Safeguards Techniques and Equipment
Safeguards Techniques and Equipment
Safeguards Techniques and Equipment
and Equipment
2003 Edition
International
Nuclear Verification
Series No. 1
(Revised)
SAFEGUARDS TECHNIQUES
AND EQUIPMENT
2003 Edition
The following States are Members of the International Atomic Energy Agency:
AFGHANISTAN GREECE PERU
ALBANIA GUATEMALA PHILIPPINES
ALGERIA HAITI POLAND
ANGOLA HOLY SEE PORTUGAL
ARGENTINA HONDURAS QATAR
ARMENIA HUNGARY
REPUBLIC OF MOLDOVA
AUSTRALIA ICELAND
AUSTRIA INDIA ROMANIA
AZERBAIJAN INDONESIA RUSSIAN FEDERATION
BANGLADESH IRAN, ISLAMIC REPUBLIC OF SAUDI ARABIA
BELARUS IRAQ SENEGAL
BELGIUM IRELAND SERBIA AND MONTENEGRO
BENIN ISRAEL SEYCHELLES
BOLIVIA ITALY SIERRA LEONE
BOSNIA AND JAMAICA SINGAPORE
HERZEGOVINA JAPAN SLOVAKIA
BOTSWANA JORDAN
SLOVENIA
BRAZIL KAZAKHSTAN
BULGARIA KENYA SOUTH AFRICA
BURKINA FASO KOREA, REPUBLIC OF SPAIN
CAMEROON KUWAIT SRI LANKA
CANADA LATVIA SUDAN
CENTRAL AFRICAN LEBANON SWEDEN
REPUBLIC LIBERIA SWITZERLAND
CHILE LIBYAN ARAB JAMAHIRIYA SYRIAN ARAB REPUBLIC
CHINA LIECHTENSTEIN TAJIKISTAN
COLOMBIA LITHUANIA THAILAND
COSTA RICA LUXEMBOURG
THE FORMER YUGOSLAV
CÔTE D’IVOIRE MADAGASCAR
REPUBLIC OF MACEDONIA
CROATIA MALAYSIA
CUBA MALI TUNISIA
CYPRUS MALTA TURKEY
CZECH REPUBLIC MARSHALL ISLANDS UGANDA
DEMOCRATIC REPUBLIC MAURITIUS UKRAINE
OF THE CONGO MEXICO UNITED ARAB EMIRATES
DENMARK MONACO UNITED KINGDOM OF
DOMINICAN REPUBLIC MONGOLIA GREAT BRITAIN AND
ECUADOR MOROCCO NORTHERN IRELAND
EGYPT MYANMAR UNITED REPUBLIC
EL SALVADOR NAMIBIA OF TANZANIA
ERITREA NETHERLANDS UNITED STATES OF AMERICA
ESTONIA NEW ZEALAND URUGUAY
ETHIOPIA NICARAGUA
UZBEKISTAN
FINLAND NIGER
FRANCE NIGERIA VENEZUELA
GABON NORWAY VIETNAM
GEORGIA PAKISTAN YEMEN
GERMANY PANAMA ZAMBIA
GHANA PARAGUAY ZIMBABWE
The Agency’s Statute was approved on 23 October 1956 by the Conference on the Statute
of the IAEA held at United Nations Headquarters, New York; it entered into force on 29 July 1957.
The Headquarters of the Agency are situated in Vienna. Its principal objective is “to accelerate and
enlarge the contribution of atomic energy to peace, health and prosperity throughout the world’’.
© IAEA, 2003
Permission to reproduce or translate the information contained in this publication may be
obtained by writing to the International Atomic Energy Agency, Wagramer Strasse 5, P.O. Box 100,
A-1400 Vienna, Austria.
Printed by the IAEA in Austria
August 2003
IAEA/NVS/1 (Revised)
INTERNATIONAL NUCLEAR VERIFICATION SERIES
No. 1 (Revised)
SAFEGUARDS TECHNIQUES
AND EQUIPMENT
2003 Edition
Although great care has been taken to maintain the accuracy of information con-
tained in this publication, neither the IAEA nor its Member States assume any responsi-
bility for consequences which may arise from its use.
The use of particular designations of countries or territories does not imply any
judgement by the publisher, the IAEA, as to the legal status of such countries or territo-
ries, of their authorities and institutions or of the delimitation of their boundaries.
The mention of names of specific companies or products (whether or not indicated
as registered) does not imply any intention to infringe proprietary rights, nor should it be
construed as an endorsement or recommendation on the part of the IAEA.
CONTENTS
1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2. NON-DESTRUCTIVE ANALYSIS . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. DESTRUCTIVE ANALYSIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.1. Surveillance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
4.1.1. Installed single cameras for easy to access locations . . . . 43
4.1.2. Installed single camera for difficult to access
locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.1.3. Installed multi-camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
4.1.4. Short term surveillance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
4.1.5. Underwater TV for attended applications . . . . . . . . . . . . 46
4.1.6. Surveillance review software . . . . . . . . . . . . . . . . . . . . . . . . 47
4.1.7. Miscellaneous surveillance systems and options . . . . . . . 48
4.2. Seals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
4.2.1. Single use seals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
4.2.2. In situ verifiable seals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5. UNATTENDED MONITORING . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
7. DATA SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
8. ENVIRONMENTAL SAMPLING . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
1
SAFEGUARDS TECHNIQUES AND EQUIPMENT
routes, that the integrity of its containment remains unimpaired and that the
material is accounted for at the correct measurement points. They also lead to
savings in the safeguards inspection effort, e.g. by reducing the frequency of
accountancy verification. A variety of C/S techniques are used, primarily
optical surveillance and sealing. These measures serve to back up nuclear
material accountancy by providing means by which access to nuclear material
can be monitored and any undeclared movement of material detected.
Unattended and remote monitoring is a special mode of application of
NDA or C/S techniques, or a combination of these, that operates for extended
periods of time without inspector access. In remote monitoring, the unattended
equipment transmits the data off-site. For unattended and remote monitoring,
additional criteria must be met, including high reliability and authentication of
the data source. Data communication costs have dropped dramatically in
recent years. Consequently, expanded deployment of unattended and remote
monitoring systems has become an increasingly important element of IAEA
safeguards in efforts to maintain or increase effectiveness without increasing
inspector resources or overall costs.
