National Library of Energy BETA

Sample records for address secure file

  1. OHA Security Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our Security decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of...

  2. Addressing Security and Reliability Concerns of Large Power Transformers |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Services » Addressing Security and Reliability Concerns of Large Power Transformers Addressing Security and Reliability Concerns of Large Power Transformers Large power transformers (LPTs) are critical to the nation's power grid, with more than 90 percent of consumed power passing through high-voltage transformers at some point. LPTs, however, face a number of challenges that make them one of the most vulnerable components on the grid. They are expensive, difficult to

  3. Addressing Security and Reliability Concerns of Large Power Transforme...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    With the nation's security and economy dependent on the reliable delivery of electricity, ... a Joint Electromagnetic Pulse (EMP) Resilience Strategy for the grid and are now ...

  4. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  5. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    SciTech Connect (OSTI)

    Thomas D'Agostino

    2009-07-14

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  6. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    SciTech Connect (OSTI)

    Thomas D'Agostino

    2009-07-14

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  7. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  8. Network Security Mechanisms Utilizing Dynamic Network Address Translation LDRD Project

    SciTech Connect (OSTI)

    PRICE, CARRIE M.; STANTON, ERIC; LEE, ERIK J.; MICHALSKI, JOHN T.; CHUA, KUAN SEAH; WONG, YIP HENG; TAN, CHUNG PHENG

    2002-11-01

    A new protocol technology is just starting to emerge from the laboratory environment. Its stated purpose is to provide an additional means in which networks, and the services that reside on them, can be protected from adversarial compromise. This report has a two-fold objective. First is to provide the reader with an overview of this emerging Dynamic Defenses technology using Dynamic Network Address Translation (Dynat). This ''structure overview'' is concentrated in the body of the report, and describes the important attributes of the technology. The second objective is to provide a framework that can be used to help in the classification and assessment of the different types of dynamic defense technologies along with some related capabilities and limitations. This information is primarily contained in the appendices.

  9. Address:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Additive Manufacturing: Pursuing the Promise Additive Manufacturing: Pursuing the Promise Fact sheet overviewing additive manufacturing techniques that are projected to exert a profound impact on manufacturing. Additive Manufacturing: Pursuing the Promise (1.42 MB) More Documents & Publications Unlocking the Potential of Additive Manufacturing in the Fuel Cells Industry Fiber Reinforced Polymer Composite Manufacturing Workshop A National Strategic Plan For Advanced Manufacturing

    Address:

  10. How Do You File A Whistleblower Complaint? | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) How Do You File A Whistleblower Complaint? The employee must first : Exhaust all applicable grievance or arbitration procedures provided by their employer prior to filing a complaint with DOE Submit the written complaint to the DOE/NNSA SC Employee Concerns Office. The complaint becomes a public document. File the complaint within 90 days of the alleged retaliation

  11. Department of Energy FILE& National Nuclear Secur~ty Administration

    Office of Legacy Management (LM)

    FILE& National Nuclear Securty Administration Nevada Site Office 2005 M U 22 AII 9 5 ... Salmon Site location) 2. Two underground nuclear tests conducted by DOE during the 1960's, ...

  12. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    SciTech Connect (OSTI)

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  13. Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security

    Broader source: Energy.gov [DOE]

    During a site visit to the Native Village of Teller in April 2012, the Office of Indian Energy's Strategic Technical Assistance Response Team helped the community successfully transfer 10,000 gallons of fuel to a bulk fuel facility to secure the community's heating supply for the winter.

  14. REVIEW OF THE POTENTIAL OF NUCLEAR HYDROGEN FOR ADDRESSING ENERGY SECURITY AND CLIMATE CHANGE

    SciTech Connect (OSTI)

    James E. O'Brien

    2010-06-01

    Nuclear energy has the potential to exert a major positive impact on energy security and climate change by coupling it to the transportation sector, primarily through hydrogen production. In the short term, this coupling will provide carbon-free hydrogen for upgrading increasingly lower quality petroleum resources such as oil sands, offsetting carbon emissions associated with steam methane reforming. In the intermediate term, nuclear hydrogen will be needed for large-scale production of infrastructure-compatible synthetic liquid fuels. In the long term, there is great potential for the use of hydrogen as a direct vehicle fuel, most likely in the form of light-duty pluggable hybrid hydrogen fuel cell vehicles. This paper presents a review of the potential benefits of large-scale nuclear hydrogen production for energy security (i.e. displacing imported petroleum) and reduction of greenhouse gas emissions. Lifecycle benefits of nuclear energy in this context are presented, with reference to recent major publications on this topic. The status of US and international nuclear hydrogen research programs are discussed. Industry progress toward consumer-grade hydrogen fuel cell vehicles are also be examined.

  15. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  16. FILE

    Office of Legacy Management (LM)

    c&o--L>+/ co.o-09 ~~Epq-J+~~jDU" 1 . [o( / 5-/-- 1, "I ' -i, [ . - -. j s: FILE :3r.jNER is} -------.- pas',: Current: -----__---_---__-------- ----____-_________________ Cwner ccntacted 0 yes 0 nag i+ yet,? date czntacted ----___--I__- Ty-;Pfz ,' F iTiC~CC2~j 1 iljbj AA-r-ti--=' ="L---- /8;' ; z.eseaf-ch & sevei apment EJ F' raducticx scale tssting rJ Pilot si-jle 0 ' jench Scale Fracess 0 Theoretical Studies 0 Samp:! e & haivsis 0 Fz-citity Tvpe 0 Manui artur i ng

  17. PSH-12-0055- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. On October 11, 2011, the individual filed for personal bankruptcy under Chapter 7 of the federal bankruptcy laws. Upon being apprised of this, the local security office (LSO) summoned the individual for an interview with a personnel security specialist in order to address the security concerns raised by this filing.

  18. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  19. change_address_111609

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CHANGE OF ADDRESS and EMERGENCY NOTIFICATION TO: HUMAN RESOURCES DATE: Z# Social Security # Print First Name Print Middle Name or Initial Print Last Name (Currently in Payroll System) Complete appropriate changes: NAME CHANGE: Print Name Change to ADDRESS CHANGE: Mailing Address City State Zip TELEPHONE NUMBER CHANGE: FROM Area Code and # TO Area Code and # Cell Area Code and # Home phone Message phone EMERGENCY NOTIFICATION CHANGE: Name Relationship Day Phone Evening Phone Address City State

  20. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  1. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  3. Keynote Address

    Broader source: Energy.gov [DOE]

    Wednesday's keynote address by Dr. David Danielson, Assistant Secretary for Energy Efficiency and Renewable Energy, U.S. Department of Energy.

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  5. Filing Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Filing Information Filing Information The Office of Hearings and Appeals (OHA) encourages electronic filing of submissions, by e-mail or by telefax. OHA's e-mail address for filing submissions is OHA.filings@hq.doe.gov; the OHA telefax number is (202) 287-1415. Note, however, that because of signature issues, we may ask you to file a signed original of a document. We will send an acknowledgment (by letter or e-mail) upon our receipt of all principal pleadings. If you choose to file by regular

  6. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signatures on File

  7. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signatures on File

  8. File Storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage File Storage Disk Quota Change Request Form Carver File Systems Carver has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC Global File system. Each file system serves a different purpose. File System Home Scratch Project Environment Variable Definition $HOME $SCRATCH or $GSCRATCH No environment variable /project/projectdirs/ Description Global homes file system shared by all NERSC systems except

  9. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC Global File system. Each file system serves a different purpose. File System Home Scratch Project Environment Variable Definition $HOME $SCRATCH or $GSCRATCH No environment variable /project/projectdirs/ Description Global homes file system shared by all NERSC systems except

  10. TFC-0010 - In the Matter of National Security Archive | Department...

    Broader source: Energy.gov (indexed) [DOE]

    The National Security Archive filed an Appeal from a determination that the National Nuclear Security Administration (NNSA) issued on April 21, 2011. In that determination, NNSA...

  11. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  12. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  13. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  14. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  15. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to

  16. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ATLAS uses the various systems: /common In the past ATLAS used /common primarily for their software installations but with cvmfs (see below) this is no longer necessary. ATLAS users also have made personal directories under /common/atlas. However, this is not the intended use of /common, as described on Other File

  17. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where

  18. Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signature on File Signature on File 5/29/08

  19. Security, Emergency Planning & Safety Records | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Protection program records include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive ...

  20. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...

    Broader source: Energy.gov (indexed) [DOE]

    Protection program records include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive ...

  1. EEO Complaints Process | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Process A National Nuclear Security Administration employee or applicant for Federal employment may file an EEO complaint if the employee or applicant believes that heshe has been ...

  2. TSO-1105- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual currently is employed by a DOE contractor, and has held a DOE security clearance for several years. Based on issues contained in the individual’s security file, the Local Security...

  3. Addressing the workforce pipeline challenge

    SciTech Connect (OSTI)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  4. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity ...

  5. June 2012 | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    June 2012 June 29, 2012 US Releases Updated Plutonium Inventory Report File Pu Inventory 6.29.12.docx June 27, 2012 World Institute for Nuclear Security Workshop at Y-12 Brings Together More than 20 Countries File 2012-06-27 WINS Workshop.docx June 18, 2012 NNSA Production Office Open for Business File NPO Open Release 06.18.12

  6. Dynamic Non-Hierarchical File Systems for Exascale Storage

    SciTech Connect (OSTI)

    Long, Darrell E.; Miller, Ethan L

    2015-02-24

    appliances. These search applications are often optimized for a single file system, making it difficult to move files and their metadata between file systems. Users have tried to solve this problem in several ways, including the use of separate databases to index file properties, the encoding of file properties into file names, and separately gathering and managing provenance data, but none of these approaches has worked well, either due to limited usefulness or scalability, or both. Our research addressed several key issues: • High-performance, real-time metadata harvesting: extracting important attributes from files dynami- cally and immediately updating indexes used to improve search. • Transparent, automatic, and secure provenance capture: recording the data inputs and processing steps used in the production of each file in the system. • Scalable indexing: indexes that are optimized for integration with the file system. • Dynamic file system structure: our approach provides dynamic directories similar to those in semantic file systems, but these are the native organization rather than a feature grafted onto a conventional system. In addition to these goals, our research effort will include evaluating the impact of new storage technolo- gies on the file system design and performance. In particular, the indexing and metadata harvesting functions can potentially benefit from the performance improvements promised by new storage class memories.

  7. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ALICE uses the various systems: /common ALICE uses /common to build the software that supports its grid-based automated production work. This software includes AliRoot, Geant, AliEn, and XRootD. /eliza6, /eliza8, /eliza17 ALICE has space on 3 elizas: 16TB on /eliza6, 6TB on /eliza8 and 11TB on /eliza17. The space on

  8. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how STAR uses the various systems: /common The STAR software is installed on /common. For 32sl44 it is under /common/star/star44 and for sl53 it is under /common/star/star53. In both cases the software consists primarily of a STAR-specific ROOT installation on which releases of the STAR libraries are built as shown on the

  9. FileSys.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Navigating NERSC File Systems May 3, 2011 David Turner NERSC User Services Group * Focus on user-writable file systems * Global file systems * Local file systems * Policies * ...

  10. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of the individual to address concerns about his falsification of information and alcohol use. The individual's behavior raised security concerns under Criteria F, H and L....

  11. To: File

    Office of Legacy Management (LM)

    In 1931 and 19Siz the Atomic Energy Commission He; and Safety Division participated in ... Information obtained from EPFI files indicates that the facilit continued operations ...

  12. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  13. File Transfer Protocol Guard Version 1.5

    Energy Science and Technology Software Center (OSTI)

    1999-01-13

    The FTP Guard provides a means for securely transferring files from an unclassified network to a classified network. Files are moved using the FTP protocol. To a user, the FTP Guard appears to be an FTP proxy server. The FTP Guard does not move files from the classified network to the unclassified network.

