ML20091P014
| ML20091P014 | |
| Person / Time | |
|---|---|
| Issue date: | 12/31/1991 |
| From: | NRC OFFICE OF ADMINISTRATION (ADM) |
| To: | |
| References | |
| NUREG-BR-0069, NUREG-BR-0069-R02, NUREG-BR-69, NUREG-BR-69-R2, NUDOCS 9201310200 | |
| Download: ML20091P014 (24) | |
Text
..
NUREG/BR-0069 Revision 2 pa nouq I,\\,,,f i United States Nuclear Regulatory Conimission NRC Classification Guide for National Security Information Concerning Nuclear Materials and Facilities (CG-NMF-2) e Division of Security Office of Administration December 1991 I
911231
- ggiagggg PDR BR-OO69 R
o I
i UNITED STATES NUCLEAR REGULATORY COMMISSION NRC Classification Guide for National Security Information Concernina Nuclear Materials and Facilities (CG-NMF-2)
/
1; APPROVED BY:
edam /sM.Tayld
['U.S.NuclearRegulatoryCommission E,x6cutive Director for Operations DATE:
f2/t /f /
/ '
UNITED STATES NUCLEAR REGULATURY COMMISSION DIVISION OF SECURITY WASHINGTON, O.C.-20555
-NRC Classification Guide for National Security Information-Concerning Nuclear Materials and Facilities (CG-NMF-2)
Da.
Change Notice y
l t
t t
r 4
f q
l l
.....w
.. l m
~
4,.
__.,m
.,,..~....,[.
r 1
+
P TABLE OF CONTENTS Page ABBREVIATIONS.................................................
v INTRODUCTION.....................................................
1 CLASSIFICATION GUIDANCE..........................................
5 100 MATERIAL CONTROL AND ACCOUNTABILITY.........................
5 110 SSNM Quantities..........................................
5 120 SSNM Measurement 0ata....................................
5 130 Material Control-and Accounting Plans...................
5 140 Quantitative SSNM Balance Data...........................
6 150 Other items Pertaining to Material Control and Accounting...............................................
6 i
200 PHYSICAL PROTECTION AT FIXE 0 SITES...........................
6 210 Site and-Facility Description............................
7 220 Intrusion and Detection Alarm Systems....................
7 230 Plant Radio and Telephone Communication Systems..........
8 240 Tamper-Indicating Sea 1s..................................
8 250 Keys, Locks, and Combinations............................
9
-260 Threat Response Capability and Procedures................
9 270 Personal Verification Codes..............................
10 280 Audit and Assessment Information........................
11 290 Miscellaneous.............................
11 300 IN-TRANSIT PROTECTION OF SSNM..............
12 310 Shipment ~ Contents..... -.................................
12
- 320 Schedules and Itinerary for Specific Shipments...........
13-
-330-Secure Communications Operations.........................
14 340: Inter-Vehicle Communications.....................
-- 15 350 Communications Equipment.................................
16 360 Communications Coordination with Locai Law-Enforcement Agencies.......
1............
16 370 Organization of the Guard and Guard Capabilities.........16-380 Secure Transport Vehicles................................16-400 SAFEGUARDS ANALYSES AND PLANS................................
-17 410 Diversion or Sabotage Vulnerability Studies..............
17 420 Plans for Response to Threats............................
18 500 SAFEGUARDS RESEARCH, DEVELOPMENT, TEST, AND EVALUATION......
18 510 Generic Functions......................................
18 520 Conceptual Studies......................
19 530 ' Evaluations...................
19 540 Specific Performance Capabilities or Vulnerabilities...
19 550 Hardware.,........................
19 l
L i i i i:
m.
ABBREVIATIONS C
CONFIDENTIAL CFR Code of Federal Regulation DOE Department of Energy, U.S.
FAA Federal Aviation Administration ID inventory difference LEID limit of error on the inventory difference MUF material unaccounted for NRC Nuclear Regulatory Commission, U.S.
NSI National Security Information 0ADR originating agency's determination required RD Restricted Data RDT&E research, development, test, and evaluation RIS reporting identification symbol S
SECRET SNM special nuclear material SSNM strategic special nuclear material U
unclassified v
o INTRODUCTION-A.
