NSS No. 9-G (Rev. 1) Security of Radioactive Material in Transport

Sekce Odstavec Text
Main
Main 1.1. The IAEA Nuclear Security Series provides guidance for States to assist them in implementing a national nuclear security regime and in reviewing, and when necessary strengthening, this regime. The series also provides guidance for States to fulfil their obligations and commitments with respect to binding and non‑binding international instruments. The Nuclear Security Fundamentals set out the objective of a nuclear security regime and its essential elements in IAEA Nuclear Security Series No. 20, Objective and Essential Elements of a State’s Nuclear Security Regime [1]. The IAEA Nuclear Security Recommendations indicate what a nuclear security regime should address in IAEA Nuclear Security Series Nos 13, Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5) [2]; 14, Nuclear Security Recommendations on Radioactive Material and Associated Facilities [3]; and 15, Nuclear Security Recommendations on Nuclear and Other Radioactive Material out of Regulatory Control [4].
Main 1.2. This Implementing Guide supports Ref. [3].
Main 1.3. This publication supersedes IAEA Nuclear Security Series No. 9, Security in the Transport of Radioactive Material, which was issued in 2008.1 This revision was undertaken to better align this Implementing Guide with Ref. [3], which was published in 2011, to cross‑reference other relevant Implementing Guides published since 2008, and to add further detail on certain topics based on the experience of the IAEA and its Member States in using the previous version.
Main 1.4. This Implementing Guide also takes into account the robust international framework of guidance on the international transportation of dangerous goods, including radioactive material. The United Nations (UN) Model Regulations [5] provide a basis for States to develop security requirements for the transport of all dangerous goods. In some cases, the UN Model Regulations [5] are implemented directly by States. They are also used by international modal organizations (those organizations that focus on a particular mode of transport). The security provisions for the transport of dangerous goods are found in Chapters 1.4 and 7.2 of the UN Model Regulations [5]. Other UN specialized agencies and programmes have taken similar steps to support improved security in the transport of all dangerous goods. The International Maritime Organization, International Civil Aviation Organization, United Nations Economic Commission for Europe, Intergovernmental Organization for International Carriage by Rail and European Agreement concerning the International Carriage of Dangerous Goods by Inland Waterways have all amended their respective international instruments [6–10] to reflect the security provisions of the UN Model Regulations [5].
Main 1.5 The Convention on the Physical Protection of Nuclear Material and its Amendment [11–13] provide an international framework for ensuring the physical protection of nuclear material used for peaceful purposes, including while in international transport. The Convention and its Amendment also apply, with certain exceptions, to nuclear material while in domestic use, storage and transport.
Main 1.6. The IAEA has established requirements for the safety of radioactive material during transport in the IAEA Safety Standards Series. The relevant publications include IAEA Safety Standards Series Nos SSR‑6 (Rev. 1), Regulations for the Safe Transport of Radioactive Material [14]; SF‑1, Fundamental Safety Principles [15]; and GSR Part 3, Radiation Protection and Safety of Radiation Sources: International Basic Safety Standards [16].
Main 1.7. The objective of this publication is to provide guidance to States and their competent authorities on how to establish and maintain the elements of the nuclear security regime relating to the transport of radioactive material. This publication may also assist shippers, carriers and others with transport security responsibilities in designing their security systems.
Main 1.8. This publication is intended to facilitate the establishment of an internationally consistent approach to security of radioactive material in transport in States. This publication builds on the relevant recommendations in Ref. [3] and provides additional guidance on how to implement these recommendations in practice.
Main 1.9. This publication applies to the security of packages containing radioactive material that could cause unacceptable radiological consequences if used in a malicious act during international and domestic transport. It also applies to the security of some nuclear materials of Category III and below during transport, owing to the radioactive nature of the material. This publication provides guidance for protection against unauthorized removal and sabotage.
Main 1.10. This publication also describes arrangements and measures to locate and recover lost, missing or stolen radioactive material. More detailed guidance on this topic can be found in Ref. [4]. This publication does not address emergency preparedness and response aspects of a nuclear security event involving radioactive material in transport. These topics are covered in other IAEA publications [17–20].
Main 1.11. Security and safety measures for transport of radioactive material should be implemented in a coordinated manner to comply with Ref. [14] as well as with relevant IAEA safety standards and nuclear security guidance. Other regulations, standards, codes and guides developed for safety purposes might also apply and could influence the design and implementation of the transport security system of a shipper or carrier. IAEA Safety Standards Series publications state that “Safety measures and security measures must be designed and implemented in an integrated manner so that security measures do not compromise safety and safety measures do not compromise security" [15].
Main 1.12. The transport security measures proposed in this publication are complementary to the provisions in Ref. [2] and its supporting Implementing Guide, Security of Nuclear Material in Transport, IAEA Nuclear Security Series No. 26‑G [21]. This publication does not apply to the physical protection of nuclear material in transport against unauthorized removal for use in a nuclear explosive device as this is addressed in Ref. [2] and its supporting Implementing Guide [21]. However, this publication does apply to the physical protection of nuclear material in transport where the risk with respect to a potential malicious act is owing to the material’s radioactivity rather than its fissile properties. Notably, because of their radioactivity, some Category III and below Category III nuclear material packages might warrant more stringent security measures than those specified by Ref. [21] if the methodology described in this publication is applied.
Main 1.13. This publication also provides guidance on the implementation of transport security measures contained in the Code of Conduct on the Safety and Security of Radioactive Sources (hereinafter referred to as the Code of Conduct) [22] and its supplementary document, Guidance on the Import and Export of Radioactive Sources [23].
Main 1.14. While the guidance presented in this publication is consistent with the UN Model Regulations [5], some specific security measures are complementary to those in the UN Model Regulations.
Main 1.15. Many States have taken into account the guidance in the superseded 2008 Implementing Guide in establishing regulatory requirements. This revised Implementing Guide may be useful to regulatory bodies by providing additional guidance to shippers and carriers.
Main 1.16. This publication follows the structure of Ref. [3]. Section 2 summarizes the objectives of the elements of a State’s nuclear security regime for transport of radioactive material and provides guidance on implementing these elements. Section 3 describes the characterization of radioactive material for the application of appropriate security measures during transport. Section 4 provides guidance on the establishment of a regulatory programme for transport security, including the specification of roles and responsibilities. Section 5 provides guidance on security measures to be taken to protect against unauthorized removal and sabotage during transport. Section 6 provides guidance on measures to be used to locate and recover missing or stolen radioactive material. Appendix I provides background information on the establishment of activity threshold values for transport security measures. Appendix II provides information on the development of a transport security plan. Annex I provides an example transport security plan and describes its content and structure. Annex II provides a sample checklist for transport security verification of a shipment. Annex III provides a cross‑reference of mode independent security measures to where they are discussed within this publication.
Main 2.1. Paragraph 2.1 of Ref. [3] states:
  • Protection against unauthorized removal of radioactive material used in associated facilities and in associated activities;

  • Protection against sabotage of other radioactive material, associated facilities and associated activities;

  • Ensuring the implementation of rapid and comprehensive measures to locate, recover, as appropriate, radioactive material which is lost, missing or stolen and to re‑establish regulatory control.

Main 2.2. Paragraph 2.2 of Ref. [3] states:
Main 2.3. Paragraph 2.3 of Ref. [3] states:
Main 2.4. Paragraph 2.4 of Ref. [3] states:
Main 2.5. Each of these objectives applies to the protection of radioactive material in transport as well as to nuclear material in use and storage (addressed in Ref. [2]).
Main 2.6. This section addresses the elements of a State’s nuclear security regime relating to the transport of radioactive material used to achieve these objectives.
Main 2.7. Paragraph 3.1 of Ref. [3] states that “The responsibility for the establishment, implementation and maintenance of a nuclear security regime within a State rests entirely with that State.”
Main 2.8. Transport security should be an integral part of the State’s overall security regime for radioactive material. Each State has a responsibility to regulate radioactive material in transport in order to protect this material from malicious acts that could result in radiological consequences to persons, property, society and the environment. Responsibility rests entirely with the State to ensure that its security regime provides an effective framework for the protection of radioactive material under its jurisdiction.
Main 2.9. Paragraph 3.2 of Ref. [3] states:
Main 2.10. The State’s nuclear security regime should include the following elements with respect to transport security of radioactive material:
  • Provisions in the legislative and regulatory framework governing the security of the radioactive material in transport;

  • Competent authorities, including a regulatory body responsible for implementing the relevant provisions of the legislative and regulatory framework;

  • Transport specific security systems and measures.

Main 2.11. The elements of the State's security regime applicable to security of radioactive material in transport should be reviewed and, if necessary, updated regularly by the competent authorities.
Main 2.12. The State should ensure that the regulatory body responsible for the security of radioactive material in transport has effective independence. Organizational units responsible for licensing and supervisory activities should have appropriate, sufficient and unfettered discretion in the execution of their tasks, and other government agencies or external organizations should not have undue influence on the execution of licensing and supervisory tasks.
Main 2.13. If the responsibility for the security of radioactive material in transport is divided between two or more competent authorities, arrangements should be made for overall coordination. Clear lines of responsibility between these entities should be established and recorded to ensure continuous protection of the material.
Main 2.14. Paragraph 3.3 of Ref. [3] states:
Main 2.15. States should establish appropriate mechanisms for international cooperation, consultation and information exchange on security techniques and practices for transport, within the constraints of confidentiality. States should assist each other in recovering stolen or missing radioactive material when requested. Appropriate arrangements may be established between shipping, receiving and transit States, and relevant intergovernmental organizations to promote cooperation, consultation and information exchange, and to ensure that radioactive material under their jurisdiction is adequately protected.
Main 2.16. The State’s security contingency plans at the national level should include a description of response measures that the State will undertake in the event of actual or attempted unauthorized removal or sabotage of radioactive material or packages containing such material (referred to in the remainder of the publication simply as ‘packages’) during domestic and international transport. These measures should be coordinated with the State emergency plans for response to a nuclear or radiological emergency consistent with the all hazards approach [2, 21].
Main 2.17. Paragraph 4.38 of Ref. [3] states that “For international transport, shippers and/or carriers should ensure in advance that any State by State variations in security requirements are applied and should determine the point at which the responsibility for security is transferred.”
Main 2.18. The State should require that radioactive material on ships and aircraft registered to that State is adequately protected while in international waters or airspace and until responsibility is transferred to another State.
Main 2.19. The importing State and the exporting State should coordinate prior to transport of radioactive material to reduce the likelihood of malicious acts in connection with the import or export of radioactive material. At a minimum, the coordination should be consistent with paras 23–29 of Ref. [22] for Category 1 and 2 radioactive sources.
Main 2.20. International shipments might involve land transport by road or rail, intermodal transfers, transport by aircraft or ship, transit through multiple States and in‑transit storage. The regulatory body should require the shipper and carrier to maintain the security of the radioactive material throughout transport and to clearly define how any transfer of security responsibilities for the material will occur.
State 2.21. Paragraph 3.4 of Ref. [3] states:
  • Takes into account the risk of malicious acts involving radioactive material that could cause unacceptable radiological consequences;

  • Defines the radioactive material, associated facilities and associated activities which are subject to the nuclear security regime in terms of nuclides and quantities of radioactive material present;

  • Prescribes and assigns governmental responsibilities to relevant entities including an independent regulatory body;

  • Places the prime responsibility on the operator, shipper and/or carrier for implementing and maintaining security measures for radioactive material;

  • Establishes the authorization process for radioactive material, associated facilities and associated activities. As appropriate, the authorization process concerning the security of radioactive material could be integrated within one defined for safety or radiation protection;

  • Establishes the inspection process for security requirements;

  • Establishes the enforcement process for the failure to comply with security requirements established under legislative and regulatory framework;

  • Establishes sanctions against the unauthorized removal of radioactive material and sabotage of associated facilities and associated activities;

  • Takes into account the interface between security and safety of radioactive material.”

State 2.22. The above applies to radioactive material in transport as well as in use and storage. In addition, to address the secure transport of radioactive material, the national legislative and regulatory framework should do the following, in accordance with a graded approach and where applicable:
  • Establish an authorization process specific to radioactive material in transport, which may include issuance of specific licences or other forms of authorization;

  • Establish a procedure for submission of a transport security plan by the shipper and carrier and, as appropriate, for approval of the plan by the competent authority prior to transport;

  • Prescribe requirements for the design and evaluation of the transport security system by the shipper and carrier, as appropriate;

  • Include provisions for the regular review of the transport security requirements to take into account advances in technology and potential changes in the threat;

  • Establish a programme that verifies continued compliance with transport security requirements through periodic inspections and reviews, and ensures that corrective actions are taken when needed;

  • Establish a policy to identify, classify and control sensitive information relating to transport security, the unauthorized disclosure of which could compromise the security of radioactive material in transport;

  • Include requirements, consistent with national practices, for ensuring the trustworthiness of persons with authorized access to sensitive information or to radioactive material during transport or who have specific security responsibilities during transport and establish trustworthiness verification and security clearance procedures for such persons commensurate with their responsibilities (e.g. requirements for positive identification of such persons);

  • Establish requirements for reporting of security related events, including missing or lost packages of radioactive material.

