Documents

(U//LES) DHS Nuclear Spent Fuel Storage Vulnerabilities and Terrorist Indicators Reports

Spent fuel, after it is removed from the reactor core, is safely stored in specially designed pools at individual reactor sites around the country. The spent fuel is first placed into a spent fuel pool (Figure 1), which is like a deep swimming pool with racks to hold the fuel assemblies. It allows the fuel to begin cooling. The spent fuel is moved into the water pools from the reactor along the bottom of water canals, so that the spent fuel is always shielded to protect workers. Fuel assemblies are covered by a minimum of 25 feet of water within the pool, which provides adequate shielding from the radiation for anyone near the pool. Spent fuel pools are very robust structures that are constructed to withstand earthquakes and other natural phenomena and accidents. They are typically rectangular structures 20 to 40 feet wide, 30 to 60 feet long, and at least 40 feet deep. The outside walls are typically constructed of more than 3 feet of reinforced concrete. Spent fuel pools at pressurized water reactors (PWRs) are commonly located within an auxiliary building near the containment. Many of the PWR pools are located in the building’s interior. At boiling water reactors (BWRs), spent fuel pools are typically located at an elevated position within the reactor building, outside the primary containment area.

White House Strategy for Trusted Identities in Cyberspace

A secure cyberspace is critical to our prosperity. We use the Internet and other online environments to increase our productivity, as a platform for innovation, and as a venue in which to create new businesses. “Our digital infrastructure, therefore, is a strategic national asset, and protecting it—while safeguarding privacy and civil liberties—is a national security priority” and an economic necessity. By addressing threats in this environment, we will help individuals protect themselves in cyberspace and enable both the private sector and government to offer more services online. As a Nation, we are addressing many of the technical and policy shortcomings that have led to insecurity in cyberspace Among these shortcomings is the online authentication of people and devices: the President’s Cyberspace Policy Review established trusted identities as a cornerstone of improved cybersecurity.

NCIS Interviewing and Interrogating Militant Islamists Guide

Law enforcement personnel at all levels serve on the front line of America’s Global War on Terrorism (GWOT). In the interest of national security and public safety, law enforcement investigators frequently must question persons, either for purposes of intelligence gathering, for collecting evidence that may lead to prosecution and take immediate action that may be in the interest of the public safety/force protection. The objective of these interviews/interrogations is to gather accurate and reliable information that furthers security, safety, intelligence, and law enforcement interests. The current threat environment, however, poses some new challenges for professionals conducting terrorism investigations.

(U//LES) DHS Nuclear Fuel Cycle Characteristics and Common Vulnerabilities Report

Nuclear power plants in the U.S. use fuel rods that have been enriched in the uranium-235 (235U) fissile isotope. At the time of their insertion to the reactor, typical commercial power plant fuel rods contain approximately 2% to 5% 235U; the exact value depends on the details of the reactor design. This fuel remains in the reactor for up to three years or more, at which time fission product buildup necessitates its removal even though it still contains significant quantities of 235U.

(U//LES) DHS Nuclear Power Plants Characteristics and Common Vulnerabilities Reports

A nuclear power plant is an arrangement of components used to generate electric power. Nuclear power plants used in the United States (U.S.) are either boiling water reactors (BWRs) or pressurized water reactors (PWRs). Boiling water reactors (Figure 1) use a direct cycle in which water boils in the reactor core to produce steam, which drives a steam turbine. This turbine spins a generator to produce electric power. Pressurized water reactors (Figure 2) use an indirect cycle in which water is heated under high pressure in the reactor core and passes through a secondary heat exchanger to convert water in another loop to steam, which in turn drives the turbine. In the PWR design, radioactive water/steam never contacts the turbine. Except for the reactor itself, there is very little difference between a nuclear power plant and a coal- or oil-fired power plant.