PURPOSE -'
This guide, formerly "NRC Classification Guide for Safeguards _Information,"
provides security classification guidance for the protection of information about certain nuclear materials or facilities in accordance with Executive Order 12356, dated April 6,1982 or successor orders. - This guide shall' be used by authorized classifiers to classify information as stated herein.
B.
SCOPE This guide provides for the classification of information concerning (1) reactor __and research facilities that have unirradiated formula
~
quantities of strategic'special nuclear material (SSNM), (2) shipment activities involving onself protecting formula quantities of SSNM, and (3) fuel-cycle facilisles authorized to possess or use nonself protecting formula quantities of SSNM.
For convenience, this guide divides information into the following five categories:
(1) m herial control and accountability; (2) physical protec-i i
tion at fixed sites; (3) in-transit protection of SSNM; (4) safeguards analyses and plans; and (5) safeguards research, development, test, and evaluation.
C.
BASIC-POLICY The principle that underlies the policy-for lassification of safeguards information is to provide the maximum possibie information to the public, while at the same time protecting against unauthorized disclosure of infor-mation that could cause damage to the national security.
Such information includes the following:
1.
Information from SSNM accounting and control. systems that could j
(a) facilitate _ assistance to, frustrate or delay the detection of, or the response to, the attempted theft or diversion of formula quanti-ties of nonself protecting SSNH; (b) enhance the credibility or frequency of nuclear threats
'2.
Information that could facilitate carrying out a cuccessful sabotage mission against any-facility or-activity involving formula quantities
-of-nonself-protecting SSNM 3.
Information that could facilitate carrying out a successful theft or diversion of formula quantities of nonself protecting SSNM Safeguards information placed officially in the public domain or obtainable by visual access from uncontrolled areas is unclassified.
Retention of national ' security information is subject to authorized records disposition schedules.
i 1
ll l
This guide is approved for use by the U.S. Nuclear Regulatory Commission (NRC), NRC contractors, licensees, and other personnel in classifying safeguards information.
D.
USE OF THIS GUIDE 1.
Information designated as either " CONFIDENTIAL" or " SECRET" in this guide will be classified accordingly by users of the guide.
This guide constitutes a record of an original classification decision by the approving authority and directs the derivative classification of information that the guide indicates is classified.
Any questions concerning the applicability of this guide should be directed to the Director, Division of Security, U.S. Nuclear Regulatory Commission, Washington, D.C.
20555.
2.
Certain topics indicate that information to which they apply may be either CONFIDENTIAL or SECRET.
Application of these topics requires informed judgment based on knowledge of the overa.1 context of the information.
3.
In some cases, more detailed supplementary guides may be required.
Proposals for such guides should be forwarded to the Director, Divi-sion of Security, U.S. Nuclear Regulatory Commission, Washington, D.C.
20555.
4.
Compilations of unclassified information are generally considered to be unclassified unless some additional factor is added in the process of compilation.
For example:
(a) the fact that the information is complete for its intended purposes may be classified or (b) the fact that the compiled information represents an official evaluation may be classified.
5.
Care should be taken that the declassification of a document does not violate provisions of the guide when evaluated in connection with information already unclassified.
6.
If classified information can be discerned from the use, presence, or capabilities of any equipment, the equipment will be classified at the level of that information and for as long as that information can be discerned from the equipment.
E.
DEFINITIONS USED IN THIS GUIDE 1.
Formula Quantity of Strategic Special Nuclear Material (SSNM) -
(sometimes referred to as tormula grams, trigger quantity, strategic quantity, threshold quantity, and significant quantity) - a formula quantity of strategic special nuclear material is 5,000 grams or more computed by the formula:
grams = (grams contained U-235) + 2.5 (grams U-233 + grams plutonium).
2.
Inventory Difference (10) - (formerly Material Unaccounted For [MUF]) -
the algebraic ditterence between a physical inventory and its concomi-2
-i tant book inventory after determinir; that all known removals and additions have been reflected in the book inventory.
It is calculated by subtracting ending inventory, plus removals from beginning inventory,-plus additions to inventory.
3.'
Material Access Area - any location that contains special nuclear material within a vault or a building, the roof, walls, and floor of which_each constitutes a physical barrier.