  14. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Cyber Security Audit and Attack Detection Toolkit project developed two commercial solutions-Bandolier and Portaledge. The Bandolier Audit Files enable energy sector asset ...

  15. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Energy Savers [EERE]

    audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. ...

  16. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  17. World Institute for Nuclear Security Workshop at Y-12 Brings...

    National Nuclear Security Administration (NNSA)

    Nuclear Security (WINS). The workshop is jointly sponsored by the National Nuclear Security Administration (NNSA) and the Department of Defense (DoD). File 2012-06-27 WINS Workshop

  18. 1987 RECS Public Use Microdata Files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cvs file File 3: Type of Energy and Equipment text file cvs file File 4: Household Demographics text file cvs file File 5: Presence of Appliances text file cvs file File 6: Energy...

  19. TO: FILE

    Office of Legacy Management (LM)

    Homer Watson, Wright Paterson Air Force Base, as a starting point. AWmb ' I. .' ..x; . .:yx . . . . : File a.%-I. (d : AIR FORCE PLANT.36. EvENGALE, OilIO 'w .*:3 '. - ...

  20. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This file system is not configured for high IO performance. Home directories should ... Furthermore, SSH will not allow you to login if HOME.ssh is writeable by anyone other ...

  1. TO: FILE

    Office of Legacy Management (LM)

    ... C . Young ,.+-' E. Mitchal file FUS,RAP WI.4,, PA.40 L.-J Iany in :ee, anda Area ' radioactive *hap 6 as a d2 EC stop for 100 employee, and )mme :nd both these Ind Milwaukee

  2. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  3. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SAFETY RECORDS | Department of Energy 8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive unclassified information, special nuclear materials, nuclear weapons, other Government property) ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,

  4. Security for Radioactive Sources: Fact Sheet | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Security for Radioactive Sources: Fact Sheet March 23, 2012 Radioactive materials are a critical and beneficial component of global medical, industrial, and academic efforts. The possibility that these materials could be used by terrorists is a national security concern. The National Nuclear Security Administration (NNSA), along with international and domestic partners, addresses radiological material security as part of its nuclear nonproliferation mission. US

  5. Frequently Asked Questions on Filing EISs with EPA's Office of...

    Office of Environmental Management (EM)

    Filing EISs with EPA's Office of Federal Activities This letter from the Director of the Environmental Protection Agency's Office of Federal Activities addresses common questions...

  6. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  7. Nonproliferation Policy | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation Policy Challenge: Address evolving threats/challenges to the nonproliferation and arms control regimes. Solution: Develop programs and strategies to address emerging nonproliferation and arms control challenges and opportunities. Learn More 10 CFR Part 810 Related Topics international security international security policy NIS nuclear controls safeguards safeguards and security verification Related News Nuclear Verification International Nuclear Safeguards Nonproliferation and

  8. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  9. A Metadata-Rich File System

    SciTech Connect (OSTI)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  10. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  11. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Challenges | Department of Energy Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges. Southern recognizes that many policy and logistical concerns must be addressed for the promises of smart grid technologies and applications to be fully realized in ways that are beneficial, secure, and cost-effective

  12. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  13. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-08-15

    This Guide addresses the implementation steps for achieving safeguards and security systems that support the Department's projection objectives.

  14. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  15. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  16. Clearance Adjudication | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Clearance Adjudication The Office of Personnel and Facility Clearances and Classification (OPFCC) submits the clearance paperwork to the proper investigative agency, the Office of Personnel Management (OPM) or the Federal Bureau of Investigation (FBI). Upon receipt of the investigation, the paperwork is matched to the Personnel Security File and assigned to a Personnel Security Specialist, who will adjudicate the investigation, using the Presidential Adjudicative Guidelines. If security concerns

  17. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Cases Security Cases RSS August 19, 2016 PSH-16-0014 - In the Matter of Personnel Security Hearing On August 19, 2016, an Administrative Judge issued a decision in which he determined that an individual's access authorization should not be restored. According to the Notification Letter, the individual's financial irresponsibility had led to a Chapter 13 bankruptcy that he filed in late 2014. Primary causes of the individual's financial overextension included providing $80,000 in support

  18. Secure Smart Grid Association | Open Energy Information

    Open Energy Info (EERE)

    Smart Grid Association Jump to: navigation, search Name: Secure Smart Grid Association Address: 2374 S Josephine St Place: Denver, Colorado Zip: 80210 Region: Rockies Area Number...

  19. FAQS Reference Guide – Safeguards and Security

    Broader source: Energy.gov [DOE]

    This reference guide addresses the competency statements in the May 2009 edition of DOE-STD-1171-2009, Safeguards and Security Functional Area Qualification Standard.

  20. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  1. Principal Associate Director - Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Principal Associate Director - Global Security As Principal Associate Director for Global Security, Terry Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505) 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C.

  2. CEKRM. FILES

    Office of Legacy Management (LM)

    *:-I c-Y,- -.>A - L z.23 ' ,gQ+ CEKRM. FILES : -- i" ry .' ;,:;;:i ;- ' _ :;, I' -. .-,- p.." * .i' ' --yr:,? ,5 .Y' :?!, .I I >L L qgy~T.5 ,-:,,. \>,' yt r, .,-:,7 ,A : _ . . T_ 31' :;:: . .' : z ^., - -; &.' -" ' \-,-y . ..L' .:"A .:1i2*;,1 1- .,: _.,-.- 1 ,... _ . , , 2; J..i"!w , . . . .' _ \ ' d>; : r. . _ " ' . ;I 2: a : ..i. ,. 7, I . :ri cij?TL-i; 12, ;;,2;-,: ;. ." * 1. 1 .:1 : :: .' I .-=-. I. Iv-.. . . . . - i. ; i -2. ./ ..l,..- '

  3. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  4. PSH-11-0025- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual’s security file,...

  5. PSH-12-0020- In the Matter of Personnel Security Hearing

    Office of Energy Efficiency and Renewable Energy (EERE)

    The individual is employed by a DOE contractor, and has held a DOE access authorization for several years. Based on financial issues contained in the individual’s security file, the Local Security...

  6. FIA-16-0020- In the Matter of the National Security Archive

    Office of Energy Efficiency and Renewable Energy (EERE)

    On March 9, 2016, OHA granted in part a FOIA Appeal filed by the National Security Archive (Appellant) from a determination issued to it by the National Nuclear Security Administration (NNSA). In...

  7. FIC-12-0003- In the Matter of the National Security Archive

    Broader source: Energy.gov [DOE]

    On August 7, 2015, OHA denied a FOIA Appeal filed by the National Security Archive of a determination issued by the Office of Intelligence and Counterintelligence (IN).  The National Security...

  8. PSH-11-0021- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual’s security file,...

  9. FIC-16-0002- In the Matter of the National Security Archive

    Office of Energy Efficiency and Renewable Energy (EERE)

    On April 7, 2016, OHA issued a decision granting in part a FOIA Appeal filed by the National Security Archive from a determination issued to it by the DOE’s National Nuclear Security Administration...

  10. NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sharing between platforms. File systems are configured for different purposes. On each machine you have access to at least three different file system Home: Permanent, relatively...

  11. Files systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Steps on Climate: United States Sarah O. Ladislaw Director and Senior Fellow, Energy and National Security Program Three Avenues for Action Post-Paris * Operationalize international framework * Deliver on targets and commitments * Focus on longer term goal setting United States: Climate Action Plan (2013) Mitigation Adaptation International Leadership  Deploy clean energy - Clean Power Plan - RE incentives - Innovation  21 st century transport sector - Increase fuel economy - Advanced

  12. Environmental Security and Restoration | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Environmental Security & Restoration Argonne's work in environmental security and restoration addresses soil, surface water, sediment, and groundwater at contaminated sites. Argonne's work in environmental restoration addresses soil, surface water, sediment, and groundwater at contaminated sites, starting with environmental evaluations and planning projects. Assessments are also conducted of approaches for long-term stewardship of remediated sites with residual contamination. Remedies range

  13. NX Configuration File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Configuration File NX Configuration File This is the NX configuration file that you will need to connect to NERSC NX Server: NX5Confgure.nxs.zip To use this file, please follow the Online Tutorial. Last edited: 2016-04-29 11:34:57

  14. Brinkman Addresses JLab | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brinkman Addresses JLab Brinkman Addresses JLab Brinkman Addresses JLab Dr. William F. Brinkman, Director of the Department of Energy's Office of Science, addressed Jefferson Lab staff on the Office of Science perspective during his visit Monday. Dr. William F. Brinkman, Director of the Department of Energy's Office of Science, addressed Jefferson Lab staff on the Office of Science perspective during his visit Monday. "There is still a lot of interesting nuclear physics that we want to do

  15. Security Improvements Project Completed Ahead of Schedule, $20 Million

    National Nuclear Security Administration (NNSA)

    Under Budget | National Nuclear Security Administration | (NNSA) Security Improvements Project Completed Ahead of Schedule, $20 Million Under Budget April 07, 2014 The National Nuclear Security Administration's (NNSA) Security Improvements Project (SIP) was recently completed ahead of schedule and approximately $20 million under its original budget of $72 million. File 2014-04-08 SIP.docx NPO Press Releases September 2016 (1) August 2016 (1) May 2016 (1) February 2016 (1) January 2016 (1)

  16. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  17. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  18. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  19. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  20. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  1. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  2. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  3. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  4. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  5. Frequently Asked Questions on Filing EISs with EPA's Office of Federal Activities

    Broader source: Energy.gov [DOE]

    This letter from the Director of the Environmental Protection Agency's Office of Federal Activities addresses common questions related to the timing for filing EISs.

  6. Partially Superceded- Frequently Asked Questions on Filing EISs with EPA's Office of Federal Activities (EPA, 1994)

    Office of Energy Efficiency and Renewable Energy (EERE)

    This letter from the Director of the Environmental Protection Agency's Office of Federal Activities addresses common questions related to the timing for filing EISs.

  7. Frequently Asked Questions on Filing EISs with EPA's Office of Federal Activities (EPA, 1994)

    Broader source: Energy.gov [DOE]

    This letter from the Director of the Environmental Protection Agency's Office of Federal Activities addresses common questions related to the timing for filing EISs.

  8. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  9. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Office of Energy Efficiency and Renewable Energy (EERE)

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  10. Keynote Address | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Keynote Address Keynote Address An overview and update on Environmental Management given by Alice Williams, Associate Principal Deputy Assistant Secretary of the Office of Environmental Management. Keynote Address (2.53 MB) More Documents & Publications EIS-0337-SA-01: Supplement Analysis West Valley Demonstration Project Low-Level Waste Shipment Chairs Meeting - October 2012

  11. Privacy and Security Notice | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the U.S. Government. It is for authorized use only. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or all uses of this system, associated connected systems and all files may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized site, Department of Energy, and law enforcement personnel, as well as authorized

  12. Radiological Security Program | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) ...

  13. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  15. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  16. DOE Integrated Security System (DISS) preliminary communication security analysis

    SciTech Connect (OSTI)

    Sweeney, D. J.

    1993-10-01

    The purpose of this analysis is to document a technical approach to improve DOE Integrated Security System (DISS) dial-up communications security and the requirements to address them. This document is not intended as a comprehensive analysis of the security aspects of the DISS computer system but rather as an analysis of the dial-up communications security as it pertains to the use of the DISS database in the new DOE Automated Visitors Access Control System (DAVACS) procedures. Current access controls into the DISS will be discussed with emphasis on the DAVACS procedures. Recommendations will be provided for increasing the dial-up communications security into DISS as it relates to the automated visit procedures. Finally a design for an encrypted dial-up communication link to DISS will be given.

