ML20079S020
| ML20079S020 | |
| Person / Time | |
|---|---|
| Issue date: | 05/31/1983 |
| From: | NRC OFFICE OF ADMINISTRATION (ADM) |
| To: | |
| References | |
| NUREG-BR-0069, NUREG-BR-69, NUDOCS 8307110089 | |
| Download: ML20079S020 (22) | |
Text
.-
,f ~ %,,,
Ih[~..(
United States Nuclear Regulatory Commission
- NRC Classification Guide for
- Safeguards Information l
i i
\\
l i
l
\\
DIVISION OF SECURITY OFFICE OF ADMINISTRATION WASHINGTON, D.C. 20555 Revised: May 1983 i
l l
BR7MRer 52 l
BR-OO69 R PDR
UNITED STATES NUCLEAR REGULATORY COMMISSION CLASSIFICATION GUIDE FOR SAFEGUARDS INFORMATION 4
l l
APPROVED BY:
c William J. Ibircks Executive Director for Operations U.S. Nuclear Regulatory Commission DATE:
MA1 l'
/9 P1 l
i
CLASSIFICATION GUIDE FOR SAFEGUARDS INFORMATION UNITED STATES NUCLEAR REGULATORY COMISSION DIVISION OF SECURITY WASHINGTON, D.C.
20555 Change Notice Date r
M I
I t
I l
CLASSIFICATION GUIDE FOR SAFEGUARDS INFORMATION TABLE OF CONTENTS P. age _
INTRODUCTION...........................................................
1 CLASSIFICATION GUIDANCE................................................
5 100 MATERIAL CONTROL AND ACCOUNTABILITY...............................
5 110 SSNM Quantities..............................................
5 120 SSNM Measurement Data........................................
5 130 Material Control and Accounting P1ans........................
5 140 Quantitative SSNM Balance Data...
6 150 Other Items Pertaining to Material Control and Accounting...
6 200 PHYSICAL PROTECTION AT FIXED SITES......
6 210 Site and Facility Description................................
7 220 Intrusion and Detection Al arm Systen:s........................
7 230 Plant Radio and Telephone Comaunic4 tion Systems..............
S 240 Tamper Indicating Seals................
8 250 Keys, Locks, and Combinations............................
9 260 Threat Response Capability and Procedures..,................
9 270 Personal Verification Ccats........................
10 280 Audit and Assessment Information.............................
11 290 Miscellaneous................................................
11 300 IN-TRANSIT PROTECTION OF S5NM.....................................
11 310 Shipment Contents............................................
12 320 Schedules and Itinerary for Specific Shipments...............
13 1
330 SECOM 0perations.............................................
13 l
340 Inter-Vehicle Communications.................................
15 350 Communications Equipment Per Se..............................
15 360 Communications Coordination with Local Law Enforcement Agencies.....................................................
15 370 Guard Organization and Capabilitics..........................
15 380 Secure Transport Vehicles....................................
16 l
400 SAFEGUARDS ANALYSES AND PLANS.....................................
16 l
410 Diversion or Sabotage Vulnerability Studies..................
16 420- Plans for Response to Threats................................
17
d I
CONTENTS (Continued)
P, age 500 SAFEGUARDS RESEARCH, DEVELOPMENT, TEST, AND EVALUATION...........
18 510 Generic.....................................................
18 520 Conceptual Studies..........................................
18 530 Evaluations.................................................
18 540 Specific Performance Capabilities or Vulnerabilities........
18 550 Hardware....................................................
18 Y
5 t
r i
1 J
Y i
w
---,y--
_e-+,
.-e-,.,
my
CLASSIFICATION GUIDE FOR SAFEGUARDS INFORMATION INTRODUCTION A.
PURPOSE To provide security classification guidance for the safeguarding of information about certain nuclear material or facilities.
B.
SCOPE This guide provides for the classification of information concerning:
(1) reactor and research facilities which have nonself protecting formula quantities of strategic special nuclear material (SSNM): (2) shipment activities involving nonself protecting formula quantities of SSNM; and (3) fuel cycle facilities authorized to possess or use nonself protecting formula quantities of SSNM.
For convenience, this guide divides safeguards information into the following five categories:
(1) material control and accountability; (2) physical protection at fixed sites; (3) in-transit protection of SSNM; (4) safeguards analyses and plans; and (5) safeguards research, deselop-meat, test, and evaluati6n.
C.
