Dirty bomb vulnerabilities


Book Description




Preventing a Dirty Bomb


Book Description

Radioactive materials are commonly used throughout the U.S. in technological devices for medical, industrial, and research purposes. However, these materials, if used improperly, can be harmful and dangerous. For example, in the hands of terrorists, even a small amount could be used to construct a radiological dispersal device, also known as a dirty bomb. A dirty bomb uses conventional explosives to spread radioactive material. This report examines (1) the effectiveness of NRC's license verification system for ensuring that high-risk radioactive materials are not purchased using a forged or altered license and (2) vulnerabilities that could affect NRC's ability to verify licenses for the purchase of high-risk radioactive material. GAO recommends that NRC (1) immediately require vendors to verify category 3 licenses with the appropriate regulatory authority and (2) add security features to its licensing process that improve the integrity of the process and make it less vulnerable to altering or forging licenses.




Dirty Bomb Vulnerabilities


Book Description

Dirty bomb vulnerabilities: fake companies, fake licenses, real consequences: hearing before the Permanent Committee on Investigations of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, July 12, 2007.




Dirty Bombs


Book Description

Congress has long sought, through legislation and oversight, to protect the United States against terrorist threats, especially from chemical, biological, radiological, and nuclear (CBRN) weapons. Radiological dispersal devices (RDDs) are one type of CBRN weapon. Explosive-driven "dirty bombs" are an often-discussed type of RDD, though radioactive material can also be dispersed in other ways. This report provides background for understanding the RDD threat and responses, and presents issues for Congress. Appendices: Technical Background; Some U.S. Vulnerabilities to RDDS. Charts and tables. This is a print on demand edition of an important, hard-to-find publication.




Dirty Bomb Vulnerabilities


Book Description




S. Hrg. 110-181


Book Description

The United States Government Printing Office (GPO) was created in June 1860, and is an agency of the U.S. federal government based in Washington D.C. The office prints documents produced by and for the federal government, including Congress, the Supreme Court, the Executive Office of the President and other executive departments, and independent agencies. A hearing is a meeting of the Senate, House, joint or certain Government committee that is open to the public so that they can listen in on the opinions of the legislation. Hearings can also be held to explore certain topics or a current issue. It typically takes between two months up to two years to be published. This is one of those hearings.




Dirty Bomb Vulnerabilities


Book Description







America the Vulnerable


Book Description

Flynn gives an alarming and authoritative view of what America still hasn't done--and what it needs to do--to provide security in the face of new terrorist attacks.




Investigative Operations: Use of Covert testing to Identify Security Vulnerabilities and Fraud, Waste, and Abuse


Book Description

GAO's Forensic Audits and Special Investigations team (FSI), which was created in 2005 as an interdisciplinary team consisting of investigators, auditors, and analysts, conducts covert tests at the request of the Congress to identify vulnerabilities and internal control weaknesses at executive branch agencies. These vulnerabilities and internal control weaknesses include those that could compromise homeland security, affect public safety, or have a financial impact on taxpayer's dollars. FSI conducts covert tests as "red team" operations, meaning that FSI does not notify agencies in advance about the testing. Recently, concerns have arisen as to whether top management at the U.S. Transportation Security Administration (TSA) were negatively impacting the results of red team operations by leaking information to security screeners at the nation's airports in advance of covert testing operations.