  17. New partnership uses advanced computer science modeling to address climate

    National Nuclear Security Administration (NNSA)

    change | National Nuclear Security Administration | (NNSA) partnership uses advanced computer science modeling to address climate change Friday, August 29, 2014 - 10:26am Several national laboratories and institutions have joined forces to develop and apply the most complete climate and Earth system model to address the most challenging and demanding climate change issues. Accelerated Climate Modeling for Energy, or ACME, is designed to accelerate the development and application of fully

  18. Navigating NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Navigating NERSC File Systems May 3, 2011 David-Turner.jpg NERSC Training Event 10:00 - ... Navigating NERSC File Systems David Turner, NERSC User Services Group NERSC hosts a number ...

  19. Fast Global File Status

    Energy Science and Technology Software Center (OSTI)

    2013-01-01

    Fast Global File Status (FGFS) is a system software package that implimints a scalable mechanism to retrieve file information, such as its degree of distribution or replication and consistency.

  20. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  1. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  3. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after

  5. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  6. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  8. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  9. T-644: Prenotification Security Advisory- Adobe Acrobat & Adobe Readers Updates

    Broader source: Energy.gov [DOE]

    A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products.

  10. Securing WLANs using 802.11i | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    WLANs using 802.11i Securing WLANs using 802.11i This paper addresses design principles and best practices regarding the secure implementation and operation of Wireless LAN (WLAN) ...

  11. 2015 Safeguards and Security Directors Conference- July 14- 16, 2015

    Broader source: Energy.gov [DOE]

    This event will address many of the significant policy updates, reorganization, and topics of departmental emphasis that have occurred in recent years while also focusing on the myriad of other contemporary security topics and programs that impact our security operations.

  12. Standard interface file handbook

    SciTech Connect (OSTI)

    Shapiro, A.; Huria, H.C. )

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  13. Keynote Address | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    40PM to 2:05PM PDT Pacific Ballroom Wednesday keynote address by Dan Arvizu, Director, National Renewable Energy Laboratory

  14. NNSA Production Office Open for Business | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Production Office Open for Business June 18, 2012 WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) Production Office (NPO) is now in operation, providing federal oversight of nuclear production missions at the Pantex Site in Amarillo, Texas, and the Y-12 National Security Complex in Oak Ridge, Tenn. File NPO Open Release 06.18

  15. Waltzer Receives NNSA Gold Medal Award | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Waltzer Receives NNSA Gold Medal Award June 26, 2014 Karl Waltzer, Acting Deputy Manager of the National Nuclear Security Administration's Production Office, has received the NNSA Gold Medal Award in recognition of his distinguished achievements in support of national security programs. File Waltzer Receives NNSA Gold Medal Award

  16. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  17. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  18. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  19. Argonne Director Eric Isaacs addresses the National Press Club

    ScienceCinema (OSTI)

    Eric Isaccs

    2010-01-08

    Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.

  20. Eliza File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eliza File Systems Eliza File Systems Storage at PDSF is organized by group and available to all the nodes in PDSF. Please note that files on these file systems are not backed up. It is the responsibility of users to back up their files themselves as necessary. Over the years at PDSF there have been incidents which resulted in a loss of data from disk, often related to aging hardware. You can display the UGE io units with the command "qconf -se global". Disk Vault Experiments SGE io

  1. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect (OSTI)

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  2. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  3. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  4. FAQS Reference Guide – Safeguards and Security General Technical Base

    Office of Energy Efficiency and Renewable Energy (EERE)

    This reference guide addresses the competency statements in the July 2009 edition of DOE-STD-1123-2009, Safeguards and Security General Technical Base Qualification Standard.

  5. Recommended Practices Guide For Securing ZigBee Wireless Networks...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments This paper addresses design principles and best practices regarding the ...

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  9. Introduction SCADA Security for Managers and Operators | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA Security for Managers and Operators (8.15 MB) More Documents & Publications Intermediate SCADA Security Training Course Slides

  10. Contact Us | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    For general information about NNSA, please feel free to contact us: Mailing Address National Nuclear Security Administration U.S. Department of Energy 1000 Independence Ave., S.W. ...

  11. File:Bureauofreclamationfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bureauofreclamationfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bureauofreclamationfactsheet.pdf Size of this preview: 463 599 pixels....

  12. File:20121127144703735.pdf | Open Energy Information

    Open Energy Info (EERE)

    20121127144703735.pdf Jump to: navigation, search File File history File usage File:20121127144703735.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  13. File:Windyclassroom.pdf | Open Energy Information

    Open Energy Info (EERE)

    Windyclassroom.pdf Jump to: navigation, search File File history File usage Metadata File:Windyclassroom.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  14. File:Npsfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Npsfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Npsfactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  15. File:Oregonshpodocumentationstandards.pdf | Open Energy Information

    Open Energy Info (EERE)

    Oregonshpodocumentationstandards.pdf Jump to: navigation, search File File history File usage File:Oregonshpodocumentationstandards.pdf Size of this preview: 463 599 pixels....

  16. File:Noaafactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Noaafactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Noaafactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  17. File:Drillinghandbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Drillinghandbook.pdf Jump to: navigation, search File File history File usage File:Drillinghandbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  18. File:Energydatabusfacthseet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Energydatabusfacthseet.pdf Jump to: navigation, search File File history File usage Metadata File:Energydatabusfacthseet.pdf Size of this preview: 463 599 pixels. Other...

  19. File:Bonnevillepowerfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bonnevillepowerfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bonnevillepowerfactsheet.pdf Size of this preview: 463 599 pixels. Other...

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  2. ldrd | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ldrd Laboratory Directed Research & Development The U.S. Department of Energy (DOE) is charged with a large and complex mission: to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions. The DOE executes this mission to a large extent at

  3. detonation detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    detonation detection NNSA administrator visits NNSS to meet team, see national security work Last month, Department of Energy Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. Frank G. Klotz (Ret.) visited NNSA's Nevada Field Office where he hosted an all-hands for NNSA-Nevada staff and presented several service awards. During the trip he visited the NNSA... Radiological Security The program collaborates with domestic and international partners to address the threat of illicit

  4. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  5. Grid collector: An event catalog with automated file management

    SciTech Connect (OSTI)

    Wu, Kesheng; Zhang, Wei-Ming; Sim, Alexander; Gu, Junmin; Shoshani, Arie

    2003-10-17

    High Energy Nuclear Physics (HENP) experiments such as STAR at BNL and ATLAS at CERN produce large amounts of data that are stored as files on mass storage systems in computer centers. In these files, the basic unit of data is an event. Analysis is typically performed on a selected set of events. The files containing these events have to be located, copied from mass storage systems to disks before analysis, and removed when no longer needed. These file management tasks are tedious and time consuming. Typically, all events contained in the files are read into memory before a selection is made. Since the time to read the events dominate the overall execution time, reading the unwanted event needlessly increases the analysis time. The Grid Collector is a set of software modules that works together to address these two issues. It automates the file management tasks and provides ''direct'' access to the selected events for analyses. It is currently integrated with the STAR analysis framework. The users can select events based on tags, such as, ''production date between March 10 and 20, and the number of charged tracks > 100.'' The Grid Collector locates the files containing relevant events, transfers the files across the Grid if necessary, and delivers the events to the analysis code through the familiar iterators. There has been some research efforts to address the file management issues, the Grid Collector is unique in that it addresses the event access issue together with the file management issues. This makes it more useful to a large variety of users.

  6. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  7. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  8. ENERGY SUPPLY SECURITY 2014

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  9. Other File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Home Directories Your home directory is located at homelogin-name. Home directories ... Home directories are backed up as insurance against catastrophic file system failure. ...

  10. EIA-411 Data File

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    Form EIA-411 Database Form EIA-411 - Coordinated Bulk Power Supply Program Report Data ... except No. 7 (Transmission Outages) which will continue to be a voluntary filing. ...

  11. Original Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signature on File Page8 of 8 M. EMERGENCY PROCEDURES 1. The owneroperator must maintain an adequately trained onsite RCRA emergency coordinator to direct emergency...

  12. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  13. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  15. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  16. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0985P Sandia National Laboratories is introducing a binder- free pelletization process to fabricate industrially relevant pellets of porous catalysts and separations materials. This process enables the implementation of

  17. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  18. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  19. Addressing the Need for Independence in the CSE Model

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Ferragut, Erik M; Sheldon, Frederick T; Grimaila, Michael R

    2011-01-01

    Abstract Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.

  20. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  1. Nuclear Security Enterprise | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Enterprise The Nuclear Security Enterprise ... efficient 21stcentury NSE with less environmental impact. ... is referred to as Stockpile Stewardship and Management. ...

  2. State of the Lab Address

    ScienceCinema (OSTI)

    King, Alex

    2013-03-01

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  3. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  5. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W Current work is centered on development of the Supercritical Carbon Dioxide (sCo2) Closed Brayton Cycle. Using supercritical fluids, Brayton Cycles can achieve higher energy conversion efficiencies in 1/100th of the volume and 1/10th the cost of comparable steam rankine cycles. the technology is being demonstrated in the nuclear Energy Systems laboratory/Brayton lab

  6. Addressing Deferred Maintenance, Infrastructure Costs, and Excess...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities at Portsmouth and Paducah Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities ...

  7. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities A Public Meeting ...

  8. File:DIAsample.pdf | Open Energy Information

    Open Energy Info (EERE)

    DIAsample.pdf Jump to: navigation, search File File history File usage File:DIAsample.pdf Size of this preview: 776 600 pixels. Full resolution (1,650 1,275 pixels, file...

  9. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Alliance to Save Energy. | Department of Energy Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. The Alliance to Save Energy is a coalition of prominent business, government, environmental, and consumer leaders who promote the efficient use of energy worldwide to benefit consumers, the environment, economy, and national security. The Alliance to Save Energy (the Alliance) thanks the

  10. CAMD Policy Files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lists: Caretakers, Accelerator Operators, Shift Operators Building Security: Policy Crane: Directive, Use, Procedure Emergency: Policy, Procedure Experimental Hall: Policy ...

  11. ADP computer security classification program

    SciTech Connect (OSTI)

    Augustson, S.J.

    1984-01-01

    CG-ADP-1, the Automatic Data Processing Security Classification Guide, provides for classification guidance (for security information) concerning the protection of Department of Energy (DOE) and DOE contractor Automatic Data Processing (ADP) systems which handle classified information. Within the DOE, ADP facilities that process classified information provide potentially lucrative targets for compromise. In conjunction with the security measures required by DOE regulations, necessary precautions must be taken to protect details of those ADP security measures which could aid in their own subversion. Accordingly, the basic principle underlying ADP security classification policy is to protect information which could be of significant assistance in gaining unauthorized access to classified information being processed at an ADP facility. Given this policy, classification topics and guidelines are approved for implementation. The basic program guide, CG-ADP-1 is broad in scope and based upon it, more detailed local guides are sometimes developed and approved for specific sites. Classification topics are provided for system features, system and security management, and passwords. Site-specific topics can be addressed in local guides if needed.

  12. PSH-12-0021- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The Individual is a contractor employee at a DOE facility. The Local Security Office (LSO) received information that the Individual had not filed a state income tax return for the year 2007....

  13. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  14. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  15. International Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such

  16. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect (OSTI)

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  17. Job Types | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Protection * Civil * Environmental * Electrical Science ... Security * Nuclear Security * Personnel Security * Physical Security * Emergency Management * Intelligence Operations ...

  18. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  19. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    » Control Systems Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes

  20. PSH-15-0100 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 0 - In the Matter of Personnel Security Hearing PSH-15-0100 - In the Matter of Personnel Security Hearing On February 22, 2016, an Administrative Judge issued a decision in which he determined that an individual's access authorization should be restored. According to the Notification Letter, the individual had failed to file federal income tax returns for the years 2012 through 2014. The individual explained that his Certified Public Accountant, who had filed his taxes for him for the

  1. Construction of file database management

    SciTech Connect (OSTI)

    MERRILL,KYLE J.

