10 January 2000
See other DoD security docs: http://www.c3i.osd.mil/org/sio/security/index.html
April 6, 1990
(a) DoD Directive 5210.63, subject as above, April 24, 1978 (hereby canceled)
(b) DoD Directive 5210.41, "Security Policy for Protecting Nuclear Weapons," September 23, 1988
(c) Title 10, Code of Federal Regulations, Part 73
(d) Department of Energy (DoE) Order 5632.2A "Physical Protection of Special Nuclear Material and Vital Equipment," February 9, 1988
(e) through (q), see enclosure E1.
1. REISSUANCE AND PURPOSE
This Directive reissues reference (a) to update policy, responsibilities, procedures, and minimum standards for safeguarding DoD nuclear reactors and special nuclear materials (SNM).
2. APPLICABILITY AND SCOPE
2.1. Applies to the Office of the Secretary of Defense (OSD); the Military Departments; the Chairman, Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the Defense Agencies having responsibility for the protection of nuclear reactors and SNM; and the DoD Field Activities (hereafter referred to collectively as "DoD Components").
2.2. Applies to all land-based nuclear reactors at fixed sites or in transit, research and test reactors under the direct control of DoD Components, and space-borne nuclear reactors located on DoD installations.
2.3. Applies to all SNM, regardless of form or whether incorporated in reactor cores or in other items under the direct control of DoD Components, except:
2.3.1. Self-protecting SNM; that is, SNM that are not readily separable from other radioactive material and that have a total external radiation dose rate in excess of 100 rems per hour at a distance of 3 feet from any accessible surface without intervening shielding. SNM in a single unit that weighs in excess of 5,000 pounds may have reduced security measures upon approval of the cognizant agency.
2.3.2. SNM in a quantity not exceeding 350 grams of uranium-235, plutonium, or combination possessed in any analytical, research, quality control, metallurgical, or electronic laboratory.
2.4. Does not apply to nuclear weapons. Because of the unique requirements associated with nuclear weapons, separate guidance regarding their security is provided in DoD Directive 5210.41 (reference (b)).
2.5. Does not apply to nuclear reactors or SNM on board U.S. Navy ships. (See paragraph 5.4.3., below.)
2.6. Does not apply to those nonactive or decommissioned DoD nuclear reactor facilities or nuclear propulsion systems on Navy ships when no fissile material is present.
2.7. Does not abrogate or abridge the:
2.7.1. Authority or responsibility of a commander to provide equivalent or better standards than those applied to licensed facilities or materials or to apply more stringent security standards required by other DoD Directives during emergencies, or at any time the threat to DoD nuclear reactors or SNM indicates additional protection measures are necessary.
2.7.2. Responsibility of DoD Components operating nuclear reactors under nuclear Regulatory Commission license or processing SNM to comply with the requirements of 10 CFR 73 (reference (c)), and DoE Orders 5632.2A and 5632.1A (references (d) and (e)).
Terms used in this Directive are defined in enclosure E2.
It is DoD policy to ensure that nuclear reactors and SNM receive special protection because of their operational importance and the serious consequences of unauthorized possession or use of nuclear materials. The conservation of SNM; the safety of the public, operating personnel, and property; and the protection of SNM from sabotage, theft, loss, or diversion are of paramount importance during all phases of operations.
5.1. The Under Secretary of Defense (Policy) (USD(P)), in coordination with the Assistant to the Secretary of Defense for Atomic Energy (ATSD(AE)), has the authority and responsibility for DoD security policy for DoD nuclear reactors and SNM.
5.2. The Assistant to the Secretary of Defense (Atomic Energy) (ATSD(AE)) has the authority and responsibility for standards and guidance on defense nuclear energy matters.
5.3. The DoD Physical Security Review Board, as established by DoD Directive 5100.76 (reference (f)), shall advise and assist the Deputy Under Secretary of Defense (Security Policy) (DUSD(SP)) and ATSD(AE) on matters involving the security of nuclear reactors and SNM.
5.4. The Heads of DoD Components shall:
5.4.1. Effect necessary programming, budgeting, and accounting actions to ensure fulfillment of nuclear reactor and SNM security requirements.
5.4.2. Develop site-specific security instructions, procedures, and plans, applicable to nuclear reactors and SNM facilities in accordance with this Directive.
5.4.3. Provide a security operational concept for each new type of plant or new class of ship possessing a nuclear propulsion system for coordination with the DUSD(SP) and ATSD(AE).
6.1.1. Each DoD Component shall develop procedures to ensure adequate protection is afforded nuclear reactors and SNM and to comply with statutory accountability requirements. Procedures shall provide protection against theft, sabotage, diversion, and other hostile acts that could impact adversely on national security and on the health and safety of operating and security personnel and the public.