4.
Material Control and Accounting Plan - a site-specific document (or group of documents) that gives a comprehensive description of the measures employed in the material control and: accounting program.
National Security Information (NSIJ is owned by, produced for or by, information or material 5.
collectively termed information that under the control of, or regulated by the United States Government, and t' tat has been determined pursuant to Executive Order 12356 or
= prior Executive Orders to require protection against unauthorized 1
disclosure, and that is so designated.
Nuclear Facility - any facility for originatingles of nonself-producing, using, 6.
shipping, receiving,_or storing formula quantit protecting SSNM.
7.
Physical Security Plan - a site-specific document (or group of documents) that provides a comprehensive description of the measures employed for the physical protection of nuclear facilities and materi-als against sabotage, theft, or diversion of formula quantities of nor.self protecting SSNM.
8.
Reporting Entity - a licensee or contractor that has been assigned a unique reporting identification symbol (RIS) by NRC or by the U.S Department of Energy-(DOEi -'d that is required to submit periodic material status repor_ts
.,C/D0E form 742) identified by the RIS.
9.
Restricted Pata (RD) - defined in the Atomic Energy Act of 1954, as-amended, as "all data concerning (1) design, manufacture, or utiliza-tion of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy; but shall not-include data declassified or removed from the Restricted Data category pursuant to Section 142."
10.
Self-Protecting Strategic Special Nuclear Material - SSNM that is not readily separable from other radioactive material and that has a total external radiation dose rate in excess of 100 rem per hour at a distance-of 3 feet.from any accessible surface without intervening shielding.
11.
53ecial Nuclear Material (SNM) - (1) plutonium, uranium enriched in tie isotope-233 or in the isotope-235,_and any-other material that the Commission, pursuant to the provisions of Section 51 of the Atomic Energy Act, as amended,-determines to be special nuclear material, but does not include source material or (2) any material artificially enriched by any of the foregoing but does not include source material.
l 3
6 12.
Strategic Special Nuclear Material (SSNN) - uranium-235 (contained in uranium enriched to 20 percent or more in the U-235 isotope),
uranium-233, or plutonitm.
F.
DECLASSIFICATION - Executive Order 12356 Restricted Data is exempt from automatic declassification and does not require declassification markings.
National Security Information identi-fied in this guide will be marked for declassification or review for de-classification as specified by the applicable topics of this guide.
This guide has been approved by an original TOP SECRET classification authority.
k e
4
CLASSIFICATION GUIDANCE TOPICS CLASSIFICATION 100 MATERIAL CONT CL AND ACCOUNTABILITY 110 SSNM QU,UTITIES 111 Total quantities of SSNM at any given time by U
plant.
112 Total quantities of SSNM at any given time by CNSI -
designated vault and vault-type storage areas.
Declassify on:
0ADR NOTE:
Inventories of SSNM for classified DOE programs (e.g., production, naval reactors) will be classified in accordance with DOE guidance applicable to those programs.
120 SSNM MEASUREMENT DATA 121 Measurement accuracy required by unclassified U
regulations (e.g., Title 10 of the Code of Federal Regulations, Part 70 [10 CFR Part 70]).
122 Measurement uncertainties associated with bulk U
and analytical measurements that are typical for the nuclear industry provided information classified by otner topics in this guide is not revealed.
123 The limit of error on the inventory difference CNSI -
(LEIO) for individual material balance Declassify period or on a cumulative period basis.
on:
0ADR 130 MATERIAL CONTROL AND ACCOUNTING PLANS 131 Plans submitted in accordance with 10 CFR U
Part 70 and 74 that contain details of the licensee's plan for the material control and accounting programs.
These plans include frequency of and schedule for SSNM inventories, and measurement control, including equipment, methodology quality assurance, destructive and nondestructive analyses, audit, and organization.
I 5
TOPICS
'LASSIFICATION 140 QUANTITATIVE SSNM BALANCE DATA The classification guidance in these topics applies to SSNM balance information not class-ified by other gdides, for example, production or naval reactors; classified topics in such guides take precedence where applicable.
141 Receipts U
142 Shipments U
But see Topic 312.
