Powered by Deep Web Technologies
Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

2

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

3

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

4

Boeing Defense, Space & Security 5301 Bolsa Avenue  

E-Print Network [OSTI]

Biography Boeing Defense, Space & Security 5301 Bolsa Avenue Huntington Beach, CA 92647 www.boeing.com Daryl G. Pelc Vice President Engineering & Technology Phantom Works Boeing Defense, Space & Security of Boeing Defense, Space & Security (BDS). In this position, Daryl is responsible for leading

El Zarki, Magda

5

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

6

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF)  

E-Print Network [OSTI]

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF) L. Ertaul1 as its application in dealing with enterprise security planning related issues. Keywords: Enterprise Architecture Frameworks, DoDAF, Enterprise Security Planning 1 . Introduction The Department of Defense

Ertaull, Levent

7

Defense Programs | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Defense Programs Home > About Us > Our Programs > Defense Programs Defense Programs One of the primary missions of NNSA is to maintain and enhance the safety, security and reliability of the U.S. nuclear weapons stockpile. NNSA,

8

second line of defense | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

second line of defense | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

9

Control Systems Cyber Security: Defense in Depth Strategies ...  

Broader source: Energy.gov (indexed) [DOE]

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

10

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

11

Independent Activity Report, Defense Nuclear Facilities Safety...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October...

12

2013 NNSA Defense Programs Science Council | National Nuclear Security  

National Nuclear Security Administration (NNSA)

3 NNSA Defense Programs Science Council | National Nuclear Security 3 NNSA Defense Programs Science Council | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > 2013 NNSA Defense Programs Science Council 2013 NNSA Defense Programs Science Council Posted By Office of Public Affairs 2013 NNSA Defense Programs Science Council Members of the 2013 NNSA Defense Programs Science Council include, from

13

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

10 10 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2010 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/17/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4459 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2010

14

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 2 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2002 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/09/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4451 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2002

15

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 6 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2006 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/13/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4455 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2006

16

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 3 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2003 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/10/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4452 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2003

17

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8 8 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2008 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/15/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4457 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2008

18

Strategic defense initiative and western security  

SciTech Connect (OSTI)

The technological and political aspects of the Strategic Defense Initiative (SDI) affect East-West relations and transatlantic interalliance relations as well as impinging on each other. The Soviets could elect to use other technology, develop a large number of smaller missiles, or provide their own SDI system in response. Because of the high cost in skilled manpower and technology resources and a crisis in the domestic economy, the Soviets prefer to avoid an intensified arms race. There is concern that new technology will further widen the perceived electronic gap between Europe, on the one hand, and the US and Japan, on the other. Strategists in Europe ask if SDI will decouple transatlantic links. Some Europeans see the need for a voice in the ultimate discussions over deployment as a compelling reason to participate actively in the SDI program. Patience and good will are essential to keep links open to both Europe and the Warsaw Pact.

Elliot, S.R.

1985-09-01T23:59:59.000Z

19

Second Line of Defense Program | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Line of Defense Program | National Nuclear Security Administration Line of Defense Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Second Line of Defense Program Home > About Us > Our Programs > Nonproliferation > International Materials Protection and Cooperation > Second Line of Defense Program Second Line of Defense Program In April 2009, President Obama called the danger of a terrorist acquiring

20

Second Line of Defense Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Line of Defense Program | National Nuclear Security Administration Line of Defense Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Second Line of Defense Program Home > About Us > Our Programs > Nonproliferation > International Materials Protection and Cooperation > Second Line of Defense Program Second Line of Defense Program In April 2009, President Obama called the danger of a terrorist acquiring

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U.S. Department of Energy, Defense Programs, activities to support the safe, secure dismantlement of nuclear weapons in the Former Soviet Union  

SciTech Connect (OSTI)

In September 1991 President Bush announced sweeping cuts in the US nuclear weapon stockpile as well as changes in deployment to remove significant numbers of weapons from alert status and to return to the US for storage many weapons formerly based abroad in US sites. In October 1991 President Gorbachev announced similar moves for the Soviet Union. Even though the Gorbachev announcement represented a substantial step forward in reducing tension between the US and the Soviet Union, the US continued to be concerned about the deteriorating situation in the Soviet Union and the prospects for internal stability. As a result, in November 1991 the Administration began talks with the Soviets in a number of areas including field disablement of nuclear weapons to prevent unauthorized use, emergency response in the event of a weapons accident, and command and control of nuclear weapons. The Nunn-Lugar legislation assured assistance to the Soviet Union in the safe, secure dismantlement (SSD) of weapons to implement the Gorbachev commitment and in the development of measures to prevent the proliferation of weapons of mass destruction. The Department of Energy (DOE) is supporting and collaborating with the Department of Defense (DOD) in several areas due to the DOE responsibilities for developing, assembling, and dismantling US warheads and as the custodian of the nuclear materials stockpile. Russia, as the successor state to the Soviet Union, controls the nuclear weapons of the Former Soviet Union. Thus, DOE`s nuclear weapon and nuclear materials expertise are being applied particularly to Russia. However, the DOE is also providing assistance to Belarus and is prepared to assist Ukraine and Kazakhstan as well if agreements can be reached. In this paper, the DOE SSD activities in support of DOD as the US Executive Agent will be discussed. Two areas will not be covered, namely, DOD activities and the purchase of highly enriched uranium.

Turner, J.

1993-12-31T23:59:59.000Z

22

Sandia National Laboratories: National Security Missions: Defense...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cybersecurity Delivering experience & expertise Training the next generation of cyber defenders Cybersecurity computing Defending national security Applying science and engineering...

23

Statement on Defense Nuclear Nonproliferation and Naval Reactors Activities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Defense Nuclear Nonproliferation and Naval Reactors Activities Defense Nuclear Nonproliferation and Naval Reactors Activities before the House Committee on Appropriations Subcommittee on Energy & Water Development | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Congressional Testimony > Statement on Defense Nuclear

24

Statement on Defense Nuclear Nonproliferation and Naval Reactors Activities  

National Nuclear Security Administration (NNSA)

Defense Nuclear Nonproliferation and Naval Reactors Activities Defense Nuclear Nonproliferation and Naval Reactors Activities before the House Committee on Appropriations Subcommittee on Energy & Water Development | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Congressional Testimony > Statement on Defense Nuclear

25

Defense Nuclear Facilities Safety Board Review at the Nevada National Security Site  

Broader source: Energy.gov (indexed) [DOE]

NNSS-2011-001 NNSS-2011-001 Site: Nevada National Security Site Subject: Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Defense Nuclear Facilities Safety Board Review at the Nevada National Security Site Dates of Activity 02/14/2011 - 02/17/2011 Report Preparer William Macon Activity Description/Purpose: The U.S. Department of Energy Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), visited the Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from February 14-17, 2011. The purpose of the visit was to observe the Defense Nuclear Facilities Safety Board (DNFSB) review and maintain operational awareness of NNSS activities. Result:

26

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Broader source: Energy.gov (indexed) [DOE]

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

27

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Broader source: Energy.gov (indexed) [DOE]

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

28

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Broader source: Energy.gov (indexed) [DOE]

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

29

Program Activities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Activities | National Nuclear Security Administration Activities | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Program Activities Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Program Activities

30

Independent Activity Report, Nevada National Security Site - February 2011  

Broader source: Energy.gov (indexed) [DOE]

February 2011 Independent Activity Report, Nevada National Security Site - February 2011 February 2011 Nevada National Security Site Defense Nuclear Facility Safety Board Review [ARPT-NNSS-2011-001] The U.S. Department of Energy Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), visited the Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from February 14-17, 2011. The purpose of the visit was to observe the Defense Nuclear Facilities Safety Board (DNFSB) review and maintain operational awareness of NNSS activities. Independent Activity Report, Nevada National Security Site - February 2011 More Documents & Publications Independent Activity Report, Nevada National Security Site - July 2011 Independent Activity Report, Nevada National Security Site - August 2010

31

Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities  

SciTech Connect (OSTI)

Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

Not Available

1984-02-01T23:59:59.000Z

32

Call for Posters: Mid Atlantic Symposium Defense and Security Challenges of the New Decade  

E-Print Network [OSTI]

Call for Posters: Mid Atlantic Symposium ­ Defense and Security Challenges of the New Decade April/UNIVERSITIES ARE INVITED TO SUBMIT PAPERS OR POSTERS. CONTACT US FOR MORE INFORMATION TOPICS: The fourth biennial Defense papers and interactive discussion of the topic and presentations. Posters on Security Issues of Climate

Gilchrist, James F.

33

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

34

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

35

Independent Activity Report, Y-12 National Security Complex - June 2011 |  

Broader source: Energy.gov (indexed) [DOE]

Y-12 National Security Complex - June Y-12 National Security Complex - June 2011 Independent Activity Report, Y-12 National Security Complex - June 2011 June 2011 Site Lead Orientation Visit to the Y-12 Site Office and Y-12 National Security Complex [HIAR-Y-12-2011-06-23] The purposes of the visit were to discuss the nuclear safety oversight strategy, initiate the site lead program, increase operational awareness of the site's activities, and discuss methods the Office of Health, Safety and Security (HSS) uses to carry out its independent oversight responsibilities. Independent Activity Report, Y-12 National Security Complex - June 2011 More Documents & Publications Independent Activity Report, Oak Ridge Office - June 2011 Independent Activity Report, Defense Nuclear Facilities Safety Board Public

36

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

37

Independent Activity Report, Nevada National Security Site -...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

at the Nevada National Security Site. The purpose of the activity was to observe Subcritical Experiment activities at the U1a Complex, discuss ongoing activities at the...

38

Japans National Defense Planning forthe New Security Environment: The 2010National Defense Program Guidelines  

E-Print Network [OSTI]

at the Canon Insti- tute for Global Studies in Tokyo, Japan.Brief 2012-3 March 2012 Japans National Defense Planningis the primary document of Japans defense policy, setting

JIMBO, Ken

2012-01-01T23:59:59.000Z

39

Overexpression of Pto Activates Defense Responses and Confers Broad Resistance  

Science Journals Connector (OSTI)

...Langebartels C. Sandermann H. Jr. Van Montagu M. Inze D. Van Camp W. Defense activation and enhanced pathogen tolerance induced...Cladosporium fulvum. Walbot V. Maize mutants for the 21st century Wolter M. Hollricher K. Salamini F. Schulze-Lefert P...

Xiaoyan Tang; Mingtang Xie; Young Jin Kim; Jianmin Zhou; Daniel F. Klessig; Gregory B. Martin

40

GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks  

Science Journals Connector (OSTI)

The USC GridSec project develops distributed security infrastructure and self-defense capabilities to secure ... wide-area networked resource sites participating in a Grid application. We report new developments ...

Kai Hwang; Yu-Kwong Kwok; Shanshan Song

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Defense Nuclear Facilitiets Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory  

Broader source: Energy.gov (indexed) [DOE]

HSS Independent Activity Report - HSS Independent Activity Report - Rev. 1 Report Number: HIAR LANL-2012-08-16 Site: Los Alamos National Laboratory (LANL) Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory Dates of Activity : 08/14/2012 - 08/16/2012 Report Preparer: Robert Freeman Activity Description/Purpose: The purpose of this Office of Health, Safety and Security (HSS) activity was to maintain site operational awareness of key nuclear safety performance areas of interest to the Defense Nuclear Facilities Safety Board (DNFSB), monitor ongoing site oversight and planning activities for Los Alamos National Laboratory (LANL) nuclear facilities, and identify and initiate

42

Defense Nuclear Facilitiets Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

HSS Independent Activity Report - HSS Independent Activity Report - Rev. 1 Report Number: HIAR LANL-2012-08-16 Site: Los Alamos National Laboratory (LANL) Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory Dates of Activity : 08/14/2012 - 08/16/2012 Report Preparer: Robert Freeman Activity Description/Purpose: The purpose of this Office of Health, Safety and Security (HSS) activity was to maintain site operational awareness of key nuclear safety performance areas of interest to the Defense Nuclear Facilities Safety Board (DNFSB), monitor ongoing site oversight and planning activities for Los Alamos National Laboratory (LANL) nuclear facilities, and identify and initiate

43

Independent Activity Report, Nevada National Security Site -...  

Broader source: Energy.gov (indexed) [DOE]

at the Nevada National Security Site. The purpose of the activity was to observe Subcritical Experiment activities at the U1a Complex, discuss ongoing activities at the Device...

44

Office of Secure Transportation Activities  

Broader source: Energy.gov (indexed) [DOE]

16th, 2012 16th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct other missions supporting the national security of the United States of America. 3 5 OST's Commitment to Transportation Safety and Security Over three decades of safe, secure transport of nuclear weapons and special nuclear material to and from military locations and DOE facilities More than 140 million miles traveled Over three decades and 240,000 flight hours of accident-free flying Professionalism We conduct ourselves and our operations with the highest standards of professionalism and integrity.

45

Office of Secure Transportation Activities  

Broader source: Energy.gov [DOE]

Our MissionTo provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct other missions supporting the national...

46

Transportation Security Rulemaking Activities at the U.S. Nuclear...  

Office of Environmental Management (EM)

Activities at the U.S. Nuclear Regulatory Commission Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission Transportation Security Rulemaking...

47

Independent Activity Report, Nevada National Security Site - December 2012  

Broader source: Energy.gov (indexed) [DOE]

December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit [HIAR NNSS-2012-12-03] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit to observe Subcritical Experiment (SCE) activities at the U1a Complex, discuss ongoing activities at the National Criticality Experiment Research Center (NCERC), and monitor the status of other ongoing site activities at the Nevada National Security Site (NNSS) operated by National Security Technologies, LLC (NSTec). Independent Activity Report, Nevada National Security Site - December 2012 More Documents & Publications Independent Activity Report, Nevada National Security Site - August 2012

48

September 10, 2010 HSS Briefing to the Defense Nuclear Facilities Safety Board (DNFSB) on Union Activities  

Broader source: Energy.gov (indexed) [DOE]

Labor Union and Stakeholder Labor Union and Stakeholder Outreach and Collaboration Office of Health, Safety and Security Briefing to the Defense Nuclear Facilities Safety Board Briefing to the Defense Nuclear Facilities Safety Board Leadership Commitment Leadership Commitment " h "It is imperative that we communicate and establish relationships with those elements that train manage and elements that train, manage and represent our workforce to improve the safety culture at DOE sites." safety culture at DOE sites. Glenn S. Podonsky Chief Health, Safety and Security Officer 2 History History History History October 2006: Formation of HSS to provide an integrated DOE HQ-level function for health, safety, environment, and security into one unified office. February 2007: Established HSS Focus Group -

49

Independent Activity Report, Nevada National Security Site - August 2012 |  

Broader source: Energy.gov (indexed) [DOE]

August August 2012 Independent Activity Report, Nevada National Security Site - August 2012 August 2012 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2012-08-16] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit to observe Subcritical Experiment (SCE) activities at the U1a Complex, discuss ongoing activities at the Device Assembly Facility (DAF) and the National Criticality Experiment Research Center (NCERC), and monitor the status of other ongoing site activities at the Nevada National Security Site (NNSS) operated by National Security Technologies, LLC (NSTec). Independent Activity Report, Nevada National Security Site - August 2012 More Documents & Publications

50

Nuclear Weapon Surety Interface with the Department of Defense  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order establishes Department of Energy and National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the Department of Defense. Cancels DOE O 452.6.

2009-05-14T23:59:59.000Z

51

Independent Activity Report, Nevada National Security Site - July 2011 |  

Broader source: Energy.gov (indexed) [DOE]

Independent Activity Report, Nevada National Security Site - July Independent Activity Report, Nevada National Security Site - July 2011 Independent Activity Report, Nevada National Security Site - July 2011 July 2011 NNSS Operational Readiness Review of the Joint Actinide Shock Physics Experimental Research Facility [HIAR-NNSS-2011-07-28] At the request of the National Nuclear Security Administration (NNSA) Service Center, the U.S. Department of Energy (DOE) Office of Health, Safety and Security (HSS) site lead for the Nevada National Security Site (NNSS) participated in the NNSA Operational Readiness Review (ORR) of the Joint Actinide Shock Physics Experimental Research (JASPER) Facility Restart conducted on July 18-27, 2011. Independent Activity Report, Nevada National Security Site - July 2011 More Documents & Publications

52

Independent Activity Report, Nevada National Security Site - August 2010 |  

Broader source: Energy.gov (indexed) [DOE]

Activity Report, Nevada National Security Site - August Activity Report, Nevada National Security Site - August 2010 Independent Activity Report, Nevada National Security Site - August 2010 Nevada Critical Experiment Facility Tour and Attendance at the Nuclear Criticality Safety Program The U.S. Department of Energy (DOE), Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), participated in the DOE Criticality Safety Support Group's (CSSG) activities in/near Las Vegas, Nevada, including a tour of the Critical Experiment Facility (CEF) located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS). These activities support DOE's Nuclear Criticality Safety Program (NCSP). Independent Activity Report, Nevada National Security Site - August 2010 More Documents & Publications

53

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

54

Independent Activity Report, Nevada National Security Site - January 2011 |  

Broader source: Energy.gov (indexed) [DOE]

Nevada National Security Site - Nevada National Security Site - January 2011 Independent Activity Report, Nevada National Security Site - January 2011 January 2011 Nevada National Security Site Orientation Visit The U.S. Department of Energy (DOE) Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), conducted an orientation visit to the DOE Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from January 11-13, 2011. The purpose of the visit was to discuss the nuclear safety oversight strategy, initiate the site lead program, increase HSS personnel's operational awareness of the site's activities, and to determine how HSS can carry out its independent oversight and mission support responsibilities. Independent Activity Report, Nevada National Security Site - January 2011

55

388 Federal Funds--Continued ENVIRONMENTAL AND OTHER DEFENSE ACTIVITIES--Continued  

E-Print Network [OSTI]

of Legacy Management (Defense).--The programs within this office support long-term stewardship activities Management to accomplish its mission. Office of Civilian Radioactive Waste Management.--The pro- gram coordinates and resolves issues regarding the charac- terization, safe storage, transportation, and proper

56

Independent Activity Report, Office of Secure Transportation - March 2011 |  

Broader source: Energy.gov (indexed) [DOE]

Activity Report, Office of Secure Transportation - Activity Report, Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the Emergency Planning Hazards Assessment and Protection Action Recommendation Cards for the Office of Secure Transportation [HIAR-OST-2011-03-04] The Office of Emergency Management Oversight (HS-63) conducted a review of a new revision of the Office of Secure Transportation (OST) emergency planning hazards assessment (EPHA) and protective action recommendation (PAR) cards. The review was conducted at the Headquarters OST Albuquerque Office. The purpose of the visit was to evaluate the appropriateness of OST's path forward in revising the EPHA and PAR cards. Independent Activity Report, Office of Secure Transportation - March 2011

57

Independent Activity Report, Nevada National Security Site -...  

Broader source: Energy.gov (indexed) [DOE]

National Security Site Operational Readiness Review for the Joint Actinide Shock Physics Experimental Research Facility Restart Pre-visit HIAR-NNSS-2011-04-28 This...

58

Independent Activity Report, Nevada National Security Site - July 2011 |  

Broader source: Energy.gov (indexed) [DOE]

July July 2011 Independent Activity Report, Nevada National Security Site - July 2011 July 2011 Review of Nevada National Security Site Device Assembly Facility Justification for Continued Operations for Inoperable HEPA-Filtered Ventilation System [HIAR-NNSS-2011-07-08] As an operational awareness activity, the Office of Health, Safety and Security (HSS) site lead reviewed a recent Justification for Continued Operations (JCO) for the Inoperable High Efficiency Particulate Air (HEPA)-Filtered Ventilation System at the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS). The JCO and SER adequately define specific operational restrictions and other compensatory measures supported by analysis in accordance with the guidance in DOE G 424.1-1.

59

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

60

E-Print Network 3.0 - activates defense responses Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

crafted defense... --responding to a possible strategic bomber and missile ... Source: Colorado Technical University, Computer Science Department Collection: Computer...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

E-Print Network 3.0 - activate defense responses Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

crafted defense... --responding to a possible strategic bomber and missile ... Source: Colorado Technical University, Computer Science Department Collection: Computer...