Data security is an important feature of unattended and remote
monitoring systems. In fact, those types of safeguards systems, permanently
installed at facilities and periodically visited by inspectors, transmit data
between the components of different systems and between systems and IAEA
headquarters through insecure transmission paths. These data need to be
verified to guarantee their authenticity and may need to be encrypted to avoid
disclosure of specific information and/or to ensure confidentiality to the
Member States.
Environmental sampling, which allows detection of minute traces of
nuclear material, was added to the IAEA’s verification measures in the early
1990s as a powerful tool for detecting indications of undeclared nuclear
activities. The non-detection of minute traces of a specific nuclear material can
provide assurance that there were no activities utilizing the material in the area
where the environmental samples were taken.
The complexity and diversity of facilities containing safeguarded nuclear
material require a correspondingly diverse set of verification techniques and
equipment. Table I lists the main types of facility where inspections are
performed and the primary verification techniques that are implemented at
these facilities.
Development of equipment and techniques for safeguards is continuing
with the help of national support programmes that assist the IAEA in keeping
pace with the evolution of new technology. The IAEA defines the safeguards
needs, co-ordinates the support programmes, and tests and evaluates the
techniques and the resulting equipment being developed. All aspects of
2
TABLE I. MAIN TYPES OF FACILITY UNDER IAEA SAFEGUARDS
(data based on 2002 Safeguards Implementation Report)
INTRODUCTION
Main techniques deployed
Materials: UF6 Materials: U and Pu oxides, MOX Materials: Spent fuel Materials: U and Pu nitrates
Gamma ray spectrometry Gamma ray spectrometry Cerenkov glow detection Destructive analysis
Weighing Neutron counting Gross g ray and neutron Neutron counting
Destructive analysis detection
Isotopic determination
2 430 inspections at 603 facilities and 706 NDA systems used in 1 639 inspections at 553 facilities
766 DA samples analysed 1581 analytical results were reported
489 video cameras deployed for optical surveillance
24 572 seals detached and verified
232 environmental samples taken in 11 enrichment installations and 36 other installations,
including facilities with hot cells
3
SAFEGUARDS TECHNIQUES AND EQUIPMENT
4
2. NON-DESTRUCTIVE ANALYSIS
(a) Enriched uranium fuel, for example, has a strong 186 keV g ray associated
with the alpha decay of 235U, and the 235U enrichment can be verified by
measuring this g ray.
(b) Plutonium samples generally contain the isotopes 238Pu, 239Pu, 240Pu and
241Pu as well as decay products, which give rise to a highly complex mix
To detect g rays, the radiation must interact with a detector to give up all
or part of the photon energy. The basis of all g ray detector systems is the
collection of this liberated electrical charge to produce a voltage pulse whose
amplitude is proportional to the g ray energy. In a g ray spectrometer, these
pulses are sorted according to amplitude (energy) and counted using
appropriate electronics, such as a single or multichannel analyser. With a
multichannel analyser, the g rays from different energies can be displayed or
plotted to produce a g ray energy spectrum which provides detailed
information on the measured material.
The g ray detectors most commonly used are either scintillators (usually
activated sodium iodide (NaI) crystals) or solid state semiconductors (usually
high purity germanium (HpGe) and cadmium–zinc–telluride (CdZnTe)
crystals).
5
SAFEGUARDS TECHNIQUES AND EQUIPMENT
(1) The NaI detectors can be made with large volumes and generally have
higher g ray detection efficiencies than Ge detectors. Their safeguards
applications include, for example, the verification of 235U enrichment in
fresh fuel as well as the presence of spent fuel through detection of fission
product g radiation. Their ability to distinguish between g rays of different
energies, however, is relatively poor and of the three types of detector
they have the worst energy resolution.
(2) Germanium detectors have far superior energy resolution to NaI
detectors and are better suited to the task of resolving complex g ray
spectra and providing information about the isotopic content of materials.
The Ge detectors used by the IAEA range in size from small planar types
to large (80–90 cm3) coaxial detectors. A disadvantage of these detectors
is that they must be operated at a very low temperature, which is usually
achieved by cooling with liquid nitrogen.
(3) Standard CdZnTe detectors (and CdTe detectors) do not need cooling
and of the three detectors they have the highest intrinsic detection
efficiency. Recent progress in fabrication techniques has substantially
improved CdZnTe resolution. Until 1997 the standard volumes available
were relatively small (20 and 60 mm3), but now relatively large 500 mm3
and 1500 mm3 CdZnTe detectors are available. The portability and small
size of CdZnTe and CdTe detectors have made them especially suitable
for use in a wide range of applications, including use in confined spaces
such as in situ verification of fresh fuel assemblies whose design permits
insertion of only a small detector probe into the assembly interior and of
spent fuel bundles stored underwater in closely packed stacks.
6
NON-DESTRUCTIVE ANALYSIS
10000
8000
6000
4000
2000
0
0 100 200 300 400 500 600
Channel
2000
1500
1000
500
0
0 100 200 300 400 500 600
Channel
25000
20000
15000
10000
5000
0
0 1000 2000 3000 4000 5000
Channel
7
SAFEGUARDS TECHNIQUES AND EQUIPMENT
The basic HM-5 modular design includes an NaI detector. For special
applications the NaI detector can be replaced with a more stable, higher
resolution CdZnTe detector. Up to 50 gamma spectra, each with 1024 channels,
can be stored in the non-volatile memory of the HM-5 and later be transferred
to a computer for further processing or plotting.
With such versatility, the HM-5 is used for traditional safeguards
inspections and for investigations under the conditions of the Additional
Protocol. The HM-5 is also particularly useful for law enforcement services to
detect and identify nuclear and radioactive materials being smuggled across
borders.
8
NON-DESTRUCTIVE ANALYSIS
9
SAFEGUARDS TECHNIQUES AND EQUIPMENT
and HpGe (MMCG). The MMCA (Fig. 4) is significantly smaller and lighter
than the previous IAEA portable unit, the PMCA, and during operation the
battery lifetime is three times longer (at least 12 hours for CdZnTe and NaI
detectors). The MMCA has the footprint of a palmtop computer and weighs
680 g, including the lithium ion battery. Combined with a palmtop computer
and a CdZnTe detector it makes a powerful yet versatile system that fits into
half a briefcase, making it very convenient for many inspection activities.
