National Library of Energy BETA

Sample records for defense activities security

  1. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  2. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  3. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  4. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies Control Systems Cyber Security: Defense in ... strategies for organizations that use control system networks while maintaining a ...

  5. Defense Programs | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    One of the primary missions of NNSA is to maintain and enhance the safety, security and reliability of the U.S. nuclear weapons stockpile. NNSA, through its Office of Defense ...

  6. Defense Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  7. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  8. defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  9. department of defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  10. planetary defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    planetary defense | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  11. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Program Areas Defense Systems About Defense Systems & Assessments Program Areas Accomplishments Cybersecurity Programs Program Areas EOD security and defense photo Sandia's engineering, science, and technology expertise helps anticipate and solve the nation's toughest security challenges. Defense Systems & Assessments work is focused in seven main program areas: Information Operations: Information Operations develops technologies that help protect U.S. government,

  12. NA 70 - Associate Administrator for Defense Nuclear Security | National

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration 70 - Associate Administrator for Defense Nuclear Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters

  13. Independent Activity Report, Defense Nuclear Facilities Safety...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October...

  14. Statement on Defense Nuclear Nonproliferation and Naval Reactors Activities

    National Nuclear Security Administration (NNSA)

    before the House Committee on Appropriations Subcommittee on Energy & Water Development | National Nuclear Security Administration Defense Nuclear Nonproliferation and Naval Reactors Activities before the House Committee on Appropriations Subcommittee on Energy & Water Development | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our

  15. Defense Nuclear Nonproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nonproliferation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  16. defense programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    programs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  17. Defense Nuclear Facility | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Facility | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  18. 2015 NNSA Defense Programs Science Council | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration NNSA Defense Programs Science Council | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply

  19. NPO recognized by Defense Programs | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration recognized by Defense Programs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for

  20. Cyber Security Research Frameworks For Coevolutionary Network Defense

    SciTech Connect (OSTI)

    Rush, George D.; Tauritz, Daniel Remy

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  1. second line of defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    second line of defense | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  2. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments Programs Defense Systems & Assessments Accelerating Innovation for the Warfighter Accelerating Innovation into the Hands of the Warfighter Supporting Ballistic Missile Defense Supporting Ballistic Missile Defense Launching GPS Satellites Launch of GPS satellite About Defense Systems & Assessments Our engineering, science, and technology expertise supports soldiers on the battlefield. About Us Program Areas Our multi-faceted research detects and defends against threats

  3. NA 70 - Associate Administrator for Defense Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 70 - Associate Administrator for Defense ... NA 70 - Associate Administrator...

  4. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  5. Defense Programs: the mission | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Defense Programs: the ... Defense Programs: the mission Posted: February 7, 2013 - 6:05pm | Y-12 Report | Volume 9, Issue 2 | 2013 During the early days of World War II, fear that Germany would create and use an atomic bomb led the U.S. to secretly launch the Manhattan Project to build one first. Enriched uranium and plutonium were the two fissionable materials investigated for use. An original Manhattan Project site, Y-12 was given the defense programs mission to enrich uranium to the level

  6. defense

    National Nuclear Security Administration (NNSA)

    >Madelyn Creedon, Assistant Secretary for Global Strategic Affairs
    Andrew Weber, Assistant Secretary of Defense for Nuclear, Chemical & Biological Defense...

  7. Defense Secretary Chuck Hagel visits Sandia | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Secretary Chuck Hagel visits Sandia | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply

  8. Office of Defense Nuclear Nonproliferation | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Nuclear Nonproliferation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs

  9. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  10. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Cybersecurity Programs Cybersecurity Delivering experience & expertise Training the next generation of cyber defenders Cybersecurity computing Defending national security Applying science and engineering to protect cyber systems from malicious attacks Cyber worker inspecting supercomputer Protecting cyberspace An expert team, passionate about defending the nation's critical infrastructure Computer Annex "The cyber threat to our nation is one of the most serious

  11. Defense Programs lecture series continue | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration lecture series continue | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs

  12. Office of Defense Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  13. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    SciTech Connect (OSTI)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  14. Defense Gallery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gallery Defense Gallery Exhibits in this gallery capture Laboratory's activities to fulfill its central mission to ensure the safety, security, and reliability of the U.S. nuclear deterrent while reducing the global threat of nuclear, chemical, and biological weapons. August 18, 2014 museum plan showing the defense gallery Laboratory provides the necessary expertise and technology developed here to help the nation respond effectively to significant threats of broad scope and to help make the

  15. Independent Oversight Activity Report, Nevada National Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    March 3-6, 2014 Independent Oversight Activity Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security...

  16. Independent Oversight Activity Report, National Nuclear Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Administration Production Office - March 10-14, 2014 Independent Oversight Activity Report, National Nuclear Security Administration Production Office - March 10-14,...

  17. Independent Activity Report, Nevada National Security Site -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR...

  18. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct other ...

  19. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Securityís Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSPís current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  20. Airborne megawatt class free-electron laser for defense and security

    SciTech Connect (OSTI)

    Roy Whitney; David Douglas; George Neil

    2005-03-01

    An airborne megawatt (MW) average power Free-Electron Laser (FEL) is now a possibility. In the process of shrinking the FEL parameters to fit on ship, a surprisingly lightweight and compact design has been achieved. There are multiple motivations for using a FEL for a high-power airborne system for Defense and Security: Diverse mission requirements can be met by a single system. The MW of light can be made available with any time structure for time periods from microseconds to hours, i.e. there is a nearly unlimited magazine. The wavelength of the light can be chosen to be from the far infrared (IR) to the near ultraviolet (UV) thereby best meeting mission requirements. The FEL light can be modulated for detecting the same pattern in the small fraction of light reflected from the target resulting in greatly enhanced targeting control. The entire MW class FEL including all of its subsystems can be carried by large commercial size airplanes or on an airship. Adequate electrical power can be generated on the plane or airship to run the FEL as long as the plane or airship has fuel to fly. The light from the FEL will work well with relay mirror systems. The required R&D to achieve the MW level is well understood. The coupling of the capabilities of an airborne FEL to diverse mission requirements provides unique opportunities.

  1. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect (OSTI)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  2. Transportation Security Rulemaking Activities at the U.S. Nuclear...

    Office of Environmental Management (EM)

    Activities at the U.S. Nuclear Regulatory Commission Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission Transportation Security Rulemaking...

  3. A Summary of Control System Security Standards Activities in...

    Broader source: Energy.gov (indexed) [DOE]

    document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication...

  4. Office of Secure Transportation Activities | Department of Energy

    Office of Environmental Management (EM)

    Office of Secure Transportation Activities Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear ...

  5. Program Activities | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Activities | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  6. Independent Activity Report, Nevada National Security Site - August 2012 |

    Office of Environmental Management (EM)

    Department of Energy August 2012 Independent Activity Report, Nevada National Security Site - August 2012 August 2012 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2012-08-16] This Independent Activity Report documents an operational awareness oversight activity conducted by Office of Health, Safety and Security's Office of Safety and Emergency Management Evaluations August 13-16, 2012, at the Nevada National Security Site. The purpose of the activity was to

  7. Independent Activity Report, Nevada National Security Site - December 2012

    Office of Environmental Management (EM)

    | Department of Energy December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit [HIAR NNSS-2012-12-03] This Independent Activity Report documents an operational awareness oversight activity conducted by Office of Health, Safety and Security's Office of Safety and Emergency Management Evaluations December 3-6, 2012, at the Nevada National Security Site. The purpose of the activity was to

  8. Independent Oversight Activity Report, Nevada National Security Site -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    March 3-6, 2014 | Department of Energy March 3-6, 2014 Independent Oversight Activity Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2014-03-03] This Independent Activity Report documents an oversight activity conducted by the Office of Health, Safety and Security's (HSS) Office of Safety and Emergency Management Evaluations on March 3-6, 2014, at the Nevada National Security Site. The

  9. Independent Activity Report, Los Alamos National Security - June 2011 |

    Office of Environmental Management (EM)

    Department of Energy Security - June 2011 Independent Activity Report, Los Alamos National Security - June 2011 June 2011 Review of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment Practices [HIAR-LANL-2011-06-08] This Independent Activity Report documents a review conducted by Office of Health, Safety and Security's Office of Safety and Emergency Management Evaluations June 6-8, 2011, at the Los Alamos National Laboratory. The review was

  10. Nevada National Security Site

    Broader source: Energy.gov [DOE]

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  11. Independent Activity Report, Nevada National Security Site - April 2011 |

    Office of Environmental Management (EM)

    Department of Energy April 2011 Independent Activity Report, Nevada National Security Site - April 2011 April 2011 Nevada National Security Site Operational Readiness Review for the Joint Actinide Shock Physics Experimental Research Facility Restart Pre-visit [HIAR-NNSS-2011-04-28] This Independent Activity Report documents an oversight activity conducted by Office of Health, Safety and Security's (HSS) Office of Safety and Emergency Management Evaluations April 25-28, 2011, at the Nevada

  12. Operational Awareness Records and Activity Reports | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    March 25, 2011 Independent Activity Report, Nevada National Security Site - February 2011 Nevada National Security Site Defense Nuclear Facility Safety Board Review...

  13. Nuclear Weapon Surety Interface with the Department of Defense

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-05-14

    This Order establishes Department of Energy and National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the Department of Defense. Supersedes DOE O 452.6.

  14. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  15. The National Nuclear Security Administration's Neutron Generator Activities

    Energy Savers [EERE]

    National Nuclear Security Administration's Neutron Generator Activities OAS-L-14-11 August 2014 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 August 20, 2014 MEMORANDUM FOR THE MANAGER, SANDIA FIELD OFFICE FROM: David Sedillo Director, Western Audits Division Office of Inspector General SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration's Neutron Generator Activities"

  16. Independent Oversight Activity Report, Nevada National Security Site -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 5-7, 2014 | Department of Energy May 5-7, 2014 Independent Oversight Activity Report, Nevada National Security Site - May 5-7, 2014 May 5-7, 2014 Operational Awareness Oversight Visit of the Nevada National Security Site [IAR-NNSS-2014-05-05] This Independent Activity Report documents an oversight activity conducted by the Office of Independent Enterprise Assessments (IEA), Office of Nuclear Safety and Environmental Assessments, from May 5-7, 2014. The activity consisted of IEA staff

  17. DOE - NNSA/NFO -- National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office With its long-standing partnerships with the defense weapons National Laboratories and the U.S. Department of Defense, the Nevada National Security Site has been an active participant in maintaining our nation's security. Our technical heritage began in the Atomic Age with atmospheric tests, continuing with underground testing and weapons systems experiments. Our skills and technologies for fielding complex experiments

  18. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  19. Photo Album Of FAPAC - NM Activities | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Album Of FAPAC - NM Activities | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for

  20. Sulforaphane prevents pulmonary damage in response to inhaled arsenic by activating the Nrf2-defense response

    SciTech Connect (OSTI)

    Zheng, Yi; Department of Pharmacology and Toxicology, College of Pharmacy, University of Arizona, 1703 East Mabel Street, Tucson, AZ 85721 ; Tao, Shasha; Lian, Fangru; Chau, Binh T.; Chen, Jie; Sun, Guifan; Fang, Deyu; Lantz, R. Clark; Arizona Cancer Center, University of Arizona, 1515 North Campbell Avenue, Tucson, AZ 85724 ; Zhang, Donna D.

    2012-12-15

    Exposure to arsenic is associated with an increased risk of lung disease. Novel strategies are needed to reduce the adverse health effects associated with arsenic exposure in the lung. Nrf2, a transcription factor that mediates an adaptive cellular defense response, is effective in detoxifying environmental insults and prevents a broad spectrum of diseases induced by environmental exposure to harmful substances. In this report, we tested whether Nrf2 activation protects mice from arsenic-induced toxicity. We used an in vivo arsenic inhalation model that is highly relevant to low environmental human exposure to arsenic-containing dusts. Two-week exposure to arsenic-containing dust resulted in pathological alterations, oxidative DNA damage, and mild apoptotic cell death in the lung; all of which were blocked by sulforaphane (SF) in an Nrf2-dependent manner. Mechanistically, SF-mediated activation of Nrf2 alleviated inflammatory responses by modulating cytokine production. This study provides strong evidence that dietary intervention targeting Nrf2 activation is a feasible approach to reduce adverse health effects associated with arsenic exposure. -- Highlights: ? Exposed to arsenic particles and/or SF have elevated Nrf2 and its target genes. ? Sulforaphane prevents pathological alterations, oxidative damage and cell death. ? Sulforaphane alleviates infiltration of inflammatory cells into the lungs. ? Sulforaphane suppresses arsenic-induced proinflammatory cytokine production.

  1. Independent Oversight Activity Report, National Nuclear Security Administration Production Office- March 10-14, 2014

    Broader source: Energy.gov [DOE]

    Contractor Transition Activities for the National Nuclear Security Administration Production Office [IAR-NPO-2014-03-10

  2. A Summary of Control System Security Standards Activities in the Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sector (October 2005) | Department of Energy A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of

  3. Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting- October 2012

    Broader source: Energy.gov [DOE]

    Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02

  4. Annual Report To Congress. Department of Energy Activities Relating to the Defense Nuclear Facilities Safety Board, Calendar Year 2003

    SciTech Connect (OSTI)

    None, None

    2004-02-28

    The Department of Energy (Department) submits an Annual Report to Congress each year detailing the Departmentís activities relating to the Defense Nuclear Facilities Safety Board (Board), which provides advice and recommendations to the Secretary of Energy (Secretary) regarding public health and safety issues at the Departmentís defense nuclear facilities. In 2003, the Department continued ongoing activities to resolve issues identified by the Board in formal recommendations and correspondence, staff issue reports pertaining to Department facilities, and public meetings and briefings. Additionally, the Department is implementing several key safety initiatives to address and prevent safety issues: safety culture and review of the Columbia accident investigation; risk reduction through stabilization of excess nuclear materials; the Facility Representative Program; independent oversight and performance assurance; the Federal Technical Capability Program (FTCP); executive safety initiatives; and quality assurance activities. The following summarizes the key activities addressed in this Annual Report.

  5. Sequential Detection of Fission Processes for Harbor Defense (Conference) |

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Sequential Detection of Fission Processes for Harbor Defense Citation Details In-Document Search Title: Sequential Detection of Fission Processes for Harbor Defense With the large increase in terrorist activities throughout the world, the timely and accurate detection of special nuclear material (SNM) has become an extremely high priority for many countries concerned with national security. The detection of radionuclide contraband based on their ő≥-ray emissions has been

  6. March 23, 1983: Strategic Defense Initiative (SDI)

    Broader source: Energy.gov [DOE]

    March 23, 1983President Reagan addresses the nation on national security and announces the Strategic Defense Initiative (SDI), a satellite-based defense system that would destroy incoming missiles...

  7. Recommended Practice: Defense-in-Depth

    Energy Savers [EERE]

    External Report # INL/EXT-06-11478 Control Systems Cyber Security: Defense in Depth Strategies May 2006 Prepared by Idaho National Laboratory Recommended Best Practice: Defense in Depth 2 Table of Contents Keywords............................................................................................................................. 3 Introduction......................................................................................................................... 3 Background

  8. Defense Waste Management Programs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Waste Management Programs - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  9. Identification of chemical hazards for security risk analysis activities.