State 2.23. Within the legal and regulatory framework, each State should clearly assign security responsibilities to the shipper, carrier, receiver or others engaged in the transport of radioactive material. For example, the State might choose to hold the shipper solely responsible for security during transport by requiring that the shipper either conduct the transport operation or use a carrier that implements security measures under the direction of the shipper. The State might also choose to assign the responsibilities for security to carriers who are authorized by the competent authority to securely transport radioactive material, and permit the shipper to rely on the carrier’s security system. Typical responsibilities assigned by the State include developing a transport security plan, providing advance notification of the shipment details to the receiver and completing other relevant technical, procedural and administrative activities.
State 2.24. The State’s legislative and regulatory framework should also specify the requirements for contingency planning by shippers, carriers and receivers, including requirements for coordination with State and local authorities.
Regulatory Body 2.25. Paragraph 3.11 of Ref. [3] states:
Regulatory Body 2.26. The regulatory body responsible for transport security should implement the relevant elements of the legislative and regulatory framework and authorize transport activities only when they comply with the framework’s regulations. When the applicant is required to submit a transport security plan, the review of the transport security plan can be used by the regulatory body to determine whether to issue an authorization.
Regulatory Body 2.27. The regulatory body should have a clearly defined legal status; independence from shippers, carriers, receivers and others involved in transport; and the legal authority and capabilities needed to perform its responsibilities and functions effectively.
Regulatory Body 2.28. The regulatory body should verify continued compliance with transport security regulations and, as appropriate, relevant authorization conditions through inspections and reviews. It should also require that shippers and carriers take corrective action when a requirement is not met. Inspections of security measures implemented by shippers, carriers and receivers could be coordinated with inspections by other regulatory bodies responsible for verifying compliance with other regulatory requirements, such as those for radiation protection and safety, taking into account the need for protection of sensitive information.
Regulatory Body 2.29. The responsibilities of the regulatory body with respect to transport security should include the following:
  • Establishing requirements for security during the transport of radioactive material based on the national threat assessment, the design basis threat or alternative threat statement (see para. 2.45). The IAEA Nuclear Security Series Nos 10-G (Rev. 1), National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements [24]; and 27‑G, Physical Protection of Nuclear Material and Nuclear Facilities (Implementation of INFCIRC/225/Revision 5) [25], can be used, as applicable, in order to protect against unauthorized removal and sabotage.

  • Establishing requirements for the content and submission of transport security plans, if required.

  • Licensing or otherwise authorizing shippers and carriers to transport radioactive material when such a licence or other form of authorization is required.

  • Performing inspections (both announced and unannounced) and reviews of radioactive material shipments as needed to ensure that the shipments are undertaken in compliance with the applicable requirements and conditions established by the regulatory body.

  • Performing evaluations of the transport security systems implemented by operators consistent with a graded approach and including exercises, where appropriate, depending on the regulatory approach chosen by the State.

  • Establishing requirements for shippers and carriers to perform trustworthiness checks for all personnel with security responsibilities during transport of radioactive material or access to sensitive information, using a graded approach.

  • Establishing which transport related information should be considered as sensitive information and ensuring that its confidentiality is protected accordingly, including within the regulatory body itself.

  • Enforcing applicable requirements, including those regarding the taking of corrective actions when needed.

  • Liaising with other competent authorities, in particular those responsible for transport safety and import and export control.

Regulatory Body 2.30. The responsibilities described in this subsection as well as others assigned to the regulatory body could be performed by the regulatory body in cooperation with other competent authorities.
Shipper, carrier and receiver 2.31. Paragraph 3.13 of Ref. [3] states:
  • Comply with all applicable regulations and requirements established by the State and the regulatory body;

  • Implement security measures that comply with requirements established by the State and the regulatory body;

  • Establish quality management programmes that provide:

    • Assurance that the specified requirements relating to nuclear security are satisfied;

    • Assurance that the components of the nuclear security system are of a quality sufficient for their tasks;

    • Quality control mechanisms and procedures for reviewing and assessing the overall effectiveness of security measure;

  • Report to the regulatory body and/or to any other competent authority, all nuclear security events involving radioactive material, associated facilities and associated activities according to national practices;

  • Cooperate with and assist any relevant competent authorities in case of a nuclear security event.”

Shipper, carrier and receiver 2.32. The above recommendations drawn from Ref. [3] should also be considered to apply to receivers, as appropriate.
Shipper, carrier and receiver 2.33. The legislative and regulatory framework should ensure that these general measures explicitly include transport security. In particular, the regulatory body should ensure that security measures implemented by the shipper, carrier and receiver are operational and that all necessary permits and authorizations have been obtained prior to the commencement of transport.
Shipper, carrier and receiver 2.34. The regulatory framework should clearly allocate transport security responsibilities to the shipper, carrier and receiver. When the shipper relies on the carrier or receiver to perform security functions assigned to the shipper, these functions should be specified in the contractual arrangements between the shipper and the carrier or receiver. Any transfers of security responsibilities between the shipper, the carrier, the receiver and others engaged in the transport of radioactive material should be clearly specified and agreed to before the transport is undertaken.
Shipper, carrier and receiver 2.35. When authorized by the State, the receiver can be assigned responsibility for implementing security measures in certain cases. For example, for import shipments, the receiver might have the primary responsibility for implementing security measures for radioactive material once the shipment arrives in the importing State.
Shipper, carrier and receiver 2.36. The carrier should ensure that its activities are in compliance with applicable national regulations. These might include the following:
  • Providing a conveyance and crew that complies with all applicable safety and security requirements, including crew fitness for duty (e.g. trustworthiness, drug testing, training and licensing), conveyance suitability and maintenance requirements;

  • Ensuring that any equipment provided by the carrier is suitable for the application intended and satisfies regulatory requirements;

  • Ensuring that, if an incident occurs during transport, carrier personnel are prepared to act in accordance with the emergency and contingency plans.

Subcontracting 2.37. The regulatory body should require that, if subcontractors are used during the shipment, the contracting party (whether the shipper or carrier) ensures that the subcontractor is fully aware of applicable security requirements. The contracting party should also verify that appropriate security arrangements are maintained throughout the shipment. If a licence or other form of authorization is required to perform transport activities, the contracting party should ensure that its subcontractor is duly licensed or otherwise authorized.
Deficiencies 2.38. The regulatory body should require that, if deficiencies are discovered in the transport security system prior to shipment, the shipper or carrier correct the deficiencies or implement immediate compensatory measures to ensure appropriate protection for the shipment before starting the transport activities.
Deficiencies 2.39. If deficiencies are discovered by the crew during transport, the regulatory body should require that they be reported immediately to the management of the shipper or carrier and that compensatory measures be taken to ensure appropriate protection for the shipment.
Deficiencies 2.40. Paragraph 3.17 of Ref. [3] states:
Deficiencies 2.41. Paragraph 3.18 of Ref. [3] states:
Deficiencies 2.42. In particular, the State should assess and periodically review its national threat for radioactive material in transport and evaluate the implications of any changes in the threat [3].
Deficiencies 2.43. The regulatory body should require that shippers, carriers and receivers implement security measures appropriate to counter the national threat. Additionally, the regulatory body may choose to communicate threat information, including changes in the threat, to the shipper, carrier and receiver to aid in the development of their security systems and transport security plans. Such information should be appropriately protected owing to its sensitive nature.
Deficiencies 2.44. As discussed in Ref. [24], States will vary in their capabilities for identifying and evaluating threat information. Sources of information for the national threat assessment should include intelligence agencies as well as ministries of interior, defence, transportation and foreign affairs, law enforcement, customs, coast guard and other agencies with security related responsibilities. The regulatory body or bodies may also participate in the threat assessment process. The national threat assessment should be updated on a regular basis or when the circumstances make it necessary, for example, when new information pertaining to criminal activity is acquired.
Deficiencies 2.45. One method for using threat information when establishing regulatory requirements is to apply the national threat assessment directly. Alternatively, the national threat assessment can be used to develop and apply a design basis threat or an alternative threat statement, which the regulatory body could adapt and use in developing regulatory requirements. Further guidance on threat assessment, on defining a design basis threat or an alternative threat statement based on a threat assessment, and considerations concerning the decision of whether to use a design basis threat or an alternative threat statement is given in Refs [2] and [25].
Deficiencies 2.46. The regulatory body should provide guidance to the shipper, carrier, receiver and others engaged in transport of radioactive material on recognizing the potential for insider threats within their organizations. Security systems should be designed, in a graded manner, to protect against the insider threat, particularly for personnel that exercise control over a shipment (such as a truck driver). More information relating to insider threats may be found in IAEA Nuclear Security Series No. 8-G (Rev. 1), Preventive and Protective Measures against Insider Threats [26].
Deficiencies 2.47. Establishing risk informed transport security systems and measures involves taking into account risk management, applying a graded approach and defence in depth, specifying risk informed security provisions and ensuring a coordinated approach to the safety–security interface. Each of these areas is addressed in the following subsections.
Risk Management 2.48. The State should use a risk management approach to maintain the risk of unauthorized removal or sabotage during transport at an acceptable level. Such an approach includes evaluating the threat and potential consequences of malicious acts and ensuring that appropriate security measures are in place to protect against such acts.
Risk Management 2.49. The State should decide what level of risk is acceptable and what level of effort is justified to protect radioactive material in transport against the threat defined in the national threat assessment, with the goal of reducing the risk associated with the shipment to an acceptable level. The level of risk judged to be acceptable will be influenced by the availability of resources, the benefit of the protected asset to society and other priorities. The required security measures may take advantage of measures established for radiological safety purposes.
Risk Management 2.50. The regulatory body should develop requirements by using a graded approach applying the principles of risk management, including the categorization of radioactive material in accordance with its risk level.
Graded approach 2.51. Paragraph 3.23 of Ref. [3] states that “The regulatory body should develop requirements by using a graded approach applying the principles of risk management including a categorization of radioactive material.”
Graded approach 2.52. Security based categorization when applied to the security of radioactive material in transport refers to the process of categorizing radioactive material based on its activity level and use, assigning an appropriate transport security level and making adjustments to the transport security level and resulting security measures based on specific factors or considerations. Considerations used in the categorization (described in more detail in Section 3) should include the level of threat and the relative attractiveness of the material.
Graded approach 2.53. Requirements based on a graded approach will vary in their depth and rigour commensurate with the threat and the potential radiological consequences resulting from a malicious act involving the radioactive material being protected.
Graded approach 2.54. In addition to using the concept of the graded approach for specifying requirements for security of radioactive material in transport, a State should consider the use of this concept to define security levels for other security measures associated with the transport of radioactive material, including those addressing information protection and trustworthiness of individuals.
Defence in depth 2.55. The regulatory body should require that a defence in depth approach2 be incorporated into the design of the transport security system to provide the functions of detection, delay and response. This involves implementing a designed combination of successive layers of security equipment, procedures and administrative measures (e.g. the organization of guards and the performance of their duties) and features of the transport equipment (e.g. the conveyance, packages and any protective overpacks).
Defence in depth 2.56. When appropriate, the security functions of detection, delay and response should be provided by multiple independent measures so that failure of one measure does not mean loss of a function. For example, detection might rely on observation by personnel and also use electronic measures to detect intrusion into the cargo compartment, and delay might be achieved through multiple independent physical barriers such as the conveyance enclosure, protective overpacks and the package itself.
Methods for specifying risk informed security provisions 2.57. Once the State has completed the national threat assessment, and generated a design basis threat or an alternative threat statement, if desired, the specification of risk informed transport security measure for radioactive materials will involve the following:
  • Evaluating the potential consequences of malicious acts involving radioactive material;

  • Establishing transport security levels to be applied to packages or conveyances of radioactive material (discussed in more detail in Sections 3 and 4);

  • Defining security goals for each transport security level (discussed in more detail in Sections 3 and 4);

  • Specifying administrative and technical requirements or specific security measures for each security level.

Methods for specifying risk informed security provisions 2.58. The stringency of transport security requirements could vary based on threat, risk and the feasibility and cost of implementation of particular sets of requirements. For example, the regulatory body might choose to specify more stringent security measures for shipments of Category 1 radioactive sources as compared to Category 2 radioactive sources, requiring the following for Category 1 sources:
  • Electronic position monitoring of conveyances;

  • Additional crew members;

  • Guards and/or law enforcement personnel;

  • Escort vehicles;

  • Redundant communication equipment.

Safety and security interface 2.59. A well‑coordinated approach between transport safety and security is needed. With respect to the transport of radioactive material, the State should ensure the following:
  • A balance is maintained between safety and security concerns throughout the nuclear security regime, from the development of the legislative framework to the implementation of safety and security measures;

  • Regulatory requirements for safety and security are consistent, especially when responsibilities for safety and security are assigned to different competent authorities;

  • Safety requirements do not compromise security and security requirements do not compromise safety;

  • Authorities in charge of nuclear safety and of nuclear security coordinate, as applicable;

  • Safety culture and security culture are both addressed in an integrated management system;

  • Security measures for radioactive material in transport take into account those measures required for safety and vice versa, during both normal and emergency situations;

  • Security measures in place during a response to a nuclear security event do not adversely affect the safety of the transport personnel and the public, to the extent possible.

