Chapter 9 – U.S. and Global Safeguards and Policy

Open Sources (Available to all)
  1. Holt, M., & Andrews, A. (2014). Nuclear power plant security and vulnerabilities. CRS Report No. RL34331 [January 3]. Retrieved from https://fas.org/sgp/crs/homesec/RL34331.pdf.
  2. International Atomic Energy Agency. (2011). Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5). Retrieved from https://www.iaea.org/publications/8629/nuclear-security-recommendations-on-physical-protection-of-nuclear-material-and-nuclear-facilities-infcirc/225/revision-5.
  3. International Atomic Energy Agency. (2008). Nuclear security culture. IAEA Nuclear Security Series No. 7: Implementing Guide. Retrieved from https://www-pub.iaea.org/MTCD/Publications/PDF/Pub1347_web.pdf.
  4. U.S. Nuclear Regulatory Commission. (2015). Protecting our nation: A Report of the U.S. Nuclear Regulatory Commission. Office of Nuclear Security and Incident Response. Retrieved from https://www.nrc.gov/docs/ML1523/ML15232A263.pdf.
  5. Van Dine, A., Assante, M., & Soutland, P. (2016). Outpacing cyber threats: Priorities for cyber security at nuclear facilities. Nuclear Threat Initiative. Retrieved from http://www.nti.org/media/documents/NTI_CyberThreats__FINAL.pdf.
Additional Readings (Available to OSU Students through the OSU Valley Library)
  1. Deutch, J., Kanter, A., Moniz, E., & Poneman, D. (2004). Making the world safe for nuclear energy. Survival, 46(4), 65-79. Retrieved from https://search.library.oregonstate.edu/permalink/f/1g9lfhc/TN_informaworld_s10_1080_00396330412331342466.
  2. Holdren, J. P. (1983). Nuclear power and nuclear weapons: the connection is dangerous. Bulletin of the Atomic Scientists, 39(1), 40-45. Retrieved from https://search.library.oregonstate.edu/permalink/f/1g9lfhc/TN_gale_ofa2572563.
  3. Rockwood, L., (2018). How the IAEA verifies if a country’s nuclear program is peaceful or not: The legal basis. Bulletin of the Atomic Scientists, 74(5), 317-325. Retrieved from https://search.library.oregonstate.edu/permalink/f/1g9lfhc/TN_wos000443845800004.
  4. Frank R. Spellman, F. R., & Stoudt, M. L. (2011). Nuclear infrastructure protection and homeland security. Lanham, MD: Government Institutes. OSU Library E-book, retrieved from https://search.library.oregonstate.edu/permalink/f/ueodtl/CP71189509150001451.
  5. Spinrad, B. (1983). Nuclear power and nuclear weapons: the connection is tenuous. Bulletin of the Atomic Scientists, 39(2), 42-47. Retrieved from https://search.library.oregonstate.edu/permalink/f/1g9lfhc/TN_informaworld_s10_1080_00963402_1983_11458951.

 

License

Icon for the Creative Commons Attribution 4.0 International License

Nuclear Security: Countering the Threat From States and Non-State Actors by David Bernell, Meredith Bowers & Ben Wickizer is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book