(U//FOUO) JIEDDO Report: Water-borne IED Threats and the Strait of Hormuz

The Strait of Hormuz is the narrow waterway that allows maritime access into and out of the Persian Gulf from the Gulf of Oman and Arabian Sea. The U.S. Department of Energy (DOE) has identified the Strait of Hormuz as one of six critical chokepoints in the global distribution and trade of oil. The concentration of valuable maritime traffic passing through such a relatively small area makes the Strait of Hormuz a strategic area for the targeting of maritime objectives by groups or nations looking to threaten or disrupt global trade. Iran, located on the north bank of the strait, has made repeated threats to strangle maritime traffic passing through the strait in retaliation for any strike against its nuclear program. In addition, al-Qaeda has reportedly been planning strikes at critical maritime chokepoints over the past decade, including the Strait of Hormuz. Al-Qaeda continues to plan maritime attacks, copying successful tactics from other militant groups such as the LTTE. The Strait of Hormuz would be an ideal target for al-Qaeda’s maritime campaign, either through the use of WBIEDs or conventional maritime weapons.

(U//FOUO) DHS “Red Cell” Report: How Terrorists Might Use a Dirty Bomb

An independent, unclassified analytic Red Cell session, sponsored jointly by the U.S. Departments of Energy and Homeland Security, found a Radiological Dispersal Device (RDD) attack on the U.S. homeland to be highly appealing from a terrorist standpoint. The Red Cell group, which simulated two different terrorist cells, believed an RDD attack would be relatively easy to prepare and mount and could have wide-ranging physical, psychological, political, and economic impacts. The group believed radioactive materials would be easy to procure, especially from abroad, and found a variety of potential targets across the country. Participants expected that public distrust of official guidance would heighten fear and panic.

(U//FOUO) DHS “Red Cell” Report: How Terrorists Might Exploit a Hurricane

A key component of the IAIP/Competitive Analysis and Evaluation Office’s mission is convening a diverse range of governmental and nongovernmental experts who adopt a terrorist mindset to challenge traditional or existing assumptions about how terrorists might attack some aspect of our critical infrastructure. The ideas generated by these “red cells” contribute insights on potential terrorist threats to the homeland for state and local governments, law enforcement, and industry.

Taash Communications Network: Iranian Green Movement Support Plan

Among the lessons learned from the revolutions in Egypt and Tunisia is the value and affect of unencumbered access to information and communications technology (ISCT), including but not limited to independent information and social networking across multiple platforms, such as mobile, internet, web-based, and satellite broadcast. The current ICT available in and outside Iran remain largely silod platforms (i.e. lacking technology that facilitates convergence of information and interactivity). In general, the younger generation that support reform and actively oppose the regime from within have not been able to effectively access newer technologies or have been dissuaded from participating in communications programs operated by less legitimate traditional opposition parties from outside. Most these platforms are either state sponsored, like VOA and BBC, or are exile opposition websites and channels out of Los Angeles with a political agenda and low tolerance for alternative viewpoints. Most have failed to stay up to date with the language, trends, mentality, culture, and sociopolitical situation of the today Iran. The partisan nature of the older generation opposition groups further limit their ability to reach the younger demographic.

DHS Participation in Film and Television Productions Management Directive

It is Department of Homeland Security policy to use the broad authority granted in the Homeland Security Act of 2002, to further the Department’s missions, particularly with respect to disseminating the Department’s homeland security message. This directive sets Departmental policy for interaction between the Department and non-government, entertainment-oriented motion picture, television, advertising, video and multimedia productions/enterprises.

U.S. Department of Energy Highly Enriched Uranium Production Historical Report

In February 1996, the Department of Energy (DOE) commissioned a comprehensive effort to document and declassify the United States inventory and other information needed to present a complete picture of the production, acquisition, and utilization of highly enriched uranium (HEU). Highly Enriched Uranium: Striking A Balance presents the results of that study. The effort was commissioned to facilitate discussions of HEU storage, safety, and security with stakeholders, to encourage other nations to declassify and release similar data, and to support the national policy on transparency of nuclear materials. This information will also be available for formulating policies involving the identification and disposition of surplus nuclear materials.

