security in gauging activity

12
11/12/2008 1 SECURITY IN GAUGING ACTIVITY Name : FAEIZAL ALI Section/Division: SEKSYEN PERUNDANGAN ATOMIC ENERGY LICENSING BOARD (AELB) MINISTRY OF SCIENCE TECHNOLOGY AND INNOVATION Background Before 11 September 2001, the security of radioactive sources was largely addressed by measures protecting the sources from Security Awareness Expert Group http://www.aelb.gov.my http://ansn.aelb.gov.my unintentional access by inappropriately qualified personnel or attempts at theft for financial gain 2 REGULATORY CONTROL HIERARCHY Act Regulation Security Awareness Expert Group http://www.aelb.gov.my http://ansn.aelb.gov.my Order Code of Practice Material Advisor LEGISLATIVE FRAMEWORK i. Main Legislation Atomic Energy Licensing Act 1984 (Act 304) ii. Regulations Radiation Protection (Licensing) Regulations 1986 Security Awareness Expert Group http://www.aelb.gov.my http://ansn.aelb.gov.my Radiation Protection (Basic Safety Standard) Regulations 1988 Regulation No. 52 – Emphasize on the licensees responsibility on the protection of sources from theft and sabotage Radiation Protection (Transportation) Regulations 1989 Radiation Protection (Appeal) Regulations 1990

Upload: tg-tarro

Post on 04-Sep-2015

21 views

Category:

Documents


0 download

DESCRIPTION

Gauging, Radioactive,

TRANSCRIPT

  • 11/12/2008

    1

    SECURITY IN GAUGING ACTIVITY

    Name:FAEIZALALISection/Division:SEKSYENPERUNDANGANATOMICENERGYLICENSINGBOARD(AELB)MINISTRYOFSCIENCETECHNOLOGYANDINNOVATION

    Background

    Before 11 September 2001, the security of radioactive sources was largely addressed by measures protecting the sources from

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    y p gunintentional access by inappropriately qualified personnel or attempts at theft for financial gain

    2

    REGULATORY CONTROL HIERARCHY

    ActRegulation

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    OrderCode of PracticeMaterial Advisor

    LEGISLATIVE FRAMEWORK

    i. Main Legislation

    Atomic Energy Licensing Act 1984 (Act 304)

    ii. RegulationsRadiation Protection (Licensing) Regulations 1986

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    ( g) gRadiation Protection (Basic Safety Standard) Regulations 1988

    Regulation No. 52 Emphasize on the licensees responsibility on the protection of sources from theft and sabotage

    Radiation Protection (Transportation) Regulations 1989Radiation Protection (Appeal) Regulations 1990

  • 11/12/2008

    2

    Laws are in place.

    Regulatory Authority exists.

    RADIATION PROTECTION & SECURITY INFRASTRUCTURE

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Rules, regulations and standards have been established.

    Arrangements for radiation safety training, radiation protection services and radwaste management services are in place.

    - Adoption of the Code of Conduct on Security of Radioactive Sources and the 3 Supporting documents

    1st announcement to licensees on 10 December 2008 2nd Announcement on the adoption of these d t t P R ibl f th Li

    RADIATION PROTECTION & SECURITY INFRASTRUCTURE

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    documents to Person Responsible for the License (PRFL) & Radiation Protection Officer (RPO) on 30 June 2009.

    - Source registry database systems

    RADIATION PROTECTION & SECURITY INFRASTRUCTURE

    Establishment of emergency planningand preparedness: cooperation with National Disaster Center

    Lead Agency for Radiological EmergencyLaunch inter-agency National Drill

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Technical Support Organization:Nuclear Malaysia Agency

    Cooperation with relevant government agencies have been established:

    Ministry of Health, Royal Customs Malaysia, Royal Malaysian Police etc.