6.1.2. The level and strategy of protection shall be consistent with the category of SNM involved, the standards described in enclosures E3. and E4., radiation levels, the applicable threat, operational requirements, and potential risks. Physical security procedures must constitute a balanced, in-depth system that is responsive to all credible potential vulnerabilities.
6.1.3. Nuclear reactors and components without SNM shall be protected consistent with the highest level of classified information they contain.
6.1.4. Security-related equipment shall be protected from unauthorized access consistent with its importance to the protection of nuclear reactors and SNM.
6.1.5. Unclassified information pertaining to security plans, procedures, and equipment for the physical protection of nuclear reactors and SNM shall be safeguarded as described in the DUSD(SP) Memorandum (reference (g)).
6.1.6. General access to nuclear reactors and SNM shall be restricted to authorized personnel with established need. Access shall be kept to a minimum and appropriate entry control and identification procedures shall be established to ensure need for access.
6.1.7. Any operator or security individual in a position that would allow the individual, acting alone, the opportunity to divert or cancel the diversion of Category I or Category II quantities of SNM shall be subject to extensive screening and continuing evaluation by supervisors and co-workers in accordance with DoD Directive 5210.42 (reference (h)).
6.2. Physical Security and Vulnerability Assessment
6.2.1. A physical security and vulnerability assessment shall be prepared for existing facilities where Category I or II SNM is used or stored, and during the planning, design, and full-scale development phases of such proposed facilities.
6.2.2. The Military Services, through their intelligence and law enforcement services, shall develop and coordinate with appropriate commanders a postulated threat as the basis of the assessment. A design basis for the postulated threat is contained in Section 73.1 of 10 CFR 73 (reference (c)).
6.2.3. The assessment shall ensure that all credible potential vulnerabilities are addressed and that appropriate consideration has been given to changing requirements and new technologies.
6.2.4. Additional guidance may be found in MIL-STD-1785 (reference (i)) and MIL-HDBK-1013/1 (reference (j)), or other sources with similar depth and coverage.
6.2.5. The assessment shall be reviewed at least annually and updated as required.
6.2.6. Factors to be considered in assessing security requirements for nuclear reactors include:184.108.40.206. Location of the reactor.
220.127.116.11. Configuration in which the reactor is maintained.
18.104.22.168. Category of SNM contained in the reactor.
22.214.171.124. Nature and capabilities of potential threats.
126.96.36.199. Availability and protection of other equally attractive targets at other facilities.
188.8.131.52. Reliability and qualification of security and operating personnel.
6.2.7. Factors to be considered in assessing security requirements for SNM include:184.108.40.206. Degree of enrichment, activity level, and category of the SNM.
220.127.116.11. Quantity and configuration of the SNM.
18.104.22.168. Availability and protection of equally attractive material at other facilities.
22.214.171.124. Difficulties associated with removal of the SNM from the site.
6.3. Physical Security Plan
6.3.1. Upon completion of the physical security and vulnerability assessment, a site security plan shall be developed and implemented that prescribes the minimum standards and procedures and that complies with 10 CFR 73 (reference (c)) and this Directive. The plan shall consider:126.96.36.199. Minimum physical security criteria and standards for protecting nuclear reactors and SNM prescribed in enclosures E3. and E4.
188.8.131.52. Emergency and contingency procedures as well as protection strategies and measures to prevent radiological sabotage and the theft or diversion of SNM.
184.108.40.206. Requirements for security equipment unique to security or for monitoring nuclear reactors and SNM described in DoD Directive 3224.3 (reference (k)).
6.3.2. Security plans shall be reviewed at least annually in conjunction with review of the vulnerability assessment, current intelligence, and other relevant factors, and shall be updated as required or when facilities are modified. In addition, security programs shall be reviewed as necessary to ensure adequate protection at all times.
6.4. Use of Force
6.4.1. In accordance with DoD Directive 5210.56 (reference (l)), Categories I and II quantities of SNM are designated as vital to the national security whose loss, damage, or compromise would seriously prejudice national security or jeopardize the fulfillment of an essential national defense mission. Security force personnel shall be armed and all possible actions shall be taken, including the use of deadly force within the limitations of reference (l), to prevent the theft, sabotage, or unauthorized control of SNM from a site or shipment where Category I and II quantities of SNM are known or reasonably believed to be present.
6.4.2. All security force personnel shall be trained on the use of deadly force. Training shall include specific scenarios, tailored to individual locations, that require security force members to detail their responses to representative situations involving the use of deadly force as outlined in reference (l).