62

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

planning and oversight for programs funded by the Weapons Activities, Defense Nuclear Non- proliferation, for Weapons Ac- tivities and Defense Nuclear Nonproliferation, and Federal employees at the NNSA service379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special

63

Independent Activity Report, Nevada National Security Site - April 2011 |  

Broader source: Energy.gov (indexed) [DOE]

April April 2011 Independent Activity Report, Nevada National Security Site - April 2011 April 2011 Nevada National Security Site Operational Readiness Review for the Joint Actinide Shock Physics Experimental Research Facility Restart Pre-visit [HIAR-NNSS-2011-04-28] In coordination with the National Nuclear Security Administration (NNSA) Service Center, the Office of Health, Safety and Security (HSS) site lead participated in a pre-visit for the NNSA Operational Readiness Review (ORR) of the Joint Actinide Shock Physics Experimental Research (JASPER) facility restart conducted April 25-28, 2011. The results of the pre-visit were the completion of required site access training, coordination with Site Office and JASPER facility counterparts regarding the breadth and scope of the ORR and obtaining applicable

64

Independent Activity Report, Los Alamos National Security - June 2011 |  

Broader source: Energy.gov (indexed) [DOE]

National Security - June National Security - June 2011 Independent Activity Report, Los Alamos National Security - June 2011 June 2011 Review of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment Practices [HIAR-LANL-2011-06-08] This review evaluated the establishment and maintenance of specific elements of the ERO, including their responsibilities for initial and ongoing response to and mitigation of an emergency. Additionally, evaluation criteria addressed effective control at the event scene and integration of local agencies and organizations that provide onsite response services. The review also evaluated whether an adequate number of experienced and trained personnel, including designated alternates, are available on demand for timely and effective performance of assigned ERO

65

Independent Activity Report, Nevada National Security Site -...  

Broader source: Energy.gov (indexed) [DOE]

- July 2011 July 2011 NNSS Operational Readiness Review of the Joint Actinide Shock Physics Experimental Research Facility HIAR-NNSS-2011-07-28 This Independent Activity...

66

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

67

Photo Album Of FAPAC - NM Activities | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Photo Album Of FAPAC - NM Activities | National Nuclear Security Photo Album Of FAPAC - NM Activities | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Photo Album Of FAPAC - NM Activities Home > About Us > Our Locations > Albuquerque Complex > Federal Asian Pacific American Council - New Mexico Chapter Albuquerque, NM > Photo Album Of FAPAC - NM Activities

68

March 23, 1983: Strategic Defense Initiative (SDI)  

Broader source: Energy.gov [DOE]

March 23, 1983President Reagan addresses the nation on national security and announces the Strategic Defense Initiative (SDI), a satellite-based defense system that would destroy incoming missiles...

69

Independent Oversight Activity Report, National Nuclear Security Administration Production Office- March 10-14, 2014  

Broader source: Energy.gov [DOE]

Contractor Transition Activities for the National Nuclear Security Administration Production Office [IAR-NPO-2014-03-10

70

ARM - Defensive Shotgun - Remington 870 Operator's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AlaskaDefensive Shotgun - Remington 870 AlaskaDefensive Shotgun - Remington 870 Operator's Guide Page Contents Firearms Safety Nomenclature Disassembly Care and Cleaning Assembly Function Check Marksmanship Fundamentals Zeroing Loading Chamber Checking Unloading Condition-One Malfunction: Failure to Fire Condition-Two Malfunction: Failure to Eject Condition-Three Malfunction: Failure to Extract Ready Positions Carries Standing Kneeling Sitting Barricade Defensive Shotgun - Remington 870 Operator's Guide U.S. Department of Energy Safeguards and Security Central Training Academy FIREARMS SAFETY Firearms safety is as important during daily activities as during range and training activities. Observing a few precautions when handling firearms in the field can help ensure your safety and that of those around you. It will

71

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design Centers Supercomputing Top 500 List ASC at Supercomputing Conference Printer-friendly version Printer-friendly version Facebook

72

Nuclear Weapon Surety Interface with the Department of Defense  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order prescribes how the Department of Energy participates with the Department of Defense (DoD) to ensure the surety (safety, security and control) of military nuclear weapon systems deployed around the world. The Order establishes National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the DoD. Cancels DOE O 5610.13. Canceled by DOE O 452.6A.

2006-10-19T23:59:59.000Z

73

Chapter 11 - Computer Network Defense  

Science Journals Connector (OSTI)

Abstract Computer Network Defense is the defensive and largely proactive component of Computer Network Operations, and is one of the few places where military and civilian approaches are similar. But how does Computer Network Defense fit into the category of defensive actions? To answer this question, one must understand what is being defended. This chapter explains what type of information should be protected from cyber attacks and highlights the key principles of securitynamely, the CIA triad of confidentiality, integrity, and availability, and AAA which covers authentication, authorization, and auditing. Of course, no attempt at defending information assets is complete if users security mindset is weak, so this chapter also discusses security awareness and the types of training available today, along with strategies for defending against attacks, such as surveillance tactics, data mining, pattern matching, intrusion detection and prevention, vulnerability assessment and penetration testing, disaster recovery planning, and defense in depth.

Jason Andress; Steve Winterfeld

2014-01-01T23:59:59.000Z

74

Cybersecurity Your Best Defense Against  

E-Print Network [OSTI]

Online Corporate Cybersecurity Awareness Program Your Best Defense Against Cybersecurity Threats created a new, cutting edge Cybersecurity Awareness Training program to address these concerns. Our online and intelligence, and leading Fortune 500 information security functions. Center for Cybersecurity Training

Maryland, Baltimore County, University of

75

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Broader source: Energy.gov (indexed) [DOE]

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

76

Defense and nuclear technologies  

SciTech Connect (OSTI)

Fulfilling our national security and stockpile stewardship responsibilities requires tremendous scientific and technical breadth: from esoteric theoretical physics and computational modeling to materials science and precision engineering. Because there exists no broad industrial or university base from which to draw expertise in nuclear weapon science and technology, we rely heavily on formal peer reviews and informal exchanges with our sister laboratory at Los Alamos. LLNL has an important, long-term role in the nation`s nuclear weapons program. We are responsible for four of the ten weapon systems in the enduring US stockpile (three of nine after 2002), including the only systems that incorporate all modern safety features. For years to come, we will be responsible for these weapons and for the problems that will inevitably arise. Our nuclear expertise will also play a crucial role as the US attempts to deal effectively with the threat of nuclear proliferation. This past year brought the culmination of our response to profound changes in the nation`s defense needs as we restructured and refocused our activities to address the Administration`s goal of reducing global nuclear danger. We made major contributions to important national security issues in spite of severe fiscal constraints.

NONE

1995-01-01T23:59:59.000Z

77

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998  

SciTech Connect (OSTI)

This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

NONE

1999-02-01T23:59:59.000Z

78

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, Calendar Year 1999  

SciTech Connect (OSTI)

This is the tenth Annual Report to the Congress describing Department of Energy activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of Energy regarding public health and safety issues at the Department's defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. During 1999, Departmental activities resulted in the closure of nine Board recommendations. In addition, the Department has completed all implementation plan milestones associated with three Board recommendations. One new Board recommendation was received and accepted by the Department in 1999, and a new implementation plan is being developed to address this recommendation. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, opening of a repository for long-term storage of transuranic wastes, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2000-02-01T23:59:59.000Z

79

Recommended Practice: Defense-in-Depth  

Broader source: Energy.gov (indexed) [DOE]

Report # INL/EXT-06-11478 Report # INL/EXT-06-11478 Control Systems Cyber Security: Defense in Depth Strategies May 2006 Prepared by Idaho National Laboratory Recommended Best Practice: Defense in Depth 2 Table of Contents Keywords............................................................................................................................. 3 Introduction......................................................................................................................... 3 Background ......................................................................................................................... 3 Overview of Contemporary Control System Architectures................................................. 4 Security Challenges in Control Systems .............................................................................

80

A Summary of Control System Security Standards Activities in the Energy  

Broader source: Energy.gov (indexed) [DOE]

A Summary of Control System Security Standards Activities in the A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of several of the sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. Summary of CS Standards Activities in the Energy Sector.pdf More Documents & Publications

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Activities to Secure Control Systems in the Energy Sector  

Broader source: Energy.gov (indexed) [DOE]

sector sector NSTB November 2008 Hank Kenchington - Program Manager Office of Electricity of Delivery and Energy Reliability U.S. Department of Energy Activities to Secure Control Systems in the Energy Sector * 2,000,000 Miles of Oil Pipelines * 1,300,000 Miles of Gas Pipelines * 2,000 Petroleum Terminals * ~1,000,000 Wells * Extensive Ports, Refineries, Transportation, and LNG Facilities * 160,000 Miles of Electrical Transmission lines * ~17,000 Generators; 985,000 Megawatts (net summer capacity) * Over 3,100 Electric Utilities, with 131 million customers Refinery Locations, Crude and Product Pipelines Source: Energy Information Administration, Office of Oil & Gas LNG Import Facilities (Reactivation underway) Legend Interstate Pipelines Intrastate and Other Pipelines

82

S.2058: This act may be cited as the Department of Energy National Security Act for Fiscal Year 1999, introduced in the Senate of the United States, One Hundred Fifth Congress, Second Session, May 11, 1998  

SciTech Connect (OSTI)

This bill is to authorize appropriations for fiscal year 1999 for defense activities of the Department of Energy, and for other purposes. Topics addressed in the bill include DOE national security programs including recurring general provisions and program authorizations, restrictions,and limitations; defense nuclear facilities safety board; national defense stockpile; naval petroleum reserves; and Panama Canal commission.

NONE

1998-12-31T23:59:59.000Z

83

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

84

Oversight Reports - Y-12 National Security Complex | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Y-12 National Security Complex Y-12 National Security Complex Oversight Reports - Y-12 National Security Complex Independent Oversight Appraisal, Y-12 National Security Complex - May 2013 Appraisal of the Uranium Processing Facility Safety Basis Preliminary Safety Design Report Process at the Y-12 National Security Complex Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] Independent Oversight Assessment, Y-12 National Security Complex - June 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project Independent Oversight Review, Babcock & Wilcox Technical Services Y-12, LLC

85

A Summary of Control System Security Standards Activities in...  

Broader source: Energy.gov (indexed) [DOE]

sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy...

86

Independent Activity Report, Nevada National Security Site- July 2011  

Broader source: Energy.gov [DOE]

Review of Nevada National Security Site Device Assembly Facility Justification for Continued Operations for Inoperable HEPA-Filtered Ventilation System [HIAR-NNSS-2011-07-08

87

Deception used for Cyber Defense of Control Systems  

SciTech Connect (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

88

Active Millimeter-Wave and Sub-Millimeter-Wave Imaging for Security Applications  

SciTech Connect (OSTI)

Active imaging at millimeter and sub-millimeter wavelengths has been developed for security applications including concealed weapon detection. The physical properties that affect imaging performance are discussed along with a review of the current state-of-the-art and future potential for security imaging systems.

Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

2011-09-02T23:59:59.000Z

89

Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000  

SciTech Connect (OSTI)

This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2001-03-01T23:59:59.000Z

90

Energy and Defense Departments Announce Agreement to Enhance...  

Office of Environmental Management (EM)

Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and...

91

NIST Activities in Support of the Energy Independence and Security Act  

Broader source: Energy.gov (indexed) [DOE]

NIST Activities in Support of the Energy Independence and Security NIST Activities in Support of the Energy Independence and Security Act (EISA) of 2007 NIST Activities in Support of the Energy Independence and Security Act (EISA) of 2007 Revitalizing the electric power grid has become one of our Nation's top priorities, promising to reduce our dependence on oil and to meet the anticipated 1.1% annual increase in demand for electricity1. In his New Energy for America plan, President-elect Obama calls for increased investment in the next generation power grid, referred to as the Smart Grid, to help reach the ambitious goals of ensuring that renewable sources provide 10% of our electricity by 2012 and 25% by 2025; and that 1 million Plug-In Hybrid cars are on the roads by 2015. NIST Activities in Support of the Energy Independence and Security Act

92

Summary-Invisible Networking: Techniques and Defenses  

E-Print Network [OSTI]

Summary-Invisible Networking: Techniques and Defenses Lei Wei, Michael K. Reiter, and Ketan Mayer explored. We investigate the combination of these ideas, which we term Summary-Invisible Networking (SIN #12;Summary-Invisible Networking: Techniques and Defenses 211 community of security analysts now holds

Reiter, Michael

93

Rock mechanics contributions from defense programs  

SciTech Connect (OSTI)

An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth`s interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges.

Heuze, F.E.

1992-02-01T23:59:59.000Z

94

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

SciTech Connect (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

95

David M. Cattler Director, Defense Combating Terrorism Center  

E-Print Network [OSTI]

David M. Cattler Director, Defense Combating Terrorism Center Directorate for Analysis The Nexus of Crime and Terrorism: New Security Challenges in the 21st Century David Cattler is the director of the Defense Combating Terrorism Center at the Defense Intelligence Agency, which is focused principally

96

A subtilisin-like protein from soybean contains an embedded, cryptic signal that activates defense-related genes  

Science Journals Connector (OSTI)

...signaling pathway, producing protease inhibitors and other defense compounds that protect the...1984 ) Characterization of the smallest chitosan oligomer that is maximally antifungal...sequence for secretion, proregion (inhibitor I9), peptidase S8, protease associated...

Gregory Pearce; Yube Yamaguchi; Guido Barona; Clarence A. Ryan

2010-01-01T23:59:59.000Z

97

Applications for cyber security - System and application monitoring  

SciTech Connect (OSTI)

Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

2006-07-01T23:59:59.000Z

98

Abstract --Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities  

E-Print Network [OSTI]

1 Abstract -- Securing a Grid environment presents a distinctive set of challenges. This paper the security requirements of Grids more completely. Index Terms -- Grid security, authentication, authorization, trust management, secure communication, security policy I. INTRODUCTION The goal of Grid Computing

99

The Cyber Security Crisis  

SciTech Connect (OSTI)

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

100

high explosives | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

experts have been honored with a Defense Programs Award of Excellence for their help in securing supply of a critical material for the Departments of Energy and Defense.The...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

102

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Director Defense Advanced Research Projects Agency Programs, Global Security Directorate Oak Ridge National Laboratory Post Office Box 2008, MS-6138 Oak Ridge, Tennessee...

103

Action Codes Table | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sheets Newsletters Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Programs Defense Nuclear Security ...

104

National Security Photo Gallery | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Defense, Department of Homeland Security, state and local government agencies, private sector companies. Research for international organizations has involved the World...

105

NNSA: Securing Domestic Radioactive Material | National Nuclear...  

National Nuclear Security Administration (NNSA)

established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify, secure, remove andor...

106

October 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Harrington, NNSA Deputy Administrator, Defense Nuclear Nonproliferation; and Morgan Smith, Chief Operating Officer, Consolidated Nuclear Security. The free course taught at...

107

Disposal Activities and the Unique Waste Streams at the Nevada National Security Site (NNSS)  

SciTech Connect (OSTI)

This slide show documents waste disposal at the Nevada National Security Site. Topics covered include: radionuclide requirements for waste disposal; approved performance assessment (PA) for depleted uranium disposal; requirements; program approval; the Waste Acceptance Review Panel (WARP); description of the Radioactive Waste Acceptance Program (RWAP); facility evaluation; recent program accomplishments, nuclear facility safety changes; higher-activity waste stream disposal; and, large volume bulk waste streams.

Arnold, P.

2012-10-31T23:59:59.000Z

108

Energy and Defense Departments Announce Agreement to Enhance Cooperation on  

Broader source: Energy.gov (indexed) [DOE]

and Defense Departments Announce Agreement to Enhance and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security July 27, 2010 - 12:00am Addthis Washington, D.C. - At a White House Forum on Energy Security today, U.S. Deputy Secretary of Energy Daniel Poneman announced a Memorandum of Understanding (MOU) between the U.S. Department of Energy and the U.S. Department of Defense to accelerate clean energy innovation and enhance national energy security. America's military pays a high price in terms of added cost, risk of life, and lost operational flexibility in order to deliver fuel supplies to our forces in combat. Both agencies are committed to reducing these

109

Systematic Analysis of Defenses against Return-Oriented Programming  

E-Print Network [OSTI]

Since the introduction of return-oriented programming, increasingly complex defenses and subtle attacks that bypass them have been proposed. Unfortunately the lack of a unifying threat model among code reuse security papers ...

Skowyra, Richard

2013-01-01T23:59:59.000Z

110

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

111

Office of the Assistant General Counsel for International and National Security Programs  

Broader source: Energy.gov [DOE]

The Office of the Assistant General Counsel for International and National Security Programs provides legal advice in support of DOE defense and national security programs, intelligence and counter...

112

Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

113

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

114

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

115

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

116

Defense Programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

materials and weapons between facilities and military locations. NNSA also strives to conduct operations in ways that are safe for the environment and the public. As threats...

117

defense programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

today that its Sandia National Laboratories successfully completed the first full-scale wind tunnel test of the B61- NNSA's Summary of Experiments Conducted in Support of...

118

Notices DEPARTMENT OF DEFENSE Defense Acquisition Regulations  

Broader source: Energy.gov (indexed) [DOE]

2 Federal Register 2 Federal Register / Vol. 78, No. 184 / Monday, September 23, 2013 / Notices DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [Docket No. 2011-0052] Submission for OMB Review; Comment Request ACTION: Notice. The Defense Acquisition Regulations System has submitted to OMB for clearance, the following proposal for collection of information under the provisions of the Paperwork Reduction Act (44 U.S.C. chapter 35). DATES: Consideration will be given to all comments received by October 23, 2013. Title, Associated Form, and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS), Part 204 and related clause at 252.204-7012, Safeguarding Unclassified Controlled Technical Information. Type of Request: New collection. Number of Respondents: 6,555.

119

NNSA Established | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Established | National Nuclear Security Administration Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Established NNSA Established March 01, 2000 Washington, DC NNSA Established The Department activates the National Nuclear Security Administration (NNSA), meeting the statutory deadline established by the FY 2000 defense

120

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

122

Barriers to creating a secure MPI  

SciTech Connect (OSTI)

This paper explores some of the many issues in developing security enhanced MPI for embedded real-time systems supporting the Department of Defense`s Multi-level Security policy (DoD MLS) are presented along with the preliminary design for such an MPI variant. In addition some of the many issues that need to be addressed in creating security enhanced versions of MPI for other domains are discussed. 19 refs.

Brightwell, R.; Greenberg, D.S.; Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States); Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States). Dept. of Computer Sciences

1997-08-01T23:59:59.000Z

123

Cyber Defense Overview  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

infrastructure. New threats demand new defenses Page-3 SPIDERS Program Summary CAMP SMITH ENERGY ISLAND * Entire Installation Smart Microgrid * Islanded Installation * High...

124

Nature of Transactions (TI) Code | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Sheets Newsletters Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Programs Defense Nuclear Security ...

125

Office of Weapons Material Protection | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

that gradually transfers responsibility for maintaining the security systems to Russia. Related Topics material protection MPC&A SLD second line of defense weapons material...

126

2009 NMMSS Users Training Meeting | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System Training Annual Users Training Meeting Archives 2009...

127

National Security Campus leader receives STEM award | National...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and engineered material components and integrating evolving technologies, such as 3D printing, to improve the safety and security of our nation's defense programs. Stubenhofer...

128

DoD, Energy Security and Technological Innovation  

Broader source: Energy.gov (indexed) [DOE]

DoD, Energy Security and Technological Innovation Dorothy Robyn Deputy Under Secretary of Defense (Installations & Environment) SunShot Grand Challenge Summit and Technology Forum...

129

Listing of Defense Nuclear Facilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1 - Listing of Defense Nuclear Facilities More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities Workforce Restructuring Policy The...

