NRC Seeks Comments on Proposed Rule on Security of Radioactive Materials

The Nuclear Regulatory Commission seeks public comment on proposed new regulations that would codify and expand upon recent security measures the agency has imposed for certain sensitive radioactive materials.

A proposed rule, to be published in the Federal Register, would add a new Part 37 to NRC's regulations in Title 10 of the U.S. Code of Federal Regulations (10 CFR), and make conforming changes to other parts of NRC regulations regarding radioactive materials.

The proposed rule will establish security requirements for the most risk-significant radioactive materials (those in Category 1 and Category 2 of the International Atomic Energy Agency's rankings of radiation sources), as well as for shipments of small amounts of irradiated reactor fuel.

"Radioactive source security is a high priority for the agency, and this new regulation will mark an important milestone in the progress that the agency has made in this area," said NRC Chairman Gregory B. Jaczko. "Through this rulemaking and other interrelated activities, the agency is contributing to an increase in the effectiveness of the nation's security."

Other efforts Chairman Jaczko mentioned include implementation of the National Source Tracking System, the ongoing rulemaking for limiting the quantity of byproduct material in a generally licensed device, and the efforts of the Radiation Source Protection and Security Task Force, an inter-agency group headed by the NRC.z

NRC took steps to strengthen the security of risk-sensitive radioactive materials immediately after the terrorist attacks of Sept. 11, 2001. Since that time, the NRC has issued various orders imposing enhanced controls, implemented requirements for fingerprinting and criminal background checks for people with access to certain radioactive materials, and developed and implemented the National Source Tracking System.

NRC said the new Part 37 and changes to other parts of 10 CFR contained in the proposed rule incorporate lessons learned in implementing those security measures, as well as stakeholder input on proposed language for the new rule. Codifying these requirements in NRC's regulations will enhance consistency of implementation as well as transparency and predictability of NRC’s oversight of radioactive material security.

Comments will be accepted for 120 days following publication of the proposed rule in the Federal Register. Comments may be submitted over the federal government's rulemakings Website at www.regulations.gov, using docket ID NRC-2008-0120. They may also be sent to Secretary, U.S. Nuclear Regulatory Commission, Washington, D.C. 20555-0001, ATTN: Rulemakings and Adjudications Staff; or e-mailed to Rulemaking.Comments@nrc.gov.

NRC will separately publish for public comment in the Federal Register guidance on implementing the new regulations. The agency also plans two public meetings on the implementation guidance; details of those meetings will be announced at a later date.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3