National Academies Press: OpenBook

Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report (2006)

Chapter: 2.2.4 Terrorist Theft of Spent Fuel for Use in a Radiological Dispersal Device (RDD)

« Previous: 2.2.2 Ground Attacks
Suggested Citation:"2.2.4 Terrorist Theft of Spent Fuel for Use in a Radiological Dispersal Device (RDD)." National Research Council. 2006. Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report. Washington, DC: The National Academies Press. doi: 10.17226/11263.
×

Since the September 11, 2001, attacks, the Nuclear Regulatory Commission has issued directives to power plant operators to enhance protection against vehicle bombs. The Commission also has issued directives to power plant operators to enhance protection against insider threats.

The committee does not have enough information to judge whether the measures at power plants are in fact sufficient to defend against either a DBT or a beyond-DBT attack on spent fuel storage. The Nuclear Regulatory Commission declined to provide detailed briefings to the committee on surveillance, security procedures, and security training at commercial nuclear power plants. Consequently, the committee was unable to evaluate their effectiveness, A recent General Accounting Office report (GAO, 2003) was critical of some of these procedures, but the committee has no basis for judging whether these criticisms were justified. Nevertheless, the committee judges that surveillance and security procedures at commercial nuclear power plants are just as important as physical barriers in preventing successful terrorist attacks and mitigating their consequences.

2.2.3 Attacks Having Both Air and Ground Components

Hybrid attacks that combine aspects of both air and ground attacks also could be mounted by terrorists. These could deliver attacking forces directly to a spent fuel storage facility, bypassing the security perimeters and security personnel deployed to protect against a ground attack. The committee considered various scenarios for such attacks. The committee judges that some scenarios are feasible. Details are provided in the classified report.

2.2.4 Terrorist Theft of Spent Fuel for Use in a Radiological Dispersal Device (RDD)

An RDD, or so-called dirty bomb, is a device that disperses radioactive material using chemical explosives or other means (NRC. 2002) RDDs do not involve flssion-induced explosions of the kind associated with nuclear weapons. While RDD attacks can be carried out with any source of radioactivity, this discussion is confined to scenarios that involve the theft of spent fuel for such use.11 A crude RDD device could be fabricated simply by loading stolen spent fuel onto a truck carrying high explosives. The truck could be driven to another location and detonated. The dispersal of radioactivity from such an attack would be unlikely to cause many immediate deaths, but there could be fatalities from the chemical explosion as well as considerable cleanup costs and adverse psychological effects.

It would be difficult for terrorists to steal a large quantity of spent fuel (e.g., a single spent fuel assembly) for use in an RDD for three reasons. First, spent fuel is highly radioactive and therefore requires heavy shielding to handle. Second, the use of heavy equipment would be required to remove spent fuel assemblies from a pool or dry cask. Third, controls are in place at plants to deter and detect such thefts. Additional details on these controls are provided in the classified report.

Theft and removal of an assembly or individual fuel rods during an assault on the plant might be easier, because the guard force would likely be preoccupied defending the plant. However, the amount of material that could be removed would be small, and getting it

11  

An attack on a spent fuel facility that resulted in the direct release of radioactivity would be an act of radiological sabotage of the kind considered previously in this chapter.

Suggested Citation:"2.2.4 Terrorist Theft of Spent Fuel for Use in a Radiological Dispersal Device (RDD)." National Research Council. 2006. Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report. Washington, DC: The National Academies Press. doi: 10.17226/11263.
×
Page 33
Next: 2.3 RISKS OF TERRORIST ATTACKS ON SPENT FUEL STORAGE FACILITIES »
Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report Get This Book
×
 Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report
Buy Paperback | $41.00
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In response to a request from Congress, the Nuclear Regulatory Commission and the Department of Homeland Security sponsored a National Academies study to assess the safety and security risks of spent nuclear fuel stored in cooling pools and dry casks at commercial nuclear power plants. The information provided in this book examines the risks of terrorist attacks using these materials for a radiological dispersal device. Safety and Security of Commercial Spent Nuclear Fuel is an unclassified public summary of a more detailed classified book. The book finds that successful terrorist attacks on spent fuel pools, though difficult, are possible. A propagating fire in a pool could release large amounts of radioactive material, but rearranging spent fuel in the pool during storage and providing emergency water spray systems would reduce the likelihood of a propagating fire even under severe damage conditions. The book suggests that additional studies are needed to better understand these risks. Although dry casks have advantages over cooling pools, pools are necessary at all operating nuclear power plants to store at least the recently discharged fuel. The book explains it would be difficult for terrorists to steal enough spent fuel to construct a significant radiological dispersal device.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!