BASIC POLICY The principle which underlies the policy for classification of safeguards information is to provide the maximum possible information to the public, while at the same time protecting against unauthorized disclosure of information which could cause damage to the national security.
Such information includes:
(1)
Information from SSNM accounting and control systems that could:
(a) facilitate assistance to, frustrate or delay the detection of, I
or the response to, the attempted theft or diversion of formula l
quantities of nonself protecting SSNM; (b) enhance the credibility or frequency of nuclear threats; (2)
Information that could facilitate carrying out a successful sabotage i
mission against any facility or activity involving formula quantities of nonself protecting SSNM; (3)
Information that could facilitate carrying out a successful theft or diversion of-formula quantities of nonself protecting SSNM.
Safeguards infcrmation placed officially in the public domain or obtainable by visual access from uncontrolled areas is unclassified.
Retention of safeguards information is subject to authorized records disposition schedules.
1
This guide is approved for use by the U.S. Nuclear Regulatory Commission (NRC), NRC contractors, licensees, and other personnel in classifying safeguards information.
D.
USE OF THIS GUIDE 1.
Information designated as either " CONFIDENTIAL or SECRET" in this guide will be classified accordingly by users of the guide.
This guide constitutes a record of an original classification decision by the approving authority and directs the derivative classification of information which the guide indicates is classified.
Any questions concerning the applicability of this guide should be directed to the Director, Division of Security, U.S. Nuclear Regulatory Commission, Washington, DC, 20555.
2.
Certain topics indicate that inforeation to which they apply may be either CONFIDENTIAL or SECRET Application of these topics requires informed judgment based or. knowladga of the overall context of the information.
Any questions concerning the applicability of this guide should be directed to the Director, Division of Security, U.S. Nuclear Regulatory Commission, Washington, DC, 20555.
3.
In some cases, more detailed supplementary guides may be required.
Proposals for such guides should be forwerded to the Director, I
Division of Security, U.S. Nuclear h qulatory Commission, Washingten, DC 20555.
4.
Compilations of unclassified infoimation are generally considered to be unclassified unless some additional factor is added in the process of compilation.
For example:
(a) the fact that the information is complete for its intended purposes may be classified; or (b) the fact that the compiled information represents an official evaluation may i
j be classified.
5.
Care should be taken that the declassification of a document does not violate provisions of the guide when evaluated in connection with information already unclassified.
6.
If classified information can be discerned from the use, presence, or capabilities of any equipment, the equipment will be classified at the level of and as long as classified information can be discerned from the equipment.
E.
DEFINITIONS USED IN THE GUIDE 1.
Formula Quantity of Strategic Special Nuclear Material (SSNM) -
(sometimes referred to as:
formula grams, trigger quantity, strategic quantity, threshold quantity, and significant quantity), a formula quantity of strategic special nuclear material is 5,000 grams or more computed by the formula, grams = (grams contained U-235) + 2.5 (grams l
U-233 + grams Pu).
l 2
2.
Inventory Difference (ID) - (formerly Material Unaccounted for (MUF)) - the algebraic difference between a physical inventory and its concomitant book inventory after determining that all known removals and additions have been reflected in the book inventory.
It is calculated by subtracting ending inventory plus removals from beginning inventory plus additions to inventory.
3.
Material Access Area - any location which contains special nuclear material within a vault or a buildir.g, the roof, walls, and floor of which each constitutes a physical barrier.
4.
Material Control and Accounting Plan - a site-specific document (or group of documents) that gives a comprehensive description of the i
measures employed in the material control and accounting program.
5.
National Security Information (NSI) - information or material collectively termed information, that is owned by, produced for or by, under the control of, or regulated by, the United States Govern-ment, and that tas been determined pursuant to Executive Order 12356 or prior Executive Orders to require protection against unauthorized disclosure, and that is so designated.
6.
Nuclear Facility - any facility for originating, producing, using, shippir.g, receiving, or 5toring foraula quantities of nonself-protecting SSNM.
7.
Physical Security Plan - a site-specific documer.t (or group of documents) that provides a comprehensive description of the mea urer employed for the physical protection of nuclear facilities and mate-rials against sabotage, theft, or diversion of formula quantities of nonself protecting SSNM.
8.
Reporting Entity - a licensee or contractor which has been assigned a unique reporting identification symbol (RIS) by NRC or the Depart-l ment of Energy (DOE) and is required to submit periodic material l
status reports (NRC/ DOE Form 742) identified by the RIS.