    2000-03-01

    This work created a database for tracking data analysis files from multiple lab techniques and equipment stored on a central file server. Experimental details appropriate for each file type are pulled from the file header and stored in a searchable database. The database also stores specific location and self-directory structure for each data file. Queries can be run on the database according to file type, sample type or other experimental parameters. The database was constructed in Microsoft Access and Visual Basic was used for extraction of information from the file header.

  2. Unix File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    also sometimes known as "world" permissions, and applies to all users who can login to the system. The command "ls -l" displays the permissions and associated group for any file. ...

  3. MEMORANDUM TO: FILE FROM:

    Office of Legacy Management (LM)

    p' : , .; ' ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a ---...e---e--- DATE 6j88 7 v---s -- ---... SUBJECT: ;&l a+-b IA Tcornqm Q afib4 SITE NAME: CITY: & &&at leg co ...

  4. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  5. Keynote address: International nuclear cooperation

    SciTech Connect (OSTI)

    Kennedy, R.T.

    1989-01-01

    These meetings provide an important opportunity for the nuclear community to assess the scope and direction of its wide-ranging activities. Nuclear technology has given us the tools to understand and shape our physical environment in ways which can solve ancient problems of health, food supply, energy, and many others which affect the quality of our lives. International cooperation is necessary to secure the peaceful benefits of nuclear technology. Meeting global energy needs must be high on any priority list of issues for the coming decade and the 21st century. The satisfaction of energy needs is today and will increasingly be a crucial factor in international stability. Hand in hand with the need to assure energy sufficiency is the need to assure the long-term protection of the environment. Three key elements that give a useful framework for approaching the future of nuclear cooperation are technological factors, economic issues, and political acceptability. Technological avenues to greater safety must be vigorously pursued. Economic alternatives must be identified and objectively weighed. Most important of all, the framework of public confidence must be strengthened.

  6. PCS Security Technology Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2007-01-30

    P-STET assists in the security technology decision making process from a costlbeneflt perspective. It aids in addressing such questions as whether to acquire and deploy new security technology, to re-configure an existing product or system, or to maintain status quo. P-STET offers both a qualitative and quantitative option. P-STET is most efficient when tailored to an organization’s security cost/benefit environment. It then serves as both a guide to show what types of security questions shouldmore » be addressed and as a means to analyze the data gathered from the questions to make an informed decision. The quantitative option provides a straightforward way to express costs/benefits in terms of dollars. It relies on the organization to quantify benefits or cost avoidances, and, therefore, best serves as a guide to ensure various cost and benefit angles are evaluated. The qualitative option allows the organization to assess costs by levels with respect to security and PCS budgets, operational impacts, and opportunity costs. Benefits are represented in terms of improvements to the organization’s operations and are also assessed by levels with respect to some benchmark such as compliance with best practices. Results are displayed graphically using radar charts, allowing the user to make a more intuitive decision. The shaded area of each chart represents the overall cost and benefit of the security investment. A good investment is denoted when the ratio of benefit shaded area to cost shaded area is large.« less

  7. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  8. Addressing Failures in Exascale Computing

    SciTech Connect (OSTI)

    Snir, Marc; Wisniewski, Robert; Abraham, Jacob; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, J.; Bose, Pradip; Cappello, Franck; Carlson, Bill; Chien, Andrew; Coteus, Paul; DeBardeleben, Nathan; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Fazzari, Saverio; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Rob; Stearley, Jon; Van Hensbergen, Eric

    2014-01-01

    We present here a report produced by a workshop on Addressing failures in exascale computing' held in Park City, Utah, 4-11 August 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system, discuss existing knowledge on resilience across the various hardware and software layers of an exascale system, and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia, and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  9. Addressing failures in exascale computing

    SciTech Connect (OSTI)

    Snir, Marc; Wisniewski, Robert W.; Abraham, Jacob A.; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, Jim; Bose, Pradip; Cappello, Franck; Carlson, William; Chien, Andrew A.; Coteus, Paul; Debardeleben, Nathan A.; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Saverio, Fazzari; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Robert; Stearly, Jon; Van Hensbergen, Eric

    2014-05-01

    We present here a report produced by a workshop on “Addressing Failures in Exascale Computing” held in Park City, Utah, August 4–11, 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system; discuss existing knowledge on resilience across the various hardware and software layers of an exascale system; and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia; and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  10. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  11. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  12. File:NREL-banglmetst-221.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-banglmetst-221.pdf Jump to: navigation, search File File history File usage Selected Meteorological Stations and Elevation Size of this...

  13. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    SciTech Connect (OSTI)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-07-09

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a dirty bomb. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  14. It's the little things that count | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) It's the little things that count April 16, 2012 OAK RIDGE, Tenn. -- In just five months, the Jack Case Center at the National Nuclear Security Administration's Y-12 National Security Complex has not only achieved compliance with a national building standard for energy sustainability, but has also accomplished a 21.4 percent reduction in energy consumption. File It's the little things th

  15. Y-12 to Resume Wet Chemistry Operations | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration | (NNSA) to Install New Fence to Reduce Trespassing March 28, 2013 The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. File 2013-03-28 NPO.docx Administration | (NNSA)

    to Resume Wet Chemistry Operations March 14, 2003 PDF icon 3-14-03.pdf

  16. JLab Test Public Address System | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Public Address System May 18 at 5:30 p.m.: JLab Will Test its Public Address System On Wednesday, May 18, Jefferson Lab will conduct the monthly test of its Public Address ...

  17. U.S. Energy Secretary Addresses International Atomic Energy Agency General

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conference | Department of Energy Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 4:48pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in the nuclear

  18. U.S. Energy Secretary Addresses International Atomic Energy Agency General

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conference | Department of Energy Energy Secretary Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 2:24pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in

  19. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  20. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Klotz visits Y-12 to see progress on new projects and ongoing work on NNSA's national security missions Last week, NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. He also met with the Region 2 volunteers of the Radiogical... Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a

  1. Defense Nuclear Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    This responsibility includes the physical, materials control and accounting, classified and sensitive information protection, personnel, technical, and cyber security programs. ...

  2. Keynote Address: Update on Environmental Management | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Address: Update on Environmental Management Keynote Address: Update on Environmental Management Keynote presentation made by David G. Huizenga for the NTSF annual meeting held from ...

  3. EPA -- Addressing Children's Health through Reviews Conducted...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EPA -- Addressing Children's Health through Reviews Conducted Pursuant to the National Environmental Policy Act and Section 309 of the Clean Air Act EPA -- Addressing Children's ...

  4. Symbiosis: Addressing Biomass Production Challenges and Climate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Symbiosis: Addressing Biomass Production Challenges and Climate Change Symbiosis: Addressing Biomass Production Challenges and Climate Change This presentation was the opening ...

  5. Deputy Secretary Poneman Addresses Nuclear Deterrence Summit...

    Office of Environmental Management (EM)

    Addresses Nuclear Deterrence Summit Deputy Secretary Poneman Addresses Nuclear Deterrence Summit February 17, 2010 - 12:00am Addthis Alexandria, VA - U.S. Deputy Secretary of ...

  6. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  7. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  8. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  9. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  10. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  11. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  12. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  13. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  14. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  15. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  16. Office of Security Assessments

    Broader source: Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  18. File:S-38-Well-Construction-and-Modification-Permit.pdf | Open...

    Open Energy Info (EERE)

    S-38-Well-Construction-and-Modification-Permit.pdf Jump to: navigation, search File File history File usage File:S-38-Well-Construction-and-Modification-Permit.pdf Size of this...

  19. Recommended Practice for Securing Control System Modems

    SciTech Connect (OSTI)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked backdoor into critical infrastructure control systems created by modem connections. A modems connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  20. INSPIRE and SPIRES Log File Analysis

    SciTech Connect (OSTI)

    Adams, Cole; /Wheaton Coll. /SLAC

    2012-08-31

    SPIRES, an aging high-energy physics publication data base, is in the process of being replaced by INSPIRE. In order to ease the transition from SPIRES to INSPIRE it is important to understand user behavior and the drivers for adoption. The goal of this project was to address some questions in regards to the presumed two-thirds of the users still using SPIRES. These questions are answered through analysis of the log files from both websites. A series of scripts were developed to collect and interpret the data contained in the log files. The common search patterns and usage comparisons are made between INSPIRE and SPIRES, and a method for detecting user frustration is presented. The analysis reveals a more even split than originally thought as well as the expected trend of user transition to INSPIRE.

  1. Hopper File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and IO File Storage and IO Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance...

  2. File:Methane.pdf | Open Energy Information

    Open Energy Info (EERE)

    Methane.pdf Jump to: navigation, search File File history File usage File:Methane.pdf Size of this preview: 448 600 pixels. Go to page 1 2 3 4 5 Go next page next page ...

  3. File:Mmpa.pdf | Open Energy Information

    Open Energy Info (EERE)

    Mmpa.pdf Jump to: navigation, search File File history File usage File:Mmpa.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6...

  4. File:Keystone.pdf | Open Energy Information

    Open Energy Info (EERE)

    Keystone.pdf Jump to: navigation, search File File history File usage File:Keystone.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  5. File:Handbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Handbook.pdf Jump to: navigation, search File File history File usage File:Handbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  6. File:Install.pdf | Open Energy Information

    Open Energy Info (EERE)

    Install.pdf Jump to: navigation, search File File history File usage File:Install.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  7. File:Hydrofracking.pdf | Open Energy Information

    Open Energy Info (EERE)

    Hydrofracking.pdf Jump to: navigation, search File File history File usage File:Hydrofracking.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  8. File:Consultants.pdf | Open Energy Information

    Open Energy Info (EERE)

    Consultants.pdf Jump to: navigation, search File File history File usage File:Consultants.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  9. File:Installnot.pdf | Open Energy Information

    Open Energy Info (EERE)

    Installnot.pdf Jump to: navigation, search File File history File usage File:Installnot.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full...

  10. File:RSC.pdf | Open Energy Information

    Open Energy Info (EERE)

    RSC.pdf Jump to: navigation, search File File history File usage File:RSC.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...

  11. Category:Map Files | Open Energy Information

    Open Energy Info (EERE)

    has the following 4 subcategories, out of 4 total. M Map Image Files Map PDF Files N NREL Map Files 1 pages S SWERA Map Files Media in category...

  12. File:Primer.pdf | Open Energy Information

    Open Energy Info (EERE)

    Primer.pdf Jump to: navigation, search File File history File usage File:Primer.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4...

  13. File:600.pdf | Open Energy Information

    Open Energy Info (EERE)

    600.pdf Jump to: navigation, search File File history File usage File:600.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...

  14. File:SGI.pdf | Open Energy Information

    Open Energy Info (EERE)

    SGI.pdf Jump to: navigation, search File File history File usage Metadata File:SGI.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  15. File:038392007).pdf | Open Energy Information

    Open Energy Info (EERE)

    8392007).pdf Jump to: navigation, search File File history File usage File:038392007).pdf Size of this preview: 463 599 pixels. Other resolution: 463 600 pixels. Go to page 1...

  16. Setting up File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Setting up File Permissions Setting up File Permissions Recommendations for Setting up "Shared" Directories This section shows the recommended commands for setting up shared directories. Please read the full page to get an understanding of what these commands are doing. These recommendations are based on the common use-case at the JGI for user/group read/write and global read access. Creating a New Shared Directory dmj@genepool04:~$ umask 002 # or have this set in .bashrc.ext

  17. OHA Misc Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our Misc decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

  18. OHA Whistleblower Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our Whistleblower decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark...

  19. OHA EIA CASES ARCHIVE FILE

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our EIA decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

  20. OHA FOIA Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our FOIA decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

  1. Look At (Search) Large Files

    Energy Science and Technology Software Center (OSTI)

    1992-07-13

    Scanning large files for information can be time consuming and expensive when using edit utilities on large mainframe computers. The reason is that editors must usually load the file into a buffer.