10
NON-DESTRUCTIVE ANALYSIS
11
SAFEGUARDS TECHNIQUES AND EQUIPMENT
12
NON-DESTRUCTIVE ANALYSIS
Fission neutrons in the first two categories are emitted in groups of two or
more per fission event. The multiple neutron signature is detected as a neutron
coincidence. Nearly all the isotopes of U, Pu and other transuranic elements emit
alpha particles. These interact with light elements present in compounds (e.g.
oxides and fluorides) or as impurities (e.g. B, Be and Li) to form an undesirable
neutron background. Neutron coincidence counting discriminates against this
background by processing neutron pulses to select time correlated (coincident)
signatures of multiple neutrons emitted during fission and eliminating the (a, n)
neutron pulses that are emitted singly and are thus uncorrelated.
Passive coincidence detector systems determine the mass of Pu based on
spontaneous fission primarily in the even numbered isotopes (238Pu, 240Pu and
242Pu, with 240Pu being the dominant contributor). The major fissile isotope,
239Pu, has a typical abundance in fuel of 60% or higher, yet it makes an
13
SAFEGUARDS TECHNIQUES AND EQUIPMENT
neutron count rate, even though 235U may be enriched to only a few per cent
(e.g. low enrichment fuels).
Neutron detectors employ various neutron capture reactions to generate
pulses. The reactions produce energetic particles which in turn ionize a gas and
produce a charge pulse in response to a neutron interaction. The choice of
detector (i.e. the capture material) is based mainly on the neutron detection
sensitivity required and on the insensitivity to other radiation, e.g. g rays. Nearly
all detectors are most sensitive to low energy neutrons. Consequently in many
neutron measurement systems, detectors are surrounded with a moderator
material such as polyethylene to slow energetic neutrons down to thermal
energies.
Gross neutron counting refers to the sum of all neutrons detected. Here
the neutron source cannot be characterized since coincidence requirements are
not applied. The presence of significant numbers of neutrons is often a
sufficient indication that fissile nuclear material is present. All the neutron
coincidence detection systems (discussed below) determine total neutron count
rates as well as coincidence count rates.
Other detector systems, such as the Fork Detector and the Unattended
Fuel Flow Monitor, employ gross neutron counting as their primary signature.
These systems mainly measure spent fuel materials as described in another
section of this booklet.
Neutron coincidence counting has evolved into a very stable, reliable and
accurate technique for determining Pu and 235U content. Modern, well
designed neutron coincidence systems are capable of reliably processing pulses
over a very large range of input count rates (i.e. over more than six orders of
magnitude). The stability is achieved by judicious selection and placement of
amplifier electronics to minimize noise interference. The electronics boards,
when located at the detector head, amplify and shape the pulses, apply lower
level discrimination to remove g pulses or noise, and feed out very narrow
(50 ns wide) logic pulses to an external pulse processor (the electronics
controller).
Reliable coincidence counting is also due to a sophisticated pulse
processing circuit (shift register electronics) in the external electronics
controller. Pulses occurring within a specified time period (normally set at
64 µs) of one another may be termed correlated (i.e. ‘coincident’) neutron
14
NON-DESTRUCTIVE ANALYSIS
pulses. The correlation time is associated with the slowing down of neutrons in
the moderator of the detector head. The shift register electronics circuitry
keeps track of coincidences between pulses separated by about 1000 ms (called
accidentals) and coincidences in the first 64 µs (called real coincidences plus
accidentals). Analysis software provided with a coincidence counter system
subtracts the accidentals data from the reals+accidentals data to determine real
coincidences. In analysing the information, various small corrections are also
automatically applied.
Passive detector systems have two basic geometrical configurations: well
detectors that completely enclose the sample or collar detectors that encircle
the sample (e.g. a fuel assembly). Well detectors have the preferred geometry
since they have the capability to detect all the neutrons emanating from the
sample. Collar detectors are an alternative detector design that is appropriate
when the sample is too large for placement inside a well detector. Whereas
calibrated passive well detectors measure the total mass of Pu in a sample,
collar detectors measure Pu mass per unit length of a fuel assembly. The linear
density must be multiplied by an effective length to determine the total Pu
mass in the assembly.
About twenty versions of passive detector systems are currently used for
nuclear safeguards, with design features optimized for specific sample sizes,
shapes or Pu mass ranges. The passive detector systems are listed in Table III
along with their primary applications. Two representative systems are described
below.
HLNC. The High Level Neutron Coincidence Counter is shown in Fig. 6.
This detector system is typical of IAEA well detector coincidence counting
systems used for measuring non-irradiated Pu materials. The HLNC includes a
head which houses the neutron detectors (3He gas proportional counters)
connected to special amplifiers. The electronics controller, JSR-12, provides
power to the amplifiers and 3He tubes and processes the train of pulses to
determine coincidence events. A portable computer connected to the JSR-12
automates the collection of data and analyses and archives the data. A printer,
which presents the results in a concise report format, completes the detector
package. This 60 kg detector features a large sample cavity and 18% neutron
detection efficiency. By removal of the top end cap, a can containing Pu (in
pellet, powder or scrap form) can be centred in the large cavity. The sample is
given an identification number in the computer, an appropriate calibration
curve is selected and a run time (typically 100 s) is designated. Upon initiation
of the measurement, the IAEA neutron coincidence counting (INCC) code
automatically runs through a sequence of measurements (typically three), each
of which must pass all built-in quality control criteria for acceptable results.
When the measurements are completed, the Pu mass is calculated and
15
SAFEGUARDS TECHNIQUES AND EQUIPMENT
compared with the declared value to provide a quantitative verification that for
typical high purity Pu inventories is accurate to 1%.
INVS. For small samples (bagged Pu pellets, powders and solutions in
vials) with much lower total Pu content than those typically measured with an
HLNC, the Inventory Sample Counter (INVS) is the detector system of choice.
The INVS has nearly double the neutron detection efficiency of an HLNC.
Fig. 7 shows one of four versions of this portable detector system. In another
16
NON-DESTRUCTIVE ANALYSIS
version, the INVS has an inverted geometry and is permanently attached to the
floor of a glovebox so that samples can be assayed for Pu content without the
inconvenience and inefficiency of removing the samples from the glovebox.
Although the cavity of an INVS is typically only about 6 cm in diameter by
16 cm high, it is well suited for samples available at facilities such as fuel
fabrication plants or on-site laboratories. The INVS provides highly reliable
Pu content verification with an accuracy of up to 1% on individual
measurements. Measurement procedures are automated with the INCC
program and are essentially the same as for the HLNC.