9.
Restricted Data (RD) - defined in the Atomic Energy Act of 1954, as amended, as "all data concerning (1) design, manufacture, or utiliza-tion of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy; but shall not include data declassified or removed from the Restricted Data category pursuant to Section 142."
10.
SECOM - a nationwide high frequency radio system which provides a means of communicating with and monitoring the progress of SNM shipments moving in the DOE transportation safeguards system.
11.
Self-Protecting Strategic Special Nuclear Material - SSNM which is not readily separable from other radioactive material and which has a total external radiation dose rate in excess of 100 rems per hour at a distance of 3 feet from any accessible surface without inter-vening shielding.
3
j 12.
Special Nuclear Material (SNM) - (1) plutonium, uranium enriched in the isotope-233 or in the isotope-235, and any other material which the Commission, pursuant to the provisions of Section 51 of the Atomic Energy Act, as amended, determines to be special nuclear i
material, but does not include source material; or (2) any material 1
artificially enriched by any of the foregoing but does not include source material.
i l
13.
Strategic Special Nuclear Material (SSNM) - uranium-235 (contained in uranium enriched to 20 percent or more in the U-235 isotope),
uranium-233, or plutonium.
F.
DECLASSIFICATION - E.0. 12356 Restricted Data is exempted from automatic declassification and does not require declassification markings.
National Security Information identi-fied in this guide will be marked for declassification or review for declassification as specified by the applicable topic of this guide.
This guido has been approved by an original Top Secret classification authority.
G.
ABBREVIATIONS The following abbreviations are used in this guide:
j S
- Secret C
- Confidential U
- Unclassified i
RD
- Pestricted Data NSI
- National Security Information i
0ADR - Originating Agency's Determination Required SSNM - Strategic Special Nuclear Material i
i l
l 4
(
CLASSIFICATION GUIDANCE 100 MATERIAL CONTROL AND ACCOUNTABILITY 110 SSNM QUANTITIES 111 Total quantities of SSNM at any given time by U
total plant.
112 Total quantities at any given time of SSNM by CNSI -
designated vault and vault-type storage areas.
Declassify On:
0ADR NOTE:
Inventories of SSNM for classified DOE programs (e.g., production, naval reactors) will be classified in accordance with DOE guidance applicable to those programs.
120 SSNM MEASUREMENT DATA 121 Measurement accuracy required by unclassified U
regulations (e.g., 10 CFR Part 70).
122 Measurement uncertainties associated with bulk U
ar.d analytical measurements that ere typical for the nuclear industry provided information classified by other tcpics in this gt'ide is not revealed.
123 The Limit of Error on Inventory Difference CNSI -
l (LEID) for individual material balance Declassify
^
period or on a cumulative period basis.
On:
0ADR 1
130 MATERIAL CONTROL AND ACCOUNTING PLANS 131 Plans submitted in accordance with 10 CFR U
Part 70 which contain details of the licensee plan for the material control and accounting j
programs.
These include frequency and schedule of SSNM inventories, and measurement control, including equipment, methodology, quality assurance, destructive and nondestructive analyses, audit and organization.
5
140 QUANTITATIVE SSNM BALANCE DATA The classification guidance in these topics applies to SSNM balance information not classified by other guides, e.g., production or naval reactors; classi-fied topics in such guides take precedc ' e where applicable.
141 Receipts.
U 142 Shipments.
U But see Topic 312.
143 Other removals:
measured discards, decay losses, and losses due to fission and transmutation and ID.
143.1 Total "other removals."
U 143.2 Itemized "other removals" for a U-CNSI - See reporting period.
declassifica-tion note for Topic 144 0 when ID is unclassified.
See Topic 144.
144 Inventory Difference in any amount.
CNSI*
150 OTHER ITEMS PERTAINING TO MATERIAL CONTROL AND ACCOUNTING 151 Any computer output displays or printouts CNSI - See 143'2 which provide itemized "other removals" or or Topic 144 for inventory difference data.
applicable declas-sification marking 200 PHYSICAL PROTECTION AT FIXED SITES 201 The physical security plan for a nuclear facility C-SNSI -
or site.
Plans may be SNSI in accordance with Declassify other applicable classification guidance.
On:
0ADR Secret if significant vulnerability is revealed, e.g., degree of seriousness, or explicit means of I
penetrating existing security defenses are disclosed.
