of the reference system. All members of the licensee's escort force and all members of other groups of security personnel authorized to assume custody of the shipment at transfer points or at the final destination are included. Badges held by the persons who would assume custody would be compared with facsimiles of such badges provided in advance to the escort force giving up custody of the shipment to ensure that identifications are valid. Other means may be employed to identify personnel who would be granted temporary access to an area or to the transport. Temporary badges, for example, may be issued to such persons while they are in the subject area or transport. These would signify their temporary status and, if applicable, their need for an escort or other close supervision to limit their opportunities to perform unauthorized acts. Content Describe how entry control points are to be established for controlled access areas of the types described in Section 3.1 of the Physical Protection Plan (see Section 3.1 of Part I of this guide). Also describe the entry control points for each of the transports described in Section 3.3 of the plan (see Section 3.3 of Part I of this guide). For each distinct type of entry control point described above, describe the subsystems and procedures used to detain persons or materials for which introduction is being sought until their identities and authorizations can be confirmed. Discuss measures that would be taken if an attempt is detected to gain entry to introduce unauthorized vehicles or materials through authorized entry control points by deceit. Refer to the Safeguards Contingency Plan as necessary. Describe how identification and documents presented for the purpose of identification will be verified as being authentic. 4.2.2Assessment Against Authorizations Intent After a person's identity has been verified, such identifications must be assessed against a written authorization schedule. This assessment will determine that the person seeking entry has been authorized to enter the controlled access area or transport and that the specific entry criteria described in the authorization schedule have been met. The use of entry criteria is intended to ensure that access is permitted only to allow non-escort personnel to perform specific assigned duties that require access to the controlled access area or the transport. Further, the specification of certain entry criteria makes it more difficult for a potential adversary to gain access by deceit by decreasing the amount of time and the number of occasions on which adversaries could deceitfully obtain such access. Specification of conditions that must be met for the introduction of materials places similar limitations on the potential adversary's ability to successfully introduce unauthorized materials into controlled access areas or transports by deceit. Measures must also be taken to ensure that authorization schedules and other related access authorization items are maintained in a secure manner to ensure their continued availability and to prevent compromise of the authorization assessment subsystems and procedures. Content Describe subsystems and procedures used to assess verified identifications of persons, vehicles, and materials against current authorization schedules and entry criteria (conditions placed upon authorized entry related to particular times, places, and circumstances) before such persons, vehicles, or materials are permitted access or introduction. Describe details of the forms of authorization schedules that will be used by personnel or devices involved in the authorization assessment function. Also discuss the precautions taken to prevent the successful use of counterfeit authorization items. Chapter 5 PREVENTION OF UNAUTHORIZED REMOVAL OF SSNM FROM TRANSPORTS BY DECEIT 5.1 Authorization for Removal of SSNM from Transports [Section 73.25(c)(3)(i)]Intent Authorizations are necessary under the provisions for removal of SSNM from transports at intermediate stopping points and at the final destination. The purpose of such authorizations is to ensure that the SSNM will not be withdrawn unnecessarily or indiscriminately from the transport and placed in a more vulnerable situation as a result of actions of deceit by adversaries. Authorizations for removal of SSNM from a transport are, in effect, instructions to the escort force personnel on times and conditions suitable for removing SSNM from its protected location inside the transport. When persons are presenting themselves as potential recipients of the SSNM, it is especially important to confirm that their identities are the same as those described on the authorization schedule before exposing the SSNM to them by removal from the transport. SSNM will have to be authorized for removal from transports at some transfer points and at the final destination. Numerous scheduled removals from the transport are discouraged and can usually be avoided by use of appropriate equipment and planning. In a shipment involving road, rail, and sea segments, for example, removals of wieldable packages of SSNM from one transport for loading into another can be avoided by using a standardized shipping container