    ADOPTIONCodeofConductonTheSafetyandSecurityofRadioactiveSources

    ApprovedbytheIAEABoardofGovernorson19S t b 2003

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    8

    September2003

    ApprovedbytheAELBBoardofMeetingonAugust2007

  • 11/12/2008

    3

    3elementarydocumenttosupporttheimplementationCoC;

    1. CategorizationofRadioactiveSources2. SecurityofRadioactiveSources

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    9

    3. GuidelinesonImportandExportofRadioactivesSources

    CATEGORIZATIONOFRADIOACTIVESRSG1.9

    Provideasimple,logicalsystemforrankingradioactivesourcesbasedontheirpotentialtocauseh h h l h

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    10

    harmtohumanhealthGroupingthepracticesinwhichthesesourcesareusedintodiscretecategories.

    SECURITYOFRADIOACTIVESOURCES

    Tecdoc1355

    Intendedtoprovideguidancetoregulatorybody,manufacturers,suppliersandusersofsourcesindecidingwhichsecuritymeasuresareneededtoensureconsistencywiththeInternationalBasicSafetyStandardsandtheRevisedCodeofConduct for the Safety and Security of

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    11

    ConductfortheSafetyandSecurityofRadioactiveSources.

    Itisrecognizedthattheremustbeabalancebetweenmanagingsourcessafelyandsecurely,whilestillenablingthemtobeusedbyauthorizedpersonnelwithoutunduehindrance

    GUIDANCEONTHEIMPORTANDEXPORTOFRADIOACTIVESOURCES

    ThisGuidanceprovidesacommonframework,tootherradioactivesourcesinadditiontoCategory1and2sources.

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    12

    AggregationofsourcesthatmayposearisksimilartoCategory1or2sourceswillbeconsideredunderthecontextofthisGuidance

  • 11/12/2008

    4

    OBJECTIVE

    To ensure security of sources requires that measures be applied to prevent unauthorized access to radioactive sources at all stages of their life cycle, as well as loss, theft, and unauthorized transfer of sources

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    ,To ensure the safety of radioactive sources requires controlling exposure to radiation from sources, both directly and as a consequence of incidents, so that the likelihood of harm attributable to such exposure is very lowSecurity is therefore a prerequisite for safety

    13

    Definitions

    Design basis threat for sources means the attributes and characteristics of potential insider and/or external adversaries, who might attempt damage to, or unauthorized removal of, radioactive sources , against which a physical protection system is designed and evaluated

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    and evaluated

    Security means measures to prevent unauthorized access or damage to, and loss, theft or unauthorized transfer of, radioactive sources

    Security culture means characteristics and attitudes in organizations and of individuals, which establish that security issues receive the attention warranted by their significance

    14

    DefinitionsSafety means measures intended to minimize the likelihood of accidents with radioactive sources and, should such an accident occur, to mitigate its consequences

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Safety culture means the assembly of characteristics and attitudes in organizations and individuals which establishes that, as an overriding priority, protection and safety issues receive the attention warranted by their significance

    Accounting means physically checking that all sources are present in their expected location. This may be satisfied by an appropriate radiation survey.

    15

    Definitions

    Inventorying means a campaign to physically check all sources possessed, by specifically and uniquely identifying each individual source using

    i t h i l b

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    appropriate means such as serial numbers.

    Principal parties means the person having the main responsibilities for the application of the basic safety standards. These are registration of licensees.

    16

  • 11/12/2008

    5

    Overall strategy

    Prevention of acquisition of radioactive sources by those with malevolent intent. This includes measures to:

    Deter (prevent) unauthorized access to the source or source

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Deter (prevent) unauthorized access to the source, or source location, in order to deter theft;detect any such attempts at unauthorized access;delay unauthorized access or theft;provide rapid response to attempts at unauthorized access or theft.

    17

    Threat assessment

    The use of a design basis threat assessment methodology is recommended as the best method to design the security measures for specific sources.

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    A detailed design basis threat assessment methodology to define the appropriate level of security consists of the following activities

    Characterize the source, its type, nature and applicationPerform an assessment of the potential threat within the country as a whole, based on information from security and intelligence experts.

