National Library of Energy BETA

Sample records for defense activities security

  1. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  2. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  3. Homeland Security and Defense Applications

    SciTech Connect (OSTI)

    None

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  4. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  5. Independent Activity Report, Defense Nuclear Facilities Safety...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October...

  6. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies More Documents & Publications Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Mitigations for...

  7. Defense Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'a CConversion| National Nuclear Security

  8. A defense of theistic activism 

    E-Print Network [OSTI]

    Haugen, Christopher Allen

    2003-01-01

    theism and contemporary Platonism: they argue that abstract objects are immutable and necessarily existent, but that they are dependent on God for their existence. They have named the view "theistic activism." Brian Leftow argues against the viability...

  9. Secretary of Defense Department of Defense

    E-Print Network [OSTI]

    Cooperation Agency Defense Security Service Defense Threat Reduction Agency * Missile Defense Agency National Geospatial-Intelligence Agency * National Reconnaissance Office * National Security Agency/Central Security Security Service Defense Threat Reduction Agency * Missile Defense Agency National Geospatial

  10. Department of Defense National Security Personnel System : the transition to pay for performance

    E-Print Network [OSTI]

    Davies, Rebecca L. (Rebecca Leigh), 1960-

    2004-01-01

    The 2004 National Defense Authorization Act (Public Law 10-136, November 24, 2003) gives the Department of Defense (DoD) authority to establish the National Security Personnel System (NSPS). This system will mark the most ...

  11. Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities

    SciTech Connect (OSTI)

    Not Available

    1984-02-01

    Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

  12. Control Systems Cyber Security: Defense-in-Depth Strategies

    SciTech Connect (OSTI)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  13. Control Systems Cyber Security:Defense in Depth Strategies

    SciTech Connect (OSTI)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  14. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  15. NA 70 - Associate Administrator for Defense Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 70 - Associate Administrator for Defense ... NA 70 - Associate Administrator...

  16. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  17. Defense Programs: the mission | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent Bonding Low-Cost2 DOENERSCDecemberDeclarationHANFORD8,Defense

  18. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    SciTech Connect (OSTI)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  19. Office of Defense Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster SessionPrograms | National Nuclear Security

  20. defense

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4)9 Federal RegisterStorm1 3446 YEAR/%2A en Defense

  1. Independent Activity Report, Nevada National Security Site -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR...

  2. Japan’s National Defense Planning for the New Security Environment: The 2010 National Defense Program Guidelines

    E-Print Network [OSTI]

    JIMBO, Ken

    2012-01-01

    and policies of Japan’s national security strategy. The mostin diplo- macy and national security policy soon after itsand policies of Japan’s national security strategy. In

  3. Independent Oversight Activity Report, Nevada National Security...

    Broader source: Energy.gov (indexed) [DOE]

    2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This Independent Activity Report documents an oversight activity conducted by the...

  4. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  5. Independent Activity Report, Los Alamos National Security - June...

    Office of Environmental Management (EM)

    Los Alamos National Security - June 2011 Independent Activity Report, Los Alamos National Security - June 2011 June 2011 Review of the Los Alamos National Security Emergency...

  6. 388 Federal Funds--Continued ENVIRONMENTAL AND OTHER DEFENSE ACTIVITIES--Continued

    E-Print Network [OSTI]

    Management to accomplish its mission. Office of Civilian Radioactive Waste Management.--The pro- gram ...................................................... 658 993 965 f DEFENSE NUCLEAR WASTE DISPOSAL For nuclear waste disposal activities to carry out of Legacy Management (Defense).--The programs within this office support long-term stewardship activities

  7. Department of Energy/ National Nuclear Security Administration FY 2007 Congressional Budget

    E-Print Network [OSTI]

    Department of Energy/ National Nuclear Security Administration FY 2007 Congressional Budget Volume..................................................................................................................25 Weapons Activities..............................................................................................................................51 Defense Nuclear Nonproliferation

  8. Transportation Security Rulemaking Activities at the U.S. Nuclear...

    Office of Environmental Management (EM)

    Activities at the U.S. Nuclear Regulatory Commission Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission Transportation Security Rulemaking...

  9. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  10. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect (OSTI)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  11. Nuclear Weapon Surety Interface with the Department of Defense

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-05-14

    This Order establishes Department of Energy and National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the Department of Defense. Supersedes DOE O 452.6.

  12. On the front lines of national security, the Department of Defense (DOD) recognizes how adoption of

    E-Print Network [OSTI]

    . A microgrid that integrates renewable generation and vehicle energy storage offers energy security, cost-directional power flow with vehicle energy storage. The project's ultimate goals are to minimize fuel consumption unit with a microgrid at Fort Carson, a large Army facility in Colorado. Through the coordination

  13. Office of Secure Transportation Activities | Department of Energy

    Office of Environmental Management (EM)

    Activities Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct...

  14. A Summary of Control System Security Standards Activities in...

    Office of Environmental Management (EM)

    security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. Summary of CS Standards Activities in the...

  15. defense nuclear security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en46A NAME6/%2A encore3/%2A en

  16. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    and oversight for programs funded by the Weapons Activities, Defense Nuclear Non- proliferation, and Naval pro- gram direction for Weapons Activities and Defense Nuclear Nonproliferation, and Federal employees361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special

  17. Annual Report To Congress. Department of Energy Activities Relating to the Defense Nuclear Facilities Safety Board, Calendar Year 2003

    SciTech Connect (OSTI)

    None, None

    2004-02-28

    The Department of Energy (Department) submits an Annual Report to Congress each year detailing the Department’s activities relating to the Defense Nuclear Facilities Safety Board (Board), which provides advice and recommendations to the Secretary of Energy (Secretary) regarding public health and safety issues at the Department’s defense nuclear facilities. In 2003, the Department continued ongoing activities to resolve issues identified by the Board in formal recommendations and correspondence, staff issue reports pertaining to Department facilities, and public meetings and briefings. Additionally, the Department is implementing several key safety initiatives to address and prevent safety issues: safety culture and review of the Columbia accident investigation; risk reduction through stabilization of excess nuclear materials; the Facility Representative Program; independent oversight and performance assurance; the Federal Technical Capability Program (FTCP); executive safety initiatives; and quality assurance activities. The following summarizes the key activities addressed in this Annual Report.

  18. Independent Oversight Activity Report, Nevada National Security...

    Energy Savers [EERE]

    an oversight activity conducted by the Office of Independent Enterprise Assessments (IEA), Office of Nuclear Safety and Environmental Assessments, from May 5-7, 2014. The...

  19. Independent Oversight Activity Report, National Nuclear Security...

    Broader source: Energy.gov (indexed) [DOE]

    an oversight activity conducted by the Office of Independent Enterprise Assessments (IEA), Office of Nuclear Safety and Environmental Assessments, from March 10-14, 2014. The...

  20. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    planning and oversight for programs funded by the Weapons Activities, Defense Nuclear Non- proliferation, for Weapons Ac- tivities and Defense Nuclear Nonproliferation, and Federal employees at the NNSA service379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special

  1. Program Activities | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirmProductionWeatherize »Activities

  2. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  3. Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998

    SciTech Connect (OSTI)

    1999-02-01

    This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

  4. Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, Calendar Year 1999

    SciTech Connect (OSTI)

    None

    2000-02-01

    This is the tenth Annual Report to the Congress describing Department of Energy activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of Energy regarding public health and safety issues at the Department's defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. During 1999, Departmental activities resulted in the closure of nine Board recommendations. In addition, the Department has completed all implementation plan milestones associated with three Board recommendations. One new Board recommendation was received and accepted by the Department in 1999, and a new implementation plan is being developed to address this recommendation. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, opening of a repository for long-term storage of transuranic wastes, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

  5. Nuclear Weapon Surety Interface with the Department of Defense

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-19

    The Order prescribes how the Department of Energy participates with the Department of Defense (DoD) to ensure the surety (safety, security and control) of military nuclear weapon systems deployed around the world. The Order establishes National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the DoD. Cancels DOE O 5610.13. Canceled by DOE O 452.6A.

  6. Department of Defense INSTRUCTION

    E-Print Network [OSTI]

    US Army Corps of Engineers

    of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all of the DoD VE Program. b. Implements the reporting requirements of Reference (c). c. Establishes referred to in paragraph 2f of Enclosure 3 of this instruction has been assigned report control symbol DD

  7. CMC Participation in the Regional Centre for Strategic Studies (RCSS) Workshop: Defense, Technology and Cooperative Security in South Asia

    SciTech Connect (OSTI)

    Biringer, K.L.; Olsen, J.

    1998-11-01

    As an ongoing part of the collaborative efforts between the Cooperative Monitoring Center (CMC) at Sandia National Laboratories, the United States Arms Control and Disarmament Agency (ACDA), and U.S. Department of Energy (DOE), staff from the CMC served as faculty in conducting a workshop in Shanghai, China. Sponsor of the workshop was the Regional Centre for Strategic Studies (RCSS) based in Colombo, Sri Lanka. The workshop included participants from throughout South Asia and China. The CMC presented four sessions related to the role of monitoring technologies in promoting regional security and building confidence among nations. Participation in these workshops supports U.S. efforts to further regional cooperation and promote arms control, nonproliferation and other cooperative securily measures and supplements efforts funded by DOE and ACDA over the past four years. The RCSS Shanghai meeting permitted a continued CMC involvement in regionally conducted training for anew generation of leaders in government, the military, and academia throughout South Asia and China. Nuclear issues are clearly a dominant South Asian concern since the nuclear tests of May 1998. However, there remains a strong interest in identifying opportunities for increased trade and reduced tensions in other areas. The RCSS and other regional organizations are enthusiastic about continued CMC involvement in future regional courses.

  8. Transgenic expression of the dicotyledonous pattern recognition receptor EFR in rice leads to ligand-dependent activation of defense responses

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Schwessinger, Benjamin; Bahar, Ofir; Thomas, Nicolas; Holton, Nicolas; Nekrasov, Vladimir; Ruan, Deling; Canlas, Patrick E.; Daudi, Arsalan; Petzold, Christopher J.; Singan, Vasanth R.; et al

    2015-03-30

    Plant plasma membrane localized pattern recognition receptors (PRRs) detect extracellular pathogen-associated molecules. PRRs such as Arabidopsis EFR and rice XA21 are taxonomically restricted and are absent from most plant genomes. Here we show that rice plants expressing EFR or the chimeric receptor EFR::XA21, containing the EFR ectodomain and the XA21 intracellular domain, sense both Escherichia coli- and Xanthomonas oryzae pv. oryzae (Xoo)-derived elf18 peptides at sub-nanomolar concentrations. Treatment of EFR and EFR::XA21 rice leaf tissue with elf18 leads to MAP kinase activation, reactive oxygen production and defense gene expression. Although expression of EFR does not lead to robust enhanced resistancemore »to fully virulent Xoo isolates, it does lead to quantitatively enhanced resistance to weakly virulent Xoo isolates. EFR interacts with OsSERK2 and the XA21 binding protein 24 (XB24), two key components of the rice XA21-mediated immune response. Rice-EFR plants silenced for OsSERK2, or overexpressing rice XB24 are compromised in elf18-induced reactive oxygen production and defense gene expression indicating that these proteins are also important for EFR-mediated signaling in transgenic rice. Taken together, our results demonstrate the potential feasibility of enhancing disease resistance in rice and possibly other monocotyledonous crop species by expression of dicotyledonous PRRs. Our results also suggest that Arabidopsis EFR utilizes at least a subset of the known endogenous rice XA21 signaling components.« less

  9. Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000

    SciTech Connect (OSTI)

    2001-03-01

    This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

  10. Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum, MD 21090

    E-Print Network [OSTI]

    Lee, Ruby B.

    1 Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum security of the Global Information Grid (GIG). The context for "hardening" this infrastructure also describes the Department of Defense (DoD) activities aimed toward defining security requirements

  11. Identification of chemical hazards for security risk analysis activities.

    SciTech Connect (OSTI)

    Jaeger, Calvin Dell

    2005-01-01

    The presentation outline of this paper is: (1) How identification of chemical hazards fits into a security risk analysis approach; (2) Techniques for target identification; and (3) Identification of chemical hazards by different organizations. The summary is: (1) There are a number of different methodologies used within the chemical industry which identify chemical hazards: (a) Some develop a manual listing of potential targets based on published lists of hazardous chemicals or chemicals of concern, 'expert opinion' or known hazards. (b) Others develop a prioritized list based on chemicals found at a facility and consequence analysis (offsite release affecting population, theft of material, product tampering). (2) Identification of chemical hazards should include not only intrinsic properties of the chemicals but also potential reactive chemical hazards and potential use for activities off-site.

  12. defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en46A NAME6/%2A encore3/%2A en9/%2A|

  13. Their best defense is good fiscal sense (Daily Press) | Jefferson...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    https:www.jlab.orgnewsarticlestheir-best-defense-good-fiscal-sense-daily-press Their best defense is good fiscal sense Top Guard Security finds it can be a good idea to say,...