143 Other removals:
measured discards, decay U
losses, and losses as a result of fission and transmutation.
144 ' Inventory difference (ID) in any amount.
CNSI*
150 OTHER ITEMS PERTAINING 10 MATERIAL CONTR06 AND ACCOUNTING 151 Any computer output displays or printouts CNSI - See that provide inventory difference data.
Topic 144 for applicable declas-sification marking 200 PHYSICAL PROTECTION AT FIXED SITES 201 The physical security plan for a nuclear C-SNSI -
facility or site.
Plans may be SNSI in Declassify accordance with other applicable classifica-on:
0ADR ti guidance.
SECRET if significant vulnerability is revealed, for example, the degree of seriousness or an explicit means of penetrating existing security defenses is disclcsed.
See, for example, Section 400 of this guide.
- May be declassified af ter a period of 6 months from date of inventory assess-ment, provided (a) any resulting investigation is completed and (b) the initial classification determination was not due to extenuating circumstances.
10 data remains classified for the duration of an investigation.
6
- TOPICS, CLASSIFIC/. TION 210 SITE AND FACILITY DES'41PTION 211 Only the general layout that can be seen from U
uncontrolled areas and that does not identify a vulnerability.
This general layout may includo buildings, parking areas, accest roads, fences, outside storage areas, natural terrain, landscaped areas, tunnels, storm and waste sewers, water intake and discharge con-duits, culverts, creeks, canals, and any other physical characteristics such as features o-buildings, barriers, fences, guard stations, et:.
212 Site specif ic, ""-bui' " drawings, diagrams, CNSI -
sketches, maps, etc.
awing _ identity together Declassify with location ans'/ar 4,<cription of facility on:
0ADR e
features of special interest because of their relationship to the physical security system that if revealed could f acilitate tref t or diversion of SSNM or sabotage of a facility.
But see Topics 211, 213, and 221.
213 Scope, conceptual design, and construction V
drawings showing construction charactaristics of buildings and associated fencing, electrical and other utility system layouts.
e But see Topic 212, 214 Government-sponsored or required evaluations C-SNSI -
of site-specific construction featurer. or Declassify physical security barriers revealing vulnera-on:
0ADR bilities or limita, ions that could facilitate penetrating or bypassing physical security barriers.
SECRET if significant vulnerability, for example, the de0ree of seriousness or an
)
explicit means of defeating these systems is revealed.
220 INTRllSION AND DETECTION ALARM SYSTEMS Includes mana illy activated duress alarms.
221 Scope, conceptual design, and construction CNSI -
plan.
Declas:ify on:
l' See Topic 222.
~
7 t
4
. - _ - _ _ - - - _ _ _ _ ~ - _ _ _ _ - _ - - - _ _ _ _ _ _ _ _ _ _ _ - _ _ _
1 TOPICS CLASSIFICATION i
1 222 As-install ' details of alarm system layout, CNSI -
location, and electrical design that if Declassify disclosed could facilitate gaining unautho-on:
0ADR rized access to SSNM, nuclear facilities, or classified information.
223 Vendor hardware performance specifications.
U l
Specifications for vendor custom-designed equipment.nay be classified.
224 Information, including the effect of specific CNSI -
modifications, revealing in place operating Declassify capability that if disclosed facilitates on:
0ADR bypassing such systems.
225 Security-related vulnerabilities or C-SNSI -
weaknesses.
Declassify on: -0ADR SECRET if significant vulnerability is revealed, for example, the degree of serious-ness or an explicit means of defeating these systems.
225.1 Vulnerability information directly U
available from vendor specifications.
226 Sensitivity levels or limits to which CNSI -
inta11ed systems have been set.
Declassify on:
0ADR 230 PLANT RADIO AND TELEPHONE COMMUf!;ATION SYSTEMS 231 Gosernment-sponsored or required evaluations C-SNSI -
of site-specific existing plant radio ard Declassify telephone communication Systems-revealing on:
0ADR vulnerabilities or limitations in operating capability or p mcedures.
SECRET if significant vulnerability is revealed, for example,.the degree of serious-ness or-an explicit means of defeating these systems.