  2. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  3. File storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage and I/O File storage and I/O Disk Quota Change Request Form Franklin File Systems The Franklin system has 4 different file systems mounted which provide different levels of disk storage, I/O performance and file permanence. The table below describes the various Franklin file systems File System Home Local Scratch Project Environment Variable Definition $HOME $SCRATCH $SCRATCH2 No environment variable /project/projectdirs/ Description Global homes file system shared with other NERSC

  4. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  5. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  6. Chapter 3: Energy Security

    SciTech Connect (OSTI)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  7. PSH-15-0093 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 3 - In the Matter of Personnel Security Hearing PSH-15-0093 - In the Matter of Personnel Security Hearing On February 17, 2016, an OHA Administrative Judge issued a decision in which he determined that an individual's request for DOE access authorization should not be granted. A local security office (LSO) found that the Internal Revenue Service (IRS) had filed tax liens against the individual in 2010 and 2013, totaling $157,873.09, and a state government had filed a tax lien against

  8. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  9. Content-addressable memory based enforcement of configurable policies

    SciTech Connect (OSTI)

    Berg, Michael J

    2014-05-06

    A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input coupled to receive a bus transaction tag based on bus traffic on the bus. The CAM stores data tags associated with rules of a security policy to compare the bus transaction tag to the data tags. The CAM generates an output signal indicating whether one or more matches occurred. The response policy unit is coupled to the CAM to receive the output signal from the CAM and to execute a policy action in response to the output signal.

  10. Address conversion unit for multiprocessor system

    SciTech Connect (OSTI)

    Fava, T.F.; Lary, R.F.; Blackledge, R.

    1987-03-03

    An address conversion unit is described for use in one processor in a multi-processor data processing system including a common memory, the processors and common memory being interconnected by a common bus including means for transferring address signals defining a common address space. The processor includes private bus means including means for transferring signals including address signals defining a private address space. A processor unit means is connected to the private bus means and includes means for transmitting and receiving signals including address signals over the private bus means for engaging in data transfers thereover. The address conversion unit is connected to the private bus means and common bus means for receiving address signals over the private bus means from the processor unit means in the private address space. The unit comprises: A. pointer storage means for storing a pointer identifying a portion of the common bus memory space; B. pointer generation means connected to receive a common bus address and for generating a pointer in response thereto for storage in the pointer storage means; and C. common bus address generation means connected to the private bus and the pointer storage means for receiving an address from the processor unit means and for generating a common bus address in response thereto. The common bus address is used to initiate transfers between the processor unit means and the common memory over the common bus.

  11. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore »and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  12. Beyond a series of security nets: Applying STAMP & STPA to port security

    SciTech Connect (OSTI)

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systems and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.

  13. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  14. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  15. MEMORANDUfl J: FILE DATE

    Office of Legacy Management (LM)

    J: FILE DATE r so ---...w------m FROM: 9. 34oyc -w---...v----- SUBJECT: D3 Bo;s CL&;C J mL-;+J; - Rcc cap 049 'A :j: &336;s L-.fh w-f L-1 ALE"nirTE ---...

  16. MPI File Tree Walk

    Energy Science and Technology Software Center (OSTI)

    2007-04-30

    MPI-FTW is a scalable MPI based software application that navigates a directory tree by dynamically allocating processes to navigate sub-directories found. Upon completion, MPI-FTW provides statistics on the number of directories found, files found, and time to complete. Inaddition, commands can be executed at each directory level.

  17. PSH-16-0030 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 30 - In the Matter of Personnel Security Hearing PSH-16-0030 - In the Matter of Personnel Security Hearing On June 21, 2016, an OHA Administrative Judge issued a decision in which she determined that an individual's access authorization should be restored. In reaching this determination, the Administrative Judge found that the individual had resolved the security concerns arising from her failure to file her federal and state income taxes for the years 2013 and 2014. The individual

  18. PSH-16-0034 - In the Matter of Personnel Security Hearing | Department of

    Energy Savers [EERE]

    Energy 4 - In the Matter of Personnel Security Hearing PSH-16-0034 - In the Matter of Personnel Security Hearing On August 4, 2016, an Administrative Judge issued a decision in which he found that individual's access authorization should not be restored. In reaching this determination, the Administrative Judge found that the individual had not resolved security concerns under Criterion L, regarding the failure to timely file tax returns for tax years 2010 and 2011. The individual

  19. Personnel Security Program | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator. Each program area is focused on specific challenges. The Office of Personnel & Facility Clearances & Classification (OPFCC) is part of the NNSA, Office of

  20. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  1. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement for

  2. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Secretary Moniz awards Hutcheon memorial nonproliferation fellowship to Thomas Gray

  3. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  4. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  5. Jackie Chen to give keynote address at ISC High performance conference in

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Germany to give keynote address at ISC High performance conference in Germany - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing

  6. The Fifth Workshop on HPC Best Practices: File Systems and Archives

    SciTech Connect (OSTI)

    Hick, Jason; Hules, John; Uselton, Andrew

    2011-11-30

    The workshop on High Performance Computing (HPC) Best Practices on File Systems and Archives was the fifth in a series sponsored jointly by the Department Of Energy (DOE) Office of Science and DOE National Nuclear Security Administration. The workshop gathered technical and management experts for operations of HPC file systems and archives from around the world. Attendees identified and discussed best practices in use at their facilities, and documented findings for the DOE and HPC community in this report.

  7. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy ...

  8. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  9. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA uses, for example, concrete blocks, razor-wire barriers, and steel-plated fighting positions to upgrade its physical security features. It has eliminated public access to ...

  10. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  11. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    ... non-classified portion of the review process. The Federal Project Director and appropriate DOEEM-HQ line management and security representatives must coordinate the classified ...

  12. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  13. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  14. Storage & File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration | (NNSA) Mission / Managing the Stockpile Stockpile Stewardship and Management Plan This Department of Energy's (DOE) National Nuclear Security Administration (NNSA) Fiscal Year 2017 Stockpile Stewardship and Management Plan (SSMP) - Biennial Plan Summary (FY 2017 SSMP) is a key planning document for the nuclear security enterprise. This year's summary report updates the Fiscal Year 2016 Stockpile Stewardship and Management Plan (FY 2016 SSMP), the 25-year strategic program of

  15. POLICY GUIDANCE MEMORANDUM #03 Addressing Missclassified Positions

    Broader source: Energy.gov [DOE]

    This memorandum provides policy guidance on how to consistently address misclassified positions within the Department and is effective immediately. There are several different circumstances that affect how a misclassified position will be addressed.

  16. PSH-15-0101 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 1 - In the Matter of Personnel Security Hearing PSH-15-0101 - In the Matter of Personnel Security Hearing On April 19, 2016, an OHA Administrative Judge issued a decision in which he concluded that an individual's security clearance should not be restored. The local security office (LSO) had conducted personnel security interviews with the individual in both 1991 and 1999 to address financial matters. In 2014, the individual disclosed on a QNSP both collection debt and delinquent

  17. PSH-16-0005 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 5 - In the Matter of Personnel Security Hearing PSH-16-0005 - In the Matter of Personnel Security Hearing On March 29, 2016, an Administrative Judge issued a decision in which she concluded that an individual's security clearance should not be restored. In July 2015, a Local Security Office (LSO) conducted a personnel security interview (PSI) of the individual to address concerns regarding his arrest and charge for Aggravated Assault Against a Household Member with a Deadly Weapon, a

  18. Statement from National Security Council Spokesman Tommy Vietor...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    delegation to So Paulo and to Rio de Janeiro to meet with public and private enterprise. ... address our mutual interest in the development of safe, secure and affordable energy ...

  19. Security Profile Inspector for UNIX Systems

    Energy Science and Technology Software Center (OSTI)

    1995-04-01

    SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configurationmore » Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less

  20. Security Policy, Guidance & Reports

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is responsible for the principal personnel security information processing activities of the Department and personnel security administrative review process. The Office of Headquarters Security Operations provides oversight and direction support to all Headquarters security operations to include physical protection, information security, personnel security, and guidance to the Headquarters Security Officers (HSO).

  1. Denial technology, the neglected security element

    SciTech Connect (OSTI)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection.

  2. DOE - Fossil Energy: Introduction Page to E-Filing System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    E-Filing Natural Gas Import & Export Regulation - E-Filing DOE's Natural Gas E-Filing System More Info E-Filing Instructions Go directly to e-Filing Form View Sample e-File...

  3. File:WSR flowchart-introduction.pdf | Open Energy Information

    Open Energy Info (EERE)

    Apps Datasets Community Login | Sign Up Search File Edit History File:WSR flowchart-introduction.pdf Jump to: navigation, search File File history File usage File:WSR...

  4. File:0 - Overall Flow (Solar).pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:0 - Overall Flow (Solar).pdf Jump to: navigation, search File File history File usage Metadata File:0 - Overall Flow (Solar).pdf Size of this preview: 463 ...

  5. File:01UTALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    Datasets Community Login | Sign Up Search File Edit History File:01UTALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01UTALandUsePlan...

  6. File:01CAALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01CAALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01CAALandUsePlanning.pdf Size of this preview: 463 599...

  7. File:01IDALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01IDALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01IDALandUseConsiderations.pdf Size of this preview:...

  8. File:08COCStateTransmissionProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    Community Login | Sign Up Search File Edit History File:08COCStateTransmissionProcess.pdf Jump to: navigation, search File File history File usage Metadata File:08COCStateTransm...

  9. File:01MTALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01MTALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01MTALandUseConsiderations.pdf Size of this preview:...

  10. File:03COCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:03COCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03COCEncroachmentOverview.pdf Size of this preview: 463...

  11. Overview of Accelerator Applications for Security and Defense

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Antolak, Arlyn J.

    2015-01-01

    Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. An overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security is presented.

  12. Overview of Accelerator Applications for Security and Defense

    SciTech Connect (OSTI)

    Antolak, Arlyn J.

    2015-01-01

    Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.

  13. V-130: Microsoft Security Bulletin Advance Notification for April 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for April 2013. Microsoft has posted 2 Critical Bulletins and 7 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on April 10, 2013, at 11:00 AM Pacific Time (US & Canada).

  14. V-108: Microsoft Security Bulletin Advance Notification for March 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for March 2013. Microsoft has posted 4 Critical Bulletins and 3 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on March 13, 2013, at 11:00 AM Pacific Time (US & Canada).

  15. V-154: Microsoft Security Bulletin Advance Notification for May 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for May 2013. Microsoft has posted 2 Critical Bulletins and 8 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on May 15, 2013, at 11:00 AM Pacific Time (US & Canada).

  16. V-175: Microsoft Security Bulletin Advance Notification for June 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for June 2013. Microsoft has posted 1 Critical Bulletin and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" June allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on June 12, 2013, at 11:00 AM Pacific Time (US & Canada).

  17. V-196: Microsoft Security Bulletin Advance Notification for July 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada).

  18. V-088: Microsoft Security Bulletin Advance Notification for February 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for February 2013. Microsoft has posted 5 Critical Bulletins and 7 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on February 13, 2013, at 11:00 AM Pacific Time (US & Canada).

  19. U-057: Microsoft Security Bulletin Advance Notification for December 2011

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada).

  20. V-023: Microsoft Security Bulletin Advance Notification for November 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for November 2012. Microsoft has posted 4 Critical Bulletins and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code.Microsoft will host a webcast to address customer questions on the security bulletins on November 14, 2012, at 11:00 AM Pacific Time (US & Canada).

  1. V-064: Microsoft Security Bulletin Advance Notification for January 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for January 2013 . Microsoft has posted 2 Critical Bulletins and 5 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on January 9, 2013, at 11:00 AM Pacific Time (US & Canada).