  14. Deception used for Cyber Defense of Control Systems

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  15. Defense Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'a CConversion

  16. defense nuclear security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLos AlamosSimulation Initiative798/%2ANewdefault Sign In About

  17. Independent Activity Report, Y-12 National Security Complex- June 2011

    Broader source: Energy.gov [DOE]

    Site Lead Orientation Visit to the Y-12 Site Office and Y-12 National Security Complex [HIAR-Y-12-2011-06-23

  18. Transportation Security Rulemaking Activities at the U.S. Nuclear...

    Office of Environmental Management (EM)

    AT THE U.S. NUCLEAR REGULATORY COMMISSION R. Clyde Ragland, P.E. Office of Nuclear Security and Incident Response 2011 DOE National Transportation Stakeholders Forum May 11, 2011 2...

  19. Active People Recognition using Thermal and Grey Images on a Mobile Security Robot

    E-Print Network [OSTI]

    Duckett, Tom

    Active People Recognition using Thermal and Grey Images on a Mobile Security Robot Andr´e Treptow is an ActivMedia PeopleBot mobile robot that is equipped with several sensors including a thermal camera and a pan-tilt camera unit (see figure 1). Fig. 1. ActivMedia Peoplebot, thermal camera (NEC Thermal Tracer

  20. THESIS DEFENSE REPORT FORM Defense Date

    E-Print Network [OSTI]

    Emmons, Scott

    THESIS DEFENSE REPORT FORM Defense Date: Student: Department: Dissertation Title: Please hand: (718) 430-8655 Committee Member Decision Signature P CP F (Chair) The decision of the Thesis Defense' on the scientific merit of the Thesis Defense and the Dissertation, but with substantial revisions. If someone other

  1. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  2. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  3. Abstract --Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities

    E-Print Network [OSTI]

    Thompson, Mary R.

    1 Abstract -- Securing a Grid environment presents a distinctive set of challenges. This paper the security requirements of Grids more completely. Index Terms -- Grid security, authentication, authorization, trust management, secure communication, security policy I. INTRODUCTION The goal of Grid Computing

  4. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  5. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  6. Disposal Activities and the Unique Waste Streams at the Nevada National Security Site (NNSS)

    SciTech Connect (OSTI)

    Arnold, P.

    2012-10-31

    This slide show documents waste disposal at the Nevada National Security Site. Topics covered include: radionuclide requirements for waste disposal; approved performance assessment (PA) for depleted uranium disposal; requirements; program approval; the Waste Acceptance Review Panel (WARP); description of the Radioactive Waste Acceptance Program (RWAP); facility evaluation; recent program accomplishments, nuclear facility safety changes; higher-activity waste stream disposal; and, large volume bulk waste streams.

  7. NEAR INFRARED IMAGING AND SPECTROSCOPY FOR BRAIN ACTIVITY

    E-Print Network [OSTI]

    Yazici, Birsen

    emphasis on the techology's potential in security and defense applications. Keywords: functional brain

  8. Sandia National Laboratories: National Security Missions: Internationa...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Defense Advanced Research Projects Agency, Unified Combatant Commands, National Nuclear Security Administration, and U.S. industry. Related Links Robotics Weapons-Force Center...

  9. NNSA: Securing Domestic Radioactive Material | National Nuclear...

    National Nuclear Security Administration (NNSA)

    established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify, secure, remove andor...

  10. Survey of US Department of Defense Manufacturing Technology Program activities applicable to civilian manufacturing industries. Final report

    SciTech Connect (OSTI)

    Azimi, S.A.; Conrad, J.L.; Reed, J.E.

    1985-03-01

    Intent of the survey was to identify and characterize activities potentially applicable to improving energy efficiency and overall productivity in the civilian manufacturing industries. The civilian industries emphasized were the general manufacturing industries (including fabricated metals, glass, machinery, paper, plastic, textile, and transportation equipment manufacturing) and the primary metals industries (including primary aluminum, copper, steel, and zinc production). The principal steps in the survey were to: develop overview taxonomies of the general manufacturing and primary metals industries as well as specific industry taxonomies; identify needs and opportunities for improving process energy efficiency and productivity in the industries included; identify federal programs, capabilities, and special technical expertise that might be relevant to industry's needs and opportunities; contact federal laboratories/facilities, through visits and other forms of inquiry; prepare formatted profiles (descriptions) potentially applicable work efforts; review findings with industry; and compile and evaluate industry responses.

  11. The Technical Specification for the Security Content

    E-Print Network [OSTI]

    Security Agency (NSA); Jeff Ito, Matt Kerr, Shane Shaffer, and Greg Witte of G2, Inc.; Andy Bove of Secure Thompson of Booz Allen Hamilton; Alan Peltzman of the Defense Information Systems Agency (DISA); and Jon

  12. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Imaging 201303150 Quantum-Authenticated Clock Signal 201303163 Extreme Filter for Low-Output Thermocouples in High EMI Environments 201403251 Tritium Stripping from FLiBe...

  13. defense programs | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLos AlamosSimulation Initiative798/%2ANewdefault Sign In Aboutprograms

  14. department of defense | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLos AlamosSimulation Initiative798/%2ANewdefaultDetermination of

  15. Guidance for generating legally defensible data

    SciTech Connect (OSTI)

    Rosecrance, A.; Kibler, L. [Core Labs., Houston, TX (United States). Analytical Chemistry Division

    1994-12-31

    The current emphasis on enforcement to achieve compliance with environmental regulations places increased demands on environmental professionals to generate legally defensible data. Since any environmental data may potentially be used in civil or criminal litigation, it must be suitable for use as admissible evidence. Although data cannot be guaranteed to be legally defensible because the proof of defensibility can only be determined in actual legal proceedings, there are steps that can be taken to enhance or increase the chances of admissibility. In order for data to be defensible and of known and documented quality, all sampling and analysis activities must meet applicable technical standards and be fully documented. Record keeping must be stressed throughout all sampling and analysis activities; failure to keep proper records is a common allegation in enforcement actions and a cause for lack of data defensibility. Though there is extensive reference documentation on the requirements for technical data quality, there is limited guidance available on data defensibility procedures. This paper provides guidance to assist field samplers, laboratory personnel, and project managers in planning for and generating legally defensible data. A example checklist that can be used in the planning and verification stages of the data generation process is provided.

  16. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  17. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  18. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  19. Unmanned and Unattended Response Capability for Homeland Defense

    SciTech Connect (OSTI)

    BENNETT, PHIL C.

    2002-11-01

    An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologies supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.

  20. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    SciTech Connect (OSTI)

    Farnham, Irene; Krenzien, Susan

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  1. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    SciTech Connect (OSTI)

    Krenzien, Susan; Farnham, Irene

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  2. China's Defense Electronics and Information Technology Industry

    E-Print Network [OSTI]

    RAGLAND, LeighAnn; MCREYNOLDS, Joe; GEARY, Debra

    2013-01-01

    2013 China’s Defense Electronics and Information Technologythe Chinese defense electronics and information technology (is moving the defense electronics and IT industry toward

  3. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  4. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  5. Defense on the Move: Ant-Based Cyber Defense

    SciTech Connect (OSTI)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  6. Second Line of Defense Spares Program Assessment

    SciTech Connect (OSTI)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  7. Trusted Grid Computing with Security Assurance and Resource Optimization

    E-Print Network [OSTI]

    Hwang, Kai

    Trusted Grid Computing with Security Assurance and Resource Optimization Shanshan Song and Kai The security of Grid sites can be enhanced by upgrading its intrusion defense capabilities against its previous security enforcement across multiple Grid resources sites. The design is aimed at securing Grid resources

  8. cybersecurity.pnnl.gov Securing the Nation's Critical Infrastructure

    E-Print Network [OSTI]

    : » Global Threat Intelligence » Electric Grid Security » Cyber Physical Systems » Bio-inspired Security and evaluating safeguards, we can provide a better defense against threats or adversaries. Electric Grid Security PNNL is leading the charge to secure a safer and more reliable grid. We are currently developing cyber

  9. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  10. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (Hutton - EM) Show All Cancels: DOE M 470.4-5, Personnel Security on Jul 27, 2011 DOE N 470.5, Implementation of Section 1072 of the National Defense Authorization Act...

  11. DP Awards | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Social Media DP Awards DP Awards Congrats to the Nat'l Security Campus teams that won Defense Program awards for work supporting stockpilestewardship http:1.usa.gov1rEZg2r...

  12. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  13. The "+Add" Model : a proposed strategic framework to create agile high performance aerospace and defense product support supply chains

    E-Print Network [OSTI]

    Riwes, Mina (Mina Diaa)

    2013-01-01

    The U.S. Aerospace and Defense industry is a vital organ for national security and humanitarian disaster response as well as an economic powerhouse creating jobs and driving exports. News headlines often stop at the sale ...

  14. Thesis / Dissertation Defense Announcement and Scheduling Form

    E-Print Network [OSTI]

    Hutcheon, James M.

    Thesis / Dissertation Defense Announcement and Scheduling Form Completed form must be received of the following: Thesis Defense Dissertation Defense Public Seminar Only Thesis Associate Dean Only Thesis/Dissertation/Seminar location and time listed above is: Confirmed

  15. Defense waste processing facility startup progress report

    SciTech Connect (OSTI)

    Iverson, D.C.; Elder, H.H.

    1992-07-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950`s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high level waste produced since operation began have been consolidated into 33 million gallons by evaporation at the waste tank farm. The Department of Energy has authorized the construction of the Defense Waste Processing Facility (DWPF) to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters, prior to emplacement in a federal repository. The DWPF is now mechanically complete and undergoing commissioning and run-in activities. Cold startup testing using simulated non-radioactive feeds is scheduled to begin in November 1992 with radioactive operation scheduled to begin in May 1994. While technical issues have been identified which can potentially affect DWPF operation, they are not expected to negatively impact the start of non-radioactive startup testing.

  16. Defense waste processing facility startup progress report

    SciTech Connect (OSTI)

    Iverson, D.C.; Elder, H.H.

    1992-01-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950's to produce nuclear materials in support of the national defense effort. About 83 million gallons of high level waste produced since operation began have been consolidated into 33 million gallons by evaporation at the waste tank farm. The Department of Energy has authorized the construction of the Defense Waste Processing Facility (DWPF) to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters, prior to emplacement in a federal repository. The DWPF is now mechanically complete and undergoing commissioning and run-in activities. Cold startup testing using simulated non-radioactive feeds is scheduled to begin in November 1992 with radioactive operation scheduled to begin in May 1994. While technical issues have been identified which can potentially affect DWPF operation, they are not expected to negatively impact the start of non-radioactive startup testing.

  17. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  18. OFFICE OF THE UNDER SECRETARY OF DEFENSE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301 -3000 ACQUISITION TECHNOLOGY AND LOGISTICS MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND...

  19. Active Network Approach to the Design of Secure Online Auction Systems Basem Shihada and Sampalli Srinivas

    E-Print Network [OSTI]

    Shihada, Basem

    authentication and authorization, bid validation and bid data encryption. This paper presents a novel approach and authorization, bid validation and bid data encryption. 1.1 Active Networks Active networking is a new networking} @cs.dal.ca ABSTRACT Online auction systems require high-speed bid transmission, large bandwidth

  20. Lessons Learned at the Nevada National Security Site Implementing the EFCOG Activity-level Work Planning and Control Guide

    Broader source: Energy.gov [DOE]

    Slide Presentation by Steele Coddington, Work Planning Manager, National Security Technologies, Nevada National Security Site. Lessons Learned Implementing Work Planning & Control. 6 Step Process for improving WP&C.

  1. Toward directed energy planetary defense

    E-Print Network [OSTI]

    Lubin, Philip

    Asteroids and comets that cross Earth’s orbit pose a credible risk of impact, with potentially severe disturbances to Earth and society. We propose an orbital planetary defense system capable of heating the surface of ...

  2. SUSTAINABILITY REPORTING NATURAL RESOURCES DEFENSE

    E-Print Network [OSTI]

    Qian, Ning

    SUSTAINABILITY REPORTING AND THE NATURAL RESOURCES DEFENSE COUNCIL AUGUST 2012 Capstone Team RELEVANCE/CONTEXT 4 HISTORY OF SUSTAINABILITY REPORTING 4 ORGANIZATIONAL PROFILE 7 METHODOLOGY 8 FINDINGS AND DISCUSSION 11 FINDINGS FROM INTERVIEWS 11 SUSTAINABILITY FRAMEWORK ASSESSMENT 12

  3. Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors

    E-Print Network [OSTI]

    Schlesinger, Adam Ian

    2005-01-01

    The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or ...

  4. SIGS Departments and Centers Department of National Security Affairs

    E-Print Network [OSTI]

    SIGS Departments and Centers Department of National Security Affairs Defense Resources Management on inter- national relations and regional security, and to meet the needs of the nation and our interna faculty and students develop programs in anticipation of national security needs. It's clear that SIGS

  5. Potential Collaborative Research topics with Korea’s Agency for Defense Development

    SciTech Connect (OSTI)

    Farrar, Charles R.; Todd, Michael D.

    2012-08-23

    This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involved the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.

  6. Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1

    E-Print Network [OSTI]

    Chen, Li-Chiou

    Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

  7. Shielding and Securing Integrated Circuits with Sensors Davood Shahrjerdi

    E-Print Network [OSTI]

    Shielding and Securing Integrated Circuits with Sensors Davood Shahrjerdi , Jeyavijayan Rajendran Defense (SHIELD) is envisioned to en- able advanced supply chain hardware authentication and tracing capabilities. The suggested SHIELD is expected to be a ultra- lower power, minuscule electronic component

  8. Toward a defense-dominated world

    SciTech Connect (OSTI)

    Wood, L.