See, for example, Section 400 of this guide.
- May be declassified after a period of 6 months from date of inventory assess-ment, provided (a) any resulting investigation is completed, and (b) the initial classification determination was not due to extenuating circumstances.
ID data remains classified for the duration of an investigation.
6
210 SITE AND FACILITY DESCRIPTION 211 Only the general layout that can be seen from U
uncontrolled areas and which does not identify a vulnerability.
This general layout may include:
buildings, parking areas, access roads, fences, outside storage areas, natural terrain, landscaped areas, tunnels, storm and waste sewers, water intake and discharge conduits, culverts, creeks, canals, and any other physical characteristics such as features of buildings, barriers, fences, guard stations, etc.
212 Site-specific "as built" drawings, diagrams, CNSI -
sketches, maps, etc., showing identity together Declassi fy with location and/or description of facility On:
0ADR features of special interest because of their relationship to the physical security system, that if revealed could facilitate theft or diversion of SSNM or sabotage of a facility.
But see Topics 211, 213, and 221.
213 Scope, conceptual design, and construction U
drawings showing construction characteristics of buildings and associated fencing, electrical and other utility system layouts.
But see Topic 212.
214 Government sponsored or required evaluations C-SNSI -
of site-specific construction features or Declassify physical security barriers revealing vulnera-On:
0ADR bilities or limitations which could facilitate penetrating or bypassing physical security barriers.
Secret if significant vulnerability, e.g.,
degree of seriousness, or explicit means of defeating these systems is revealed.
l 220 INTRUSION AND DETLCTION ALARM SYSTEMS Includes Manually Activated Duress Alarms.
221 Scope, conceptual design, and construction CNSI -
plan.
Declassify On:
0ADR See Topic 222.
7
~
222 As installed details of alarms system layout, CNSI -
location, and electrical design that if disclosed Declassify could facilitate gaining unauthorized access to On:
OADR SSNM, nuclear facilities, or classified information.
l 223 Vendor hardware performance specifications.
U Specifications for vendor custom design equipment may be classified.
224 Information, including the effect of specific CNSI -
modifications, revealing in place operating Declassify capability that if disclosed facilitates On:
0ADR bypassing such systems.
225 Security-related vulnerability or weaknesses.
C-SNSI -
Declassify On:
0ADR Secret if significant vulnerability is revealed, e.g., degree of seriousness or explicit means of defeating these systems.
i 225.1 Vulnerability information directly U
available from vendor specificstions.
226 Sensitivity levels or limits to which installed CNSI -
systems have been set.
Declassify On:
0ADR 230 PLANT RADIO AND TELEPHONE COMMUNICATION SYSTEMS l
231 Government sponsored or required evaluations C-SNSI -
of,ite-specific existing plant radio and Declassify telephone communications systems revealing On:
0ADR vulnerabilities or limitations in operating capability or procedures.
Secret if significant vulnerability is revealed, e.g., degree of seriousness or explicit means of defeating these systems.
240 TAMPER INDICATING SEALS 241 Information revealing ways of successfully C-SNSI -
circumventing seals which are used to protect Declassify SSNM.
On:
0ADR Secret if explicit means of successfully bypassing seals are disclosed.
242 Methodology of manufacture.
U 243 Methodology of application.
U 8
250 KEYS, LOCKS, AND COMBINATIONS 251 Generic types and models of keys and locks U
used.
252 Mechanical key design, e.g.,
key cut depths C-SNSI coding systems which are used to protect areas of a security interest.
Classify consistent with the level and dura-May be RD tion of classification of information being protected.
253 Combinations and codes.
C-SNSI Classify consistent with the level and dura-May be RD tion of classification of information being protected.
254 Site-specific evaluation of lock or door C-SNSI -
locking systems that reveals vulnerability.
Declassify On:
0ADR Secret if explicit means of surreptitiously 1
gaining access are disclosed.
260 THREAT RESPONSE CAPABILITY AND PROCEDURES See also Section 400, Safeguards Analyses and Plans.
261 Number of security personnel.
261.1 Information available by visual access U
l from uncontrolled areas to routine guard patrol activities.
261.2 Total secu-ity personnel available CNSI -
onsite at a particular time for a site Declassify or particular activity including number On:
0ADR and type of weapons, other than standard sidearm.
261.3 Guard force deployment plan or scheme.
CNSI -
Declassi fy On:
0ADR 261.4 Size and armament of in.;ouse reserve CNSI -
force.