    SciTech Connect (OSTI)

    Jaeger, Calvin Dell

    2005-01-01

    The presentation outline of this paper is: (1) How identification of chemical hazards fits into a security risk analysis approach; (2) Techniques for target identification; and (3) Identification of chemical hazards by different organizations. The summary is: (1) There are a number of different methodologies used within the chemical industry which identify chemical hazards: (a) Some develop a manual listing of potential targets based on published lists of hazardous chemicals or chemicals of concern, 'expert opinion' or known hazards. (b) Others develop a prioritized list based on chemicals found at a facility and consequence analysis (offsite release affecting population, theft of material, product tampering). (2) Identification of chemical hazards should include not only intrinsic properties of the chemicals but also potential reactive chemical hazards and potential use for activities off-site.

  10. Energy and Defense Departments Announce New Steps to Enhance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    New Steps to Enhance Cooperation on Clean Energy and Energy Security Energy and Defense Departments Announce New Steps to Enhance Cooperation on Clean Energy and Energy Security ...

  11. Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998

    SciTech Connect (OSTI)

    1999-02-01

    This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

  12. Nuclear Weapon Surety Interface with the Department of Defense

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-19

    The Order prescribes how the Department of Energy participates with the Department of Defense (DoD) to ensure the surety (safety, security and control) of military nuclear weapon systems deployed around the world. The Order establishes National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the DoD. Cancels DOE O 5610.13. Canceled by DOE O 452.6A.

  13. Independent Activity Report, Y-12 National Security Complex- June 2011

    Broader source: Energy.gov [DOE]

    Site Lead Orientation Visit to the Y-12 Site Office and Y-12 National Security Complex [HIAR-Y-12-2011-06-23

  14. Independent Activity Report, Nevada National Security Site- July 2011

    Broader source: Energy.gov [DOE]

    Review of Nevada National Security Site Device Assembly Facility Justification for Continued Operations for Inoperable HEPA-Filtered Ventilation System [HIAR-NNSS-2011-07-08

  15. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  16. Independent Activity Report, Office of Secure Transportation- March 2011

    Broader source: Energy.gov [DOE]

    Report for the Appropriateness of Revisions to the Emergency Planning Hazards Assessment and Protection Action Recommendation Cards for the Office of Secure Transportation [HIAR-OST-2011-03-04

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ($ Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon Activities 241 242 252 10 Mixed Oxide Fuel Fabrication Facility (MOX) 340 332 270 (62) Defense Nuclear Nonproliferation (DNN) 77 58 91 33 Federal Expenses 4.7 5.2 5.4 .2 Total Budget for NNSA at SRS 662.7 637.2 618.4 (18.8)

  18. Transgenic expression of the dicotyledonous pattern recognition receptor EFR in rice leads to ligand-dependent activation of defense responses

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Schwessinger, Benjamin; Bahar, Ofir; Thomas, Nicolas; Holton, Nicolas; Nekrasov, Vladimir; Ruan, Deling; Canlas, Patrick E.; Daudi, Arsalan; Petzold, Christopher J.; Singan, Vasanth R.; et al

    2015-03-30

    Plant plasma membrane localized pattern recognition receptors (PRRs) detect extracellular pathogen-associated molecules. PRRs such as Arabidopsis EFR and rice XA21 are taxonomically restricted and are absent from most plant genomes. Here we show that rice plants expressing EFR or the chimeric receptor EFR::XA21, containing the EFR ectodomain and the XA21 intracellular domain, sense both Escherichia coli- and Xanthomonas oryzae pv. oryzae (Xoo)-derived elf18 peptides at sub-nanomolar concentrations. Treatment of EFR and EFR::XA21 rice leaf tissue with elf18 leads to MAP kinase activation, reactive oxygen production and defense gene expression. Although expression of EFR does not lead to robust enhanced resistancemore¬†¬Ľ to fully virulent Xoo isolates, it does lead to quantitatively enhanced resistance to weakly virulent Xoo isolates. EFR interacts with OsSERK2 and the XA21 binding protein 24 (XB24), two key components of the rice XA21-mediated immune response. Rice-EFR plants silenced for OsSERK2, or overexpressing rice XB24 are compromised in elf18-induced reactive oxygen production and defense gene expression indicating that these proteins are also important for EFR-mediated signaling in transgenic rice. Taken together, our results demonstrate the potential feasibility of enhancing disease resistance in rice and possibly other monocotyledonous crop species by expression of dicotyledonous PRRs. Our results also suggest that Arabidopsis EFR utilizes at least a subset of the known endogenous rice XA21 signaling components.¬ę¬†less

  19. Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000

    SciTech Connect (OSTI)

    2001-03-01

    This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

  20. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    From a Department of Defense (DoD) perspective, SMrs offer great advantage for energy security with stable fuel cost profiles, a secure installation for meeting base-load power demands with a robust, secured reactor design (i.e., energy security), potential to provide potable water and synthetic fuels, and a means to exceed DoD greenhouse gases (GhG) reduction goals. While presently SMrs are being proposed based on various reactor technologies, SMrs based on light-water reactor (lWr)

  1. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLís ďdefense in depthĒ approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability Ė and your last line of defense.

  2. Transgenic expression of the dicotyledonous pattern recognition receptor EFR in rice leads to ligand-dependent activation of defense responses

    SciTech Connect (OSTI)

    Schwessinger, Benjamin; Bahar, Ofir; Thomas, Nicolas; Holton, Nicolas; Nekrasov, Vladimir; Ruan, Deling; Canlas, Patrick E.; Daudi, Arsalan; Petzold, Christopher J.; Singan, Vasanth R.; Kuo, Rita; Chovatia, Mansi; Daum, Christopher; Heazlewood, Joshua L.; Zipfel, Cyril; Ronald, Pamela C.

    2015-03-30

    Plant plasma membrane localized pattern recognition receptors (PRRs) detect extracellular pathogen-associated molecules. PRRs such as Arabidopsis EFR and rice XA21 are taxonomically restricted and are absent from most plant genomes. Here we show that rice plants expressing EFR or the chimeric receptor EFR::XA21, containing the EFR ectodomain and the XA21 intracellular domain, sense both Escherichia coli- and Xanthomonas oryzae pv. oryzae (Xoo)-derived elf18 peptides at sub-nanomolar concentrations. Treatment of EFR and EFR::XA21 rice leaf tissue with elf18 leads to MAP kinase activation, reactive oxygen production and defense gene expression. Although expression of EFR does not lead to robust enhanced resistance to fully virulent Xoo isolates, it does lead to quantitatively enhanced resistance to weakly virulent Xoo isolates. EFR interacts with OsSERK2 and the XA21 binding protein 24 (XB24), two key components of the rice XA21-mediated immune response. Rice-EFR plants silenced for OsSERK2, or overexpressing rice XB24 are compromised in elf18-induced reactive oxygen production and defense gene expression indicating that these proteins are also important for EFR-mediated signaling in transgenic rice. Taken together, our results demonstrate the potential feasibility of enhancing disease resistance in rice and possibly other monocotyledonous crop species by expression of dicotyledonous PRRs. Our results also suggest that Arabidopsis EFR utilizes at least a subset of the known endogenous rice XA21 signaling components.

  3. Their best defense is good fiscal sense (Daily Press) | Jefferson...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    https:www.jlab.orgnewsarticlestheir-best-defense-good-fiscal-sense-daily-press Their best defense is good fiscal sense Top Guard Security finds it can be a good idea to say,...

  4. Deception used for Cyber Defense of Control Systems

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  5. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  6. S.2058: This act may be cited as the Department of Energy National Security Act for Fiscal Year 1999, introduced in the Senate of the United States, One Hundred Fifth Congress, Second Session, May 11, 1998

    SciTech Connect (OSTI)

    1998-12-31

    This bill is to authorize appropriations for fiscal year 1999 for defense activities of the Department of Energy, and for other purposes. Topics addressed in the bill include DOE national security programs including recurring general provisions and program authorizations, restrictions,and limitations; defense nuclear facilities safety board; national defense stockpile; naval petroleum reserves; and Panama Canal commission.

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  8. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  9. Defense Advanced Research Projects Agency

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advanced Research Projects Agency - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  10. In-Reach/Outreach Activities | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    In-Reach/Outreach ... In-Reach/Outreach Activities For in-reach activities, the SPO holds meetings and conducts numerous presentations each year for Y-12's operations, divisions, and management team to provide training and guidance for buyers concerning socioeconomic program policy, procedures, goals, and federal regulations that govern the program. Other in-reach activities may also include posting the capabilities and accomplishments of small businesses in Y-12's newsletter, The Y-12 Times.

  11. 2013 NNSA Defense Programs Science Council | National Nuclear...

    National Nuclear Security Administration (NNSA)

    NNSA Defense Programs Science Council | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  12. Energy and Defense Departments Announce Agreement to Enhance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and ...

  13. NIST Activities in Support of the Energy Independence and Security Act

    Office of Environmental Management (EM)

    (EISA) of 2007 | Department of Energy NIST Activities in Support of the Energy Independence and Security Act (EISA) of 2007 NIST Activities in Support of the Energy Independence and Security Act (EISA) of 2007 Revitalizing the electric power grid has become one of our Nation's top priorities, promising to reduce our dependence on oil and to meet the anticipated 1.1% annual increase in demand for electricity1. In his New Energy for America plan, President-elect Obama calls for increased

  14. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  15. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  16. Office of Defense Nuclear Nonproliferation

    Energy Savers [EERE]

    Nuclear Security Administration Office of Defense Nuclear Nonproliferation Overview of Nuclear Nonproliferation Programs: What Hasn't Changed, What Has Changed, and What Might Benefit from Change December 3, 2013 Briefing Outline * Organizational Context ÔÉė DNN Vision, Mission and Competencies ÔÉė Organization ÔÉė Global Reach ÔÉė Partners ÔÉė Prioritization Methodology * DNN Programs - Opportunities and Challenges ÔÉė GTRI, R&D, NIS, IMPC, FMD * Looking Ahead: Over the Horizon (OTH) and

  17. Disposal Activities and the Unique Waste Streams at the Nevada National Security Site (NNSS)

    SciTech Connect (OSTI)

    Arnold, P.

    2012-10-31

    This slide show documents waste disposal at the Nevada National Security Site. Topics covered include: radionuclide requirements for waste disposal; approved performance assessment (PA) for depleted uranium disposal; requirements; program approval; the Waste Acceptance Review Panel (WARP); description of the Radioactive Waste Acceptance Program (RWAP); facility evaluation; recent program accomplishments, nuclear facility safety changes; higher-activity waste stream disposal; and, large volume bulk waste streams.

  18. NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 An Act to authorize appropriations for fiscal year 2000 for military activities of the Department of Defense, for military construction, and for defense activities of the Department of Energy, to prescribe personnel strengths for such fiscal year for the Armed Forces, and for other purposes. PDF icon NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 More Documents

  19. Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  20. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  1. Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  2. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  3. Action Codes Table | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System NMMSS Information, Reports & Forms Code Tables Action...

  4. National Security Science | Los National Alamos Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    this Issue (pdf) In 2012 NSS received an NNSA Defense Programs AWARD OF EXCELLENCE National Security Science Mail Stop A142 Los Alamos National Laboratory Los Alamos, NM...

  5. Protections = Defenses in Depth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protections = Defenses in Depth Protections = Defense in Depth We use a defense-in-depth strategy to protect the environment. August 1, 2013 Protections = Defense in Depth: Protection #1: Remove the source of contamination; Protection #2: Stabilize, retain or remove contaminated sediments; Protection #3: Sample for known and unexpected contaminants Clean the Past: Protections Protections: Cleanup Cleanup 101 Corrective Measures Process Protection #1: Remove the Source Example Cleanup: Removal of

  6. Sandia National Laboratories: National Security Missions: International

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Homeland and Nuclear Security: Homeland Defense and Force Protection Defense & Force Protection HDPF We design and implement advanced systems for intrusion detection and denial. We anticipate new threats and develop responses and countermeasures. We field technologies for protecting security forces and military personnel. We are committed to providing a Center of Excellence for Physical Security to support the DOE and DOD in ensuring the security of the nation's nuclear arsenal and

  7. Ike Skelton Defense Authorization Act | Open Energy Information

    Open Energy Info (EERE)

    for the defense of the U.S. and its interests abroad, for military construction and for national security-related energy programs. Published NA Year Signed or Took Effect 2011...

  8. Energy and Defense Departments Announce Agreement to Enhance Cooperation on

    Energy Savers [EERE]

    Clean Energy and Strengthen Energy Security | Department of Energy Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security July 27, 2010 - 12:00am Addthis Washington, D.C. - At a White House Forum on Energy Security today, U.S. Deputy Secretary of Energy Daniel Poneman announced a Memorandum of Understanding (MOU) between the U.S. Department of

  9. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    19, 2001 Energy Department And University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for two of the Energy Department's defense labs, Lawrence Livermore and Los Alamos. The move expands and strengthens the contracts' requirements, and extends them for a three-year period. "This is a significant move

  10. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  11. Environmental security: Concepts and air force implementation

    SciTech Connect (OSTI)

    Walewski, J.A.

    1995-12-01

    With the end of the Cold War the Department of Defense (DoD) has been reorganized to establish the position of Deputy Under Secretary of Defense for Environmental Security. As a result, the definition of national security has been broadened to include the environment. Environment and protection of the interrelated resources are seen as vital components to the health and welfare of the United States. National security is dependent on environmental security. This paper introduces the role of environmental security as a component of current national security strategy; reviews DoD and the military services role in the domestic legacy of environmental impacts created by the cold war; details the status of current programs and methodologies used to improve environmental performance, compliance with environmental laws, and stewardship activities. Implementation will be demonstrated using Air Force policy, programs and activities underway, and a detailed explanation of Air Force environmental goals and objectives will be highlighted. Lessons learned to date will be covered in addition to future alternative strategies. Military readiness however does not preclude environmental stewardship. Many military lands have become virtual sanctuaries since years of restricted access and activity created islands of diverse ecosystems. Recent survey and inventory work on DoD lands have found some of the most pristine tracts remaining in the country. Consolidation of mission activities through base closure an realignment, and increasing weapon system sophistication, adds additional challenges to comply with environmental laws and regulation. This paper will define these unique environmental challenges, and discuss the methodologies used by the Air Force to fulfill its environmental stewardship role.

  12. Office of the Assistant General Counsel for International and National Security Programs

    Broader source: Energy.gov [DOE]

    The Office of the Assistant General Counsel for International and National Security Programs provides legal advice in support of DOE defense and national security programs, intelligence and counter...

  13. Survey of US Department of Defense Manufacturing Technology Program activities applicable to civilian manufacturing industries. Final report

    SciTech Connect (OSTI)

    Azimi, S.A.; Conrad, J.L.; Reed, J.E.