of the type specified in the reference system [paragraph 73.26(1)(1)]. To ensure that SSNM is removed from transports only when necessary, authorization schedules for the removal of SSNM from transports must specify authorized times, places, and conditions for removal, plus names of persons authorized to remove and to receive the SSNM. They must also be consistent with the means used to identify the recipients and the controls and procedures for removal. (See Regulatory Guide 5.57, "Shipping and Receiving Control of Special Nuclear Material.")Content Describe the criteria for removal of SSNM from the transport. State the names or position titles of persons who will be authorized to implement removal procedures, as necessary. Describe the SSNM removal authorization schedules that will be maintained to determine when prescheduled removals are to be executed. Also describe the forms of documentation (e.g., hand-to-hand receipts as suggested in the reference system, paragraph 73.26(b)(4)) that will be used to provide a permanent record of transfer of the SSNM when custody of the SSNM is transferred. Samples of authorization schedules and other documentation should be provided. 5.2 SSNM Removal Controls [Section 73.25(c)(3)(ii) and (c)(3)(iii)]Intent Removal controls are necessary to ensure that the SSNM removal authorization schedules just discussed are appropriately implemented and that the security of the SSNM during the removal and subsequent transfer operations is adequately maintained. This is to ensure that the actual SSNM removal is undertaken only after authorization for such removal has been confirmed and the identities of persons into whose hands the SSNM is to be transferred have been verified and assessed against the current authorization schedule. In this sense, the removal controls are a type of filtering process similar to access controls in discriminating between those who are authorized to receive SSNM and those who are not. Removal controls also include verifying the identity and integrity of the SSNM to be removed and ensuring that the removal and transfer of SSNM from the transport is properly documented in order to establish proof that responsibility for the shipment has been duly transferred to the appropriate party. (Hand-to-hand receipts are suggested in the reference system in paragraph 73.26(b)(4). See Section 1.6, "Security Records," of Part I of this guide.) This documentation will ensure the traceability of the shipment if it is missing or overdue at its final destination. Content 1. Emergency Removal Procedures. Indicate that procedures are described in the Safeguards Contingency Plan for the removal of SSNM from the transport in emergency situations for each transport mode involved and that such procedures include how the SSNM is to be protected while outside an approved transport, what procedures are to be followed in transferring material to a substitute transport, and how the escort force would maintain control over the SSNM if a substitute transport were used. Refer to the appropriate portions of the Safeguards Contingency Plan. 2. Prescheduled Removal Procedures. Describe procedures to be used during prescheduled removals of SSNM from transports. Include procedures for identifying persons physically removing the SSNM and those who will be receiving the material (if custody of the material is being transferred). Also include procedures for verifying the identifications of such persons, verifying the identity and integrity of the SSNM that will be removed from the transports, and assessing each of the verified identifications just described against the most current authorization schedules. Describe the procedures to ensure that all the foregoing procedures will be completed satisfactorily before physical removal of SSNM from the transports. Describe the forms for acknowledging receipt of SSNM at all points where there is a transfer of custody of the material. Describe the procedure or devices for validating the receipt of the material (e.g., signature of responsible individual accepting custody, use of corporate seal). Chapter 6 DETECTION OF UNAUTHORIZED REMOVAL OF SSNM FROM TRANSPORTS BY STEALTH OR FORCE 6.1 Transport Features to Delay Removal [Section 73.25(c)(4)(i)]Intent The delay that may be encountered by a potential adversary attempting the unauthorized removal of SSNM from a transport by stealth or force is a significant factor to be considered in the overall design of a physical protection system for SSNM in transit. Transport features that delay removal of the SSNM must be considered, whether they have been specifically designed into a special purpose transport vehicle or are coincidentally present in a multipurpose transport selected to transport SSNM but also relied on to delay unauthorized removal of SSNM. This provision has been included to ensure the use, where feasible, of design features in specially designed transports to increase the delay that would be encountered by an adversary attempting unauthorized penetration of the transport by stealth or force. Where specially designed transports are not feasible, these provisions would permit the physical protection system to be given credit for the