    18

    Threat assessment

    Evaluate the potential consequences of successful actions to acquire the sourceDetermine, based on the assessment of threat and potential consequences a design basis threat against

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    potential consequences, a design basis threat against which the security should be designed and evaluated.Perform a vulnerability analysis for the specific source, or sources against this design basis threat

    19

    Performance objectives for security groups

    four security groups are defined based on these fundamental protection capabilities. They provide a systematic way of categorizing the graded performance objectives required to cover the range of security

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    j q g ymeasures that might be needed, depending on the assessed risk

    Security Group A:

    Security Group B:Security Group C:Security Group D:

    20

  • 11/12/2008

    6

    Security Group A

    Measures should be established to deter unauthorized access, and to detect unauthorized access and acquisition of the

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    qsource in a timely manner. These measures should be such as to delay acquisition until response is possible

    21

    Security Group B:

    Measures should be established to deter unauthorized access, and to detect unauthorized access and acquisition of the

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    qsource in a timely manner.

    22

    Security Group C:

    Measures should be established to deter unauthorized access

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    verify the presence of the source at set intervals

    23

    Security Group D

    Measures should be established to ensure safe use of the source and adequately protect it as an asset, verifying its

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    p , y gpresence at set intervals.

    24

  • 11/12/2008

    7

    Security Group (Gauging)Security Group A Security

    Group BSecurity Group C

    Security Group D

    Safe management and protect as an asset

    Deter (prevent) unauthorized access

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    (p )

    Timely detection of unauthorized access

    Timely detection of unauthorized acquisition of the radioactive source

    Verification of source presence at setintervalsDelay acquisition

    until response is possible

    25

    Assignment of radioactive sources to security groups

    most effectively achieved by using the outcomes of the threat assessment

    the IAEA has developed a revised Categorization of Radioactive

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Sources (IAEA-TECDOC-1344)

    sources in Categories 1 to 3 generally have the possibility of giving rise to exposure sufficient to cause severe deterministic effects if they are uncontrolled

    26

    Security groups based upon source categorization

    SecurityGroup

    SourceCategory

    Examples of practices

    A 1 Radioisotope RTGs)IrradiatorsTeletherapy Fixed multi- knife)

    2 Industrial radiography

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    B 2Industrial radiographyHigh/medium dose rate brachytherapy

    3 Fixed industrial gauges (e.g. level, dredger, conveyor)Well logging gauges

    C 4Low dose rate brachytherapy (except those below)Thickness/fill-level gaugesPortable gauges (e.g. moisture/density)Bone densitometerStatic eliminators

    D 5 Low dose rate brachytherapy eyeplaques and permanent implant sourcesX ray fluorescence devicesElectron capture devices

    27

    Source Category 1 & 2

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

  • 11/12/2008

    8

    Source Category 3,4 & 5

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    TYPES OF SPECIFIC SECURITY MEASURES

    Administrative measuresaccess control procedures;alarmed access points (e.g. with radiation detectors);key control procedures;

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    key control procedures;video cameras or personal surveillance;records related to management of sources;inventories; regulations and guidance;reliability and trustworthiness of personnel;information security;establishment of a safety culture and a security culture.

    30

    TYPES OF SPECIFIC SECURITY MEASURES

    Technical measuresfences;walls;

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    cages;transport packaging;locks and interlocks for doors;locked, shielded containersintrusion-resistant source-holding devices.

    31

    Licensee ResponsibilityLicensees bear the responsibility for setting up and implementing the technical and organizational measures that are needed for ensuring both the safety and security of the sources for which they are authorized.

    Licensees should ensure that:Sources are managed in accordance with the authorization.

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Sources are managed in accordance with the authorization.When sources are not in use, they are promptly stored in an approved manner. Storage should be in accordance with the requirements for the group to which the source belongs.Any transfer of sources to another person is documented and that person is authorized in accordance with the applicable regulatory requirements to receive the transferred source.Financial provisions in accordance with the regulatory requirements for the safe management of disused sources are in place.Sources are shipped and received in accordance with regulatory requirements.

  • 11/12/2008

    9

    Licensee Responsibility

    Individuals (radiation worker) with assigned responsibility for sources

    Reliable

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    ReliableAuthorizedProper training

    Inventories and RecordsAll sources should be inventoried at least on an annual basis and should be maintained and updated as follows:

    The routine inventoryWhenever the recorded parameters change and particularlyWhenever sources are transferred

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    The records should include the following particulars:Location of the sourceRadionuclideRadioactivity on a specified dateSerial number or unique identifierPhysical formSource use historyReceipt, transfer or disposal of the source

    Status and Event Reporting System

    Unusual events to be reported to the Regulatory Authority could include:

    Loss of control over a radioactive source

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Unauthorized access to, or unauthorized use of a sourceMalicious acts threatening authorized activitiesDiscovery of any unaccounted source.