6.5. Reporting Incidents
All incidents and threats related to radiological sabotage, theft or diversion of SNM, or to damage to nuclear reactors shall be reported in accordance with DoD Instruction O-7730.12 (reference (m)). A copy of the report shall be provided to the DUSD(SP) and the ATSD(AE).
6.6. Inventory Discrepancies
When an assessment of SNM status reveals an inventory discrepancy statutory reporting requirements must be followed and the DUSD(SP) and ATSD(AE) shall be informed of such discrepancies.
6.7. Variances and Waivers
When it is neither practical nor cost-effective to meet a specific physical security standard, variances or waivers may be reviewed and approved as described in enclosure E5.
6.8. Public Release of Information
Public release of information regarding incidents and threats related to radiological sabotage and the theft or diversion of SNM shall be governed by DoD Directive 5230.16 (reference (n)) and DoD Instruction 5210.67 (reference (o)).
7. EFFECTIVE DATE AND IMPLEMENTATION
This Directive is effective immediately. Forward two copies of the implementing documents to the Deputy Under Secretary of Defense (Security Policy) within 120 days; forward one copy of changes to implementing documents within 60 days of publication.
Enclosures - 5
1. References, continued
3. Special Nuclear Material (SNM) Protection Standards
4. Physical Security Standards for DoD Nuclear Reactors and Category I and II Quantities of Special Nuclear Material
5. Variances, Waivers, and Exceptions
E1. ENCLOSURE 1
(e) Department of Energy (DoE) Order 5632.1A, "Protection Program Operations," February 9, 1988
(f) DoD Directive 5100.76, "Physical Security Review Board," February 10, 1981
(g) Deputy Under Secretary of Defense (Security Policy) Memorandum, "Interim Guidance for Identifying and Controlling Unclassified Controlled Nuclear Information (UCNI)," September 13, 1989
(h) DoD Directive 5210.42, "Nuclear Weapon Personnel Reliability Program," December 6, 1985
(i) MIL-STD-1785, "System Security Engineering Program Management Requirements," January 31, 1988
(j) MIL-HDBK-1013/1, "Design Guidelines for Physical Security of Fixed Land-Based Facilities," March 1983
(k) DoD Directive 3224.3, "Physical Security Equipment (PSE) Assignment of Responsibility for Research, Development, Testing, Evaluation, Production, Procurement, Deployment, and Support," February 17, 1989
(l) DoD Directive 5210.56, "Use of Force by Personnel Engaged in Law Enforcement and Security Duties," May 10, 1969
(m) DoD Instruction O-7730.12, "Notification Procedures for Accidents and Significant Incidents Involving Nuclear Weapons, Reactors, and Radioactive Materials," August 1, 1976
(n) DoD Directive 5230.16, "Nuclear Accident and Incident Public Affairs Guidance," February 7, 1983
(o) DoD Instruction 5210.67, "Special Nuclear Material Information, Security Classification Guidance," December 3, 1982
(p) DoD C-5210.41-M, "Nuclear Weapon Security Manual (U)," September 1987, authorized by DoD Directive 5210.41, September 23, 1988
(q) JCS Pub. 1-02, "DoD Dictionary of Military and Associated Terms," June 1, 1987
E2. ENCLOSURE 2
E2.1.1. Access. Close physical proximity to nuclear reactors and/or SNM in such a manner as to allow the opportunity to tamper with, steal, or damage such items. Normally, a person is considered not to have access if an escort or guard is provided when the person is in close proximity to the reactor or SNM (DoD C-5210.41-M (reference (p))).
E2.1.2. Clear Zone. (Also referred to as an isolation zone.) An area adjacent to a physical barrier, clear of all objects that could conceal or shield an individual (10 CFR 73 (reference (c))).
E2.1.3. Delay. The effect achieved by physical features, technical devices, or security measures and forces that impedes an adversary from gaining access to a nuclear weapon. Normally expressed as a function of time, it is a major consideration in the design and development of nuclear weapon security systems (DoD Directive 5210.41 (reference (b))).
E2.1.4. Duress System. A system that can covertly communicate a situation of duress to a security control center or to other personnel who can notify a security control center (DoE Order 5632.1A (reference (e))).
E2.1.5. Exclusion Area. A designated area immediately surrounding the nuclear reactor and/or the SNM. Normally, the boundaries of an Exclusion Area are the walls, floor, and ceiling of a structure or are delineated by a permanent or temporary barrier. In the absence of positive preventive measures, unescorted entry to the Exclusion Area constitutes access to the nuclear reactor and/or the SNM vault or storage container (DoD Directive 5210.41 (reference(b))).
E2.1.6. Limited Area. A designated area immediately surrounding one or more Exclusion Areas. Normally, the area is between the boundaries of the Exclusion Area and the outer or inner barrier or boundary of the perimeter security system (reference (b)).