    1985-03-01

    Intent of the survey was to identify and characterize activities potentially applicable to improving energy efficiency and overall productivity in the civilian manufacturing industries. The civilian industries emphasized were the general manufacturing industries (including fabricated metals, glass, machinery, paper, plastic, textile, and transportation equipment manufacturing) and the primary metals industries (including primary aluminum, copper, steel, and zinc production). The principal steps in the survey were to: develop overview taxonomies of the general manufacturing and primary metals industries as well as specific industry taxonomies; identify needs and opportunities for improving process energy efficiency and productivity in the industries included; identify federal programs, capabilities, and special technical expertise that might be relevant to industry's needs and opportunities; contact federal laboratories/facilities, through visits and other forms of inquiry; prepare formatted profiles (descriptions) potentially applicable work efforts; review findings with industry; and compile and evaluate industry responses.

  14. S. 936: A Bill to authorize appropriations for fiscal year 1998 for military activities of the Department of Defense, for military construction, and for defense activities of the Department of Energy, to prescribe personnel strengths for such fiscal year for the Armed Forces, and for other purposes. Introduced in the Senate of the United States, One Hundred Fifth Congress, First session

    SciTech Connect (OSTI)

    1997-12-31

    This report discusses a bill that may be cited as the National Defense Authorization Act for fiscal year 1998.

  15. Don Cook discusses NNSA's Defense Programs at Woodrow Wilson Center |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration discusses NNSA's Defense Programs at Woodrow Wilson Center | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets

  16. Kathleen Carlson Appointed Interim Acting Deputy Administrator for Defense

    National Nuclear Security Administration (NNSA)

    Programs | National Nuclear Security Administration Kathleen Carlson Appointed Interim Acting Deputy Administrator for Defense Programs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios

  17. Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear

    National Nuclear Security Administration (NNSA)

    Nonproliferation to the Senate Armed Services Sub Committee On Emerging Threats and Capabilities | National Nuclear Security Administration of Anne M. Harrington, Deputy Administrator for Defense Nuclear Nonproliferation to the Senate Armed Services Sub Committee On Emerging Threats and Capabilities | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response

  18. NNSA's Second Line of Defense Program Receives Capability Award |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Second Line of Defense Program Receives Capability Award | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets

  19. Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific

    National Nuclear Security Administration (NNSA)

    Northwest National Laboratory | National Nuclear Security Administration Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Northwest National Laboratory | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations

  20. NA 10 - Deputy Administrator for Defense Programs | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration 0 - Deputy Administrator for Defense Programs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo

  1. NA 20 - Deputy Administrator for Defense Nuclear Nonproliferation |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration 20 - Deputy Administrator for Defense Nuclear Nonproliferation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets

  2. NNSA Defense Programs Announces Quarterly Awards | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration Defense Programs Announces Quarterly Awards | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo

  3. Safeguards and Security and Cyber Security RM | Department of Energy

    Energy Savers [EERE]

    Safeguards and Security and Cyber Security RM Safeguards and Security and Cyber Security RM The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4. PDF icon Safeguards and Security and Cyber Security RM More Documents & Publications Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Glossary - DOE M 470.4-7 Standard Review Plan -

  4. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    SciTech Connect (OSTI)

    Farnham, Irene; Krenzien, Susan

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  5. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    SciTech Connect (OSTI)

    Krenzien, Susan; Farnham, Irene

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participantís requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  6. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  7. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  8. Listing of Defense Nuclear Facilities | Department of Energy

    Energy Savers [EERE]

    Listing of Defense Nuclear Facilities Listing of Defense Nuclear Facilities PDF icon Attachment 1 - Listing of Defense Nuclear Facilities More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities Workforce Restructuring Policy The First Five Years FY 2004-2008

  9. National Defense Authorization Act for Fiscal Year 2000 § 3164:

    Office of Environmental Management (EM)

    Whistleblower Protection Program | Department of Energy National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program Stakeholders: DOE Employees and Contractors engaged in defense activities for the Department Scope: Section 3164 of the National Defense Authorization Act for Fiscal Year 2000 implements a whistleblower protection program to ensure that covered

  10. Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission

    Office of Environmental Management (EM)

    AT THE U.S. NUCLEAR REGULATORY COMMISSION R. Clyde Ragland, P.E. Office of Nuclear Security and Incident Response 2011 DOE National Transportation Stakeholders Forum May 11, 2011 2 NRC Focus Prior to September 11, 2001 * Historically, NRC Transportation Security Regulations Focused on Highest Risk Radioactive Material, consisted of Special Nuclear Material (SNM) and Spent Nuclear Fuel (SNF) NRC Actions Since September 11, 2001 * Domestically, reviewed materials transported by NRC licensees and

  11. Strengthening Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector ...

  12. Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  13. Office of Test and Evaluation | National Nuclear Security Administrati...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test and Evaluation | National Nuclear Security Administration Facebook Twitter Youtube ... Home About Us Our Programs Defense Programs Research, Development, Test, and ...

  14. 2006 NMMSS Users Training Meeting | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System Training Annual Users Training Meeting Archives 2006...

  15. 2009 NMMSS Users Training Meeting | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System Training Annual Users Training Meeting Archives 2009...

  16. 2010 NMMSS Users Training Meeting | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System Training Annual Users Training Meeting Archives 2010...

  17. World Institute for Nuclear Security Workshop at Y-12 Brings...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    facilities, to assess preparedness, and to identify areas for improvement," said Douglas Fremont, NNSA's Chief of Defense Nuclear Security. "The workshop also enhances NNSA's...

  18. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Defense Biometric Identification System (DBIDS) at Kirtland Air Force Base (KAFB) What is DBIDS? The Defense Biometric Identification System (DBIDS) manages access to Department of Defense (DoD) installations. All personnel who require unescorted access onto Kirtland Air Force Base (KAFB) must be registered in DBIDS. As residents of KAFB, we must respect and follow KAFB practices. Note: DBIDS is a Department of Defense (DoD) requirement. The SNL Badge Office does NOT have an active role in the

  19. PV Research & Development Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research & Development Activities - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  20. Y-12 and Pantex teams receive NNSA Defense Programs awards | Y-12 National

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Complex and Pantex teams ... Y-12 and Pantex teams receive NNSA Defense Programs awards Posted: January 12, 2016 - 4:11pm 260 employees at the Pantex Plant and the Y-12 National Security Complex received National Nuclear Security Administration Defense Programs Awards of Excellence at an annual ceremony held recently at the respective sites. The recipients were recognized at the sites by members of site management as well as Steve Goodrum, NNSA Assistant Deputy Administrator for

  1. NNSA Deputy Administrator for Defense Nuclear Nonproliferation visits Oak

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ridge | Y-12 National Security Complex NNSA Deputy Administrator ... NNSA Deputy Administrator for Defense Nuclear Nonproliferation visits Oak Ridge Posted: January 25, 2016 - 1:12pm NNSA Deputy Administrator for Defense Nuclear Nonproliferation Anne Harrington addresses the East Tennessee Economic Council. Making the world a safer place. That is the message Anne Harrington delivered to the East Tennessee Economic Council about NNSA's role in nuclear nonproliferation. Harrington, Deputy

  2. NREL: Department of Defense Energy Programs - Energy Projects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Projects NREL and the U.S. Department of Defense (DOD) work closely together on energy projects that demonstrate and validate energy efficiency and renewable energy technologies, with approaches that can be replicated for broad impact across DOD. NREL's collaboration with the Office of the Secretary of Defense and the military services helps DOD achieve key energy security goals, while setting the stage for broad market adoption of these technologies. To learn about NREL's capabilities,

  3. Departmental Representative to the Defense Nuclear Facilities Safety Board

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (DNFSB) | Department of Energy Departmental Representative to the Defense Nuclear Facilities Safety Board (DNFSB) Departmental Representative to the Defense Nuclear Facilities Safety Board (DNFSB) The Office of the Departmental Representative ensures effective cross-organizational leadership and coordination to resolve DNFSB-identified technical and management issues as we work to ensure the health, safety, and security of the workers, public, and environment. This web site is an important

  4. Microsoft Word - Defense Science Quarterly 08-08.doc

    National Nuclear Security Administration (NNSA)

    August 2008 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Derivative Applications of Pulsed Power Science and Technology 4 LANSCE-R Means More Beam for National Security Research 6 Dual Axis Radiographic Hydrodynamics Test (DARHT) 2 nd Axis Completed and Put into Operation 7 Annual Symposium of the Stewardship Science Graduate Fellowship Program 8 Publication Highlights 9 ICOPS 2008 9 Highlights and Awards Message from the Director Chris Deeney, Defense Science

  5. Defense Nuclear Nonproliferation

    National Nuclear Security Administration (NNSA)

    span>

    WASHINGTON D.C - The Department of Energy's National Nuclear Security Administration (DOENNSA) announced today the removal of 36 kilograms...

  6. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  7. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  8. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  9. Unmanned and Unattended Response Capability for Homeland Defense

    SciTech Connect (OSTI)

    BENNETT, PHIL C.

    2002-11-01

    An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologies supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.

  10. January 2016 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release Jan 13, 2016 Pantex and Y-12 teams receive NNSA Defense Programs awards OAK RIDGE, Tenn. - 260 employees at the Pantex Plant and the Y-12 National Security Complex received National Nuclear Security Administration (NNSA) Defense Programs Awards of Excellence at an annual ceremony held recently at the respective sites. The recipients were recognized at the sites by members of site management as well as Steve Goodrum, NNSA Assistant Deputy Administrator for Stockpile Management

  11. Cyber Securing Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Industrial Control Systems Integration into the DoD Networks A Briefing in Response to House Report 113-102, Accompanying the FY14 National Defense Authorization Act Unclassified - Distribution Statement A August, 2015 Cyber Securing Control Systems Acquisition, Technology and Logistics 2 DoD Scope of Platform IT & Control Systems * Acquisitions / Weapon Systems - H,M & E (ships / subs, missiles, UVs, etc.) - Training Simulators, 3D printing, etc. * EI&E - Buildings & linear

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  13. Notices DEPARTMENT OF DEFENSE

    Energy Savers [EERE]

    011 Federal Register / Vol. 78, No. 186 / Wednesday, September 25, 2013 / Notices DEPARTMENT OF DEFENSE Department of the Army Information on Surplus Land at a Military Installation Designated for Disposal: Ernest Veuve Hall USARC/ AMSA 75, T-25, Fort Missoula, Montana AGENCY: Department of the Army, DoD. ACTION: Notice. SUMMARY: This amended notice provides information on withdrawal of surplus property at the Ernest Veuve Hall USARC/AMSA 75, T-25, Fort Missoula, Montana. This notice amends the

  14. Report on Separate Disposal of Defense High- Level Radioactive Waste

    Office of Environmental Management (EM)

    on Separate Disposal of Defense High- Level Radioactive Waste March 2015 [This page left blank.] i EXECUTIVE SUMMARY Purpose This report considers whether a separate repository for high-level radioactive waste (HLW) resulting from atomic energy defense activities ("Defense HLW Repository") is "required" within the meaning of Section 8(b)(2) of the Nuclear Waste Policy Act of 1982 (NWPA). In 1985, the U.S. Department of Energy (DOE) and President Reagan considered this

  15. Newsletters | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About Us / Our Programs / Defense Nuclear Security / Nuclear Materials Management & Safeguards System / NMMSS Information, Reports & Forms / Newsletters Newsletters U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Newsletters NMMSS is sponsored by the National Nuclear Security Administration's (NNSA) Office of Materials Integration within the U.S. Department of Energy and the U.S. Nuclear Regulatory Commission Attachment

  16. Defense on the Move: Ant-Based Cyber Defense

    SciTech Connect (OSTI)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackersí ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  17. Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations

    Broader source: Energy.gov [DOE]

    Washington, D.C. - The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security...

  18. Departments of Energy, Defense Partner to Install Fuel Cell Backup Power

    Office of Environmental Management (EM)

    Units at Eight Military Installations | Department of Energy Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations July 19, 2011 - 4:56pm Addthis The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and

  19. Nevada National Security Site | Department of Energy

    Office of Environmental Management (EM)

    Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point Nevada National Security Site's (NNSS) current mission includes support for the NNSA stockpile stewardship program, which includes performing subcritical experiments in support of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and

  20. Second Line of Defense Spares Program Assessment

    SciTech Connect (OSTI)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of EnergyĎs (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  1. Rationality Validation of a Layered Decision Model for Network Defense

    SciTech Connect (OSTI)

    Wei, Huaqiang; Alves-Foss, James; Zhang, Du; Frincke, Deb

    2007-08-31

    We propose a cost-effective network defense strategy built on three key: three decision layers: security policies, defense strategies, and real-time defense tactics for countering immediate threats. A layered decision model (LDM) can be used to capture this decision process. The LDM helps decision-makers gain insight into the hierarchical relationships among inter-connected entities and decision types, and supports the selection of cost-effective defense mechanisms to safeguard computer networks. To be effective as a business tool, it is first necessary to validate the rationality of model before applying it to real-world business cases. This paper describes our efforts in validating the LDM rationality through simulation.

  2. Lessons Learned at the Nevada National Security Site Implementing the EFCOG Activity-level Work Planning and Control Guide

    Broader source: Energy.gov [DOE]

    Slide Presentation by Steele Coddington, Work Planning Manager, National Security Technologies, Nevada National Security Site. Lessons Learned Implementing Work Planning & Control. 6 Step Process for improving WP&C.

  3. White House Forum on Energy Security (Update) | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    John Schueler John Schueler Former New Media Specialist, Office of Public Affairs What does this mean for me? The Department of Energy is partnering with the Department of Defense to accelerate clean energy innovation and enhance national energy security. Earlier this afternoon high ranking officials from the Departments of Energy and Defense came together with national security officials, business leaders, academics and other stakeholders for a discussion on the national security imperative of

  4. Training | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Defense Nuclear Security / Nuclear Materials Management & Safeguards System / Training Training 2015 Annual Users Training Meeting Presentations 2014 Annual Users Training Meeting Presentations 2013 Annual Users Training Meeting Presentations Annual Users Training Meeting Archives NMMSS I Training NMMSS II Training Individualized Site Training NMMSS Training for NRC Licensees Learn More NMMSS I Training NMMSS II Training Individualized Site Training Annual Users Training Meeting Archives

  5. NNSA Production Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Production Office NNSA Production Office Y-12 National Security Complex Completes W69 Dismantlement NNSA's safety office accredited and recognized for leadership in safe operation of defense nuclear facilities Part of NNSA's commitment to maintaining the nation's safe, secure, and effective nuclear deterrent are relentlessly high standards for technically capable nuclear enterprise personnel

  6. The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Center for SCADA Security Assets - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  7. Safety, Security & Resilience of Energy Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security & Resilience of Energy Infrastructure - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense

  8. Sandia National Laboratories: National Security Programs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Weapons Defense Systems International, Homeland, & Nuclear Security Energy and Climate Facebook Twitter YouTube Flickr RSS Programs National Security Programs We strive to become the laboratory that the U.S. turns to first for technology solutions to the most challenging problems that threaten peace and freedom for our nation and the globe. At Sandia, national security is our business. We apply advanced science and engineering to help our nation and allies detect, repel, defeat, or

  9. Secure and Sustainable Energy Future Mission

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure and Sustainable Energy Future Mission - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste

  10. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  11. NNSA and Defense Nuclear Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Defense Nuclear Facilities Safety Board certifications free up 47 million in previously allocated funding October 2, 2009 Los Alamos, New Mexico, Oct. 2, 2009 - The Chemistry...