130

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

131

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

132

Independent Activity Report, Los Alamos National Laboratory - August 2012 |  

Broader source: Energy.gov (indexed) [DOE]

2 2 Independent Activity Report, Los Alamos National Laboratory - August 2012 August 2012 Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory [HIAR LANL-2012-08-16] The purpose of this Office of Health, Safety and Security (HSS) activity was to maintain site operational awareness of key nuclear safety performance areas of interest to the Defense Nuclear Facilities Safety Board (DNFSB), monitor ongoing site oversight and planning activities for Los Alamos National Laboratory (LANL) nuclear facilities, and identify and initiate coordination of future HSS oversight activities at the site. Independent Activity Report, Los Alamos National Laboratory - August 2012 More Documents & Publications

133

Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission  

Broader source: Energy.gov (indexed) [DOE]

AT THE AT THE U.S. NUCLEAR REGULATORY COMMISSION R. Clyde Ragland, P.E. Office of Nuclear Security and Incident Response 2011 DOE National Transportation Stakeholders Forum May 11, 2011 2 NRC Focus Prior to September 11, 2001 * Historically, NRC Transportation Security Regulations Focused on Highest Risk Radioactive Material, consisted of Special Nuclear Material (SNM) and Spent Nuclear Fuel (SNF) NRC Actions Since September 11, 2001 * Domestically, reviewed materials transported by NRC licensees and re- evaluated security requirements considering: - applicable threats to shipments - material considerations - magnitude of adverse consequences * Internationally, participated in the development of the IAEA Code of Conduct on the Safety and Security of Radioactive

134

NNSA's Second Line of Defense Program Receives Capability Award |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Second Line of Defense Program Receives Capability Award | Second Line of Defense Program Receives Capability Award | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Second Line of Defense Program Receives ... NNSA's Second Line of Defense Program Receives Capability Award Posted By Office of Public Affairs NNSA's Second Line of Defense (SLD) was awarded the 2013 Non-Conventional

135

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Northwest National Laboratory | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Steve Mladineo Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific

136

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific  

National Nuclear Security Administration (NNSA)

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Northwest National Laboratory | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Steve Mladineo Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific

137

MEASUREMENT AND CALCULATION OF RADIONUCLIDE ACTIVITIES IN SAVANNAH RIVER SITE HIGH LEVEL WASTE SLUDGE FOR ACCEPTANCE OF DEFENSE WASTE PROCESSING FACILITY GLASS IN A FEDERAL REPOSITORY  

SciTech Connect (OSTI)

This paper describes the results of the analyses of High Level Waste (HLW) sludge slurry samples and of the calculations necessary to decay the radionuclides to meet the reporting requirement in the Waste Acceptance Product Specifications (WAPS) [1]. The concentrations of 45 radionuclides were measured. The results of these analyses provide input for radioactive decay calculations used to project the radionuclide inventory at the specified index years, 2015 and 3115. This information is necessary to complete the Production Records at Savannah River Site's Defense Waste Processing Facility (DWPF) so that the final glass product resulting from Macrobatch 5 (MB5) can eventually be submitted to a Federal Repository. Five of the necessary input radionuclides for the decay calculations could not be measured directly due to their low concentrations and/or analytical interferences. These isotopes are Nb-93m, Pd-107, Cd-113m, Cs-135, and Cm-248. Methods for calculating these species from concentrations of appropriate other radionuclides will be discussed. Also the average age of the MB5 HLW had to be calculated from decay of Sr-90 in order to predict the initial concentration of Nb-93m. As a result of the measurements and calculations, thirty-one WAPS reportable radioactive isotopes were identified for MB5. The total activity of MB5 sludge solids will decrease from 1.6E+04 {micro}Ci (1 {micro}Ci = 3.7E+04 Bq) per gram of total solids in 2008 to 2.3E+01 {micro}Ci per gram of total solids in 3115, a decrease of approximately 700 fold. Finally, evidence will be given for the low observed concentrations of the radionuclides Tc-99, I-129, and Sm-151 in the HLW sludges. These radionuclides were reduced in the MB5 sludge slurry to a fraction of their expected production levels due to SRS processing conditions.

Bannochie, C; David Diprete, D; Ned Bibler, N

2008-12-31T23:59:59.000Z

138

A defense of theistic activism  

E-Print Network [OSTI]

distinct from him, Platonic objects cannot bc ontologically independent under the theistic view. Thus, if traditional theism Alvin Platinga, Does God ffrrve a Nature? (Milsvaukee: Marquette University Press, 1980l, 1. Christopher Menzel and Thomas Mon is... dependency, and ontological dependency. In this thesis, entailment is used to define logical dependence. Take thc following proposition: (S) John Oleese perfotmed with thc comedy troupe Monty Python. If S is true, thc following has to be true: (S') John...

Haugen, Christopher Allen

2012-06-07T23:59:59.000Z

139

Audit Report - Office of Secure Transportation Capabilities  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation Office of Secure Transportation Capabilities OAS-M-12-05 June 2012 Department of Energy Washington, DC 20585 June 29, 2012 UN MEMORANDUM FOR THE ASSISTANT DEPUTY ADMINISTRATOR, OFFICE OF SECURE TRANSPORTATION FROM: George W. Collard Assistant Inspector General for Audits Office of Inspector General SUBJECT: INFORMATION: Audit Report on "Office of Secure Transportation Capabilities" BACKGROUND The National Nuclear Security Administration's Office of Secure Transportation (OST) is responsible for safely and securely transporting nuclear weapons, weapon components and special nuclear material for customers such as the Department of Energy, Department of Defense and the Nuclear Regulatory Commission. Specifically, OST shipments support the nuclear

140

Trusted Grid Computing with Security Assurance and Resource Optimization  

E-Print Network [OSTI]

Trusted Grid Computing with Security Assurance and Resource Optimization Shanshan Song and Kai The security of Grid sites can be enhanced by upgrading its intrusion defense capabilities against its previous security enforcement across multiple Grid resources sites. The design is aimed at securing Grid resources

Hwang, Kai

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

NNSA's Military Academic Collaborations | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Military Academic Collaborations | National Nuclear Security Military Academic Collaborations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Video Gallery > NNSA's Military Academic Collaborations NNSA's Military Academic Collaborations NNSA's Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense Programs offers a suite of activities to enhance collaboration between NNSA's eight sites and the U.S. Military Academies and ROTC programs at other universities. These programs are administered at NNSA and executed at NNSA sites, including the labs, production facilities and the Nevada National Security Site. At each location, leading-edge research and development is carried out on key national security technologies critical to the United States and its allies.

142

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

143

Security Rulemaking  

Broader source: Energy.gov (indexed) [DOE]

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

144

Managing America's Defense Nuclear Waste | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Managing America's Defense Nuclear Waste Managing America's Defense Nuclear Waste Managing America's Defense Nuclear Waste More Documents & Publications National Defense...

145

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information  

SciTech Connect (OSTI)

To effectively identify and respond to cyber threats, computer security analysts must understand the scale, motivation, methods, source, and target of an attack. Central to developing this situational awareness is the analysts world knowledge that puts these attributes in context. What known exploits or new vulnerabilities might an anomalous traffic pattern suggest? What organizational, social, or geopolitical events help forecast or explain attacks and anomalies? Few visualization tools support creating, maintaining, and applying this knowledge of the threat landscape. Through a series of formative workshops with practicing security analysts, we have developed a visualization approach inspired by the human process of contextualization; this system, called NUANCE, creates evolving behavioral models of network actors at organizational and regional levels, continuously monitors external textual information sources for themes that indicate security threats, and automatically determines if behavior indicative of those threats is present on a network.

Pike, William A.; Scherrer, Chad; Zabriskie, Sean J.

2008-06-04T23:59:59.000Z

146

Department of Defense Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Department of Defense Programs Department of Defense Programs SHARE Department of Defense Programs image The Department of Defense Programs address the specifics challenges of the defense sector and have the widest application of ORNL capabilities. We support the military in a number of areas, including chem/bio defense and early warning; logistics and transportation management; hardened and other special materials; tagging, tracking, and locating; sensor miniaturization and communication; information management, synthesis and analysis; climate change modeling applications; structural amorphous materials for wear-resistant coatings; standoff acoustic laser detection system for detection of explosives; biometrics; cognitive radio systems; and power and energy applications for both mobile power and infrastructure requirements.

147

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

148

Argonne's National Security Information Systems National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

149

Don Cook discusses NNSA's Defense Programs at Woodrow Wilson Center |  

National Nuclear Security Administration (NNSA)

discusses NNSA's Defense Programs at Woodrow Wilson Center | discusses NNSA's Defense Programs at Woodrow Wilson Center | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Don Cook discusses NNSA's Defense Programs at ... Don Cook discusses NNSA's Defense Programs at Woodrow Wilson Center Posted By Office of Public Affairs Cook at WW

150

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

151

Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear  

National Nuclear Security Administration (NNSA)

Congressional Testimony > Statement of Anne M. Congressional Testimony > Statement of Anne M. Harrington, Deputy Administrator ... Congressional Testimony Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear Nonproliferation to the Senate Armed Services Sub Committee On Emerging Threats and Capabilities May 10, 2011 Chairwoman Hagan, Ranking Member Portman, thank you for the opportunity to join you today to discuss the investments the President has requested for the National Nuclear Security Administration's Defense Nuclear Nonproliferation programs. But more importantly, thank you for your continued support of the National Nuclear Security Administration, and the 35,000 men and women working across the enterprise to keep our country safe, protect our allies, and enhance global security. We could not do

152

Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear  

National Nuclear Security Administration (NNSA)

Speeches > Statement of Anne M. Harrington, Deputy Speeches > Statement of Anne M. Harrington, Deputy Administrator ... Speech Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear Nonproliferation to the Senate Armed Services Sub Committee On Emerging Threats and Capabilities May 10, 2011 Chairwoman Hagan, Ranking Member Portman, thank you for the opportunity to join you today to discuss the investments the President has requested for the National Nuclear Security Administration's Defense Nuclear Nonproliferation programs. But more importantly, thank you for your continued support of the National Nuclear Security Administration, and the 35,000 men and women working across the enterprise to keep our country safe, protect our allies, and enhance global security. We could not do this work without strong, bipartisan support and engaged leadership from

153

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

154

Second Line of Defense Spares Program Assessment  

SciTech Connect (OSTI)

The Office of the Second Line of Defense (SLD) is part of the Department of Energys (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

2012-11-20T23:59:59.000Z

155

Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility, October 2012  

Broader source: Energy.gov (indexed) [DOE]

HSS Independent Activity Report - HSS Independent Activity Report - Rev. 0 Report Number: HIAR-Y-12-2012-10-02 Site: Y-12 UPF Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Defense Nuclear Facilities Safety Board (DNFSB) Public Meeting on the Status of Integration of Safety into the Design of the Uranium Processing Facility (UPF) Dates of Activity: October 2, 2012 Report Preparer: Timothy Mengers Activity Description/Purpose: The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12

156

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

157

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

158

Administrator D'Agostino's Remarks at the National Defense University Forum  

National Nuclear Security Administration (NNSA)

National Defense University Forum National Defense University Forum Congressional Breakfast Seminar | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > Administrator D'Agostino's Remarks at the National Defense ... Speech Administrator D'Agostino's Remarks at the National Defense University Forum

159

Energy and Defense Departments Announce New Steps to Enhance Cooperation on  

Broader source: Energy.gov (indexed) [DOE]

Defense Departments Announce New Steps to Enhance Defense Departments Announce New Steps to Enhance Cooperation on Clean Energy and Energy Security Energy and Defense Departments Announce New Steps to Enhance Cooperation on Clean Energy and Energy Security March 2, 2011 - 12:00am Addthis Washington, D.C. - Building on already strong cooperation between the U.S. Department of Energy and the U.S. Department of Defense, U.S. Secretary of the Navy Ray Mabus announced today new steps between the Departments to strengthen national security through the continued development of advanced clean energy technologies. Furthering the Memorandum of Understanding (MOU) announced last summer the new steps being announced today strengthen coordination and better leverage the expertise and resources of both Departments to enhance our national

160

Military Academic Collaborations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Academic Collaborations | National Nuclear Security Administration Academic Collaborations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Military Academic Collaborations Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

A quantitative man-machine model for cyber security efficiency analysis  

E-Print Network [OSTI]

of the level of their security defense processes' efficiency and the impact of their investment. Modeling and characterization of the dynamics of cyber security management are essential to risk prediction, damage assessment, and resource allocations...

Jung, Sung-Oh

2007-04-25T23:59:59.000Z

162

Headquarters Personnel Security Operations | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Headquarters Personnel Security Operations Headquarters Personnel Security Operations Headquarters Personnel Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems. Functions The primary function of the Office of Headquarters Personnel

163

Supercomputers | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Supercomputers | National Nuclear Security Administration Supercomputers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Supercomputers Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Supercomputers

164

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

165

Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Orientation Visit to the Nevada National Security Site - January 11-13, 2011  

Broader source: Energy.gov (indexed) [DOE]

Orientation Visit to the Nevada National Orientation Visit to the Nevada National Security Site - January 11-13, 2011 The U.S. Department of Energy (DOE) Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), conducted an orientation visit to the DOE Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from January 11-13, 2011. The purpose of the visit was to discuss the nuclear safety oversight strategy, initiate the site lead program, increase HSS personnel's operational awareness of the site's activities, and to determine how HSS can carry out its independent oversight and mission support responsibilities. Staff from NSO, National Security Technologies, LLC (NSTec), Los Alamos National Laboratory, and Lawrence Livermore National Laboratory provided HSS personnel with detailed

166

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

167

Joint Energy and Reactive Power Market Considering Coupled Active and Reactive Reserve Market Ensuring System Security  

Science Journals Connector (OSTI)

Reactive power market is usually held as independent from energy and reserved active power markets; however, active and reactive power are ... synchronous generator capacity curve. Therefore, reactive power market

Hamed Ahmadi; Asghar Akbari Foroud

2014-06-01T23:59:59.000Z

168

National Defense Authorization Act for Fiscal Year 2000 § 3164:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Defense Authorization Act for Fiscal Year 2000 § 3164: National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program Stakeholders: DOE Employees and Contractors engaged in defense activities for the Department Scope: Section 3164 of the National Defense Authorization Act for Fiscal Year 2000 implements a whistleblower protection program to ensure that covered individuals may not be discharged, demoted, or otherwise discriminated against as a reprisal for making protected disclosures to a member of a committee of Congress having primary responsibility for oversight of the department, agency, or element of the Government to which the disclosed information relates; an employee of Congress who is a staff

169

Lessons Learned at the Nevada National Security Site Implementing the EFCOG Activity-level Work Planning and Control Guide  

Broader source: Energy.gov [DOE]

Slide Presentation by Steele Coddington, Work Planning Manager, National Security Technologies, Nevada National Security Site. Lessons Learned Implementing Work Planning & Control. 6 Step Process for improving WP&C.

170

Microsoft Word - Defense Science Quarterly 08-08.doc  

National Nuclear Security Administration (NNSA)

August 2008 August 2008 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Derivative Applications of Pulsed Power Science and Technology 4 LANSCE-R Means More Beam for National Security Research 6 Dual Axis Radiographic Hydrodynamics Test (DARHT) 2 nd Axis Completed and Put into Operation 7 Annual Symposium of the Stewardship Science Graduate Fellowship Program 8 Publication Highlights 9 ICOPS 2008 9 Highlights and Awards Message from the Director Chris Deeney, Defense Science Division It's hard to believe it's been a year since we published our first issue of the Defense Science Quarterly. I would like to express my appreciation to all the authors who have submitted articles and to the production staff. If you are

171

Nevada National Security Site - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

172

Security and You, May 2013  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Headquarters Security Incidents Headquarters Security Incidents The Department of Energy depends on its employees to protect sensitive and classified information. You are the first line of defense. Your failure to properly protect classified information and controlled unclassified information not only endangers our national security, it can also subject you to criminal, civil, or administrative penalties. Unfortunately, DOE Headquarters (HQ) had over fifty security incidents in 2012. The majority of Security Incidents are easily preventable. Let's take an actual case that happened at HQ. A new employee wrote down the combination to a classified container so that they could easily access the combination without having to memorize it. So it would be within reach, the person put the combination

173

US Senate Committee on Armed Services DOE Defense Nuclear Facilities Panel  

SciTech Connect (OSTI)

Sandia is a government-owned, contractor-operated national laboratory that AT T has operated on a no-profit, no-fee basis since 1949. We have been an integral part of the nuclear weapons program, providing total concept-to-retirement engineering for every warhead and bomb in the nuclear weapon stockpile. We are proud of our contributions to national security. Our scientific and engineering skills, our facilities, and our experience have benefited not only the nuclear weapons program but have also contributed significantly to their areas of national security, including conventional defense, energy, and industrial competitiveness. Likewise, these capabilities position us well to continue a tradition of exceptional service in the national service in the national interest. Sandia is a multiprogram national laboratory with mission responsibilities in nuclear weapons, arms control and verification, energy and environment, and technology transfer. Our work for the DOE Assistant Secretary for Defense Programs constitutes 50% of the laboratory's effort. Sandia's arms control, verification, and related intelligence and security programs, funded by DOE and by other agencies constitute the largest aggregation of such work at any facility in the world. We also support DOE with technology development -- in particular, specialized robotics and waste characterization and treatment processes to assist in the cleanup of contaminated sites. Research and development to support the National Energy Strategy is another substantial laboratory activity. Sandia's successful developments in renewable, nuclear, and fossil energy technologies have saved the country billions of dollars in energy supply and utilization. Technology transfer is conducted across all Sandia programs.

Narath, A.

1992-03-27T23:59:59.000Z

174

US Senate Committee on Armed Services DOE Defense Nuclear Facilities Panel  

SciTech Connect (OSTI)

Sandia is a government-owned, contractor-operated national laboratory that AT&T has operated on a no-profit, no-fee basis since 1949. We have been an integral part of the nuclear weapons program, providing total concept-to-retirement engineering for every warhead and bomb in the nuclear weapon stockpile. We are proud of our contributions to national security. Our scientific and engineering skills, our facilities, and our experience have benefited not only the nuclear weapons program but have also contributed significantly to their areas of national security, including conventional defense, energy, and industrial competitiveness. Likewise, these capabilities position us well to continue a tradition of exceptional service in the national service in the national interest. Sandia is a multiprogram national laboratory with mission responsibilities in nuclear weapons, arms control and verification, energy and environment, and technology transfer. Our work for the DOE Assistant Secretary for Defense Programs constitutes 50% of the laboratory`s effort. Sandia`s arms control, verification, and related intelligence and security programs, funded by DOE and by other agencies constitute the largest aggregation of such work at any facility in the world. We also support DOE with technology development -- in particular, specialized robotics and waste characterization and treatment processes to assist in the cleanup of contaminated sites. Research and development to support the National Energy Strategy is another substantial laboratory activity. Sandia`s successful developments in renewable, nuclear, and fossil energy technologies have saved the country billions of dollars in energy supply and utilization. Technology transfer is conducted across all Sandia programs.

Narath, A.

1992-03-27T23:59:59.000Z

175

Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Orientation Visit to the Nevada National Security Site - January 11-13, 2011  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SUBJECT: Office of Independent Oversight's Office of Environment, Safety and Health SUBJECT: Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Orientation Visit to the Nevada National Security Site - January 11-13, 2011 The U.S. Department of Energy (DOE) Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), conducted an orientation visit to the DOE Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from January 11-13, 2011. The purpose of the visit was to discuss the nuclear safety oversight strategy, initiate the site lead program, increase HSS personnel's operational awareness of the site's activities, and to determine how HSS can carry out its independent oversight and mission support responsibilities.

176

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

177

Notices DEPARTMENT OF DEFENSE  

Broader source: Energy.gov (indexed) [DOE]

011 Federal Register 011 Federal Register / Vol. 78, No. 186 / Wednesday, September 25, 2013 / Notices DEPARTMENT OF DEFENSE Department of the Army Information on Surplus Land at a Military Installation Designated for Disposal: Ernest Veuve Hall USARC/ AMSA 75, T-25, Fort Missoula, Montana AGENCY: Department of the Army, DoD. ACTION: Notice. SUMMARY: This amended notice provides information on withdrawal of surplus property at the Ernest Veuve Hall USARC/AMSA 75, T-25, Fort Missoula, Montana. This notice amends the Notice published in the Federal Register on May 9, 2006 (71 FR 26930). DATES: Effective September 10, 2013 FOR FURTHER INFORMATION CONTACT: Headquarters, Department of the Army, Assistant Chief of Staff for Installation Management, Base Realignment and Closure (BRAC) Division, Attn: DAIM-

178

Notices DEPARTMENT OF DEFENSE  

Broader source: Energy.gov (indexed) [DOE]

2 Federal Register 2 Federal Register / Vol. 76, No. 217 / Wednesday, November 9, 2011 / Notices DEPARTMENT OF DEFENSE Department of the Air Force U.S. Air Force Scientific Advisory Board; Notice of Meeting AGENCY: Department of the Air Force, U.S. Air Force Scientific Advisory Board. ACTION: Meeting notice. SUMMARY: Due to difficulties, beyond the control of the U.S. Air Force Scientific Advisory Board (SAB) or its Designated Federal Officer, the Board must meet no later than November 2, 2011 to deliberate on recent events impacting upon one of the Board's current tasks from the Secretary of the Air Force. Since the Department of the Air Force is unable to file a Federal Register notice announcing the meeting within the 15-calendar day period the Advisory Committee Management Officer for the

179

SECURITY AND CONTROL OF NUCLEAR EXPLOSIVES AND NUCLEAR WEAPONS  

National Nuclear Security Administration (NNSA)

http://www.nnsa.energy.gov Office of Nuclear Weapon Surety and Quality http://www.nnsa.energy.gov Office of Nuclear Weapon Surety and Quality SUPPLEMENTAL DIRECTIVE Approved: 7-7-11 IMPLEMENTATION AND EVALUATION OF CONTROLS TO PREVENT DELIBERATE UNAUTHORIZED USE NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Defense Programs NA SD 452.4 NA SD 452.4 1 7-7-11 IMPLEMENTATION AND EVALUATION OF CONTROLS TO PREVENT DELIBERATE UNAUTHORIZED USE 1. PURPOSE. This NNSA Supplemental Directive (SD) supports the requirements of DOE O 452.4B, Security and Use Control of Nuclear Explosives and Nuclear Weapons. Specifically, this SD supports the Order's requirements to implement deliberate unauthorized use (DUU) preventive measures for nuclear explosive operations (NEO) and associated activities and to perform independent evaluations to determine if NEOs

180

Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors  

E-Print Network [OSTI]

The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or ...