E2.1.7. Material Access Area. An area containing Category I quantities of SNM specifically defined by physical barriers, located within a protected area, and subject to specific access controls (reference (e)).
E2.1.8. Material Surveillance Procedures. Procedures to ensure the observation of an area containing SNM by at least two cleared and knowledgeable authorized persons who may be doing other work but who can give an alarm in time to prevent unauthorized removal or diversion of the SNM or an act of sabotage, involving SNM (reference (e)).
E2.1.9. Nuclear Reactor. A facility in which fissile material is used in a self-supporting chain reaction (nuclear fission) to produce heat and/or radiation for both practical application and research development (JCS Pub. 1-02 (reference (q))).
E2.1.10. Postulated Threat. An estimate of potential adversary types, acts, capabilities, and combinations thereof that could constitute a risk to a facility or asset. A postulated threat is necessary when a specific threat cannot be determined or when an existing threat may change or grow during the projected life cycle of an asset or system faster than security improvements can be developed and implemented. The postulated threat allows for the consideration of future growth in adversary capabilities and is used as the basis for the design of security systems, equipment, and facilities (DoD Directive 5210.41 (reference (b))).
E2.1.11. Protected Area. An area encompassed by physical barriers and to which access is controlled (10 CFR 73, reference (c)).
E2.1.12. Radiological Sabotage. Any deliberate act directed against a nuclear reactor, SNM facility, or transport that could directly or indirectly endanger public health and safety by exposure to radiation (reference (c)).
E2.1.13. Safe. A burglar-resistant cabinet or chest having a body of steel at least 1/2-inch thick and a built-in, three position, changeable combination lock in a steel door at least 1-inch thick, exclusive of bolt work and locking devices (DoE Order 5632.1A (reference (e))).
E2.1.14. Security Container. A security cabinet that bears a test certification label on the inside of the locking drawer or door and is marked "General Services Administration-Approved Security Container" on the outside of the top drawer or door (reference (e)).
E2.1.15. Special Nuclear Materials (SNM). Plutonium, uranium-233, uranium enriched in the isotope-233 or in the isotope-235, and any other material that is determined to be special nuclear material, except source material, or any material artificially enriched by any of the foregoing (reference (c)).
E2.1.16. Special Nuclear Material Vault. A penetration-resistant, windowless enclosure that has: (a) walls, floor, and ceiling substantially constructed of materials that afford forced penetration resistance at least equivalent to that of 8-inch thick reinforced concrete, (b) any openings greater than 96 square inches in area and over 6 inches in the smallest dimension protected by imbedded steel bars at least 5/8 inches in diameter on 6-inch centers both horizontally and vertically; (c) a built-in combination lock in a steel door that in existing structures is at least 1-inch thick exclusive of bolt work and locking devices and that for new structures meets the Class 5 standards set forth in Federal Specification AA-D-6008 of the Federal Specifications and Standards cited in Title 41 CFR Part 101. (See reference (e).)
E2.1.17. Vault. A burglar-resistant, windowless enclosure that meets the definition of an SNM vault. Additionally, vaults shall include an intrusion alarm activated by an opening of the door (reference (e)).
E2.1.18. Vault-Type Room. A room having a combination-lock on its door or doors protected by an intrusion detection system activated by penetration of walls, floors, ceilings, openings, or motion within the room (reference (e)).
E2.1.19. Vital Area. A security area located within a Protected Area for the protection of vital equipment (reference (e)).
E2.1.20. Vital Equipment. Equipment, systems, or components whose failure or destruction would cause unacceptable interruption to a national security program or an unacceptable impact to the health and safety of the public (DoE Order 5632.1A (reference (e))).
E2.1.21. Waste. SNM that are no longer useful, economical, or feasible to recover, including that which has become radioactive to the extent that material itself exhibits radioactivity of such a level that it must be handled and disposed of by special methods to protect the general public (reference (e)).
E3. ENCLOSURE 3
SPECIAL NUCLEAR MATERIAL (SNM) PROTECTION STANDARDS
E3.1.1. The level of protection afforded nuclear reactors and SNM shall be consistent with the category of SNM involved, including radiation levels, regardless of form or whether incorporated in other items, reactor cores or facilities under the direct control of DoD Components. Figure E3.A1.F1. identifies the categories of SNM.
E3.1.2. Additional protective measures may be required than those indicated in this enclosure in those cases where SNM quantities from lesser protected multiple locations within a facility or Protected Area have the potential for being rolled up by an adversary into a higher category of SNM.
E3.2. MINIMUM PROTECTION STANDARDS AT FIXED SITES
E3.2.1. Category I quantities of SNNE220.127.116.11. Category I quantities of SNM shall be used, processed, or stored only within a Material Access Area enclosed within a Protected Area.