Active detector systems use neutron sources (typically AmLi) to
interrogate (induce fission in) the 235U in a sample. A well geometry is again
preferred but a collar geometry is needed when the sample is a fuel assembly.
The active neutron detectors in use by IAEA safeguards are listed in Table III.
Details of an active well detector and an active collar detector are presented
below. The full detector system includes a detector head, which detects the
neutrons and houses a neutron interrogation source; the electronics controller,
which powers the detector and determines the neutron coincidence rates; a
portable computer for controlling the measurements and for analysing data to
determine 235U content; and the printer for generating reports.
AWCC. The Active Well Coincidence Counter has a large (150 kg)
detector head permanently attached to a wheeled cart for transportability
(Fig. 8). The AWCC has 42 3He counters embedded in thick polyethylene
cylinders, resulting in a relatively high (nearly 30%) neutron detection
17
SAFEGUARDS TECHNIQUES AND EQUIPMENT
efficiency. The 235U content in a sample is interrogated with two AmLi neutron
sources placed in the top and bottom end caps to provide a uniform
distribution of interrogation neutrons over the sample volume. The cavity size
is adjustable up to about 20 cm in diameter and 23 cm in height by removal of
inserts and reflectors accommodating samples such as metal disks, canned
metal oxide powders and fuel pebbles in carousels. The INCC program is used
to automate the measurement procedure and data analysis to enable assaying
the 235U content to high accuracy.
UNCL. The Uranium Neutron Coincidence Collar for determining the
linear mass density of uranium in fresh fuel assemblies is mounted on a cart.
When it is being used at a fuel fabrication or reactor facility, the side containing
the neutron source is removed or swung open and the collar is wheeled into
position surrounding a fuel assembly. Once the door with the AmLi source is
closed, the measurement cycle is initiated. After a specified number of
measurements have passed the quality assurance acceptance criteria in the
INCC program, the 235U mass per unit length is determined. The linear density
data are combined with results of a measurement of the effective length to
determine the 235U content of the entire fuel assembly.
Spontaneous fissions in the 242Cm and 244Cm isotopes are the major
source of neutrons emanating from spent fuel. These isotopes are produced
through multiple neutron capture events when a fuel assembly is exposed to
high neutron fluxes in a nuclear reactor. Fission products in the irradiated fuel
produce an extremely high radiation background in which the neutrons must
be detected. The high radiation environment influences the type of techniques
that can be deployed for spent fuel verification. One approach is to choose a
detector which is basically insensitive to g rays. Another approach is to shield
against the g rays while allowing neutrons to pass through the shield into the
neutron detector. Spent fuel verification methods include not only neutron
detection but also g ray and ultraviolet light (Cerenkov radiation) detection.
Table IV lists the spent fuel measurement systems in use by the IAEA. The
Fork Detector (FDET) incorporates both neutron and g ray detectors for gross
defect verification of fuel assembly characteristics such as irradiation history, initial
fuel content and number of reactor cycles of exposure. Detector systems are avail-
able to measure the g ray energy spectra from irradiated fuel (SFAT and IRAT),
and g ray intensity as a function of fuel bundle storage position (CBVB and
18
NON-DESTRUCTIVE ANALYSIS
19
SAFEGUARDS TECHNIQUES AND EQUIPMENT
FIG. 9. FDET: Fork Detector Irradiated Fuel Measuring System (detector head, GRAND
electronics unit and portable computer).
CBVS). Cerenkov glow viewing devices (ICVD and eventually a digital device,
DCVD) examine the ultraviolet light that appears in the water surrounding spent
fuel. The various measurement systems are described in more detail below.
20
NON-DESTRUCTIVE ANALYSIS
taking measurements from the top of a fuel assembly as it sits in the storage rack.
The SFAT provides a qualitative verification of the presence of spent fuel
through detection of particular fission product g rays — either from 137Cs
(662 keV) for fuel that has cooled for longer than four years or from short lived
fission products such as 144Pr (2182 keV) for fuel with short cooling times.
Activation products such as 60Co are also identifiable. The SFAT is particularly
helpful in situations where Cerenkov viewing cannot provide verification, e.g.
when Cerenkov radiation is weak because the spent fuel has low burnup and/or
a long cooling time, or when water in the storage pond is insufficiently clear. The
SFAT and its lead shielding are housed in a stainless steel watertight container
which is submerged in a storage pond and positioned over the item to be exam-
ined. A watertight collimator pipe is attached below the detector housing to
permit only radiation from the principal assembly rather than from adjacent
assemblies to reach the detector. A multichannel analyser provides for acquisi-
tion, recording and analysis of data, as well as supplying power to the detector.
The intensity of the selected g rays from a specific fuel assembly is compared with
the spectrum from the gap separating the assembly from its neighbour to confirm
the presence of fission or activation products in the measured assembly.
IRAT. The Irradiated Fuel Attribute Tester (Fig. 11) is a small, lightweight
CdZnTe based detector that can be suspended from a spent fuel pond bridge
and used to measure a fission product spectrum from a spent fuel assembly
partially raised from a storage rack. The detector is housed in a stainless steel
cylinder that includes shielding and a collimator. A multichannel analyser
collects and analyses spectral information from a spent fuel assembly. The
presence of fission product isotopes such as 137Cs, 134Cs, 144Pr, 154Eu and others
is used to confirm the irradiated fuel characteristics.
21
SAFEGUARDS TECHNIQUES AND EQUIPMENT
stacks, includes a highly collimated and shielded CdTe detector. The verifier is
attached to an amplifier and a portable computer. The computer can be used
either with an external analyser for high count rate conditions or with an
internal multichannel analyser card for moderate count rate applications. The
662 keV g ray line from 137Cs generally dominates a spectrum for spent fuel
that has cooled longer than two years and provides a useful signature for
verifying the spent fuel. For shorter cooling times the 757 keV line from
95Nb/95Zr is used to verify the presence of spent fuel. The particular g ray line
22
NON-DESTRUCTIVE ANALYSIS
radiation). Spent fuel also emits b particles (which are also energetic electrons),
adding to the Cerenkov radiation. Spent fuel assemblies are characterized by
Cerenkov glow patterns that are bright in the regions immediately adjacent to
the fuel rods. The variation in light intensity is apparent when viewed from a
position aligned directly above the fuel rods. With careful alignment and
appropriate assessment of the object being viewed, an irradiated fuel assembly
can be distinguished from a non-fuel item that may look the same to the naked
eye. Typically, a row of fuel assemblies is viewed vertically from the bridge
while the facility operator slowly runs the bridge down the row. One inspector
views the items in the row through the ICVD and verbally declares each item
as spent fuel, as a void or as some other object, while a second inspector
compares the observed results with the facility declarations. The DCVD is
currently being developed for use in verifying assembles with long cooling
times and/or low burnups which have weak Cerenkov signals that cannot be
seen with a standard ICVD.