Schlesinger, Adam Ian

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Tom D'Agostino to Lead NNSA's Defense Programs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Tom D'Agostino to Lead NNSA's Defense Programs Tom D'Agostino to Lead NNSA's Defense Programs Tom D'Agostino to Lead NNSA's Defense Programs March 1, 2006 - 12:26pm Addthis WASHINGTON , DC - Secretary of Energy Samuel W. Bodman today announced that Thomas P. D'Agostino has been sworn in as Deputy Administrator for Defense Programs in the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). Deputy Administrator D'Agostino will lead NNSA's weapons programs, which maintain the reliability of our nation's nuclear weapons stockpile. "Tom D'Agostino's highly valued experience and leadership will be critical assets as we continue to transform our nuclear weapons stockpile and respond to our national security needs," Secretary Bodman said. President Bush nominated Deputy Administrator D'Agostino on January 27,

182

Tom D'Agostino to Lead NNSA's Defense Programs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Tom D'Agostino to Lead NNSA's Defense Programs Tom D'Agostino to Lead NNSA's Defense Programs Tom D'Agostino to Lead NNSA's Defense Programs March 1, 2006 - 12:26pm Addthis WASHINGTON , DC - Secretary of Energy Samuel W. Bodman today announced that Thomas P. D'Agostino has been sworn in as Deputy Administrator for Defense Programs in the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). Deputy Administrator D'Agostino will lead NNSA's weapons programs, which maintain the reliability of our nation's nuclear weapons stockpile. "Tom D'Agostino's highly valued experience and leadership will be critical assets as we continue to transform our nuclear weapons stockpile and respond to our national security needs," Secretary Bodman said. President Bush nominated Deputy Administrator D'Agostino on January 27,

183

Activity Reports | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 28, 2012 November 28, 2012 Independent Activity Report, Richland Operations Office - April 2011 Operational Awareness Review of the Hanford Sludge Treatment Project [HIAR-RL-2011-04-07] October 3, 2012 Independent Activity Report, Nevada National Security Site - August 2012 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2012-08-16] October 2, 2012 Independent Activity Report, Sandia National Laboratories - September 2012 Operational Awareness Oversight of Sandia National Laboratories [HIAR SNL-2012-09-13] October 2, 2012 Independent Activity Report, Los Alamos National Laboratory - August 2012 Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory [HIAR LANL-2012-08-16] August 24, 2012

184

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

185

Defense?Related Uranium Mines Report to Congress (August 2014)  

Broader source: Energy.gov [DOE]

Section 3151 of the National Defense Authorization Act for Fiscal Year 2013 directed the Secretary of Energy, in consultation with the Secretary of the Interior and the Administrator of the U.S. Environmental Protection Agency (EPA), to undertake a review of, and prepare a report on, abandoned uranium mines in the United States that provided uranium ore for atomic energy defense activities of the United States (the mines).

186

Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan Colon Container Terminal (CCT) Panama  

SciTech Connect (OSTI)

Report on the Operational Testing and Evaluation to validate and baseline an operable system that meets the Second Line of Defense (SLD) mission requirements. An SLD system is defined as the detection technology and associated equipment, the system operators from the host country, the standard operating procedures (SOPs), and other elements such as training and maintenance which support long-term system sustainment. To this end, the activities conducted during the OT&E phase must demonstrate that the Megaports System can be operated effectively in real-time by Panama Direccion General de Aduanas (DGA Panama Customs) personnel to the standards of the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA).

Newhouse, Robert N.

2010-01-01T23:59:59.000Z

187

Office of Headquarters Personnel Security Operations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Headquarters Personnel Headquarters Personnel Director's Perspective Welcome to the Office of Headquarters Personnel Security Operations Stephanie Scott Grimes, Director The Office of Headquarters Personnel Security Operations serves the Department by providing a comprehensive Personnel Security Program for the DOE Headquarters complex. Our goal is to ensure that DOE classified information and materials are safeguarded from compromise by assuring that only trustworthy individuals are granted security clearances. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes aimed at ensuring only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information and materials.

188

LeMPK3 Is a Mitogen-activated Protein Kinase with Dual Specificity Induced during Tomato Defense and Wounding Responses*  

E-Print Network [OSTI]

and jasmonic acid. Moreover, in resistant tomato plants infected by X. campestris pv. vesicatoria, transcript, and Guido Sessa From the Dept. of Plant Sciences, Tel-Aviv University, 69978 Tel-Aviv, Israel Mitogen-activated protein (MAP) kinase cascades are readily activated during the response of plants to avir- ulent pathogens

Sessa, Guido

189

Sandia National Laboratories: Defense Waste Management Programs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Programs provides scientific analyses and programmatic advice to the U.S. Department of Energy in support of defense waste management challenges. Defense waste encompasses...

190

The future of defense and technology  

SciTech Connect (OSTI)

This document provides an insight into the future of national defense and the impacts of utilizing technology for improved defensive postures. (FI)

Teller, E.

1991-01-10T23:59:59.000Z

191

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

192

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

193

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

194

Oversight Reports - Nevada National Security Site | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Nevada National Security Site Nevada National Security Site Oversight Reports - Nevada National Security Site May 22, 2013 Independent Oversight Review, Nevada National Security - May 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure December 18, 2012 Independent Activity Report, Nevada National Security Site - December 2012 Nevada National Security Site Operational Awareness Visit [HIAR NNSS-2012-12-03] October 3, 2012 Independent Activity Report, Nevada National Security Site - August 2012 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2012-08-16] April 2, 2012 Independent Oversight, Nevada National Security Site - March 2012 Review of the Nevada National Security Site Implementation Verification

195

SUSTAINABILITY REPORTING NATURAL RESOURCES DEFENSE  

E-Print Network [OSTI]

SUSTAINABILITY REPORTING AND THE NATURAL RESOURCES DEFENSE COUNCIL AUGUST 2012 Capstone Team RELEVANCE/CONTEXT 4 HISTORY OF SUSTAINABILITY REPORTING 4 ORGANIZATIONAL PROFILE 7 METHODOLOGY 8 FINDINGS AND DISCUSSION 11 FINDINGS FROM INTERVIEWS 11 SUSTAINABILITY FRAMEWORK ASSESSMENT 12

Qian, Ning

196

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

197

Accomplishments | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Accomplishments | National Nuclear Security Administration Accomplishments | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Accomplishments Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Accomplishments

198

Overview | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Overview | National Nuclear Security Administration Overview | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Overview Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Overview Overview

199

Accomplishments | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Accomplishments | National Nuclear Security Administration Accomplishments | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Accomplishments Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Accomplishments

200

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Independent Activity Report, Los Alamos National Laboratory - August 2012 |  

Broader source: Energy.gov (indexed) [DOE]

Los Alamos National Laboratory - Los Alamos National Laboratory - August 2012 Independent Activity Report, Los Alamos National Laboratory - August 2012 August 2012 Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory [HIAR LANL-2012-08-16] The purpose of this Office of Health, Safety and Security (HSS) activity was to maintain site operational awareness of key nuclear safety performance areas of interest to the Defense Nuclear Facilities Safety Board (DNFSB), monitor ongoing site oversight and planning activities for Los Alamos National Laboratory (LANL) nuclear facilities, and identify and initiate coordination of future HSS oversight activities at the site. Independent Activity Report, Los Alamos National Laboratory - August 2012

202

White House Forum on Energy Security (Update) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

White House Forum on Energy Security (Update) White House Forum on Energy Security (Update) White House Forum on Energy Security (Update) July 27, 2010 - 4:48pm Addthis John Schueler John Schueler Former New Media Specialist, Office of Public Affairs What does this mean for me? The Department of Energy is partnering with the Department of Defense to accelerate clean energy innovation and enhance national energy security. Earlier this afternoon high ranking officials from the Departments of Energy and Defense came together with national security officials, business leaders, academics and other stakeholders for a discussion on the national security imperative of building a clean energy economy. Navy Secretary Ray Mabus and Deputy Energy Secretary Daniel Poneman kicked off the session by announcing a Memorandum of Understanding between

203

Defense Programs: the mission | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the early days of World War II, fear that Germany would create and use an atomic bomb led the U.S. to secretly launch the Manhattan Project to build one first. Enriched uranium...

204

NPO recognized by Defense Programs | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

who worked on projects ranging from metallography of weapons components to analysis of plastic bonded explosives to work on the B53 and B83 weapons. In his comments, he emphasized...

205

A Security Attack and Defense in the Grid Environment  

Science Journals Connector (OSTI)

Programs in execution have long been considered to be immutable objects. Object code and libraries are emitted by the compiler, linked and then executed; any changes to the program require revisiting the compile ...

Barton P. Miller

2002-01-01T23:59:59.000Z

206

Defense Programs lecture series continue | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

2013 (18) August 2013 (17) July 2013 (20) June 2013 (19) May 2013 (25) April 2013 (17) March 2013 (23) February 2013 (22) January 2013 (21) December 2012 (19) November 2012 (19)...

207

Security Cases  

Broader source: Energy.gov (indexed) [DOE]

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

208

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

209

Japans Defense White Paper as a Toolfor Promoting Defense Transparency  

E-Print Network [OSTI]

the official lines of Japans defense policy. Furthermore,Brief 2012-2 March 2012 Japans Defense White Paper as apolicy brief explains how Japan produces its annual defense

SUKEGAWA, Yasushi

2012-01-01T23:59:59.000Z

210

Environmental Defense Fund | Open Energy Information  

Open Energy Info (EERE)

Defense Fund Defense Fund Jump to: navigation, search Name Environmental Defense Fund Place New York, New York Zip 10010 Product Environmental Defense is a leading national nonprofit organization representing more than 500,000 members. Environmental Defense is dedicated to protecting the environmental rights of all people, including future generations. References Environmental Defense Fund[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Environmental Defense Fund is a company located in New York, New York . References ↑ "Environmental Defense Fund" Retrieved from "http://en.openei.org/w/index.php?title=Environmental_Defense_Fund&oldid=345028" Categories:

211

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements to ensure that individuals are processed for, granted, and retain a DOE access authorization only when required. DOE N 251.47, dated 08/14/02, extends this directive until 05/14/03. Cancels DOE 472.1A and DOE 472.1 Chg 1.

1997-03-24T23:59:59.000Z

212

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements to ensure that individuals are processed for, granted, and maintain a DOE access authorization only when their official duties require such access. Cancels DOE O 472.1

1996-09-05T23:59:59.000Z

213

National Center for Nuclear Security: The Nuclear Forensics Project (F2012)  

SciTech Connect (OSTI)

These presentation visuals introduce the National Center for Nuclear Security. Its chartered mission is to enhance the Nations verification and detection capabilities in support of nuclear arms control and nonproliferation through R&D activities at the NNSS. It has three focus areas: Treaty Verification Technologies, Nonproliferation Technologies, and Technical Nuclear Forensics. The objectives of nuclear forensics are to reduce uncertainty in the nuclear forensics process & improve the scientific defensibility of nuclear forensics conclusions when applied to nearsurface nuclear detonations. Research is in four key areas: Nuclear Physics, Debris collection and analysis, Prompt diagnostics, and Radiochemistry.

Klingensmith, A. L.

2012-03-21T23:59:59.000Z

214

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems  

E-Print Network [OSTI]

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

Menascé, Daniel A.

215

Toward a defense-dominated world  

SciTech Connect (OSTI)

Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

Wood, L.

1993-08-01T23:59:59.000Z

216

Institutional Research & Development | National Nuclear Security  

National Nuclear Security Administration (NNSA)

| National Nuclear Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Institutional Research & Development Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

217

Collaboration Topics - System Software | National Nuclear Security  

National Nuclear Security Administration (NNSA)

System Software | National Nuclear Security System Software | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

218

Our Programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Our Programs Home > About Us > Our Programs Our Programs NNSA's program support is divided into several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and

219

Working with Interpreters | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Working with Interpreters | National Nuclear Security Administration Working with Interpreters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Working with Interpreters Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

220

Production Technology | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Production Technology | National Nuclear Security Administration Production Technology | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Production Technology Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Production Technology Production Technology NNSA continues to assure the safety, security, and reliability of the

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

High Explosives Application Facility | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Explosives Application Facility | National Nuclear Security Explosives Application Facility | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration High Explosives Application Facility Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Research and Development >

222

Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.  

SciTech Connect (OSTI)

The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

Pregenzer, Arian Leigh

2011-12-01T23:59:59.000Z

223

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

224

Mobile Malware Attacks and Defense  

Science Journals Connector (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

225

Engineering | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Engineering | National Nuclear Security Administration Engineering | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Engineering Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Engineering Engineering NNSA uses modern tools and capabilities in the engineering sciences field which are needed to ensure the safety, security, reliability and

226

Departments of Energy, Defense Partner to Install Fuel Cell Backup Power  

Broader source: Energy.gov (indexed) [DOE]

Departments of Energy, Defense Partner to Install Fuel Cell Backup Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations July 19, 2011 - 4:56pm Addthis The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and develop new clean energy technologies, DOD will be installing and operating 18 fuel cell backup power systems at eight military installations across the country. The Departments will test how the fuel cells perform in real world operations, identify any technical improvements manufacturers could make to enhance performance, and highlight the benefits of fuel cells for emergency backup

227

Departments of Energy, Defense Partner to Install Fuel Cell Backup Power  

Broader source: Energy.gov (indexed) [DOE]

Departments of Energy, Defense Partner to Install Fuel Cell Backup Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations July 19, 2011 - 11:46am Addthis Washington, D.C. - The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and develop new clean energy technologies, DOD will be installing and operating 18 fuel cell backup power systems at eight military installations across the country. The Departments will test how the fuel cells perform in real world operations, identify any technical improvements manufacturers could make to enhance

228

Departments of Energy, Defense Partner to Install Fuel Cell Backup Power  

Broader source: Energy.gov (indexed) [DOE]

Energy, Defense Partner to Install Fuel Cell Backup Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations July 19, 2011 - 11:46am Addthis Washington, D.C. - The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and develop new clean energy technologies, DOD will be installing and operating 18 fuel cell backup power systems at eight military installations across the country. The Departments will test how the fuel cells perform in real world operations, identify any technical improvements manufacturers could make to enhance performance, and highlight the benefits of fuel cells for emergency backup

229

Departments of Energy, Defense Partner to Install Fuel Cell Backup Power  

Broader source: Energy.gov (indexed) [DOE]

Departments of Energy, Defense Partner to Install Fuel Cell Backup Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations July 19, 2011 - 4:56pm Addthis The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and develop new clean energy technologies, DOD will be installing and operating 18 fuel cell backup power systems at eight military installations across the country. The Departments will test how the fuel cells perform in real world operations, identify any technical improvements manufacturers could make to enhance performance, and highlight the benefits of fuel cells for emergency backup

230

Legacy Management Work Progresses on Defense-Related Uranium Mines Report  

Broader source: Energy.gov (indexed) [DOE]

Legacy Management Work Progresses on Defense-Related Uranium Mines Legacy Management Work Progresses on Defense-Related Uranium Mines Report to Congress Legacy Management Work Progresses on Defense-Related Uranium Mines Report to Congress October 23, 2013 - 1:35pm Addthis What does this project do? Goal 4. Optimize the use of land and assets The U.S. Department of Energy Office of Legacy Management (LM) continues to work on a report to Congress regarding defense-related legacy uranium mines. LM was directed by the U.S. Congress in the National Defense Authorization Act for Fiscal Year 2013 to undertake a review of, and prepare a report on, abandoned uranium mines in the United States that provided uranium ore for atomic energy defense activities. The report is due to Congress by July 2014. LM is compiling uranium mine data from federal, state, and tribal agencies

231

Doctoral Defense "Sustainable Wastewater Management  

E-Print Network [OSTI]

Doctoral Defense "Sustainable Wastewater Management: Modeling and Decision Strategies for Unused Medications and Wastewater Solids" Sherri Cook Date: May 22, 2014 Time: 11:00 AM Location: 2355 GGB Chair to help decision-makers evaluate new practices for sustainable wastewater management. To this end

Kamat, Vineet R.

232

Anne Harrington | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Anne Harrington | National Nuclear Security Administration Anne Harrington | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Leadership > Anne Harrington Anne Harrington Deputy Administrator for Defense Nuclear Nonproliferation Anne Harrington Anne Harrington was sworn in as Deputy Administrator for Defense Nuclear Nonproliferation for the National Nuclear Security Administration in

233

TEC Working Group Topic Groups Security | Department of Energy  

Office of Environmental Management (EM)

concerned with secure transport of spent nuclear fuel (SNF) and high level waste (HLW) to Yucca Mountain. Current activities include updating the security portion of DOE's...

234

Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan - Kingston Container Terminal, Port of Kingston, Jamaica  

SciTech Connect (OSTI)

Operational Testing and Evaluation Plan - Kingston Container Terminal, Port of Kingston, Jamaica was written for the Second Line of Defense Megaports Initiative. The purpose of the Operational Testing and Evaluation (OT&E) phase of the project is to prepare for turnover of the Megaports system supplied by U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA) located at the Kingston Container Terminal (KCT) of the Port of Kingston, Jamaica to the Government of Jamaica (GOJ). Activities conducted during the OT&E phase must demonstrate that the Megaports system can be operated effectively in real time by Jamaica Customs and KCT personnel to the satisfaction of the DOE/NNSA. These activities will also determine if the Megaports system, as installed and accepted, is performing according to the Megaports Program objectives such that the system is capable of executing the mission of the Second Line of Defense Megaports Initiative. The OT&E phase of the project also provides an opportunity to consider potential improvements to the system and to take remedial action if performance deficiencies are identified during the course of evaluation. Changes to the system should be considered under an appropriate change-control process. DOE/NNSA will determine that OT&E is complete by examining whether the Megaports system is performing as intended and that the GOJ is fully capable of operating the system independently without continued onsite support from the U.S. team.

Deforest, Thomas J.; VanDyke, Damon S.

2012-03-01T23:59:59.000Z

235

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

236

Inducible Defense against Pathogens and Parasites: Optimal Choice among Multiple Options  

Science Journals Connector (OSTI)

Defense against pathogen, parasites and herbivores is often enhanced after their invasion into the host's body. Sometimes different options are adopted depending on the identity and the quantity of the pathogen, exemplified by the switch between Th1 and Th2 systems in mammalian immunity. In this paper, we study the optimal defense of the host when two alternative responses are available, which differ in the effectiveness of suppressing the growth of pathogen (parasite, or herbivore), the damage to the host caused by the defense response, and the magnitude of time delay before the defense response becomes fully effective. The optimal defense is the one that minimizes the sum of the damages caused by the pathogen and the cost due to defense activities. The damage by pathogens increases in proportion to the time integral of the pathogen abundance, and the cost is proportional to the defense activity. We can prove that a single globally optimal combination of defense options always exists and there is no other local optimum. Depending on the parameters, the optimal is to adopt only the early response, only the late response, or both responses. The defense response with a shorter time delay is more heavily used when the pathogen grows fast, the initial pathogen abundance is large, and the difference in time delay is long. We also study the host's optimal choice between constitutive and inducible defenses. In the constitutive defense, the response to pathogen attack works without delay, but it causes the cost even when the pathogen attack does not occur. We discuss mammalian immunity and the plant chemical defense from the model's viewpoint.

EMI SHUDO; YOH IWASA

2001-01-01T23:59:59.000Z

237

5th Defense Renewable Energy Summit  

Office of Energy Efficiency and Renewable Energy (EERE)

The 5th Defense Renewable Energy Summit brings together U.S. Department of Defense (DOD) and military decision-makers with renewable energy developers, utilities, and leading financiers to...

238

A Dynamic Defense Force for Japan  

E-Print Network [OSTI]

A Dynamic Defense Force for Japan Sugio TAKAHASHI SUMMARY AGuidelines released by Japan in 2010, the most important isconcept, which will enable the Japan Self-Defense Forces to

TAKAHASHI, Sugio

2012-01-01T23:59:59.000Z

239

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

240

Abstract--Security in physical environments has become increasingly important in the wake of terror and criminal activity,  

E-Print Network [OSTI]

environment, the actions of that person within that environment are usually not further monitored other than from a valid RFID tag is surreptitiously obtained (RFID sniffing) and used to create a clone],[3]. If such suspicious behaviour could be detected, security personnel could be alerted to monitor the suspicious person

Biuk-Aghai, Robert P.

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingdiscusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

242

Headquarters Security Operations | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Headquarters Security Operations Headquarters Security Operations Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process.

243

Safety, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

244

Nevada National Security Site Radiological Control Manual  

SciTech Connect (OSTI)

This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of low-level radioactive waste and the handling of radioactive sources. Remediation of contaminated land areas may also result in radiological exposures.