Safety and security interface 2.60. Some measures required by safety regulations can also improve security. For example, the seals required on all Type A, Type B, Type C and fissile packagings provide evidence that the package has not been opened. In addition, the tie‑downs required to secure a package to the conveyance can also be suitable for affixing security equipment such as locks. However, not all tie‑downs are suitable for security purposes, such as those constructed of webbing or other materials that are not resistant to cutting.
Safety and security interface 2.61. When designing security systems, the potential security benefits of safety features of the packages used to contain the radioactive material should be considered. For example, as the potential radiological consequences associated with the material being transported increase, so does the weight, size and robustness of the package that needs to be used. Robust, heavy packages can provide security benefits by simply using good quality locks to secure key packaging components such as the closure lid or shields that encase the packaging. Robust, heavy packages also increase the difficulty for an adversary to remove or sabotage the shipment.
Safety and security interface 2.62. Possible conflicts of safety and security measures during transport should also be considered, such as placarding and labelling,3 route and mode selection, and information management. For example, if a State were to determine, based on an analysis of the threat, to remove (on an exceptional basis) any markings, placarding or labelling placed externally on the package or the vehicle with information on the hazards of the material, compensatory measures should be applied such as escorting personnel who can provide information on the nature and hazards of the material to emergency responders. Solutions to potential conflicts such as these should be assessed and approved by the regulatory bodies responsible for transport safety and security.
Safety and security interface 2.63. Sustaining the State's nuclear security regime is necessary to ensure it remains effective in the long term. It is advisable to establish a programme for sustainability. Sustainability measures include those applicable to security culture, quality management and information security [27]. Each of these topics is addressed in the sections to follow.
Security culture 2.64. Nuclear security culture plays an important role in maintaining personnel vigilance and sustaining security measures used to protect against sabotage or unauthorized removal of radioactive material during transport. An effective security culture is dependent on effective planning, education, training and awareness, as well as the personnel who plan, operate and maintain the security systems. Even a well‑designed security system can be degraded if, for example, the shipper or carrier fails to follow procedures.
Security culture 2.65. As indicated in IAEA Nuclear Security Series No. 7, Nuclear Security Culture [28], all organizations involved in implementing nuclear security should give due priority to the security culture and to the development and maintenance necessary to ensure its effective implementation in the entire organization.
Security culture 2.66. Personnel involved in transport operations should be aware of the importance of establishing and maintaining an effective security culture. Such awareness can be achieved by regular briefings on strong and effective security practices and strong adherence to procedures. More detailed guidance on nuclear security culture is available in Ref. [28].
Quality management programme 2.67. The regulatory body should require that shippers, carriers and receivers establish, implement and maintain quality management programmes with the goal of ensuring that security systems are designed, implemented, operated and maintained in a way that meets regulatory requirements for security. In particular, the quality management programme should provide a system for ensuring that all relevant security measures, such as the tracking system and communications equipment, are operating correctly. The quality management programme should apply to all security related activities (technical, procedural and administrative) and should be periodically reviewed. The quality management programme should include the following:
  • Operating procedures and instructions to personnel (specific to role);

  • Human resources management and training;

  • Equipment maintenance, updating, repair and calibration;

  • Performance testing and monitoring of operating systems;

  • Configuration management4 for security systems (including computer systems);

  • Resource allocation to ensure continued performance of the security system.

Quality management programme 2.68. Quality management programmes for safety are influenced by the need for openness and transparency. While the quality management programmes for security will be based on similar concepts, the need to protect the confidentiality of sensitive information will need to be taken into account.
Quality management programme 2.69. The quality management programme should comply with International Standards Organization for Standardization documents such as, Quality Management Systems — Requirements (ISO 9001) [29] or, Specification for Security Management Systems for the Supply Chain (ISO 28000) [30]. Certification by an accredited agency could be selected by the regulatory body as a method for meeting the requirements for the quality management system.
Information security 2.70. Access to sensitive information relevant to transport security for radioactive material should be limited to those people who need that information in order to perform their jobs. Key elements of information security include identifying the information that needs to be protected, designating individuals who have authorized access to such information, and protecting such information from disclosure to individuals who do not have this access. Information security measures should be established to ensure confidentiality, integrity and availability (to persons with a need to know the information) of information relating to transport security. In particular, sensitive parts of the transport security plan should be subject to information security measures.
Information security 2.71. The regulatory body and other competent authorities should take steps, consistent with national requirements and procedures, to ensure appropriate protection of information relating to transport operations and security systems, the unauthorized disclosure of which could compromise security. This includes identifying which information needs to be protected and the level at which it needs to be protected, using a graded approach.
Information security 2.72. The regulatory body should require that shippers, carriers and receivers follow specific provisions for information security.
Information security 2.73. Certain information might need to be passed to various recipients for operational purposes (such as ferry bookings and transport network requirements). The stringency of the protection of such information should be proportionate to the risk associated with the unauthorized disclosure of information on such material. However, the protection should not be so stringent that it adversely affects transport operations.
Information security 2.74. The State should establish sanctions to be applied for violation of information security requirements. These sanctions should be sufficiently severe to act as a deterrent against such violations and should be commensurate with the risk associated with the unauthorized disclosure of the sensitive information.
Information security 2.75. More detailed guidance on security of nuclear information is contained in IAEA Nuclear Security Series No. 23‑G, Security of Nuclear Information [31].
Sustainability management and planning 2.76. Paragraph 3.4 of Ref. [27] states:
Sustainability management and planning 2.77. The State should require that the local authorities, shippers, carriers and all others involved in a shipment are appropriately trained and prepared to respond if a malicious act is undertaken against a shipment of radioactive material. A contingency plan to respond to a nuclear security event occurring during a shipment of radioactive material should be developed by the shipper or carrier and periodic rehearsals, tests or exercises of the plan should be conducted.
Sustainability management and planning 2.78. The regulatory body should also require that shippers, carriers, receivers and others engaged in transport security have appropriate and effective security measures in place to detect nuclear security events and to promptly report and respond to such events.
Sustainability management and planning 2.79. The State’s regulatory framework should clearly specify the following:
  • The requirements, roles and responsibilities for contingency planning;

  • Which contingency response capabilities are to be provided by the State, the operators and relevant stakeholders;

  • How these capabilities are to be coordinated [17, 18].

Sustainability management and planning 2.80. Arrangements should be made to ensure the continued effectiveness of the security system during a nuclear security event.
Sustainability management and planning 3.1. Radioactive material should be characterized to determine appropriate security requirements to protect against unauthorized removal or sabotage during transport, in accordance with a graded approach. This characterization should take into account the potential radiological consequences of unauthorized removal or sabotage and subsequent dispersal (e.g. in a radiological dispersal device) or use for other malicious purposes. When multiple radionuclides are transported together (e.g. in the same package or conveyance), the aggregation of material should be considered.
Sustainability management and planning 3.2. In some cases, the physical and chemical form of the material might make it particularly attractive to adversaries (e.g. forms that are particularly easy to disperse). This comprehensive approach accounts for different ways the radioactive material might be used or sabotaged in a malicious act.
Sustainability management and planning 3.3. In this section, an approach for characterizing radioactive material that is applicable to transport security is provided, including a method for assigning appropriate levels of security. Factors such as radioactive material aggregation, potential radiological consequences of sabotage and attractiveness of radioactive material are also addressed.
Sustainability management and planning 3.4. A categorization system should be established to implement a graded approach to security of radioactive material in transport. Transport security levels should be associated with specific types and quantities of radioactive material defined by the categorization system, thereby identifying when greater levels of protection are warranted. The regulatory body should require that material assigned to higher transport security levels be protected with more stringent security measures during transport than material at lower transport security levels.
Sustainability management and planning 3.5. The material to be transported should be characterized to identify the radionuclides, the form and activities of the material in order to assign a transport security level. In some cases, a shipment might consist of a single radionuclide, either in a single package or multiple packages. In other cases, there might be multiple radionuclides within a single package or multiple packages containing multiple radionuclides within a single shipment. The identity and activity level of each of the radionuclides should be identified or if not possible (e.g. for radioactive waste), the identity and activity level of the dominant radionuclides (number of A2, described in para. 3.8) should be identified.
Sustainability management and planning 3.6. The international dangerous goods transport regulations [5] use two categories of material for application of security requirements: all dangerous goods and high consequence dangerous goods. Since radioactive material is a class of dangerous goods, consistency with the dangerous goods regulations can facilitate its transport by minimizing unnecessary complications. Therefore, two categories of radioactive material should be used for the application of security measures to correspond to the two categories in the international dangerous goods transport regulations.
Sustainability management and planning 3.7. These two categories, referred to in this publication as transport security levels, can be established using an activity threshold to separate them by security significance. The application of this threshold separates radioactive material into two categories: material with activities below the threshold and material with activities above the threshold. Radioactive material with activities lower than the threshold is assigned to the basic security level and radioactive material with activities equal to or higher than the threshold is assigned to the enhanced security level.
Sustainability management and planning 3.8. Depending on the radionuclide, this threshold should be based on the D value or the A value for the particular radionuclide. Paragraph 201 of Ref. [14] states:
Sustainability management and planning 3.9. Relevant D values can be found in annex I of Ref. [22] for a number of commonly used radionuclides. This list is reproduced in Appendix I of this publication. For the radionuclides listed, the D value should be used in establishing the threshold between sources that should be protected at a basic security level and those that should be protected at an enhanced security level. Further guidance on D values can be found in table 2 of Ref. [32] and in table 1 of Ref. [33].
Sustainability management and planning 3.10. All commonly transported radionuclides are assigned A values in Ref. [14]. These values represent the maximum activity that can be safely transported in a Type A or non‑accident resistant package. There are two A values listed in Ref. [14], A1 and A2, for different forms of material. The A2 value should be used for security purposes in establishing the threshold for radionuclides not listed in annex I of Ref. [22].
Sustainability management and planning 3.11. States should use one of the following to determine the activity threshold for categorization of radioactive material for transport security:
  • For radionuclides listed in annex I of Ref. [22], an activity equal to or exceeding that for a Category 2 radioactive source6 (ten times the D value);

  • For all other radionuclides, an activity of 3000A2 or greater.

Sustainability management and planning 3.12. A State should also define which radioactive material poses very low potential radiological consequences if subject to unauthorized removal or sabotage and thus does not represent a substantial security concern. Packages containing such material do not need to be assigned a transport security level and only need to be controlled through prudent management practices.
Sustainability management and planning 3.13. For radioactive material transported in excepted packages and for low specific activity (LSA‑I) and surface contaminated objects (SCO‑I) (see Ref. [14] for further information), no specific security measures beyond the control measures required by the safety regulations and prudent management practices already implemented by shippers and carriers are recommended.
Sustainability management and planning 3.14. Such material includes the following:
  • UN 2908 RADIOACTIVE MATERIAL, EXCEPTED PACKAGE – EMPTY PACKAGING;

  • UN 2909 RADIOACTIVE MATERIAL, EXCEPTED PACKAGE – ARTICLES MANUFACTURED FROM NATURAL URANIUM or DEPLETED URANIUM or NATURAL THORIUM;

  • UN 2910 RADIOACTIVE MATERIAL, EXCEPTED PACKAGE – LIMITED QUANTITY OF MATERIAL7 ;

  • UN 2911 RADIOACTIVE MATERIAL, EXCEPTED PACKAGE – INSTRUMENTS OR ARTICLES8 ;

  • UN 2912 RADIOACTIVE MATERIAL, LOW SPECIFIC ACTIVITY (LSA‑I), non‑fissile or fissile‑excepted;

  • UN 2913 RADIOACTIVE MATERIAL, SURFACE CONTAMINATED OBJECTS (SCO‑I or SCO‑II), non‑fissile or fissile‑excepted;

  • UN 3507, URANIUM HEXAFLUORIDE, RADIOACTIVE MATERIAL, EXCEPTED PACKAGE, less than 0.1 kg per package, non‑fissile or fissile‑excepted.

Sustainability management and planning 3.15. Once radioactive material has been categorized as above or below the applicable threshold, it should be assigned to a transport security level.
Sustainability management and planning 3.16. The State should determine an appropriate basis for categorization of radioactive material for assignment of a transport security level for domestic and international transport. Categorization can be performed on a per package, per consignment or per conveyance basis.
Sustainability management and planning 3.17. The per package approach for specifying the transport security level is the simplest approach to apply, but does not take into account the possibility of multiple packages being transported together. There are operational benefits to this approach, such as not requiring carriers to keep a tally of the total activity on the conveyance. However, it might not provide an accurate measure of the potential harm that a single diverted conveyance could result in, as multiple packages could be present on a single conveyance.
Sustainability management and planning 3.18. The per consignment approach specifies the transport security level based on the activity of all packages presented for transport by a shipper at one time to a carrier, but does not take into account the possibility of multiple consignments from multiple shippers being carried on a single conveyance. A consignment consists of the package(s) presented for transport by a shipper at one time to a carrier. This approach results in aggregating the total activity offered by a shipper at one time and does not require the carrier to keep a tally of the total activity on the conveyance. However, multiple consignments from multiple shippers could still be accepted by the carrier, which could result in the conveyance being assigned a lower transport security level than that warranted by the aggregate activity of the packages in the conveyance.
Sustainability management and planning 3.19. The per conveyance approach provides the best measure of security significance, because all the packages on a conveyance could be seized in a single action by an adversary. However, this approach is very difficult to apply to international air and sea transport where consignments from various shippers might be consolidated and carriers might not accept the shipment owing to the complexity of keeping track of activity on‑board a conveyance when this basis for categorization is applied.
Sustainability management and planning 3.20. The per package approach is used in this publication for specifying the transport security level. States might wish to consider either the per conveyance or per consignment approach for domestic transport by vehicle, but a per package approach is recommended for international transport by all modes. When organizing an international shipment, an operator should take into account the domestic approaches chosen by the States involved.
Assignment of transport security levels on a per package basis 3.21. Packages with activity levels lower than the threshold value discussed in the previous section should be assigned to the basic transport security level.
Assignment of transport security levels on a per package basis 3.22. Packages with activity levels equal to or higher than this threshold value should be assigned to the enhanced transport security level.
Assignment of transport security levels on a per package basis 3.23. Some packages assigned to the enhanced transport security level might contain very high activity material, in some cases up to several hundred thousand times the D values. Because of the wide range of activity in the enhanced transport security level (ranging from 10D to several hundred thousand D), States might wish to establish subcategories within the enhanced transport security level and specify security measures for each subcategory. For example, the regulatory body could require that packages with between 10D to 1000D be protected using a specified set of security measures and packages with more than 1000D be protected using a more stringent set of security measures.
Assignment of transport security levels on a per package basis 3.24. In contrast, some material and objects assigned to the enhanced transport security level might present sufficiently limited potential for use in a malicious act that they can be assigned to the basic transport security level. This is possible if the material or objects have either radiological or physical properties that severely limit their effectiveness if used in a malicious act. This can be due to the material or objects being any of the following:
  • Low specific activity material;

  • Large contaminated objects (e.g. contaminated packagings);

  • Activated metals.