  2. V-042: Microsoft Security Bulletin Advance Notification for December 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for December 2012. Microsoft has posted 5 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on December 12, 2012, at 11:00 AM Pacific Time (US & Canada).

  3. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA Director of the Department of Information and International Relations Ilkhom Mirsaidov, left, with two specialized vehicles purchased by NNSA for Tajikistan. WASHINGTON - The Department of Energy's National Nuclear Security Administration (DOE/

  4. Final Reminder: Please save your $SCRATCH and $SCRATCH2 imporant files by

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Administration | (NNSA) Final Recovery Act-Funded Demolition Underway at Y-12 October 27, 2010 Microsoft Office document icon R-10-26 4/30/12

    Final Reminder: Final Reminder: Please save your $SCRATCH and $SCRATCH2 imporant files by 4/30/12 April 27, 2012 by Helen He Franklin batch system is drained, and all batch queues are stopped as of 4/26 23:59pm. This is the final reminder that please make sure to save important files on your Franklin $SCRATCH and $SCRATCH2. ALL FILES

  5. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  6. Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security by Website Administrator Back

  7. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and I/O File Storage and I/O Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance and permanence. The table below summarizes these file systems: File System Home Local Scratch Global Scratch Project Environment Variable Definition $HOME $SCRATCH $SCRATCH2 $GSCRATCH None. Must use /project/projectdirs/ Description Global home file system shared with other NERSC systems. All NERSC machines mount the

  8. Detailed Drawings of NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File System Drawing Detailed Drawings of NERSC File Systems Cori Global Scratch cori scratch Global Project project Abbreviations CMP Chip Multicore Processor OSS Object Storage Server: a component of a Lustre File System OST Object Storage Target: a component of a Lustre File System LNET Lustre Network router MDS Metadata Server, manage file operation, e.g., create new file, write to shared file DVS Data Virtualization Server, Running a service to mount external storage to Cray systems HPSS

  9. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    SciTech Connect (OSTI)

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  10. Original Signature On File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signature On File Department of Energy Carl sbad Field Office P. O. Box 3090 Carlsbad , New Mexico 8822 1 June 10, 2009 Mr. Steve Zappe, Project Leader Hazardous Waste Bureau New Mexico Environment Department 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505-6303 Subject: Transmittal of CBFO Final Audit Report A-09-12 , Los Alamos National Laboratory Central Characterization Project TRU Waste Characterization and Certification Dear Mr. Zappe: Enclosed is the Carlsbad Field Office

  11. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  12. Realizing Scientific Methods for Cyber Security

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  13. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  14. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  15. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    may not grant or renew a security clearance for a covered person who is an unlawful ... may not grant or renew a security clearance described in paragraph (3) for a covered ...

  16. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  17. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  18. File:Federal Hydropower - Southwestern Power Administration.pdf...

    Open Energy Info (EERE)

    Federal Hydropower - Southwestern Power Administration.pdf Jump to: navigation, search File File history File usage Metadata File:Federal Hydropower - Southwestern Power...

  19. File:Federal Hydropower - Western Area Power Administration.pdf...

    Open Energy Info (EERE)

    Hydropower - Western Area Power Administration.pdf Jump to: navigation, search File File history File usage Metadata File:Federal Hydropower - Western Area Power Administration.pdf...

  20. File:Texas Construction General Permit (TXR150000).pdf | Open...

    Open Energy Info (EERE)

    Texas Construction General Permit (TXR150000).pdf Jump to: navigation, search File File history File usage Metadata File:Texas Construction General Permit (TXR150000).pdf Size of...

  1. File:03NVCEncroachment (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    NVCEncroachment (1).pdf Jump to: navigation, search File File history File usage Metadata File:03NVCEncroachment (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  2. Data Storage & File Systems | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    continue to build documentation for our new computing resource. Feedback Form Data Storage & File Systems BGQ File Systems BGQ File Systems: An overview of the BGQ file...

  3. File:0 - Overall Flow - Transmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    - Overall Flow - Transmission.pdf Jump to: navigation, search File File history File usage Metadata File:0 - Overall Flow - Transmission.pdf Size of this preview: 463 599...

  4. File:07FDCPURPAQualifyingFacilityCertificationProcess.pdf | Open...

    Open Energy Info (EERE)

    FDCPURPAQualifyingFacilityCertificationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07FDCPURPAQualifyingFacilityCertificationProcess.pdf Size...

  5. File:07TXBRECGeneratorCertification.pdf | Open Energy Information

    Open Energy Info (EERE)

    7TXBRECGeneratorCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07TXBRECGeneratorCertification.pdf Size of this preview: 463 599 pixels....

  6. File:04AKBGeophysicalExplorationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKBGeophysicalExplorationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:04AKBGeophysicalExplorationPermit.pdf Size of this preview: 463 599...

  7. File:07FDBPlantCommissioning.pdf | Open Energy Information

    Open Energy Info (EERE)

    FDBPlantCommissioning.pdf Jump to: navigation, search File File history File usage Metadata File:07FDBPlantCommissioning.pdf Size of this preview: 463 599 pixels. Other...

  8. File:07HIAGeothermalAndCableSystemDevelopmentPermitting.pdf ...

    Open Energy Info (EERE)

    HIAGeothermalAndCableSystemDevelopmentPermitting.pdf Jump to: navigation, search File File history File usage Metadata File:07HIAGeothermalAndCableSystemDevelopmentPermitting.pdf...

  9. File:ApplicationtoAppropriate.pdf | Open Energy Information

    Open Energy Info (EERE)

    ApplicationtoAppropriate.pdf Jump to: navigation, search File File history File usage File:ApplicationtoAppropriate.pdf Size of this preview: 463 599 pixels. Other resolution:...

  10. File:08CABCaliforniaTransmissionCPUCProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    8CABCaliforniaTransmissionCPUCProcess.pdf Jump to: navigation, search File File history File usage File:08CABCaliforniaTransmissionCPUCProcess.pdf Size of this preview: 463 599...

  11. File:AlaskaTitleVApplicationSubmittalInstructions.pdf | Open...

    Open Energy Info (EERE)

    AlaskaTitleVApplicationSubmittalInstructions.pdf Jump to: navigation, search File File history File usage File:AlaskaTitleVApplicationSubmittalInstructions.pdf Size of this...

  12. File:03ORENoncompetitiveGeothermalLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    ORENoncompetitiveGeothermalLease.pdf Jump to: navigation, search File File history File usage Metadata File:03ORENoncompetitiveGeothermalLease.pdf Size of this preview: 463 599...

  13. File:07CAAPlantCommissioningProcessApplicationForCertification...

    Open Energy Info (EERE)

    7CAAPlantCommissioningProcessApplicationForCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07CAAPlantCommissioningProcessApplicationForCert...

  14. File:08IDAStateTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08IDAStateTransmission.pdf Size of this preview: 463 599 pixels. Other...

  15. File:03AKCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03AKCEncroachmentOverview.pdf Size of this preview: 463 599 pixels. Other...

  16. File:06ORATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    ORATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06ORATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  17. File:06NVATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    NVATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06NVATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  18. File:08CAACaliforniaTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    CAACaliforniaTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08CAACaliforniaTransmission.pdf Size of this preview: 463 599 pixels. Other...

  19. File:06AKATransportationOversizeOverweight.pdf | Open Energy...

    Open Energy Info (EERE)

    6AKATransportationOversizeOverweight.pdf Jump to: navigation, search File File history File usage Metadata File:06AKATransportationOversizeOverweight.pdf Size of this preview: 463...

  20. File:07CACCaliforniaEnergyFacilityCPUCProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    CACCaliforniaEnergyFacilityCPUCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07CACCaliforniaEnergyFacilityCPUCProcess.pdf Size of this preview:...

  1. File:03CACEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    CACEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03CACEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  2. File:06FDAEPAConstructionGeneralPermitConstructionStormwater...

    Open Energy Info (EERE)

    06FDAEPAConstructionGeneralPermitConstructionStormwater.pdf Jump to: navigation, search File File history File usage Metadata File:06FDAEPAConstructionGeneralPermitConstructionStor...

  3. File:07ORDExpeditedPlantCommissioningProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    ORDExpeditedPlantCommissioningProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07ORDExpeditedPlantCommissioningProcess.pdf Size of this preview:...

  4. File:03IDCEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDCEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03IDCEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  5. File:08MTATransmission (3).pdf | Open Energy Information

    Open Energy Info (EERE)

    08MTATransmission (3).pdf Jump to: navigation, search File File history File usage Metadata File:08MTATransmission (3).pdf Size of this preview: 463 599 pixels. Other...

  6. File:CDPHE Industrial Individual Wastewater Discharge Permit...

    Open Energy Info (EERE)

    CDPHE Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search File File history File usage Metadata File:CDPHE Industrial Individual...

  7. File:(PECC) Special Program on Climate Change SUMMARY (english...

    Open Energy Info (EERE)

    (PECC) Special Program on Climate Change SUMMARY (english).pdf Jump to: navigation, search File File history File usage File:(PECC) Special Program on Climate Change SUMMARY...

  8. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  9. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  10. Security's (DHS) Domestic Nuclear

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and mobile detection systems), and the ... Homeland Security Technology Program. "With its remote location, highly ... Infrastructure Resilience Conference and Expo. ...

  11. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  13. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  14. Lemnos Interoperable Security Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  15. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E.

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  16. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  17. File:06COBConstructionStormWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    Login | Sign Up Search File Edit History File:06COBConstructionStormWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06COBConstructio...

  18. Research Projects Addressing Technical Challenges to Environmentally

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Acceptable Shale Gas Development Selected by DOE | Department of Energy Addressing Technical Challenges to Environmentally Acceptable Shale Gas Development Selected by DOE Research Projects Addressing Technical Challenges to Environmentally Acceptable Shale Gas Development Selected by DOE November 28, 2012 - 12:00pm Addthis Washington, DC - Fifteen research projects aimed at addressing the technical challenges of producing natural gas from shales and tight sands, while simultaneously

  19. Keynote Address: Future Vision | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    0, 2014 1:00PM to 1:30PM PDT Pacific Ballroom Tuesday's keynote address by Raffi Garabedian, Chief Technology Officer, First Solar

  20. Addressing Challenges of Identifying Geometrically Diverse Sets...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Addressing Challenges of Identifying Geometrically Diverse Sets of Crystalline Porous Materials Previous Next List R. L. Martin, B. Smit, and M. Haranczyk, J. Chem Inf. Model. 52...

  1. Recommendations to Address Power Reliability Concerns Raised...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns Raised as a ...

  2. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. Policy Flash Archive Search File

    Office of Environmental Management (EM)

    ... Policy Flash Archive Search File 4 Flash2002-10 ... Principles; 2) Contract Terms and Conditions Required to ... Transaction Authority to enter into Technology Investment ...

  4. 1999 CBECS Public Use Files

    U.S. Energy Information Administration (EIA) Indexed Site

    only. Geographic identifiers and National Oceanic and Atmospheric Administration Weather Division identifiers are not included on any data files delivered to EIA. Geographic...

  5. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  6. Securing collaborative environments

    SciTech Connect (OSTI)

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  7. Microgrid cyber security reference architecture.

    SciTech Connect (OSTI)

    Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

    2013-07-01

    This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

  8. Toward more testable security equipment

    SciTech Connect (OSTI)

    Spencer, D.D.; Murray, D.W. )

    1991-01-01

    An important functional aspect of most security related equipment is the need for periodic performance testing. Sensors, entry-control devices, and other such security equipment usually have some sort or reliability or testing requirements. Unfortunately, testing requirements are seldom considered during equipment design, and testing becomes a prohibitively expensive or inconvenient afterthought. In this paper work at Sandia National Laboratories to address this concern is presented, focusing on metal detectors as a test case. Field testing of metal detectors is usually done by passing a test object through the opening to see whether an alarm is generated or not. Such alarm/no-alarm data are poor for making reliability estimates, and thus, a large quantity of such data is required to make good reliability statements. The detector itself uses much better internal information. Experiments tapping into some of this internal data will be discussed, and conclusions will be drawn about the possibility of redesign of metal detectors for enhanced testability. Such conclusions have implications for other types of security-related devices, as well.