Radiological Control Managers Council

2012-03-26T23:59:59.000Z

245

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

246

Lab announces security changes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

247

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

248

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

249

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

250

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

251

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

252

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

253

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

254

Ant-Based Cyber Security  

SciTech Connect (OSTI)

We describe a swarming-agent-based, mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutions without violating proprietary boundaries. The system places human administrators at the appropriate level where they provide system guidance while lower-level agents carry out tasks humans are unable to perform quickly enough to mitigate todays security threats. Cooperative Infrastructure Defense (CID) uses our ant-based approach to enable dialogue between humans and agents to foster a collaborative problem-solving environment, increase human situational awareness and influence using visualization and shared control. We discuss theoretical implementation characteristics along with results from recent proof-of-concept implementations.

Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Templeton, Steven J.; Fulp, Errin W.

2011-07-12T23:59:59.000Z

255

Chapter_11_Incidents_of_Security_Concern  

Broader source: Energy.gov (indexed) [DOE]

1 1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. HS-91 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect the safeguards and security program's capability to protect DOE safeguards and security interests * Indicate failure to adhere to security procedures * Reveal that the system is not functioning properly, by identifying and/or mitigating potential threats (e.g., detecting suspicious activity, hostile acts, etc.).

256

The climate change and energy security nexus  

SciTech Connect (OSTI)

The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

King, Marcus Dubois [George Washington University; Gulledge, Jay [ORNL

2013-01-01T23:59:59.000Z

257

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

258

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

259

Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

260

The Y-12 Times 70th Anniversary, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

After meeting or exceeding several of its fiscal After meeting or exceeding several of its fiscal 2012 Defense Program goals, Y-12 is now engaged in activities to meet this year's life extension, surveillance and dismantle- ment goals. For fiscal 2013, the W78/88-1 Life Extension Program is funded at Y-12 for the first time. "The W78/88 1 LEP will secure work for the 2020s, so Y-12 can continue its major mission work after completion of the W76-1 and B61-12," said Tom Thrasher, program manager. Y-12 has begun working with Lawrence Livermore and Los Alamos national laboratories on the manufacturability of the units. The conceptual designs include reuse technologies geared toward reducing the cost of LEPs. Defense Program funding this year also supports a major phase in the B61-12 LEP. This phase involves establishing manufacturing processes for the evaluation hardware

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Independent Activity Report, Sandia National Laboratories - September 2012  

Broader source: Energy.gov (indexed) [DOE]

September 2012 Independent Activity Report, Sandia National Laboratories - September 2012 September 2012 Operational Awareness Oversight of Sandia National Laboratories [HIAR SNL-2012-09-13] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit to the Sandia Site Office (SSO) and Sandia National Laboratories (SNL) operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, primarily to discuss the Annular Core Research Reactor Facility (ACRRF) improvement plan developed by SNL in response to recent safety basis and software quality assurance concerns raised by the Defense Nuclear Facilities Safety Board (DNFSB). Independent Activity Report, Sandia National Laboratories - September 2012

262

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

263

Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies  

SciTech Connect (OSTI)

This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agencys R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our clients efforts in system behavior modeling and cyber security to the overall benefit of the nation.

Fink, Glenn A.; Oehmen, Christopher S.

2012-09-01T23:59:59.000Z

264

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

265

Cyber Security Incidents, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

266

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

267

Security Clearances; Limitations  

Broader source: Energy.gov (indexed) [DOE]

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

268

The Insanity of the Mens Rea Model: Due Process and the Abolition of the Insanity Defense  

E-Print Network [OSTI]

In the last 15 years a flurry of legislative activity has taken place as states have attempted to redefine the insanity defense. This article focuses on those states who chose not just to refine the definition of insanity, ...

Gilles Phillips, Jean K.; Woodman, Rebecca E.

2007-01-01T23:59:59.000Z

269

Defense: McNamara's Comptroller, Charles J. Hitch, Leaves after Four Pioneering Years at DOD  

Science Journals Connector (OSTI)

...environmental opportunity. 4. N. C. Crawford, J. Assoc. Coll. Admissions Counselors...its ceiling among its own functions, units and activities. The De-fense Secretaries...development; (vii) general support; (viii) retired pay; (ix) military assistance. The...

John Walsh

1965-09-03T23:59:59.000Z

270

Newsletters | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

271

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

272

ENERGY SECURITY  

Broader source: Energy.gov (indexed) [DOE]

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

273

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

274

National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) |  

Broader source: Energy.gov (indexed) [DOE]

National Defense Authorization Act for Fiscal Year 1993 (PL National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) Section 3162 of the National Defense Authorization Act for Fiscal Year 1993 (Public Law 102-484) called for the Secretary to establish and carry out a program for the identification and on-going medical evaluation of its former employees who are subject to significant health risks as a result of the exposure of such employees to hazardous or radioactie substances during such employment. National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities ATTACHMENTfLASH2011-6(2)-OPAM Searchable Electronic Department of Energy Acquisition Regulation

275

National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) |  

Broader source: Energy.gov (indexed) [DOE]

National Defense Authorization Act for Fiscal Year 1993 (PL National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) Section 3162 of the National Defense Authorization Act for Fiscal Year 1993 (Public Law 102-484) called for the Secretary to establish and carry out a program for the identification and on-going medical evaluation of its former employees who are subject to significant health risks as a result of the exposure of such employees to hazardous or radioactie substances during such employment. National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities Full Text of Amended National Energy Conservation Policy Act (NECPA)

276

Defense Nuclear Facilities Safety Board's enabling legislation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ENABLING STATUTE OF THE ENABLING STATUTE OF THE DEFENSE NUCLEAR FACILITIES SAFETY BOARD 42 U.S.C. § 2286 et seq. NATIONAL DEFENSE AUTHORIZATION ACT, FISCAL YEAR 1989 (Pub. L. No. 100-456, September 29, 1988), AS AMENDED BY NATIONAL DEFENSE AUTHORIZATION ACT, FISCAL YEAR 1991 (Pub. L. No. 101-510, November 5, 1990), NATIONAL DEFENSE AUTHORIZATION ACT FISCAL YEARS 1992 AND 1993 (Pub. L. No. 102-190, December 5, 1991), ENERGY POLICY ACT OF 1992 (Pub. L. No. 102-486, October 24, 1992), NATIONAL DEFENSE AUTHORIZATION ACT FISCAL YEAR 1994 (Pub. L. No. 103-160, November 30, 1993), FEDERAL REPORTS ELIMINATION ACT OF 1998 (Pub. L. No. 105-362, November 10, 1998), NATIONAL DEFENSE AUTHORIZATION ACT FISCAL YEAR 2001 (Pub. L. No. 106-398, October 30, 2000), AND

277

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

278

Office of Headquarters Personnel Security Operations: Mission and Functions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Executive Protection Office of Executive Protection Home Sub Offices › HQ Security Officers (HSO) Program › Office of Security Operations › Office of Information Security › Office of Headquarters Personnel › Office of Physical Protection › Office of Security Operations Mission & Functions › Security Operations › HQ Security Operations › HQ Personnel Security Op. › Special Operations HSO Program - 2010 Spotlights - 2009 Spotlights - Spotlights Archives (2008-2007) HSO Contacts Contact Us Headquarters Facilities Master Security Plan Security Reference Book HSS Logo Office of Headquarters Personnel Security Operations Reports to the Office of Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems.

279

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FOREIGN OWNERSHIP, CONTROL OR INFLUENCE (FOCI) PROGRAM FOREIGN OWNERSHIP, CONTROL OR INFLUENCE (FOCI) PROGRAM It is DOE policy to obtain information that indicates whether a company that SNL will enter into a contract with is Owned, Controlled, or Influenced by a foreign person or entity and whether as a result, the potential for an undue risk to the common defense and national security may exist. Reference: Department of Energy Order (DOE O) 470.1, Safeguards and Security Program, Change 1, Chapter VI, Section 1 The DOE conducts a background check to determine FOCI, based on the information the company provides through the e-FOCI website: https://foci.td.anl.gov. Upon favorable FOCI certification by DOE, a facility clearance is granted. Facility cleareance is required in order to support personnel clearances needed to perform the work under contractual agreement with Sandia.

280

Quadrennial Defense Review February 2010  

E-Print Network [OSTI]

Strengthening Interagency Partnerships 69 #12;REFORMING HOW WE DO BUSINESS 73 Reforming Security Assistance 73 Reforming How We Buy 75 Institutionalizing Rapid Acquisition Capability 80 Strengthening the Industrial Base 81 Reforming the U.S. Export Control System 83 Crafting a Strategic Approach to Climate

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Defense Experimentation and Stockpile Stewardship  

ScienceCinema (OSTI)

A primary mission of the site is to help ensure that the nation's nuclear weapon stockpile remains safe, secure and reliable. The stockpile stewardship program, working with the national weapons laboratories conducts a wide range of experiments using advanced diagnostic technologies, many of which were developed right here at the NNSS.

None

2015-01-07T23:59:59.000Z

282

Defense Experimentation and Stockpile Stewardship  

SciTech Connect (OSTI)

A primary mission of the site is to help ensure that the nation's nuclear weapon stockpile remains safe, secure and reliable. The stockpile stewardship program, working with the national weapons laboratories conducts a wide range of experiments using advanced diagnostic technologies, many of which were developed right here at the NNSS.

None

2014-10-28T23:59:59.000Z

283

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

284

Transmission Line Security Monitor  

SciTech Connect (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

285

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

286

Independent Oversight Evaluation, Office of Secure Transportation -  

Broader source: Energy.gov (indexed) [DOE]

Evaluation, Office of Secure Transportation - Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office of Secure Transportation Emergency Management Program The Secretary of Energy's Office of Independent Oversight and Performance Assurance (OA) conducted an inspection of emergency management programs at the National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) in October 2003. Inspection activities included the observation of the OST annual emergency exercise and reviews of selected emergency management program elements. The exercise demonstrated that the OST emergency response organization could effectively provide for prompt event categorization, DOE and NNSA

287

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

288

Energy security: Definitions, dimensions and indexes  

Science Journals Connector (OSTI)

Abstract Energy security has been an actively studied area in recent years. Various facets have been covered in the literature. Based on a survey of 104 studies from 2001 to June 2014, this paper reports the findings on the following: energy security definitions, changes in the themes of these definitions, energy security indexes, specific focused areas and methodological issues in the construction of these indexes, and energy security in the wider context of national energy policy. It is found that the definition of energy security is contextual and dynamic in nature. The scope of energy security has also expanded, with a growing emphasis on dimensions such as environmental sustainability and energy efficiency. Significant differences among studies are observed in the way in which energy security indexes are framed and constructed. These variations introduce challenges in comparing the findings among studies. Based on these findings, recommendations on studying energy security and the construction of energy security indexes are presented.

B.W. Ang; W.L. Choong; T.S. Ng

2015-01-01T23:59:59.000Z

289

Natural Resources Defense Council Ex Parte Communication  

Broader source: Energy.gov [DOE]

On Tuesday, November 18, 2014, a representative of the Natural Resources Defense Council held a conference call with representatives of the Department of Energy, the Environmental Protection Agency...

290

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Office of Defense Science Office of Defense Science Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Research and Development > Facilities Facilities Office of Research and Development, Facilities The Office of Research and Development manages and oversees the operation of an exceptional suite of science, technology, and engineering facilities that support and further the national stockpile stewardship agenda. Of varying size, scope and capabilities, the facilities work in a concert to accomplish the following activities: Annual assessment of the stockpile in the face of increasing challenges due to aging or remanufacture, Reduced response times for resolving stockpile issues, Timely and certifiable completion of Life Extension Programs,

291

Foundations of a defense digital platform : business systems governance in the Department of Defense  

E-Print Network [OSTI]

In 2010, the United States Department of Defense (DoD) spent more than $35 billion on information systems development and sustainment, with nearly $7 billion to defense business systems investments alone. It is not surprising ...

Ziegler, Dustin P

2012-01-01T23:59:59.000Z

292

Russian Culture | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Culture | National Nuclear Security Administration Culture | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Russian Culture Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Russia Tri-Lab S&T Collaborations > Russian

293

Stewardship Science Academic Alliances | National Nuclear Security  

National Nuclear Security Administration (NNSA)

| National Nuclear Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Stewardship Science Academic Alliances Stewardship Science Academic Alliances Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > University Partnerships / Academic Alliances > Stewardship Science Academic Alliances

294

ASC Newsletter Subscription | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Newsletter Subscription | National Nuclear Security Administration Newsletter Subscription | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > ASC Newsletters > ASC Newsletter Subscription

295

ASC Publications | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Publications | National Nuclear Security Administration Publications | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog ASC Publications ASC Publications Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > ASC Publications

296

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contact Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Contact Information Contact Information At each of NNSA's eight sites, leading-edge research and development is

297

Contained Firing Facility | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Contained Firing Facility | National Nuclear Security Administration Contained Firing Facility | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contained Firing Facility Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Research and Development > Facilities > Contained Firing Facility

298

ASC Newsletters | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog ASC Newsletters Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > ASC Newsletters ASC Newsletters

299

Current Events | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Events | National Nuclear Security Administration Events | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Current Events Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Current Events Current Events

300

Integrated Codes | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Integrated Codes | National Nuclear Security Administration Integrated Codes | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog IC Integrated Codes Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > ASC Program Elements > Integrated Codes

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Security Assessment Simulation Toolkit (SAST) Final Report  

SciTech Connect (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

302

Secretary Chu Visits Russian Seaport, Checks Out Second Line of Defense  

Broader source: Energy.gov (indexed) [DOE]

Russian Seaport, Checks Out Second Line of Russian Seaport, Checks Out Second Line of Defense Nuclear Detection System Secretary Chu Visits Russian Seaport, Checks Out Second Line of Defense Nuclear Detection System June 7, 2011 - 8:59am Addthis John Gerrard What does this mean for me? The Second Line of Defense program cracks down on nuclear smuggling by installing radiation detection equipment at ports, border crossings and airports around the world. We've all seen the movies where errant nuclear material makes its way into the hands of terrorists, who then plan an attack on U.S. soil. It's pretty safe to say that this is a scenario no one wants to see play out in real life. In fact, in his first foreign policy speech, President Obama called it the "most immediate and extreme threat to global security."

303

The international security yearbook 1983-1984  

SciTech Connect (OSTI)

A bipartisan study by eight former high-ranking officials including James R. Schlesinger, Edmund Muskie, Maxwell Taylor, and R. James Woolsey, providing an assessment of how global events have affected US defense and foreign policy interests. Topics addressed include the US-Soviet strategic and conventional weapons balance; regional threats to Western security in Latin America, the Persian Gulf, Southern Africa, and the Middle East; and significant scientific developments affecting nuclear proliferation and conventional armaments.

Blechman, B.M.; Luttwak, E.N.

1984-01-01T23:59:59.000Z

304

Independent Activity Report, Pantex Plant - July 2012 | Department of  

Broader source: Energy.gov (indexed) [DOE]

July 2012 July 2012 Independent Activity Report, Pantex Plant - July 2012 July 2012 Operational Awareness Oversight of the Pantex Plant [HIAR PTX-2012-07-19] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit primarily to review the status of the Babcock & Wilcox Technical Services Pantex, LLC (B&W Pantex) Documented Safety Analysis Upgrade Initiative (DSAUGI) project and the National Nuclear Security Administration (NNSA) response to recent Defense Nuclear Facilities Safety Board (DNFSB) concerns regarding nuclear explosive safety (NES) issues at the Pantex Plant, but also to monitor other ongoing site activities. Independent Activity Report, Pantex Plant - July 2012 More Documents & Publications

305

Independent Activity Report, Livermore Site Office - January 2011 |  

Broader source: Energy.gov (indexed) [DOE]

Independent Activity Report, Livermore Site Office - January 2011 Independent Activity Report, Livermore Site Office - January 2011 Independent Activity Report, Livermore Site Office - January 2011 January 2011 Livermore Site Office Facility Representative Program Assessment [ARPT-LSO-2011-001] This activity report documents the results of the Office of Health, Safety and Security's (HSS) review of and participation in the Livermore Site Office Self-Assessment of the Facility Representative (FR) Program. This self-assessment was led by the U.S. Department of Energy (DOE) Livermore Site Office (LSO) and conducted by LSO staff, HSS staff, National Nuclear Security Administration (NNSA) Office of the Chief of Defense Nuclear Safety (CDNS) staff, a peer from Los Alamos Site Office, and a FR subject matter expert from NNSA.

306

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

307

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

308

Strategic defense initiatives at Los Alamos National Laboratory  

SciTech Connect (OSTI)

This presentation reviews the Strategic Defense Initiative (SDI) programs at Los Alamos National Laboratory, noting especially the needs for and applications of optics and optical technologies. Table I lists the various activities at Los Alamos contributing to SDI programs. The principal, nonnuclear SDI programs are: (1) the free-electron laser, and (2) neutral particle beams. Both should be considered as potential long-range-kill systems, but still in the futuristic category.

Rockwood, S.D.

1985-01-01T23:59:59.000Z

309

Energy Security Council  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

310

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

311

Message Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

312

OFFICE OF THE UNDER SECRETARY OF DEFENSE  

Broader source: Energy.gov (indexed) [DOE]

UNDER SECRETARY OF DEFENSE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301 -3000 ACQUISITION TECHNOLOGY AND LOGISTICS MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND TECHNOLOGY) ASSISTANT SECRETARY OF THE NAVY (RESEARCH, DEVELOPMENT AND ACQUISITION) ASSISTANT SECRETARY OF THE AIR FORCE (ACQUISITION) DIRECTORS OF DEFENSE AGENCIES SUBJECT: Use of Federal Supply Schedules and Market Research The Department of Defense utilizes the Federal Supply Schedules of the General Services Administration to meet a significant number of our requirements. The "Use of Federal Supply Schedules" is governed by the requirements in FAR 8.404. FAR 8.404 says in part, "by placing an order against a schedule contract using the procedures in FAR

313

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect (OSTI)

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

314

List of Major Information Systems,National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

315

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

316

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

317

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

318

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

319

U.S. And Russia Complete Nuclear Security Upgrades Under Bratislava  

Broader source: Energy.gov (indexed) [DOE]

And Russia Complete Nuclear Security Upgrades Under Bratislava And Russia Complete Nuclear Security Upgrades Under Bratislava Initiative U.S. And Russia Complete Nuclear Security Upgrades Under Bratislava Initiative December 23, 2008 - 9:18am Addthis WASHINGTON, DC -The U.S. Department of Energy today delivered the Bratislava Nuclear Security report to the White House, which detailed the status of work agreed to by Presidents Bush and Putin in Bratislava in 2005. U.S. and Russian officials from the U.S. Department of Energy's National Nuclear Security Administration (NNSA), the U.S. Department of Defense, the Russian Ministry of Defense and State Atomic Energy Corporation "Rosatom" reviewed work to complete nuclear security upgrades in Russia at meetings in Moscow last week. Building on this success, both

320

Innovations for a secure nation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Innovations for a Secure Nation Innovations for a Secure Nation /about/_assets/images/icon-70th.jpg Innovations for a Secure Nation LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. image description Plasma technology for textile finishing applications gets a boost from LANL APJeT received a $100,000 Venture Acceleration Fund award from LANS helping to complete design and engineering of a commercial-scale production unit. - 4/3/12 One of several active projects, LANL and Chevron co-developed INFICOMM(tm), a wireless technology used to collect real-time temperature and pressure information from sensors in oil and gas wells, including very deep wells already producing oil and gas and drilling operations for new wells.

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Safety and Security Directives Reform  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reforming a "Mountain" of Policy Reforming a "Mountain" of Policy Beginning with his confirmation hearings in January 2009, Energy Secretary Steven Chu challenged the Department of Energy to take a fresh look at how we conduct business. This challenge provided the opportunity for DOE to put in place the most effective and efficient strategies to accomplish the Department's missions safely and securely. In response to the Secretary's challenge and building on the results of Deputy Secretary Poneman's Safety and Security Reform studies, the Office of Health, Safety and Security (HSS) broadened its directives review activities during 2009. By November 2009 HSS had initiated a disciplined review of all health, safety, and security directives, which included a systematic review of the Department's safety and security regulatory model.

322

Best Practices for the Security of Radioactive Materials  

SciTech Connect (OSTI)

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

323

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

324

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

325

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

326

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

327

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

328

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

329

Y-12 Successfully Meets and Exceeds Defense Programs Goals During...  

National Nuclear Security Administration (NNSA)

News Releases Y-12 Successfully Meets and Exceeds Defense Programs ... Y-12 Successfully Meets and Exceeds Defense Programs Goals During FY 2010 applicationmsword icon NR-11-10...

330

NNSA Defense Programs Announces Quarterly Awards | National Nuclear...  

National Nuclear Security Administration (NNSA)

NNSA Production Office NPO News Releases NNSA Defense Programs Announces Quarterly Awards NNSA Defense Programs Announces Quarterly Awards applicationmsword icon NR-02-16.doc...

331

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

Office of Scientific and Technical Information (OSTI)

Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

332

Natural Resources Defense Council NRDC | Open Energy Information  

Open Energy Info (EERE)

Resources Defense Council (NRDC) Place: New York, New York Zip: 10011 Product: Alliance for environmental protection. References: Natural Resources Defense Council (NRDC)1...