Assignment of transport security levels on a per package basis 3.25. The State could consider assigning materials and objects that it deems to be sufficiently unsuitable for use in a malicious act to the basic transport security level when transported within the State. The State might consider defining subcategories within the basic security level for domestic transport. These subcategories would take into account material activity and attractiveness to potential adversaries (see paras 3.33 and 3.34), with appropriate security measures assigned to each subcategory based on a graded approach.
Assignment of transport security levels on a per package basis 3.26. In some cases, it is necessary to aggregate radioactive material in order to determine whether or not a package or collection of packages exceeds the activity threshold for assignment to the enhanced transport security level, for example, in cases where at least one of the following applies:
  • More than one radionuclide is transported in the same package (e.g. a moisture density gauge containing 137Cs and 241Am/Be);

  • The State requires aggregation of packages for domestic transport.

Assignment of transport security levels on a per package basis 3.27. In such cases, whether or not a package or collection of packages should be assigned to the enhanced transport security level can be calculated by first dividing the activity threshold for categorization of radioactive material of each radionuclide by its activity and then summing the resulting ratios. If this sum is less than 1, then the activity threshold has not been exceeded. In contrast, if this sum is equal to or greater than 1, then the activity threshold has been exceeded.
Assignment of transport security levels on a per package basis 3.28. This calculation corresponds to the formula:
Assignment of transport security levels on a per package basis 3.29. Nuclear security systems designed to protect radioactive material from unauthorized removal generally also provide some degree of protection for the radioactive material against sabotage [3].
Assignment of transport security levels on a per package basis 3.30. In some cases, specific security measures to protect against sabotage might be warranted based on the potential of the radioactive material to lead to unacceptable radiological consequences if sabotage occurs.
Assignment of transport security levels on a per package basis 3.31. The State should identify which shipments warrant protection against sabotage. States might reach different conclusions regarding the types of potential situations that constitute unacceptable radiological consequences. Factors that should be considered include the following:
  • Package contents (radionuclides, activities, physical and chemical forms);

  • Package and conveyance design;

  • Effect of the postulated sabotage event(s) on the contents/package/ conveyance combination;

  • Location where the act of sabotage could occur (e.g. in a highly populated area) [21].

Assignment of transport security levels on a per package basis 3.32. For additional guidance on determining what constitutes unacceptable radiological consequences see paras 3.93–3.95 of Ref. [25].
Assignment of transport security levels on a per package basis 3.33. The State might wish to adjust the transport security level or specify more stringent security measures for shipments of material that the State determines are particularly attractive to potential adversaries.
Assignment of transport security levels on a per package basis 3.34. Factors influencing the attractiveness of radioactive material to potential adversaries should be considered, particularly factors that would affect the potential radiological consequences of a malicious act. Such factors include chemical and physical form (e.g. solubility or powder), type of radiation emitted (alpha, beta, gamma, neutron), respirability and the half‑life of the radionuclides.
Assignment of transport security levels on a per package basis 4.1. This section contains guidance for regulatory bodies on developing or enhancing their regulatory programmes to address the security of radioactive material during transport.
Assignment of transport security levels on a per package basis 4.2. Paragraph 4.6 of Ref. [3] states that “[t]he regulatory body should establish goals or objectives that define the required outcome of nuclear security systems for each security level.”
Assignment of transport security levels on a per package basis 4.3. The regulatory body should select a regulatory approach that the shipper, carrier, receiver and others engaged in transport are required to follow to meet the applicable security goal for a given transport security level. The following are three distinct approaches that the regulatory body may use:
  • A prescriptive approach, in which the regulatory body specifies the security measures that the shipper, carrier, receiver and others engaged in transport should implement for a given transport security level;

  • A performance based approach, in which the regulatory body requires the shipper, carrier, receiver and others engaged in transport to design a nuclear security system and demonstrate to the regulatory body that the system meets a security goal set by the regulatory body;

  • A combined approach, in which the regulatory body draws on elements of both the prescriptive and performance based approaches.

The prescriptive approach 4.4. In a prescriptive approach, the regulatory body establishes a set of specific security measures that the shipper, carrier and receiver are required to implement. Section 5 provides a set of potential prescriptive security measures.
The prescriptive approach 4.5. Advantages of a prescriptive approach include the following:
  • Simplicity of implementation for the regulatory body and the shipper, carrier, receiver and others engaged in the transport of radioactive material;

  • Elimination of the need to transmit sensitive threat information;

  • Ease of inspection and auditing.

The prescriptive approach 4.6. The use of a prescriptive approach might be particularly appropriate in cases where both the threat and potential unacceptable radiological consequences are low.
The prescriptive approach 4.7. The disadvantage of the prescriptive approach is its relative lack of flexibility. In addition, this approach might not allow the shipper and carrier to optimize security measures.
The performance based approach 4.8. In a performance based approach, the regulatory body defines security goals on the basis of a national assessment of the threat and requires that the shipper and carrier design and implement a combination of security measures to meet these goals. This approach allows for flexibility in choosing the particular security measures to be implemented.
The performance based approach 4.9. The advantage of this approach is that it recognizes that an effective transport security system might be composed of many combinations of security measures, and that each shipper’s and carrier’s circumstances might be unique. The performance based approach is also the most cost effective approach when the necessary knowledge and skills are available.
The performance based approach 4.10. The disadvantages of this approach are that it depends upon the security system designer and the regulatory body having sufficient personnel with relatively high levels of security expertise, and on the regulatory body sharing sensitive threat information that needs to be protected by those that receive it.
The combined approach 4.11. In a combined approach, elements are drawn from both the prescriptive and performance based approaches. There are many versions of a combined approach. Three examples are described in the following:
  • The regulatory body could require the use of a performance based approach for the radioactive material having higher potential consequences, while allowing the application of a prescriptive approach for lower consequence material.

  • The regulatory body could require that a set of prescriptive requirements be supplemented by using the performance based approach to address particular matters, such as an increase in threat.

  • The regulatory body could adopt a set of alternative security measures from which the security system designer might choose. The security system designer should then demonstrate that its resulting transport security system, as a whole, meets the applicable security goals.

The combined approach 4.12. The main advantage of the combined approach is that it provides flexibility. It can add a smaller burden on both the State’s regulatory body and the shipper, carrier, receiver and others engaged in the transport of radioactive material, since it can utilize provisions from the prescriptive approach as a baseline, with adjustments as necessary to counter the threat.
Process for applying the selected approach 4.13. Figure 1 shows a process a State could follow when deciding which approach to use. The figure highlights the decisions that need to be made by the competent authorities regarding which approach to use, and if the combined approach is chosen, the decisions on which approach is to be used for each transport security level.
Process for applying the selected approach 4.14. The transport security system should be designed to deter an adversary and to prevent the adversary from completing a malicious act through implementation of security measures that fulfil the three security functions of detection, delay and response. The security system should also include security management measures that provide for the integration of personnel, procedures and equipment.
Process for applying the selected approach 4.15. Paragraph 4.30 of Ref. [3] states:
  • Quantity and the physical/chemical form of the radioactive material;

  • Mode(s) of transport;

  • Package(s) being used.”

Process for applying the selected approach 4.16. When visible to a potential adversary, security measures used to implement each security function might provide deterrence, for example, security measures built into the conveyance such as guards, a robust package and padlocks.
Process for applying the selected approach 4.17. In the context of this publication, the three security functions of detection, delay and response are used to design the transport security system for radioactive material. These measures should be implemented in accordance with a graded approach and considered in the context of the threat assessment.
Detection 4.18. Activities intended to detect unauthorized removal and sabotage should start before the radioactive material is placed in the conveyance, and should continue until the shipment has been completed. For example, inspections of vehicles before loading packages can help ensure that the vehicle has not been tampered with and nothing has been affixed to the vehicle that might compromise security.
Detection 4.19. Continuous surveillance is frequently used for detection of potential malicious acts. For example, the conveyance crew and the guards involved in the shipment can provide continuous surveillance of the transport conveyance and the surrounding area.
Detection 4.20. Technical measures may also be used for detection, such as electronic sensors, video surveillance, audio surveillance, tracking devices, shipment monitoring and duress notification devices (e.g. for drivers and escort personnel).
Detection 4.21. Information received from detection alarms, initial observations and other sources should always be rapidly assessed to determine the cause and summon response, if needed.
Detection 4.22. In implementing a graded approach, the goal of detection could range from immediate detection, assessment and communication of any unauthorized access (during an attempted malicious act) to detection of unauthorized removal through tamper indicators or verification during transfers and when unloading.
Delay 4.23. Delay measures for transport security are used in order to increase the time needed to remove the material from the conveyance, to provide sufficient time for effective response activities. Delay is considered to be the length of time, after detection, that is needed by an adversary to remove or sabotage the radioactive material. Delay measures include locked doors, overpacks, cages and locking tie‑downs, as well as measures such as properly equipped and trained guards.
Delay 4.24. In implementing a graded approach, the goals of delay measures could range from providing sufficient delay after detection to allow response personnel to interrupt a malicious act in progress, to providing sufficient delay to assist in timely pursuit of the adversary following an unauthorized removal.
Response 4.25. Response measures should be implemented following detection of a potential nuclear security event and verification that a nuclear security event is underway. The regulatory body should require the shipper, carrier, receiver and others involved with the shipment to make appropriate arrangements for communicating with law enforcement personnel following the verification of a nuclear security event.
Response 4.26. The response to a nuclear security event can be provided by crew members, accompanying guards or local or regional authorities such as law enforcement. Response measures should have the goal of interrupting a malicious act that is underway and should be capable of preventing completion of the act.
Security management 4.27. Security management addresses the establishment and implementation of policies, plans and procedures for the security of radioactive material in transport as well as the deployment of the necessary resources. Security management includes measures for access control (e.g. to the cargo area, loading and unloading areas and crew areas of the conveyance), trustworthiness verification, information protection, preparation of the transport security plan, training and qualification of personnel and reporting of nuclear security events.
Security management 4.28. For shipments assigned to the enhanced transport security level, the regulatory body should require a transport security plan for all entities with security responsibilities relevant to a shipment. The transport security plan formally documents the responsibilities, procedures, arrangements and security systems that will be used.
Security management 4.29. The State should establish clear responsibility for the successful development and execution of the transport security plan. The licensee or otherwise authorized organization should hold the responsibility for the security of the material in transport. The responsibility will normally then be assigned by contract to the shipper or carrier that has direct responsibility for the security of the radioactive material. If certain services (e.g. tracking, communications, escort) are subcontracted, arrangements should exist for the subcontractor to comply with the transport security plan.
Security management 4.30. Paragraph 4.26 of Ref. [3] states that: “Security requirements for radioactive material in transport should be developed by the State to minimize the likelihood of loss of control, or malicious acts.”
Security management 4.31. Radioactive material has a wide range of characteristics that make it attractive in varying degrees for use in a malicious act. Some material will be more attractive to an adversary, and other material will be less attractive. The stringency of security requirements should vary with the threat and transport security level. Such an approach takes into account the potential radiological consequences of the radioactive contents. The shipper, carrier and receiver should therefore use a graded approach to implement security measures to ensure that the material is adequately protected.
Security management 4.32. To meet the applicable security goal established by the regulatory body for a given transport security level, operators, shippers and receivers should implement security measures to perform the security functions of detection, delay and response, as well as for deterrence and security management.9 The desired outcome from the combination of security measures implemented to perform each function can be expressed as a set of sub‑goals for that function. Sub‑goals can also be established for security management.
Security management 4.33. Security goals for each transport security level and associated sub‑goals are summarized in Fig. 2. Where a sub‑goal is shown in the table as the same for two or more columns, it is intended that the sub‑goal be met in a more rigorous manner whenever higher confidence is needed that the security system will prevent unauthorized removal.
Security management 4.34. Malicious acts can involve either unauthorized removal or sabotage. While the security goals described in Fig. 2 only address unauthorized removal, security systems that achieve the goals can provide some capability to detect, delay and respond to an act of sabotage.
Security management 4.35. The regulatory body should require one of the following:
  • For a performance based approach, that the shipper and carrier demonstrate that the security measures used will meet the applicable security sub‑goals.

  • For a prescriptive based approach, that a set of specific security measures are in place. The regulatory body should ensure that the required measures provide a satisfactory level of security, taking into consideration its assessment of the threat. Additionally, some evaluation of the effectiveness of the measures might be needed (e.g. quality of locks and reliability of communications).