transport features that promote such delay found in multipurpose transports. Some features that delay unauthorized removal of SSNM from a transport may be identical to those that prevent or delay unauthorized access to the transport. Those features have been described previously in Section 3.3 of Part I of this guide. This section addresses only the aspects of those features that promote delay in SSNM removal from the transport. A number of fairly simple features may be used to cause delay in unauthorized SSNM-removal attempts. These include fastening SSNM containers to the floor or other part of the transport interior, binding the containers together so that the resulting bulk is too heavy or too large to be moved out of the transport cargo compartment entry point in one action, or filling the cargo compartment of the transport with tear gas or other chemicals designed to obscure vision or otherwise make removal more difficult. However, it is important that the mechanisms used to cause such emissions be designed to prevent unintended accidental triggering of the devices. In the case of road shipments particularly, there is an additional device that would be included under the heading of delaying removal of SSNM, but this involves removal of the entire transport rather than removal of SSNM from the transport. In the reference system, it is suggested as one of two options that the transport vehicle for road shipments be equipped with a device for immobilizing the transport or at least the cargo-carrying portion of the transport so that a potential adversary could not use the transport to depart with the shipment after attack [paragraph 73.26(i)(3)(i)]. This device is designed to delay the adversary from quickly leaving the attack scene with the SSNM before LLEAs arrive on the scene. This device should be sufficiently effective to prevent mobility from being restored to the transport by the adversary in a short period of time, thus defeating the purpose of the immobilization device. Use of a cargo vehicle that does not have this feature would suggest the need for a compensatory increase in other forms of protection such as the use of an additional escort vehicle (as suggested in the reference system). Content Describe the transport features that will be relied on to delay attempts at unauthorized removal of SSNM from the transport. Include details of construction or arrangements made to produce the delay and an estimate of the time and resources required to overcome the obstacle or mechanism causing the delay. Refer to the descriptions of transport features delaying access in Section 3.3 of the Physical Protection Plan (see Section 3.3 of Part I of this guide) as necessary. Describe any transport features that will be relied on to delay removal of a road transport vehicle loaded with SSNM. Include details of construction and operation of any mechanisms designed to immobilize the vehicle and the actions or conditions required to trigger the applicable mechanisms (e.g., improper operation of the vehicle by unauthorized persons, remote-controlled radio signal activation). Include details of the extent to which the vehicle can be restored to normal operating condition following immobilization and the time, resources, and knowledge required to restore the vehicle to normal operating condition. Describe the fail-safe features that ensure that the trigger mechanism for the immobilization device does not become accidentally activated during shipment progress. 6.2 Detection of SSNM Removal Attempts [Section 73.25(c)(4)(ii)]Intent This provision is intended to provide a warning to the security organization that an attempt at unauthorized removal of SSNM from the transport is in progress or is imminent in order to enable a response that will prevent ultimate theft of SSNM. There is a degree of redundancy between subsystems and procedures designed to detect attempts at unauthorized access to transports and those designed to detect attempts at unauthorized removal of SSNM from transports. However, these two categories of detection subsystems and procedures need not be identical. Detection subsystems and procedures not apparent to the potential adversary until penetration is complete are less easily compromised than those apparent from outside the transport. Also, whereas the physical protection system may rely on personnel to conduct surveillance of the transport to detect unauthorized penetration attempts, the detection of unauthorized removal attempts may rely on a mechanical device that cannot be compromised by those conducting the surveillance. This provides some degree of protection against both acts of coercion against the escorts conducting surveillance, as well as acts of collusion by the escort force members. Therefore, it would be desirable that there be some degree of independence between the detection subsystems and procedures designed to detect penetrations and removals. If escort personnel responsible for monitoring access to the controlled access area surrounding a transport are also assigned responsibility for responding to detections of unauthorized penetrations of the transport, an adversary might successfully neutralize such escort personnel