  9. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  10. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  11. MEMORANDUM TO: FILE

    Office of Legacy Management (LM)

    ' a 7 > 3gI, q OH.I-r7.-I (jt' , ""7 MEMORANDUM TO: FILE FROM: ' 'Y OIL&i cz ,,,',, -------we- SUBJECT: SITE NAME: _____ CITY:-AQY&- --------------e----e-- OWNER(S) Owner contacted n yes =urr="t: ----- -Llz2-:---,-- -----___ &,&/4$- '1 :) ' if yes, data contacted ------------- TYPE OF OPERATION ----------------- a Research t Development lti- Facility Type 0 Production scale testing a Manufacturing 5 University 0 Research Organization 0 Government Sponsored

  12. MEMORANDUM TO: FILE FROM:

    Office of Legacy Management (LM)

    p' : , .; ' _ ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a --------e---e--- DATE 6j8/8 7 v---s -- ---------- SUBJECT: ;&l a+-b IA T~cornqm Q afib4 SITE NAME: CITY: & &&at leg co Current: ------------------------ Owner contacted 0 yes p no; if yem, date contacted --w---w------ TYPE OF OPERATION The T$SYI L-- Tj flmf ----------------- FResearch & Development a Facility 0 Production scale testing 0 Pilot Scale p Manufacturing 0 Bench Scale Process [3 University 0

  13. GlNTRM FILES

    Office of Legacy Management (LM)

    : .; GlNTRM FILES .- Red Rwtaaie!a .=?%A .-m JJullen mtoxges8ntuuo -006 .017 .olb J-m .021 .OLt .Ol2 *Jeta Lhh .029 .0X9 ,026 ~k~exwteethaae~oyeencloee~ttothxflcmrof bUckaide. After the deccxmdnatimpxcblarrrro mlved.the rt8tma dt&itO lo- &ctioacoilrpasdistuEeed. 1. . ,, -. . . ' The conparty visited 3~ciali.z.e~ ja the a.ppLicatica of Znductiw beat. The purpose of this trip wa s to advise on haaBh and safety measures for the preoceeptance testing of inductioo heat treating equipment

  14. HEMORANDUH TO: FILE DATE

    Office of Legacy Management (LM)

    HEMORANDUH TO: FILE DATE 1123 lLjl ---WV-------------- FROM: P. s&w+ -------v-----s-- SUBJECT: lJ+ - e;& SITE NAME: LJo"zL - /L,' de Cd -J--h=- ALTERNATE l --e-e-- ------w------- ---,,,' ,m--, NAME: ---------------------- CITY: LL-pL~ ------------ ------------- STATE3 e--w-- OWNER tS) -----w-- Past I --k-!!.l~ -pa L . -v-----w------- Current: Owner contac?-ed 0 yes 0 no; if yes, I+Lff A zid;&m - -------------------------- date contacted ------B--m--- TYPE OF OPERATION

  15. Next Generation National Security Leaders

    SciTech Connect (OSTI)

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had right-sized the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community or it may lie in more effectively using our existing resources and training programs.

  16. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  17. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and I/O File Storage and I/O Disk Quota Change Request Form Cori File Systems The Cori system has 3 different user-accessible file systems; they provide different levels of disk storage and I/O performance. The table below describes these systems. File System Home Scratch Project Environment Variable $HOME $SCRATCH None. Must use /project/projectdirs/ Description Global home file system shared with other NERSC systems. All NERSC machines mount the same home directory. GPFS

  18. Resolved: Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hopper /scratch file system slow Resolved: Hopper /scratch file system slow August 6, 2014 Symptom: Users have reported scripts hung when involving file copies from/to the /scratch file system, or jobs running in /scratch are slower than before since late last week. Workaround: If it is convenient, move your workflow to /scratch2 temporarily, avoid any reference to /scratch. It includes setting your input files directory, your batch job submission directory, your executable file location, and

  19. Analysis of Vehicle-Based Security Operations

    SciTech Connect (OSTI)

    Carter, Jason M; Paul, Nate R

    2015-01-01

    Vehicle-to-vehicle (V2V) communications promises to increase roadway safety by providing each vehicle with 360 degree situational awareness of other vehicles in proximity, and by complementing onboard sensors such as radar or camera in detecting imminent crash scenarios. In the United States, approximately three hundred million automobiles could participate in a fully deployed V2V system if Dedicated Short-Range Communication (DSRC) device use becomes mandatory. The system s reliance on continuous communication, however, provides a potential means for unscrupulous persons to transmit false data in an attempt to cause crashes, create traffic congestion, or simply render the system useless. V2V communications must be highly scalable while retaining robust security and privacy preserving features to meet the intra-vehicle and vehicle-to-infrastructure communication requirements for a growing vehicle population. Oakridge National Research Laboratory is investigating a Vehicle-Based Security System (VBSS) to provide security and privacy for a fully deployed V2V and V2I system. In the VBSS an On-board Unit (OBU) generates short-term certificates and signs Basic Safety Messages (BSM) to preserve privacy and enhance security. This work outlines a potential VBSS structure and its operational concepts; it examines how a vehicle-based system might feasibly provide security and privacy, highlights remaining challenges, and explores potential mitigations to address those challenges. Certificate management alternatives that attempt to meet V2V security and privacy requirements have been examined previously by the research community including privacy-preserving group certificates, shared certificates, and functional encryption. Due to real-world operational constraints, adopting one of these approaches for VBSS V2V communication is difficult. Timely misbehavior detection and revocation are still open problems for any V2V system. We explore the alternative approaches that may be

  20. PSH-15-0096 In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 6 In the Matter of Personnel Security Hearing PSH-15-0096 In the Matter of Personnel Security Hearing On February 26, 2016, an Administrative Judge issued a decision in which she determined that an individual's access authorization should not be restored. During a personnel security interview and a credit report review, the Local Security Office found that the individual had filed a Chapter 13 bankruptcy in 2005 and a Chapter 7 bankruptcy in 2015, and had exhibited a long pattern of

  1. Portable File Format (PFF) specifications.

    SciTech Connect (OSTI)

    Dolan, Daniel H.,

    2015-02-01

    Created at Sandia National Laboratories, the Portable File Format (PFF) allows binary data transfer across computer platforms. Although this capability is supported by many other formats, PFF files are still in use at Sandia, particularly in pulsed power research. This report provides detailed PFF specifications for accessing data without relying on legacy code.

  2. Resolved: Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    your input files directory, your batch job submission directory, your executable file location, and the TMPDIR setting (which is set to SCRATCH by default). Status: This...

  3. Instructions to CBECS 1995 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    5 Files WHAT IS CBECS? Please Note: These microdata files, which contain building characteristics, energy consumption and expenditures, and energy end-use estimates replace the...

  4. Help:Managing files | Open Energy Information

    Open Energy Info (EERE)

    file." Click "Browse" next to the "Source filename:" to locate the file on your computer (the name of the "browse" button depends on your web browser). Change the...

  5. Amended Environmental Impact Statement Filing System Guidance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Amended Environmental Impact Statement Filing System Guidance (EPA, 2012) Amended Environmental Impact Statement Filing System Guidance (EPA, 2012) Amended Environmental Impact ...

  6. PDF File Information (pbl/help)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Help > Help Power Services Site Map Searching for Text Other Navigation Aids PDF File Info Firstgov PDF File Information Many of the documents available on the Power...

  7. Edison File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Storage & File Systems Application Performance Data & Analytics Job Logs & Statistics ... File System Home Local Scratch Project Global Scratch Environment Variable Definition ...

  8. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  9. FileNewTemplate

    U.S. Energy Information Administration (EIA) Indexed Site

    Next Steps on Climate: United States Sarah O. Ladislaw Director and Senior Fellow, Energy and National Security Program Three Avenues for Action Post-Paris * Operationalize international framework * Deliver on targets and commitments * Focus on longer term goal setting United States: Climate Action Plan (2013) Mitigation Adaptation International Leadership  Deploy clean energy - Clean Power Plan - RE incentives - Innovation  21 st century transport sector - Increase fuel economy - Advanced

  10. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. CoMuEx» Explosives Center» Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at Los Alamos National Laboratory is part of the DOE's stockpile stewardship

  11. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  12. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  13. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  14. T-610: Red Hat kdenetwork security update

    Office of Energy Efficiency and Renewable Energy (EERE)

    A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files.

  15. Storing files in a parallel computing system using list-based index to identify replica files

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Zhang, Zhenhua; Grider, Gary

    2015-07-21

    Improved techniques are provided for storing files in a parallel computing system using a list-based index to identify file replicas. A file and at least one replica of the file are stored in one or more storage nodes of the parallel computing system. An index for the file comprises at least one list comprising a pointer to a storage location of the file and a storage location of the at least one replica of the file. The file comprises one or more of a complete file and one or more sub-files. The index may also comprise a checksum value for one or more of the file and the replica(s) of the file. The checksum value can be evaluated to validate the file and/or the file replica(s). A query can be processed using the list.

  16. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  17. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  18. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ( Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon ...

  19. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  20. Supervisory Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  1. National Security Education Center

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  2. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  3. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  5. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  6. Provision of mobile and man-portable radiation detection equipment;
  7. Regional cooperation on safeguards...

  8. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  9. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  10. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  11. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  12. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  13. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  14. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  15. File:NREL-bhutan-wind.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-bhutan-wind.pdf Jump to: navigation, search File File history File usage Bhutan - 50m Wind Power Size of this preview: 776 600 pixels. Full...

  16. File:NREL-BioMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-BioMap.pdf Jump to: navigation, search File File history File usage Biomass Power Potential (GW) on Federal Lands by County Size of this...

  17. File:NREL-brazil-glo.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-brazil-glo.pdf Jump to: navigation, search File File history File usage Brazil - Annual Global Horizontal Solar Radiation Size of this...

  18. A secure communications infrastructure for high-performance distributed computing

    SciTech Connect (OSTI)

    Foster, I.; Koenig, G.; Tuecke, S.

    1997-08-01

    Applications that use high-speed networks to connect geographically distributed supercomputers, databases, and scientific instruments may operate over open networks and access valuable resources. Hence, they can require mechanisms for ensuring integrity and confidentially of communications and for authenticating both users and resources. Security solutions developed for traditional client-server applications do not provide direct support for the program structures, programming tools, and performance requirements encountered in these applications. The authors address these requirements via a security-enhanced version of the Nexus communication library; which they use to provide secure versions of parallel libraries and languages, including the Message Passing Interface. These tools permit a fine degree of control over what, where, and when security mechanisms are applied. In particular, a single application can mix secure and nonsecure communication, allowing the programmer to make fine-grained security/performance tradeoffs. The authors present performance results that quantify the performance of their infrastructure.

  19. 2015 State of Indian Nations Address

    Broader source: Energy.gov [DOE]

    The President of the National Congress of American Indians will deliver his annual State of the Indian Nations address to Member of Congress, government officials, tribal leaders and citizens, and...