333

Materials evaluation programs at the Defense Waste Processing Facility  

SciTech Connect (OSTI)

The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided.

Gee, J.T.; Iverson, D.C.; Bickford, D.F.

1992-01-01T23:59:59.000Z

334

Materials evaluation programs at the Defense Waste Processing Facility  

SciTech Connect (OSTI)

The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided.

Gee, J.T.; Iverson, D.C.; Bickford, D.F.

1992-12-31T23:59:59.000Z

335

Laboratory Directed Research & Development | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Laboratory Directed Research & Development | National Nuclear Security Laboratory Directed Research & Development | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Laboratory Directed Research & Development Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

336

Institutional Research & Development Reports | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Reports | National Nuclear Security Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Institutional Research & Development Reports Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

337

US/Russian Collaborations | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

US/Russian Collaborations | National Nuclear Security Administration US/Russian Collaborations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration US/Russian Collaborations Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

338

US/Russian Collaborations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

US/Russian Collaborations | National Nuclear Security Administration US/Russian Collaborations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration US/Russian Collaborations Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

339

Travel Resources | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Travel Resources | National Nuclear Security Administration Travel Resources | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Travel Resources Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Russia Tri-Lab S&T Collaborations > Travel

340

Site Information | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Site Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

342

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

343

Los Alamos National Lab: National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Content stc logo Content stc logo Best of Show Winner of STC's International Summit Awards Competition, 2013 Top Innovations of the Year Science and technology for a safe, secure nation Impenetrable encryption defends data from cyberterrorism keyboard with atrack button A hacker could crack a code, steal private information or shut down systems we rely on daily. Small enough to fit in a smart phone, our QkarD technology ("kee-u-kard") provides virtually impenetrable defense, using quantum cryptography to secure computers. This novel encryption generates security at the subatomic particle level. If someone tries to hack in, that particle is altered, and the owner quietly alerted. And it works-even against super-powerful quantum computers. Multipronged HIV vaccine shows promise in monkeys

344

Russian Locations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Locations | National Nuclear Security Administration Locations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Russian Locations Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Russia Tri-Lab S&T Collaborations > Travel

345

An approach to determine a defensible spent fuel ratio.  

SciTech Connect (OSTI)

Sabotage of spent nuclear fuel casks remains a concern nearly forty years after attacks against shipment casks were first analyzed and has a renewed relevance in the post-9/11 environment. A limited number of full-scale tests and supporting efforts using surrogate materials, typically depleted uranium dioxide (DUO2), have been conducted in the interim to more definitively determine the source term from these postulated events. In all the previous studies, the postulated attack of greatest interest was by a conical shape charge (CSC) that focuses the explosive energy much more efficiently than bulk explosives. However, the validity of these large-scale results remain in question due to the lack of a defensible Spent Fuel Ratio (SFR), defined as the amount of respirable aerosol generated by an attack on a mass of spent fuel compared to that of an otherwise identical DUO2 surrogate. Previous attempts to define the SFR have resulted in estimates ranging from 0.42 to 12 and include suboptimal experimental techniques and data comparisons. Different researchers have suggested using SFR values of 3 to 5.6. Sound technical arguments exist that the SFR does not exceed a value of unity. A defensible determination of the SFR in this lower range would greatly reduce the calculated risk associated with the transport and dry storage of spent nuclear fuel. Currently, Oak Ridge National Laboratory (ORNL) is in possession of several samples of spent nuclear fuel (SNF) that were used in the original SFR studies in the 1980's and were intended for use in a modern effort at Sandia National Laboratories (SNL) in the 2000's. A portion of these samples are being used for a variety of research efforts. However, the entirety of SNF samples at ORNL is scheduled for disposition at the Waste Isolation Pilot Plant (WIPP) by approximately the end of 2015. If a defensible SFR is to be determined for use in storage and transportation security analyses, the need to begin this effort is urgent in order to secure the only known available SNF samples with a clearly defined path to disposal.

Durbin, Samuel G.; Lindgren, Eric Richard

2014-03-01T23:59:59.000Z

346

Dr. Donald L. Cook | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Donald L. Cook | National Nuclear Security Administration Donald L. Cook | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Leadership > Dr. Donald L. Cook Dr. Donald L. Cook Deputy Administrator for Defense Programs Dr. Donald L. Cook Dr. Donald L. Cook serves as the Deputy Administrator for Defense Programs at the National Nuclear Security Administration. Appointed to the position

347

Partnering with Utilities for Energy Efficiency & Security  

Broader source: Energy.gov (indexed) [DOE]

SPIDERS SPIDERS Energy Security JCTD Proposal Dr. George Ka'iliwai Mr. Wade Jost USPACOM J8, Director of OSD Power Surety y Task Force Resources and Assessment The RedGate Group This brief is: This brief is: UNCLASSIFIED 1 UNCLASS As of Nov 09 The Situation * "Critical national security y and homeland defense missions are at an unacceptably high risk of extended outage from failure of the electric grid." The Defense Science Board Task Force on DoD Energy Security, July 2008 UNCLASS 2 UNCLASS As of Nov 09 The Situation * "There have been numerous attacks on the operating systems of major critical infrastructure facilities, including power grids, around the world in recent years: Chinese and Russian spies have "penetrated the U S penetrated the U.S.

348

Defense Program Equivalencies for Technical Qualification Standard  

Broader source: Energy.gov (indexed) [DOE]

Defense Program Equivalencies for Technical Qualification Standard Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995 Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995 Defense Programs has undertaken an effort to compare the competencies in the General Technical Base Qualification Standard and the Functional Area Qualification Standards with various positions in the Naval Nuclear Propulsion Program and the commercial nuclear industry. The purpose of this effort is to determine if equivalencies can be granted for competencies based on previous training and experience in these areas. The equivalency crosswalk was developed by subject matter experts who held positions in the Navy and/or the commercial nuclear power program. To date, equivalencies have been

349

SQL Injection Attacks and Defense, 2 edition  

Science Journals Connector (OSTI)

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." Richard ...

Justin Clarke; Kevvie Fowler; Erlend Oftedal; Rodrigo Marcos Alvarez; Dave Hartley; Alexander Kornbrust; Gary O'Leary-Steele; Alberto Revelli; Sumit Siddharth; Marco Slaviero

2009-06-01T23:59:59.000Z

350

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

351

Protection Programming Defensive Planning for Fixed Facilities  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE STD-1207-2012 December 2012 DOE STANDARD Protection Program Defensive Planning For Fixed Facilities U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE STD-1207-2012 This Page Intentionally Left Blank ii DOE STD-1207-2012 TABLE OF CONTENTS FOREWORD..................................................................................................................................v PROTECTION PROGRAM DEFENSIVE PLANNING ..........................................................1 1. SCOPE............................................................................................................................ 1 2. PURPOSE. ..................................................................................................................... 1

352

Nonproliferation & International Security | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

353

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

354

Transmission Line Security Monitor: Final Report  

SciTech Connect (OSTI)

The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

John Svoboda

2011-04-01T23:59:59.000Z

355

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

356

Update on uranium-molybdenum fuel foil fabrication development activities at the Y-12 National Security Complex in 2007  

SciTech Connect (OSTI)

In support of the RERTR Program, efforts are underway at Y-12 to develop and validate a production oriented, monolithic uranium molybdenum (U-Mo) foil fabrication process adaptable for potential implementation in a manufacturing environment. These efforts include providing full-scale prototype depleted and enriched U-Mo foils in support of fuel qualification testing. The work has three areas of focus; develop and demonstrate a feasible foil fabrication process utilizing depleted uranium-molybdenum (DU-Mo) source material, transition these production techniques to enriched uranium (EU-Mo) source material, and evaluate full-scale implementation of the developed production techniques. In 2006, Y-12 demonstrated successful fabrication of full-size DU-10Mo foils. In 2007, Y-12 activities were expanded to include continued DU-Mo foil fabrication with a focus on process refinement, source material impurity effects (specifically carbon), and the feasibility of physical vapor deposition (PVD) on DU-10Mo mini-foils. FY2007 activities also included a transition to EU-Mo and fabrication of full-size enriched foils. The purpose of this report is to update the RERTR audience on Y-12 efforts in 2007 that support the overall RERTR Program goals. (author)

DeMint, Amy; Gooch, Jack [Technology Development, Y-12 National Security Complex, Oak Ridge, TN 37830 (United States); Dunavant, Randy J.; Andes, Trent C. [National Security Programs, Y-12 National Security Complex, Oak Ridge, TN 37830 (United States)

2008-07-15T23:59:59.000Z

357

Y-12 National Security Complex | Department of Energy  

Energy Savers [EERE]

weapons components, secure storage of special nuclear material (SNM), and various other nuclear weapons-related activities. Other activities include various aspects of testing...

358

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

359

Telescoping MATLAB for DSP Applications PhD Thesis Defense  

E-Print Network [OSTI]

Telescoping MATLAB for DSP Applications PhD Thesis Defense Arun Chauhan Computer Science, Rice University PhD Thesis Defense July 10, 2003 #12;Two True Stories PhD Thesis Defense: Telescoping MATLABD Thesis Defense: Telescoping MATLAB for DSP Applications July 10, 2003 #12;Two True Stories · the world

Chauhan, Arun

360

Enforcement Documents - Nevada National Security Site | Department of  

Broader source: Energy.gov (indexed) [DOE]

Nevada National Security Site Nevada National Security Site Enforcement Documents - Nevada National Security Site November 13, 2007 Enforcement Letter, National Security Technologies LLC,- November 13, 2007 Enforcement Letter issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site May 21, 2007 Enforcement Letter, National Security Technologies, LLC - May 21, 2007 Enforcement Letter issued to National Security Technologies, LLC related to Nuclear Safety Quality Assurance Requirements Deficiencies at the Nevada Test Site April 1, 2004 Enforcement Letter, Bechtel Nevada - April 1, 2002 Enforcement Letter issued to Bechtel Nevada related to Noncompliances with Occupational Radiation Protection and Quality Assurance Requirements at the

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Office of Headquarters Security Operations | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Headquarters Security Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process.

362

Transportation Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

363

Control Systems Security Standards: Accomplishments And Impacts |  

Broader source: Energy.gov (indexed) [DOE]

Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments & Impacts More Documents & Publications A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

364

Our Solution Securing Grid Data Transfer Services with  

E-Print Network [OSTI]

Motivation Our Solution Summary Securing Grid Data Transfer Services with Active Network Portals by in part by the NSF under award numbers EIA 9911099 and CNS 0454298 Michael R. Head Securing Grid Data/Implementation Experiments Results Michael R. Head Securing Grid Data Transfer Services with Active Network Portals #12

365

Operational Awareness Records and Activity Reports | Department...  

Office of Environmental Management (EM)

Oversight Activity Report, National Nuclear Security Administration Production Office - March 10-14, 2014 Contractor Transition Activities for the National Nuclear Security...

366

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

367

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

368

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Links Home > Field Offices > Welcome to the NNSA Production Office > Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge Site Specific Advisory Board American Museum of Science and Energy City of Oak Ridge Plants Laboratories Bechtel Nevada Bettis Laboratory Kansas City Plant Knolls Atomic Power Laboratory Lawrence Livermore National Laboratory

369

Independent Oversight Activity Report, Idaho Cleanup Project - November  

Broader source: Energy.gov (indexed) [DOE]

Independent Oversight Activity Report, Idaho Cleanup Project - Independent Oversight Activity Report, Idaho Cleanup Project - November 2013 Independent Oversight Activity Report, Idaho Cleanup Project - November 2013 November 2013 Pre-restart Visit to the Integrated Waste Treatment Unit by the Defense Nuclear Facilities Safety Board [HIAR-ICP-2013-11-19] This Independent Activity Report documents an oversight activity conducted by the Office of Health, Safety and Security's (HSS) Office of Safety and Emergency Management Evaluations from November 19-22, 2013, at the Integrated Waste Treatment Unit facility of the Idaho Cleanup Project. The activity consisted of the HSS Site Lead touring the newly modified IWTU facility to observe the many process and equipment modifications that have been made since the facility was shut down. In addition, the Site Lead

370

Independent Oversight Activity Report, Idaho Cleanup Project - November  

Broader source: Energy.gov (indexed) [DOE]

Activity Report, Idaho Cleanup Project - Activity Report, Idaho Cleanup Project - November 2013 Independent Oversight Activity Report, Idaho Cleanup Project - November 2013 November 2013 Pre-restart Visit to the Integrated Waste Treatment Unit by the Defense Nuclear Facilities Safety Board [HIAR-ICP-2013-11-19] This Independent Activity Report documents an oversight activity conducted by the Office of Health, Safety and Security's (HSS) Office of Safety and Emergency Management Evaluations from November 19-22, 2013, at the Integrated Waste Treatment Unit facility of the Idaho Cleanup Project. The activity consisted of the HSS Site Lead touring the newly modified IWTU facility to observe the many process and equipment modifications that have been made since the facility was shut down. In addition, the Site Lead

371

Successful Characterization Strategies for the Active High Risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164  

SciTech Connect (OSTI)

Building 9201-5 (Alpha 5) was completed in May 1944 and served as a production facility for National Nuclear Security Administration (NNSA) Y-12 Weapons Plant. During the Manhattan Project, it functioned as a uranium enrichment facility. The facility was renovated and altered over the years, converting the calutrons to support other missions. Alpha 5 consists of 4 floors and a basement measuring approximately 600,000 square feet. The facility contains various pieces of equipment remaining from legacy operations. A significant amount (approximately 200,000 kgs) of mercury (Hg) has been spilled in the facility over the operational history of the building. To further complicate matters, beryllium (Be) contamination in 9201-5 is found throughout approximately sixty percent of the facility. Concentrations varying from very low (< 0.2 micrograms (?g)/100 cm{sup 2}) to areas where concentrations are relatively high, approximately 600 ?g/100 cm{sup 2}, in regulated beryllium areas. The primary site related contaminants (SRCs) for the waste in this facility are enriched uranium, depleted uranium, beryllium and mercury. This facility represents the highest environmental risk for DOE-ORO EM and NNSA at Y-12 and must be quickly addressed to minimize impacts to future Y-12 missions, as well as human health and the environment. As part of the American Recovery and Reinvestment Act (ARRA), approximately 700,000 cubic feet of legacy material was removed in 2010 and 2011. In addition, characterization of the 9201-5 facility was scheduled in the winter and spring of 2011. This activity was initiated in January 2011 and was completed in July 2011. Heavy schedule pressure was further complicated by the fact that this building has active utility, security and process systems. Given these complex variables, a unique, out of the box characterization strategy was forged in an effort to bound radiological and chemical contaminants, as well as providing the appropriate level of quality to ensure that this data could be used to develop waste profiles when deactivation, decontamination and demolition (D and D) activities are authorized at a future date. The characterization strategy involved a hybrid model of statistically-based and biased sampling events. To achieve the desired results, traditional intrusive sampling and laboratory analysis, as well as a number of field-based characterization methodologies (e.g., X-ray Fluorescence [XRF], Lumex and Non-Destructive Assay [NDA]) were utilized. Results were captured and synthesized into meaningful, usable conclusions in a facility characterization report that will more accurately aid D and D cost estimates for future remedial actions. This massive characterization campaign involved over 1,200 separate sample locations using 4 separate characterization methods and was successfully completed to meet a performance-based milestone within 8 months of initiation. (authors)

Birchfield, Joseph W. III [Link Technologies (United States); Albrecht, Linda [Alliant Corporation (United States)

2012-07-01T23:59:59.000Z

372

Secured and trusted three-tier grid architecture  

Science Journals Connector (OSTI)

Grid aims at utilising resources efficiently through coordinated resource sharing and problem solving in a virtual organisation spanning geographical boundaries. A three-tier grid architecture consisting of Service Providers or Resource Provider (SP/RP), brokers and Regional Resource Administrators (RRA), is secured using DDoS attack defense mechanism and spam filtering mechanisms that endeavour to optimise the resource utilisation. An overlay network of Anomaly Detection Agents (ADA) is set up at the RRA level which enables deployment of collaborative defense mechanisms. The presence of these mechanisms minimises the wastage of resources which can be put to effective use in grid applications.

P. Varalakshmi; S. ThamaraiSelvi

2010-01-01T23:59:59.000Z

373

The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01  

Broader source: Energy.gov (indexed) [DOE]

Audit and Inspections Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration" BACKGROUND The National Nuclear Security Administration's (NNSA) Office of Defense Nuclear Nonproliferation established the Global Threat Reduction Initiative (GTRI) in May 2004, as a vital part of the efforts to combat nuclear and radiological terrorism. GTRI's mission is to reduce

374

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

375

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

376

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

377

Departmental Representative to the Defense Nuclear Facilities...  

Energy Savers [EERE]

to ensure the health, safety, and security of the workers, public, and environment. This web site is an important means to efficiently manage, distribute, and archive information...

378

Natural Resources Defense Council | Open Energy Information  

Open Energy Info (EERE)

Natural Resources Defense Council Natural Resources Defense Council Jump to: navigation, search NRDC.gif NRDC is an environmental action organization headquartered in New York, New York, using law, science and the support of 1.3 million members and online activists to protect the planet's wildlife and wild places and to ensure a safe and healthy environment for all living things. NRDC was founded in 1970 by a group of law students and attorneys during the environmental movement. NRDC lawyers helped write some of America's environmental laws. Today, NRDC staff has more than 300 lawyers working out of offices in New York, Washington, D.C., Chicago, Illinois, Los Angeles, California, San Francisco, California and Beijing, China. Contact Natural Resources Defense Council 40 West 20th Street New York, NY 10011

379

NNSA Defense Programs collects nearly 20 large boxes of items for Toys for  

National Nuclear Security Administration (NNSA)

collects nearly 20 large boxes of items for Toys for collects nearly 20 large boxes of items for Toys for Tots | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA Defense Programs collects nearly 20 large ... NNSA Defense Programs collects nearly 20 large boxes of items for Toys for Tots Posted By Office of Public Affairs

380

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Security | Department of Energy  

Energy Savers [EERE]

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

382

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

383

Security services architecture for Secure Mobile Grid Systems  

Science Journals Connector (OSTI)

Mobile Grid, is a full inheritor of the Grid with the additional feature that it supports mobile users and resources. Security is an important aspect in Grid based systems, and it is more complex to ensure this in a mobile platform owing to the limitations of resources in these devices. A Grid infrastructure that supports the participation of mobile nodes and incorporates security aspects will thus play a significant role in the development of Grid computing. The idea of developing software through systematic development processes to improve software quality is not new. However, many information systems such as those of Grid Computing are still not developed through methodologies which have been adapted to their most differentiating features. The lack of adequate development methods for this kind of systems in which security is taken into account has encouraged us to build a methodology to develop them, offering a detailed guide for their analysis, design and implementation. It is important to use software V&V techniques, according to IEEE Std. 1012 for Software Verification and Validation, to ensure that a software system meets the operational needs of the user. This ensures that the requirements for the system are correct, complete, and consistent, and that the life-cycle products correctly design and implement system requirements. This paper shows part of a development process that we are elaborating for the construction of information systems based on Grid Computing, which are highly dependent on mobile devices in which security plays a highly important role. In the design activity of the process, we design a security architecture which serves as a reference for any mobile Grid application that we wish to build since this security architecture defines a complete set of security services which will be instantiated depending on the requirements and features found in previous activities of the process. A V&V task is also defined in the design activity to validate and verify both the architecture built and the traceability of the artifacts generated in this activity. In this paper, we will present the service-oriented security architecture for Mobile Grid Systems which considers all possible security services that may be required for any mobile Grid application.

David G. Rosado; Eduardo Fernndez-Medina; Javier Lpez

2011-01-01T23:59:59.000Z

384

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

385

National Defense University (NDU) Nomination Package Checklist  

Broader source: Energy.gov (indexed) [DOE]

- November 2012 - November 2012 National Defense University (NDU) Nomination Package Checklist SEND 2 COPIES OF THE NOMINATION PACKAGE TO THE NDU UNIVERSITY REGISTRAR'S OFFICE Each student nomination package must include the following items: NDU Student Nomination Form One official transcript (highest degree earned) One-page student biography or résumé (include education and career history) Two Letters of Recommendation World-Wide Travel Statement Statement of Purpose (No more than two pages) Signed National Defense University Privacy Act Statement Signed Education Release Form (if nominating agency requires copies of final student evaluation and/or transcript) SAC students must also include: Senior Acquisition Course Nomination Form

386

Cascade Control and Defense in Complex Networks  

Science Journals Connector (OSTI)

Complex networks with a heterogeneous distribution of loads may undergo a global cascade of overload failures when highly loaded nodes or edges are removed due to attacks or failures. Since a small attack or failure has the potential to trigger a global cascade, a fundamental question regards the possible strategies of defense to prevent the cascade from propagating through the entire network. Here we introduce and investigate a costless strategy of defense based on a selective further removal of nodes and edges, right after the initial attack or failure. This intentional removal of network elements is shown to drastically reduce the size of the cascade.