and gain access to the SSNM without the LLEAs having been notified. Greater effectiveness may be achieved in the physical protection system by arranging for separate detection subsystems for the controlled access areas and for the transport. Alarms could be annunciated at a remote location occupied by a portion of the escort force. Because the act of unauthorized removal is so close to the realization of a successful theft, annunciations of the alarm could be considered ample cause for contacting and alerting the LLEAs before further action is taken by the escort force to assess the cause of the alarm. This detection system should be consistent with the Safeguards Contingency Plan and Sections 7.2 and 7.3 of the Physical Protection Plan (see Sections 7.2 and 7.3 of Part I of this guide) to ensure that the entire system will be able to detect, assess, and communicate attempts at unauthorized removal so that the response to the attempt can be such as to prevent the theft of SSNM as required in the statement of the required capability. Content Describe the detection subsystems and procedures to detect, assess, and communicate any attempts at unauthorized removal of SSNM from transports. Indicate the times when such systems would be in operation, especially with regard to periods during which other detection subsystems and procedures would be or would not be in operation to detect attempted unauthorized penetration of the transport. Discuss the extent to which the detection subsystems and procedures designed to detect unauthorized removal of SSNM from transports and unauthorized penetration into transports operate independently and offer a degree of redundancy to the detection function in relationship to the transport. Discuss the effectiveness of the subsystems and procedures designed to detect unauthorized removal of SSNM from transports and their interrelationships and interdependencies with other parts of the physical protection system described in the Physical Protection Plan and in the Safeguards Contingency Plan. This discussion of interrelationships and interdependencies should demonstrate that unauthorized attempts at removal of SSNM from transports will be detected. Chapter 7 TRANSMISSION OF DETECTION, ASSESSMENT, AND OTHER SECURITY-RELATED INFORMATION Various requirements for communications capabilities have been described in other portions of this Standard Format (i.e., Chapters 2, 3, 5, and 6 of Part I). The provisions for communications capabilities in this chapter are intended to support the other capabilities where communications capabilities are needed. 7.1 Communications Among Escort Force Personnel [Section 73.25(d)(2)(i)]Intent Communications are routinely required among members of the escort force at different locations, especially in the cases of road transportation where escort force personnel are dispersed among several escort vehicles or where some may purposely be sent to a remote location to ensure a response in the case of attack (see Section 1.8 of Part I of this guide). In addition, communications may be required among escort personnel while some or all of them are on foot, should this become necessary as a result of, or as a tactic in, certain response actions. Thus, communications among escort force members, independent of vehicle-mounted equipment, should normally be provided in some measure. In all cases, for any transportation modes contemplated in the plan, communications subsystems and procedures should be designed to permit proper implementation of the escort force duties and procedures detailed in the Physical Protection Plan and the Safeguards Contingency Plan. Continuous two-way intraconvoy communications are specified in the reference system in the case of road shipments [paragraph 73.26(i)(6)]. Communications among escort force members may be affected by atmospheric conditions, topographic features, and spurious or purposely generated electro-magnetic radiation that may interfere with the ability to communicate clearly. The licensee should select subsystems and procedures to cope with such anticipated difficulties. Communications codes or other devices to disguise position or other security-significant information transmitted among escort force members may also be desirable. Content Describe the communications subsystems and procedures that will be employed to allow communications among members of the escort force, and relate their performance characteristics to the way they are expected to be used at different times during the shipment. Include range and limitations of the equipment, the extent to which the equipment is portable (e.g., portability by an individual in the field, restriction to vehicle mounting, or longevity of power source under continuous use), and procedures for disguising position data and other security information that may be of interest to the potential adversary (i.e., duress codes). Refer as necessary to other parts of the Physical Protection Plan or to the Safeguards Contingency Plan. 7.2 Communications Between the Escort Commander and the Movement Control Center [Section 73.25(d)(2)(ii)]Intent Two-way communications are required between the escort commander and the movement control