    Specific Security Measures

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Measures

    36

  • 11/12/2008

    10

    Specific Security Measures

    Groups A and B, a basis is needed for the design of the appropriate delay and detection devices.

    For security groups C and D there is less need for a

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    For security groups C and D, there is less need for a design basis threat approach and application of existing standards is an appropriate approach

    A summary of recommended measures described below is given as follows:

    Group A Group B Group C Group DGeneral administrative measures

    Daily accounting Weakly accounting Semi-annual accounting

    annual accounting

    Access control to sources location allowing timely detection of unauthorized access

    Access control to sources location

    No specific provision

    Deterrence (prevent) provided by:

    A. 2 tech measures B. 2 measures (1 tech measure)

    C. 1 tech measures

    S ifi l G i

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Routine measures to ensure safe used and protect as and asset

    Specific emergency response plan Generic emergency response plan

    Background checks

    Security plan

    Information security

    Upgrade security for increase threat

    Timely detection provided by:

    A: Remotely monitored intruder alarm

    B: Local alarm

    Timely response to an alarm

    Security Group A and B

    Emergency response planSpecific emergency response procedures should be developed.

    Background check

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    ac g ou d c ecLicensees should ensure that persons engaged in the management of group A and B sources are trustworthy

    Information securityInformation or documents that can be used to identify specific locations, specific security measures or weaknesses in principal partys system of management of sources should be controlled and distributed.

    Security Group A and B

    Response to an increased threatThe planning for response to an increased threat of malevolent use should take place in close cooperation with the Regulatory Authority

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    Security plansThe security plan should describe how the security provisions in this document are met for the source(s) under consideration

    40

  • 11/12/2008

    11

    Security Group ASources in storage

    a locked and fixed container or a device holding the source;a locked storage room, separating the container from unauthorized personnel;access control to the storage room;detection of unauthorized access or removal of the source;

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    ability to respond in a timely manner to such detection.stored in a shielded container, which is locked;kept in an enclosed, secured vehicle;the vehicle parked inside a locked compound or locked garage;the vehicle subject to continuous detection of unauthorized intrusion attempts and thereshould be the capability to respond to intrusion.

    Hh 41

    Security Group A

    Sources in transportbackground checks on trustworthiness of the transport organization and operatives;deterrence through use of transport packages locked and sealed

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    deterrence through use of transport packages locked and sealed and in a dedicatedtransport unit, which is locked;timely detection through radio communication between the personnel in the vehicle anda security office or organization;response through security trained transport operatives;emergency plan developed to deal with emergencies in transit

    42

    Security Group B

    Sources in storagea locked and fixed container or a device holding the source;a locked room to separate the container from unauthorized access;

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    access;access control to the room;ability to detect unauthorized access to, or removal of the source.

    43

    Security Group B

    Sources in transportTransport of Security Group B sources should satisfy the performance requirements for

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    y p qsecurity for this group. comply with national and international legislation and agreements on security in transport

    44

  • 11/12/2008

    12

    Security Group CSources in transport

    Transport of Security Group B sources should satisfy the performance requirements for security for this groupcomply with national and international legislation and

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    agreements on security in transport

    Sources in storagesources could be stored in a locked, fixed container and in a room with control on access.

    45

    Security Group D

    ensure safe use of the source and adequately protect it as an asset, verifying its presence at set intervals.

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    comply with national and international legislation and agreements on security in transport

    46

    TEMPORARY STORAGE

    emergency or the discovery of an orphan source

    sources should be removed from a temporary

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    p ystorage to a designated facility as soon as practicable, with the objective that no source is stored temporarily for greater than 30 days

    47

    Thank you

    Security Awareness Expert Grouphttp://www.aelb.gov.myhttp://ansn.aelb.gov.my

    48