23
SAFEGUARDS TECHNIQUES AND EQUIPMENT
The IAEA also uses equipment to measure such quantities as the weight
of an object (LCBS), the wall thickness of a container (ULTG) and the liquid
level in a tank (PTMS).
LCBS. The Load Cell Based Weighing System, shown in Fig. 13, operates
in two load ranges up to 5000 and 20 000 kg and provides a convenient and
rapid means of determining the gross weight of bulky, massive objects such as
UF6 shipping cylinders. The load cell construction includes two shackles
separated by a load supporting element that is bonded to a strain gauge. When
a load is lifted with the hoist, the strain gauge deforms, changing its electrical
resistance. The resistance change is converted into a weight displayed on a
digital readout unit that is attached through a cable to the load cell. Typically,
gross weights are determined with this system to an accuracy of better than 1%.
24
NON-DESTRUCTIVE ANALYSIS
25
3. DESTRUCTIVE ANALYSIS
26
DESTRUCTIVE ANALYSIS
FIG. 15. Sample bottles used for IAEA verification samples. Top left: vials for Pu, MOX
or high enriched U powder. Top right: hard polyethylene bottle for hard or solid materi-
als. Bottom left: glass bottle for depleted, natural or low enriched U powder. Bottom right:
UF6 container.
the table by the random and systematic uncertainties, respectively, are values
achieved in the analysis of materials of nuclear grade or similar chemical purity.
They include the contributions of all uncertainties occurring after sampling.
The effects of sampling, impurities and foreign components will vary with the
type of material, to the extent that sampling uncertainties can become the
dominant factor in the total measurement error.
The New Brunswick Laboratory Davies and Gray titration is the basic
method for the determination of U content in gram size samples of all types of
non-irradiated materials. An automated titration system (Fig. 16), developed at
27
SAFEGUARDS TECHNIQUES AND EQUIPMENT
Elemental analysis
NBL Davies and Gray U U, U–Pu, U–Tha 0.05 0.05
titration
MacDonald and Savage Pu Pu materialsa 0.1 0.1
titration
Controlled potential Pu Pure Pu 0.1 0.1
coulometry materials
Ignition gravimetry U, Pu U oxides 0.05 0.05
K-edge C ray densitometry U, Th, Pu U, Pu, U–Pu, 0.2 0.2
U–Tha
K C ray fluorescence Pu Pu materialsa 0.2 0.2
analysis
Wavelength dispersive C ray Pu, U Pure U and Pu 0.3 0.3
fluorescence spectrometry oxides, and MOXa
Isotopic dilution mass U, Pu Spent fuel input 0.1 0.1
spectrometry solutions, Pu and
U–Pu materials,
HALW
Plutonium (VI) Pu Pu, U–Pua 0.2 0.2
spectrophotometry
Alpha spectrometry Np, AM, HAWL, Spent 5.0 5.0
CM fuel input
Isotopic analysis
Thermal ionization mass U and Pu All Pu and U 0.05b 0.05b
spectrometry isotopes materials, and
spent fuel input
solutions
High resolution g ray Pu Pure U and Pu 0.5–2.0 0.5–2.0
spectrometry (Ge detector) isotopes, materials
Am, Np
Gamma ray spectrometry 235U Low enriched 0.2–0.5 0.2–0.5
(NaI detector) U materials
Alpha spectrometry 238Pu Pu materials 0.2 0.3
28
DESTRUCTIVE ANALYSIS
29
SAFEGUARDS TECHNIQUES AND EQUIPMENT
30
DESTRUCTIVE ANALYSIS
31
SAFEGUARDS TECHNIQUES AND EQUIPMENT
FIG. 20. Robotized system for separation of spent fuel input solution samples.
32
DESTRUCTIVE ANALYSIS
33
SAFEGUARDS TECHNIQUES AND EQUIPMENT
34
DESTRUCTIVE ANALYSIS
chemical separations. 237Np (241Am) and 244Cm are also measured by alpha
spectrometry in combination with chemical separations.
Plutonium(VI) spectrophotometry is applicable to the determination of
milligram amounts of Pu in small samples of products, with accuracies similar
to those of titration.
Inductively Coupled Mass Spectrometry (ICP/MS) can determine most
elements at the parts per billion (ppb) level in solution. It is used for the
quantitative and qualitative determination of impurities in various matrices
(including many inspection sample types).
35
4. CONTAINMENT AND SURVEILLANCE
4.1. SURVEILLANCE
36
CONTAINMENT AND SURVEILLANCE
37
SAFEGUARDS TECHNIQUES AND EQUIPMENT
FIG. 22. DCM14 with video CCD camera (CCD: Charge Coupled Device).
very compact, the DCM14 performs many tasks required for a safeguards
surveillance system, including:
38
CONTAINMENT AND SURVEILLANCE
39
SAFEGUARDS TECHNIQUES AND EQUIPMENT
40
CONTAINMENT AND SURVEILLANCE
Photographic system
PHSR Photo Surveillance Unit (Minolta) Battery powered, twin and triple
Minolta film cameras used for general
and short term surveillance.
Phased out.
41
SAFEGUARDS TECHNIQUES AND EQUIPMENT
42
CONTAINMENT AND SURVEILLANCE
ALIS. The All In One Surveillance Unit (Fig. 23) is a mains operated,
fully self-contained digital surveillance system based on the DCM14 digital
camera module. All the components fit within a standard IAEA camera
enclosure with all the functionality of the DCM14 plus an intergraded inspector
interface terminal. Images and associated log files are stored on PCMCIA
flashcards. With a 660 Mbyte flashcard installed, ALIS can record between
40 000 and 50 000 images, depending on the compression used.