U.S. Army Yemen Smart Book

The Smart Book contains information designed to enhance the Soldier’s knowledge of Yemen, including history, politics, country data and statistics, and the military operational environment. The Smart Book concludes with an overview of the culture of Yemen including religion, identity, behavior, communication and negotiation techniques, an overview of ethnic groups, a regional breakdown outlining each province, a language guide, and cultural proverbs.

ISAF Afghan Insurgent Reintegration Guide and Soldier Information Cards

The Afghanistan Peace and Reintegration Programme (APRP) is active. It provides for both reintegration (where fighters leave the fight and peacefully rejoin their communities) and reconciliation (where entire insurgent groups reach a settlement with GIRoA that ends hostilities). Reintegration is the focus of this guide. Information is presented on the APRP, its place in the COIN Campaign and ISAF‟s role. It provides those in ISAF with what they need to work with community leaders and GIRoA and ANSF partners to build their understanding of the Programme and its opportunities. It is an Afghan Programme and ISAF‟s role is to assist and encourage GIRoA to implement it fully.

Potassium Iodide Use in Radiation Emergencies Guidance

The objective of this document is to provide guidance to other Federal agencies, including the Environmental Protection Agency (EPA) and the Nuclear Regulatory Commission (NRC), and to state and local governments regarding the safe and effective use of potassium iodide (KI) as an adjunct to other public health protective measures in the event that radioactive iodine is released into the environment. The adoption and implementation of these recommendations are at the discretion of the state and local governments responsible for developing regional emergency response plans related to radiation emergencies.

Sandia National Laboratories Nuclear Reactor Containment Integrity Research Overview

Research into the integrity of containment structures or vessels for nuclear power plants has been conducted around the world in those countries where nuclear energy is produced and provides, or is expected to provide, a significant portion of the domestic energy supply. While the contributions of each of these efforts to the understanding of the role of containment in ensuring the safe operation on nuclear power plants is important, the most comprehensive experimental effort has been conducted at Sandia National Laboratories, primarily under the sponsorship of the US Nuclear Regulatory Commission (NRC). This report describes the background and context for the more than 25 years of NRC-sponsored Containment Integrity Research at Sandia National Laboratories and summarizes the major results of the experimental efforts and the observations and insights gained from the analytical efforts.

USDA National Fluoride Database of Selected Beverages and Foods

Assessment of fluoride intake is paramount in understanding the mechanisms of fluoride metabolism specifically the prevention of dental caries, dental fluorosis, and skeletal fluorosis. The Institute of Medicine (IOM, 1997) specified Adequate Intakes (AI) of 0.01 mg/day for infants through 6 months, 0.05 mg/kg/day beyond 6 months of age, and 3 mg/day and 4 mg/day for adult women and men (respectively), to prevent dental caries. Upper limits (UL) of 0.10 mg/kg/day in children less than 8 years and 10 mg/day for those older than 8 years are recommended for prevention of dental fluorosis. Similar levels have been endorsed by the American Dental Association (ADA, 1994) and the American Dietetic Association (ADA, 2000). Fluoride works primarily via topical mechanisms to inhibit demineralization, to enhance remineralization, and to inhibit bacteria associated with tooth decay (Featherstone, 2000). Fluoride has an affinity for calcified tissues. Studies of exposure and bone mineral density, fractures and osteoporosis would benefit from a national fluoride database coupled with an intake assessment tool (Phipps, 1995; Phipps et al., 2000). Therefore, a database for fluoride is needed for epidemiologists and health researchers to estimate the intakes and to investigate the relationships between intakes and human health.

(U//FOUO) U.S. Government Shutdown DoD Contingency Plan April 2011

This document provides guidance for identifying those missions and functions of the Department of Defense that may continue to be carried out in the absence of available appropriations. The information provided in this document is not exhaustive, but rather illustrative, and is intended primarily to assist in the identification of those activities that may be continued notwithstanding the absence of available funding authority in the applicable appropriations ( excepted activities). Activities that are determined not to be excepted, and which cannot be performed by utilizing military personnel in place of furloughed civilian personnel, will be suspended when appropriated funds expire. The Secretary of Defense may, at any time, determine that additional activities shall be treated as excepted.