    1993-08-01

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  9. China’s Defense Electronics Industry: Innovation, Adaptation, and Espionage

    E-Print Network [OSTI]

    Mulvenon, James; Luce, Matthew

    2010-01-01

    2010 China’s Defense Electronics Industry: Innovation,of the Chinese defense electronics sector can be attributedAdvanced defense electronics components and systems play a

  10. 5th Defense Renewable Energy Summit

    Office of Energy Efficiency and Renewable Energy (EERE)

    The 5th Defense Renewable Energy Summit brings together U.S. Department of Defense (DOD) and military decision-makers with renewable energy developers, utilities, and leading financiers to...

  11. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygenLaboratoryInnovationEmployee &and Assessments Programs

  12. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygenLaboratoryInnovationEmployee &and Assessments

  13. 2013 NNSA Defense Programs Science Council | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr |of energyvision

  14. 2015 NNSA Defense Programs Science Council | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr |of

  15. Defense Programs lecture series continue | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National/%2A en| National NuclearPRODUCTION

  16. Defense Secretary Chuck Hagel visits Sandia | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National/%2A en| National

  17. NPO recognized by Defense Programs | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session | NationalhitsStewardshipdoes it

  18. Office of Defense Nuclear Nonproliferation | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session

  19. NA 70 - Associate Administrator for Defense Nuclear Security | National

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 2012 Guidance for HighNational

  20. second line of defense | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m mrofoxschool |14thSECA3620092011second

  1. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque Albuquerque Housing Education RecreationLong-termFacebook

  2. Control Systems Cyber Security: Defense in Depth Strategies | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-in electric vehicle (PEV)Day-June2012 | Department ofEnergyBPD

  3. Doctoral Defense "Feasibility Study of High Performance Cutoff Walls for

    E-Print Network [OSTI]

    Kamat, Vineet R.

    for a candidate ECC mix. Also, revisions to existing levee seismic design guidelines are proposed, basedDoctoral Defense "Feasibility Study of High Performance Cutoff Walls for Levees in Seismic Regions state or length of their cutoff walls, and 2) seismic activity poses serious risks to many existing

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  5. Pollution Attack Defense for Coding Based Sensor Levente Buttyan, Laszlo Czap, Istvan Vajda

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    Pollution Attack Defense for Coding Based Sensor Storage Levente Butty´an, L´aszl´o Czap, Istv to make network coding based storage secure against pollution attacks in sensor networks. The approach], [12], [13]. We present a scheme that resists pollution attacks, meaning that our scheme makes possible

  6. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  7. THESIS DEFENSE COMMITTEE FORM Mentor:Department

    E-Print Network [OSTI]

    Emmons, Scott

    THESIS DEFENSE COMMITTEE FORM Student: Mentor:Department: Thesis Seminar Date: 2. 1 be submitted to the Graduate Office at least 2 months prior to the Defense date. § The thesis defense seminar announcement and full CV must be submitted together with this form. Check if Collaborator Attended Thesis

  8. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  9. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-24

    Establishes requirements to ensure that individuals are processed for, granted, and retain a DOE access authorization only when required. DOE N 251.47, dated 08/14/02, extends this directive until 05/14/03. Cancels DOE 472.1A and DOE 472.1 Chg 1.

  10. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-05

    Establishes requirements to ensure that individuals are processed for, granted, and maintain a DOE access authorization only when their official duties require such access. Cancels DOE O 472.1

  11. Transportation Security Rulemaking Activities

    Broader source: Energy.gov [DOE]

    Presentation made by R. Clyde Ragland for the NTSF annual meeting held from May 14-16, 2013 in Buffalo, NY.

  12. Mobile Malware Propagation and Defense

    E-Print Network [OSTI]

    Zyba, Gjergji

    Privacy in Smartphones and Mobile Devices (SPSM), pages 3–directly by the mobile devices, and that this difference isMcA] McAfee. Securing Mobile Devices: Present and Future.

  13. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

    2014-09-30

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closely related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.

  14. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATIONOperationsDefenseSNL SECURITY

  15. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  16. A Historical Evaluation of the U16a Tunnel, Nevada National Security Site, Nye County, Nevada Volume 2

    SciTech Connect (OSTI)

    Jones, Roberrt C [DRI; Drollinger, Harold [DRI

    2013-06-01

    This report presents a historical evaluation of the U16a Tunnel on the Nevada National Security Site in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office and the U.S. Department of Defense, Defense Threat Reduction Agency. The U16a Tunnel was used for underground nuclear weapons effects tests in Shoshone Mountain in Area 16 of the Nevada National Security Site. Six nuclear tests were conducted in the U16a Tunnel from 1962 to 1971. These tests are Marshmallow, Gum Drop, Double Play, Ming Vase, Diamond Dust, and Diamond Mine. The U.S. Department of Defense Threat Reduction Agency, with participation from Lawrence Livermore National Laboratory and Las Alamos National Laboratory, sponsored the tests. Fifteen high explosives tests were also conducted at the tunnel. Two were calibration tests during nuclear testing and the remaining were U.S. Department of Defense, Defense Threat Reduction Agency tunnel defeat tests. The U16a Tunnel complex is on the top and slopes of Shoshone Mountain, encompassing an area of approximately 16.7 hectares (41.1 acres). Major modifications to the landscape are a result of three principal activities, road construction and maintenance, mining activities related to development of the tunnel complex, and site preparation for activities related to testing. Forty-seven cultural features were recorded at the portal and on the slopes of Shoshone Mountain. At the portal area, features relate to the mining, construction, testing, and general every day operational support activities within the tunnel. These include concrete foundations for buildings, equipment pads, and rail lines. Features on the slopes above the tunnel relate to tunnel ventilation, borehole drilling, and data recording. Feature types include soil-covered bunkers, concrete foundations, instrument cable holes, drill holes, and ventilation shafts. The U16a Tunnel complex is eligible to the National Register of Historic Places under criteria a and c, consideration g of 36 CFR Part 60.4 as a historic landscape. Scientific research conducted at the tunnel has made significant contributions to the broad patterns of our history, particularly in regard to the Cold War era that was characterized by competing social, economic, and political ideologies between the former Soviet Union and the United States. The tunnel also possesses distinctive construction and engineering methods for conducting underground nuclear tests. The Desert Research Institute recommends that the U16a Tunnel area be left in place in its current condition and that the U16a Tunnel historic landscape be included in the Nevada National Security Site monitoring program and monitored on a regular basis.

  17. A Historical Evaluation of the U16a Tunnel, Nevada National Security Site, Nye County, Nevada Volume 1

    SciTech Connect (OSTI)

    Jones, robert C; Drollinger, Harold; Bullard, Thomas F; Ashbaugh, Laurence J; Griffin, Wayne R

    2013-06-01

    This report presents a historical evaluation of the U16a Tunnel on the Nevada National Security Site in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office and the U.S. Department of Defense, Defense Threat Reduction Agency. The U16a Tunnel was used for underground nuclear weapons effects tests in Shoshone Mountain in Area 16 of the Nevada National Security Site. Six nuclear tests were conducted in the U16a Tunnel from 1962 to 1971. These tests are Marshmallow, Gum Drop, Double Play, Ming Vase, Diamond Dust, and Diamond Mine. The U.S. Department of Defense Threat Reduction Agency, with participation from Lawrence Livermore National Laboratory and Las Alamos National Laboratory, sponsored the tests. Fifteen high explosives tests were also conducted at the tunnel. Two were calibration tests during nuclear testing and the remaining were U.S. Department of Defense, Defense Threat Reduction Agency tunnel defeat tests. The U16a Tunnel complex is on the top and slopes of Shoshone Mountain, encompassing an area of approximately 16.7 hectares (41.1 acres). Major modifications to the landscape are a result of three principal activities, road construction and maintenance, mining activities related to development of the tunnel complex, and site preparation for activities related to testing. Forty-seven cultural features were recorded at the portal and on the slopes of Shoshone Mountain. At the portal area, features relate to the mining, construction, testing, and general every day operational support activities within the tunnel. These include concrete foundations for buildings, equipment pads, and rail lines. Features on the slopes above the tunnel relate to tunnel ventilation, borehole drilling, and data recording. Feature types include soil-covered bunkers, concrete foundations, instrument cable holes, drill holes, and ventilation shafts. The U16a Tunnel complex is eligible to the National Register of Historic Places under criteria a and c, consideration g of 36 CFR Part 60.4 as a historic landscape. Scientific research conducted at the tunnel has made significant contributions to the broad patterns of our history, particularly in regard to the Cold War era that was characterized by competing social, economic, and political ideologies between the former Soviet Union and the United States. The tunnel also possesses distinctive construction and engineering methods for conducting underground nuclear tests. The Desert Research Institute recommends that the U16a Tunnel area be left in place in its current condition and that the U16a Tunnel historic landscape be included in the Nevada National Security Site monitoring program and monitored on a regular basis.

  18. National Center for Nuclear Security: The Nuclear Forensics Project (F2012)

    SciTech Connect (OSTI)

    Klingensmith, A. L.

    2012-03-21

    These presentation visuals introduce the National Center for Nuclear Security. Its chartered mission is to enhance the Nation’s verification and detection capabilities in support of nuclear arms control and nonproliferation through R&D activities at the NNSS. It has three focus areas: Treaty Verification Technologies, Nonproliferation Technologies, and Technical Nuclear Forensics. The objectives of nuclear forensics are to reduce uncertainty in the nuclear forensics process & improve the scientific defensibility of nuclear forensics conclusions when applied to nearsurface nuclear detonations. Research is in four key areas: Nuclear Physics, Debris collection and analysis, Prompt diagnostics, and Radiochemistry.

  19. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  20. NNSA and Defense Nuclear Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on771/6/14 Contact: JanetSite |Customs | National Nuclearand Defense

  1. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    SciTech Connect (OSTI)

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  2. Security-Aware Resource Allocation in Clouds Saeed Al-Haj, Ehab Al-Shaer

    E-Print Network [OSTI]

    Wang, Yongge

    Security-Aware Resource Allocation in Clouds Saeed Al-Haj, Ehab Al-Shaer Department of Software enforcement of defense-in-depth for cloud VMs by determining (1) the grouping of VMs into security groups in reducing risk and improving manageability of security configurations for the cloud VMs. I. INTRODUCTION

  3. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  4. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  5. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    played an active role in implementation planning for the Comprehensive National Cyber Security InitiativeComputer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act

  6. Defense Experimentation and Stockpile Stewardship

    SciTech Connect (OSTI)

    None

    2014-10-28

    A primary mission of the site is to help ensure that the nation's nuclear weapon stockpile remains safe, secure and reliable. The stockpile stewardship program, working with the national weapons laboratories conducts a wide range of experiments using advanced diagnostic technologies, many of which were developed right here at the NNSS.

  7. Defense Experimentation and Stockpile Stewardship

    ScienceCinema (OSTI)

    None

    2015-01-07

    A primary mission of the site is to help ensure that the nation's nuclear weapon stockpile remains safe, secure and reliable. The stockpile stewardship program, working with the national weapons laboratories conducts a wide range of experiments using advanced diagnostic technologies, many of which were developed right here at the NNSS.

  8. Defense Innovation and Industrialization in South Korea

    E-Print Network [OSTI]

    Moon, Chung-in; Paek, Jae-Ok

    2010-01-01

    September 2010 Defense Innovation and Industrialization inby tracing the stages of innovation. We also delineate a settransformation. The Study of Innovation and Technology in

  9. Dynamic defense workshop : from research to practice.

    SciTech Connect (OSTI)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason J.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  10. Foundations of a defense digital platform : business systems governance in the Department of Defense

    E-Print Network [OSTI]

    Ziegler, Dustin P

    2012-01-01

    In 2010, the United States Department of Defense (DoD) spent more than $35 billion on information systems development and sustainment, with nearly $7 billion to defense business systems investments alone. It is not surprising ...

  11. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  12. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies

    SciTech Connect (OSTI)

    Fink, Glenn A.; Oehmen, Christopher S.

    2012-09-01

    This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.

  13. Nevada National Security Site Radiological Control Manual

    SciTech Connect (OSTI)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of low-level radioactive waste and the handling of radioactive sources. Remediation of contaminated land areas may also result in radiological exposures.

  14. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access technology security incident. A standard Universitywide approach to information security is important the Information Technology Services Office has completed its investigation and authorizes such activity. 3

  15. A quantitative man-machine model for cyber security efficiency analysis 

    E-Print Network [OSTI]

    Jung, Sung-Oh

    2007-04-25

    Quality (TWQ). The machine component is composed of variables such as traffic volume and the amount of downtime. M3 enables the analysis of intrusion detection and incident response process efficiency, i.e., security defense team performance. With data...

  16. Report on Comprehensive Examination/Thesis Defense Name: ____________________________________________________________________________________________________________

    E-Print Network [OSTI]

    Hutcheon, James M.

    Report on Comprehensive Examination/Thesis Defense Name: _______________________________ Major ________________________________________ REPORT COMPREHENSIVE/TERMINAL EXAM THESIS DEFENSE Pass of classes for the term during which the Comprehensive Exam/Thesis defense is taken. Return to: College

  17. National Defense Authorization Act for Fiscal Year 1993 (PL 102...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) Section 3162 of the National Defense...

  18. The State of U.S. Defense Innovation

    E-Print Network [OSTI]

    ROSS, Andrew L.