  12. National Nuclear Security Administration United States Department of Energy

    National Nuclear Security Administration (NNSA)

    America Treaty Organization NCT Nuclear Counterterrorism NCTIR Nuclear Counterterrorism and Incident Response Program NDAA National Defense Authorization Act NELA Nuclear Explosive Like-Assembly NEST Nuclear Emergency Support Team NGSI Next Generation Safeguards Initiative NIS Nonproliferation and International Security Program NMF National Mission Force NNSA National Nuclear Security Administration NNSS Nevada Nuclear Security Site NPAC Nonproliferation Policy and Arms Control Program NPT

  13. Linton Brooks Assumes Post as Deputy Administrator for NNSA Defense Nuclear

    National Nuclear Security Administration (NNSA)

    Nonproliferation Office | National Nuclear Security Administration Linton Brooks Assumes Post as Deputy Administrator for NNSA Defense Nuclear Nonproliferation Office | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget

  14. Y-12 Successfully Meets and Exceeds Defense Programs Goals During FY 2010 |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Successfully Meets and Exceeds Defense Programs Goals During FY 2010 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact

  15. Energy and Defense Departments Announce New Steps to Enhance Cooperation on

    Energy Savers [EERE]

    Clean Energy and Energy Security | Department of Energy New Steps to Enhance Cooperation on Clean Energy and Energy Security Energy and Defense Departments Announce New Steps to Enhance Cooperation on Clean Energy and Energy Security March 2, 2011 - 12:00am Addthis Washington, D.C. - Building on already strong cooperation between the U.S. Department of Energy and the U.S. Department of Defense, U.S. Secretary of the Navy Ray Mabus announced today new steps between the Departments to

  16. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  17. NREL: Department of Defense Energy Programs - Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Publications The following publications feature information about NREL's work with the U.S. Department of Defense (DOD) on energy projects. Army Net Zero: Lessons Learned in Net Zero Energy (Report) The U.S. Army (Army) presents a compilation of lessons learned from the Army's Net Zero Pilot Implementation Program, including specific examples of activities in each of the Net Zero Implementation Framework's implementation phases, and feedback from those involved with the Net Zero pilot program.

  18. Report on Separate Disposal of Defense High-Level Radioactive Waste |

    Energy Savers [EERE]

    Department of Energy Report on Separate Disposal of Defense High-Level Radioactive Waste Report on Separate Disposal of Defense High-Level Radioactive Waste This report considers whether a separate repository for high-level radioactive waste resulting from atomic energy defense activities is "required" within the meaning of Section 8(b)(2) of the Nuclear Waste Policy Act of 1982. PDF icon Report on Separate Disposal of Defense High-Level Radioactive Waste More Documents &

  19. Transportation Security Rulemaking Activities

    Broader source: Energy.gov [DOE]

    Presentation made by R. Clyde Ragland for the NTSF annual meeting held from May 14-16, 2013 in Buffalo, NY.

  20. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-24

    Establishes requirements to ensure that individuals are processed for, granted, and retain a DOE access authorization only when required. DOE N 251.47, dated 08/14/02, extends this directive until 05/14/03. Cancels DOE 472.1A and DOE 472.1 Chg 1.

  1. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-05

    Establishes requirements to ensure that individuals are processed for, granted, and maintain a DOE access authorization only when their official duties require such access. Cancels DOE O 472.1

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that ...

  3. Security Improvements Project Completed Ahead of Schedule, $20...

    National Nuclear Security Administration (NNSA)

    2010 (1) July 2010 (1) June 2010 (5) April 2010 (2) January 2010 (1) December 2009 (1) 1 of 3 Related Topics apm project management llnl defense nuclear security Y-12 npo...

  4. port security

    National Nuclear Security Administration (NNSA)

    0%2A en NNSA Transfers Responsibility for Radiation Detection System to China Customs http:nnsa.energy.govmediaroompressreleasesnnsa%E2%80%99s-second-line-defense

  5. LANL's Torres is NNSA Security Professional of the Year

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Bart Torres NNSA Security Professional of Year LANL's Torres is NNSA Security Professional of the Year Torres is part of a team that is upgrading the Defense Nuclear Security office's policies and budget management tools. April 8, 2011 Bart Torres Bart Torres Contact Steve Sandoval Communications Office (505) 665-9206 Email LOS ALAMOS, New Mexico, March 8, 2011-Bartolo "Bart" Torres of Los Alamos National Laboratory's Associate Directorate for Safeguards and Security is the 2010

  6. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  7. United States Department of Defense | Open Energy Information

    Open Energy Info (EERE)

    Defense Jump to: navigation, search Logo: United States Department of Defense Name: United States Department of Defense Address: 1000 Defense Pentagon Place: Washington, District...

  8. Environmental Defense Fund | Open Energy Information

    Open Energy Info (EERE)

    Defense is dedicated to protecting the environmental rights of all people, including future generations. References: Environmental Defense Fund1 This article is a stub. You can...

  9. OFFICE OF THE UNDER SECRETARY OF DEFENSE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301 -3000 ACQUISITION TECHNOLOGY AND LOGISTICS MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND...

  10. NNSA: Securing Domestic Radioactive Material | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Mission In 2004 NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify, secure, remove and/or facilitate the disposition of high risk nuclear and radiological materials around the world that pose a threat to the United States and the international community. GTRI's mission is to reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. GTRI

  11. Listing of Defense Nuclear Facilities

    Office of Environmental Management (EM)

    Listing of Defense Nuclear Facilities The facilities listed below are considered DOE defense nuclear facilities for purposes of Section 3161. Kansas City Plant Pinellas Plant Mound Facility Fernald Environmental Management Project Site Pantex Plant Rocky Flats Environmental Technology Site, including the Oxnard Facility Savannah River Site Los Alamos National Laboratory Sandia National Laboratory Lawrence Livermore National Laboratory Oak Ridge National Laboratory Nevada Test Site 1 Y-12 Plant

  12. DP awards showcase collaboration at NSC | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Defense Programs award winners at the National Security Campus More than 200 individuals from several National Security Campus teams received recognition this week for their work supporting NNSA's 2014 Defense Programs. Mark Holecek, KCFO Site Manager, presented the awards in a special ceremony on September 14 to the eight teams, including the KCRIMS Requalification; W87 Filled Elastomer Production; Encapsulation Process for Electronic Assemblies; W80 ALT 369 Firing Set

  13. Nonproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About Us / Our Programs / Nonproliferation Nonproliferation One of the gravest threats the United States and the international community face is the possibility that terrorists or rogue nations will acquire nuclear weapons or other weapons of mass destruction (WMD). NNSA, through its Office of Defense Nuclear Nonproliferation (DNN), works closely with a wide range of international partners, key U.S. federal agencies, the U.S. national laboratories, and the private sector to secure, safeguard,

  14. Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Field Offices / Welcome to the NNSA Production Office / Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory

  15. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) and the Lawrence Berkeley National Laboratory (LBNL) have implemented a number of software and security controls to ensure the security of data stored in the Building Performance Database (BPD). These include: a) Raw data provided by data contributors is stored on a secure site. Access is provided on an as-needed basis only to LBNL staff actively working on the BPD. b) Only the database

  16. H. R. 4526: a bill to authorize appropriations for the Department of Energy for national security programs for fiscal year 1987 and fiscal year 1988, and for other purposes. Introduced in the House of Representatives, Ninety-Ninth Congress, Second Session, April 8, 1986

    SciTech Connect (OSTI)

    Not Available

    1986-01-01

    The National Security Programs Authorization Act for Fiscal Years 1987 and 1988 (H.R. 4526) appropriates funds for DOE operating expenses in carrying out national security programs, which includes scientific research and development in support of the Armed Forces, strategic and critical materials necessary for defense, and military applications of nuclear energy and related management and support activities. Title I designates appropriates for specific projects. Title II states general provisions relating to reprogramming, limits on construction projects, and procedures for fund transfers.

  17. S. 1447: A Bill to authorize appropriations for the Department of Energy for national security programs for fiscal year 1990, and for other purposes. Introduced in the Senate of the United States, One Hundredth First Congress, First Session, July 31, 1989

    SciTech Connect (OSTI)

    Not Available

    1989-01-01

    S. 1447 is a bill to authorize appropriations for the Department of Energy for national security programs for fiscal year 1990, and for other purposes. Funds are authorized for operating expenses incurred in carrying out national security programs, including scientific research and development in support of the Armed Forces, strategic and critical materials necessary for the common defense, and military applications of nuclear energy and related management and support activities.

  18. Nuclear Advances | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advances Nuclear Advances Posted: February 11, 2013 - 2:52pm | Y-12 Report | Volume 9, Issue 2 | 2013 The scope of research and development at the Y-12 National Security Complex has widened from a single-focus World War II defense mission to a panoply of explorations and achievements. Seventy years of projects with members of the Nuclear Security Enterprise, other government agencies, universities and private industry have supercharged Y-12 into an invaluable scientific and technological

  19. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Los Alamos Field Office / Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL

  20. Safety and Security Enfrocment Process Overview

    Energy Savers [EERE]

    SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW APRIL 2015 Office of Enforcement Office of Enterprise Assessments U.S. Department of Energy Preface The Atomic Energy Act (AEA) of 1954, as amended, gives the Secretary of Energy (Secretary) the authority to establish rules, regulations, or orders necessary or desirable to promote the common defense and security of nuclear materials or to protect health or minimize danger to life or property. Subsequent amendments to the AEA give the Secretary the

  1. Frequently Asked Questions | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs / Defense Nuclear Security / Nuclear Materials Management & Safeguards System / NMMSS Information, Reports & Forms / Frequently Asked Questions Frequently Asked Questions U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Frequently Asked Questions (FAQs) User Frequently Asked Questions What is the History of NMMSS? What Are the Other Uses of NMMSS? NMMSS is sponsored by the National Nuclear Security

  2. Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan Colon Container Terminal (CCT) Panama

    SciTech Connect (OSTI)

    Newhouse, Robert N.

    2010-01-01

    Report on the Operational Testing and Evaluation to validate and baseline an operable system that meets the Second Line of Defense (SLD) mission requirements. An SLD system is defined as the detection technology and associated equipment, the system operators from the host country, the standard operating procedures (SOPs), and other elements such as training and maintenance which support long-term system sustainment. To this end, the activities conducted during the OT&E phase must demonstrate that the Megaports System can be operated effectively in real-time by Panama Direccion General de Aduanas (DGA Panama Customs) personnel to the standards of the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA).

  3. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  4. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  6. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  8. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    details, refer to the Map of Post 10 Truck Inspection Station (pdf). Resources Emergency Communication Vendor Security Requirements Material Frontiers in Science Lectures Mobile...

  9. Office of Defense Nuclear Nonproliferation

    National Nuclear Security Administration (NNSA)

    17, 2015

    Washington, D.C. -The National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) will...

  10. Department of Homeland Security | NISAC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NISACDepartment of Homeland Security

  11. Secure key storage and distribution

    DOE Patents [OSTI]

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  12. Defense Nuclear Facility Safety Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2014 Defense Nuclear Facility Safety Board Defense Nuclear Facility Safety Board (DNSFB) Vice Chairwoman Jesse Roberson visited and toured the WIPP site this week. While on-site, she was briefed on the status of the ventilation system and pending upgrades, as well as various other on-going tasks. Discussions were also held with employees involved in the February 5 truck fire. The purpose of the one-day visit was to get a better understanding of how WIPP is progressing through the recovery

  13. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About Us / Our Programs / Defense Programs / Future Science & Technology Programs / Advanced Simulation and Computing and Institutional R&D Programs / Related Links Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA

  14. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

    2014-09-30

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closely related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.

  15. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security...

  16. Toward a defense-dominated world

    SciTech Connect (OSTI)

    Wood, L.

    1993-08-01

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  17. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  18. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  19. Analysis of Integrated Safety Management at the Activity Level: Work

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Planning and Control, Final Report | Department of Energy Integrated Safety Management at the Activity Level: Work Planning and Control, Final Report Analysis of Integrated Safety Management at the Activity Level: Work Planning and Control, Final Report May 15, 2013 Presenter: Stephen L. Domotor, Director, Office of Analysis, Office of Health, Safety and Security Topic: On August 28, 2012, the Defense Nuclear Facilities Safety Board (DNFSB or "Board") wrote to the Department of

  20. Potential Collaborative Research topics with Koreaís Agency for Defense Development

    SciTech Connect (OSTI)

    Farrar, Charles R.; Todd, Michael D.

    2012-08-23

    This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involved the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.

  1. Pantex and Y-12 teams receive NNSA Defense Programs awards | National

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration and Y-12 teams receive NNSA Defense Programs awards | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press

  2. Utility Security & Resiliency: Working Together

    Broader source: Energy.gov [DOE]

    Presentation‚ÄĒgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting‚ÄĒdiscusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  4. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  5. Security Rulemaking

    Office of Environmental Management (EM)

    2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individualsí eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  7. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security Home/Water Security - Electricity use by water service sector and county. Shown are electricity use by (a) large-scale conveyance, (b) groundwater irrigation pumping, (c) surface water irrigation pumping, (d) drinking water, and (e) wastewater. Aggregate electricity use across these sectors (f) is also mapped. Permalink Gallery Sandians Recognized in Environmental Science & Technology's Best Paper Competition Analysis, Capabilities, Energy, Energy-Water Nexus, Global, Global,

  8. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security Home/Tag:Water Security - Electricity use by water service sector and county. Shown are electricity use by (a) large-scale conveyance, (b) groundwater irrigation pumping, (c) surface water irrigation pumping, (d) drinking water, and (e) wastewater. Aggregate electricity use across these sectors (f) is also mapped. Permalink Gallery Sandians Recognized in Environmental Science & Technology's Best Paper Competition Analysis,

  9. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nationís security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  11. Section 129 of the Consolidated Security, Disaster Assistance, and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Continuing Appropriations Act | Department of Energy Section 129 of the Consolidated Security, Disaster Assistance, and Continuing Appropriations Act Section 129 of the Consolidated Security, Disaster Assistance, and Continuing Appropriations Act PDF icon Section 129 of the Consolidated Security, Disaster Assistance, and Continuing Appropriations Act More Documents & Publications ENERGY POLICY ACT OF 2005 NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 Energy Policy Act of 20

  12. DOE - NNSA/NFO -- News & Views Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Played Crucial Role Photo - Badge inspection Guards Milton Miller (left) and John Metcalf inspect the badge of Frank Waters of the Joint AEC Department of Defense Information Office. DOD photo. Before Wackenhut Services Inc. (WSI) won the contract in 1965, Federal Services, Inc. provided security for the Nevada Test Site. Although the mission of the security forces has not changed over the last 42 years, uniforms, communication equipment and vehicles are substantially different. ^ TOP ^

  13. List of Major Information Systems,National Nuclear Security Administration

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADaPT Networked: | Department of Energy List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear

  14. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  15. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  16. 5th Defense Renewable Energy Summit

    Broader source: Energy.gov [DOE]

    The 5th Defense Renewable Energy Summit brings together U.S. Department of Defense (DOD) and military decision-makers with renewable energy developers, utilities, and leading financiers to...