E18.104.22.168. Category I quantities of SNM shall be stored in vaults or vault-type rooms equipped with intrusion detection systems (IDS).
E22.214.171.124. Category I quantities of SNM in use or process shall be under material surveillance procedures or in process under alarm protection.
E126.96.36.199. Category I quantities of SNM shall be protected by a security force capable of responding to a security alarm and neutralizing adversaries in less time than adversaries require to complete their objective. Response times shall be specified in the site security plan.
E188.8.131.52. Category I quantities of SNM shall be controlled at all times to prevent theft or diversion by a single authorized individual. Control may be achieved by material surveillance procedures.
E184.108.40.206. Access controls, intrusion detection systems, communications equipment, and testing and maintenance programs shall meet the applicable requirements of enclosure E4.
E3.2.2. Category II quantities of SNME220.127.116.11. Category II quantities of SNM shall be used, processed, or stored within a Protected Area.
E18.104.22.168. Category II quantities of SNM shall be stored in vaults, vault-type rooms, or security containers protected by IDS.
E22.214.171.124. Category II quantities of SNM in use or process shall be under material surveillance procedures or in process under alarm protection.
E126.96.36.199. Category II quantities of SNM shall be protected by a security force capable of responding to an alarm. Response times shall be specified in the site security plan.
E188.8.131.52. Access controls, intrusion detection systems, communications equipment, and testing and maintenance programs shall meet the applicable requirements of enclosure E4.
E3.2.3. Category III quantities of SNME184.108.40.206. Category III quantities of SNM shall be used, processed, and stored in a Protected Area or other security area that meets the following requirements:E220.127.116.11.1. Clearly defined perimeter barriers.
E18.104.22.168.2. Personnel and vehicle access control at the entrance, administered by a security guard, receptionist, or other person assigned for that purpose.
E22.214.171.124.3. A personnel identification system.
E126.96.36.199.4. Establishment and maintenance of a visitor's log.
E188.8.131.52.5. Signs prohibiting trespassing posted around the perimeter at all entrances to the use or storage area, prohibiting the introduction of prohibited articles, and authorizing inspections and/or searches of vehicles, packages, or persons entering or exiting posted at all entrances to the use or storage areas.
E184.108.40.206. Search procedures shall be established and documented in the site security plan.
E220.127.116.11. When unattended, Category III quantities of SNM shall be stored in either a locked security container protected by IDS or within a locked room protected by IDS (or in a locked room without IDS patrolled by security forces at intervals not to exceed 2 hours). As an alternative, the security container containing Category III SNM may be stored in a vault or vault-type room containing Category I or II SNM.
E18.104.22.168. Access to the material shall be limited to properly cleared personnel in positions that have been specifically designated as requiring access to Category III quantities of SNM in the course of assigned duties and to authorized visitors who are under continuous escort of personnel in such designated positions.
E22.214.171.124. A security response force shall respond to verified intrusion alarms as specified in the site security plan.
E3.2.4. Category IV quantities of SNM
Category IV quantities of SNM shall be used, processed, or stored in accordance with DoD Component guidance.
E3.3. TRANSPORTATION OF SNM
E3.3.1. Domestic shipments of SNM shall be in accordance with DoE and DoD agreement and consistent with Federal regulations and DoE Order 5632.2A (reference (d)). SNM transport, security, control, and accountability procedures shall be specified in the site security plan.
E3.3.2. Nuclear reactor cores shall be transported and secured in accordance with DoE and DoD agreements and shall be specified in the site security plan.
E3.3.3. Movement of SNM within a Protected Area shall be protected as described in the site security plan.
E3.3.4. Movement of SNM between Protected or Staging Areas at the same site.E126.96.36.199. Category I quantities of SNME188.8.131.52.1. Movement shall be under direct escort and surveillance of at least two armed security force personnel.
E184.108.40.206.2. Security force personnel shall inspect the route before transport to identify and eliminate any condition or situation that could result in delay or risk to the movement.
E220.127.116.11.3. Prior to movement, security force personnel shall conduct a detailed inspection and search of the transport vehicle to ensure the safety and security of the movement.
E18.104.22.168.4. Security procedures for the movement of SNM within staging areas shall be specified in the site security plan.
E22.214.171.124. Category II quantities of SNM movement shall be under material surveillance procedures and protected as specified in the site security plan.
E126.96.36.199. Category III and IV quantities of SNM.E188.8.131.52.1. Movement shall be accomplished as described in the site security plan and shall include protective measures consistent with the category of SNM involved.
E3.4. PROTECTION OF VITAL EQUIPMENT
E3.4.1. All vital equipment shall be contained in designated Vital Areas located within the Exclusion Area. Security procedures for the protection of Vital Areas shall be specified in the site security plan.