    2014-01-01

    IGCC Defense Innovation Briefs January 2014 The State ofU.S. Defense Innovation Andrew L. ROSS University of Newwounds, U.S. defense innovation—whether technologi- cal,

  19. National cyber defense high performance computing and analysis : concepts, planning and roadmap.

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  20. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 10, OCTOBER 2007 1 Distance-Bounding Based Defense Against

    E-Print Network [OSTI]

    Wu, Dapeng Oliver

    -Bounding Based Defense Against Relay Attacks in Wireless Networks Caimu Tang, Member, IEEE, and Dapeng Oliver Wu invulnerable to the relay attack. We propose to use the order statistic for the detection of relay attackers outlier test. I. INTRODUCTION RECENT years have witnessed the urgent needs to secure networks of low power

  1. SUBJECT: Sustainable Design and Development Policy Update m. Memorandum, Office of the Under Secretary of Defense, 19 Jan 2010,

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Section 438 of the Energy Independence and Security Act. n. Memorandum, ASA(IE&E), 24 Aug 2012, subject of the Under Secretary of Defense, 19 Jan 2010, subject: DoD Implementation of Storm Water Requirements under, subject: Exterior Lighting Technologies Policy. p. Memorandum, ASA(IE&E), 20 Dec 2012, subject: Water Goal

  2. Linton Brooks Assumes Post as Deputy Administrator for NNSA Defense...

    National Nuclear Security Administration (NNSA)

    Administrator for NNSA Defense Nuclear Nonproliferation Office Press Release Oct 30, 2001 Linton Brooks Assumes Post as Deputy Administrator for NNSA Defense Nuclear...

  3. Departments of Energy, Defense Partner to Install Fuel Cell Backup...

    Energy Savers [EERE]

    Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup...

  4. Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan, Departmental Representative to the DNFSB Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan,...

  5. The climate change and energy security nexus

    SciTech Connect (OSTI)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

  6. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  7. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  8. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Mobile Malware Propagation and Defense

    E-Print Network [OSTI]

    Zyba, Gjergji

    Cloner, the first personal computer virus that spread on thecomputer malware increasingly be- came a tool for for-profit illegal activities. Infected machines from viruses and

  10. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  11. COLLOQUIUM: Fusion Rockets for Planetary Defense | Princeton...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    December 9, 2015, 4:00pm to 5:30pm Colloquia MBG AUDITORIUM COLLOQUIUM: Fusion Rockets for Planetary Defense Dr. Glen Wurden Los Alamos National Laboratory Colloquium Committee:...

  12. Doctoral Defense "Thermal-hydro-mechanical model

    E-Print Network [OSTI]

    Kamat, Vineet R.

    Doctoral Defense "Thermal-hydro-mechanical model for freezing and thawing soils" Yao Zhang Date been implemented in a finite element system, with a thermal-hydro- mechanical framework being used

  13. Escape & Defense I. Interactions with predators

    E-Print Network [OSTI]

    Dever, Jennifer A.

    - threatening defense mechanisms (toxins) Chinese fire-bellied toad see fig. 11.6 Unken reflex #12;4 from Brodie & Janzen, 1995 Plastic snake replicas were used to demonstrate that free-ranging avian predators generalize

  14. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATIONOperationsDefenseSNL SECURITY CONTACTS

  15. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  16. An approach to determine a defensible spent fuel ratio.

    SciTech Connect (OSTI)

    Durbin, Samuel G.; Lindgren, Eric Richard

    2014-03-01

    Sabotage of spent nuclear fuel casks remains a concern nearly forty years after attacks against shipment casks were first analyzed and has a renewed relevance in the post-9/11 environment. A limited number of full-scale tests and supporting efforts using surrogate materials, typically depleted uranium dioxide (DUO2), have been conducted in the interim to more definitively determine the source term from these postulated events. In all the previous studies, the postulated attack of greatest interest was by a conical shape charge (CSC) that focuses the explosive energy much more efficiently than bulk explosives. However, the validity of these large-scale results remain in question due to the lack of a defensible Spent Fuel Ratio (SFR), defined as the amount of respirable aerosol generated by an attack on a mass of spent fuel compared to that of an otherwise identical DUO2 surrogate. Previous attempts to define the SFR have resulted in estimates ranging from 0.42 to 12 and include suboptimal experimental techniques and data comparisons. Different researchers have suggested using SFR values of 3 to 5.6. Sound technical arguments exist that the SFR does not exceed a value of unity. A defensible determination of the SFR in this lower range would greatly reduce the calculated risk associated with the transport and dry storage of spent nuclear fuel. Currently, Oak Ridge National Laboratory (ORNL) is in possession of several samples of spent nuclear fuel (SNF) that were used in the original SFR studies in the 1980's and were intended for use in a modern effort at Sandia National Laboratories (SNL) in the 2000's. A portion of these samples are being used for a variety of research efforts. However, the entirety of SNF samples at ORNL is scheduled for disposition at the Waste Isolation Pilot Plant (WIPP) by approximately the end of 2015. If a defensible SFR is to be determined for use in storage and transportation security analyses, the need to begin this effort is urgent in order to secure the only known available SNF samples with a clearly defined path to disposal.

  17. Developing an institutional strategy for transporting defense transuranic waste materials

    SciTech Connect (OSTI)

    Guerrero, J.V.; Kresny, H.S.

    1986-01-01

    In late 1988, the US Department of Energy (DOE) expects to begin emplacing transuranic waste materials in the Waste Isolation Pilot Plant (WIPP), an R and D facility to demonstrate the safe disposal of radioactive wastes resulting from defense program activities. Transuranic wastes are production-related materials, e.g., clothes, rags, tools, and similar items. These materials are contaminated with alpha-emitting transuranium radionuclides with half-lives of > 20 yr and concentrations > 100 nCi/g. Much of the institutional groundwork has been done with local communities and the State of New Mexico on the siting and construction of the facility. A key to the success of the emplacement demonstration, however, will be a qualified transportation system together with institutional acceptance of the proposed shipments. The DOE's Defense Transuranic Waste Program, and its contractors, has lead responsibility for achieving this goal. The Joint Integration Office (JIO) of the DOE, located in Albuquerque, New Mexico, is taking the lead in implementing an integrated strategy for assessing nationwide institutional concerns over transportation of defense transuranic wastes and in developing ways to resolve or mitigate these concerns. Parallel prototype programs are under way to introduce both the new packaging systems and the institutional strategy to interested publics and organizations.

  18. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  19. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  20. Interim Closure Activities at Corrective Action Unit 114: Area 25 EMAD Facility, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    Boehlecke, R. F.

    2011-10-24

    This letter report documents interim activities that have been completed at CAU 114 to support ongoing access and generate information necessary to plan future closure activities. General housekeeping and cleanup of debris was conducted in the EMAD yard, cold bays, support areas of Building 3900, and postmortem cell tunnel area of the hot bay. All non-asbestos ceiling tiles and loose and broken non-friable asbestos floor tiles were removed from support galleries and office areas. Non-radiologically contaminated piping and equipment in the cold areas of the building and in the two 120-ton locomotives in the yard were tapped, characterized, drained, and verified free of contents.

  1. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  2. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  3. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  4. Security and Privacy-Enhancing Multicloud Architectures

    E-Print Network [OSTI]

    Sandhu, Ravi

    activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues, the cloud paradigm comes with a new set of unique features, which open the path toward security merits by making use of multiple distinct clouds simultaneously. Various distinct architectures

  5. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  6. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  8. Department of Defense Nuclear/Biological/Chemical (NBC) defense: Annual report to Congress. Annual report

    SciTech Connect (OSTI)

    1997-03-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law No. 103-160, Section 1703 (50 USC 1522), mandates the consolidation of all Department of Defense chemical and biological (CB) defense programs. As part of this consolidation, the Secretary of Defense is directed to submit an assessment and a description of plans to improve readiness to survive, fight and win in a nuclear, biological and chemical (NBC) contaminated environment. This report contains modernization plan summaries that highlight the Department`s approach to improve current NBC defense equipment and resolve current shortcomings in the program. 50 USC 1522 has been a critical tool for ensuring the elimination of redundant programs, focusing funds on program priorities, and enhancing readiness. While many problems remain in consolidating the NBC defense program, significant and measurable progress has been made in fulfilling the letter and the intent of Congress. There has been a consolidation of the research, development and acquisition organizations for NBC defense, including the consolidation of all research, development, test and evaluation, and procurement funds for NBC defense. There has been significant progress in the development of Joint training, doctrine development, and requirements generation. Modernization and technology plans have been developed that will begin to show real savings and true consolidation of efforts among the Services. The fruits of these plans will be realized over the next few years as the public law has time to take effect and will result in the increased readiness of U.S. forces. The objective of the Department of Defense (DoD) NBC defense program is to enable our forces to survive, fight, and win in NBC warfare environments. Numerous rapidly changing factors continually influence the program and its management.

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  11. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  12. Ocean Thermal Energy Conversion (OTEC) A New Secure Renewable Energy Source

    E-Print Network [OSTI]

    Ocean Thermal Energy Conversion (OTEC) A New Secure Renewable Energy Source For Defense load renewable energy system to achieve energy security for DoD facilities and bases Schofield Barracks and Commercial Applications 1 Dr. Ted Johnson Director of Alternative Energy Programs Development Lockheed Martin

  13. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  14. Computer Security Tips for Cyber Monday What could be more convenient than shopping on-line right from your laptop, desktop or mobile

    E-Print Network [OSTI]

    Emmons, Scott

    1 Computer Security Tips for Cyber Monday What could be more convenient than shopping on-line right victim. Here are some "cyber" security tips that can help you to avoid some of these inherent risks when around, you'd still be quite prudent to adopt an approach to cyber security akin to the "defensive

  15. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  16. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  17. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  18. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  19. Doctoral Defense "Structural reliability assessment under fire"

    E-Print Network [OSTI]

    Kamat, Vineet R.

    Doctoral Defense "Structural reliability assessment under fire" Qianru Guo Date: December 11, 2014 Engineering Structural safety under fire has received significant attention in recent years. Current approaches to structural fire design are based on prescriptive codes that emphasize insulation of steel

  20. SOIL, WATER, AND CLIMATE MS DEFENSE SEMINAR

    E-Print Network [OSTI]

    Minnesota, University of

    SOIL, WATER, AND CLIMATE MS DEFENSE SEMINAR Case study for Determining the Presence of the Moorsh- Forming Process in Drained Peat (Markey Muck) Soils, Anoka County, Minnesota, USA by Allyz Kramer Polacsek Soil Science Advisor: Jay Bell Friday, May 15, 2009 9:00 ­ 10:00 am S415 Soil Science Building ABSTRACT

  1. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    SciTech Connect (OSTI)

    Anderson, E.; Antkowiak, M.; Butt, R.; Davis, J.; Dean, J.; Hillesheim, M.; Hotchkiss, E.; Hunsberger, R.; Kandt, A.; Lund, J.; Massey, K.; Robichaud, R.; Stafford, B.; Visser, C.

    2011-08-01

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report is the deliverable for these tasks.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  5. Successful Characterization Strategies for the Active High Risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164

    SciTech Connect (OSTI)

    Birchfield, Joseph W. III [Link Technologies (United States); Albrecht, Linda [Alliant Corporation (United States)

    2012-07-01

    Building 9201-5 (Alpha 5) was completed in May 1944 and served as a production facility for National Nuclear Security Administration (NNSA) Y-12 Weapons Plant. During the Manhattan Project, it functioned as a uranium enrichment facility. The facility was renovated and altered over the years, converting the calutrons to support other missions. Alpha 5 consists of 4 floors and a basement measuring approximately 600,000 square feet. The facility contains various pieces of equipment remaining from legacy operations. A significant amount (approximately 200,000 kgs) of mercury (Hg) has been spilled in the facility over the operational history of the building. To further complicate matters, beryllium (Be) contamination in 9201-5 is found throughout approximately sixty percent of the facility. Concentrations varying from very low (< 0.2 micrograms (?g)/100 cm{sup 2}) to areas where concentrations are relatively high, approximately 600 ?g/100 cm{sup 2}, in regulated beryllium areas. The primary site related contaminants (SRCs) for the waste in this facility are enriched uranium, depleted uranium, beryllium and mercury. This facility represents the highest environmental risk for DOE-ORO EM and NNSA at Y-12 and must be quickly addressed to minimize impacts to future Y-12 missions, as well as human health and the environment. As part of the American Recovery and Reinvestment Act (ARRA), approximately 700,000 cubic feet of legacy material was removed in 2010 and 2011. In addition, characterization of the 9201-5 facility was scheduled in the winter and spring of 2011. This activity was initiated in January 2011 and was completed in July 2011. Heavy schedule pressure was further complicated by the fact that this building has active utility, security and process systems. Given these complex variables, a unique, out of the box characterization strategy was forged in an effort to bound radiological and chemical contaminants, as well as providing the appropriate level of quality to ensure that this data could be used to develop waste profiles when deactivation, decontamination and demolition (D and D) activities are authorized at a future date. The characterization strategy involved a hybrid model of statistically-based and biased sampling events. To achieve the desired results, traditional intrusive sampling and laboratory analysis, as well as a number of field-based characterization methodologies (e.g., X-ray Fluorescence [XRF], Lumex and Non-Destructive Assay [NDA]) were utilized. Results were captured and synthesized into meaningful, usable conclusions in a facility characterization report that will more accurately aid D and D cost estimates for future remedial actions. This massive characterization campaign involved over 1,200 separate sample locations using 4 separate characterization methods and was successfully completed to meet a performance-based milestone within 8 months of initiation. (authors)

  6. Predator induced defenses in prey with diverse predators 

    E-Print Network [OSTI]

    Garza, Mark Isaac

    2006-04-12

    Phenotypic plasticity is an environmentally based change in phenotype and can be adaptive. Often, the change in an organism's phenotype is induced by the presence of a predator and serves as a defense against that predator. Defensive phenotypes...

  7. The Defense Logistics Agency, Hydrogen-Powered Forklift Test...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief This presentation by Leo Grassilli...

  8. Legacy Management Work Progresses on Defense-Related Uranium...

    Broader source: Energy.gov (indexed) [DOE]

    (LM) continues to work on a report to Congress regarding defense-related legacy uranium mines. LM was directed by the U.S. Congress in the National Defense Authorization Act...

  9. The Defense Logistics Agency, Hydrogen-Powered Forklift Test...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief This presentation by Leo Grassilli focuses...

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  12. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  13. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  14. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  15. Available 45 MILITARY TECHNOLOGY, WEAPONRY, AND NATIONAL DEFENSE...

    Office of Scientific and Technical Information (OSTI)

    NATIONAL DEFENSE; CHEMICAL EXPLOSIONS; SHOCK WAVES; INDUSTRIAL PLANTS; ACCIDENTS; SAFETY; MECHANICAL STRUCTURES; BLAST EFFECTS; DYNAMIC LOADS; BUILDINGS; CHEMICAL EXPLOSIVES;...

  16. THE DEPARTMENT OF DEFENSE HIGH LEVEL ARCHITECTURE Judith S. Dahmann

    E-Print Network [OSTI]

    , recommended the architecture to the Under Secretary of Defense (Acquisition and Technology) for approvalTHE DEPARTMENT OF DEFENSE HIGH LEVEL ARCHITECTURE Judith S. Dahmann Defense Modeling and Simulation Institute of Technology Atlanta, GA 30332-0280 Richard M. Weatherly The MITRE Corporation 7525 Colshire

  17. The changing face of Hanford security 1990--1994

    SciTech Connect (OSTI)

    Thielman, J.

    1995-12-01

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almost literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.

  18. Microsoft Word - Defense Science Quarterly - 2july09 - FINAL.doc

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclearH-canyon |I6Summer 2009 Defense

  19. Our Solution Securing Grid Data Transfer Services with

    E-Print Network [OSTI]

    Motivation Our Solution Summary Securing Grid Data Transfer Services with Active Network Portals by in part by the NSF under award numbers EIA 9911099 and CNS 0454298 Michael R. Head Securing Grid Data/Implementation Experiments Results Michael R. Head Securing Grid Data Transfer Services with Active Network Portals #12

  20. Transmission Line Security Monitor: Final Report

    SciTech Connect (OSTI)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  1. Office of Defense Nuclear Nonproliferation | National Nuclear...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  2. Classes of defense for computer systems

    E-Print Network [OSTI]

    Wolff, Josephine Charlotte Paulina

    2015-01-01

    Computer security incidents often involve attackers acquiring a complex sequence of escalating capabilities and executing those capabilities across a range of different intermediary actors in order to achieve their ultimate ...

  3. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  4. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  6. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  7. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  8. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  9. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    SciTech Connect (OSTI)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  10. A cognitive and economic decision theory for examining cyber defense strategies.

    SciTech Connect (OSTI)

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  11. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  12. Department of Defense Nuclear/Biological/Chemical (NBC) warfare defense, annual report to Congress. Final report FY96

    SciTech Connect (OSTI)

    1996-04-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law No. 103-160, Section 1703, mandates the consolidation of all Department of Defense chemical and biological defense programs. As part of this consolidation, the Secretary of Defense is directed to submit an assessment and a description of plans to improve readiness to survive, fight and win in a chemically or biologically contaminated environment. This report contains modernizations plan summaries which highlight the Department`s approach to improve current NBC defense equipment and resolve current shortcomings in the program.

  13. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  14. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  15. Introduction Aim of the Paper Game Model Defense Mechanism 1 Defense Mechanism 2 Hidden Difficulty Puzzle Conclusions Game Theoretic Resistance to DoS Attacks Using

    E-Print Network [OSTI]

    Swift, Michael

    Introduction Aim of the Paper Game Model Defense Mechanism 1 Defense Mechanism 2 Hidden Difficulty Model Defense Mechanism 1 Defense Mechanism 2 Hidden Difficulty Puzzle Conclusions Outline 1 Introduction 2 Aim of the Paper 3 Game Model Player Actions Payoff Functions 4 Defense Mechanism 1

  16. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    SciTech Connect (OSTI)

    Price, D E; Durling, R L

    2005-10-10

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  19. Implementation plan for the Defense Nuclear Facilities Safety Board Recommendation 90-7. Revision 1

    SciTech Connect (OSTI)

    Borsheim, G.L.; Cash, R.J.; Dukelow, G.T.

    1992-12-01

    This document revises the original plan submitted in March 1991 for implementing the recommendations made by the Defense Nuclear Facilities Safety Board in their Recommendation 90-7 to the US Department of Energy. Recommendation 90-7 addresses safety issues of concern for 24 single-shell, high-level radioactive waste tanks containing ferrocyanide compounds at the Hanford Site. The waste in these tanks is a potential safety concern because, under certain conditions involving elevated temperatures and low concentrations of nonparticipating diluents, ferrocyanide compounds in the presence of oxidizing materials can undergo a runaway (propagating) chemical reaction. This document describes those activities underway by the Hanford Site contractor responsible for waste tank safety that address each of the six parts of Defense Nuclear Facilities Safety Board Recommendation 90-7. This document also identifies the progress made on these activities since the beginning of the ferrocyanide safety program in September 1990. Revised schedules for planned activities are also included.

  20. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  1. New Lighting Technologies Demonstrated at Defense Commissaries

    SciTech Connect (OSTI)

    Parker, Steven A.; Konrade, Joseph; Shepherd III, E Carroll

    2008-10-02

    New and emerging lighting technologies, such as LEDs, can improve lighting quality while reducing maintenance and energy costs. The Defense Commissary Agency, with support from the Department of Energy's Federal Energy Management Program and the Pacific Northwest National Laboratory, demonstrsted the use of LED lighting in a large freezer storage room and fiber optic lighting in a series of verticial reach-in display freezer cases at the Fort George G. Meade Commissary. The LEDs resulted in an 85% reduction in lighting energy and a reduction in maintenance requirements. The fiber optic lighting system resulted in a 56% reduction in lighting energy.

  2. New Lighting Technologies Demonstrated at Defense Commissaries

    SciTech Connect (OSTI)

    Parker, Steven; Konrade, Joseph; Shepherd III, E Carroll

    2009-01-31

    New and emerging lighting technologies, such as LEDs, can improve lighting quality while reducing maintenance and energy costs. The Defense Commissary Agency, with support from the Department of Energy's Federal Energy Management Program and the Pacific Northwest National Laboratory, demonstrsted the use of LED lighting in a large freezer storage room and fiber optic lighting in a series of verticial reach-in display freezer cases at the Fort George G. Meade Commissary. The LEDs resulted in an 85% reduction in lighting energy and a reduction in maintenance requirements. The fiber optic lighting system resulted in a 56% reduction in lighting energy.

  3. Sandia Energy - Defense Waste Management Programs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen GenerationTechnologies |EducationChemicalContact UsDefense

  4. ARM - Defensive Shotgun - Remington 870 Operator's Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Comments? WeDatastreamstps Documentation DataDatastreamsxsacrcwrhiDatastreamsxsaprrhiAlaskaDefensive Shotgun -

  5. Environmental Defense Fund (EDF) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpA Jump to:Energy Tech Services LtdBancCreditDefense

  6. Statement on Defense Nuclear Nonproliferation and Naval Reactors Activities

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport forRetirement Plan | NationalSourcing

  7. Independent Activity Report, Defense Nuclear Facilities Safety Board Public

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nA Guide toIMPROVEMENT OF DESIGN CODES TOSummary Report

  8. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  9. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  10. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  11. Science and Technology Challenges for Homeland Security

    SciTech Connect (OSTI)

    Murray, C A

    2006-03-24

    Preventing and protecting against catastrophic terrorism is a complex and dynamic challenge. Small groups or individuals can use advanced technology to cause massive destruction, and the rapid pace of technology and ease of information dissemination continually gives terrorists new tools. A 100% defense is not possible. It's a numbers problem--there are simply too many possible targets to protect and too many potential attack scenarios and adversaries to defend against. However, science and technology (S&T) is a powerful force multiplier for defense. We must use S&T to get ahead of the game by making terrorist attacks more difficult to execute, more likely to be interdicted, and less devastating in terms of casualties, economic damage, or lasting disruption. Several S&T areas have potential to significantly enhance homeland security efforts with regard to detecting radiation, pathogens, explosives, and chemical signatures of weapons activities. All of these areas require interdisciplinary research and development (R&D), and many critically depend on advances in materials science. For example, the science of nuclear signatures lies at the core of efforts to develop enhanced radiation detection and nuclear attribution capabilities. Current radiation detectors require cryogenic cooling and are too bulky and expensive. Novel signatures of nuclear decay, new detector materials that provide high resolution at ambient temperatures, and new imaging detectors are needed. Such technologies will improve our ability to detect and locate small, distant, or moving sources and to discriminate threat materials from legitimate sources. A more complete understanding of isotopic ratios via secondary ion mass spectrometry (SIMS), NanoSIMS, or yet-to-be-developed technologies is required to elucidate critical characteristics of nuclear materials (e.g., isotopics, age, reprocessing) in order to identify their source and route history. S&T challenges abound in the biodefense arena as well. Improved biodetectors are needed--autonomous instruments that continuously monitor the environment for threat pathogens, promptly alert authorities in the event of a positive detection, and have an extremely low false alarm rate. Because many threat pathogens are endemic to various regions of the world, the natural microbial environment must be characterized so that background detections can be distinguished from a deliberate release. In addition, most current detection approaches require an a priori knowledge of the pathogens of concern and thus won't work in the face of a new, naturally occurring disease, such as a mutated avian influenza that effects humans, or a deliberately manipulated organism. Thus, we must move from species-specific detection to function-based detection based on a fundamental understanding of the mechanisms and genetic markers of infectivity, pathogenicity, antibiotic resistance, and other traits that distinguish a harmful organism from an innocuous one. Last but not least, new vaccines and treatments are needed, which in turn require in-depth understanding of cellular surfaces, protein folding, and myriad nano-bio aspects of host-pathogen interactions. Much attention is being devoted to countering weapons-of-mass-destruction terrorism, since Al-Qaeda and other terrorist groups have repeatedly stated their intention to acquire and use nuclear, chemical, or biological weapons. However, terrorists in Iraq and elsewhere continue to wreak havoc using improvised explosive devices. Thus, there is a pressing security need for better methods for detecting explosive materials and devices. Transformational S&T such as pulsed fast-neutron analysis or terahertz spectroscopy for material- and element-specific imaging offer the promise of greatly improved explosive detection. For bioscience-based approaches, the development of highly multiplexed transducer arrays and molecular recognition methods that mimic biological systems would similarly provide the foundation for vastly improved capabilities. Likewise, new materials an

  12. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  13. National Defense Authorization Act for Fiscal Year 2000 § 3164...

    Broader source: Energy.gov (indexed) [DOE]

    Scope: Section 3164 of the National Defense Authorization Act for Fiscal Year 2000 implements a whistleblower protection program to ensure that covered individuals may...

  14. DOE weapons laboratories' contributions to the nation's defense technology base

    SciTech Connect (OSTI)

    Hecker, S.S.

    1988-04-01

    The question of how the Department of Energy (DOE) weapons laboratories can contribute to a stronger defense technology base is addressed in testimony before the Subcommittee on Defense Industry and Technology of the Senate Armed Services Committee. The importance of the defense technology base is described, the DOE technology base is also described, and some technology base management and institutional issues are discussed. Suggestions are given for promoting a more stable, long-term relationship between the DOE weapons laboratories and the Department of Defense. 12 refs., 2 figs.

  15. National Defense Authorization Act for Fiscal Year 2005, Information...

    Broader source: Energy.gov (indexed) [DOE]

    Section 3116 from "National Defense Authorization Act for Fiscal Year 2005" (Public Law 108-375 Oct. 28 2004) Transition20082009EMAdditionalMaterialMACopy.pdf PUBLIC LAW...

  16. NA 10 - Deputy Administrator for Defense Programs | National...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 10 - Deputy Administrator for Defense Programs NA 10 - Deputy Administrator for...

  17. NA 20 - Deputy Administrator for Defense Nuclear Nonproliferation...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 20 - Deputy Administrator for Defense ... NA 20 - Deputy Administrator for...