  17. Safeguards & Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safeguards & Security Safeguards & Security The mission of the PPPO Safeguards and Security Program is to effectively implement the Office of Environmental Management (EM) Safeguards and Security responsibilities, obligations, and activities at the Department's Portsmouth and Paducah sites in compliance with Departmental policy. The PPPO Safeguards and Security organization is responsible for initiating, developing, and interpreting policy and procedures, and ensuring compliance with DOE

  18. security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  19. Y-12 National Security Complex | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Y-12 National Security Complex Aerial View Y-12 National Security Complex's primary mission is to support of the DOE nuclear weapons stockpile maintenance program. Activities ...

  20. Nevada National Security Site Radiological Control Manual

    SciTech Connect (OSTI)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of low-level radioactive waste and the handling of radioactive sources. Remediation of contaminated land areas may also result in radiological exposures.

  1. National Center for Nuclear Security: The Nuclear Forensics Project (F2012)

    SciTech Connect (OSTI)

    Klingensmith, A. L.

    2012-03-21

    These presentation visuals introduce the National Center for Nuclear Security. Its chartered mission is to enhance the Nationís verification and detection capabilities in support of nuclear arms control and nonproliferation through R&D activities at the NNSS. It has three focus areas: Treaty Verification Technologies, Nonproliferation Technologies, and Technical Nuclear Forensics. The objectives of nuclear forensics are to reduce uncertainty in the nuclear forensics process & improve the scientific defensibility of nuclear forensics conclusions when applied to nearsurface nuclear detonations. Research is in four key areas: Nuclear Physics, Debris collection and analysis, Prompt diagnostics, and Radiochemistry.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  4. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved within B 174. Use

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nationís security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  6. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  7. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  8. A Historical Evaluation of the U16a Tunnel, Nevada National Security Site, Nye County, Nevada Volume 2

    SciTech Connect (OSTI)

    Jones, Roberrt C; Drollinger, Harold

    2013-06-01

    This report presents a historical evaluation of the U16a Tunnel on the Nevada National Security Site in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office and the U.S. Department of Defense, Defense Threat Reduction Agency. The U16a Tunnel was used for underground nuclear weapons effects tests in Shoshone Mountain in Area 16 of the Nevada National Security Site. Six nuclear tests were conducted in the U16a Tunnel from 1962 to 1971. These tests are Marshmallow, Gum Drop, Double Play, Ming Vase, Diamond Dust, and Diamond Mine. The U.S. Department of Defense Threat Reduction Agency, with participation from Lawrence Livermore National Laboratory and Las Alamos National Laboratory, sponsored the tests. Fifteen high explosives tests were also conducted at the tunnel. Two were calibration tests during nuclear testing and the remaining were U.S. Department of Defense, Defense Threat Reduction Agency tunnel defeat tests. The U16a Tunnel complex is on the top and slopes of Shoshone Mountain, encompassing an area of approximately 16.7 hectares (41.1 acres). Major modifications to the landscape are a result of three principal activities, road construction and maintenance, mining activities related to development of the tunnel complex, and site preparation for activities related to testing. Forty-seven cultural features were recorded at the portal and on the slopes of Shoshone Mountain. At the portal area, features relate to the mining, construction, testing, and general every day operational support activities within the tunnel. These include concrete foundations for buildings, equipment pads, and rail lines. Features on the slopes above the tunnel relate to tunnel ventilation, borehole drilling, and data recording. Feature types include soil-covered bunkers, concrete foundations, instrument cable holes, drill holes, and ventilation shafts. The U16a Tunnel complex is eligible to the National Register of Historic Places under criteria a and c, consideration g of 36 CFR Part 60.4 as a historic landscape. Scientific research conducted at the tunnel has made significant contributions to the broad patterns of our history, particularly in regard to the Cold War era that was characterized by competing social, economic, and political ideologies between the former Soviet Union and the United States. The tunnel also possesses distinctive construction and engineering methods for conducting underground nuclear tests. The Desert Research Institute recommends that the U16a Tunnel area be left in place in its current condition and that the U16a Tunnel historic landscape be included in the Nevada National Security Site monitoring program and monitored on a regular basis.

  9. A Historical Evaluation of the U16a Tunnel, Nevada National Security Site, Nye County, Nevada Volume 1

    SciTech Connect (OSTI)

    Jones, robert C; Drollinger, Harold; Bullard, Thomas F; Ashbaugh, Laurence J; Griffin, Wayne R

    2013-06-01

    This report presents a historical evaluation of the U16a Tunnel on the Nevada National Security Site in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office and the U.S. Department of Defense, Defense Threat Reduction Agency. The U16a Tunnel was used for underground nuclear weapons effects tests in Shoshone Mountain in Area 16 of the Nevada National Security Site. Six nuclear tests were conducted in the U16a Tunnel from 1962 to 1971. These tests are Marshmallow, Gum Drop, Double Play, Ming Vase, Diamond Dust, and Diamond Mine. The U.S. Department of Defense Threat Reduction Agency, with participation from Lawrence Livermore National Laboratory and Las Alamos National Laboratory, sponsored the tests. Fifteen high explosives tests were also conducted at the tunnel. Two were calibration tests during nuclear testing and the remaining were U.S. Department of Defense, Defense Threat Reduction Agency tunnel defeat tests. The U16a Tunnel complex is on the top and slopes of Shoshone Mountain, encompassing an area of approximately 16.7 hectares (41.1 acres). Major modifications to the landscape are a result of three principal activities, road construction and maintenance, mining activities related to development of the tunnel complex, and site preparation for activities related to testing. Forty-seven cultural features were recorded at the portal and on the slopes of Shoshone Mountain. At the portal area, features relate to the mining, construction, testing, and general every day operational support activities within the tunnel. These include concrete foundations for buildings, equipment pads, and rail lines. Features on the slopes above the tunnel relate to tunnel ventilation, borehole drilling, and data recording. Feature types include soil-covered bunkers, concrete foundations, instrument cable holes, drill holes, and ventilation shafts. The U16a Tunnel complex is eligible to the National Register of Historic Places under criteria a and c, consideration g of 36 CFR Part 60.4 as a historic landscape. Scientific research conducted at the tunnel has made significant contributions to the broad patterns of our history, particularly in regard to the Cold War era that was characterized by competing social, economic, and political ideologies between the former Soviet Union and the United States. The tunnel also possesses distinctive construction and engineering methods for conducting underground nuclear tests. The Desert Research Institute recommends that the U16a Tunnel area be left in place in its current condition and that the U16a Tunnel historic landscape be included in the Nevada National Security Site monitoring program and monitored on a regular basis.

  10. The climate change and energy security nexus

    SciTech Connect (OSTI)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

  11. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    SciTech Connect (OSTI)

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individualsí eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  14. Defense Experimentation and Stockpile Stewardship

    ScienceCinema (OSTI)

    None

    2015-01-07

    A primary mission of the site is to help ensure that the nation's nuclear weapon stockpile remains safe, secure and reliable. The stockpile stewardship program, working with the national weapons laboratories conducts a wide range of experiments using advanced diagnostic technologies, many of which were developed right here at the NNSS.

  15. Defense Experimentation and Stockpile Stewardship

    SciTech Connect (OSTI)

    2014-10-28

    A primary mission of the site is to help ensure that the nation's nuclear weapon stockpile remains safe, secure and reliable. The stockpile stewardship program, working with the national weapons laboratories conducts a wide range of experiments using advanced diagnostic technologies, many of which were developed right here at the NNSS.

  16. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  17. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or...

  18. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelleís National Security & Defense objective is, ďapplying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe futureĒ. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratoryís (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  19. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ExcEptional sErvicE in thE national intErEst Investigating Containment Integrity Sandia is a nationally and internationally recognized leader in Nuclear Reactor containment research, supporting operations, lifetime extensions, and security and vulnerability assessments over a broad range of phenomena. Sandia's expertise includes evaluation of containment when subjected to high velocity impacts, enormous pressures and stresses, and attacks by saboteurs. Sandia's resources enable the completion of

  1. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after 9/11. these comprehensive analyses were able to realistically represent the actual attack, the response of the facility to the

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  3. National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security LLNL's Terascale Simulation Facility houses the Department of Energy Advanced Scientific Computing (ASC) Program's Purple supercomputer, a 100-teraops (trillion operations per second) machine that is one of the fastest in the world. ASC Purple enables 3D simulations with high-fidelity physics models of the performance of a full nuclear weapon system. NIF can create conditions-temperatures of 100 million degrees and pressures 100 billion times that of the Earth's atmosphere-similar to

  4. Natural Resources Defense Council | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Council Natural Resources Defense Council Comments of the Natural Resource Defense Council on The Department of Energy's Executive Order 13563 Preliminary Plan Submitted on August 1, 2011 PDF icon Comments_of_ the_NRDC.pdf More Documents & Publications Comments of the Natural Resource Defense Council on DOE's Request for Information on Reducing Regulatory Burden DOE Preliminary Plan for Retrospective Analysis of Existing Rules DOE_05_18_2011.pdf

  5. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The mission of the Office of Global Material Security (GMS) is to help partner countries secure and account for nuclear weapons, weapons-useable nuclear and radiological materials, ...

  6. Interim Closure Activities at Corrective Action Unit 114: Area 25 EMAD Facility, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    Boehlecke, R. F.

    2011-10-24

    This letter report documents interim activities that have been completed at CAU 114 to support ongoing access and generate information necessary to plan future closure activities. General housekeeping and cleanup of debris was conducted in the EMAD yard, cold bays, support areas of Building 3900, and postmortem cell tunnel area of the hot bay. All non-asbestos ceiling tiles and loose and broken non-friable asbestos floor tiles were removed from support galleries and office areas. Non-radiologically contaminated piping and equipment in the cold areas of the building and in the two 120-ton locomotives in the yard were tapped, characterized, drained, and verified free of contents.

  7. Dynamic defense workshop : from research to practice.

    SciTech Connect (OSTI)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason J.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  8. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities Ė with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  9. August 2010 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Library / Newsletters / August 2010 August 2010 Newsletter Aug 25, 2010 In this issue: Pantex Completes W62 Dismantlement Program New Name for NNSA's Nevada Test Site Neile Miller Confirmed as NNSA Deputy Administrator Reform Improves NNSA Security Program NNSA Prevents Terrorism Through Training NNSA's Defense Programs Forms New Science Council to Explore Cross-cutting Issues NNSA Conducts 85th Silent Thunder Counterterrorism Exercise Kenneth Powers Named as Associate Administrator for

  10. May 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Charles E. Messick receives the Administrator's Gold Award Charles E. Messick receives the Administrator's Gold Award upon his retirement after more than 40 years of public service. From left to right: Anne Harrington, Deputy Administrator for Defense Nuclear Nonproliferation; Charles E Messick, Susan Messick, and Frank Klotz, DOE Undersecretary for Nuclear Security and NNSA Administrator. NNSA Blog May 30, 2014 at 2:00 pm NSC completes last part to facilitate relocation This month, employees at

  11. Research and Development | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Defense Programs / Research, Development, Test, and Evaluation / Research and Development Research and Development Photo: DARHT's Accelerators help create the x-rays at DARHT, the world's most advanced radiography facility. Mission Ensure the safety, security, and effectiveness of the nuclear weapons stockpile through well-managed scientific research, technology development, and advantageous international collaborations. The Office of Research and Development is responsible for managing the

  12. Safeguards and Security Functional Area Qualification Standard

    Energy Savers [EERE]

    1-2009 May 2009 DOE STANDARD SAFEGUARDS AND SECURITY FUNCTIONAL AREA QUALIFICATION STANDARD DOE Defense Nuclear Facilities Technical Personnel U.S. Department of Energy AREA TRNG Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1171-2009 ii This document is available on the Department of Energy Technical Standards Program Web Site at http://www.hss.energy.gov/nuclearsafety/techstds/ DOE-STD-1171-2009 iii APPROVAL The Federal

  13. Sandia Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Sandia Field Office Sandia Field Office NNSA administrator shows NM congressional delegation the Albuquerque Complex to make case for new facility WASHINGTON, DC - Lt. Gen. Frank Klotz (Ret.), Administrator of the Department of Energy's National Nuclear Security Administration, hosted two members of the New Mexico congressional delegation on NNSA's safety office accredited and recognized for leadership in safe operation of defense nuclear facilities Part of NNSA's commitment to maintaining the

  14. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies

    SciTech Connect (OSTI)

    Fink, Glenn A.; Oehmen, Christopher S.

    2012-09-01

    This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agencyís R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our clientís efforts in system behavior modeling and cyber security to the overall benefit of the nation.

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individualsí eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  16. Nevada National Security Site Wraps Up 2013

    Broader source: Energy.gov [DOE]

    LAS VEGAS Ė As 2013 activities come to a close, the Nevada National Security Site (NNSS) reports several noteworthy accomplishments for the year.

  17. TEC Working Group Topic Groups Security | Department of Energy

    Office of Environmental Management (EM)

    Security TEC Working Group Topic Groups Security The Security Topic group is comprised of regulators, law enforcement officials, labor and industry representatives and other subject matter experts concerned with secure transport of spent nuclear fuel (SNF) and high level waste (HLW) to Yucca Mountain. Current activities include updating the security portion of DOE's Transportation Practices Manual, identifying key State, Tribal and local security officials and organizations, and examining

  18. ARM - Privacy and Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ARMPrivacy and Security About Become a User Recovery Act Mission FAQ Outreach Displays History Organization Participants Facility Statistics Forms Contacts Facility Documents ARM Management Plan (PDF, 1.3MB) Field Campaign Guidelines (PDF, 574KB) ARM Climate Research Facility Expansion Workshop (PDF, 1.46MB) Facility Activities ARM and the Recovery Act Contributions to International Polar Year Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send

  19. National Nuclear Security Administration Supplemental Listing of Directives

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Supplemental Listing of Directives Affecting Nuclear Safety Requirements Last Updated 06/2014 U.S. DEPARTMENT OF ENERGY National Nuclear Security Administration Office of the Chief of Defense Nuclear Safety AVAILABLE ONLINE AT: http://hq.na.gov link to NNSA Policies/Supplemental Directives Updated 6/10/14 This Page Intentionally Blank. Concurrence on Exemptions or Exceptions Page 1 ADDITIONAL DIRECTIVES (LATEST VERSION) REQUIRING CENTRAL TECHNICAL

  20. National Nuclear Security Administration Supplemental Listing of Directives

    National Nuclear Security Administration (NNSA)

    Updated 9/15/11 National Nuclear Security Administration Supplemental Listing of Directives Affecting Nuclear Safety Requirements Last Updated 09/15/11 U.S. DEPARTMENT OF ENERGY National Nuclear Security Administration Office of the Chief of Defense Nuclear Safety AVAILABLE ONLINE AT: http://hq.na.gov link to NNSA Policies/Supplemental Directives This Page Intentionally Blank. Concurrence on Exemptions or Exceptions Page 1 Updated 9/15/11 ADDITIONAL DIRECTIVES (LATEST VERSION) REQUIRING CENTRAL

  1. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  2. Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  3. Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  4. What is the current state of the science of Cyber defense?