center to transmit assessment information and requests for assistance from LLEAs. Equipment for such communications may be vehicle mounted but should provide for dead areas and other anticipated conditions that may affect communications from time to time. Segments of the route that present particular communications problems should be taken into consideration. Appropriate measures should be taken to ensure sufficient communications capability to support the objectives of the physical protection system. Although communications are not required on a continuous basis between the escort commander and the movement control center, even in the case of road shipments, a capability for such communications must be provided to allow either direct or indirect communication between the escort commander and the movement control center should an emergency arise and assistance from LLEAs be required. Alternatively, direct communications with the LLEAs would be acceptable in some situations when communications with the movement control center cannot be sustained. The reference system provides that two of the vehicles used in road transportation be equipped with radiotelephones for communication with the movement control center and that there be some other redundant means of communication as well [paragraph 73.26(i)(6)]. For sea shipments, ship-to-shore communications are specified in the reference system [paragraph 73.26(1)(7)], whereas reference system provisions for air and rail shipments do not specify the type of communications system to be used. Content Describe the communications subsystems and procedures that will be used for two-way communications between the escort commander and the movement control center to rapidly and accurately transmit assessment information and requests for assistance by LLEA forces and to coordinate such assistance with the actions of the escort force. Include the range and limitations of the equipment, whether local relays will be required, and the means to be employed for disguising position data and other information in the communications that may be useful to the potential adversary. Regulatory Guide 5.32, "Communication with Transport Vehicles," provides information on radiotelephones and systems and procedures for disguising position data, which would be most useful for road or rail shipments. 7.3 Notification of LLEAs [Section 73.25(d)(2)(iii)]Intent Both the armed escorts and the movement control center personnel under this provision must be provided with the communications equipment and appropriate procedures to allow them to notify the LLEAs of the need for assistance. The reference system suggests specifically a need for redundancy in these communications in certain instances, as discussed in Section 1.8 of this plan. The need for such redundancy underscores the basic philosophy of the licensee physical protection system. The escort force is not intended to be able to defeat potential attackers in an aggressive mode but to protect the SSNM shipment and themselves from harm, while delaying the theft of SSNM or radiological sabotage, until LLEAs arrive. In a system designed to interface closely with LLEA forces, the ability of escorts and the movement control center to communicate with such forces is very important and therefore requires an appropriate level of redundancy. Although the need to maintain a capability for communications with the LLEAs applies to all transportation modes, this does not necessarily mean direct communications. Various types of relays would be possible, especially where redundant modes are concerned. An illustration of how this communications capability can be ensured during transfer operations when the SSNM is probably in its most vulnerable condition is provided in the reference system, which provides that the escort force would split up into two groups made up of two escorts and five escorts during transfers. The two escorts would go to a remote location, and both the two remotely located escorts and the five who remain to protect the shipment would be able to communicate directly with the LLEAs [paragraph 73.26(f)(2)]. However, there are no further specific provisions for communications with the LLEAs in the reference system. Content Describe the communications subsystems and procedures for (1) the armed escorts and (2) movement control center personnel to notify LLEAs of the need for assistance. Refer, if desired, to Sections 7.1 and 7.2 of the Physical Protection Plan (see Sections 7.1 and 7.2 of Part I of this guide). Include in the description the range and limitations (e.g., dead areas for radio communications) of the communications, whether local relays will be required, and whether the escort force will have direct control of the communications system or will share the communications facilities with other persons (e.g., ship's radio on oceangoing vessel, aircraft radio normally used by aircraft crew). PART II PHYSICAL PROTECTION ARRANGEMENTS FOR SPECIFIC SHIPMENTS 1. GENERAL INFORMATION Intent It is provided in paragraph 73.26(b) of 10 CFR Part 73 that security arrangements for each shipment of SSNM be approved by the Nuclear Regulatory Commission prior to the time for the 7-day