  18. Uncertainty, Risk Aversion, and Optimal Defense Against Interruptions in Supply

    E-Print Network [OSTI]

    MCGUIRE, MARTIN C

    2006-01-01

    defense, oil imports, and bio-energy technology. Yale Schoolenergy (e.g. MacAvoy , Ames, and Corridore, 2004) and bio-

  19. Analysis of engineering management characteristics employed in the defense industry

    E-Print Network [OSTI]

    Gutiérrez, Sara S. (Sara Sofia Gutiérrez Cervantes)

    2009-01-01

    An analysis of the engineering management characteristics present in companies in the defense industry was performed. These aspects include the organization characteristics of structure, hierarchy, and standards and ...

  20. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  1. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  2. 2003 U.S. Department of Energy Strategic Plan: Protecting National, Energy, and Economic Security with Advanced Science and Technology and Ensuring Environmental Cleanup

    SciTech Connect (OSTI)

    None,

    2003-09-30

    The Department of Energy contributes to the future of the Nation by ensuring energy security, maintaining the safety, security and reliability of the nuclear weapons stockpile, cleaning up the environment from the legacy of the Cold War, and developing innovations in science and technology. After 25 years in existence, the Department now operates 24 preeminent research laboratories and facilities and four power marketing administrations, and manages the environmental cleanup from 50 years of nuclear defense activities that impacted two million acres in communities across the country. The Department has an annual budget of about $23 billion and employs about 14,500 Federal and 100,000 contractor employees. The Department of Energy is principally a national security agency and all of its missions flow from this core mission to support national security. That is true not just today, but throughout the history of the agency. The origins of the Department can be traced to the Manhattan Project and the race to develop the atomic bomb during World War II. Following the war, Congress engaged in a vigorous and contentious debate over civilian versus military control of the atom. The Atomic Energy Act of 1946 settled the debate by creating the Atomic Energy Commission, which took over the Manhattan Project’s sprawling scientific and industrial complex.

  3. History of Hanford Site Defense Production (Brief)

    SciTech Connect (OSTI)

    GERBER, M S

    2001-02-01

    This paper acquaints the audience with the history of the Hanford Site, America's first full-scale defense plutonium production site. The paper includes the founding and basic operating history of the Hanford Site, including World War II construction and operations, three major postwar expansions (1947-55), the peak years of production (1956-63), production phase downs (1964-the present), a brief production spurt from 1984-86, the end of the Cold War, and the beginning of the waste cleanup mission. The paper also delineates historical waste practices and policies as they changed over the years at the Hanford Site, past efforts to chemically treat, ''fractionate,'' and/or immobilize Hanford's wastes, and resulting major waste legacies that remain today. This paper presents original, primary-source research into the waste history of the Hanford Site. Finally, the paper places the current Hanford Site waste remediation endeavors in the broad context of American and world history.

  4. Disused Radioactive Sources Secured in Georgia | National Nuclear...

    National Nuclear Security Administration (NNSA)

    disused high activity sources from the Institute of Radiobiology to a more secure storage facility. As part of NNSA's broader cooperative effort to help prevent nuclear and...

  5. Evaluation of the Los Alamos National Security Emergency Operations...

    Office of Environmental Management (EM)

    and Emergency Management Evaluations Activity Report for the Evaluation of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment...

  6. Thesis/Dissertation Defense Checklist Review the Graduation Deadlines

    E-Print Network [OSTI]

    Raina, Ramesh

    Thesis/Dissertation Defense Checklist Review the Graduation Deadlines Submit a Program of Study Advisor Consult your thesis/dissertation advisor to begin preparation for your defense. Be sure that you are aware of all departmental procedures and regulations that pertain to your thesis/dissertation and oral

  7. Costs and benefits of Daphnia defense against Chaoborus in nature

    E-Print Network [OSTI]

    Costs and benefits of Daphnia defense against Chaoborus in nature Wiebke J. Boeing, Björn Wissel, and Charles W. Ramcharan Abstract: To estimate costs and benefits of antipredator defenses in the Chaoborus) and the other nonresponsive (NRC) to Chaoborus kairomone, was estimated for each predator treatment. Cost

  8. EIS-0082: Defense Waste Processing Facility, Savannah River Plant

    Broader source: Energy.gov [DOE]

    The Office of Defense Waste and Byproducts Management developed this EIS to provide environmental input into both the selection of an appropriate strategy for the permanent disposal of the high-level radioactive waste currently stored at the Savannah River Plant (SRP) and the subsequent decision to construct and operate a Defense Waste Processing Facility at the SRP site.

  9. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  10. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  11. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  12. Interim Activities at Corrective Action Unit 114: Area 25 EMAD Facility, Nevada National Security Site, Nevada, for Fiscal Years 2012 and 2013

    SciTech Connect (OSTI)

    Silvas, A J

    2013-10-24

    This letter report documents interim activities that have been completed at CAU 114 in fiscal years 2012 and 2013.

  13. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect (OSTI)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  14. Reconfigurable LUT: Boon or Bane for Secure Applications Debapriya Basu Roy

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of reconfigurability and low-time to market have made FPGA an integral part of the semiconductor industry. FPGAs turn out to be a very economical solution in low to medium scale markets like defense, space, automotive and deploy it in security related applications. We propose several industry-relevant applic

  15. DOE, NREL Help DoD Enhance Energy Security (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-10-01

    This fact sheet gives an overview of the technical assistance provided by DOE/NREL to the Department of Defense to advance energy security. Specifically, the fact sheet describes the net zero energy project at the U.S. Marine Corps Air Station (MCAS) Miramar.

  16. Department of Defense Energy Security Initiatives ... 3 Prepared by the DoD Energy Security Task Force

    E-Print Network [OSTI]

    Azad, Abdul-Majeed

    of Energy Hydrogen Program Hydrogen Storage Solutions in Support ... 83 of DoD Warfighter Portable Power of Novel Power Sources for Advanced Munitions ... 31 Karen Amabile, Richard Dratler, Chuck McMullan, Hai Kreiger, Jeff Swank Army Research Lab Fuel Cell Vehicle Fleet and Hydrogen Infrastructure ... 41 at Hickam

  17. Second Line of Defense Spares Program

    SciTech Connect (OSTI)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

    2012-11-20

    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  18. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  19. Power Grid Defense Against Malicious Cascading Failure

    E-Print Network [OSTI]

    Shakarian, Paulo; Lindelauf, Roy

    2014-01-01

    An adversary looking to disrupt a power grid may look to target certain substations and sources of power generation to initiate a cascading failure that maximizes the number of customers without electricity. This is particularly an important concern when the enemy has the capability to launch cyber-attacks as practical concerns (i.e. avoiding disruption of service, presence of legacy systems, etc.) may hinder security. Hence, a defender can harden the security posture at certain power stations but may lack the time and resources to do this for the entire power grid. We model a power grid as a graph and introduce the cascading failure game in which both the defender and attacker choose a subset of power stations such as to minimize (maximize) the number of consumers having access to producers of power. We formalize problems for identifying both mixed and deterministic strategies for both players, prove complexity results under a variety of different scenarios, identify tractable cases, and develop algorithms f...

  20. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  1. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  2. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  3. Sequential Threat Detection for Harbor Defense: An X-ray Physics...

    Office of Scientific and Technical Information (OSTI)

    Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

  4. Higher Education and China’s Defense Science and Technology Establishment

    E-Print Network [OSTI]

    ALDERMAN, Daniel

    2015-01-01

    7 January 2015 Higher Education and China’s Defense Sciencetalented personnel. The education of China’s defense scienceits institutes of higher education are not better preparing

  5. China’s Defense Innovation System: Making the Wheels Spin

    E-Print Network [OSTI]

    Walsh, Kathleen A; Francis, Ed

    2011-01-01

    2011 China’s Defense Innovation System: Making the Wheelsis developing a defense innovation system (DIS) as part of aeffort to construct a national innovation system (NIS) that

  6. Rejuvenating the Chinese Defense Economy: Present Developments and Future Trends

    E-Print Network [OSTI]

    CHEUNG, Tai Ming

    2011-01-01

    2011 Rejuvenating the Chinese Defense Economy: Presentand future prospects of the Chinese defense economy. Fifteeneven accelerate, as long as the Chinese leadership remains

  7. Rejuvenating the Chinese Defense Economy: Present Developments and Future Trends

    E-Print Network [OSTI]

    CHEUNG, Tai Ming

    2011-01-01

    AND ENGINEERING TALENT The Chinese defense economy has aand engineering graduates to satisfy demand from both the civilian and defense economies,

  8. Fine-Grain Access Control for Securing Shared Resources in Computational Grids*

    E-Print Network [OSTI]

    Lee, Ruby B.

    Fine-Grain Access Control for Securing Shared Resources in Computational Grids* Abstract, grid environments, grid security, Unix accessmodel. providing an active enforcement of the security. Introduction Grid environments of the future will require an abil- ity to provide a secure execution

  9. Environmental management requirements/defensible costs project. Final report

    SciTech Connect (OSTI)

    1996-02-01

    Lockheed Idaho Technologies Company (LITCO) used a systems engineering approach to develop the first formal requirements baseline for Idaho National Engineering Laboratory (INEL) Environmental Management (EM) Programs. The recently signed Settlement Agreement with the State of Idaho (Batt Agreement), along with dramatically reduced EM funding targets from Department of Energy (DOE) headquarters, drove the immediacy of this effort. Programs have linked top-level requirements to work scope to cost estimates. All EM work, grouped by decision units, was scrubbed by INEL EM programs and by an independent {open_quotes}Murder Board.{close_quotes} Direct participation of upper level management from LITCO and the DOE-Idaho Operations Office ensured best information and decisions. The result is a scrubbed down, defensible budget tied to top-level requirements for use in the upcoming DOE-Headquarters` budget workout, the Internal Review Board, the FY98 Activity Data Sheets submittal, and preparation of the FY97 control accounts and out-year plans. In addition to the remarkable accomplishments during the past eight weeks, major issues were identified and documented and follow-on tasks are underway which will lead to further improvements in INEL EM program management.

  10. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    SciTech Connect (OSTI)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  11. Closure Report for Corrective Action Unit 116: Area 25 Test Cell C Facility, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2011-09-29

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 116, Area 25 Test Cell C Facility. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 [as amended March 2010]). CAU 116 consists of the following two Corrective Action Sites (CASs), located in Area 25 of the Nevada National Security Site: (1) CAS 25-23-20, Nuclear Furnace Piping and (2) CAS 25-41-05, Test Cell C Facility. CAS 25-41-05 consisted of Building 3210 and the attached concrete shield wall. CAS 25-23-20 consisted of the nuclear furnace piping and tanks. Closure activities began in January 2007 and were completed in August 2011. Activities were conducted according to Revision 1 of the Streamlined Approach for Environmental Restoration Plan for CAU 116 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2008). This CR provides documentation supporting the completed corrective actions and provides data confirming that closure objectives for CAU 116 were met. Site characterization data and process knowledge indicated that surface areas were radiologically contaminated above release limits and that regulated and/or hazardous wastes were present in the facility.

  12. Quarterly report on Defense Nuclear Facilities Safety Board Recommendation 90-7 for the period ending December 31, 1992

    SciTech Connect (OSTI)

    Cash, R.J.; Dukelow, G.T.; Forbes, C.J.

    1993-03-01

    This is the seventh quarterly report on the progress of activities addressing safety issues associated with Hanford Site high-level radioactive waste tanks that contain ferrocyanide compounds. In the presence of oxidizing materials, such as nitrates or nitrites, ferrocyanide can be made to explode in the laboratory by heating it to high temperatures [above 285{degrees}C (545{degrees}F)]. In the mid 1950s approximately 140 metric tons of ferrocyanide were added to 24 underground high-level radioactive waste tanks. An implementation plan (Cash 1991) responding to the Defense Nuclear Facilities Safety Board Recommendation 90-7 (FR 1990) was issued in March 1991 describing the activities that were planned and underway to address each of the six parts of Recommendation 90-7. A revision to the original plan was transmitted to US Department of Energy by Westinghouse Hanford Company in December 1992. Milestones completed this quarter are described in this report. Contents of this report include: Introduction; Defense Nuclear Facilities Safety Board Implementation Plan Task Activities (Defense Nuclear Facilities Safety Board Recommendation for enhanced temperature measurement, Recommendation for continuous temperature monitoring, Recommendation for cover gas monitoring, Recommendation for ferrocyanide waste characterization, Recommendation for chemical reaction studies, and Recommendation for emergency response planning); Schedules; and References. All actions recommended by the Defense Nuclear Facilities Safety Board for emergency planning by Hanford Site emergency preparedness organizations have been completed.

  13. Identifying enterprise leverage points in Defense Acquisition Program performance

    E-Print Network [OSTI]

    Wirthlin, Joseph Robert, 1970-

    2009-01-01

    Large, complex systems development programs in the Department of Defense are finding it more difficult to deliver desired capabilities to the end user on time and on budget than ever before. Evidence exists that almost all ...

  14. Department of Defense Representatives Visit Hanford to Benchmark Safety

    Broader source: Energy.gov [DOE]

    RICHLAND, Wash., December 16, 2005, Representatives of the Department of Defense's (DoD's) Voluntary Protection Program Center of Excellence (VPP CX) working to reduce injuries at selected (DoD)...

  15. Frameworks for Analyzing Chinese Defense and Military Innovation

    E-Print Network [OSTI]

    Cheung, Tai Ming; Mahnken, Thomas G; Ross, Andrew L

    2011-01-01

    include those between product innovation (improved means)defense and military innovation and its concrete products.products, processes, and services for military and dual-use applications, and military innovation

  16. Record of Decision; Defense Waste Processing Facility at the...

    Office of Environmental Management (EM)

    8:45 am BILLING CODE 4000-01-M DEPARTMENT OF ENERGY Record of Decision; Defense Waste Processing Facility at the Savannah River Site, Aiken, SC AGENCY: Department of...