240 TAMPER-INDICATING SEALS 241 Information revealing ways of successfully C-SNSI -
circumventing reals that are used to Dec?assify protect SSNM.
on:
0ADR SECRET if. explicit means of successfully i
bypassing seals is disclosed.
242 Methodology of manufacture U
8
=
=
TOPICS CLASSiriCATION 243 Methodology of application U
250 KEYS, LOCKS, AND COMBINATIONS 251 Generic types and models of keys und locks U
used.
252 Mechanical key design, for example, key C-SNSI cut depth coding systems that are used to Declassify protect areas of a security interest.
on: 0ADR Classify consistent with the level and duration of classifh ation of information being protected.
-253 Combinations and. codes C-SNSI Classify consistent with the level and
-Declassify duration of classification of information on:
0ADR
<being protec.ted.
254 -Site-specific evaluation of lock or door C-SNSI
- locking systems that reveals vulnerability.
Declassify on:
0ADR SECRET if explicit means of surreptitiously gaining access are discloseJ.
260 THREAT RESPONSE CAPAD'LITY AND PROCEDURES See also Section 400, Safeguards Analyser and Plans.
261 Number of security personnel 261.1 Information available by visual U
access from uncontrolled areas to i
routine guard patrol activities, j
261.2 Total security personnel available CNSI -
on site at a particular time for Declassify a site or a particular activity, on:
0ADR including number and type of weapons, other than standard sidearm.
.261.3 Guard force deployment plan or CNSI scheme.
Declassify on:
0ADR
).
261.4 Size and armament of in-house CNSI -
I reserve force.
Declassify on:
0AbR 9
a.-..- -, - -.
TOPICS CLASSIFICATION 262 Contingency plans 262.1 Response to a specific threat, for C-SNSI example, the disposition, armament, Declassify or planned response of security on:
0ADR forces, including the number of personnel responding to specific incidents.
SECRET when revealing an increased degree of vulnerability of a site as a result of a specific action.
262.2 Arrangements with local, State, and U
Federal law enforcement units.
See Topic 262.1.
262.3 Numerical threat level for CNSI -
contingency planning.
Declassify on:
0ADR 263 Response time of gesrds and backup force 263.1 Response time required.
U-CNSI -
Declassify on:
0ADR Unclassified if stated in unclassified NRC manual chapters or regulations.
263.2 Actual response time capabilities.
L-SNSI -
Declassify on:
0ADR SECRET when revealina an increased degree of vulnerab
' of a site as a result of a st ic action.
264 Security patrols 264.1-Procedures, schedules, and frequency CNSI -
for routine cacurity tours.
Declassify on:
0ADR 264.2 Actual prearranged schedule, CNSI -
including the specific-times and Declassify locations, on:
0ADR 3
270 PERSONAL VERIFICATION (EMERGENCY OR DURESS) CODES CNSI -
AND/0R HOW THEY ARE USED Declassify on:
0ADR 10
i t
[
TOPICS CLASSIFICATION 280 AUDIT AND ASSESSMENT INFORMATION
[
281 General methods for auditing of physical U
l security measures or assessment of these measures.
282 General procedures for routine inspection and U
testing of equipment, for example, barriers, alarms, communications.
283 Government-sponsored or required evaluations C-SNSI -
f of security systems revealing vulnerabilities Declassify
.or limitations in physical security measures, on:
0ADR operating procedures, or personnel t
capabilities.
SECRET-if significant vulnerabilities are revealed, for example, the degree of serious-ness or an explicit means of penetrating security defenses.
290 MISCELLANE005 291 Detailed reports of attempted or successful CNSI -
l penetration of nuclear facilities and Declassify
)
attempted or successful diversion or theft on:
0ADR i
of special nuclear material within or from a nuclear facility.
Reports of facts of attempted or successful U
penetration or diversions, without further elaboration.
l Information covered by this topic is declassified when operationally necessary to repel attacks or to recover stolen SSNM, 292 Reports of other unusual or abnormal-occur -
U rences or incidents, the release of which i
would not reveal security-related vulnerabilitiet 293 Administrative contrcl procedures.
U 234 Complete emergency plans such as fire, U
[
safety, and radiological emergency plans, provided they do not reveal information classified by other tepics of this, guide.