E3.4.2. Access control, intrusion detection systems, communication equipment, and testing and maintenance programs shall meet the applicable requirements of enclosure E4.
E3.5. SECURITY CLASSIFICATION OF SNM
Security classification policy guidance for DoD nuclear reactors and SNM are contained in DoD Instruction 5210.67 (reference (o)). In addition, information concerning DoD nuclear reactors and SNM may be controlled as unclassified controlled nuclear information as described in the DUSD(SP) Memorandum (reference (g)).
Attachments - 2
1. Figure E3.A1.F1., Special Nuclear Material Protection Categories
2. Figure E3.A2.F1., Reportable Quantities of Special Nuclear Material
E3.A1. ATTACHMENT 1 TO ENCLOSURE 3
SPECIAL NUCLEAR MATERIAL PROTECTION CATEGORIES
E3.A1.F1. Protection Categories of Special Nuclear Materials
E3.A2. ATTACHMENT 2 TO ENCLOSURE 3
REPORTABLE QUANTITIES OF SPECIAL NUCLEAR MATERIAL
E3.A2.F1. Reportable Quantities of Special Nuclear Materials
E4. ENCLOSURE 4
PHYSICAL SECURITY STANDARDS FOR DoD NUCLEAR REACTORS AND CATEGORY I AND II QUANTITIES OF SPECIAL NUCLEAR MATERIAL
The standards outlined in this enclosure are provided to assist DoD Components in the development, design, and implementation of protective measures for nuclear reactors and SNM. The protective measures used for each location must be based on site-specific considerations and should address all of the areas in this enclosure.
E4.2. SECURITY SYSTEM CONCEPT
E4.2.1. The goal of a security system for nuclear reactors and SNM is to apply efforts and resources in such a manner as to preclude radiological sabotage and the theft or diversion of SNM. To achieve this goal, a security system shall provide the capability to deter, detect, assess, delay, respond to, and neutralize the intended actions of the adversary.
E4.2.2. The components of a security system each have a function and a related security objective. Together, the visible components should attempt to deter a potential adversary. Detection, accomplished through human or electronic measures, identifies possible threats and penetration attempts against the security system in sufficient time to allow the remaining portions of the security system to defeat the adversary. Assessment, through the use of closed-circuit television (CCTV) subsystems, patrols, and fixed personnel, assists in determining the size and intention of an intrusion. Delay, consisting of active and/or passive security measures using various barriers, provides sufficient time for the appropriate response to be made by the security force.
E4.2.3. Response, consisting of security and law enforcement personnel, is provided to the target in such a manner as to prevent the adversary from accomplishing its goal. Response is accomplished by the use of specifically designated, trained, and properly equipped security forces. Neutralization, consisting of apprehending, forcing retreat, or eliminating the adversary, is the final objective.
E4.3. THREAT CONSIDERATIONS
E4.3.1. The development of a security system is guided by a response to actual validated threats or to postulated threats that may arise. The threat is based on data derived from intelligence and investigative sources and may include overt activities or groups, either internal or external, using sophisticated equipment, arms, and methods. The intent of the threat may range from a person or group of persons demonstrating to make a political statement to persons desiring to obtain some SNM to fabricate a nuclear weapon or threaten the public with the potential of radiological contamination. The Defense Intelligence Agency (DIA) provides intelligence products that cover the range of threats mentioned above. In addition, the DIA is available to review plans for development of security systems for DoD nuclear reactors and SNM.
E4.3.2. The minimum standards contained in this enclosure define what shall be required in designing a security system to protect nuclear reactors and SNM based on postulated threats. It is the responsibility of commanders at nuclear reactor and SNM facilities to define the local threat and to respond with commensurate measures.
E4.4. PHYSICAL SECURITY STANDARDS
Physical security measures for the protection of DoD nuclear reactors and SNM shall be accomplished in accordance with the following standards:
E4.4.1. Physical BarriersE184.108.40.206. Physical barriers consisting of fences, walls, and doors shall be designed to impede and aid in the detection of attempted entry and to provide sufficient delay to intrusion, thereby providing security response forces adequate time to apprehend and neutralize intruders.
E220.127.116.11. Physical barriers shall be designed to ensure a means of limiting ingress and egress of personnel and vehicles to a central point, thereby facilitating identification and control procedures.
E18.104.22.168. Physical barriers shall be used to define the perimeter of the Protected Area and Material Access or Exclusion Areas within the Protected Area. Both Exclusion Areas and Material Access Areas shall be located within the Protected Area so that access to vital equipment and SNM stored within these areas requires passage through at least two physical barriers.
E22.214.171.124. An illuminated clear zone shall be maintained adjacent to the physical barrier at the perimeter of the Protected Area and shall be large enough to permit unobstructed observation on either side of the barrier to detect activities and any penetration.
E126.96.36.199. A warning system, consisting of warning signs and a loudspeaker capability to warn intruders of the consequences of unauthorized entry, shall be established as an integral part of the physical barrier system.
E188.8.131.52. Guidance on construction techniques and materials for an effective physical barrier system is contained in MIL-HDBK-1013/1 (reference (j)).
E4.4.2. Access ControlsE184.108.40.206. Material Access and Exclusion Areas shall be designed to positively identify and control all authorized individuals granted unescorted or escorted access to the nuclear reactor and SNM. All personnel without access authorization and their vehicles, packages, and material to be taken in or out of the Protected Area shall be identified, controlled, and searched. All personnel authorized access and their hand-carried packages shall be searched on at least a random basis. The access control system shall be designed to ensure prompt ingress and egress during emergency conditions and ensure access to vital equipment. Access control procedures shall be specified in the site security plan.
E220.127.116.11. Verification of identity shall be conducted by security personnel at area entrances using a numbered picture badge identification system for all personnel authorized access to the Protected Area without escort. Personnel not authorized entry to the Protected Area without escort shall be escorted and shall be badged to indicate that an escort is required. Additional levels of identification using other human, mechanical, or electronic means shall be used when dictated by an increased threat.
E18.104.22.168. The access control system shall be designed to prevent unauthorized entry of prohibited items, such as firearms, explosives, or incendiary devices, into areas containing SNM or a nuclear reactor. The system should also prevent the exit of SNM from areas containing Category II or greater quantities of SNM.
E22.214.171.124. Vehicle access to Protected Areas shall be restricted and controlled. All vehicles, except under emergency conditions, shall be searched for prohibited items before entry to the Protected Area. Emergency vehicles shall be kept under positive control by security forces while in the Protected Area and shall be searched before departing the area upon termination of the emergency.
E126.96.36.199. All keys, locks, combinations, and related equipment used to provide access to Protected, Material Access, Vital, and other restricted access areas shall be controlled to reduce probability of compromise.
E188.8.131.52. The Material Access, Exclusion, and Vital Areas shall be contained within the Protected Areas and their access controls shall be specified in the site security plan.
E4.4.3. Intrusion Detection Systems (IDSs)E184.108.40.206. An intrusion detection system (IDS) shall be provided to detect and assess unauthorized personnel, activities, or conditions and to communicate with a central alarm monitoring activity so that an appropriate response can be initiated. The IDS shall provide the capability of early detection and near real-time assessment of any penetration into a nuclear reactor or SNM facility.E220.127.116.11.1. Rooms, buildings, or portions of a building within a Material Access Area or controlled and alarmed process containing unattended Category I quantities of in-process SNM shall be equipped with an IDS.
E18.104.22.168.2. Doors to vaults and vault-type rooms used to store Category I or II quantities of SNM shall be protected with an IDS.
E22.214.171.124.3. Vault-type rooms used to store Category I or II quantities of SNM shall be equipped with an interior IDS sufficient to detect unauthorized intrusion.
E126.96.36.199.4. All unmanned exits from the Protected Area, Material Access Area, Exclusion Area, or Vital Area shall be equipped with an IDS.
E188.8.131.52. All IDS alarms shall annunciate in a continuously manned central alarm monitoring facility located within the Protected Area and in at least one other independent continuously manned on-site station (not necessarily within the Protected Area) so that a single act could not interfere with the capability of calling for assistance or responding to the alarm. The central alarm monitoring facility shall be located within a building so that its interior is not visible from the perimeter of the Protected Area. Entry to the monitoring facility shall be controlled.
E184.108.40.206. All IDS alarm devices and alarm communication equipment shall be tamper-indicating and self-checking. All IDSs shall have an auxiliary power supply in the event of a loss of primary power. Changeover to auxiliary power shall be automatic and not result in an alarm condition or cause false alarms.
E220.127.116.11. All IDS equipment and components shall have a regularly applied test, maintenance, and quality assurance program to ensure an effective operable system. This program shall be specified in the site security plan.
E4.4.4. Communications EquipmentE18.104.22.168. Nuclear reactor and SNM facilities shall have communications equipment that provides dedicated, rapid, and reliable information exchange among security personnel at the site, the central alarm monitoring facility, security response forces, and with local law enforcement agencies.
E22.214.171.124. There shall be at least two systems of communications between fixed security force locations, such as entry control facilities, and the central alarm monitoring facility. One of these systems shall be radio, and each system shall have an auxiliary power source.
E126.96.36.199. Security personnel, both mobile and fixed, shall have access to a duress alarm or duress code system, as appropriate.
E188.8.131.52. Communications equipment shall be tested daily and maintained on a regular schedule. Test schedule and procedures shall be specified in the site security plan.
Adequate lighting shall be provided in clear zones and around other controlled access areas to discourage unauthorized entry, facilitate the detection of intruders, and assist in the identification of authorized personnel at entry control points during hours of darkness of reduced visibility. All security lighting shall have an auxiliary power source.
E4.4.6. Security ForceE184.108.40.206. A security force shall be established to perform the physical security requirements outlined in this enclosure and enclosure E3., in the site security plan, and in applicable regulations.
E220.127.116.11. Members of the security force shall be trained, equipped, and qualified to perform each assigned security duty and to meet emergency situations. Sufficient security force members shall be readily available to react and respond to security alarms and incidents. (See DoD C-5210 41-M. (reference (p)) regarding force-on-force training exercises associated with security of Category I SNM.)
E18.104.22.168. Each facility shall have continuously on-site at least one full-time member of the security force with the authority and capability to direct physical protection activities and security response forces under emergency situations.
E22.214.171.124. Security force management shall provide for the development, implementation, and enforcement of security procedures. These procedures shall be continuously assessed and revisions made when required by changed conditions.
E5. ENCLOSURE 5
VARIANCES, WAIVERS, AND EXCEPTIONS
Deviations from established security requirements shall be categorized as either a variance, waiver, or exception, and may be applicable to physical security facilities, plans, procedures, equipment, and monitoring standards established in this Directive or in any supplemental issuance.
E5.1.1. A variance is the approved continuation of a nonstandard condition that technically varies from established requirements but essentially affords the same level of security.
E5.1.2. A waiver is the approved temporary continuation of a nonstandard condition that deviates from an established security standard plus creates a security vulnerability to the security system and, therefore, requires compensatory measures. A waiver shall normally be approved for a period not to exceed 12 months and shall be extended only by the authority who granted the waiver and only after a review of the circumstances necessitating the extension.
E5.1.3. An exception is the approved continuation of a nonstandard condition that varies from an established security standard plus creates a security vulnerability to the security system and, therefore, requires compensatory measures. Exceptions shall be granted only when correction of the nonstandard condition is adjudged to be not feasible or cost-effective. Exceptions shall be granted only after a careful and critical evaluation. All exceptions shall be reviewed by the granting authority at least every 2 years or when a major change in site configuration or mission offers the opportunity for corrective action to terminate the nonstandard condition. Exceptions shall be canceled unless it is found, by the approving authority, that the exception continues to be required and is justified.
E5.2. REVIEW OF REQUESTS
Waivers and exceptions shall be evaluated and approved by the commander of the Unified of Specified Command concerned (the respective heads of DoD Components for those sites not otherwise assigned to a Unified or Specified Command). This approving authority may be delegated in writing to a military officer of at least O-7 grade on the staff. When considering a deviation request for a particular facility or site, the approving authority shall review all other waivers and exceptions currently in effect for that facility or site. This review is to ensure that, collectively, the deviations will not establish an overall vulnerability greater than the designated compensatory measures. Each waiver or exception shall be evaluated and approved on a case-by-case basis. Blanket waivers or exceptions are not authorized. A 10 percent deviation from all measurable standards, such as clear zone distances, fence height, etc., is permitted; therefore, such deviation does not require the submission and/or approval of a waiver or exception request.
E5.3. COMPENSATORY MEASURES
E5.3.1. A compensatory measure shall be instituted for each waiver or exception in effect. If appropriate, one compensatory measure may suffice for more than one waiver or exception. A compensatory measure shall also be instituted whenever two or more variances, taken together, are determined to constitute a vulnerability in the security system. For example, a fence that is a few inches below the required height does not by itself constitute a vulnerability; therefore, no compensatory measures are necessary. However, if there are additional variances at the facility or site; e.g., clear zones and perimeter lighting, which taken together are determined to create a vulnerability, then compensatory measures are required.
E5.3.2. The approving authority shall review each waiver or exception to ensure that adequate compensatory measures have been established. Adequate compensatory measures may include additional security forces, procedures, and/or physical security devices such as additional locks, alarm, lighting, anti-intrusion devices, barricades, etc., which provide a level of security comparable to the required security standard. The criteria for accepting compensatory measures shall involve an assessment of the threat or vulnerability that has resulted from the condition that necessitates a waiver or exception. The compensatory measure shall be designed to specifically enhance the security posture in light of the deficient situation. Compensatory measures that consist primarily of instructions to the security force to increase their alertness do not provide a comparable level of security.
HTML by Cryptome.