Adilson E. Motter

2004-08-26T23:59:59.000Z

387

U.S. Department of Energy Strategic Plan 13 In 2000, the National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

3 3 In 2000, the National Nuclear Security Administration (NNSA) was established as a new element within the Department in response to a Congressional mandate to reinvigorate the security posture throughout the nuclear weapons program and to reaffirm the Nation's commitment to maintaining the nuclear deterrence capabilities of the United States. NNSA was chartered to better focus management attention on enhanced security, proactive management practices, and mission focus within the Department's national defense and nonproliferation programs. The Department performs its national security mission involving nuclear weapons and nuclear materials and technology through the NNSA. Over the next six years, the Department will apply

388

Sandia National Laboratories: National Security Missions: International  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

WMD Counterterrorism & Response WMD Counterterrorism & Response Airworthiness Weapons of Mass Destruction (WMD) Counterterrorism & Response provides operational planning assistance and training to counter domestic and international nuclear and radiological terrorism, including: Specialized training for nuclear and explosive threats for warfighters and law enforcement Technologies for evaluating airframe integrity and other critical structural integrity Our partners include National Nuclear Security Administration (NNSA), Department of Defense (DoD), and Federal Aviation Administration (FAA). Program Areas include: Airworthiness and Infrastructure Assurance Nuclear Incident Response Nuclear Counterterrorism Chemical, Biological, Radiological, Nuclear and Explosives Technology Development

389

Adaptive Infrastructures Toward a Secure and  

E-Print Network [OSTI]

Economic load dispatch 10 seconds to 1 hour; ongoing Thermodynamic changes from boiler control action (slow network, secure communications and intelligent software agents; 3) active-control of high-voltage devices stability, reliability, robustness, security and efficiency in a competitive marketplace and carbon

Amin, S. Massoud

390

Office of Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

391

NUCLEAR ENERGY SECURITY FELLOWS  

Broader source: Energy.gov [DOE]

Overview: The NESFP is aligned with the already well-established Homeland Defense Fellowship (HDF) Program, which is comprised of international military officers and US interagency personnel. NESFP...

392

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > Field Offices > Welcome to the Sandia Field Office > Contact Us Contact Us If you have questions about activities at the Sandia Field Office, please contact the SFO Public Affairs Director at (505) 845-5264. Our mailing address is: U. S. Department of Energy, National Nuclear Security Administration, Sandia Field Office, P.O. Box 5400, Albuquerque, NM 87185. Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About SFO Contact Us Contract Administration & Business Management Emergency Information Facilities & Projects Nuclear Operations Environment, Safety & Health Public Affairs Safeguards & Security Performance and Quality Assurance

393

Office of Security Operations: Mission and Functions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mission and Functions Mission and Functions Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process. Functions

394

Independent Activity Report, Pantex Site - March 2011 | Department of  

Broader source: Energy.gov (indexed) [DOE]

March 2011 March 2011 Independent Activity Report, Pantex Site - March 2011 March 2011 CDNS Biennial Review of the Pantex Site [ARPT-PTX-2011-001] The U.S. Department of Energy (DOE) Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), visited the Department of Energy Pantex Site Office (PXSO) and the Pantex Plant in Amarillo, Texas, from February 28 - March 8, 2011. The purpose of the visit was to participate in the biennial review of PXSO by the Office of the Chief of Defense Nuclear Safety (CDNS). Independent Activity Report, Pantex Site - March 2011 More Documents & Publications Independent Activity Report, Pantex Site - January 2011 Independent Activity Report, Pantex Plant - October 2011 Independent Activity Report, Pantex - December

395

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

396

T-642: RSA SecurID update to Customers | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

397

Office of Security and Emergency Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security and Emergency Management Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our activities. We hope you will find it useful. Much of this page's contents are oriented to reindustrialization and other managers of new DOE projects and programs. Feel free to contact the designated key personnel for assistance. Access Authorization Branch Using established guidelines and the "whole person concept," we evaluate and adjudicate informaton about those who need clearances which is developed during background investigations. The objective is to render access determinations that are in the best interest of national security. We also provide security education and awareness information, personnel security program support, and visitor control and foreign travel support to the Oak Ridge Office, the Paducah-Portsmouth Project Office, and the Thomas Jefferson National Accerelator Facility.

398

Student Experiential Opportunities in National Security Careers  

SciTech Connect (OSTI)

This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

None

2007-12-31T23:59:59.000Z

399

Science and Technology Challenges for Homeland Security  

SciTech Connect (OSTI)

Preventing and protecting against catastrophic terrorism is a complex and dynamic challenge. Small groups or individuals can use advanced technology to cause massive destruction, and the rapid pace of technology and ease of information dissemination continually gives terrorists new tools. A 100% defense is not possible. It's a numbers problem--there are simply too many possible targets to protect and too many potential attack scenarios and adversaries to defend against. However, science and technology (S&T) is a powerful force multiplier for defense. We must use S&T to get ahead of the game by making terrorist attacks more difficult to execute, more likely to be interdicted, and less devastating in terms of casualties, economic damage, or lasting disruption. Several S&T areas have potential to significantly enhance homeland security efforts with regard to detecting radiation, pathogens, explosives, and chemical signatures of weapons activities. All of these areas require interdisciplinary research and development (R&D), and many critically depend on advances in materials science. For example, the science of nuclear signatures lies at the core of efforts to develop enhanced radiation detection and nuclear attribution capabilities. Current radiation detectors require cryogenic cooling and are too bulky and expensive. Novel signatures of nuclear decay, new detector materials that provide high resolution at ambient temperatures, and new imaging detectors are needed. Such technologies will improve our ability to detect and locate small, distant, or moving sources and to discriminate threat materials from legitimate sources. A more complete understanding of isotopic ratios via secondary ion mass spectrometry (SIMS), NanoSIMS, or yet-to-be-developed technologies is required to elucidate critical characteristics of nuclear materials (e.g., isotopics, age, reprocessing) in order to identify their source and route history. S&T challenges abound in the biodefense arena as well. Improved biodetectors are needed--autonomous instruments that continuously monitor the environment for threat pathogens, promptly alert authorities in the event of a positive detection, and have an extremely low false alarm rate. Because many threat pathogens are endemic to various regions of the world, the natural microbial environment must be characterized so that background detections can be distinguished from a deliberate release. In addition, most current detection approaches require an a priori knowledge of the pathogens of concern and thus won't work in the face of a new, naturally occurring disease, such as a mutated avian influenza that effects humans, or a deliberately manipulated organism. Thus, we must move from species-specific detection to function-based detection based on a fundamental understanding of the mechanisms and genetic markers of infectivity, pathogenicity, antibiotic resistance, and other traits that distinguish a harmful organism from an innocuous one. Last but not least, new vaccines and treatments are needed, which in turn require in-depth understanding of cellular surfaces, protein folding, and myriad nano-bio aspects of host-pathogen interactions. Much attention is being devoted to countering weapons-of-mass-destruction terrorism, since Al-Qaeda and other terrorist groups have repeatedly stated their intention to acquire and use nuclear, chemical, or biological weapons. However, terrorists in Iraq and elsewhere continue to wreak havoc using improvised explosive devices. Thus, there is a pressing security need for better methods for detecting explosive materials and devices. Transformational S&T such as pulsed fast-neutron analysis or terahertz spectroscopy for material- and element-specific imaging offer the promise of greatly improved explosive detection. For bioscience-based approaches, the development of highly multiplexed transducer arrays and molecular recognition methods that mimic biological systems would similarly provide the foundation for vastly improved capabilities. Likewise, new materials an

Murray, C A

2006-03-24T23:59:59.000Z

400

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Savannah River Site | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Site | National Nuclear Security Administration Site | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Locations > Savannah River Site Savannah River Site http://www.srs.gov/general/srs-home.html Field Office: Located south of Aiken, South Carolina, the Savannah River Field Office (SRFO) is responsible for the NNSA Defense Program missions at

402

NNSA Policy System | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy System | National Nuclear Security Administration Policy System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NNSA Policy System Home > About Us > Our Operations > Management and Budget > NNSA Policy System NNSA Policy System The NNSA's Policy System is established under the authority of Section 3212(d) of Public Law 106-65, the National Defense Authorization Act for

403

Z Machine | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Z Machine | National Nuclear Security Administration Z Machine | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Z Machine Z Machine Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Inertial Confinement Fusion > Facilities > Z Machine Z Machine Z Machine Sandia National Laboratories

404

Savannah River Site | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Site | National Nuclear Security Administration Site | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Locations > Savannah River Site Savannah River Site http://www.srs.gov/general/srs-home.html Field Office: Located south of Aiken, South Carolina, the Savannah River Field Office (SRFO) is responsible for the NNSA Defense Program missions at

405

Don Nichols | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Don Nichols | National Nuclear Security Administration Don Nichols | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Leadership > Don Nichols Don Nichols Associate Administrator for Safety and Health Don Nichols On March 4, 2009, Dr. Nichols was appointed the Chief of Defense Nuclear Safety (CDNS), reporting to the Administrator of the National Nuclear

406

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Institutional Research & Development > Contact Us Contact Us Above Image: Fission neutrons can be distinguished from background radiation using a novel variation of a metal-organic framework (MOF) scintillator that was a new class of scintillator previously patented by Sandia: Crystals of a metal organic framework (left) emit light in the blue (middle) when exposed to ionizing radiation. Infiltrating them with an organometallic compound causes the crystals to emit red light as well (right), creating a new way to differentiate fission neutrons from

407

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

408

Oil's Impact on Our National Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Oil's Impact on Our National Security Oil's Impact on Our National Security Oil's Impact on Our National Security April 25, 2011 - 6:12pm Addthis John Schueler John Schueler Former New Media Specialist, Office of Public Affairs Our dependence on foreign oil not only impacts hard working Americans at the pump, but it also compromises the security of our troops, as transporting large quantities of oil to our armed forces is often a dangerous and costly endeavor. The Department of Energy is committed to reducing our dependence on oil and supporting our armed forces, and that's why we've been collaborating with the Department of Defense throughout this administration to develop clean energy technologies and get them into the field. Tomorrow, Deputy Secretary Daniel Poneman will join Deputy Secretary of

409

White House Energy Security Stakeholders Forum | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Energy Security Stakeholders Forum Energy Security Stakeholders Forum White House Energy Security Stakeholders Forum July 27, 2010 - 1:04pm Addthis Remarks as Prepared for Delivery U.S. Deputy Secretary of Energy Daniel Poneman White House Energy Security Stakeholders Forum Tuesday, July 27, 2010 Good afternoon. Thank you Secretary Mabus and Carol Browner for your leadership on these important issues. It's a pleasure to be here today with all of our distinguished panelists and guests. Before I begin my remarks, I want to take a moment to thank all the men and women here today who work day in and day out to keep our country safe. We greatly appreciate your sacrifice and service. It is fitting that today's forum includes representatives from both the energy and defense sectors, from academia and the business community. Our

410

White House Energy Security Stakeholders Forum | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

White House Energy Security Stakeholders Forum White House Energy Security Stakeholders Forum White House Energy Security Stakeholders Forum July 27, 2010 - 1:04pm Addthis Remarks as Prepared for Delivery U.S. Deputy Secretary of Energy Daniel Poneman White House Energy Security Stakeholders Forum Tuesday, July 27, 2010 Good afternoon. Thank you Secretary Mabus and Carol Browner for your leadership on these important issues. It's a pleasure to be here today with all of our distinguished panelists and guests. Before I begin my remarks, I want to take a moment to thank all the men and women here today who work day in and day out to keep our country safe. We greatly appreciate your sacrifice and service. It is fitting that today's forum includes representatives from both the energy and defense sectors, from academia and the business community. Our

411

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication  

E-Print Network [OSTI]

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty #12;ABSTRACT Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho the true network identity of com- municating parties against eavesdropping adversaries. Tor, acronym

Keromytis, Angelos D.

412

Ike Skelton Defense Authorization Act | Open Energy Information  

Open Energy Info (EERE)

Defense Authorization Act Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Ike Skelton Defense Authorization ActLegal Published...

413

Energy Department to Loan Emergency Fuel to Department of Defense...  

Energy Savers [EERE]

loan the Department of Defense ultra-low sulfur diesel from the Northeast Home Heating Oil Reserve. The Defense Logistics Agency (DLA) will begin drawing down stocks from the...

414

NERSC Computer Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

415

Memorandum, Safeguards & Security Policy Panels - February 15, 2008 |  

Broader source: Energy.gov (indexed) [DOE]

Memorandum, Safeguards & Security Policy Panels - February 15, 2008 Memorandum, Safeguards & Security Policy Panels - February 15, 2008 Memorandum, Safeguards & Security Policy Panels - February 15, 2008 February 15, 2008 As outlined in the attached HSS memo, dated December 3,2007, subject: Safeguards and Security Policy Panels, the HSS Office of Security Policy is establishing several new policy panels that will create new opportunities for communication and will include those current active groups that are now effectively promoting cominunications in theirsafeguards and security topical areas. The Office of Health, Safety and Security (HSS) recognizes the importance of well conceived strategies and policies to support and communicate the security posture of the Department. In order for our security policies to

416

National Nuclear Security Administration Supplemental Listing of Directives  

National Nuclear Security Administration (NNSA)

Updated 9/15/11 Updated 9/15/11 National Nuclear Security Administration Supplemental Listing of Directives Affecting Nuclear Safety Requirements Last Updated 09/15/11 U.S. DEPARTMENT OF ENERGY National Nuclear Security Administration Office of the Chief of Defense Nuclear Safety AVAILABLE ONLINE AT: http://hq.na.gov link to NNSA Policies/Supplemental Directives This Page Intentionally Blank. Concurrence on Exemptions or Exceptions Page 1 Updated 9/15/11 ADDITIONAL DIRECTIVES (LATEST VERSION) REQUIRING CENTRAL TECHNICAL AUTHORITY CONCURRENCE PRIOR TO GRANTING EXEMPTIONS, EQUIVALENCIES OR EXCEPTIONS This document is maintained by the NNSA Chief of Defense Nuclear Safety and lists any directives, including Supplemental Directives or other NNSA issuances, for which NNSA

417

2011 Annual Planning Summary for Defense Nuclear Nonproliferation (NA-20)  

Broader source: Energy.gov [DOE]

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2011 and 2012 within Defense Nuclear Nonproliferation (NA-20).

418

Office of Inertial Confinement Fusion | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Inertial Confinement Fusion | National Nuclear Security Inertial Confinement Fusion | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Inertial Confinement Fusion Office of Inertial Confinement Fusion Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Inertial Confinement Fusion

419

Predictive Science Academic Alliance Program | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Predictive Science Academic Alliance Program | National Nuclear Security Predictive Science Academic Alliance Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Predictive Science Academic Alliance Program Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

420

Computational Systems & Software Environment | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Computational Systems & Software Environment | National Nuclear Security Computational Systems & Software Environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog CSSE Computational Systems & Software Environment Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

High Energy Density Laboratory Plasmas | National Nuclear Security  

National Nuclear Security Administration (NNSA)

| National Nuclear Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog HEDLP High Energy Density Laboratory Plasmas Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > University Partnerships / Academic Alliances > High Energy Density Laboratory Plasmas

422

University Program in Advanced Technology | National Nuclear Security  

National Nuclear Security Administration (NNSA)

University Program in Advanced Technology | National Nuclear Security University Program in Advanced Technology | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog University Program in Advanced Technology Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

423

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

424

Nest Defense Behaviors of Native Cavity-Nesting Birds to European Starlings1  

E-Print Network [OSTI]

457 Nest Defense Behaviors of Native Cavity- Nesting Birds to European Starlings1 Rodney G. Olsen,2 for nest sites and the extent to which European Starlings (Sturnus vulgaris) are seen as a threat by native of aggressive behavior of four species of native cavity-nesting birds to starlings at active nests in trees

Standiford, Richard B.

425

The National Nuclear Security Administration's Neutron Generator...  

Energy Savers [EERE]

National Nuclear Security Administration's Neutron Generator Activities OAS-L-14-11 August 2014 U.S. Department of Energy Office of Inspector General Office of Audits and...

426

Safety and Security on Campus 2013 Annual Security and Fire Safety Report for the Minneapolis and St. Paul Campuses  

E-Print Network [OSTI]

Safety and Security on Campus 2013 Annual Security and Fire Safety Report for the Minneapolis, active place. Safety and security are important for the thousands of us who live, work, and study here ensure the safety of all of us who call our beautiful Minneapolis and St. Paul campuses home

Minnesota, University of

427

Criticality safety aspects of decontamination and decommissioning at defense nuclear facilities  

SciTech Connect (OSTI)

Defense nuclear facilities have operated for forty years with a well-defined mission to produce weapons components for the nation. With the end of the cold war, the facilities` missions have changed to one of decontamination and decommissioning. Off-normal operations and use of new procedures, such as will exist during these activities, have often been among the causal factors in previous criticality accidents at process facilities. This paper explores the similarities in causal factors in previous criticality accidents to the conditions existing in current defense nuclear facilities undergoing the transition to decontamination and decommissioning. Practices to reduce the risk to workers, the public, and the environment are recommended.

Croucher, D.W.

1994-02-01T23:59:59.000Z

428

NREL: Department of Defense Energy Programs Home Page  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A photo of test tubes in an NREL algae lab, which contain green liquids called lipids or oils, which have been extracted from several algal strains. A photo of test tubes in an NREL algae lab, which contain green liquids called lipids or oils, which have been extracted from several algal strains. A photo of more than a dozen solar photovoltaic panels on the roof of the Denver Museum of Nature and Science taken at dusk with the Denver skyline in the background. The solar array is part of a 100 kilowatt system that lines the top of the southwest and southeast wings of the museum. Photo of a formation of Marines at Quanitico, Virginia, with a female staff sergeant in focus. A photo of a large gray iron Naval ship docked in New York Harbor. The National Renewable Energy Laboratory (NREL) supports the U.S. Department of Defense's (DOD) mission to reduce energy costs, decrease reliance on foreign oil, ensure energy security, and achieve sustainability

429

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Broader source: Energy.gov (indexed) [DOE]

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

430

Independent Activity Report, Pantex Site - January 2011 | Department of  

Broader source: Energy.gov (indexed) [DOE]

January 2011 January 2011 Independent Activity Report, Pantex Site - January 2011 January 2011 Pantex Plant Site Visit The U.S. Department of Energy (DOE), Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), conducted a visit to the DOE Pantex Site Office (PXSO) and the Pantex Plant in Amarillo, Texas, from January 25-27, 2011. The primary purpose of the visit was to participate in preparations for the upcoming biennial review of PXSO by the Office of the Chief of Defense Nuclear Safety (CDNS). HSS personnel also attended several meetings and conducted operational awareness activities while on site. Independent Activity Report, Pantex Site - January 2011 More Documents & Publications Independent Activity Report, Pantex Site - March 2011

431

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

432

Practical defenses against BGP prefix hijacking  

Science Journals Connector (OSTI)

Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates an IP prefix that the router does not own, is becoming an increasingly serious security problem on the Internet. In this paper, we conduct a first comprehensive ...

Zheng Zhang; Ying Zhang; Y. Charlie Hu; Z. Morley Mao

2007-12-01T23:59:59.000Z

433

SECURING HARDWARE, SOFTWARE AND DATA  

Broader source: Energy.gov (indexed) [DOE]

of the Cyber Security of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability i PNNL-16971 Report of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability iii Acknowledgements The workshop chairs wish to thank Joree O'Neal and Rachel Smith for all their help and support with organizing the logistics and registration activities for this workshop; Sue Chin, Ted Tanasse, Barbara Wilson, and Stacy Larsen for their expert help with the assembly, text editing, and graphics for this report; and Lance Baatz for his masterful

434

Programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Programs Home > Field Offices > Welcome to the Sandia Field Office > Programs Programs The SFO Programs office is responsible for direction, day-to-day oversight and contract administration activities in support of the technical

435

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Inertial Confinement Fusion Inertial Confinement Fusion Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Inertial Confinement Fusion > Facilities Facilities Office of Inertial Confinement Fusion, Facilities ICF operates a set of world-class experimental facilities to create HEDP conditions and to obtain quantitative data in support of its numerous stockpile stewardship-related activities. To learn about three high energy experimental facilities and two small lasers that provide ICF capabilities, select the links below. National Ignition Facility, Lawrence Livermore National Laboratory OMEGA and OMEGA EP, University of Rochester Laboratory for Laser Energetics Z Machine, Sandia National Laboratories

436

SRS upgrades helium recovery system | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

detectors employed by the United States Department of Homeland Security to detect neutron activity from nuclear material. Savannah River Nuclear Solutions, LLC, the management...

437

Enforcement Letter, National Security Technologies, LLC- November 13, 2007  

Broader source: Energy.gov [DOE]

Issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site

438

Special Report Order, Los Alamos National Security, LLC - January...  