Declassify 7
On:
0ADR 9
262 Contingency plans.
262.1 Response to a specific threat, e.g.,
C-SNSI disposition, armament or planned Declassify response of security forces including On:
0ADR number of personnel responding to specific incidents.
Secret when revealing increased degree of vulnerability of a site as a result of a specific action.
262.2 Arrangements with local, state, and U
federal law enforcement units.
See Topic 262.1.
262.3 Numerical threat level for contingency CNSI -
planning.
Declassify On:
0ADR T3 Response time of guards and backup force.
263.1 Response time required.
U-CNSI -
Declassify On:
0ADR Unclassified if stated in unclassified NRC manual chapters or regulations.
263.2 Actual response time capabilities.
C-SNSI -
Declassify On:
0ADR Secret when revealing increased degree of vulnerability of a site as a result of a specific action.
264 Security patrols.
264.1 Procedures, schedules, and frequency CNSI -
for routine security tours.
Declassify On:
0ADR 264.2 Actual prearranged schedule including CNSI -
the specific times and locations.
Declassify On:
0ADR j
270 PERSONAL VERIFICATION (EMERGENCY OR DURESS) CODES CNSI -
AND/0R HOW THEY ARE USED Declassify o
On:
0ADR
(
10
280 AUDIT AND ASSESSMENT INFORMATION 281 General methods for auditing of physical U
security measures or assessing of these measures.
282 General procedures for routine inspection and U
testing of equipment, e.g., barriers, alarms, communications.
283 Government sponsored or required evaluations C-SNSI -
of security systems revealing vulnerabilities Declassify or limitations in physical security measures, On:
0ADR operating procedures or personnel capabilities.
Secret if significant vulnerabilities are revealed, e.g., degree of seriousness or explicit means of penetrating security defenses.
290 MISCELLANEOUS 291 Detailed reports of attempted or successful CNSI -
penetration of nuclear facilities and Declassify attempted or successful diversion or theft of On:
0ADR special nuclear material within or from a nuclear facility.
Reports of facts of attempted or successful penetration or diversions, without further elaboration, are unclassified.
Information covered by this topic is declassified when operationally necessary to repel attacks or recover stolen SSNM.
292 Reports of other unusual or abnormal occur-U rences or incidents, the release of which would not reveal security-related vulnerabilities.
293 Administrative control procedures.
U 294 Complete emergency plans such as fire, safety, U
and radiological emergency plans provided they do not reveal information classified by other i
topics of this guide.
300 IN-TRANSIT PROTECTION OF SSNM h
Topics in this section apply only to shipments of formula or greater quantities of SSNM.
Certain classification guidance in the area of in-transit protection is classified.
11
301 Fact that SSNM shipments are protected by various U
unspecified means.
302 Information regarding operations, shipments, U
routine and protection available as a result of uncontrolled visual access to the shipment when it is in progress.
303 Fact of use of any shipment mode, e.g., air, rail, U
truck, ship, etc.
310 SHIPMENT CONTENTS The classification guidance in this section applies to shipment composition information not classified by other guides, e.g., those relating to production, t
weapons, or naval reactors; classified topics in such guides take precedence where applicable.
Shipment contents information for a specific shipment is declassified when it is determined to be necessary to release such information in the event of an operational exigency, e.g., vehicle accident.
311 Fact that a specific shipment contains U
radioactive material.
311.1 Any further elaboration as to identity CNSI - May be or composition of the material, e.g.,
declassified after fact that it is SSNM, fact that it is arrival of shipment PU or U.
at final destination provided neither classified shipping patterns nor other information classi-fied by this guide is revealed.
312 Quantity of SSNM in a particular shipment.
CNSI - May be declassified after arrival of shipment at final destination provided neither classified shipping
~
patterns nor other information classi-fied by this guide is revealed.
12
312.1 Number and size of packages provided U
that the information classified by other topics of this or other applic-able guides is not revealed.
320 SCHEDULES AND ITINERARY FOR SPECIFIC SHIPMENT CNSI - May be declassified after arrival of shipment at final destination provided neither classified shipping patterns nor other information classi-fied by this guide is revealed.
A.
Total itinerary is declassified when it is determined to be necessary to release such information:
1.
To uncleared commercial carrier (s) selected to move a shipment (s).
2.
In the process of filing flight plans with FAA.
B.