Security management 5.1. This section provides guidance on the content of regulatory requirements to address the security of radioactive material in transport. The regulatory body should satisfy itself that this guidance is incorporated in its regulatory requirements or that another approach has been taken in order to meet the intent of the guidance.
Security management 5.2. States may select a prescriptive approach, in which the regulatory body directly specifies the security measures that the shipper, carrier and receiver should implement to meet the required goals. This might be preferred, for instance, for States where the information and resources needed for the application of a comprehensive methodology for threat assessment and vulnerability assessment, or for the establishment of a design basis threat, are not available.
Security management 5.3. Prior to transporting radioactive material, the shipper, carrier and receiver should ensure that all the necessary permits and authorizations for the shipment to proceed have been obtained. If also responsible for security, the shipper, carrier and receiver should ensure that all measures and arrangements for security of the shipment are in place. Appendix II provides additional information on security verifications that should occur prior to transport.
Security management 5.4. The remainder of this section provides information on specific security measures that could be used to protect radioactive material against unauthorized removal or sabotage in transport.
Prudent management practices 5.5. Some packages and types of radioactive material are identified in Section 3 as requiring no further security measures other than basic control measures and normal commercial practices. These practices include actions by shippers, carriers and receivers to protect the material against unauthorized removal or sabotage, as would be the case for any valuable commodity.
Prudent management practices 5.6. Examples of prudent management practices include the following:
  • Securing and storing the package while in transport (e.g. in a locked conveyance or storage area);

  • Utilizing carriers with package tracking systems (e.g. bar code system to monitor the status of the shipment), as appropriate;

  • Using closed vehicles;

  • Not leaving packages or conveyances unattended for any longer than is absolutely necessary;

  • Providing drivers of road conveyances with effective communication capability.

Prudent management practices 5.7. Radioactive material should also be shipped in accordance with all applicable dangerous goods regulations. These requirements will apply for classification, packaging, shipping papers, marking and labelling. These requirements help to bring the attention to shippers, carriers and receiver personnel of the need to handle and transport the packages with due care and diligence.
Basic transport security level 5.8. The guidance in this subsection applies to all packages of radioactive material assigned to the basic transport security level, as discussed in Section 3. For packages assigned to the basic transport security level, prudent management practices, described in the previous subsection, should also apply.
Basic transport security level 5.9. At the basic transport security level, the regulatory body should require that shippers, carriers, receivers and others engaged in the transport of radioactive material implement security systems or other arrangements to deter, detect, delay and respond to malicious acts affecting the conveyance or its cargo, using a graded approach. These arrangements should be operational and effective at all times and include training and regular briefings to assist personnel in maintaining awareness and vigilance.
Basic transport security level 5.10. Shippers, carriers, receivers and others engaged in the transport of radioactive material should take into consideration all available threat information, including threat information provided by the regulatory body, when implementing security measures.
Basic transport security level 5.11. Appropriate measures should be taken to protect sensitive information relating to transport operations, such as information on the schedule and route.
Basic transport security level 5.12. A trustworthiness determination10 is a determination of the reliability of an individual, including characteristics and details that can be verified by means of background checks, where legally permitted and where necessary. Trustworthiness determination is an important element in addressing and controlling insider threats [26].
Basic transport security level 5.13. The shipper, carrier or receiver should determine the trustworthiness of their personnel who are engaged in the transport of radioactive material. The trustworthiness determination should be based on background checks and used to verify the character and reputation of the individual. For shipper and receiver personnel, the trustworthiness determination might be the same as that required for facility access control. The stringency of this determination should be commensurate with the responsibilities of the individual.
Basic transport security level 5.14. Carriers should provide crew members, as appropriate, with written procedures on security measures required by the regulatory body. These procedures should include information addressing how to respond to a security incident during transport. At the basic transport security level, it is generally sufficient for these written procedures to contain no more than details of emergency contacts.
Basic transport security level 5.15. Individuals engaged in the transport of radioactive material should receive security training, including basic security awareness training. This training should include training on the need for transport security, the nature of security related threats, methods to address security concerns and actions to be undertaken if a nuclear security event occurs. It should also include awareness of transport security plans when appropriate, commensurate with the responsibilities of individuals and their roles in implementing transport security plans.
Basic transport security level 5.16. Such training should be provided or verified upon employment for all employees involved in the transport of radioactive material and should be periodically supplemented by retraining as deemed appropriate by the regulatory body.
Basic transport security level 5.17. Records of all security training undertaken should be kept by the employer and should be made available to the employee or regulatory body upon request. Records should be kept by the employer for a period of time established by the regulatory body.
Basic transport security level 5.18. Each crew member of any conveyance transporting radioactive material should carry means of positive identification during transport, such as an officially issued photographic identification that uniquely identifies the individual.
Basic transport security level 5.19. Radioactive material should be transported only by registered or authorized carriers and only registered or transferred to authorized carriers and receivers. In those countries where it is not mandatory to be registered or authorized to carry radioactive material, the shipper should verify the suitability and ability of a potential carrier or receiver to transport or receive radioactive material by confirmation with relevant national regulatory authorities or with trade and industry associations, to ensure that the carrier’s or receiver’s interests are legitimate.
Basic transport security level 5.20. During transport, the carrier should provide the capability for crew members to communicate with their company or law enforcement in order to request assistance. This can be done, for example, by using mobile telephones. Communication should remain effective throughout the entire journey. Where this is not possible, predefined communication points in the journey should be agreed to in order to provide evidence that the journey is proceeding as planned without incident.
Basic transport security level 5.21. Unless there are overriding safety or operational considerations, packages containing radioactive material should be carried in secure and closed or sheeted conveyances, compartments or freight containers. However, packages weighing more than 2000 kg that are locked and secured to the conveyance are appropriate for transport on open vehicles. Whenever it is necessary to use open conveyances, the load should be covered or hidden from view unless precluded by safety requirements. The integrity of the locks and seals used to secure the packages to the conveyance should be verified at all the following stages:
  • Before dispatch;

  • Before leaving any stopping point on the route;

  • On arrival, by staff specifically and previously authorized to undertake this verification.

Basic transport security level 5.22. Just prior to commencing transport, carriers should perform their own security inspections of the package or conveyance, commensurate with the potential radiological consequences of the material transported, to verify that security measures associated with the conveyance are effective. In normal circumstances and as appropriate to the mode of transport, it is sufficient for the carrier to perform a visual inspection of the package or conveyance to ensure that nothing has been tampered with and that nothing has been affixed to the package or conveyance that might affect the security of the consignment. Such inspections may be performed by transport personnel using their own knowledge of the conveyance or by other security personnel.
Basic transport security level 5.23. The package should incorporate security measures which, while intact, demonstrate that the package has not been opened. Seals required by the transport safety regulations are generally sufficient. The integrity of seals should be verified before dispatch and on arrival. Seals on conveyances and freight containers should also be verified before dispatch and on arrival.
Basic transport security level 5.24. The status of radioactive material in transport should be monitored appropriately. At the basic transport security level, it is sufficient to use a simple monitoring system such as a package tracking system that can determine when a shipment has departed, when it is in transport and when the consignment has been received. The information about status changes should be readily available to the appropriate parties (e.g. carriers, shippers and receivers).
Basic transport security level 5.25. If the conveyance makes an expected or unexpected stop, the security measures appropriate for that category of radioactive material in transit should be maintained.
Basic transport security level 5.26. If left unattended, the conveyance should be secured by locking the vehicle and cargo compartment, as applicable.
Basic transport security level 5.27. When radioactive material is stored in transit, such as in warehouses and marshalling yards, appropriate security measures should be applied to the material consistent with the measures applied during use and storage. Detailed guidance on security of radioactive material in use and storage is available in Ref. [34].
Basic transport security level 5.28. The receiver should have procedures in place to verify package contents, which should include notifying the shipper and carrier if radioactive material is discovered to be missing, or when a package has not been delivered by the expected time.
Basic transport security level 5.29. The shipper and carrier should have procedures in place to respond to notification from the receiver.
Basic transport security level 5.30. Through the course of the inquiry, if it is determined that the package or its contents have been lost, stolen or diverted, the shipper and carrier should take action to locate and recover the package or its contents and notify the competent authority as soon as practical.
Enhanced transport security level 5.31. The guidance in this subsection applies to packages of radioactive material assigned to the enhanced transport security level, as discussed in Section 3. For packages assigned to the enhanced transport security level, basic transport security level measures and prudent management practices, described in the previous subsection, should also apply.
Enhanced transport security level 5.32. Measures should be taken to protect sensitive information relating to transport operations, including detailed information on the schedule and route. Such information should be shared on a need‑to‑know basis, and includes the security system design and operation, response capability, and detection, assessment and delay capabilities. In addition, computer security is critical to protecting sensitive information. Measures should be taken, in accordance with a graded approach, to ensure the security of electronic systems, particularly computer systems.
Enhanced transport security level 5.33. More detailed guidance on protection of security related information is provided in Ref. [31].
Enhanced transport security level 5.34. All shippers, carriers, receivers and others engaged in the transport of radioactive material packages assigned to the enhanced transport security level should develop, implement, periodically review as necessary and comply with the relevant provisions of a transport security plan. The regulatory body should require that the licensee develop a transport security plan and might choose to have this plan submitted to the regulatory body.
Enhanced transport security level 5.35. The transport security plan should include at least the following elements:
  • Specific allocation of security responsibilities of organizations and persons engaged in the transport of radioactive material, who have been provided with appropriate authority to perform their responsibilities;

  • Provisions for keeping records of radioactive material packages or types of radioactive material transported;

  • Provisions for review of current operations and for vulnerability assessments, including for intermodal transfer, in‑transit storage, handling and distribution, as appropriate;

  • Clear statements of security measures to be implemented that address training, policies, verification of new employees and employment, operating practices, and equipment and resources to be used to reduce security related risks;

  • Effective procedures and equipment for timely reporting and management of security related threats, breaches of security or security related incidents (e.g. contingency plans);

  • Procedures for evaluating and testing security plans and procedures for periodic review and update of these plans;

  • Measures to protect sensitive information;

  • Measures to ensure that the distribution of sensitive transport information is limited (to maintain security of the information), and measures that do not preclude the provision of transport documents and shipper’s declaration as required by the applicable dangerous goods regulations;

  • Measures to monitor the location of the shipment;

  • Where appropriate, details concerning agreements on the point of transfer of responsibility for security.

Enhanced transport security level 5.36. Shippers and carriers should develop and implement a contingency plan to ensure that there would be an adequate response to malicious acts. This contingency plan could be developed either separately or as part of the transport security plan. If the regulatory body chooses to review the contingency plan, attention should be paid to the adequacy of response force coordination, to ensure an appropriate and timely response to a malicious act.
Enhanced transport security level 5.37. Personnel with specific security responsibilities should be provided with written instructions detailing their responsibilities.
Enhanced transport security level 5.38. For more detailed information on the content and an example of a transport security plan, see Appendix II.
Enhanced transport security level 5.39. The regulatory body should identify shippers and carriers engaged in the transport of radioactive material packages assigned to the enhanced transport security level, in order to administer its transport security requirements and to communicate security related information.
Enhanced transport security level 5.40. Prior to shipping radioactive material, the shipper should verify with the regulatory body that the receiver is authorized to possess the radioactive material.
Enhanced transport security level 5.41. The shipper, receiver and carrier should agree, prior to transport, on security practices to be followed. Such agreements might be based on normal commercial practices and responsibilities. For example, agreements should exist on the time and place for transfer of the material, such as when and where the shipment is released to the carrier and when and where the shipment is delivered to the receiver.
Enhanced transport security level 5.42. The shipper should provide advance notification to the receiver of the planned shipment, mode of transport and expected delivery time. This advance notice should be supplied in time to enable the receiver to make adequate security arrangements for receiving the shipment.
Enhanced transport security level 5.43. Prior to commencement of transport, the receiver should confirm the ability and readiness to accept delivery at the expected time and should notify the shipper upon receipt or if the shipment is not received within the expected delivery time frame.
Enhanced transport security level 5.44. During transport, the carrier should provide redundant capabilities for crew members to communicate with contact points specified in the transport security plan.
Enhanced transport security level 5.45. When a security related message is transmitted, care should be exercised in the handling of the information to ensure its protection. When open communications are used, techniques such as code words and phrases should be considered.
Enhanced transport security level 5.46. Where practical, locks and seals should be applied to conveyances, compartments or freight containers, commensurate with the categorization of the radioactive material being transported. Locks and seals should be checked to confirm the integrity before dispatch, after any stops made during the journey and during any intermodal transfer of each radioactive material consignment. If enclosed freight containers are used, verification of the integrity of a door seal is sufficient, and individual seals on packages inside the freight container do not need to be verified. Lock fittings and components, such as attachment points and tie‑downs, should be complementary to the quality and strength of the locks.
Enhanced transport security level 5.47. Procedures should be established to ensure the security of keys to conveyances and locks, commensurate with the categorization of the radioactive material being transported.
Enhanced transport security level 5.48. Electronic intrusion detection and alarms, including duress alarms, should be considered. Electronic intrusion detection technologies can be suitable for providing immediate indication of an intrusion into the cargo area. Examples of this technology include the following:
  • Balanced magnetic door switches;

  • Light sensors (for closed conveyances);

  • Fibre optic and other electronic seals;

  • Passive infrared, microwave or video motion detection.