  17. Interface with the Defense Nuclear Facilities Safety Board

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-12-30

    The manual defines the process DOE will use to interface with the Defense Nuclear Facilities Safety Board and its staff. Canceled by DOE M 140.1-1A. Does not cancel other directives.

  18. Interface with the Defense Nuclear Facilities Safety Board

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-30

    This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Supersedes DOE M 140.1-1A.

  19. Interface with the Defense Nuclear Facilities Safety Board

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-01-26

    This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Cancels DOE M 140.1-1.

  20. Microsoft Word - Defense Science Quarterly 02-08.doc

    National Nuclear Security Administration (NNSA)

    year the team plans to complete up to 18 experiments. Monty Wood (LANL) and Don Smith (LLNL) discuss data during the alpha-can II exercise Page 4 NNSA Office of Defense...

  1. Departments of Energy and Defense Launch ENERGY STAR® Operation...

    Broader source: Energy.gov (indexed) [DOE]

    CAMP LEJEUNE, NC - U.S. Secretary of Energy Samuel W. Bodman on Earth Day launched a joint Department of Energy (DOE) and Defense campaign to challenge military bases nationwide to...

  2. National Defense Authorization Act for Fiscal Year 2005, Information...

    Office of Environmental Management (EM)

    EMAdditionalMaterialMACopy.pdf PUBLIC LAW 108-375-OCT. 28, 2004 118 STAT. 1811 Public Law 108-375, 108th Congress National Defense Authorization Act for Fiscal Year 2005,...

  3. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  4. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  5. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  6. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  7. SMASHUP: Secure Mashup for Defense Transformation and Net-Centric Systems

    E-Print Network [OSTI]

    Heileman, Gregory L.

    ., 709 S. Harbor City Blvd., Suite 400, Melbourne, FL 32901; b University of New Mexico, Dept, integrate, and display data from a vast array of different information sources available on the Internet

  8. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  9. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  10. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  11. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  12. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  13. Partitioning a graph into defensive k-alliances

    E-Print Network [OSTI]

    Yero, Ismael G; Rodriguez-Velazquez, Juan A; Sigarreta, Jose M

    2009-01-01

    A defensive $k$-alliance in a graph is a set $S$ of vertices with the property that every vertex in $S$ has at least $k$ more neighbors in $S$ than it has outside of $S$. A defensive $k$-alliance $S$ is called global if it forms a dominating set. In this paper we study the problem of partitioning the vertex set of a graph into (global) defensive $k$-alliances. The (global) defensive $k$-alliance partition number of a graph $\\Gamma=(V,E)$, ($\\psi_{k}^{gd}(\\Gamma)$) $\\psi_k^{d}(\\Gamma)$, is defined to be the maximum number of sets in a partition of $V$ such that each set is a (global) defensive $k$-alliance. We obtain tight bounds on $\\psi_k^{d}(\\Gamma)$ and $\\psi_{k}^{gd}(\\Gamma)$ in terms of several parameters of the graph including the order, size, maximum and minimum degree, the algebraic connectivity and the isoperimetric number. Moreover, we study the close relationships that exist among partitions of $\\Gamma_1\\times \\Gamma_2$ into (global) defensive $(k_1+k_2)$-alliances and partitions of $\\Gamma_i$ into...

  14. Securing Single Points of Compromise (SPoC)

    SciTech Connect (OSTI)

    Belangia, David Warren

    2015-06-25

    Securing the Single Points of Compromise that provide central services to the institution’s environment is paramount to success when trying to protect the business. (Fisk, 2014) Time Based Security mandates protection (erecting and ensuring effective controls) that last longer than the time to detect and react to a compromise. When enterprise protections fail, providing additional layered controls for these central services provides more time to detect and react. While guidance is readily available for securing the individual critical asset, protecting these assets as a group is not often discussed. Using best business practices to protect these resources as individual assets while leveraging holistic defenses for the group increases the opportunity to maximize protection time, allowing detection and reaction time for the SPoCs that is commensurate with the inherent risk of these centralized services.

  15. U.S. second line of defense: preventing nuclear smuggling across Russia's borders

    SciTech Connect (OSTI)

    Ball, D. Y.

    1998-11-16

    Preventing the theft of weapons-usable highly enriched uranium and plutonium in Russia is one of the central security concerns facing the US today. The dissolution of the highly centralized USSR and the resulting societal crisis has endangered Russia's ability to protect its more than 200 metric tons of plutonium and 1000 tons of highly enriched uranium (roughly 8 kg Pu or 25 kg HEU is sufficient to make a bomb). Producing this fissile material is the most difficult and expensive part of nuclear weapons production and the US must make every effort to ensure that fissile material (and nuclear-related technologies) does not reach the hands of terrorist groups, rogue states or other potential proliferators. In response to this concern, the US has undertaken a number of initiatives in partnership with Russia and other FSU states to prevent the theft of fissile material. The Material Protection, Control and Accounting Program (MPC&A) was begun in 1993 to prevent the theft of nuclear materials from Russian civilian complexes, that is facilities not under control of the Ministry of Defense, which is largely responsible for possession and oversight of nuclear weapons. The MPC&A program is considered the first line of defense against theft of nuclear material because its goal is to prevent theft of material at production and storage facilities. This year the Department of Energy (DOE) initiated a new program called the Second Line of Defense (SLD), the goal of which is to assist Russia in preventing the smuggling of nuclear material and weapons at its borders, either by land, sea or air. The SLD program represents an important phase in the overall effort to ensure the security of nuclear material and weapons in Russia. However, as the US engages Russian customs officials in this important project, Americans should keep in mind that providing equipment--even indigenous equipment--is insufficient by itself; material aid must be accompanied by rigorous inspection and accounting procedures. In addition, the equipment must be assessed according to international standards to ensure a high degree of confidence in its nuclear detection capability.

  16. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  17. Defense programs beryllium good practice guide

    SciTech Connect (OSTI)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to generate dusts, mists, fumes, or small particulates. A beryllium exposure control program should minimize airborne concentrations, the potential for and spread of contamination, the number of times individuals are exposed to beryllium, and the number of employees who may be potentially exposed.

  18. Combating Time Synchronization Attack: A Cross Layer Defense Mechanism

    E-Print Network [OSTI]

    Li, Husheng

    and Protection]: Physical Security 1. INTRODUCTION The security of smart grid has become an important research synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified re- cently. A cross the eectiveness of the pro- posed TSA detection algorithm. Categories and Subject Descriptors K.6.5 [Security

  19. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect (OSTI)

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  20. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  1. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  3. Natural SelectionsDepartment of Defense Natural Resources Program Spring 2013

    E-Print Network [OSTI]

    of its annual Strategic Sustainability Performance Plan (SSPP), the Department of Defense has released

  4. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  5. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect (OSTI)

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

  6. The science, technology, and politics of ballistic missile defense

    SciTech Connect (OSTI)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  7. Nonproliferation, arms control and disarmament and extended deterrence in the new security environment

    SciTech Connect (OSTI)

    Pilat, Joseph F

    2009-01-01

    With the end of the Cold War, in a dramatically changed security environment, the advances in nonnuclear strategic capabilities along with reduced numbers and roles for nuclear forces has altered the calculus of deterrence and defense, at least for the United States. For many, this opened up a realistic possibility of a nuclear-free world. It soon became clear that the initial post-Cold War hopes were exaggerated. The world did change fundamentally, but it did not become more secure and stable. In place of the old Soviet threat, there has been growing concern about proliferation and terrorism involving nuclear and other weapons of mass destruction (WMD), regional conflicts, global instability and increasingly serious new and emerging threats, including cyber attacks and attacks on satellites. For the United States at least, in this emerging environment, the political rationales for nuclear weapons, from deterrence to reassurance to alliance management, are changing and less central than during the Cold War to the security of the United States, its friends and allies. Nuclear weapons remain important for the US, but for a far more limited set of roles and missions. As the Perry-Schlesinger Commission report reveals, there is a domestic US consensus on nuclear policy and posture at the highest level and for the near term, including the continued role of nuclear arms in deterring WMD use and in reassuring allies. Although the value of nuclear weapons has declined for the United States, the value of these weapons for Russia, China and so-called 'rogue' states is seen to be rising. The nuclear logic of NATO during Cold War - the need for nuclear weapons to counter vastly superior conventional capabilities of the Soviet Union and the Warsaw Pact - is today heard from Russians and even some proliferants. Moreover, these weapons present a way for rogues to achieve regional hegemony and possibly to deter interventions by the United States or others. While the vision of a nuclear-free world is powerful, both existing nuclear powers and proliferators are unlikely to forego nuclear weapons entirely in a world that is dangerous and uncertain. And the emerging world would not necessarily be more secure and stable without nuclear weapons. Even if nuclear weapons were given up by the United States and other nuclear-weapon states, there would continue to be concerns about the proliferation of nuclear, chemical and biological weapons, which would not disappear and could worsen. WMD terrorism would remain a concern that was largely unaffected by US and other nuclear-weapon decisions. Conventional capabilities would not disappear and the prospects for warfare could rise. In addition, new problems could arise if rogue states or other non-status-quo powers attempted to take advantage of moves toward disarmament, while friends and allies who are not reassured as in the past could reconsider their options if deterrence declined. To address these challenges, non- and counter-proliferation and counterterrorismincluding defenses and consequence management-are priorities, especially in light of an anticipated 'renaissance' in civil nuclear power. The current agenda of the United States and others includes efforts to: (1) Strengthen International Atomic Energy Agency (IAEA) and its safeguards system; (2) Strengthen export controls, especially for sensitive technologies, by limiting the development of reprocessing and enrichment technologies and by requiring the Additional Protocol as a condition of supply; (3) Establish a reliable supply regime, including the possibility of multilateral or multinational ownership of fuel cycle facilities, as a means to promote nuclear energy without increasing the risks of proliferation or terrorism; (4) Implement effectively UN Security Council Resolution 1540; and (5) Strengthen and institutionalize the Proliferation Security Initiative and the Global Initiative to Combat Nuclear Terrorism. These and other activities are important in themselves, and are essential to maintaining and strengthening the Nonproliferati

  8. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    E-Print Network [OSTI]

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  9. Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries.pettai@ut.ee, peeter.laud@cyber.ee Abstract We describe an automatic analysis to check secure multiparty computation

  10. LysM receptor-like kinases to improve plant defense response against fungal pathogens

    DOE Patents [OSTI]

    Wan, Jinrong; Stacey, Gary; Stacey, Minviluz; Zhang, Xuecheng

    2013-10-15

    Perception of chitin fragments (chitooligosaccharides) is an important first step in plant defense response against fungal pathogen. LysM receptor-like kinases (LysM RLKs) are instrumental in this perception process. LysM RLKs also play a role in activating transcription of chitin-responsive genes (CRGs) in plants. Mutations in the LysM kinase receptor genes or the downstream CRGs may affect the fungal susceptibility of a plant. Mutations in LysM RLKs or transgenes carrying the same may be beneficial in imparting resistance against fungal pathogens.

  11. LysM receptor-like kinases to improve plant defense response against fungal pathogens

    DOE Patents [OSTI]

    Wan, Jinrong (Columbia, MO); Stacey, Gary (Columbia, MO); Stacey, Minviluz (Columbia, MO); Zhang, Xuecheng (Columbia, MO)

    2012-01-17

    Perception of chitin fragments (chitooligosaccharides) is an important first step in plant defense response against fungal pathogen. LysM receptor-like kinases (LysM RLKs) are instrumental in this perception process. LysM RLKs also play a role in activating transcription of chitin-responsive genes (CRGs) in plants. Mutations in the LysM kinase receptor genes or the downstream CRGs may affect the fungal susceptibility of a plant. Mutations in LysM RLKs or transgenes carrying the same may be beneficial in imparting resistance against fungal pathogens.

  12. Startup of Savannah River`s Defense Waste Processing Facility to produce radioactive glass

    SciTech Connect (OSTI)

    Bennett, W.M. [Westinghouse Savannah River Company, AIKEN, SC (United States)

    1997-08-06

    The Savannah River Site (SRS) began production of radioactive glass in the Defense Waste Process Facility (DWPF) in 1996 following an extensive test program discussed earlier. Currently DWPF is operating in a `sludge only` mode to produce radioactive glass consisting of washed high-level waste sludge and glass frit. Future operations will produce radioactive glass consisting of washed high-level waste sludge, precipitated cesium, and glass frit. This paper provides an update of processing activities to date, operational problems encountered since entering radioactive operations, and the programs underway to solve them.

  13. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  14. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  15. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  16. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  17. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  18. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  19. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  20. Process Control Security 44 PublishedbytheieeeComPutersoCiety1540-7993/08/$25.002008ieeeieeeseCurity&PrivaCy

    E-Print Network [OSTI]

    Correia, Miguel

    - structures such as power, water, gas, oil, and trans- portation. Therefore, the threat is no longer against a rather weak, form of security, essentially by obscurity. However, criti- cal infrastructure companies, and control and supervision proto- cols are normally encapsulated on top of UdP-TCP/ IP. The common defense

  1. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  2. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  3. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  4. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  5. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  6. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  7. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  8. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  9. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  10. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  11. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  12. 2004-05 Research Activities from the Office of the Vice President for Research

    E-Print Network [OSTI]

    Ginzel, Matthew

    are actively seeking answers to grid security and transmission control, researching clean coal technologies

  13. Quarterly report on Defense Nuclear Facilities Safety Board recommendation 90-7 for the period ending September 30, 1993

    SciTech Connect (OSTI)

    Meacham, J.E.; Cash, R.J.; Dukelow, G.T.