DSOS. The Digital Single Camera Optical Surveillance System (Fig. 24)
is based on DCM14 technology and is designed for applications where the
camera must be placed in a difficult to access location. DSOS consists of a
DCM14 based digital camera connected to a recording unit by a special
43
SAFEGUARDS TECHNIQUES AND EQUIPMENT
composite cable. The recording unit, which is also based on DCM14 technology,
allows an inspector to service the system at a more convenient and safe location
using procedures similar to those used when servicing an ALIS. DSOS may also
be used as a direct replacement for MIVS.
SDIS. The Server based Digital Surveillance System (Fig. 25) was initially
developed for remote monitoring applications. Its primary function is the
collection of images and data from up to 6 DCM14 surveillance cameras. It may
also be used for the direct interrogation of VACOSS seals. The SDIS server
sorts and classifies image and other data and can securely transfer images and
data to IAEA offices. An uninterrupted power supply unit is an integral part of
SDIS and has been designed to keep the system in full operation for about
48 hours without an external mains power supply. Figure 25 shows the internal
parts of SDIS.
(1) Unattended: The data are stored on a removable Jaz disk and are
physically carried to the GARS equipped review station.
(2) Remote monitoring: The data are transferred to an IAEA office by
telephone line (PSTN), ISDN, ADSL, frame relay or satellite link and
subsequently reviewed on a GARS equipped review station.
44
CONTAINMENT AND SURVEILLANCE
and data from each camera are initially stored on a large RAID array prior to
final storage on a removable digital linear tape (DLT).
ALIP. The All In One Surveillance Portable Battery Unit (Fig. 28) is a
battery operated, fully self-contained digital surveillance system based on the
45
SAFEGUARDS TECHNIQUES AND EQUIPMENT
The portable UWTV system (Fig. 29) is mainly used for verifying bundles
in spent fuel ponds of CANDU type reactors. It can also be used for all other
46
CONTAINMENT AND SURVEILLANCE
MORE. The Multi-System Optical Review Station (Fig. 30) was designed
to assist inspector review of CSMS, MIVS, MXTV and MOSS videotapes. With
the phasing out of CSMS and MIVS in 2002, MORE will continue to be used
for the review of MXTV and MOSS until those surveillance systems in the field
can be replaced by digital multi-camera equivalents (e.g. DMOS).
Each MORE system comprises an IBM compatible computer running
MORE software (with a built-in DAT drive to archive digitized images), a
display unit for the computer, a monochrome video monitor with automatic
CCIR/EIA-170 video standard detection, three videotape recorders to replay
surveillance tapes and a printer for reports. To utilize the scene change
detection option it is first necessary to create set-up files. Regions of interest
are defined within the recorded image captured by the camera in the field.
Regions of interest are defined in the field of view as areas of safeguards
significance (e.g. possible paths for the removal of safeguarded material).
47
SAFEGUARDS TECHNIQUES AND EQUIPMENT
GARS. The General Advanced Review Station software (Fig. 31) was
developed to run on a personal computer with the appropriate media drives to
review the recorded images from ALIP, ALIS, DSOS, DMOS, GDTV and SDIS.
At its simplest, GARS provides a flexible and user friendly inspector
interface (similar to popular commercial media players) for the review of
images and data from flashcards, Jaz disks, removable hard drives, CD-ROMS
and DLTs. GARS also has advanced features that can be used to reduce an
inspector’s review effort. Those features include image and data authentication
verification, image and data decryption, scene change detection of recorded
images, digital image enhancement and multiple camera display options.
4.2. SEALS
48
CONTAINMENT AND SURVEILLANCE
LRFO Laser Range Finder Option Option for the attachment of DCM14
based cameras to counter in-front-of-lens
tampering.
Under development.
WCSS Wall Containment Sensor System Wall penetration detection for triggering
surveillance images.
Under evaluation.
49
SAFEGUARDS TECHNIQUES AND EQUIPMENT
FIG. 32. Comparison of metal cap seal images for seal validation.
In situ verifiable seals are a kind of seal that is uniquely identifiable and
verifiable in the field. They fall into the three main categories of fibre optic,
ultrasonic and electronic seals.
FBOS. In the Fibre Optic General Purpose Seal the seal wire as used in
CAPS is replaced by a multi-strand plastic fibre optic loop with its ends
enclosed in a seal in such a way that a unique random pattern of fibres is
formed. This can be verified by shining a light into the ends of the loop and
observing the magnified pattern of the fibre ends either photographically or by
means of a digital recording of the image pattern. The COBRA Seal System II
50
CONTAINMENT AND SURVEILLANCE
51
SAFEGUARDS TECHNIQUES AND EQUIPMENT
FIG. 33. ACIV: Automatic COBRA Image Verifier with COBRA seal.
52
CONTAINMENT AND SURVEILLANCE
FIG. 34. VACOSS-S Electronic Seal with fibre optic loop, interface box and palmtop
computer.
interrogations. The internal batteries have a two year operational lifetime. For
installations with multiple seals in proximity, the seals may be connected in
series. All seals connected in this fashion can be read in sequence without
changing the connection. The electronics are potted in an X ray resistant
compound of epoxy and ceramic particles to frustrate any possible attempt at
reverse engineering. A tamper switch detects any opening of the seal housing.
The seal housing is opened only to replace the internal batteries and openings
are recorded as tamper events.
53
5. UNATTENDED MONITORING
54
UNATTENDED MONITORING
FIG. 35. The Chernobyl conditioning facility monitoring system being tested in the
Safeguards Equipment Support Facility.
55
SAFEGUARDS TECHNIQUES AND EQUIPMENT
the near future. The elements of these systems include an intelligent local
operating network (iLON) that interconnects all UMS devices, digital cameras
and the collect computer. The iLON controls triggering, time synchronization,
local authentication and startup functions. Multi-instrument collect (MIC)
software is used to poll all UMS devices to collect the data on a single collect
computer using the iLON. After an inspector extracts the data, Radiation
Review (RAD Review) is used to examine the data. RAD Review has the
capability of viewing the radiation signals received from the system. Its normal
suite of options includes peak counting algorithms based on various threshold
settings against various expected backgrounds and peak searches. The version
at the BN-350 includes a new integration tool in which the digital camera
images are also part of the database. For each sensor peak, the inspector can
‘click’ on the peak of interest and the associated camera image will be
displayed. This provides a powerful review tool that integrates two previously
separate review functions, allowing for the most cost effective review approach
for IAEA inspectors to draw the required safeguards conclusion.
In summary, the primary advantages of unattended verification
techniques are:
56
UNATTENDED MONITORING
57
SAFEGUARDS TECHNIQUES AND EQUIPMENT
and spent fuel assemblies out of the storage pond. Neutron detection in the
UFFM is contingent on shielding the neutron detectors from the intense
gamma radiation from the spent fuel. The sealed detector systems may be
attached to massive transport vehicles or to the storage pond wall near the
underwater entrance. Using both neutron and gamma detectors also makes
signal substitution by an adversary extremely difficult.
A typical transfer sequence involving several UFFM units could include
a fresh fuel assembly being brought to the reactor core and a spent fuel
assembly being retrieved and brought to the storage pond. The combination of
neutron and g ray signatures at the successive units characterizes the
transferred material as fresh fuel, spent fuel or another material (e.g. neutron
irradiated blanket material at a breeder reactor facility). Although individual
systems are facility specific, the neutron detectors on the transport vehicles are
typically 3He proportional counters or fission chambers and the g ray detectors
are typically NaI scintillators or ionization chambers. Underwater in the
storage pond the neutron detector is usually a 10B lined gas filled proportional
58
UNATTENDED MONITORING
counter and the g ray detector is a gas filled ionization chamber. UFFMs are
designed to monitor neutron and g ray counts continuously but store only data
that are significantly above background levels. The IAEA is in the process of
upgrading all data generators that collect this data with removable flash
memory capable of storing at least 100 days of data. This is equivalent to the
current inspection period and ensures the necessary fault tolerance in case of
computer failure. Surveillance cameras normally complement a UFFM over
the fuel transfer route.
ENGM. The Entrance Gate Monitor is included at plutonium fuelled
reactor facilities which incorporate the UFFM. This is a permanently installed
passive neutron coincidence collar detector (PNCL). Fresh fuel assemblies
entering the reactor facility must pass through the ENGM so that their Pu
content can be verified. Therefore the ENGM is the system which verifies the
amount of fresh fissile fuel in an assembly and serves as the first detector in a
sequence of detector systems which follow the movement of fuel assemblies
within the reactor facility.
VIFB. The CANDU Spent Fuel Bundle Counter (Fig. 37) is an
unattended system that monitors a strategic location in the spent fuel bundle
pathway of an on-load refuelled power reactor. Collimated g ray detectors
detect the fuel bundle as it passes. The proper placement of detectors and the
use of the appropriate algorithm for the facility enable the device to count the
bundles as they pass and record the direction in which they are moving, even
when two bundles are moving together, which is normally the case.
High operational reliability, great dynamic detection sensitivity (to
include all operational possibilities) and insensitivity to power outages are
some of the important features of the bundle counter. Sufficient redundancy
was built in to accommodate individual component failures without
compromising operation.
VIFC. The CANDU Core Discharge Monitor is a typical unattended
monitoring system operating in an inaccessible area. The VIFC detects
irradiated fuel upon discharge from the core face of a CANDU reactor.
Both neutron (normal on-power discharge signal) and g ray intensities are
continuously monitored. The inspector, upon reviewing the data, is able to
identify in a straightforward, unambiguous manner the abrupt but
characteristic change in count rate associated with fuel bundle discharge. The
review technique is valid for irradiated fuel discharge both when the reactor is
on-power and when it is shut down. Because of the linear increase in
background signal, the system can also track the operating power level of the
reactor.
The VIFC was designed to be fail-safe. Sufficient redundancy was built in
to accommodate individual component failures without compromising
59
SAFEGUARDS TECHNIQUES AND EQUIPMENT
60
6. REMOTE MONITORING SYSTEMS
61
SAFEGUARDS TECHNIQUES AND EQUIPMENT
62
REMOTE MONITORING SYSTEMS
Currently, all images and data are collected on-site and transmitted to
IAEA offices. While the inspectorate has a high degree of confidence that
activities of safeguards significance will be fully captured if the picture taking
interval is set properly, excessive amounts of data are transmitted due to the
large number of images. This results in high communication costs even though
a large proportion of those transmitted images contain scenes of no safeguards
significance or are redundant.
By employing techniques to detect only images where a change has
occurred or where an associated event triggers surveillance, it would be
possible to reduce the amount of redundant and non-safeguards relevant data
transmitted. Based on previous IAEA studies, the use of scene change
detection on fixed time interval recordings (SCD) can reduce the number of
redundant scenes and scenes of no safeguards significance by up to 90%. All
DCM14 based systems are SCD capable. The IAEA is currently building up its
field experience over the wide range of facility types so that it may be in a
position to fully accept such techniques with a high degree of confidence.
Currently, the IAEA uses PSTN, ISDN, frame relay and INMARSAT to
link remote sites to communication hubs or directly to the IAEA offices. High
costs are associated with the use of these conventional dial-up, network and
63
SAFEGUARDS TECHNIQUES AND EQUIPMENT
satellite services. Where available, the Internet provides comparatively low cost
data communications. By establishing a virtual private network (VPN) using an
Internet service provider as the carrier, the IAEA may be able to take
advantage of the economies of scale associated with these recent, alternative
communication methods. Virtual private networkss can provide possible
solutions to security concerns. Some typical commercial estimates predict
savings of 20–40% over a leased line and from 60–80% over a dial-up service.
64
7. DATA SECURITY
65
SAFEGUARDS TECHNIQUES AND EQUIPMENT
* Derived from the Open Systems Interconnection (OSI) Security Framework, the
Information Assurance Technical Framework (IATF) and the Common Criteria (CC).
66
DATA SECURITY
(a) Verification data are used during safeguards reviews carried out by
approved IAEA inspectors,
(b) Technical data are used during technical reviews carried out by approved
IAEA technical staff,
(c) Control data are used for the ‘real time’ control of the equipment either
by automated safeguards application programs or manually during
inspection or maintenance activities.
67
SAFEGUARDS TECHNIQUES AND EQUIPMENT
drawn regarding the data types in the model, there will be exceptions,
depending upon the specific design of the unattended monitoring.
This section will address IAEA requirements for securing data. Member
State requirements will be addressed in Section 7.3..
68
DATA SECURITY
“As a general rule, the detailed safeguards information from the Agency
equipment should not be made available to the States. However,
arrangements could be made for sharing of certain data as part of the
cooperation arrangements with the State authorities.”
2 For example, if public key based signatures are used basic non-repudiation of
racy may allow the prediction of future inaccuracies. In such cases instrument data may
need to be protected until the instrument is recalibrated.
69
SAFEGUARDS TECHNIQUES AND EQUIPMENT
The IAEA Policy Paper on Remote Monitoring (see footnote 2) states that:
4 More sophisticated attacks might use historical data to predict future instru-
ment errors. In such cases confidentiality protection would be required until the equip-
ment is recalibrated.
5 INTERNATIONAL ATOMIC ENERGY AGENCY, IAEA Safeguards
networked systems.
70
DATA SECURITY
(a) The distribution of common time values to sensors by the collect computer,
(b) The control of sensor operation (e.g. camera focus, pan/tilt, sampling rate),
(c) The activation of test and calibration routines in sensors.
In the future, and provided that adequate security measures can be put
into place, the overall remote monitoring system might be controlled from
IAEA offices. In such cases it will be necessary to ensure that remote log-in and
access controls are adequate to ensure the secure control of the equipment.
Typical control information might include:
71
SAFEGUARDS TECHNIQUES AND EQUIPMENT
Integrity and authentication protection are required for all such data to
prevent their modification. Confidentiality is required for some control data
since observation may reveal sensitive information such as the criteria used to
adjust surveillance triggers.7 Access control and availability protection must be
provided to prevent threat sources from masquerading as authentic sources of
control data and to prevent denial of service attacks at the communications ports.
Control commands can also be susceptible to traffic analysis, whereby an
observer gathers knowledge from an analysis of traffic patterns. For example,
even if a command is encrypted, if the command results in a higher rate of data
transmission an observer can likely draw valid conclusions about the content of
the command.
All required protection measures must be strong enough to withstand
external attacks. These measures are required throughout the lifetime of the
data.
“Article 14:
Article 15:
72
DATA SECURITY
9 Such deployments are not expected. The use of wireless networks and shared
networks is not recommended but may be required due to the constraints on specific
installations.
73
SAFEGUARDS TECHNIQUES AND EQUIPMENT
For UMS and RMS, and for the purposes of this security architecture,
Member State confidentiality requirements impact two areas:
(1) Ensuring that adequate protection is provided for data links between
sensors and collect computers if not otherwise protected by physical
boundaries provided by Member States,
(2) Ensuring adequate protection of the data stored on transportable media.
74
8. ENVIRONMENTAL SAMPLING
The IAEA Clean Laboratory for Safeguards (Fig. 41) was inaugurated in
December 1995 with the goal of providing a Class 100 clean-room capability for
the provision and certification of sampling kits and for the receipt, screening
and distribution of environmental samples from safeguards inspections. This
facility significantly reduces the risk of cross-contamination that might lead to
incorrect safeguards conclusions. The Clean Laboratory consists of over 200 m2
of laboratory space, with approximately 50 m2 at the ISO Class 5 cleanliness
level (Fig. 42). The laboratory is equipped with a suite of analytical techniques,
including a, b, g and C ray fluorescence spectrometry, scanning electron
microscopy with electron probe analysis and high sensitivity thermal ionization
mass spectrometry.
Environmental swipe samples received at the Clean Laboratory are given
a code number to maintain confidentiality about their origin. The samples are
then measured by low background g ray spectrometry to detect the presence of
actinide elements (primarily U and Pu) and fission or activation products (such
75
SAFEGUARDS TECHNIQUES AND EQUIPMENT
as 60Co, 137Cs and 106Ru); the samples are then measured by C ray fluorescence
spectrometry to detect the presence of U, Pu or other important elements.
Alpha/beta counting is then applied to radioactive samples to detect actinides
or b emitting isotopes such as 3H, 90Sr or 99Tcm.
FIG. 42. Analyst working in the clean module of the IAEA Clean Laboratory.
76
ENVIRONMENTAL SAMPLING
with pulse counting detection. The ultimate sensitivity of this method is in the
10-15 g range for U and Pu.
One of the main activities of the Clean Laboratory is the preparation of
clean sampling kits for collecting environmental samples. A kit for the
collection of swipe samples is shown in Fig. 43. This consists of all the supplies
needed by an IAEA inspector in the field: clean swipe cloths, plastic minigrip
bags, clean-room gloves, a sample data form, a pen and labels. A roll of
aluminium foil is provided to establish a clean working surface. A different type
of swipe sampling kit is required for sampling inside hot cells, where the
subsamples must be taken with remote manipulators and shipped back to the
IAEA in a special lead lined container because of their higher radiation level.
77
SAFEGUARDS TECHNIQUES AND EQUIPMENT
individual g emitting isotopes such as 60Co, 95Zr, 106Ru, 134Cs, 137Cs and 241Am.
Depending on the number of counts collected, the precision and accuracy of
these measurements are in the range 2–5%rel. The absolute activity of
individual radioisotopes is not as important as the relative activity compared
with a selected isotope such as 137Cs.
78
ENVIRONMENTAL SAMPLING
sample treatment procedures, drop deposition of the sample elements onto the
mass spectrometer filament and use of a pulse counting detection system with
high detection efficiency. The mass spectrometer is shown in Fig. 44.
Isotopic spikes (233U, 242Pu or 244Pu) are added to the samples during
chemical processing to allow U or Pu concentrations to be determined using
the isotopic dilution method. Isotope ratios are measured for all isotopes of U
or Pu relative to the spike isotope and the isotopic composition of the sample
is estimated by subtraction of the known isotopic composition of the spike. The
accuracy and precision of this technique are about 1–10% for a U or Pu
concentration in the 10-9 g range and for the ratios of the major isotopes in the
sample.
79
SAFEGUARDS TECHNIQUES AND EQUIPMENT
80
ENVIRONMENTAL SAMPLING
81
SAFEGUARDS TECHNIQUES AND EQUIPMENT
Once an interesting particle has been identified in the ion microscope mode, it
can be measured to completion by focusing the primary ion beam on it and
stepping between the isotopes of interest. This will yield the complete isotopic
composition of the particle, including the minor isotopes such as 234U and 236U.
Depending on the size of the particle, the precision and accuracy of this
approach can be l%rel. for isotopes at the 1–90% abundance level and up to
10%rel. for minor isotopes.
82