11
~. -----,-----..---.- --.-.-.- -.- - -
i
1 l
1 TOPICS CLASSIFICATION l
300 IN-TRANSIT PROTECTION OF SSNM j
Topics in thic section apply only to shipments of j
formula or gmater quantities of SSNM.
i certain classification guidance in the area of in-
. transit protection is classified.
301 The fact that SSNM shipments are protected U
by various unspecified means.
302 Information regarding operations, shipments, U
routine, and protection available as a result t
of encontro11ed visual access to the shipment when it is in progress.
-303 The fact of the use of any shipment mode, 0
for example, air, rail, truck, ship, etc.
310 SHIPMENT CONTENTS The classification guidance in this section applies
.to shipment composition information not classifieo by other guides, for example, those relating to production, weapons, or naval-reactors; classified
-topics in such guides take precedence where applicable.
Shipment contents information for a specific shipment is rieclassified when it is determined to be necessary to release such information in the event of an operational exigency, for example, a vehicle accident.
311 The fac that a specific shipment contains rad!oactive material.
U 311.1 Any further elaboretion as to CNSI - May be identity or compos) 'on of the declassified material, for exampi.
the fact after arrival that it is SSNM or the fact that of shipment at it is plutonium or uranium, final destina-tion,.provided-neither clas-sified shipping patterns nor other ir. forma-
.i tion classified by this guide 1
is revealed.
12
..~.
~
TOPICS CLASSIFICATION 312 Quantity of SSNM in a particular shipment.
CNSI - May be declassified after arrival of shipment et final destina-tion, provided neither classi-fied shipping patterns nor l'
other informa-tion classified by this guide is revealed.
312.1 Number and size of packages, provided U
that the information classified by other topics of this or other applicable guides is not revealed.
320 SCHEDULES AND ITINERARY FOR SPECIFIC SHIPMENTS CN51 - May be declassified after arrival of the shipment at the final destination, provided neither classified ship-ping patterns nor other inforraation classified by this guide-is revealed.
A.
The total itinerary is declassified when it i' determined to be necessary to release j
suci
, formation:
1.
T an uncleared ccmmercial carrier (s) selected to move a shipment (s)'
2, In the process of filing flight plans with the Federal Aviation Administration (FAA).
B.
Individual items of schedule information
-i less.than the tota 1' itinerary are declassi-fied when 't is determined to be necessary to release such information:
1..
In the event of an operational _ exigency, for example,-vehicle accident or a com-munications failure, w%n cleared com-munications facilitit, are unavailable.
13
-.a
i I
t TOPICS CLASSIFICATION 2.
In those cases when it is determined to be necessary to advise State or local law enforcement agencies regarding the move-ment of the shipment through areas under their jurisdiction..
330 SECURE COMMUNICATIONS OPERATIONS
.331 T.e fact of the existence of secure communica-U Lion system and a general description of its operation.
332 A general description of secure communica-U tions equipment and the Control Center.
But see Topics 334 and 337.
333 ' Operating procedures 333.1 Base Station Operating Procedures.
CNSI -
l Declassify on:
0ADR 333.2 General Mobile Operating Procedures.
U i
But see Topics 333.3 and 334.
333.3 Appendices to General Operating CNSIA 1
Procedures that concern the Declassify security / safeguards of shipments.
on:
0ADR 334 Detailed description of 334.1 Operation and equipment CNSI* -
Declassify on:
0ADR 334.2 Checkpoint system CNSI* -
Declassify on:
0ADR 334.3 Authentication-system CNSI* -
Declassify.
on:
0ADR 1
- Individual items _of information not revealing (1) significant information concerning (a) security protection, (b) the disposition, armament, or planned i
response of security forces or (2) information classified under other topics in this guide or other applicable guides should be submitted through channels to the NRC' Division of Security for possible declassification.
14 i
TOPICS CLASSIFICATION i
335 Emergency Response Procedures CNSl* -
Declassify on:
0ADR 336 Authenticator lists 3?6.1 Before use CNSl* -
Declassify on:
0ADR (see Topic 336.2) 336.2 After use, if information relevant U
to subsequent use is not revealed.
337 Maps showing in-transit locations of CNSI - Maps shipments, become declas-sified after removal of in-transit locations.