Office of Environmental Management (EM)

to Los Alamos National Security, LLC related to Glovebox Activities at TA-55 and Chemistry and Metallurgy Research Facilities at the Los Alamos National Laboratory On January...

439

Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999  

SciTech Connect (OSTI)

This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

2000-06-01T23:59:59.000Z

440

Y-12 National Security Complex | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Aerial View Y-12 National Security Complex Aerial View Y-12 National Security Complex's primary mission is to support of the DOE nuclear weapons stockpile maintenance program. Activities include assembly and disassembly of nuclear weapons components, secure storage of special nuclear material (SNM), and various other nuclear weapons-related activities. Other activities include various aspects of testing and development, nonproliferation, and technology transfer. Enforcement June 13, 2008 Preliminary Notice of Violation, Babcock & Wilcox Teclmical Services Y -12, LLC - NEA-2008-01 Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC, related to a Uranium Chip Fire at the Y-12 National

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Management of Hanford Site non-defense production reactor spent nuclear fuel, Hanford Site, Richland, Washington  

SciTech Connect (OSTI)

The US Department of Energy (DOE) needs to provide radiologically, and industrially safe and cost-effective management of the non-defense production reactor spent nuclear fuel (SNF) at the Hanford Site. The proposed action would place the Hanford Site`s non-defense production reactor SNF in a radiologically- and industrially-safe, and passive storage condition pending final disposition. The proposed action would also reduce operational costs associated with storage of the non-defense production reactor SNF through consolidation of the SNF and through use of passive rather than active storage systems. Environmental, safety and health vulnerabilities associated with existing non-defense production reactor SNF storage facilities have been identified. DOE has determined that additional activities are required to consolidate non-defense production reactor SNF management activities at the Hanford Site, including cost-effective and safe interim storage, prior to final disposition, to enable deactivation of facilities where the SNF is now stored. Cost-effectiveness would be realized: through reduced operational costs associated with passive rather than active storage systems; removal of SNF from areas undergoing deactivation as part of the Hanford Site remediation effort; and eliminating the need to duplicate future transloading facilities at the 200 and 400 Areas. Radiologically- and industrially-safe storage would be enhanced through: (1) removal from aging facilities requiring substantial upgrades to continue safe storage; (2) utilization of passive rather than active storage systems for SNF; and (3) removal of SNF from some storage containers which have a limited remaining design life. No substantial increase in Hanford Site environmental impacts would be expected from the proposed action. Environmental impacts from postulated accident scenarios also were evaluated, and indicated that the risks associated with the proposed action would be small.

NONE

1997-03-01T23:59:59.000Z

442

The Salt Defense Disposal Investigations (SDDI)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Salt Defense Disposal Investigations (SDDI) Salt Defense Disposal Investigations (SDDI) will utilize a newly mined Underground Research Lab (URL) in WIPP to perform a cost effective, proof-of-principle field test of the emplacement of heat-generating radioactive waste and validate modeling efforts. The goals of the SDDI Thermal Test are to: * Demonstrate a proof-of-principle concept for in-drift disposal in salt. * Investigate, in a specific emplacement concept, the response of the salt to heat. * Develop a full-scale response for run-of- mine (ROM) salt. * Develop a validated coupled process model for disposal of heat-generating wastes in salt. * Evaluate the environmental conditions of the

443

Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety and Security Safety and Security Report to the Secretary on the Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1 February 2011 Office of Health, Safety and Security U.S. Department of Energy Office of Health, Safety and Security HSS Table of Contents 1.0 Introduction ......................................................................................................................... 1 2.0 Department-wide Action Plan for the Columbia Accident and Davis-Besse Event ........... 3 3.0 Comprehensive Operating Experience Program ................................................................. 5

444

Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1  

Broader source: Energy.gov (indexed) [DOE]

Safety and Security Safety and Security Report to the Secretary on the Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1 February 2011 Office of Health, Safety and Security U.S. Department of Energy Office of Health, Safety and Security HSS Table of Contents 1.0 Introduction ......................................................................................................................... 1 2.0 Department-wide Action Plan for the Columbia Accident and Davis-Besse Event ........... 3 3.0 Comprehensive Operating Experience Program ................................................................. 5

445

Cloud structures from defense meteorological satellite data  

E-Print Network [OSTI]

1979 Major Subject: Meteorology CLOUD STRUCTURES FRON DEFENSE &IETEOROLOGICAL SAT"LLIT DATA A Thesis by JOHN FREDERICK PHILLIPS Approved as to style and content by. (Cha an of Committee) (Head of Department (Me er) (Hencber) August 1975...-gray-level density wedge, provided by the Air Weather Service, enabled determinations of ap- proximate cloud heights A comparison was made between the DMSP imagery and the concurrent digital radar from the National Severe Storms Laboratory at Norman...

Phillips, John Frederick

2012-06-07T23:59:59.000Z

446

Homeland Security Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

447

Security Policy, Guidance & Reports  

Broader source: Energy.gov [DOE]

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

448

The 'secureplan' bomb utility: A PC-based analytic tool for bomb defense  

SciTech Connect (OSTI)

This paper illustrates a recently developed, PC-based software system for simulating the effects of an infinite variety of hypothetical bomb blasts on structures and personnel in the immediate vicinity of such blasts. The system incorporates two basic rectangular geometries in which blast assessments can be made - an external configuration (highly vented) and an internal configuration (vented and unvented). A variety of explosives can be used - each is translated to an equivalent TNT weight. Provisions in the program account for bomb cases (person, satchel, case and vehicle), mixes of explosives and shrapnel aggregates and detonation altitudes. The software permits architects, engineers, security personnel and facility managers, without specific knowledge of explosives, to incorporate realistic construction hardening, screening programs, barriers and stand-off provisions in the design and/or operation of diverse facilities. System outputs - generally represented as peak incident or reflected overpressure or impulses - are both graphic and analytic and integrate damage threshold data for common construction materials including window glazing. The effects of bomb blasts on humans is estimated in terms of temporary and permanent hearing damage, lung damage (lethality) and whole body translation injury. The software system has been used in the field in providing bomb defense services to a number of commercial clients since July of 1986. In addition to the design of siting, screening and hardening components of bomb defense programs, the software has proven very useful in post-incident analysis and repair scenarios and as a teaching tool for bomb defense training.

Massa, R.J.

1987-07-01T23:59:59.000Z

449

Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

SciTech Connect (OSTI)

The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

Price, D E; Durling, R L

2005-10-10T23:59:59.000Z

450

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

451

Ocean Thermal Energy Conversion (OTEC) A New Secure Renewable Energy Source  

E-Print Network [OSTI]

Ocean Thermal Energy Conversion (OTEC) A New Secure Renewable Energy Source For Defense Water Temperature Delta 2 A New Clean Renewable 24/7 Energy Source #12;Ocean Thermal Energy Conversion and Commercial Applications 1 Dr. Ted Johnson Director of Alternative Energy Programs Development Lockheed Martin

452

Nevada National Security Site Operational Awareness Oversight Visit, December 2012  

Broader source: Energy.gov (indexed) [DOE]

HIAR NNSS-2012-12-03 HIAR NNSS-2012-12-03 Site: Nevada National Security Site Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for Operational Awareness Oversight of the Nevada National Security Site Dates of Activity 12/03/2012 - 12/06/2012 Report Preparer: William Macon Activity Description/Purpose: The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit to observe Subcritical Experiment (SCE) activities at the U1a Complex, discuss ongoing activities at the National Criticality Experiment Research Center (NCERC), and monitor the status of other ongoing site activities at the Nevada National Security Site (NNSS) operated by National Security Technologies, LLC (NSTec).

453

Personal Security Assistance for Secure Internet Commerce  

E-Print Network [OSTI]

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

454

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

455

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

456

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

457

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

458

Climate VISION: Security and Privacy Notices  

Office of Scientific and Technical Information (OSTI)

SECURITY AND PRIVACY NOTICES SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of

459

Privacy & Security Notice | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

460

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

462

Fine-Grain Access Control for Securing Shared Resources in Computational Grids*  

E-Print Network [OSTI]

Fine-Grain Access Control for Securing Shared Resources in Computational Grids* Abstract, grid environments, grid security, Unix accessmodel. providing an active enforcement of the security. Introduction Grid environments of the future will require an abil- ity to provide a secure execution

Lee, Ruby B.

463

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

464

S. 1514: This Act may be cited as the Department of Energy National Security Act for Fiscal Years 1992 and 1993, introduced in the United States Senate, One Hundred Second Congress, First Session, July 22, 1991  

SciTech Connect (OSTI)

Title 31, Part A, National Security Programs Authorizations, includes the following sections: Operating Expenses; Plant and Capital Equipment; Environmental Restoration and Waste Management; Funding Limitations; and General Reduction in Authorizations. Part B, Recurring General Provisions, presents the following Sections: Reprogramming; Limits on General Plant Projects; Limits on construction Projects; Fund Transfer Authority; Authority for Construction Design; Authority for Emergency Construction, Design and Construction Activities; and Funds Available for all DOE National Security Programs. Part C, Miscellaneous, includes the following: Scholarship and Fellowship Program for Environmental Restoration and Waste Management; Defense Environmental Restoration and Waste Management Program; Private Sector Participation in Waste Cleanup and Modernization Activities; Career Development Program for National Laboratory Employees; Resumption of Plutonium Operations at Rocky Flats Plant; Training and Protection of Nuclear Facilities Workers Who Respond to Emergencies Related to Hazardous Substances; and DOE Partnerships for Energy Critical Technologies, Advanced Manufacturing Technology, and Materials Processing, Synthesis, and Commercialization. Title 22, Defense Nuclear Facilities Safety Board Authorization, notes funds authorized for the board and discusses briefly changes in its powers and functions.

Not Available

1991-01-01T23:59:59.000Z

465

ASC eNews Quarterly Newsletter March 2013 | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

March 2013 | National Nuclear Security March 2013 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration ASC eNews Quarterly Newsletter March 2013 Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

466

ASC eNews Quarterly Newsletter June 2013 | National Nuclear Security  

National Nuclear Security Administration (NNSA)

3 | National Nuclear Security 3 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration ASC eNews Quarterly Newsletter June 2013 Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

467

ASC eNews Quarterly Newsletter September 2012 | National Nuclear Security  

National Nuclear Security Administration (NNSA)

September 2012 | National Nuclear Security September 2012 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration ASC eNews Quarterly Newsletter September 2012 Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

468

Inspection Report Follow-up Inspection on Security Clearance Terminations and Badge  

Broader source: Energy.gov (indexed) [DOE]

Inspection Report Inspection Report Follow-up Inspection on Security Clearance Terminations and Badge Retrieval at the Lawrence Livermore National Laboratory INS-L-12-02 March 2012 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 March 6, 2012 MEMORANDUM FOR THE ASSOCIATE ADMINISTRATOR FOR DEFENSE NUCLEAR SECURITY MANAGER, LIVERMORE SITE OFFICE FROM: Sandra D. Bruce Assistant Inspector General for Inspections Office of Inspector General SUBJECT: INFORMATION: Inspection Report on "Follow-up Inspection on Security Clearance Terminations and Badge Retrieval at the Lawrence Livermore National Laboratory" BACKGROUND The Department of Energy's Lawrence Livermore National Laboratory (Livermore) is managed

469

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

470

Lemnos Interoperable Security Program  

Broader source: Energy.gov (indexed) [DOE]

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

471

Chapter 12 - Security Risk Reviews  

Science Journals Connector (OSTI)

Publisher Summary This chapter discusses the security risk review (SRR). The purpose of the SRR process is to identify areas where one's security standards are not being met. The focus initially should be on applications and supporting infrastructure that are most critical to the organization. This risk analysis process follows five high-level steps: assess resources, generate findings, analyze risk, risk decision, and risk exceptions. The goal with the SRR is to prioritize not only the resources being evaluated but also the importance of the standards themselves. The standard requiring a log of all guest accesses to the data center may be rightly deemed less critical than the requirement to have swipe card access to the data center. Reviews should be performed periodically or whenever new policies/standards are adopted by the organization. A fundamental control for any organization is a collection of security policies and standards that set the tone for how to operate the business securely. Once these are in place, the challenge then becomes how to assess the organization's current alignment with these standards and determine which gaps most urgently need to be addressed. This may sound like an audit function, but there is a very important distinction here: this process is meant to proactively prioritize those areas where a deviation from the standard might be acceptable and recognize the cases where such a divergence cannot be tolerated. Like many risk activities, the result will either be a formal acceptance of the current state or a plan to mitigate the risks. This is one of the fundamental on-going risk assessment activities that will help to gauge the security posture of the organization versus what controls might be documented on paper.

Evan Wheeler

2011-01-01T23:59:59.000Z

472

Chapter_8_Opertions_Security_Program  

Broader source: Energy.gov (indexed) [DOE]

Operations Security Program Operations Security Program This chapter covers the OPSEC Program in place at DOE HQ to fulfill the requirements of DOE Order 471.6, Section 4.f, Information Security Manual. The OPSEC Program seeks to assist HQ Elements in identifying and protecting Critical Information (CI) from inadvertent or unauthorized disclosure and in protecting classified matter. CI includes those classified or sensitive unclassified areas, activities, functions, data, or information about an activity or organization deemed sufficiently important to be protected from an adversary. CI, when disclosed without proper authorization, has detrimental impact on national security and or departmental operations. Examples of CI that must be protected are personnel files, proposal and contract documents, or financial data regarding a project. CI is

473

Security Sciences Field Lab (SSFL) | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Science Nuclear Science Research Areas Research Highlights Facilities and Capabilities Educational Outreach Publications and Reports News and Awards Nuclear Science Home | Science & Discovery | Nuclear Science | Facilities and Capabilities SHARE Security Sciences Field Laboratory May 30, 2013 The Security Sciences Field Laboratory (SSFL) is designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including: sensors; cameras; alarm communication and display; power generation; access control; unattended stand-alone, remote communication; unmanned aerial and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain such as open grassy fields, hilly wooded areas, sand

474

United States Department of Defense | Open Energy Information  

Open Energy Info (EERE)

Defense Defense Jump to: navigation, search Logo: United States Department of Defense Name United States Department of Defense Address 1000 Defense Pentagon Place Washington, District of Columbia Zip 20301-1000 Website http://www.defense.gov/ Coordinates 38.8706007°, -77.0557268° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.8706007,"lon":-77.0557268,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

475

November 8, 1983: Defense Waste Processing Facility | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983 The Department begins construction of the Defense Waste Processing Facility (DWPF) at the Savannah River Plant in South Carolina. DWPF is designed to make high-level nuclear waste into a glass-like substance, which will then be shipped to a repository. DWPF will mix borosilicate glass with the waste, heat it to 2000 degrees F, and pour the mixture into stainless steel canisters. The mixture will cool into solid glass that can be permanently stored. DWPF will immobilize the more than 34 million gallons of liquid high-level waste that have accumulated from producing defense-related nuclear materials

476

The Department's Cyber Security Incident Management Program, IG-0787 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

477

NNSA/CEA Cooperation in Computer Science | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NNSA/CEA Cooperation in Computer Science | National Nuclear Security NNSA/CEA Cooperation in Computer Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration NNSA/CEA Cooperation in Computer Science Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

478

NNSA/CEA Cooperation in Computer Science | National Nuclear Security  

National Nuclear Security Administration (NNSA)

NNSA/CEA Cooperation in Computer Science | National Nuclear Security NNSA/CEA Cooperation in Computer Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration NNSA/CEA Cooperation in Computer Science Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

479

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

480

Polypeptide signaling for plant defensive genes exhibits analogies to defense signaling in animals  

Science Journals Connector (OSTI)

...cysteine and aspartyl proteinase inhibitors (2-4) and polyphenol oxidase...more recently, proteinase inhibitors in sedges and grasses have...of the defensive proteinase inhibitor genes in excised tomato leaves...Subsequently, chitin and chitosan oligomers derived from fungal...

D R Bergey; G A Howe; C A Ryan

1996-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Nevada National Security Site Waste Acceptance Criteria  

SciTech Connect (OSTI)

This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

NSTec Environmental Management

2012-02-28T23:59:59.000Z

482

Comments of the Natural Resource Defense Council on Energy Efficiency...  

Broader source: Energy.gov (indexed) [DOE]

the Natural Resource Defense Council on Energy Efficiency and Sustainable Design Standards for New Federal Buildings; Notice of Proposed Rulemaking Comments of the Natural Resource...

483

Department of Defense Representatives Visit Hanford to Benchmark...  

Office of Environmental Management (EM)

Representatives Visit Hanford to Benchmark Safety Department of Defense Representatives Visit Hanford to Benchmark Safety FLUOR News Release RICHLAND, Wash., December 16, 2005,...

484

Legacy Management Work Progresses on Defense-Related Uranium...  

Broader source: Energy.gov (indexed) [DOE]

Most recently, LM visited 84 defense-related legacy uranium mine sites located within 11 uranium mining districts in 6 western states. At these sites, photographs and global...

485

Defense-in-Depth, How Department of Energy Implements Radiation...  

Office of Environmental Management (EM)

is implemented using a defense-in-depth approach taking into account the combination of natural and engineered barriers, performance objectives, long-term risk assessments,...

486

March 2014 Most Viewed Documents for National Defense | OSTI...  

Office of Scientific and Technical Information (OSTI)

2014 Most Viewed Documents for National Defense Science Subject Feed The Effects of Nuclear Weapons Glasstone, Samuel (1964) 72 SMART BRIDGE: A tool for estimating the military...

487

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

488

Information security knowledge sharing inorganizations: Investigating the effect ofbehavioral information security governance andnational culture  

Science Journals Connector (OSTI)

Abstract This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries namely, USA and Sweden allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledge sharing differs based on national culture. The study followed a mixed methods research design, wherein qualitative data was collected to both establish the study's research model and develop a survey instrument that was distributed to 578 information security executives. The results suggest that processes to coordinate implemented security knowledge sharing mechanisms have a major direct influence on the establishment of security knowledge sharing in organizations; the effect of organizational structure (e.g., centralized security function to develop and deploy uniform firm-wide policies, and use of steering committees to facilitate information security planning) is slightly weaker, while business-based information security management has no significant direct effect on security knowledge sharing. A mediation analysis revealed that the reason for the nonsignificant direct relation between business-based information security management and security knowledge sharing is the fully mediating effect of coordinating information security processes. Thus, the results disentangles the interrelated influences of behavioral information security governance factors on security knowledge sharing by showing that information security governance sets the platform to establish security knowledge sharing, and coordinating processes realize the effect of both the structure of the information security function and the alignment of information security management with business needs. A multigroup analysis identified that national culture had a significant moderating effect on the association between four of the six proposed relations. In Sweden which is seen as a less individualist, feminine country managers tend to focus their efforts on implementing controls that are aligned with business activities and employees' need; monitoring the effectiveness of the implemented controls, and assuring that the controls are not too obtrusive to the end-user. On the contrary, US organizations establish security knowledge sharing in their organization through formal arrangements and structures. These results imply that Swedish managers perceive it to be important to involve, or at least know how their employees cope with the decisions that have been made, thus favoring local participation in information security management, while US managers may feel the need to have more central control when running their information security function. The findings suggest that national culture should be taken into consideration in future studies in particular when investigating organizations operating in a global environment and understand how it affects behaviors and decision-making.

Waldo Rocha Flores; Egil Antonsen; Mathias Ekstedt

2014-01-01T23:59:59.000Z

489

Interim Activities at Corrective Action Unit 114: Area 25 EMAD Facility, Nevada National Security Site, Nevada, for Fiscal Years 2012 and 2013  

SciTech Connect (OSTI)

This letter report documents interim activities that have been completed at CAU 114 in fiscal years 2012 and 2013.

Silvas, A J

2013-10-24T23:59:59.000Z

490

Doctoral Dissertation Defense "Informal Mathematics Activities and the Beliefs of  

E-Print Network [OSTI]

Teacher Candidates" Matt Roscoe Dept of Mathematical Sciences Thursday, March 17, 2011 12:30 pm in Native

Bardsley, John

491

The Tomato Suppressor of prosystemin-mediated responses2 Gene Encodes a Fatty Acid Desaturase Required for the Biosynthesis of Jasmonic Acid and the Production of a Systemic Wound Signal for Defense Gene Expression  

Science Journals Connector (OSTI)

...A. (1981). Proteinase inhibitor-inducing factor activity...Oligogalacturonides and chitosan activate plant defense genes...wound-inducible proteinase inhibitors. Plant Cell 4, 129-134...Wound-induced proteinase inhibitors from tomato leaves. II...

Chuanyou Li; Guanghui Liu; Changcheng Xu; Gyu In Lee; Petra Bauer; Hong-Qing Ling; Martin W. Ganal; Gregg A. Howe

2003-05-29T23:59:59.000Z

492

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

493

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

494

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant