Preventing nuclear terrorism relies on overlapping layers of defense: securing the materials that could fuel an attack, detecting them if they move, and coordinating intelligence across borders to stop plots before they materialize. No single system is foolproof, which is why governments, international agencies, and law enforcement treat this as a problem requiring redundancy at every stage.
Securing Nuclear Material at the Source
The most effective way to prevent a nuclear attack is to keep weapons-usable material out of unauthorized hands in the first place. The highest-priority materials are plutonium and highly enriched uranium (HEU), the two substances capable of sustaining a nuclear chain reaction. Several countries still maintain stockpiles of HEU for weapons programs or research reactors, and a global effort has been underway for decades to either convert these stocks to less dangerous, low-enriched forms or consolidate them in fewer, better-secured locations.
Nine countries currently possess nuclear weapons, with others maintaining enrichment capabilities that raise proliferation concerns. Pakistan is believed to rely on HEU for its arsenal, while India and Israel primarily use plutonium. North Korea operates a known uranium enrichment facility at Yongbyon. Iran has accumulated enough uranium enriched to 60 percent to theoretically build a weapon, though experts assess such a device would be large and crude. Each of these programs represents a potential source of material if security breaks down, which is why international pressure to limit and monitor enrichment remains a cornerstone of prevention.
Tracking Incidents of Theft and Smuggling
The International Atomic Energy Agency maintains the Incident and Trafficking Database, which catalogs every confirmed case of nuclear or radioactive material turning up where it shouldn’t. As of December 2024, the database held 4,390 confirmed incidents reported since 1993. Of those, 353 were connected or likely connected to trafficking or malicious intent. Another 1,065 involved unauthorized possession where intent was unclear, and the remaining 2,972 were accidental losses, improper disposals, or inadvertent shipments.
In 2024 alone, 32 countries reported 147 incidents, a slight decrease from the year before. Most cases in the database involve radioactive sources rather than weapons-grade material, but the sheer volume underscores how frequently material escapes proper control. Even non-weapons-grade isotopes pose a threat if used in a “dirty bomb,” a conventional explosive designed to scatter radioactive contamination across an area.
Locking Down Radioactive Sources
Hospitals, research labs, and industrial facilities use intensely radioactive isotopes for cancer treatment, sterilization, and imaging. Cesium-137 and cobalt-60 are among the most common, and both could cause serious contamination if detonated with conventional explosives. After September 11, 2001, the U.S. Nuclear Regulatory Commission and its state-level counterparts issued new orders requiring any facility holding risk-significant quantities of these materials to implement enhanced security.
Those requirements now include background checks on personnel with access, physical access controls, continuous monitoring for unauthorized entry, delay and deterrence measures designed to slow an adversary long enough for a security response, and tracking of all transfers and shipments. For cesium chloride sources specifically, a joint federal “hardening” project identified relatively simple, cost-effective retrofits for existing equipment, things like physical barriers and tamper-proofing that add extra delay if someone attempts to remove a source. These measures don’t eliminate risk entirely, but they raise the difficulty and time required for theft to a level where detection and response become viable.
Detection at Borders and Seaports
If material does leave a facility, the next line of defense is catching it in transit. Radiation portal monitors are deployed at border crossings, seaports, and facility exits around the world. These systems are calibrated to detect both gamma rays (emitted by uranium) and neutrons (emitted by plutonium). A standard portal monitor is designed to trigger an alarm at least 50 percent of the time when one kilogram of weapons-grade uranium, enriched to 90 percent, passes through at low speed in the bed of a pickup truck. For plutonium, the detection threshold is far lower: as little as 10 grams of low-burnup plutonium can set off an alarm under worst-case conditions, compared to 1,000 grams of HEU.
At seaports, the challenge is scale. The Megaports Initiative, established in 2003, installed radiation detection equipment at foreign ports to scan shipping containers regardless of destination. By 2012, the program had completed installations at 42 ports across 31 countries, with plans for 100 total, at a cost of roughly $850 million. Partner countries received equipment, training, and about three years of maintenance support before taking full ownership. A parallel program, the Container Security Initiative, stationed U.S. customs officers at foreign ports to examine high-risk containers before they shipped to the United States. The two programs operated side by side at 29 ports, though government audits found their coordination was insufficient, a recurring theme in layered security systems where different agencies share responsibility.
International Cooperation Frameworks
Nuclear terrorism is a borderless threat, and preventing it requires countries to share intelligence, align their detection capabilities, and coordinate law enforcement. The Global Initiative to Combat Nuclear Terrorism, co-chaired by the United States and Russia and involving dozens of partner nations, organizes its work through three specialized groups focused on nuclear detection, nuclear forensics (tracing material back to its origin after a seizure), and response and mitigation if an incident occurs. Partner countries commit to a shared set of principles that include developing interoperable detection systems and sharing information through a secure, unclassified web portal.
On the law enforcement side, Interpol runs a dedicated program against radiological and nuclear terrorism that is driven by criminal intelligence rather than broad surveillance. Its officers work with member countries to respond to attacks on nuclear facilities, lead searches for lost or “orphan” radioactive sources, and direct operations targeting black market purchases of radioactive material. The program emphasizes measurable, sustainable cooperation tailored to each country’s specific vulnerabilities, because the weak link in any global security system is the country with the least capacity to enforce it.
Why Layered Defense Matters
No single barrier stops every scenario. A determined group might acquire material from a poorly secured facility in one country, transport it through a border crossing without portal monitors, and assemble a device in a third location. The strategy behind nuclear terrorism prevention is to make each of those steps independently difficult, so that the probability of succeeding at all of them becomes vanishingly small.
Securing material at the source is the highest-value investment because it addresses the problem before it becomes a detection challenge. Portal monitors and port scanning catch what slips through, but they have physical limitations: shielding, creative concealment, and the sheer volume of global commerce all work against perfect screening. Intelligence sharing and law enforcement fill in the gaps by targeting the people and networks attempting to move material, often catching plots through informants, financial tracking, or communications intercepts long before a device is built.
Preparedness also plays a role, even though it sits on the response end rather than prevention. If a radiological release does occur, protective measures for the public are straightforward but time-sensitive. Potassium iodide, for instance, blocks the thyroid from absorbing radioactive iodine and is most effective when taken within 24 hours before or four hours after exposure. One dose protects for 24 hours. These kinds of preparations don’t prevent an attack, but they reduce the leverage that a terrorist gains from one, which is itself a form of deterrence.