338 Records 338.1 Voice Recordings V
338.2 Secure communications station logs U-SNSI Declassify Classification of the station log on:
0ADR depends upon the level and duration of classification of the information entered in the log.
339 Software and software documentation (guidance for specific programs to be identified as developed).
Classification level and duration depends upon what information covered by othcr topics in this guide is revealed.
340 INTER-VEHICLE COMMUNICATIONS 341 The fact of radio communication and the radio U
frequencies used between SSNK vehicle and escort vehicles.
- Individual items of information not revealing (1) significant information concerning (a) security protection, (b) the disposition, armament, or planned response of security forces or (2) information classified under other topics in this guide or other applicable guides should be submitted through channels to the NRC Division of Security for possible declassification.
15
' TOPICS CLASSIFICATION Elaboration may be classified.
342 Communications procedures and system infor-U mation not revealing information classified by other topics in this guide.
-350 COMMUNICATIONS EQUIPMENT U
360 INFORMATION CONCERNING COMMUNICATl0N SYSTEM-U PROCEOLRES AND EQUIPMENT THAT HUS'. BE EXCHANGED WITH LOCAL LAW LNFORCEMENT AGENCTES PROVIDING Il DOES NOT REVEAL INFORMATION CONTAINED IN THE PHYSICAL SECURITY PLAN 370 ORGANIZATION-0F THE GUARD AND GUARD CAPABILITIES 371 The fact that-armed guards accompany special U
nuclear material shipment.
372 The total number of guards that accompany a CNSI -
particular shipment.
Declassify-on:
0ADR 373 Contingency plan: for safeguarding shipments CNSI -
~
enroute, for example, the disposi-Declassify tion, armament, or planned response of on:
0ADR security forces.
374 Arrangements with-local law enforcement U
agencies.
380 SECURE TRANSPORT VEHICLES 381 The-fact of the existence of such vehicles U
382 General description of purpose and function,-
- U for example, to reduce the vulnerability of the shipment to diversion and to deter unauthorized access-to transported cargo.
383 Visual access to vehicle exterior.
U 384 Visual eccess to vehicle cargo compartment, U
provided informatica classified by other topics in this-guide is not revealed.
(
385 The fact of the use of specific passive or U-CNSI -
1
- active protection features.
Declassify y
on:
0AOR The fact of the use of armor plate, bullet-U-CNSI -
resistant glass, foam, and brake-locking.
Declassify on:
0ADR 16
_,. _ _. -. _,.. _,. ~
TOPICS CLASSIFICATION 386 Design details of passive or active CNSI -
protection.
Declassify on:
0ADR 400 SAFEGUARDS ANALYSES AND PLANS 410 DIVERSION OR SABOTAGE VULNERABILITY STUDIES C-5N51 -
Declassify on:
0ADR 411 Site specific or route-specific scenarios C-SNSl* -
for theft, diversion, or sabotage.
Declassify i
on:
0ADR SECRET if significant vulnerability is revealed, for example, the degree of serious-ness or an explicit means of penetrating security defenses is disclosed.
412 Evaluations of scenarios for theft, C-5N51* -
diversion, or sabotage.
Declassify on:
0ADR SECRET if significant vulnerability is revealed, for example, the degree of serious" ness or an explicit means of penetrating security defenses is disclosed.
413 Site-specific or route-specific diversion C-5NSI* -
path or vulnerability analysis.
Declassify on:
0ADR SECRET if significant vulnerability is revealed, for example, the degree of serious-ness or an explicit means of penetrating-security defenses is disclosed.
414 Diversion path or vulnerability analysis U
methodology, for example, general techniques (fault tree, event tree, systems analysis, etc.).
- Individual items of information not revealing (1) significant information concerning (a) securit, protection, (b) the disposition, armament, or planned response of security forces or (2) information classified under other topics in this guide or other applicable guides should be submitted through channels to the NRC Division of Security for possible declassification 17
TOPICS CLASSIFICATION 420 Pl.ANS FOR RESPONSE TO THREATS C-SNSI* -
Declassify on:
0ADR SECRET if sigr.ificant vulnerability is revealed, for example, the degree of seriousness or an explicit means of penetrating security defenses is disclosed.