Individual items of schedule information, less than the total itinerary, are declassified when it is determined to be necessary to release such information:
1.
In the event of an operational exigency, e.g., vehicle accident or communications failure, when cleared communications facilities are unavailable.
2.
In those cases when it is determined to be necessary to advise state or local law enforcement agencies regarding the move-ment of the shipment through areas under their jurisdiction.
330 SECOM (SECURE COMMUNICATIONS) OPERATIONS 331 The fact of existence of SECOM System and a U
q general description of the operation.
332 A general description of the SECOM equipment U
and SECOM Control Center.
h But see Topics 334 and 337.
13
333 Operating procedures.
333.1 Base Station Operating Procedures.
CNSI -
Classify On:
0ADR 333.2 General Mobile Operating Procedures.
U But see Topics 333.3 and 334.
333.3 Appendices to General Operating CNSI* -
Procedures that concern the Classify security / safeguards of shipments.
On:
0ADR 334 Detailed description of:
334.1 Operation and Equipment.
CNSI* -
Declassify On:
0ADR 334.2 Checkpoint System.
CNSI* -
Declassify On:
0ADR 334.3 Authentication System.
CNSI* -
Declassify On:
0ADR 335 Emergency Response Procedures CNSI* -
Declassify On:
0ADR 336 Authenticator Lists CNSI* -
Declassify On:
0ADR (see Topic 336.2) 336.1 Before use.
336.2 After use, if information relevant to U
subsequent use is not revealed.
337 Maps showing in-transit locations of CNSI - Maps become shipments.
declassified after removal of in-transit locations.
- Individual items of information not revealing (1) significant information concerning the (a) security protection, (b) the disposition, armament, or i
planned response of security forces or (2) information classified under other topics of this guide or other applicable guides should be submitted through i
channels to the NRC Division of Security, for possible declassification.
14 l
338 Records 338.1 Voice Recordings.
U 338.2 SECOM station logs.
U-SNSI Classification of the station log depends upon the level and duration of classification of the information entered in the log.
339 Software and Software Documentation (guidance for specific program to be identified as developed).
Classification level and duration depends upon what information, covered by other topics in this guide, is revealed.
340 INTER-VEHICLE COMMUNICATIONS 341 Fact of radio communications and the radio U
frequencies used between SSNM vehicle and escort vehicles.
Elaboration may be classified.
342 Communications procedures and system informa-U tion not revealing information classified by other topics of this guide.
350 COMMUNICATIONS EQUIPMENT PER SE U
l 360 INFORMATION CONCERNING COMMUNICATIONS SYSTEMS U
l PROCEDURES AND EQUIPMENT WHICH MUST BE EXCHANGED l
WITH LOCAL LAW ENFORCEMENT AGENCIES PROVIDING IT DOES NOT REVEAL INFORMATION CONTAINED IN THE PHYSICAL SECURITY PLAN 370 GUARD ORGANIZATION AND CAPABILITIES 371 The fact that armed guards accompany special U
nuclear material shipment.
372 The total number of guards that accompany a CNSI -
particular shipment.
Declassify On:
0ADR f
373 Contingency plans-for safeguarding enroute CNSI -
shipments, e.g., disposition, armament, or Declassify planned response of security forces.
On:
0ADR 15
i l
l l
374 Arrangements with local law enforcement U
agencies.
380 SECURE TRANSPORT VEHICLES 381 Fact of existence of such vehicles, e.g.,
U Safe Secure ATMX Car, and Special Nuclear Material Vehicles (SNMVs) and commercial vehicles designed to carry and safeguard SSNM.
382 General description of purpose and function, U
e.g., to reduce the vulnerability of shipment to diversion and to deter unauthorized access to transported cargo.
383 Visual access to vehicle exterior.
U 384 Visual access to vehicle cargo compartment, U
provided information classified by other topics of this guide is not revealed.
385 Fact of use of specific passive or active U-CNSI -
protection features.
Declassify On:
0ADR Fact of use of armor plate, bullet resistant glass, foam, and brake locking is unclassified.
386 Design details of passive or active protection.
CNSI -
Declassify On:
0ADR 400 SAFEGUARDS ANALYSES AND PLANS 410 DIVERSION OR SAB0TAGE VULNERABILITY STUDIES C-SNSI -
Declassify On:
0ADR 1
411 Site-specific or route specific scenarios C-SNSI* -
for theft, diversion or sabotage.