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-10-09

    My overall sense of the cyber defense field is one of an adolescent discipline currently bogged down in a cloud of issues, the most iconic of which is the great diversity of approaches that are being aggregated to form a coherent field. Because my own expertise is complex systems and materials physics research, I have limited direct experience in cyber security sciences except as a user of secure networks and computing resources. However, in producing this report, I have found with certainty that there exists no calculus for cyber risk assessment, mitigation, and response, although some hopeful precepts toward this end are emerging.

  5. Categorical Exclusion Determinations: NNSA-Defense Science University

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Programs | Department of Energy Defense Science University Programs Categorical Exclusion Determinations: NNSA-Defense Science University Programs Categorical Exclusion Determinations issued by NNSA-Defense Science University Programs. DOCUMENTS AVAILABLE FOR DOWNLOAD No downloads found for this office.

  6. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized ...

  7. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in ...

  8. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Co2 Gas Fast reactor, Compact Sodium Fast reactor, and prometheus Space reactor. ... Current activities are supporting the development of Small Modular reactors (SMrs). the ...

  9. Best Practices for the Security of Radioactive Materials

    SciTech Connect (OSTI)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

  10. U-141: Sourcefire Defense Center Bugs

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system.

  11. EM Leaders Earn National Defense Degrees

    Broader source: Energy.gov [DOE]

    WASHINGTON, D.C. ‚Äď Two EM employees were recently awarded Master of Science degrees from the National Defense University (NDU) as part of a DOE-sponsored professional development program.

  12. COLLOQUIUM: Fusion Rockets for Planetary Defense | Princeton...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6, 2016, 4:15pm to 5:30pm MBG AUDITORIUM COLLOQUIUM: Fusion Rockets for Planetary Defense Dr. Glen Wurden Los Alamos National Laboratory Contact Information Coordinator(s): Ms....

  13. Defense, Interior Departments Pursue Renewable Energy on Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense, Interior Departments Pursue Renewable Energy on Federal Lands Defense, Interior Departments Pursue Renewable Energy on Federal Lands August 8, 2012 - 1:22pm Addthis Solar...

  14. Natural Resources Defense Council NRDC | Open Energy Information

    Open Energy Info (EERE)

    Defense Council (NRDC) Place: New York, New York Zip: 10011 Product: Alliance for environmental protection. References: Natural Resources Defense Council (NRDC)1 This...

  15. DOE Defense Nuclear Nonproliferation DNN | Open Energy Information

    Open Energy Info (EERE)

    Defense Nuclear Nonproliferation DNN Jump to: navigation, search Name: DOE Defense Nuclear Nonproliferation (DNN) Place: Washington, Washington, DC Zip: 20585 Product: String...

  16. Defense-in-Depth, How Department of Energy Implements Radiation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense-in-Depth, How Department of Energy Implements Radiation Protection in Low Level Waste Disposal Defense-in-Depth, How Department of Energy Implements Radiation Protection in ...

  17. Indiana Office of Energy Defense Development | Open Energy Information

    Open Energy Info (EERE)

    Energy Defense Development Jump to: navigation, search Name: Indiana Office of Energy & Defense Development Place: Indianapolis, Indiana Zip: 46204 Product: String representation...

  18. National Defense Authorization Act for Fiscal Year 2000 ß 3164...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Defense Authorization Act for Fiscal Year 2000 3164: Whistleblower Protection Program National Defense Authorization Act for Fiscal Year 2000 3164: Whistleblower...

  19. EM's Defense Waste Processing Facility Achieves Waste Cleanup...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Waste Processing Facility Achieves Waste Cleanup Milestone EM's Defense Waste Processing Facility Achieves Waste Cleanup Milestone January 14, 2016 - 12:10pm Addthis The...

  20. National cyber defense high performance computing and analysis : concepts, planning and roadmap.

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  1. Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energy's corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that

  2. Transmission Line Security Monitor: Final Report

    SciTech Connect (OSTI)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  3. Securing the United States' power infrastructure

    SciTech Connect (OSTI)

    Happenny, Sean F.

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    waste to return of research reactor fuel of U.S. origin. In addition, Snl supports the nrC in the development of technical bases to support various rule-making activities...

  5. Advancing Global Nuclear Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  7. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration DOENV--325-Rev. lOa February 2015 Nevada National Security Site Waste Acceptance Criteria Prepared by U.S. Department of Energy National Nuclear ...

  8. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  9. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  10. An approach to determine a defensible spent fuel ratio.

    SciTech Connect (OSTI)

    Durbin, Samuel G.; Lindgren, Eric Richard

    2014-03-01

    Sabotage of spent nuclear fuel casks remains a concern nearly forty years after attacks against shipment casks were first analyzed and has a renewed relevance in the post-9/11 environment. A limited number of full-scale tests and supporting efforts using surrogate materials, typically depleted uranium dioxide (DUO2), have been conducted in the interim to more definitively determine the source term from these postulated events. In all the previous studies, the postulated attack of greatest interest was by a conical shape charge (CSC) that focuses the explosive energy much more efficiently than bulk explosives. However, the validity of these large-scale results remain in question due to the lack of a defensible Spent Fuel Ratio (SFR), defined as the amount of respirable aerosol generated by an attack on a mass of spent fuel compared to that of an otherwise identical DUO2 surrogate. Previous attempts to define the SFR have resulted in estimates ranging from 0.42 to 12 and include suboptimal experimental techniques and data comparisons. Different researchers have suggested using SFR values of 3 to 5.6. Sound technical arguments exist that the SFR does not exceed a value of unity. A defensible determination of the SFR in this lower range would greatly reduce the calculated risk associated with the transport and dry storage of spent nuclear fuel. Currently, Oak Ridge National Laboratory (ORNL) is in possession of several samples of spent nuclear fuel (SNF) that were used in the original SFR studies in the 1980's and were intended for use in a modern effort at Sandia National Laboratories (SNL) in the 2000's. A portion of these samples are being used for a variety of research efforts. However, the entirety of SNF samples at ORNL is scheduled for disposition at the Waste Isolation Pilot Plant (WIPP) by approximately the end of 2015. If a defensible SFR is to be determined for use in storage and transportation security analyses, the need to begin this effort is urgent in order to secure the only known available SNF samples with a clearly defined path to disposal.

  11. The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief This presentation by Leo Grassilli focuses on hydrogen-powered forklifts. PDF icon education_presentation_grassilli.pdf More Documents & Publications Hydrogen and Fuel Cell Activity State of the States: Fuel Cells in America 2012 U.S. Army Energy and Environmental Requirements and Goals: Opportunities for Fuel Cells and

  12. The changing face of Hanford security 1990--1994

    SciTech Connect (OSTI)

    Thielman, J.

    1995-12-01

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almost literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.

  13. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  14. Security Policy, CMPC Marking Resource | Department of Energy

    Energy Savers [EERE]

    Security Policy, CMPC Marking Resource Security Policy, CMPC Marking Resource January 2015 Examples illustrate markings for matter that contains classified information. A strong and cohesive information security program is integral to national security. The U.S. Government requires certain information to be maintained in confidence to protect our citizens, democratic institutions, and activities within the international security community. Marking notifies holders of classified matter of the

  15. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  16. Managing America's Defense Nuclear Waste | Department of Energy

    Energy Savers [EERE]

    Managing America's Defense Nuclear Waste Managing America's Defense Nuclear Waste PDF icon Managing America's Defense Nuclear Waste More Documents & Publications Reorganization of the Office of Energy Efficiency and Renewable Energy: Preliminary Observations National Defense Authorization Act for Fiscal Year 2005, Information Request, Mission & Functions Statement for the Office of Environmental Management

  17. Developing an institutional strategy for transporting defense transuranic waste materials

    SciTech Connect (OSTI)

    Guerrero, J.V.; Kresny, H.S.

    1986-01-01

    In late 1988, the US Department of Energy (DOE) expects to begin emplacing transuranic waste materials in the Waste Isolation Pilot Plant (WIPP), an R and D facility to demonstrate the safe disposal of radioactive wastes resulting from defense program activities. Transuranic wastes are production-related materials, e.g., clothes, rags, tools, and similar items. These materials are contaminated with alpha-emitting transuranium radionuclides with half-lives of > 20 yr and concentrations > 100 nCi/g. Much of the institutional groundwork has been done with local communities and the State of New Mexico on the siting and construction of the facility. A key to the success of the emplacement demonstration, however, will be a qualified transportation system together with institutional acceptance of the proposed shipments. The DOE's Defense Transuranic Waste Program, and its contractors, has lead responsibility for achieving this goal. The Joint Integration Office (JIO) of the DOE, located in Albuquerque, New Mexico, is taking the lead in implementing an integrated strategy for assessing nationwide institutional concerns over transportation of defense transuranic wastes and in developing ways to resolve or mitigate these concerns. Parallel prototype programs are under way to introduce both the new packaging systems and the institutional strategy to interested publics and organizations.

  18. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Contact Courses Summer School Engineering Information Science, Technology Geophysics, Planetary Physics, Signatures Applied Geophysical Experiences Materials Design Calendar NSEC ¬Ľ Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5 665-1144 Email Energy Security Council The Los Alamos National Laboratory Energy Security

  19. Department of Defense Nuclear/Biological/Chemical (NBC) defense: Annual report to Congress. Annual report

    SciTech Connect (OSTI)

    1997-03-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law No. 103-160, Section 1703 (50 USC 1522), mandates the consolidation of all Department of Defense chemical and biological (CB) defense programs. As part of this consolidation, the Secretary of Defense is directed to submit an assessment and a description of plans to improve readiness to survive, fight and win in a nuclear, biological and chemical (NBC) contaminated environment. This report contains modernization plan summaries that highlight the Department`s approach to improve current NBC defense equipment and resolve current shortcomings in the program. 50 USC 1522 has been a critical tool for ensuring the elimination of redundant programs, focusing funds on program priorities, and enhancing readiness. While many problems remain in consolidating the NBC defense program, significant and measurable progress has been made in fulfilling the letter and the intent of Congress. There has been a consolidation of the research, development and acquisition organizations for NBC defense, including the consolidation of all research, development, test and evaluation, and procurement funds for NBC defense. There has been significant progress in the development of Joint training, doctrine development, and requirements generation. Modernization and technology plans have been developed that will begin to show real savings and true consolidation of efforts among the Services. The fruits of these plans will be realized over the next few years as the public law has time to take effect and will result in the increased readiness of U.S. forces. The objective of the Department of Defense (DoD) NBC defense program is to enable our forces to survive, fight, and win in NBC warfare environments. Numerous rapidly changing factors continually influence the program and its management.

  20. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  1. Selecting RMF Controls for National Security Systems

    SciTech Connect (OSTI)

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  2. Security Communications Protocol Ad Hoc Working Group | Department of

    Office of Environmental Management (EM)

    Energy Communications Protocol Ad Hoc Working Group Security Communications Protocol Ad Hoc Working Group PDF icon Security Communications Protocol Ad Hoc Working Group More Documents & Publications Overview for Newcomers Isotope Program Transportation NTSF Activities and Accomplishments

  3. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  4. July 2010 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Library / Newsletters / July 2010 July 2010 Newsletter Jul 28, 2010 In this issue: NNSA Works to Reduce Radiological Threats in NYC Don Cook Confirmed as NNSA Deputy Administrator for Defense Programs Q&A with NNSA Deputy Administrator Don Cook NNSA's Nuclear Security Sites Garner 16 R&D 100 Awards NNSA's Cygnus Dual Beam X-Ray Celebrates 1000th Shot NNSA/NSO's Aviation Program Receives Federal Award Kansas City, Los Alamos Site Offices Announce New Managers NNSA's KCP Reaches Five

  5. Nevada Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nevada Field Office Nevada Field Office blog1 blog1 test blog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 testblog1 NNSA's safety office accredited and recognized for leadership in safe operation of defense nuclear facilities Part of NNSA's commitment to maintaining the nation's safe, secure, and effective nuclear deterrent are relentlessly high standards for technically

  6. Protection Programming Defensive Planning for Fixed Facilities

    Energy Savers [EERE]

    NOT MEASUREMENT SENSITIVE DOE STD-1207-2012 December 2012 DOE STANDARD Protection Program Defensive Planning For Fixed Facilities U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE STD-1207-2012 This Page Intentionally Left Blank ii DOE STD-1207-2012 TABLE OF CONTENTS

  7. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security Global Material Security NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA Director of the Department of Information and International Relations Ilkhom Mirsaidov, left, with two specialized vehicles purchased by NNSA for

  8. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs

  9. Strategic Security Infrastructure Program | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Strategic Security Infrastructure Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs

  10. NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1 and

    Office of Environmental Management (EM)

    2 Materials) | Department of Energy NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1 and 2 Materials) NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1 and 2 Materials) PDF icon NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1 and 2 Materials) More Documents & Publications Transportation Security Rulemaking Activities Security Rulemaking Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission

  11. Broader National Security Missions | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national...

  12. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    work; the Comprehensive Security Briefing, which is given when an individual first receives hisher security clearance; the Annual Security Refresher Briefing, which must be ...

  13. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  14. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    SciTech Connect (OSTI)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-07-09

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a ďdirty bombĒ. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  15. Science and Technology Challenges for Homeland Security

    SciTech Connect (OSTI)

    Murray, C A

    2006-03-24

    Preventing and protecting against catastrophic terrorism is a complex and dynamic challenge. Small groups or individuals can use advanced technology to cause massive destruction, and the rapid pace of technology and ease of information dissemination continually gives terrorists new tools. A 100% defense is not possible. It's a numbers problem--there are simply too many possible targets to protect and too many potential attack scenarios and adversaries to defend against. However, science and technology (S&T) is a powerful force multiplier for defense. We must use S&T to get ahead of the game by making terrorist attacks more difficult to execute, more likely to be interdicted, and less devastating in terms of casualties, economic damage, or lasting disruption. Several S&T areas have potential to significantly enhance homeland security efforts with regard to detecting radiation, pathogens, explosives, and chemical signatures of weapons activities. All of these areas require interdisciplinary research and development (R&D), and many critically depend on advances in materials science. For example, the science of nuclear signatures lies at the core of efforts to develop enhanced radiation detection and nuclear attribution capabilities. Current radiation detectors require cryogenic cooling and are too bulky and expensive. Novel signatures of nuclear decay, new detector materials that provide high resolution at ambient temperatures, and new imaging detectors are needed. Such technologies will improve our ability to detect and locate small, distant, or moving sources and to discriminate threat materials from legitimate sources. A more complete understanding of isotopic ratios via secondary ion mass spectrometry (SIMS), NanoSIMS, or yet-to-be-developed technologies is required to elucidate critical characteristics of nuclear materials (e.g., isotopics, age, reprocessing) in order to identify their source and route history. S&T challenges abound in the biodefense arena as well. Improved biodetectors are needed--autonomous instruments that continuously monitor the environment for threat pathogens, promptly alert authorities in the event of a positive detection, and have an extremely low false alarm rate. Because many threat pathogens are endemic to various regions of the world, the natural microbial environment must be characterized so that background detections can be distinguished from a deliberate release. In addition, most current detection approaches require an a priori knowledge of the pathogens of concern and thus won't work in the face of a new, naturally occurring disease, such as a mutated avian influenza that effects humans, or a deliberately manipulated organism. Thus, we must move from species-specific detection to function-based detection based on a fundamental understanding of the mechanisms and genetic markers of infectivity, pathogenicity, antibiotic resistance, and other traits that distinguish a harmful organism from an innocuous one. Last but not least, new vaccines and treatments are needed, which in turn require in-depth understanding of cellular surfaces, protein folding, and myriad nano-bio aspects of host-pathogen interactions. Much attention is being devoted to countering weapons-of-mass-destruction terrorism, since Al-Qaeda and other terrorist groups have repeatedly stated their intention to acquire and use nuclear, chemical, or biological weapons. However, terrorists in Iraq and elsewhere continue to wreak havoc using improvised explosive devices. Thus, there is a pressing security need for better methods for detecting explosive materials and devices. Transformational S&T such as pulsed fast-neutron analysis or terahertz spectroscopy for material- and element-specific imaging offer the promise of greatly improved explosive detection. For bioscience-based approaches, the development of highly multiplexed transducer arrays and molecular recognition methods that mimic biological systems would similarly provide the foundation for vastly improved capabilities. Likewise, new materials an

  16. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  17. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  18. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Overview We are applying our unique scientific capabilities to the challenges of global climate change and energy security. 4 08 FACT SHEET Energy Security Overview 4 08 For more...

