Skip to main content

Currently Skimming:

Executive Summary
Pages 1-4

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 1...
... That standard held that plutonium in its final dispositioned forms should be roughly as difficult to acquire, process, and utilize In nuclear weapons as is the plutonium in typical spent fuel from civilian power reactors. The 1994 and 1995 reports concluded Mat He two disposition methods most likely to be able to meet the spent-fuel standard In the near future are (a)
From page 2...
... The Panel was not asked to address: the proliferation and theft resistance of the steps that lead, under these disposition options, to the final plutonium forms; any questions related to geologic disposal or interim storage of these final forms except insofar as the properties of the final forms under such disposal or storage relate to assessing compliance with the
From page 3...
... Such protections are appropriate and necessary, both for ordinary spent fuel and for plutonium disposition forms meeting the spent-fuel standard, but they are not substitutes for the built-in barriers to which the spent-fuel standard relates. Meeting the spent-fuel standard should be regarded as a necessary but not sufficient condition for judging a disposition method satisfactory, and satisfactory disposition should be understood to be only one element of the needed comprehensive approach to managing the hazards of excess nuclear weapons and weapons-usable materials.
From page 4...
... We have concluded that the LWR-MOX option is compliant with the spent-fuel standard; that the standard CANDU-MOX option is not compliant; that the compliance of the CANFLEX CANDU-MOX option is marginal; and that compliance of the reference can-in-canister option with the spent-fuel standard is contingent on the outcome of efforts to clarify this option's resistance against on-site attack and to improve its signatures aiding detection of separation activities. We have concluded, further, that resolution of the vulnerability of the current can-in-canister configuration to on-site attack will require additional investigation.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.