United States

(U//LES) DHS Nuclear Power Plants Characteristics and Common Vulnerabilities Reports

A nuclear power plant is an arrangement of components used to generate electric power. Nuclear power plants used in the United States (U.S.) are either boiling water reactors (BWRs) or pressurized water reactors (PWRs). Boiling water reactors (Figure 1) use a direct cycle in which water boils in the reactor core to produce steam, which drives a steam turbine. This turbine spins a generator to produce electric power. Pressurized water reactors (Figure 2) use an indirect cycle in which water is heated under high pressure in the reactor core and passes through a secondary heat exchanger to convert water in another loop to steam, which in turn drives the turbine. In the PWR design, radioactive water/steam never contacts the turbine. Except for the reactor itself, there is very little difference between a nuclear power plant and a coal- or oil-fired power plant.

(U//FOUO) JIEDDO Report: Water-borne IED Threats and the Strait of Hormuz

The Strait of Hormuz is the narrow waterway that allows maritime access into and out of the Persian Gulf from the Gulf of Oman and Arabian Sea. The U.S. Department of Energy (DOE) has identified the Strait of Hormuz as one of six critical chokepoints in the global distribution and trade of oil. The concentration of valuable maritime traffic passing through such a relatively small area makes the Strait of Hormuz a strategic area for the targeting of maritime objectives by groups or nations looking to threaten or disrupt global trade. Iran, located on the north bank of the strait, has made repeated threats to strangle maritime traffic passing through the strait in retaliation for any strike against its nuclear program. In addition, al-Qaeda has reportedly been planning strikes at critical maritime chokepoints over the past decade, including the Strait of Hormuz. Al-Qaeda continues to plan maritime attacks, copying successful tactics from other militant groups such as the LTTE. The Strait of Hormuz would be an ideal target for al-Qaeda’s maritime campaign, either through the use of WBIEDs or conventional maritime weapons.

(U//FOUO) DHS “Red Cell” Report: How Terrorists Might Use a Dirty Bomb

An independent, unclassified analytic Red Cell session, sponsored jointly by the U.S. Departments of Energy and Homeland Security, found a Radiological Dispersal Device (RDD) attack on the U.S. homeland to be highly appealing from a terrorist standpoint. The Red Cell group, which simulated two different terrorist cells, believed an RDD attack would be relatively easy to prepare and mount and could have wide-ranging physical, psychological, political, and economic impacts. The group believed radioactive materials would be easy to procure, especially from abroad, and found a variety of potential targets across the country. Participants expected that public distrust of official guidance would heighten fear and panic.

(U//FOUO) DHS “Red Cell” Report: How Terrorists Might Exploit a Hurricane

A key component of the IAIP/Competitive Analysis and Evaluation Office’s mission is convening a diverse range of governmental and nongovernmental experts who adopt a terrorist mindset to challenge traditional or existing assumptions about how terrorists might attack some aspect of our critical infrastructure. The ideas generated by these “red cells” contribute insights on potential terrorist threats to the homeland for state and local governments, law enforcement, and industry.

Taash Communications Network: Iranian Green Movement Support Plan

Among the lessons learned from the revolutions in Egypt and Tunisia is the value and affect of unencumbered access to information and communications technology (ISCT), including but not limited to independent information and social networking across multiple platforms, such as mobile, internet, web-based, and satellite broadcast. The current ICT available in and outside Iran remain largely silod platforms (i.e. lacking technology that facilitates convergence of information and interactivity). In general, the younger generation that support reform and actively oppose the regime from within have not been able to effectively access newer technologies or have been dissuaded from participating in communications programs operated by less legitimate traditional opposition parties from outside. Most these platforms are either state sponsored, like VOA and BBC, or are exile opposition websites and channels out of Los Angeles with a political agenda and low tolerance for alternative viewpoints. Most have failed to stay up to date with the language, trends, mentality, culture, and sociopolitical situation of the today Iran. The partisan nature of the older generation opposition groups further limit their ability to reach the younger demographic.

DHS Participation in Film and Television Productions Management Directive

It is Department of Homeland Security policy to use the broad authority granted in the Homeland Security Act of 2002, to further the Department’s missions, particularly with respect to disseminating the Department’s homeland security message. This directive sets Departmental policy for interaction between the Department and non-government, entertainment-oriented motion picture, television, advertising, video and multimedia productions/enterprises.

U.S. Department of Energy Highly Enriched Uranium Production Historical Report

In February 1996, the Department of Energy (DOE) commissioned a comprehensive effort to document and declassify the United States inventory and other information needed to present a complete picture of the production, acquisition, and utilization of highly enriched uranium (HEU). Highly Enriched Uranium: Striking A Balance presents the results of that study. The effort was commissioned to facilitate discussions of HEU storage, safety, and security with stakeholders, to encourage other nations to declassify and release similar data, and to support the national policy on transparency of nuclear materials. This information will also be available for formulating policies involving the identification and disposition of surplus nuclear materials.

U.S. Army Yemen Smart Book

The Smart Book contains information designed to enhance the Soldier’s knowledge of Yemen, including history, politics, country data and statistics, and the military operational environment. The Smart Book concludes with an overview of the culture of Yemen including religion, identity, behavior, communication and negotiation techniques, an overview of ethnic groups, a regional breakdown outlining each province, a language guide, and cultural proverbs.

Potassium Iodide Use in Radiation Emergencies Guidance

The objective of this document is to provide guidance to other Federal agencies, including the Environmental Protection Agency (EPA) and the Nuclear Regulatory Commission (NRC), and to state and local governments regarding the safe and effective use of potassium iodide (KI) as an adjunct to other public health protective measures in the event that radioactive iodine is released into the environment. The adoption and implementation of these recommendations are at the discretion of the state and local governments responsible for developing regional emergency response plans related to radiation emergencies.