notice required for shipments by Section 73.72. The purpose of this provision is to permit the NRC to review the shipment physical protection arrangements for a specific shipment to ensure that they provide the level of protection required by Sections 73.20 and 73.25 in the full context of the conditions and situations existing shortly before the time of shipment. Although there is no requirement as to how soon before the shipment this information is to be submitted, it is normally assumed that it would not be so far in advance that the licensee would have to make drastic updating revisions to the submittal just before the actual shipment. The availability of scheduling information from carriers and other sources would affect the date of submittal and would discourage submittal too long before the shipment date. Significant changes in the arrangements reported to NRC should be submitted immediately to NRC as amendments to the original submittal when such changes appear necessary. These amendments will then be approved if extensive review is not indicated. The provisions of paragraph 73.26(b)(3) of 10 CFR Part 73 define basically the types of information to be submitted for each shipment. However, a degree of flexibility is allowed in the amount of information that would be submitted. The licensee may choose to provide as much information as possible in the Physical Protection Plan so that the submittal for each specific shipment would be as little burdensome as possible. Providing details in the Physical Protection Plan, then simply referencing them in the submittal for each shipment would reduce the burden. On the other end of the spectrum, the licensee may choose to include in the submittal for a particular shipment a number of departures from the Physical Protection Plan, perhaps made necessary by temporary conditions beyond his control. This provision would be most suitable for temporary changes effective for only one shipment. There are also provisions for updating the Physical Protection Plan as well. The licensee, at his discretion, may choose to widely distribute the details of the physical protection arrangements for a particular shipment between the Physical Protection Plan and the submittal of Physical Protection Arrangements for Specific Shipments with the understanding that both together describe the physical protection system for any particular shipment. It is advantageous to keep the volume of any such submittals to a level commensurate with the time allowed for NRC review. The sections that follow provide a standard format for the different types of information that may be submitted before a particular shipment. The physical specifications for such submittals are the same as for the Physical Protection Plan, as described in the Introduction to this Standard Format. Content State the purpose of this submittal as supplying the NRC certain information on specific security arrangements for shipments of SSNM in formula quantities sufficiently in advance of the shipment to allow NRC approval of such arrangements before the time for the 7-day notice required by Section 73.72 of 10 CFR Part 73. Reference the Physical Protection Plan corresponding to this submittal by docket number and date. 2. ITINERARY INFORMATION Content State the estimated dates and times of departure and arrival, the names of the shipper, receiver, and carrier(s); and the mode(s) of shipment. Describe the route to be used for the proposed shipment by referring to the appropriate section in the Physical Protection Plan, indicating any differences in the itinerary compared to that described in the Physical Protection Plan. Provide the appropriate information corresponding to such differences as required in the Physical Protection Plan so as to completely update the itinerary information required for the proposed route. Note such changes and include them as an appendix to this submittal. 3. TRANSFERS OF SHIPMENT SECURITY RESPONSIBILITY Content Note by reference to the stated itinerary the times and locations of points where there will be transfers of responsibility for the security of the shipment (i.e., escorts either accepting or relinquishing responsibility). At each such point, describe the arrangements made to continuously maintain the security of the shipment during the transfer, including points at which the escorts will accept responsibility for an import shipment. Refer to the Physical Protection Plan as necessary. 4. DIFFERENCES FROM THE PHYSICAL PROTECTION PLAN Content Describe any subsystems or procedures to be used for the particular shipment described here that differ significantly from those described in the Physical Protection Plan. Present this information sequentially, according to the headings that apply to the subsystem or procedure to be supplanted. In the case of each difference from the Physical Protection Plan, indicate why the change is being made. 5. RELATIONSHIP TO THE PHYSICAL PROTECTION PLAN Content Ensure that, except as specifically noted in this submittal, all subsystems and procedures for the physical protection of the proposed shipment described here will be substantially the same as those described in the Physical Protection Plan. 12 |