Declassify
)
On:
0ADR Secret if significant vulnerability is revealed, e.g., degree of seriousness or explicit means of penetrating security defenses are disclosed.
f
- Individual items of information not revealing (1) significant information concerning the (a) security protection, (b) the disposition, armament, or planned response of security forces or (2) information classified under other topics of this guide or other applicable guides should be submitted through channels to the NRC Division of Security, for possible declassification.
i 16
412 Evaluations of scenarios for theft, diversion, C-SNSI* -
or sabotage.
Declassify On:
0ADR Secret if significant vulnerability is revealed, e.g., degree of seriousness or explicit means of penetrating security defenses is disclosed.
413 Site-specific or route-specific diversion C-SNSI* -
path or vulnerability analysis.
Declassify On:
0ADR Secret if significant vulnerability is revealed, e.g., degree of seriousness or explicit means of penetrating security defenses is disclosed.
414 Diversion path or vulnerability analysis U
1 methodology, e.g., general techniques (fault tree, event tree, systems analysis, etc.).
420 PLANS FOR RESPONSE TO THREATS C-SNSI* -
Declassify On:
0ADR Secret if significant vulnerability is revealed, e.,g., degree of seriousness, or explicit means of penetrating security defenses is disclosed.
421 Fact that current NRC regulations are intended U
to cover a threat of several people.
422 Vulnerabilities of specific facilities.
C-SNSI* -
Declassify On:
0ADR Secret if significant vulnerability is revealed, e.g., degree of seriousness or explicit means of penetrating security defenses.
423 Threat Levels 423.1 Specific threat levels against which C-SNSI -
the NRC licensees can or cannot Declassify protect.
On:
0ADR j
- Individual items of information not revealing (1) significant information concerning the (a) security protection, (b) the disposition, armament, or
. planned response of security forces or (2) information classified under other
/
topics of this guide or other applicable guides should be submitted through channels to the NRC Division of Security, for possible declassification.
{
l l
17
i 1
l 423.2 Threat levels against which NRC C-SNSI -
licensees intend to protect in the Declassify future.
On:
0ADR
{
423.3 External and internal threat levels C-SNSI -
which are used as part of a sensitivity Declassify analysis of a security system to On:
0ADR threats in that system.
500 SAFEGUARDS RESEARCH, DEVELOPMENT, TEST, AND EVALUATION (RDT&E) 510 GENERIC FUNCTIONS, GENERAL PERFORMANCE CHARACTER-U ISTICS, AND GENERAL APPLICATIONS OF MATERIALS, EQUIPMENT, PROCESSES, AND CONCEPTUAL STUDIES IN s
RDT&E FOR NEW OR IMPROVED SAFEGUARDS, PROVIDED INFORMATION CLASSIFIED BY OTHER TOPICS IN THIS GUIDE IS NOT REVEALED.
520 CONCEPTUAL STUDIES FOR A GENERIC FACILITY OR SITE.
U THE OBJECTIVES, CAPABILITIES, AND APPLICATIONS FOR AN ENTIRE SITE SECURITY SYSTEM.
530 EVALUATIONS OF COMMERCIAL OR COMMERCIALLY DEVELOPED U
EQUIPMENT WHICH HAS UNDERGONE OR IS UNDERGOING LABORATORY TESTING.
But see Topics 214, 222, 224, 231, 241, 410.
540 SPECIFIC PERFORMANCE CAPABILITIES OR VULNERABILI-TIES OF SYSTEMS, SUBSYSTEMS, MATERIALS, EQUIPMENT, OR PROCESSES IN RDT&E FOR NEW OR IMPROVED SAFEGUARDS.
541 Information revealing a vulnerability which CNSI -
would significantly assist the bypass or Declassify defeat of the integrated safeguards system On:
0ADR actually installed (or planned to be installed) at a specific facility or in the transportation system.
542 Information about a characteristic or feature CNSI -
that meets all of the following criteria:
Declassify (1) it would significantly delay the bypass On:
CADR or defeat of an operational application, and (2) its presence in an operational configura-tion and application would not be reasonably expected or predicted.
550 HARDWARE IS CLASSIFIED IN ACCORDANCE WITH THE INFORMATION IT REVEALS.
e i
l l
si s
a R
H s
a 120555078877 1 1AN US NRC 0 I C
UB GT BR-POR NUREG W-501 WASHIhGT0h DC 20555 R&
v
.