Sandia National Laboratories Nuclear Reactor Containment Integrity Research Overview

Research into the integrity of containment structures or vessels for nuclear power plants has been conducted around the world in those countries where nuclear energy is produced and provides, or is expected to provide, a significant portion of the domestic energy supply. While the contributions of each of these efforts to the understanding of the role of containment in ensuring the safe operation on nuclear power plants is important, the most comprehensive experimental effort has been conducted at Sandia National Laboratories, primarily under the sponsorship of the US Nuclear Regulatory Commission (NRC). This report describes the background and context for the more than 25 years of NRC-sponsored Containment Integrity Research at Sandia National Laboratories and summarizes the major results of the experimental efforts and the observations and insights gained from the analytical efforts.

USDA National Fluoride Database of Selected Beverages and Foods

Assessment of fluoride intake is paramount in understanding the mechanisms of fluoride metabolism specifically the prevention of dental caries, dental fluorosis, and skeletal fluorosis. The Institute of Medicine (IOM, 1997) specified Adequate Intakes (AI) of 0.01 mg/day for infants through 6 months, 0.05 mg/kg/day beyond 6 months of age, and 3 mg/day and 4 mg/day for adult women and men (respectively), to prevent dental caries. Upper limits (UL) of 0.10 mg/kg/day in children less than 8 years and 10 mg/day for those older than 8 years are recommended for prevention of dental fluorosis. Similar levels have been endorsed by the American Dental Association (ADA, 1994) and the American Dietetic Association (ADA, 2000). Fluoride works primarily via topical mechanisms to inhibit demineralization, to enhance remineralization, and to inhibit bacteria associated with tooth decay (Featherstone, 2000). Fluoride has an affinity for calcified tissues. Studies of exposure and bone mineral density, fractures and osteoporosis would benefit from a national fluoride database coupled with an intake assessment tool (Phipps, 1995; Phipps et al., 2000). Therefore, a database for fluoride is needed for epidemiologists and health researchers to estimate the intakes and to investigate the relationships between intakes and human health.

(U//FOUO) U.S. Government Shutdown DoD Contingency Plan April 2011

This document provides guidance for identifying those missions and functions of the Department of Defense that may continue to be carried out in the absence of available appropriations. The information provided in this document is not exhaustive, but rather illustrative, and is intended primarily to assist in the identification of those activities that may be continued notwithstanding the absence of available funding authority in the applicable appropriations ( excepted activities). Activities that are determined not to be excepted, and which cannot be performed by utilizing military personnel in place of furloughed civilian personnel, will be suspended when appropriated funds expire. The Secretary of Defense may, at any time, determine that additional activities shall be treated as excepted.

(U//FOUO) U.S. Army Interagency Teaming to Counter Irregular Threats Handbook

If you have picked up this handbook, or had it handed to you, you are likely an interagency team leader or team member or a military commander or civilian leader with the responsibility for setting up an interagency team. If this is your first exposure to working with the interagency, it can be a daunting prospect. This handbook is intended to provide you with a basic understanding of the interagency environment as well as insights and best practices that your team can put to use to counter irregular threats in the field or at operational level.

National Level Exercise 2011 Draft Planning Overview

Focus: Domestic, non-terrorism; Major Earthquake (specific focus on a catastrophic earthquake in the New Madrid Seismic Zone (NMSZ)) the exercise concept was created in 2006 as a follow-on task to the Federal Emergency Manage Agency (FEMA) NMSZ Catastrophic Planning Initiative. NLE 11 will be a Functional Exercise (FE) that will last approximately four days with a specific focus on the first 72 hours. This exercise is designed to provide FEMA with a crucible to test Administrator Fugate’s mission for the Federal government to make decisions and take action within the first 72 hours of a major disaster that will have positive effect on life saving and life sustaining activities.

HBGary DARPA Cyber Insider Threat (CINDER) Proposal

Like a lie detector detects physical changes in the body based on sensitivities to specific questions, we believe there are physical changes in the body that are represented in observable behavioral changes when committing actions someone knows is wrong. Our solution is to develop a paranoia-meter to measure these observables. Using shoplifing as an example, there are peaks and valleys of adrenaline during the entire theft process. There is the moment the thief puts an item in their pocket (high), then as they walk around the store the adrenaline begins to valley a bit, then they attempt to walk out of the store (very high). It is at these points that we want to be able to take as many behavioral measurements as possible because it is at these points the insiders activity will be as far from normal behavior. In this hypothesis we will have a rootkit on the host that monitors keystrokes, mouse movements, and visual cues through the system camera.

(U//FOUO) DHS Dams Sector Security Awareness Handbook

The Nation has more than 100,000 dams. Of this number, approximately 82,000 are listed in the National Inventory of Dams (NID), which generally includes dams greater than 25 feet in height or reservoirs having more than 50 acre-feet in storage capacity. In the NID, the downstream hazard potential (e.g., the amount of risk or damage a dam can pose because of failure or negligent operation) is classified as high, significant, or low. In the current NID database, approximately 12,000 dams are classified as high hazard potential from a dam safety perspective. However, only a very small percentage of high-hazard dams represent a potential for causing mass casualties.

U.S. Nuclear Regulatory Commission BWR Reactor Shutdown and Spent Fuel Storage Safety Report

An evaluation of the nuclear power plant regulatory basis is performed, as it pertains to those plants that are permanently shutdown (PSD) and waiting or undergoing decommissioning. Four spent fuel storage configurations are examined. Recommendations are provided for those operationally based regulations that could be partially or totally removed for PSD plants without impacting public health and safety.