  19. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  20. Headquarters Facilities Master Security Plan

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The goal of the HQ Security Awareness Program is to assist Federal and contractor employees in understanding DOE security requirements, their individual security responsibilities, ...

  1. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  2. Lemnos Interoperable Security Program

    Office of Environmental Management (EM)

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  3. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    SciTech Connect (OSTI)

    Anderson, E.; Antkowiak, M.; Butt, R.; Davis, J.; Dean, J.; Hillesheim, M.; Hotchkiss, E.; Hunsberger, R.; Kandt, A.; Lund, J.; Massey, K.; Robichaud, R.; Stafford, B.; Visser, C.

    2011-08-01

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report is the deliverable for these tasks.

  4. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to return to work. Any suspected illegal activity will be reported to the Los Alamos Police Department. "We're doing our best to meet our security objectives while minimizing...

  5. Enforcement Letter, National Security Technologies, LLC - November...

    Broader source: Energy.gov (indexed) [DOE]

    7 Issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site On November 13, 2007, the U.S....

  6. National Nuclear Security Administration Appropriation and Program...

    National Nuclear Security Administration (NNSA)

    (FYNSP) % % National Nuclear Security Administration Office of the Administrator 420,754 448,267 420,754 450,060 29,306 7.0% 1,793 0.4% Weapons Activities 6,386,371 ...

  7. Office of Defense Nuclear Nonproliferation | National Nuclear...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  8. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks

  9. Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety and Security Report to the Secretary on the Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1 February 2011 Office of Health, Safety and Security U.S. Department of Energy Office of Health, Safety and Security HSS Table of Contents 1.0 Introduction

  10. Special Analysis for the Disposal of the Lawrence Livermore National Laboratory Low Activity Beta/Gamma Sources Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory J.

    2015-06-01

    This special analysis (SA) evaluates whether the Lawrence Livermore National Laboratory (LLNL) Low Activity Beta/Gamma Sources waste stream (BCLALADOEOSRP, Revision 0) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site (NNSS). The LLNL Low Activity Beta/Gamma Sources waste stream consists of sealed sources that are no longer needed. The LLNL Low Activity Beta/Gamma Sources waste stream required a special analysis because cobalt-60 (60Co), strontium-90 (90Sr), cesium-137 (137Cs), and radium-226 (226Ra) exceeded the NNSS Waste Acceptance Criteria (WAC) Action Levels (U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office [NNSA/NFO] 2015). The results indicate that all performance objectives can be met with disposal of the LLNL Low Activity Beta/Gamma Sources in a SLB trench. The LLNL Low Activity Beta/Gamma Sources waste stream is suitable for disposal by SLB at the Area 5 RWMS. However, the activity concentration of 226Ra listed on the waste profile sheet significantly exceeds the action level. Approval of the waste profile sheet could potentially allow the disposal of high activity 226Ra sources. To ensure that the generator does not include large 226Ra sources in this waste stream without additional evaluation, a control is need on the maximum 226Ra inventory. A limit based on the generator’s estimate of the total 226Ra inventory is recommended. The waste stream is recommended for approval with the control that the total 226Ra inventory disposed shall not exceed 5.5E10 Bq (1.5 Ci).

  11. The Defense Logistics Agency, Hydrogen-Powered Forklift Test...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief This presentation by Leo Grassilli...

  12. Energy Department to Loan Emergency Fuel to Department of Defense...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and directed the Energy Department to loan the Department of Defense ultra-low sulfur diesel from the Northeast Home Heating Oil Reserve. The Defense Logistics Agency (DLA) will...

  13. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  14. Biofuels in Defense, Aviation, and Marine

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in Defense, Aviation, and Marine Bioenergy Technologies Office Peer Review Zia Haq U.S. Department of Energy March 24, 2015 2 | Bioenergy Technologies Office DPA Initiative Goals * In June 2011, Secretaries of Agriculture, Energy, and Navy signed MOU to commit $510M (up to $170M from each agency) to produce hydrocarbon jet and diesel biofuels in the near-term. This initiative sought to achieve: o Multiple, commercial scale integrated biorefineries o Cost-competitive biofuel with conventional

  15. Available 45 MILITARY TECHNOLOGY, WEAPONRY, AND NATIONAL DEFENSE...

    Office of Scientific and Technical Information (OSTI)

    NATIONAL DEFENSE; CHEMICAL EXPLOSIONS; SHOCK WAVES; INDUSTRIAL PLANTS; ACCIDENTS; SAFETY; MECHANICAL STRUCTURES; BLAST EFFECTS; DYNAMIC LOADS; BUILDINGS; CHEMICAL EXPLOSIVES;...

  16. November 8, 1983: Defense Waste Processing Facility | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983 The Department begins construction of the Defense Waste Processing Facility (DWPF) at the Savannah River Plant in South Carolina. DWPF is designed to make high-level nuclear waste into a glass-like substance, which will then be shipped to a repository. DWPF will mix borosilicate glass with the waste, heat it to 2000 degrees F, and

  17. Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations The Defense Nuclear Facilities Safety Board (DNFSB) is an independent organization within the executive branch chartered with the responsibility of providing recommendations and advice to the President and the Secretary of Energy regarding

  18. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    material that it protects. Y-12 is the "Fort Knox" of uranium. We oversee the secure management and storage of strategic and special nuclear materials that have been removed...

  19. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone...

  20. Information Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  1. International Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  2. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Physical Security Systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working

  3. Safeguards & Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    & Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  4. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  5. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  6. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  7. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    port security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  8. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect (OSTI)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  9. The Office of Environmental Management Non-Defense Environmental Cleanup |

    Energy Savers [EERE]

    Department of Energy Non-Defense Environmental Cleanup The Office of Environmental Management Non-Defense Environmental Cleanup PDF icon Microsoft Word - 8E2A4440.doc More Documents & Publications Microsoft Word - PSRP Updates 6-25-10_v2 The Office of Environmental Management (EM) Defense Environmental Cleanup The Office of Environmental Management Uranium Enrichment D&D

  10. Title III of the Defense Production Act | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Title III of the Defense Production Act Title III of the Defense Production Act Matthew Seaford presentation on Title III of the Defense Production Act at the Industry Roundtable. PDF icon 2_seaford_roundtable.pdf More Documents & Publications A National Strategic Plan For Advanced Manufacturing DOE-SPAppendices.pdf Market Drivers for

  11. Safeguards and Security General Technical Base Qualification Standard

    Energy Savers [EERE]

    23-2009 July 2009 DOE STANDARD SAFEGUARDS AND SECURITY GENERAL TECHNICAL BASE QUALIFICATION STANDARD DOE Defense Nuclear Facilities Technical Personnel U.S. Department of Energy AREA TRNG Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1123-2009 ii This document is available on the Department of Energy Technical Standards Program Web Site at http://www.hss.energy.gov/nuclearsafety/techstds/ DOE-STD-1123-2009 iii APPROVAL The

  12. Cyber Assessment Methods for SCADA Security | Department of Energy

    Energy Savers [EERE]

    Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure

  13. Memorandum, Safeguards & Security Policy Panels - February 15, 2008 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Memorandum, Safeguards & Security Policy Panels - February 15, 2008 Memorandum, Safeguards & Security Policy Panels - February 15, 2008 February 15, 2008 As outlined in the attached HSS memo, dated December 3,2007, subject: Safeguards and Security Policy Panels, the HSS Office of Security Policy is establishing several new policy panels that will create new opportunities for communication and will include those current active groups that are now effectively

  14. Enterprise Assessments Targeted Review,Y-12 National Security Complex -

    Office of Environmental Management (EM)

    March 2015 | Department of Energy Y-12 National Security Complex - March 2015 Enterprise Assessments Targeted Review,Y-12 National Security Complex - March 2015 March 2015 Targeted Review of Work Planning and Control at the Y-12 National Security Complex The U.S. Department of Energy Office of Environment, Safety and Health Assessments, within the independent Office of Enterprise Assessments (EA), conducted an independent assessment of the Y-12 National Security Complex activity-level work

  15. Secure Your Business, Your Community and Your Country.

    National Nuclear Security Administration (NNSA)

    Secure Your Business, Your Community and Your Country. Sign Up Today for Services Provided by the Department of Energy's Radiological Security Partnership. Sign Up Today If your organization has high-activity radioactive sources, you may be eligible for these federally funded services, training programs and security products. Learn more. Then do more for your business, your community and your country's security. Sign up at: www.nnsa.energy.gov/RSP Contact: Kristina Hatcher Domestic Project

  16. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nationís critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  17. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  18. Enforcement Letter, National Security Technologies, LLC- November 13, 2007

    Broader source: Energy.gov [DOE]

    Issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site

  19. Evaluation of the Los Alamos National Security Emergency Operations...

    Office of Environmental Management (EM)

    and Emergency Management Evaluations Activity Report for the Evaluation of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment...

  20. A cognitive and economic decision theory for examining cyber defense strategies.

    SciTech Connect (OSTI)

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  1. Security Notice | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User login Username * Password * Request new password Log in Forgot Your Password? Security Notice This computer system is operated on a U.S. Federal Government network (unclassified information only). This system is for the use of authorized users only. Unauthorized access is prohibited and makes you liable to civil and criminal penalties. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities monitored and

  2. Security Notice | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice This computer system is operated on a U.S. Federal Government network (unclassified information only). This system is for the use of authorized users only. Unauthorized access is prohibited and makes you liable to civil and criminal penalties. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities monitored and recorded by system personnel. In the course of monitoring individuals improperly using

  3. Newsletters | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Library / Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back to 2003. Newsletter Newsletter September 2011 See PDF See Printer Friendly PDF NNSA, Y-12 Complete Transfer of Highly Enriched Uranium NNSA Ships Additional Special Nuclear Material From LLNL NNSA Announces Return of U.S.-Origin Highly Enriched Uranium Spent Fuel From South Africa DOE, NNSA More Than Doubles Feds

  4. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Espa√Īola,

  5. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. CoMuEx¬Ľ Explosives Center¬Ľ Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the

  6. Interim Activities at Corrective Action Unit 114: Area 25 EMAD Facility, Nevada National Security Site, Nevada, for Fiscal Years 2012 and 2013

    SciTech Connect (OSTI)

    Silvas, A J

    2013-10-24

    This letter report documents interim activities that have been completed at CAU 114 in fiscal years 2012 and 2013.

  7. Office of Health, Safety and Security Report to the Secretary of Energy -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    February 2011 | Department of Energy Health, Safety and Security Report to the Secretary of Energy - February 2011 Office of Health, Safety and Security Report to the Secretary of Energy - February 2011 February 2011 Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1 This report provides the results of an

  8. DoD, Energy Security and Technological Innovation | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DoD, Energy Security and Technological Innovation DoD, Energy Security and Technological Innovation This presentation summarizes the information given by Dorothy Robyn, deputy under secretary of defense, during the DOE SunShot Grand Challenge: Summit and Technology Forum, June 13, 2012. PDF icon sssummit2012_plenary_robyn.pdf More Documents & Publications The Advanced Microgrid: Integration and Interoperability (March 2014) Electricity Advisory Committee Meeting Presentations June 2012 -

  9. National Nuclear Security Administration's Space-Based Nuclear Detonation Detection Program

    Office of Environmental Management (EM)

    National Nuclear Security Administration's Space-Based Nuclear Detonation Detection Program OAS-L-14-09 July 2014 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 July 28, 2014 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: George W. Collard Assistant Inspector General for Audits Office of Inspector General SUBJECT: INFORMATION: Audit Report on "National Nuclear Security

  10. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    SciTech Connect (OSTI)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  11. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  12. Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... security to House committees on two occasions.For more than 30 years, Sandia has applied performance-based methods for designing and evaluating physical protection systems (PPS). ...

  13. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  14. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  15. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  16. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  17. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  18. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  19. Provision of mobile and man-portable radiation detection equipment;
  20. Regional cooperation on safeguards...

  21. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  22. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  1. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  2. Department of Defense Nuclear/Biological/Chemical (NBC) warfare defense, annual report to Congress. Final report FY96

    SciTech Connect (OSTI)

    1996-04-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law No. 103-160, Section 1703, mandates the consolidation of all Department of Defense chemical and biological defense programs. As part of this consolidation, the Secretary of Defense is directed to submit an assessment and a description of plans to improve readiness to survive, fight and win in a chemically or biologically contaminated environment. This report contains modernizations plan summaries which highlight the Department`s approach to improve current NBC defense equipment and resolve current shortcomings in the program.

  3. NREL: Department of Defense Energy Programs - Webmaster

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Webmaster Please enter your name and e-mail address in the boxes provided, then type your message below. When you are finished, click "Send Message." NOTE: If you enter your e-mail address incorrectly, we will be unable to reply. Your name: Your email address: Your message: Send Message Printable Version Department of Defense Energy Programs Home Projects Publications News Contact Us Did you find what you needed? Yes 1 No 0 Thank you for your feedback. Would you like to take a moment

  4. Protection Program Defensive Planning for Fixed Facilities

    Energy Savers [EERE]

    STANDARD Protection Program Defensive Planning For Fixed Facilities U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE DOE STD-1207-2012 December 2012 ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ‚ĒÄ CHANGE NOTICE NO.1 SEPTEMBER 2015 DOE STD-1207-2012 This Page Intentionally Left Blank DOE STD-1207-2012 i ATTACHMENT 1 Change Notice No. 1 DOE STD-1207-2012 September 2015 Protection

  5. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    SciTech Connect (OSTI)

    Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason; Stout, William M.S.; Lee, Erik

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  6. Independent Activity Report, Los Alamos National Laboratory ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    August 2012 Independent Activity Report, Los Alamos National Laboratory - August 2012 August 2012 Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities...