421 The fact that current NRC regulations are U
intended to cover a threat of a small group.
422 Vulnerabilities of specific facilities.
C-SNSI" -
Derinsify on:
uaDR SECRET if significant vulnerability is revealed, for example, the degree of serious-ness or ar. explicit means of penetrating security defenses is disclosed.
423 Threat levels 423.1 Specific threat levels against C-SNSI -
which the NRC licensees can or Declassify cannot protect, on:
OADR s
423.2 Threat levels against which NRC C-SNSI -
licensees intend to protect in the Declassify future.
on:
0ADR 423.3 External and internal threat levels C-SNSI -
that are used as part of an analysis Declassify of the sensitivity of a security on:
CADR system to threats in that system.
500 SAFEGUARDS RESEARCH, DEVELOPMENT, TEST, AND EVALUATION (RDT&E) 510 GENERIC FUNCTIONS, GENERAL PERFORMANCE CHARACTER-U ISTICS, AND GENERAL APPLICATIONS OF MATERIALS, EQUIPMENT, PROCESSES, AND CONCEPTUAL STUDIES IN RDT&E FOR NEW OR IMPROVED SAFEGUARDS, PROVIDED INFORMATION CLASSIFIED BY OTHER TOPICS IN THIS GUIDE IS NOT REVEALED.
- Individual items of information not revealing (1) significant information concerning (a) security protection, (b) the disposition, armament, or planned response of security forces or (2) information classified under other topics in this guide or other applicable guides shoulo be submitted through channels to the NRC Division of Security for possible declassifkation.
ld
TOPICS CLASSIFICATION j
570 CONCEPTUAL STUDIES FOR A GENERIC FACILITY OR SITE.
U THE OBJECTIVES, CAPABILITIES, AND APPLICATIONS FOR AN EN11RE SITE SECURITY SYSTEM.
530 EVALUATIONS OF COMMERCIAL OR COMMERCIALLY DEVELOPED U
EQUIPMENT THAT HAS UNDERGONE OR IS UNDERGOING LABORATORY TESTING.
But also see Topics 214, 222, 224, 231, 241, 410.
540 SPECIFIC PERFORMANCE CAPABILITIES OR VULNERABILI-TIES OF SYSTEMS, SUBSYSTEMS, MATERIALS, EQUIPMENT, GA PROCEasc5 IN RDT&E FOR NEW OR IMPROVED SAFEGUARDS.
541 Information revealing a vulnerability that CNSI -
would significantly assist the bypass or Declassify the defeat of the integrated safeguards on:
0ADR system actually installed (or planned to be installed) at a specific facility or in the tre.
-tation system.
542 Infonastion about a characteristic or feature CNSI -
that meets all of the following criteria:
Declassify (1) it would significantly delay the bypass on:
0AOR or the defeat of an operational application and (2) its presence ir an operational con-figuration and application would not be reasonably expected or predicted, 550 HARDWARE IS CLASSIFIED ACCORDING TO THE INFORMATION IT REVEALS.
19
-1
.J.---K
.A
-h--
Asl A"A-AM-L d " A m bmA A4-~AdWm 4M'we=*^SOMMth
_d* b e'
- d "AAM L-J e JWb--HBS S-nnekW42K W AR-S52AN16ma u ~ O ka e-s-*&--4W4*G 4
4h=U*ve L
3 sfC 1
w I
I 3
Y b
b i
h t
i 9
l 1
i l
l l
l l
I t
i 1
THIS DOCUMENT WAS PRINTED USING RECYCLED PAPER
NUREC/BR-4969, Rev.2 NOC CLASS!FICATION CUIDE FOR NATIONAL SECUOrn'INFORMATION CONCERNING DECEMBER IW1 NUCLEAR MATERIALS AND FAC113 TIES i
i i
E
}
b
+
l
[
3 U
T n
- w 4
i y
i' O
~
r
(,
1 t
o
- E f
c4
- )
W
)
L D C' s !a u
.1 a
Q C 4* O g an; 2.
C cO4 B s g e-* T O g:v CJ 2 c er'16 * '7 g,7 444+
Q
} & ('b Y--
c Oe O i 'I w) CMC 3
~
i C
~.. _ ~
_.