  20. Weekly Address: Time to Create the Energy Security Trust | Department of

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Webinar Slides about the new Bioenergy KDF october2013_kdf_webinar.pdf (1.13 MB) More Documents & Publications Office of the Biomass Program Educational Opportunities in Bioenergy Intro Webinar Bioenergy Technologies Office Overview Biomass 2013: Welcome Department of Energy

    webinar recording for the Fuel Cell Technologies Office webinar, "What Can We Learn from Hydrogen Safety Event Databases?" originally held on September 10, 2013. In addition to

  21. Rio Arriba Leadership Summit addresses challenges, opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    » Rio Arriba Leadership Summit addresses challenges, opportunities Community Connections: Your link to news and opportunities from Los Alamos National Laboratory Latest Issue: September 1, 2016 all issues All Issues » submit Rio Arriba Leadership Summit addresses challenges, opportunities Community leaders gather in Española for a round-table discussion. July 6, 2016 DOE's Office of Small and Disadvantaged Business Utilization presented Mentor and Protégé of the Year awards to LANS and RG

  22. Emerging threats to global security focus of March 12 talk at Bradbury

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Museum Emerging threats to global security talk March 12 Emerging threats to global security focus of March 12 talk at Bradbury Science Museum Terry Wallace will focus on how the Lab will address these issues and help the government respond. March 6, 2014 Terry Wallace, principal associate director for Global Security Terry Wallace, principal associate director for Global Security Contact Steve Sandoval Communications Office (505) 665-9206 Email During the next 20 years, as the

  1. Acting NNSA Administrator Bruce Held visits Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    | Y-12 National Security Complex Acting NNSA Administrator ... Acting NNSA Administrator Bruce Held visits Y-12 National Security Complex Posted: July 25, 2013 - 6:05pm Acting NNSA Administrator Bruce Held visits Y-12 Bruce Held, Acting NNSA Administrator and Acting Undersecretary for Nuclear Security, visited the Y-12 National Security Complex today. Held toured the site and conducted an All Hands meeting at the site's New Hope Center addressing federal and contractor employees. Held (shown

  2. PSH-15-0020 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 0 - In the Matter of Personnel Security Hearing PSH-15-0020 - In the Matter of Personnel Security Hearing On June 17, 2015, an OHA Administrative Judge issued a decision in which she concluded that an individual's access authorization should not be restored. A Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns under Criterion L regarding her financial irresponsibility. After conducting a hearing and evaluating the evidence,

  3. PSH-16-0004 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 4 - In the Matter of Personnel Security Hearing PSH-16-0004 - In the Matter of Personnel Security Hearing On April 14, 2016, an OHA Administrative Judge issued a decision in which she concluded that an individual's access authorization should not be restored. A Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns under Criterion L regarding his delinquent debts and deliberate misrepresentations on his QNSP. After conducting a

  4. PSH-16-0008 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 8 - In the Matter of Personnel Security Hearing PSH-16-0008 - In the Matter of Personnel Security Hearing On May 19, 2016, an Administrative Judge issued a decision in which she determined that an individual's access authorization should not be restored. In August 2015, as part of a background investigation, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol-related arrests and alcohol use. In addition

  5. PSH-16-0012 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 2 - In the Matter of Personnel Security Hearing PSH-16-0012 - In the Matter of Personnel Security Hearing On June 20, 2016, an Administrative Judge issued a decision in which she determined that an individual's access authorization should be granted. In October 2015, as part of a background investigation, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his gambling. In addition to the PSI, the LSO requested the

  6. PSH-16-0032 - In the Matter of Personnel Security Hearing | Department of

    Energy Savers [EERE]

    Energy 2 - In the Matter of Personnel Security Hearing PSH-16-0032 - In the Matter of Personnel Security Hearing On August 9, 2016, an Administrative Judge issued a decision in which she determined that an individual's access authorization should not be restored. In October 2015, as part of a background investigation, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his falsifications and alcohol use. In addition to

  7. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  8. Lightweight File System (LWFS) v. 1.0

    Energy Science and Technology Software Center (OSTI)

    2008-11-19

    The Lightweight File System (LWFS) is a storage system that provides a minimal set of I/O-system functionality required by file system and/or I/O library implementations for massively parallel machines. In particular, the LWFS-core consists of a scalable security model, an efficient data-movement protocol, and a direct interface to object-based storage devices. Higher-level services such as namespace management, consistency semantics, reliability, and so forth are layered on top of the core services to provide application-specific functionalitymore » as needed. The LWFS code contains implementations of the core services and reference implementations of a number of supplemental services for namespace management and transaction support.« less

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  11. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  12. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  13. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  14. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  15. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  16. EnergyPlus File Generator

    Broader source: Energy.gov [DOE]

    EERE EnergyPlus Factsheet - This fact sheet discusses the EnergyPlus Example File Generator, a free, Web-based service which makes it easier to use EnergyPlus, DOE's building energy analysis and thermal load simulation program. The web-based form allows a user to enter general information about a building and the application then automatically creates a complete EnergyPlus input file, runs an annual simulation, and emails the EnergyPlus input, output, DXF and other files along with an annual summary of the energy results.

  17. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  18. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  19. ICF Reports | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Fusion ICF Reports There are a wide variety of reports that address the world class research and experiments in ICF being performed on behalf of the U.S. ICF Program and stockpile stewardship. Some of these reports are listed below: 2016 Inertial Confinement Fusion Program Framework, U.S. Department of Energy, National Nuclear Security Administration, May 16, 2016. DOE/NA-0044 2015 Review of the Inertial Confinement Fusion and High Energy Density Science Portfolio, U.S. Department of Energy,

  20. Stockpile | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fiscal Year 2015 Stockpile Stewardship and Management Plan Report to Congress April 2014 United States Department of Energy Washington, DC 20585 Department of Energy | April 2014 Fiscal Year 2015 Stockpile Stewardship and Management Plan | Page i Message from the Secretary This report is the Department of Energy National Nuclear Security Administration Fiscal Year 2015 Stockpile Stewardship and Management Plan. It addresses the statutory requirements of Title 50 of United States Code section

  1. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  2. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  3. Intelligent mobile security systems

    SciTech Connect (OSTI)

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  4. AIX 4.3 Elements of Security Effective and Efficient Implementation

    SciTech Connect (OSTI)

    Kosuge, Yoshimichi; Arminguad, Francois; Chew, Lip-Ping; Horne, Leonie; Witteveen, Timothy A.

    2000-01-01

    This IBM Redbook provides an overview of AIX Version 4.3 security. AIX provides many security features that can be used to improve security. The emphasis is on the practical use of these security features, why they are necessary, and how they can be used in your environment. Also recommended are guidelines and best practices when there are many different ways to achieve a secure system. The exponential growth of networks has caused more and more computers to be connected together, which creates an excellent environment for information exchange and sharing. As an increasingly large amount of confidential information is stored and transmitted over public networks, such as the Internet, it becomes imperative that information security be implemented in an effective and efficient manner. This book covers different aspects of security present in AIX 4.3, including user accounts, file systems, networks, and security management. With its detailed product coverage, this book is intended for experienced AIX system administrators who are taking on the role of security administration. Security administrators who are new to AIX will also find this document useful. The reader is assumed to have a basic working knowledge of UNIX. This book is intended as an additional source of security information, and together with existing sources, may be used to enhance your knowledge of security.

  5. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  6. Data File Standard for Flow Cytometry, Version FCS 3.1

    SciTech Connect (OSTI)

    Spidlen, Josef; Moore, Wayne; Parks, David; Goldberg, Michael; Bray, Chris; Gorombey, Peter; Hyun, Bill; Hubbard, Mark; Lange, Simon; Lefebvre, Ray; Leif, Robert; Novo, David; Ostruszka, Leo; Treister, Adam; Wood, James; Murphy, Robert F.; Roederer, Mario; Sudar, Damir; Zigon, Robert; Brinkman, Ryan R.; Brierre, Pierre

    2009-11-10

    The flow cytometry data file standard provides the specifications needed to completely describe flow cytometry data sets within the confines of the file containing the experimental data. In 1984, the first Flow Cytometry Standard format for data files was adopted as FCS 1.0. This standard was modified in 1990 as FCS 2.0 and again in 1997 as FCS 3.0. We report here on the next generation flow cytometry standard data file format. FCS 3.1 is a minor revision based on suggested improvements from the community. The unchanged goal of the standard is to provide a uniform file format that allows files created by one type of acquisition hardware and software to be analyzed by any other type. The FCS 3.1 standard retains the basic FCS file structure and most features of previous versions of the standard. Changes included in FCS 3.1 address potential ambiguities in the previous versions and provide a more robust standard. The major changes include simplified support for international characters and improved support for storing compensation. The major additions are support for preferred display scale, a standardized way of capturing the sample volume, information about originality of the data file, and support for plate and well identification in high throughput, plate based experiments. Please see the normative version of the FCS 3.1 specification in Supporting Information for this manuscript (or at http://www.isac-net.org/ in the Current standards section) for a complete list of changes.

  7. PSH-16-0014 - In the Matter of Personnel Security Hearing | Department of

    Energy Savers [EERE]

    Energy 14 - In the Matter of Personnel Security Hearing PSH-16-0014 - In the Matter of Personnel Security Hearing On August 19, 2016, an Administrative Judge issued a decision in which he determined that an individual's access authorization should not be restored. According to the Notification Letter, the individual's financial irresponsibility had led to a Chapter 13 bankruptcy that he filed in late 2014. Primary causes of the individual's financial overextension included providing $80,000

  8. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to

  9. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  10. Reading File Bonneville Power Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reading File Bonneville Power Administration P.O. Box 3621 Portland, Oregon 97208-3621 POWER SERVICES In reply refer to: PG-5 Ms. Renata Kurschner Director, Generation Resource...

  11. Cheaper Adjoints by Reversing Address Computations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hascoët, L.; Utke, J.; Naumann, U.

    2008-01-01

    The reverse mode of automatic differentiation is widely used in science and engineering. A severe bottleneck for the performance of the reverse mode, however, is the necessity to recover certain intermediate values of the program in reverse order. Among these values are computed addresses, which traditionally are recovered through forward recomputation and storage in memory. We propose an alternative approach for recovery that uses inverse computation based on dependency information. Address storage constitutes a significant portion of the overall storage requirements. An example illustrates substantial gains that the proposed approach yields, and we show use cases in practical applications.

  12. Shared address collectives using counter mechanisms

    DOE Patents [OSTI]

    Blocksome, Michael; Dozsa, Gabor; Gooding, Thomas M; Heidelberger, Philip; Kumar, Sameer; Mamidala, Amith R; Miller, Douglas

    2014-02-18

    A shared address space on a compute node stores data received from a network and data to transmit to the network. The shared address space includes an application buffer that can be directly operated upon by a plurality of processes, for instance, running on different cores on the compute node. A shared counter is used for one or more of signaling arrival of the data across the plurality of processes running on the compute node, signaling completion of an operation performed by one or more of the plurality of processes, obtaining reservation slots by one or more of the plurality of processes, or combinations thereof.

  13. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  14. Office of Radiological Security | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Office of Radiological Security Office of Radiological Security NNSA Provides Tajikistan...

  15. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  16. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  17. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  18. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  19. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  20. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  1. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  2. Voluntary Protection Program Onsite Review, National Security...

    Broader source: Energy.gov (indexed) [DOE]

    Recertification of National Security Technologies, LLCNevada National Security Site as a ... of National Security Technologies, LLCNevada National Security Site during the period ...

  3. PIA - Richland Personal Security Clearance Record | Department...

    Energy Savers [EERE]

    Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance ...

  4. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  5. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  6. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  7. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    SciTech Connect (OSTI)

    Gala, Alan; Ohmacht, Martin

    2014-09-02

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  8. Office of Electricity Delivery and Energy Reliability Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Selections | Department of Energy and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise Global Forum, U.S. Energy Secretary Steven Chu today announced the investment of more than $30 million for ten projects that will address cybersecurity issues facing the nation's electric grid. Together, these projects represent a significant

  9. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  10. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  11. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  12. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  13. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  14. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  15. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  16. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  17. Los Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applying science and technology to homeland security challenges, and safety and security. ... through the Board of Governors, and functional managers of the parent organization ...

  18. Security Cases | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    raised concerns about the individual's eligibility to maintain a security clearance. ... and (l), the individual's security clearance was suspended, and he requested a hearing. ...

  19. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  20. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...