  7. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    SciTech Connect (OSTI)

    Price, D E; Durling, R L

    2005-10-10

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  8. National Nuclear Security Administration, Nevada Site Offce

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    July 24, 2009, the U.S. Department of Energy (DOE) National Nuclear Security Administration, Nevada Site Offce (NNSA/NSO) announced its intent to prepare a Site-Wide Environmental Impact Statement (SWEIS) for the operation of facilities and activities at the Nevada Test Site, now known as the Nevada National Security Site (NNSS), and off-site locations in the state of Nevada, for a 10-year period commencing in 2011. The National Environmental Policy Act (NEPA) requires federal agencies to

  9. Sandia National Laboratories: National Security Missions: International

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Homeland and Nuclear Security: Remote Sensing and Verification Remote Sensing and Verification Remote Sensing and Verification Image We extend Sandia's 60-year heritage in nuclear detonation detection to develop, deliver, and provide mission expertise for advanced remote sensing systems to monitor worldwide activities of consequence to national security. We design and build satellite sensor payloads and ground-based systems for the detection of nuclear detonations. We develop and evaluate

  10. March 2011 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Library / Newsletters / March 2011 March 2011 Newsletter Mar 31, 2011 In this issue: NNSA Supports Response to the Japanese Earthquake and Tsunami NNSA Celebrates Women's Contributions to Nuclear Security NNSA, Fort Hood Partner to Recover High-Activity Radioactive Source Investing in the Future, Implementing the President's Nuclear Security Agenda NNSA's Cielo Supercomputer Approved for Classified Operations NNSA, Rutgers University Hose Counterterrorism Exercise NNSA Expands Nonproliferation

  11. Chapter_8_Opertions_Security_Program

    Office of Environmental Management (EM)

    8 Operations Security Program This chapter covers the OPSEC Program in place at DOE HQ to fulfill the requirements of DOE Order 471.6, Section 4.f, Information Security Manual. The goal of the OPSEC Program is to assist HQ elements in identifying and protecting their Critical Information (CI) from inadvertent and unauthorized disclosure and assisting in the protection of classified information. CI includes those classified or sensitive unclassified areas, activities, functions, data or

  12. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect (OSTI)

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: ē DOE hazardous and non-hazardous non-radioactive classified waste ē DOE low-level radioactive waste (LLW) ē DOE mixed low-level waste (MLLW) ē U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  13. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  14. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  16. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L. (Idaho Falls, ID)

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  17. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  18. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  19. Incidents of Security Concern

    Office of Environmental Management (EM)

    NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY

  20. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  1. 2003 U.S. Department of Energy Strategic Plan: Protecting National, Energy, and Economic Security with Advanced Science and Technology and Ensuring Environmental Cleanup

    SciTech Connect (OSTI)

    None,

    2003-09-30

    The Department of Energy contributes to the future of the Nation by ensuring energy security, maintaining the safety, security and reliability of the nuclear weapons stockpile, cleaning up the environment from the legacy of the Cold War, and developing innovations in science and technology. After 25 years in existence, the Department now operates 24 preeminent research laboratories and facilities and four power marketing administrations, and manages the environmental cleanup from 50 years of nuclear defense activities that impacted two million acres in communities across the country. The Department has an annual budget of about $23 billion and employs about 14,500 Federal and 100,000 contractor employees. The Department of Energy is principally a national security agency and all of its missions flow from this core mission to support national security. That is true not just today, but throughout the history of the agency. The origins of the Department can be traced to the Manhattan Project and the race to develop the atomic bomb during World War II. Following the war, Congress engaged in a vigorous and contentious debate over civilian versus military control of the atom. The Atomic Energy Act of 1946 settled the debate by creating the Atomic Energy Commission, which took over the Manhattan Project’s sprawling scientific and industrial complex.

  2. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  3. DOE, NREL Help DoD Enhance Energy Security (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-10-01

    This fact sheet gives an overview of the technical assistance provided by DOE/NREL to the Department of Defense to advance energy security. Specifically, the fact sheet describes the net zero energy project at the U.S. Marine Corps Air Station (MCAS) Miramar.

  4. Information Security: Coordination of Federal Cyber Security Research and

    Energy Savers [EERE]

    Development | Department of Energy Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In

  5. T-592: Cisco Security Advisory: Cisco Secure Access Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unauthorized Password Change Vulnerability | Department of Energy 92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch

  6. Securing Single Points of Compromise (SPoC)

    SciTech Connect (OSTI)

    Belangia, David Warren

    2015-06-25

    Securing the Single Points of Compromise that provide central services to the institution’s environment is paramount to success when trying to protect the business. (Fisk, 2014) Time Based Security mandates protection (erecting and ensuring effective controls) that last longer than the time to detect and react to a compromise. When enterprise protections fail, providing additional layered controls for these central services provides more time to detect and react. While guidance is readily available for securing the individual critical asset, protecting these assets as a group is not often discussed. Using best business practices to protect these resources as individual assets while leveraging holistic defenses for the group increases the opportunity to maximize protection time, allowing detection and reaction time for the SPoCs that is commensurate with the inherent risk of these centralized services.

  7. Cautious peace: Strategy and circumstance in Asia-Pacific security

    SciTech Connect (OSTI)

    Lacy, J.L.

    1995-07-01

    This paper examines the conditions of secunty. alliance, and forward presence in which U.S. military forces may operate in the Asia-Pacific region`s near and distant future. The analysis includes: (1) a mid-decade overview of the Asia-Pacific economic, energy, environmental, political, and social development environment; (2) assessment of the near- or longer- term conflict potential and prospects in the region; (3) examination of emerging security alignments, ambitions and balances in Asia-Pacific security; (4) evaluation of the region`s experience with and prospects for multilateral security arrangements; and (5) priority areas for U.S. defense policy and planning for the Asia-Pacific over the next several years.

  8. New institute promotes nuclear security | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to recently help establish the Institute for Nuclear Security, housed in UT's Howard H. Baker Jr. Center for Public Policy. "A few other universities have nuclear security...

  9. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability ... Related Articles U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass ...

  10. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  11. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  12. Tag: global security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  13. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  14. Honoring Our Past, Securing Our Future | National Nuclear Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Library Fact Sheets Honoring Our Past, Securing Our Future Honoring Our Past, Securing Our Future Transforming a Cold War Nuclear Weapons Complex into a 21st Century ...

  15. Military Webinar: Defense Department Contracting Requirements for Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Procurement | Department of Energy Military Webinar: Defense Department Contracting Requirements for Energy Procurement Military Webinar: Defense Department Contracting Requirements for Energy Procurement May 15, 2013 - 12:00pm Addthis This Office of Indian Energy webinar originally presented on May 15, 2013, features a panel of U.S. Department of Defense procurement officials providing details about military energy procurement requirements, statutory authorizations, current procurement

  16. Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Departmental Representative to the DNFSB | Department of Energy Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan, Departmental Representative to the DNFSB Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan, Departmental Representative to the DNFSB DNFSB Mission The Board provides independent analysis, advice and recommendations to the Secretary to ensure adequate protection to public health and safety at defense nuclear facilities. Identify Department

  17. Defense-Related Uranium Mines Report to Congress (August 2014) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Defense-Related Uranium Mines Report to Congress (August 2014) Defense-Related Uranium Mines Report to Congress (August 2014) Section 3151 of the National Defense Authorization Act for Fiscal Year 2013 directed the Secretary of Energy, in consultation with the Secretary of the Interior and the Administrator of the U.S. Environmental Protection Agency (EPA), to undertake a review of, and prepare a report on, abandoned uranium mines in the United States that provided

  18. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  19. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  20. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessmentcwdd2015-05-04T21:05:48+00:00 security Water Treatment Facility Definition Security is assuring that water sources and water distribution systems are...

  1. History of Hanford Site Defense Production (Brief)

    SciTech Connect (OSTI)

    GERBER, M S

    2001-02-01

    This paper acquaints the audience with the history of the Hanford Site, America's first full-scale defense plutonium production site. The paper includes the founding and basic operating history of the Hanford Site, including World War II construction and operations, three major postwar expansions (1947-55), the peak years of production (1956-63), production phase downs (1964-the present), a brief production spurt from 1984-86, the end of the Cold War, and the beginning of the waste cleanup mission. The paper also delineates historical waste practices and policies as they changed over the years at the Hanford Site, past efforts to chemically treat, ''fractionate,'' and/or immobilize Hanford's wastes, and resulting major waste legacies that remain today. This paper presents original, primary-source research into the waste history of the Hanford Site. Finally, the paper places the current Hanford Site waste remediation endeavors in the broad context of American and world history.

  2. Col. Kabban receives NNSA Defense Programs Excellence Award ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Excellence Award Col. Kabban receives NNSA Defense Programs Excellence Award Brig. Gen. Jim Dawkins, NNSA's Principal Assistant Deputy Administrator for Military Application,...

  3. Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    advice and recommendations to the Secretary to ensure adequate protection to public health and safety at defense nuclear facilities. Identify Department vulnerabilities in...

  4. Comments of the Natural Resource Defense Council on DOE's Request...

    Energy Savers [EERE]

    for Information on Reducing Regulatory Burden Comments of the Natural Resource Defense Council on DOE's Request for Information on Reducing Regulatory Burden On behalf of the...

  5. Legacy Management Work Progresses on Defense-Related Uranium...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    defense-related legacy uranium mine sites located within 11 uranium mining districts in 6 western states. At these sites, photographs and global positioning location data were...

  6. National Defense Authorization Act for Fiscal Year 2005, Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Section 3116 from "National Defense Authorization Act for Fiscal Year 2005" (Public Law 108-375 Oct. 28 2004) Transition20082009EMAdditionalMaterialMACopy.pdf PUBLIC LAW ...

  7. Y-12 Successfully Meets and Exceeds Defense Programs Goals During...

    National Nuclear Security Administration (NNSA)

    Blog Home Field Offices Welcome to the NNSA Production Office NPO News Releases Y-12 Successfully Meets and Exceeds Defense Programs ... Y-12 Successfully Meets and...

  8. Renewable Energy and Defense Geospatial Database | Open Energy...

    Open Energy Info (EERE)

    Database Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Renewable Energy and Defense Geospatial Database Abstract This database provides GIS data...

  9. National Defense Authorization Act for Fiscal Year 2005, Information

    Energy Savers [EERE]

    Request, | Department of Energy National Defense Authorization Act for Fiscal Year 2005, Information Request, National Defense Authorization Act for Fiscal Year 2005, Information Request, Section 3116 from "National Defense Authorization Act for Fiscal Year 2005" (Public Law 108-375 Oct. 28 2004) Transition_2008_2009_EM_Additional_Material_MA_Copy.pdf PUBLIC LAW 108-375-OCT. 28, 2004 118 STAT. 1811 Public Law 108-375, 108th Congress PDF icon National Defense Authorization Act for

  10. NNSA and Defense Nuclear Facilities Safety Board certifications...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    allocated funding NNSA and Defense Nuclear Facilities Safety Board certifications free up 47 million in previously allocated funding The DNFSB and NNSA required the CMRR...

  11. Microsoft Word - Defense Science Quarterly Nov 2007 final.doc

    National Nuclear Security Administration (NNSA)

    Robert Hanrahan Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Contributions of the Los Alamos Proton Radiography Program to the Nuclear Weapons Program ...

  12. March 2014 Most Viewed Documents for National Defense | OSTI...

    Office of Scientific and Technical Information (OSTI)

    4 Most Viewed Documents for National Defense Science Subject Feed The Effects of Nuclear Weapons Glasstone, Samuel (1964) 72 > SMART BRIDGE: A tool for estimating the military ...

  13. NAP-XX Defense Programs Business Requirements and Processes Manual

    National Nuclear Security Administration (NNSA)

    (SD) establishes the Defense Programs Business Process System (DPBPS) Portal as the mechanism for implementing DOE Order (O) 452.3, Management of the DOE Nuclear Weapons Complex. ...

  14. NA 20 - Deputy Administrator for Defense Nuclear Nonproliferation...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 20 - Deputy Administrator for Defense ... NA 20 - Deputy Administrator for...

  15. NA 10 - Deputy Administrator for Defense Programs | National...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 10 - Deputy Administrator for Defense Programs NA 10 - Deputy Administrator for...

  16. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  17. Evaluating Moving Target Defense with PLADD

    SciTech Connect (OSTI)

    Jones, Stephen T.; Outkin, Alexander V.; Gearhart, Jared Lee; Hobbs, Jacob Aaron; Siirola, John Daniel; Phillips, Cynthia A.; Verzi, Stephen Joseph; Tauritz, Daniel; Mulder, Samuel A.; Naugle, Asmeret Bier

    2015-09-15

    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the gameís players in multiple game variants. We have created an algorithm for finding a defenderís optimal PLADD strategy. We show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.

  18. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    0-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Ôā∑ Title 32, CFR, Part 2001, Classified National Security Information Ôā∑ Executive Order 13526, Classified National Security Information Ôā∑ DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 Ôā∑ DOE Order 475.2A, Identifying Classified Information Ôā∑ DOE Order 475.1, Counterintelligence Program The Security Awareness

  19. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  20. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  1. National Security Campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  2. Nuclear Security 101 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    101 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  3. Nuclear Security Enterprise | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Enterprise | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  4. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  5. Security Commodity Team | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Commodity Team | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  6. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    campus | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  7. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  8. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  9. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    policy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  10. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  11. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  12. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs

  13. Radiological Security Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  14. Security Forms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Forms | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  15. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  16. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  17. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  18. Safety and Security Officer

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  19. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  20. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  1. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  2. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits...

  3. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  5. Cognitive Computing for Security.

    SciTech Connect (OSTI)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  7. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  8. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  10. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NNSA orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to stop at the East and West Jemez Road "Vehicle Access Portals" (VAPs) for a vehicle check. December 21, 2012 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience,

  11. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  12. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  13. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW MEXICO, June 25, 2012-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos National

  14. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the Cold War. Few people may be aware of the older important cultural resources that exist throughout the site as well. Artifacts ranging from hundreds to thousands of years old are part of the NNSS cultural inventory. The NNSS' Cultural Resources Management Program has documented tools and dwellings associated with

  15. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    FOR IMMEDIATE RELEASE March 14, 2001 NNSA Organizational Redress Strengthens Path Forward John A. Gordon, Administrator for the National Nuclear Security Administration (NNSA) announced today his plan for organizing the NNSA within the U.S. Department of Energy. The planned actions will improve performance of the core mission to strengthen national security and reduce the global threat from weapons of mass destruction through applications of science and technology. The Administration celebrated

  16. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    20 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex Performance Period: October 2012 - September 2013 December 24, 2013 APPROVED FOR PUBLIC RELEASE This document has been approved for release to the public by: Name / Title: Scott A. Hawks, NPO Y-12 Classification Officer Date: 12/31/2013 NNSA Production Office, Y-12 Page 2 of 20 Executive Summary This

  18. Well Logging Security Initiatives | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  19. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ‚?? tunnels‚?Ě, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  20. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home About Us Our Programs Defense Programs Research, Development, Test, and Evaluation Inertial Confinement Fusion ICF Facilities Nike Nike Nike mirror array and ...