National Academies Press: OpenBook
« Previous: 2.2.1 Air Attacks
Suggested Citation:"2.2.2 Ground Attacks." National Research Council. 2006. Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report. Washington, DC: The National Academies Press. doi: 10.17226/11263.
×

aircraft carrying large fuel loads could produce fires that would greatly complicate rescue and recovery efforts.

Previous studies on aircraft crash impacts (Droste et at., 2002; Lange et al., 2002; HSK, 2003; RBR Consultants, 2003; Thomauske, 2003) suggest that the consequences of a heavy aircraft crash on a nuclear installation depend on factors such as the following:

  • Type and design of the aircraft.

  • Speed of the aircraft.

  • Fuel loading of the aircraft and total weight at impact.

  • Angle-of-attack and point-of-impact on the facility.

  • Construction of the facility.

  • Location of the target with respect to ground level (i.e., below or above grade).10

  • The presence of surrounding buildings and other obstacles (e.g., hills, transmission lines) that might block certain potential flight paths into the facility.

In other words, the consequences of such attacks are scenario- and plant-design specific. It is not possible to make any general statements about spent fuel storage facility vulnerabilities to air attacks that would apply to all U.S. commercial nuclear power plants

U.S. commercial nuclear power plants are not required by the Nuclear Regulatory Commission to defend against air attacks. The Commission believes that it is the responsibility of the U.S. government to implement security measures to prevent such attacks. The commercial nuclear industry shares this view. The Nuclear Regulatory Commission staff informed the committee that the Commission has directed power plant operators to take steps to reduce the likelihood of serious consequences should such attacks occur. The staff also informed the committee that the Commission may issue additional directives once the vulnerability analyses it is sponsoring at Sandia National Laboratories are completed. These analyses are described in the committee’s classified report (see also Chapters 3 and 4 in this report).

2.2.2 Ground Attacks

Ground attacks on a nuclear facility could take three forms: (1) a direct assault on the facility by armed groups, (2) a stand-off attack using appropriate weapons, or (3) an assault having both air and ground components. The direct assault would likely be carried out by a group of well-armed and trained attackers, perhaps working with the assistance of an insider. The objective of such an attack would likely be to gain entry to protected and vital areas of the plant (FIGURE 2.1) to carry out radiological sabotage. The attackers would need to have knowledge of the design, location, and operation of the spent fuel facility to carry out such an attack successfully.

Commercial nuclear power plants are required by the Nuclear Regulatory Commission to maintain a professional guard force at each plant to defend against a Commission-developed design basis threat (DBT), which includes a ground assault. The protective force is a critical part of a nuclear power plant’s security system for deterring,

10  

All current dry cask storage facilities in the United States are constructed at ground level, whereas spent fuel pools can be located above or below grade, depending on plant design (see Chapter 3).

Suggested Citation:"2.2.2 Ground Attacks." National Research Council. 2006. Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report. Washington, DC: The National Academies Press. doi: 10.17226/11263.
×

FIGURE 2.1 Commercial nuclear power plant sites are demarcated as shown for security purposes. The part of the power plant site over which the plant operator exercises control is referred to as the owner-controlled area. This usually corresponds to the boundary of the site. Located within this area are one or more protected areas to which access is restricted using guards, fences, and other barriers. Dry cask storage facilities, formally referred to as independent Spent Fuel Storage Installations (ISFSIs), are located within these areas. The vital area of the plant contains the reactor core, support buildings, and the spent fuel pool. It is the most carefully controlled and guarded part of the plant site. SOURCE: Modified from Nuclear Regulatory Commission briefing materials (2004).

detecting, thwarting, or impeding attacks. The Commission staff declined to provide a formal briefing to the committee on the DBT for radiological sabotage, asserting that the committee did not have a need to know this information. Nevertheless, the committee was able to discern the details of the DBT from a series of presentations made by Nuclear Regulatory Commission staff. Commission staff also provided a fact check of this information as the classified report was being finalized.

Power plant operators are required to demonstrate to the Commission’s satisfaction that there is “high assurance” that their guard forces can thwart the Commission-defined DBT assault. This guard force also must be able to provide deterrence against a beyond-DBT attack depending on the adversarial force. Reinforcing forces would be provided by local and state law enforcement as well as federal forces. The Commission staff also informed the committee that since the September 11, 2001, attacks, the Commission has been working with DHS to improve coordination procedures with federal, state, and local agencies to improve their response capabilities in the event of an attack. DHS also is making grants to local law enforcement agencies around power plant sites to raise their capabilities to respond to requests for assistance.

Suggested Citation:"2.2.2 Ground Attacks." National Research Council. 2006. Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report. Washington, DC: The National Academies Press. doi: 10.17226/11263.
×
Page 31
Suggested Citation:"2.2.2 Ground Attacks." National Research Council. 2006. Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report. Washington, DC: The National Academies Press. doi: 10.17226/11263.
×
Page 32
Next: 2.2.4 Terrorist Theft of Spent Fuel for Use in a Radiological Dispersal Device (RDD) »
Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report Get This Book
×
 Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report
Buy Paperback | $41.00
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In response to a request from Congress, the Nuclear Regulatory Commission and the Department of Homeland Security sponsored a National Academies study to assess the safety and security risks of spent nuclear fuel stored in cooling pools and dry casks at commercial nuclear power plants. The information provided in this book examines the risks of terrorist attacks using these materials for a radiological dispersal device. Safety and Security of Commercial Spent Nuclear Fuel is an unclassified public summary of a more detailed classified book. The book finds that successful terrorist attacks on spent fuel pools, though difficult, are possible. A propagating fire in a pool could release large amounts of radioactive material, but rearranging spent fuel in the pool during storage and providing emergency water spray systems would reduce the likelihood of a propagating fire even under severe damage conditions. The book suggests that additional studies are needed to better understand these risks. Although dry casks have advantages over cooling pools, pools are necessary at all operating nuclear power plants to store at least the recently discharged fuel. The book explains it would be difficult for terrorists to steal enough spent fuel to construct a significant radiological dispersal device.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!