Enhanced transport security level 5.49. Automated electronic tracking methods should be used to monitor the movement of conveyances containing radioactive material — for example, using GPS based position tracking of the conveyance — as determined to be appropriate by the regulatory body.
Enhanced transport security level 5.50. The shipper and carrier should conduct a pre‑shipment security verification of the conveyance and security systems prior to commencing transport. The purpose of this verification is to ensure that the security measures are implemented as described in the transport security plan and are functioning normally.
Enhanced transport security level 5.51. Pre‑shipment security verification should be performed in stages. The first stage (also referred to as ‘security arrangement verification’) should occur well in advance of shipments, to ensure deficiencies are identified and time is available to resolve them. As an enhanced security measure, final verification just prior to departure (the ‘pre‑shipment security verification’) should also be completed to ensure that all security measures included in the transport security plan are in place and operational. The number and extent of verifications can follow a graded approach, and also be determined based on past history of and experience with earlier shipments.
Enhanced transport security level 5.52. Corrective actions should be taken upon identifying that one or more elements are deficient. Without corrective actions, shipments should not be undertaken. Verification checklists can be used to record the need for corrective actions and to document when the corrective actions have been completed.
Additional security measures 5.53. In certain circumstances, the regulatory body might consider requiring additional security measures in view of the current threat level, the design basis threat or alternative threat statement, or the physical or chemical form and quantity of the radioactive material transported. For example, the regulatory body might require additional security measures for high activity shipments, such as those exceeding 1000D. In such cases, one or more of the following measures should be considered in addition to those identified in paras 5.8–5.52.
Additional security measures 5.54. Consideration might be given to using more stringent trustworthiness procedures to screen personnel with responsibilities for the transport of radioactive material at the enhanced transport security level than required for personnel with responsibilities at the basic transport security level. Such procedures might include national security clearance approvals commensurate with their responsibilities.
Additional security measures 5.55. As stated in the previous section, at the enhanced security level the regulatory body should require that the licensee develop a transport security plan and might choose to have this plan submitted to the regulatory body. The regulatory body might additionally choose to review and approve this plan, including any required additional security measures.
Additional security measures 5.56. In addition to the guidance provided in the previous section, exercises can be carried out to ensure that the transport security and contingency plan is adequately evaluated and tested. If the exercises indicate a need for revisions to the transport security and contingency plan, the revisions should be completed and approved by the regulatory body before a shipment is undertaken. Exercises might be limited to arrangements controlled by the shipper and carrier or they might also include State level response arrangements.
Additional security measures 5.57. Additional training might be provided to persons engaged in the transport of radioactive material to ensure that they have the proper skills and knowledge to implement specific security measures associated with their responsibilities.
Additional security measures 5.58. Radioactive material carriers might be subject to a regime whereby their operations are licensed and their security programmes are subject to periodic inspection by the regulatory body.
Additional security measures 5.59. The regulatory body might require the shipper and carrier to provide advance notification of a shipment to the regulatory body or other competent authorities. Such advance notification might include details of the shipment, including a description of the material being shipped, planned routes, estimated departure and arrival times, and border crossings, as applicable.
Additional security measures 5.60. The regulatory body might consider requiring that a transport control centre or other designated point of communication be established as a central location to monitor and coordinate voice and digital communication.
Additional security measures 5.61. Continuous two‑way voice communication might be considered between the conveyance, any guards accompanying the shipment, response forces, the transport control centre and, where appropriate, the shipper and receiver.
Additional security measures 5.62. The regulatory body might consider requiring that secure communications are used during the transport and that such measures provide redundancy of systems. The use of duress codes and duress button(s) to initiate response might also be considered.
Additional security measures 5.63. The regulatory body might consider requiring the use of conveyances that are specially designed or modified to provide additional security features (e.g. a specially designed trailer that allows the package to be secured to the trailer so that the package is not easily removed).
Additional security measures 5.64. Vehicle disabling devices might be considered, potentially including the capability to disable the vehicle when parked as well as when it is in motion (controlled shut down).
Additional security measures 5.65. In the event that packages need to be transported on open conveyances, it might be necessary for the regulatory body to consider whether additional security measures should be applied, in view of the nature of the radioactive material or prevailing threat. Such measures may include providing guards and enhancing route surveillance or response capability.
Additional security measures 5.66. Prior to loading and dispatch, and after any stops, the regulatory body might require that appropriately trained personnel conduct a thorough inspection of the conveyance to ensure that nothing has been affixed to the conveyance and it has not been tampered with in any way that could compromise security.
Additional security measures 5.67. The regulatory body might consider requiring a transport control centre or other designated point of communication be established as a central location to monitor the shipment, including positional tracking, and to facilitate command and control.
Additional security measures 5.68. The regulatory body might require that guards accompany certain shipments to provide for continuous surveillance of the conveyance. The guards should be adequately trained (especially if they are armed), suitably equipped and fully prepared to fulfil their responsibilities.
Additional security measures 5.69. The regulatory body might also require that additional personnel accompany the conveyance in order to maintain surveillance and control during transport and planned or unexpected stops. The additional personnel may be a second driver or crew member.
Additional security measures 5.70. In addition to the mode independent provisions mentioned in paras 5.8–5.69, the following provisions should also be considered depending upon the mode or modes of transport to be used in the shipment.
Provisions for road, rail and inland waterway transport 5.71. The shipper and carrier should ensure the application of devices, equipment or other arrangements to deter, detect, delay and respond to theft, sabotage or other malicious acts (including theft of the vehicle or inland waterway craft) affecting the conveyance or its cargo and should ensure that these systems are operational and effective at all times.
Provisions for road transport 5.72. The carrier should maintain continuous attendance of the road conveyance during transport, where possible. Where non‑attendance is unavoidable, the road conveyance should be secured and positioned in a well‑illuminated area.
Provisions for road transport 5.73. If a road movement cannot be completed without overnight or extended stops, then the radioactive material should be protected during such stops in accordance with a graded approach. Security requirements for radioactive material within a facility might be taken as a basis for defining security requirements to be used for extended stops in transit.
Provisions for rail transport 5.74. If a rail movement cannot be completed without overnight or extended stops, then the radioactive material should be protected during such stops in accordance with a graded approach. Security requirements for radioactive material within a facility might be taken as a basis for defining security requirements to be used for extended stops in transit.
Provisions for rail transport 5.75. The ease of handling and potential for concealing portable and mobile devices11 can make them vulnerable to unauthorized removal and attractive to potential adversaries.
Provisions for rail transport 5.76. For these reasons, specific security measures might be needed in order to take into account their portability. For example, the regulatory body might require that two independent physical barriers be used to secure radiographic devices during transport owing to their ease of portability.
Provisions for rail transport 5.77. As stated in para. 2.1 of Ref. [3], one objective of a State’s nuclear security regime applicable to transport of radioactive material should be “Protection against sabotage of other radioactive material, associated facilities and associated activities”.
Provisions for rail transport 5.78. The State should identify the criteria that define what constitutes radiological consequences sufficiently high to warrant protection against sabotage. These criteria might be specified in terms of any of the following:
  • The quantity of radioactive material calculated to be released as a result of the sabotage event (an activity threshold);

  • The dose or dose rate at a defined distance from the event location;

  • Any other quantity the State determines is appropriate.

Provisions for rail transport 5.79. An evaluation of the potential for sabotage during transport, and a determination of the associated potential radiological consequences, might be required by the regulatory body. This evaluation should be performed in close consultation with safety specialists since the transport packaging required for safety purposes might also provide significant protection. Protection against sabotage should be implemented with consideration of the measures for safety and the measures against unauthorized removal.
Threat assessment 5.80. The State should assess known and potential threats to radioactive material transport, specifically taking into account the intent and capability of potential adversaries to commit acts of sabotage. For example, an adversary might seek to release radioactive material in sufficient quantities to result in unacceptable radiological consequences. However, even an act of sabotage that is unsuccessful in releasing material might lead to harmful consequences. Additional information on threat assessment, a design basis threat and an alternative threat statement can be found in Ref. [24].
Development of specific threat scenarios 5.81. The design basis threat or alternative threat statement developed by the State should take into account credible scenarios involving sabotage of shipments of radioactive material. Such scenarios should reflect the capabilities of the threat as determined by the State’s threat assessment. For example, one aspect of a scenario that might be considered is the size of the adversary force and the training and experience of the adversary. A second aspect is the attack methods that could be used to achieve the sabotage objective.
Target identification and ranking 5.82. From a State’s standpoint, potential targets for sabotage could be any radioactive material shipment occurring on the territory of the State or, while in international water or airspace, carried by a ship or aircraft flagged or registered to the State. The State should identify which shipments it believes warrant protection against sabotage owing to the potential for unacceptable radiological consequences.
Estimating the consequences of sabotage considering the threat and the targets 5.83. Potential radiological consequences associated with the sabotage of radioactive material shipments should be estimated, primarily based on the activity of the radionuclide(s) but also taking into account the physical and chemical form of the material.
Estimating the consequences of sabotage considering the threat and the targets 5.84. Safety features of the package and conveyance as well as measures to prevent unauthorized removal should also be taken into account in estimating the potential radiological consequences of a sabotage attempt. The structure of the conveyance and the radioactive material packaging will provide some protection for the material. The degree of protection provided varies with the material being transported and the robustness of the packaging required for safety purposes.
Estimating the consequences of sabotage considering the threat and the targets 5.85. An act of sabotage against radioactive material in transport using an explosive device could result in a variety of consequences, including the following:
  • Damage owing to the blast of the explosive (generally limited to a radius of a few hundred metres);

  • Dispersion of large particles or pieces of radioactive material (generally limited to a radius of a few hundred metres);

  • Airborne dispersion of smaller particles, including respirable particles, which can be carried thousands of metres depending on the buoyancy of the plume created by the blast and accompanying fires.

Estimating the consequences of sabotage considering the threat and the targets 5.86. For any radioactive material, the radiological consequences of sabotage that result in a release of the material could include the following:
  • Dose due to external exposure to unshielded material that is localized (such as an unshielded sealed source);

  • Dose due to external exposure to dispersed material;

  • Dose due to internal exposure from inhaled airborne material that is generated by the event, or material that is suspended after deposition or ingested from food or water contaminated by the release from the sabotage event.

Estimating the consequences of sabotage considering the threat and the targets 5.87. In the most basic terms, the severity of radiological impact is directly linked to the types and amounts of radiation released to the environment from which people could receive a dose directly or which would prevent normal social and economic activity. Thus, listed below are the two principal determinants of the severity of a radiation release from a shipment subjected to sabotage:
  • Radionuclide content of the package or shipment;

  • Fraction of the radioactive contents of the shipment potentially releasable as a result of the sabotage event.

Estimating the consequences of sabotage considering the threat and the targets 5.88. The State should perform an analysis of the potential radiological consequences of sabotage that could occur during transport of radioactive material. The potential activity release determined by the analysis should be compared to the threshold determined by the State for unacceptable radiological consequences, as discussed in Ref. [3]. If the threshold defined by the State is based on dose or dose rate, this information should be calculated from the potential activity release, taking into account the radionuclides and form of the material released.
Estimating the consequences of sabotage considering the threat and the targets 5.89. If the calculations show that sabotage could result in radiological consequences that exceed the State's defined threshold for unacceptable radiological consequences, then additional protective measures might be necessary in addition to the measures required by the regulatory body to protect the material against unauthorized removal. The degree to which the potential radiological consequences of sabotage exceed the State's threshold for unacceptable radiological consequences will be one of the principal determinants of the amount of effort undertaken to minimize the potential radiological impacts of a successful sabotage event. The shipment contingency plan should also be reviewed to ensure that it adequately addresses actions to respond to sabotage situations.
Estimating the consequences of sabotage considering the threat and the targets 5.90. It might also be possible to add some additional protection features to the transport package or its conveyance to limit the projected release to an acceptable value.
Defining security measures for protecting against sabotage 5.91. Paragraph 4.37 of Ref. [3] includes the following recommendation:
  • Postponing the shipment;

  • Rerouting the shipment to avoid high threat areas;

  • Enhancing the robustness of the package or the vehicle;

  • Enhancing route surveillance to observe the current environment;

  • Providing (additional) escorts or guards.”

Defining security measures for protecting against sabotage 5.92. Paragraph 4.36 of Ref. [3] also recommends that “[w]hen establishing security measures to protect against a malicious act particularly sabotage, the safety features of the design of the transport package, container and conveyance should be taken into account.”
Applicable security measures 5.93. A variety of features could be used with existing packagings to minimize the release of radioactive material to the environment in case of an attack on a shipment. Several of these features also can be used to counter unauthorized removal of the material by increasing the time needed to retrieve the material from the packaging (delay measures).
Applicable security measures 5.94. Both active and passive measures are possible. For example, measures might include those that protect against an attack device being placed close to the package or conveyance, such as protective metal covers. Conveyances transporting spent fuel casks might be fitted with covers that can reduce the effectiveness of explosives and reduce the penetration abilities of stand‑off attacks.
Applicable security measures 5.95. Most of the measures will result in additional procedures to be used for the preparation of a shipment. The measures taken should not adversely affect the safety of the package.
Applicable organizational measures 5.96. The State should consider the need for compensatory protective measures such as additional guards, barriers and surveillance when packages are removed from their conveyances during loading, unloading and transhipment. Additional inspections prior to movement can also be made to ensure that nothing has been attached to the package, container or conveyance that could cause damage.
Applicable organizational measures 5.97. Operational measures might include changes in the route to avoid highly populated areas where the radiological and economic consequences of a successful sabotage event might be very high.
Applicable organizational measures 5.98. If a review of the nuclear security measures implemented to protect a shipment of radioactive material indicates that the measures are not sufficient to counter the current threat of sabotage, the State may consider postponing the shipment.
Applicable organizational measures 6.1. The State should ensure that roles and responsibilities are clearly defined within its regulatory framework for situations where radioactive material is determined to be lost, missing, or stolen during transport. The State should implement the recommendations in Ref. [4]. Procedures should be established to ensure that information and assistance is available to support rapid and comprehensive measures to locate and recover lost, missing or stolen radioactive material.
Applicable organizational measures 6.2. Shippers, carriers and receivers should be required to notify the regulatory body within a specified time of any radioactive material that is determined to be lost, missing, or stolen during transport. Once a package with radioactive material has been reported to be lost, missing or stolen during transport, the situation should then be considered to be out of the shipper’s or carrier’s control.
Applicable organizational measures 6.3. The State should ensure that national contingency plans are established for the actions it will take to locate and recover any radioactive material that is reported as lost, missing or stolen during transport. These contingency plans should be coordinated with national emergency response plans [17, 18].
Applicable organizational measures 6.4. The carrier should be alert during transport and delivery for any indications that packages have been lost, missing or stolen from the conveyance or that tampering has occurred.
Applicable organizational measures 6.5. Upon discovery that a package has been lost, missing or stolen from a conveyance, the carrier should initiate an immediate search to determine if the package might have been inadvertently misplaced, but remains under the carrier’s control. If loss of control is confirmed, the carrier should notify the relevant authorities and, as good practice, the shipper. Additionally, the carrier should provide assistance with all efforts to locate the package (i.e. tracing previous movements and handling transactions, and providing requested information) and should fully cooperate during any subsequent investigations and prosecutions.
Applicable organizational measures 6.6. Additionally, as good practice, the carrier might wish to notify the competent authority upon suspicion that a package has been lost, missing or stolen, or upon suspicion that a package has been tampered with.
Applicable organizational measures 6.7. If the carrier locates a package that has been reported lost or missing after it has notified the shipper and the relevant authorities of an incident, the carrier should promptly inform them that the package has been found.
Applicable organizational measures I.1. 13The following scenarios represent broad categories of possible malicious acts with the potential to give rise to significant radiological consequences:
  • Covert placement of unshielded material in working and living areas or street locations where the public might be exposed to radiation.

  • Sabotage of radioactive material packages or shipments with a subsequent release of radioactive material and its dispersal into the environment.

  • Capture of a radioactive material package or shipment and the subsequent dispersal of the material by means of conventional explosives.

  • Capture of a radioactive material package or shipment and its subsequent processing, for example the transformation into a more highly dispersible form, with subsequent dispersal of the radioactive material in the environment (i.e. a radiological dispersal device scenario). The time and resources needed for this action would increase the likelihood of successful intervention by security forces, therefore this scenario is considered less likely than others.

Applicable organizational measures I.2. The radiological consequences arising from attacks of each of these types are extremely variable and depend on, for example, the type and nature of the event and the type and amount of radioactive material involved.
Applicable organizational measures I.3. In a situation, such as para. I.1(c), involving the capture of a radioactive material package or shipment and the subsequent dispersal of the material by means of conventional explosives, the main radiological consequences from such an event (i.e. a radiological dispersal device scenario), include both near field and far field effects. In the vicinity of the explosion (near field), there might be radioactive shrapnel and larger pieces of radioactive material dispersed in the area, injuring persons and damaging and contaminating buildings. General contamination from vaporized or finely divided material might also be present. Persons in the area might inhale vaporized or finely divided material and their skin and clothes might be contaminated. There might also be a rising plume that disperses vaporized and finely divided material (to the far field) resulting in contamination of the area and of persons in the area, as well as exposure due to inhalation as the plume passes.
Applicable organizational measures I.4. Since the radiological dispersal device scenario might be a very attractive means for adversaries to cause harm and can be undertaken with unsophisticated capabilities, it is considered a more likely scenario. It is appropriate to apply the evaluation of potential radiological consequences of a malicious act involving different radionuclides to the radiological dispersal device scenario.
Applicable organizational measures I.5. Because radioactive material is considered to be a dangerous good, and thus its transport occurs within the broader framework of the transport of all dangerous goods, it is desirable to be as consistent as possible with existing security requirements and guidelines, particularly the UN Model Regulations [5] and the international modal regulations [6, 7]. Additionally, it is desirable to be consistent with relevant provisions of the Code of Conduct [22], with its supplementing guidance [23], the Convention on the Physical Protection of Nuclear Material, together with its Amendment [12, 13], and Ref. [2]. The transport security levels included in this publication have been developed with these considerations in mind.
Applicable organizational measures I.6. Since transport operations vary widely in how they are performed (e.g. a single package, consignments of individual packages), a clear basis should be used to specify the transport security level. The following are the three feasible bases for specifying which shipments should be subject to enhanced transport security measures:
  • Per package approach: Enhanced security provisions would be applied when the activity of any package in a consignment exceeds the threshold value;

  • Per consignment approach: Enhanced security provisions would be applied when the activity in a consignment exceeds the threshold value;

  • Per conveyance approach: Enhanced security provisions would be applied when the total activity on a conveyance exceeds the threshold.

Applicable organizational measures I.7. The per package approach is used in this publication for specifying the transport security level. States might consider either the per conveyance or per consignment approach for domestic transport by vehicle, but a per package approach should be used for international transport by all modes.
Applicable organizational measures I.8. There are some packages of radioactive material with such low levels of radioactivity that they present low radiological hazards and correspondingly low security risks (e.g. consumer products, very small quantities of radionuclides and material with very low activity concentration). Because of the very limited potential consequences that could arise from their use in malicious acts, certain packages and materials need not be subjected to transport security provisions more stringent than those ordinarily applied to a commercial shipment. These packages and materials are defined and specified in Ref. [14] and are also identified by their UN number. These packages and materials should meet the following activity limits and other specifications contained in Ref. [14]:
  • Empty packagings — UN 2908;

  • Articles manufactured from natural uranium, depleted uranium or thorium — UN 2909;

  • Excepted packages with an activity level not exceeding the level permitted for the radionuclide when it is not in special form — UN 2910 and UN 2911;

  • Low specific activity materials (LSA‑I) — UN 2912;

  • Surface contaminated objects (SCO‑I) — UN 2913;

  • Uranium hexafluoride, radioactive material, excepted package, less than 0.1 kg per package, non‑fissile or fissile‑excepted — UN 3507.

Applicable organizational measures I.9. Normal commercial controls and safety regulations applied to these shipments are appropriate for their very low potential consequences if used in a malicious act.
Applicable organizational measures I.10. For packages and materials exceeding the activity level allowed in those listed in para. I.8, the potential consequences of their use in a malicious act vary greatly. In order to specify appropriate transport security measures, packages might be grouped on the basis of their potential consequences. Having two transport security levels is desirable for simplicity, and introducing transport security sublevels makes it easier to tailor the security measures more precisely to the potential radiological consequences of the material.
Applicable organizational measures I.11. Two transport security levels should be used to specify transport security measures for packages containing a quantity and type of radioactive material that could result in very limited potential consequences. The use of two levels allows the security measures to be specified as simply as possible while separating packages into types that warrant either basic or enhanced security measures.
Applicable organizational measures I.12. The use of these two levels (basic and enhanced) for transport security indicates that a threshold is needed to specify which of the two levels is assigned to a package. An activity threshold should be used, because the potential radiological consequences associated with the contents of a package depend on the radionuclides and activity levels in the package. The use of a single activity threshold is also consistent with the approach to the transport of dangerous goods of the UN Model Regulations [5]. The threshold used in the UN Model Regulations distinguishes between high consequence radioactive material packages and other radioactive material packages (i.e. above the level of excepted packages, LSA‑I and SCO‑I, which do not warrant security measures beyond prudent management practices). The term ‘high consequence dangerous goods’ is used in the UN Model Regulations and corresponds to the use of an enhanced security level in this publication.
Applicable organizational measures I.13. This approach results in the following three transport security levels:
  • Prudent management practices: Consignments consisting of excepted radioactive material packages (with contents not exceeding the activity allowed for the radionuclide(s) in non‑special form) and radioactive material specified as LSA‑I and SCO‑I. No additional provisions other than those control measures required by Ref. [16] and normal commercial practices are suggested.

  • Basic transport security level: Consignments consisting of packages analogous to other dangerous goods subject to the ‘general provisions’ for dangerous goods security in the UN Model Regulations [5] (packages that are below the specified activity threshold).

  • Enhanced transport security level: Consignments that include at least one package analogous to high consequence dangerous goods as defined in the UN Model Regulations [5] (i.e. a package that is above the activity threshold).

Applicable organizational measures I.14. In certain circumstances, additional security measures might be considered by a State, as discussed in paras 5.53–5.69.
Applicable organizational measures I.15. The transport security levels and the application of progressively more stringent security measures, along with prudent management practices providing the baseline and additional security measures available as needed, are illustrated in Fig. 3. This diagram reiterates that each successive transport security level builds upon the previous level, where more stringent security measures are applied generally as the activity of the radioactive material increases. The activity threshold of 10D or 3000A2 separates the basic and enhanced transport security levels. Prudent management practices apply regardless of the radioactive material and additional security measures might be necessary regardless of the security level.
Applicable organizational measures I.16. To specify which packages should be transported using enhanced security measures, it is necessary to define the activity level that would constitute high consequence radioactive material.
Applicable organizational measures I.17. Considerable work has been done to define a dangerous source, see Refs [32] and [33]. This work identifies exposure scenarios and dose criteria used to define the quantity of a radionuclide which, if uncontrolled, could result in the death of an exposed individual or a permanent injury that decreases that person’s quality of life (the D value).
Applicable organizational measures I.18. Recognizing that the Code of Conduct [22] is being implemented by many Member States, the approach embodied in the Code was examined to determine whether it could be used for setting the activity thresholds for the radionuclides included in the Code. Reasonable correlation was found with 1000D for beta/gamma emitters and 10D for alpha emitters. Although sources with an activity exceeding the D values specified in Refs [22, 32, 33] are considered dangerous (i.e. they could result in the death of an exposed individual or a permanent injury that decreases the person’s quality of life) it is not considered realistic to implement enhanced security measures for all sources with an activity exceeding the D values. Considering this, a threshold of 10 times the D values is recommended to specify the enhanced transport security level for radionuclides listed in the Code to include Category 1 and 2 sources [22].
Applicable organizational measures I.19. For radionuclides not included in the Code of Conduct [22], another approach is needed for specifying the activity threshold. A strong desire has been expressed by Member States to specify the activity threshold in terms of the traditional transport safety A values. These values are calculated using the ‘Q system’ that has been incorporated in the IAEA guidance on transport regulations for over 35 years as described in IAEA Safety Standards Series No. SSG‑26, Advisory Material for the IAEA Regulations for the Safe Transport of Radioactive Material [35].
Applicable organizational measures I.20. The A1 values are derived for special form (non‑dispersible) radioactive material and the A2 values are for other than special form (dispersible) radioactive material. The A values are not based on exposure scenarios that are appropriate for representing the potential consequences of a radiological dispersal device. However, they are derived from transport accident scenarios and well established in relation to the transport of radioactive material. Consequently, a multiple of the A values was considered to be the desired way to express the activity threshold. When the radionuclides covered by the Code of Conduct [22] are disregarded, the remaining radionuclides showed good correlation with a value of 3000A2 (since the A2 value of a radionuclide never exceeds the A1 value). Subsequently, for radionuclides not included in the Code of Conduct [22], a value of 3000A2 may be used to identify packages that are subject to the enhanced transport security measures. This does not mean that 3000A2 corresponds to the same risk of causing severe deterministic health effects as 10D.
Applicable organizational measures I.21. To facilitate the undertaking of the transport security measures, the following definition of high consequence radioactive material is used:
  • 3000A2 in a single package for all radionuclides not listed in Table 1;

  • The transport security threshold value corresponds to the radionuclides listed in the Code of Conduct [22], as shown in Table 1.

    TABLE. 1. TRANSPORT SECURITY THRESHOLD (10D VALUES) FOR RADIONUCLIDES LISTED IN THE CODE OF CONDUCT [22]

    Radionuclide

    Transport security threshold (TBq)

    Am-241

    0.6

    Au-198

    2

    Cd-109

    200

    Cf-252

    0.2

    Cm-244

    0.5

    Co-57

    7

    Co-60

    0.3

    Cs-137

    1

    Fe-55

    8000

    Ge-68

    0.7

    Gd-153

    10

    Ir-192

    0.8

    Ni-63

    600

    Pd-103

    900

    Pm-147

    400

    Po-210

    0.6

    Pu-238

    0.6

    Pu-239

    0.6

    Ra-226

    0.4

    Ru-106

    3

    Se-75

    2

    Sr-90

    10

    Tl-204

    200

    Tm-170

    200

    Yb-169

    3

Applicable organizational measures I.22. The model used to define suitable thresholds for the enhanced transport security level is based on a combination of 10 times the D values15 and 3000 times the A2 values16. These values were used to harmonize with the existing international requirements and recommendations, the existing national nuclear security regulations and requirements of many Member States, and with practical consideration of consistency with the Code of Conduct [22].
Applicable organizational measures II.1. The transport security plan describes the security arrangements, personnel and equipment that will be used to provide security during transport. The entities responsible for having a transport security plan are normally the shipper, carrier, receiver and any other entity having direct responsibility for the security of the radioactive material in any particular mode or phase of the transport.
Applicable organizational measures II.2. A first step in developing the transport security plan is an evaluation of potential vulnerabilities for the shipment or campaign (i.e. a series of identical or similar shipments) that will be subject to the transport security plan. Such an assessment should take into account all information, as appropriate, with regard to: (a) the mode or modes of transport; (b) intermodal transfers; (c) the route to be followed; (d) any transit sites, stop‑over points, temporary storage or transfer areas; (e) conveyances, equipment and personnel; and (f) planned or potential stopping places. The result of this assessment is then used to make a judgment as to whether the overall effectiveness of the security system is adequate or if improvements such as compensatory measures are needed.
Applicable organizational measures II.3. The transport security plan should be designed so that it can be modified as needed to reflect the threat level at the time of use as well as reflect any changes to the transport arrangements. The transport security plan should address routing of the shipment, stopping places, destination hand over arrangements, identification of persons authorized to take delivery, emergency arrangements, contingency plans and reporting procedures (both routine and emergency). The transport security plan may address single or multiple similar shipments and may be valid for a specified period of time. The transport security plan should be protected as sensitive information and should only be discussed with organizations as it applies to their roles and responsibilities (the plan, in its entirety, should not be discussed, unless appropriate). Such sensitive information should not be included in procedures or documents that are developed for other purposes and that may be disseminated more widely. For information security reasons, the transport security plan may be developed in the form of a series of separate documents, each of which may be provided only to those that need to know those parts of the plan.
Applicable organizational measures II.4. All shippers, carriers, receivers and others engaged in the transport of radioactive material should have contingency plans in place to respond to malicious acts involving radioactive material in transport, including plans for actions to take for recovery of lost or stolen material and for mitigating radiological consequences of sabotage. These contingency plans may be a separate document or a part of the transport security plan.
Applicable organizational measures II.5. The regulatory body should specify whether a transport security plan and, if required, any associated vulnerability assessment needs to be submitted to the regulatory body for review and approval. This might depend upon the category of material being proposed for transport. For example, transport security plans could be required for both Category 1 and 2 radioactive material shipments but approval of transport security plans could only be required for Category 1 shipments. The approval process can also be iterative. If the regulatory body feels that the requirements are not met in the proposed transport security plan or that the results of the vulnerability assessment are inadequate, the transport security plan and vulnerability assessment, along with a list of the identified shortcomings, should be returned to the originator for additional information and revision. A scheme for regulatory review and approval of a vulnerability assessment and a transport security plan is provided in Fig. 4.
Applicable organizational measures II.6. Once the transport security plan has been prepared and, if required, approved by the regulatory body, detailed plans and preparations for the shipment can proceed. Security of the shipment should be provided in accordance with the transport security plan and associated written instructions and agreements.
Applicable organizational measures II.7. After commencing transport, if the shipment cannot be completed in accordance with the transport security plan, the shipper or carrier should immediately implement compensatory measures to maintain the desired level of protection. If the transport security plan has been approved by the regulatory body, the shipper or carrier should inform the regulatory body as soon as practicable. The regulatory body might require the shipper or carrier to prepare a set of compensatory measures in advance.
Applicable organizational measures II.8. If any incidents or unscheduled delays have occurred during transport, a review of security arrangements should be conducted to evaluate the effectiveness of the transport security plan and to identify any improvements to be made to optimize its effectiveness for future shipments.
  • INTERNATIONAL ATOMIC ENERGY AGENCY, Objective and Essential Elements of a State’s Nuclear Security Regime, IAEA Nuclear Security Series No. 20, IAEA, Vienna (2013).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/ Revision 5), IAEA Nuclear Security Series No. 13, IAEA, Vienna (2011).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Nuclear Security Recommendations on Radioactive Material and Associated Facilities, IAEA Nuclear Security Series No. 14, IAEA, Vienna (2011).

  • EUROPEAN POLICE OFFICE, INTERNATIONAL ATOMIC ENERGY AGENCY, INTERNATIONAL CIVIL AVIATION ORGANIZATION, INTERNATIONAL CRIMINAL POLICE ORGANIZATION–INTERPOL, UNITED NATIONS INTERREGIONAL CRIME AND JUSTICE RESEARCH INSTITUTE, UNITED NATIONS OFFICE ON DRUGS AND CRIME, WORLD CUSTOMS ORGANIZATION, Nuclear Security Recommendations on Nuclear and Other Radioactive Material out of Regulatory Control, IAEA Nuclear Security Series No. 15, IAEA, Vienna (2011).

  • UNITED NATIONS ECONOMIC COMMISSION FOR EUROPE, Recommendations on the Transport of Dangerous Goods: Model Regulations (Rev. 20), 2 vols, UNECE, New York and Geneva (2017).

  • INTERNATIONAL MARITIME ORGANIZATION, International Maritime Dangerous Goods (IMDG) Code, IMO, London (2018).

  • INTERNATIONAL CIVIL AVIATION ORGANIZATION, Technical Instructions for the Safe Transport of Dangerous Goods by Air, ICAO, Montréal (2014).

  • UNITED NATIONS ECONOMIC COMMISSION FOR EUROPE, European Agreement concerning the International Carriage of Dangerous Goods by Road (ADR), UNECE, New York and Geneva (2015).

  • INTERGOVERNMENTAL ORGANIZATION FOR INTERNATIONAL CARRIAGE BY RAIL, Regulations concerning the International Carriage of Dangerous Goods by Rail (RID) (2019).

  • UNITED NATIONS, European Agreement Concerning the International Carriage of Dangerous Goods by Inland Waterway (ADN), ECE/TRANS/231 (Vol. 1), UN, New York and Geneva (2017).

  • The Convention on the Physical Protection of Nuclear Material, INFCIRC/274/Rev.1, IAEA, Vienna (1980).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Amendment to the Convention on the Physical Protection of Nuclear Material, IAEA International Law Series No. 2, IAEA, Vienna (2006).

  • Nuclear Security — Measures to Protect Against Nuclear Terrorism: Amendment to the Convention on the Physical Protection of Nuclear Material, GOV/INF/2005/10 GC(49)/ INF/6, IAEA, Vienna (2005).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Regulations for the Safe Transport of Radioactive Material, 2018 Edition, IAEA Safety Standards Series No. SSR‑6 (Rev. 1), IAEA, Vienna (2018).

  • EUROPEAN ATOMIC ENERGY COMMUNITY, FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS, INTERNATIONAL ATOMIC ENERGY AGENCY, INTERNATIONAL LABOUR ORGANIZATION, INTERNATIONAL MARITIME ORGANIZATION, OECD NUCLEAR ENERGY AGENCY, PAN AMERICAN HEALTH ORGANIZATION, UNITED NATIONS ENVIRONMENT PROGRAMME, WORLD HEALTH ORGANIZATION, Fundamental Safety Principles, IAEA Safety Standards Series No. SF-1, IAEA, Vienna (2006).

  • EUROPEAN COMMISSION, FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS, INTERNATIONAL ATOMIC ENERGY AGENCY, INTERNATIONAL LABOUR ORGANIZATION, OECD NUCLEAR ENERGY AGENCY, PAN AMERICAN HEALTH ORGANIZATION, UNITED NATIONS ENVIRONMENT PROGRAMME, WORLD HEALTH ORGANIZATION, Radiation Protection and Safety of Radiation Sources: International Basic Safety Standards, IAEA Safety Standards Series No. GSR Part 3, IAEA, Vienna (2014).

  • FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS, INTERNATIONAL ATOMIC ENERGY AGENCY, INTERNATIONAL LABOUR OFFICE, PAN AMERICAN HEALTH ORGANIZATION, WORLD HEALTH ORGANIZATION, Criteria for Use in Preparedness and Response for a Nuclear or Radiological Emergency, IAEA Safety Standards Series No. GSG‑2, IAEA, Vienna (2011).

  • FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS, INTERNATIONAL ATOMIC ENERGY AGENCY, INTERNATIONAL LABOUR OFFICE, PAN AMERICAN HEALTH ORGANIZATION, UNITED NATIONS OFFICE FOR THE COORDINATION OF HUMANITARIAN AFFAIRS, WORLD HEALTH ORGANIZATION, Arrangements for Preparedness for a Nuclear or Radiological Emergency, IAEA Safety Standards Series No. GS‑G‑2.1, IAEA, Vienna (2007).

  • FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS, INTERNATIONAL ATOMIC ENERGY AGENCY, INTERNATIONAL CIVIL AVIATION ORGANIZATION, INTERNATIONAL LABOUR ORGANIZATION, INTERPOL, OECD NUCLEAR ENERGY AGENCY, PAN AMERICAN HEALTH ORGANIZATION, PREPARATORY COMMISSION FOR THE COMPREHENSIVE NUCLEAR TEST BAN TREATY ORGANIZATION, UNITED NATIONS ENVIRONMENT PROGRAMME, UNITED NATIONS OFFICE FOR THE COORDINATION OF HUMANITARIAN AFFAIRS, WORLD HEALTH ORGANIZATION, WORLD METEOROLOGICAL ORGANIZATION, Preparedness and Response for a Nuclear or Radiological Emergency, IAEA Safety Standards Series No. GSR Part 7, IAEA, Vienna (2015).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Preparedness and Response for a Nuclear or Radiological Emergency Involving the Transport of Radioactive Material, IAEA Safety Standards Series No. SSG-65, IAEA, Vienna (in preparation).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Security of Nuclear Material in Transport, IAEA Nuclear Security Series No. 26‑G, IAEA, Vienna (2015).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Code of Conduct on the Safety and Security of Radioactive Sources, IAEA/CODEOC/2004, IAEA, Vienna (2004).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Guidance on the Import and Export of Radioactive Sources, IAEA/CODEOC/IMO EXP/2012, IAEA, Vienna (2012).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements, IAEA Nuclear Security Series No. 10-G (Rev. 1), IAEA, Vienna (in preparation).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Physical Protection of Nuclear Material and Nuclear Facilities (Implementation of INFCIRC/225/Revision 5), IAEA Nuclear Security Series No. 27‑G, IAEA, Vienna (2018).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Preventive and Protective Measures against Insider Threats, IAEA Nuclear Security Series No. 8-G (Rev. 1), IAEA, Vienna (2020).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Sustaining a Nuclear Security Regime, IAEA Nuclear Security Series No. 30‑G, IAEA, Vienna (2018).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Nuclear Security Culture, IAEA Nuclear Security Series No. 7, IAEA, Vienna (2008).

  • INTERNATIONAL ORGANIZATION FOR STANDARDIZATION, Quality Management Systems — Requirements, ISO 9001:2015, ISO, Geneva (2015).

  • INTERNATIONAL ORGANIZATION FOR STANDARDIZATION, Specification for Security Management Systems for the Supply Chain, ISO 28000:2007, ISO, Geneva (2007).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Security of Nuclear Information, IAEA Nuclear Security Series No. 23‑G, IAEA, Vienna (2015).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Categorization of Radioactive Sources, IAEA Safety Standards Series No. RS‑G‑1.9, IAEA, Vienna (2005).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Dangerous Quantities of Radioactive Material (D Values), EPR D VALUES 2006, IAEA, Vienna (2006).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Security of Radioactive Material in Use and Storage and of Associated Facilities, IAEA Nuclear Security Series No. 11‑G (Rev. 1), IAEA, Vienna (2019).

  • INTERNATIONAL ATOMIC ENERGY AGENCY, Advisory Material for the IAEA Regulations for the Safe Transport of Radioactive Material (2012 Edition), IAEA Safety Standards Series No. SSG‑26, IAEA, Vienna (2014). (A revision of this publication is in preparation.)

Applicable organizational measures I–1. An example structure of a transport security plan is provided in Box I–1 below. The regulatory body might need to modify this structure to reflect its own particular circumstances, but the example contains the types of information that are typically needed by the regulatory body to validate and approve the proposed security measures and arrangements. The structure of the transport security plan provided aims to facilitate understanding between shippers, carriers, receivers, others involved in the transport, and regulators both domestically and internationally.
Applicable organizational measures I–2. The text in Box I–2 follows the structure from Box I–1 and presents the details to be considered for inclusion in a transport security plan for a shipment of radioactive material.
Applicable organizational measures 1. SCOPE
Applicable organizational measures 1. SCOPE
  • The type of radioactive material to be shipped;

  • The locations of the shipper and receiver;

  • The identification of the carrier;

  • The regulations and requirements that were used in the development of the transport security plan.

  • Ensuring security to protect personnel, equipment and radioactive material;

  • Providing clear direction to personnel on the following actions to be taken:

    • Ensuring security of shipments;

    • Providing appropriate response to incidents.

  • Nature of the material;

  • Type;

  • Quantity (activity);

  • Physical and chemical characteristics;

  • Category;

  • Hazards;

  • Packaging;

  • Number of packages in a consignment.

  • Policies and operational procedures for consistent implementation of security measures addressed in the transport security plan;

  • Contingency plans for responding to malicious acts during transport, recovery of lost or stolen material and mitigation of consequences.

  • Planned (primary) and alternate routes for all modes of transport, including criteria for when the alternate routes will be used;

  • Process for pre-shipment evaluation of routes, assessment of vulnerabilities;

  • Identification of any in-transit storage and intermodal transfers, including security arrangements.

  • Tamper-indicating devices and seals (packages and conveyances);

  • Locks (single or multiple) for packages, cargo compartment and conveyance (e.g. door keys, ignition keys);

  • Secure tie-downs and over-packs;

  • Immobilizing devices.

Applicable organizational measures II–1. Transport security verification is a mechanism that can be used to identify any deficiencies prior to conducting a shipment. The verification process can be coupled with identifying and completing corrective actions which can result in confidence that the planned transport security level is provided.
Applicable organizational measures II–2. Table II–1 presents an example of security features to be verified for a shipment by road. If transport by means other than road is to be undertaken, the table will need to be appropriately modified.
Applicable organizational measures II–3. Table II–1 might be useful for shipper and carrier self‑assessments, as well as security audits and inspections by the regulatory body. The shipper or carrier might wish to use the table below when developing verification checklists specific to their own operations.
Applicable organizational measures III–1. Table III–1 provides cross‑references to the specific security measures listed in paras 5.10–5.69. It provides a listing of mode independent security measures in the left column and across each row provides the paragraph numbers where information about the security measure can be found in this publication.