    1993-12-01

    This is the tenth quarterly repose on the progress of activities addressing safety issues associated with Hanford Site high-level radioactive waste tanks that contain ferrocyanide compounds. In the Presence of oxidizing materials, such as nitrates or nitrites, ferrocyanide can be made to explode in the laboratory by hearing it to high temperatures [above 285{degree} C (545{degree} F)]. In the mid 1950s, approximately 140 metric tons of ferrocyanide were added to waste now stored in underground high-level radioactive waste tanks. An implementation plan responding to the Defense Nuclear Facilities Safety Board Recommendation 90-7 (FR 1990){sup 2} was issued in March 1991 describing the activities that were planned and underway to address each of the six parts of Recommendation 90-7. A revision to the original plan was transmitted to the US Department of Energy by Westinghouse Hanford in December 1992, and subsequently to the Defense Nuclear Facilities Safety Board in 1993.

  14. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  15. 7 Key Challenges for Visualization in Cyber Network Defense

    SciTech Connect (OSTI)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    2014-12-02

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  16. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  17. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  18. Approved Module Information for CS4520, 2014/5 Module Title/Name: Information Security Module Code: CS4520

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    students to take an active role in the design, planning, evaluation and management of secure information -- Ability to analyse security risks and deliver a fit-for-purpose information security management system security * Professional/Subject-Specific Skills -- Ability identify risks in software programs, computer

  19. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  20. National Security Technologies VPP 2012

    Energy Savers [EERE]

    for other Federal Agencies, such as the Defense Threat Reduction Agency, National Aeronautics and Space Administration, Nuclear Regulatory Commission, Department of Homeland...

  1. Overview of accelerators with potential use in homeland security

    SciTech Connect (OSTI)

    Garnett, Robert W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-01

    Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also be discussed.

  2. Overview of accelerators with potential use in homeland security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Garnett, Robert W.

    2015-01-01

    Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also bemore »discussed.« less

  3. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  4. Intrusion Detection, Diagnosis, and Recovery with SelfSecuring Storage

    E-Print Network [OSTI]

    Intrusion Detection, Diagnosis, and Recovery with Self­Securing Storage John Strunk, Garth Goodson Carnegie Mellon University Pittsburgh, 15213 Abstract Self­securing storage turns storage devices active parts of intrusion survival strategy. From behind storage interface (e.g., SCSI CIFS), a self

  5. From Panopticon to Fresnel, Dispelling a False Sense of Security

    E-Print Network [OSTI]

    Hand, Steven

    From Panopticon to Fresnel, Dispelling a False Sense of Security Jon Crowcroft1 and Ian Brown2 1 challenges. In this paper, we describe the Fresnel project's technology[ELMC10] that addresses Panopticon to Fresnel, Dispelling a False Sense of Security 239 afford a view onto human activities2

  6. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  7. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  8. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  9. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  11. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  12. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  13. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  15. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  16. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  17. INTERNAL DEFENSES OF CRUSTACEA: A REVIEWl CARL J. SINDERMANN"

    E-Print Network [OSTI]

    defense perimeter in many crustaceans. Efficacy of phagocytes in destroying in- vading microorganisms varies, depending on the species of the microorganism, as well as host physiology and environmental-again with the possible exception of the mollusks and insects. One mi- crobial pathogen of Crustacea that has received

  18. Defense from a distance ORNL robotics sensors detect underwater

    E-Print Network [OSTI]

    SCIENCE Defense from a distance ORNL robotics sensors detect underwater explosive ordnance Modern of the future are not human oriented, but robotics oriented. For robots to perform their mission of safety at the forefront of robotics design, these are the droids we are looking for. ­Dylan Platz Karnowski analyzes

  19. MS Thesis Defense A Combined Discrete-dislocation/Scale-

    E-Print Network [OSTI]

    Grujicic, Mica

    MS Thesis Defense A Combined Discrete-dislocation/Scale- dependent Crystal Plasticity Analysis of Deformation and Fracture in Nanomaterials A Combined Discrete-dislocation/Scale- dependent Crystal Plasticity der Giessen, Needleman 1995) Crystal Plasticity Model Results and ComparisonII. Micro-beam Bending

  20. Leading Edge Antiviral Strategies: Building a Better Defense

    E-Print Network [OSTI]

    Ferguson, Andrew

    Leading Edge Select Antiviral Strategies: Building a Better Defense Viruses are a widespread demand. In this Select, we look at recent papers that are helping to advance antiviral research that are surrounded by a lipid bilayer that is needed for cellular entry and infec- tivity (enveloped), and those

  1. BETAVOLTAIC BATTERIES Long-Life Power for Defense & Medical Markets

    E-Print Network [OSTI]

    BETAVOLTAIC BATTERIES Long-Life Power for Defense & Medical Markets NREL Industry Growth Forum Jonathan W. Greene, CEO November 2, 2009 #12;·! Patented Betavoltaics ­ tiny, long life batteries targeting electronic and isotope powered batteries MS - 14 yrs management and engineering ·!Expert in patent

  2. Smart-Phone Attacks and Defenses Chuanxiong Guo

    E-Print Network [OSTI]

    Wang, Bing

    Smart-Phone Attacks and Defenses Chuanxiong Guo xguo@ieee.org Microsoft Research Helen J. Wang smart-phones), and our environment (e.g., through the use of sensors, actuators, and RFIDs). While is becoming a reality: Smart-phones, interoperable between the telecom networks and the Inter- net

  3. RISK MANAGEMENT AND TORT DEFENSE Sub-Chapter 2

    E-Print Network [OSTI]

    Dyer, Bill

    1 #12;2 RISK MANAGEMENT AND TORT DEFENSE 2.6.203 Sub-Chapter 2 State Vehicle Use 2.6.201 INTRODUCTION (1) The following rules define acceptable uses for state-owned or leased motor pool vehicles guidelines, policies, insurance coverage exclusions, or regulations for vehicle/equipment fleet operations

  4. On the effectiveness of service registration-based worm defense

    E-Print Network [OSTI]

    Bahk, Saewoong

    &D Center Samsung Electronics Email: jin ho.kim@samsung.com Hyogon Kim Department of Computer Science and Computer Science Seoul National University Email: sbahk@snu.ac.kr Abstract-- Existing Internet worm but the progress is slow because worm is fast. In case of virus the defense is easier since the propagation is slow

  5. Randomizing AMI Configuration for Proactive Defense in Smart Grid

    E-Print Network [OSTI]

    Wang, Yongge

    Randomizing AMI Configuration for Proactive Defense in Smart Grid Muhammad Qasim Ali, Ehab Al: {mali12, ealshaer, qiduan}@uncc.edu Abstract--Smart grids are capable of bi-directional commu- nication between smart meters and headend systems. It is a core feature of smart grid provided by the underlying

  6. Ph.D. in Mathematics Education Dissertation Defense

    E-Print Network [OSTI]

    Elzanowski, Marek

    Ph.D. in Mathematics Education Dissertation Defense Kate Melhuish The Creation and Validation of a Group Theory Concept Inventory MS (Western Carolina University, 2010) BS (Gwynedd-Mercy College, 2007 Goforth, PhD Abstract The Group Concept Inventory (GCI) is an assessment tool that measures conceptual

  7. Embedded Electrical and Computer Engineering MASTER ORAL DEFENSE

    E-Print Network [OSTI]

    Mahmoodi, Hamid

    Embedded Electrical and Computer Engineering MASTER ORAL DEFENSE TITLE: Low Power Scanner for High of this research is to design a low power integrated system that can be used in vivo for scanning the electrode. A model created in Python provides input vectors and output comparison for the verification process

  8. Energy Attacks and Defense Techniques for Wireless Systems

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Energy Attacks and Defense Techniques for Wireless Systems Sheng Wei Jong Hoon Ahnn Miodrag {shengwei, jhahnn, miodrag}@cs.ucla.edu ABSTRACT This paper addresses the energy attacks towards wireless in the wireless systems and trigger ultra-high energy increases at runtime. Then, we develop a non-destructive HT

  9. Are three-dimensional spider webs defensive adaptations?

    E-Print Network [OSTI]

    Blackledge, Todd

    LETTER Are three-dimensional spider webs defensive adaptations? Todd A. Blackledge1 *, Jonathan A-mail: tab42@cornell.edu Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs have been primarily considered to be foraging adaptations, neglecting

  10. Embedded Electrical and Computer Engineering MASTER ORAL DEFENSE

    E-Print Network [OSTI]

    Mahmoodi, Hamid

    Embedded Electrical and Computer Engineering MASTER ORAL DEFENSE TITLE: Embedded Systems Design are the devices which involve both hardware and software design in one system simultaneously. There are diverse etc. In order to reflect these trends in education in a hands-on manner, a platform is needed

  11. Terminating Safeguards on Excess Special Nuclear Material: Defense TRU Waste Clean-up and Nonproliferation - 12426

    SciTech Connect (OSTI)

    Hayes, Timothy; Nelson, Roger

    2012-07-01

    The Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) manages defense nuclear material that has been determined to be excess to programmatic needs and declared waste. When these wastes contain plutonium, they almost always meet the definition of defense transuranic (TRU) waste and are thus eligible for disposal at the Waste Isolation Pilot Plant (WIPP). The DOE operates the WIPP in a manner that physical protections for attractiveness level D or higher special nuclear material (SNM) are not the normal operating condition. Therefore, there is currently a requirement to terminate safeguards before disposal of these wastes at the WIPP. Presented are the processes used to terminate safeguards, lessons learned during the termination process, and how these approaches might be useful for future defense TRU waste needing safeguards termination prior to shipment and disposal at the WIPP. Also described is a new criticality control container, which will increase the amount of fissile material that can be loaded per container, and how it will save significant taxpayer dollars. Retrieval, compliant packaging and shipment of retrievably stored legacy TRU waste has dominated disposal operations at WIPP since it began operations 12 years ago. But because most of this legacy waste has successfully been emplaced in WIPP, the TRU waste clean-up focus is turning to newly-generated TRU materials. A major component will be transuranic SNM, currently managed in safeguards-protected vaults around the weapons complex. As DOE and NNSA continue to consolidate and shrink the weapons complex footprint, it is expected that significant quantities of transuranic SNM will be declared surplus to the nation's needs. Safeguards termination of SNM varies due to the wide range of attractiveness level of the potential material that may be directly discarded as waste. To enhance the efficiency of shipping waste with high TRU fissile content to WIPP, DOE designed an over-pack container, similar to the pipe component, called the criticality control over-pack, which will significantly enhance the efficiency of disposal. Hundreds of shipments of transuranic SNM, suitably packaged to meet WIPP waste acceptance criteria and with safeguards terminated have been successfully emplaced at WIPP (primarily from the Rocky Flats site clean-up) since WIPP opened. DOE expects that thousands more may eventually result from SNM consolidation efforts throughout the weapons complex. (authors)

  12. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  13. Pricing and Investments in Internet Security: A Cyber-Insurance Perspective

    E-Print Network [OSTI]

    Pal, Ranjan

    2011-01-01

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In this regard, an important research problem is the analysis of optimal user self-defense investments and cyber-insurance contracts under the Internet environment. In this paper, we investigate two problems and their relationship: 1) analyzing optimal self-defense investments in the Internet, under optimal cyber-insurance coverage, where optimality is an insurer objective and 2) designing optimal cyber-insurance contracts for Internet users, where a contract is a (premium, coverage) pair.

  14. Defense High Level Waste Disposal Container System Description

    SciTech Connect (OSTI)

    2000-10-12

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms (IPWF)) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. U.S. Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as 'co-disposal'. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by which to identify the disposal container and its contents. Different materials will be selected for the disposal container inner and outer cylinders. The two metal cylinders, in combination with the Emplacement Drift System, drip shield, and natural barrier, will support the design philosophy of defense-in-depth. The use of materials with different properties prevents a single mode failure from breaching the waste package. The inner cylinder and inner cylinder lids will be constructed of stainless steel and the outer cylinder and outer cylinder lids will be a barrier made of high-nickel alloy. The defense HLW disposal container interfaces with the emplacement drift environment and the internal waste by transferring heat from the canisters to the external environment and by protecting the canisters and their contents from damage/degradation by the external environment. The disposal container also interfaces with the canisters by limiting access of moderator and oxidizing agents to the waste. A loaded and sealed disposal container (waste package) interfaces with the Emplacement Drift System's emplacement drift waste package supports upon which the waste packages are placed. The disposal container interfaces with the Canister Transfer System, Waste Emplacement /Retrieval System, Disposal Container Handling System, and Waste Package Remediation System during loading, handling, transfer, emplacement, and retrieval for the disposal container/waste package.

  15. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  16. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  17. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  18. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  19. Security Technology Demonstration and Validation Sustainability Plan

    SciTech Connect (OSTI)

    2008-08-31

    This report describes the process of creating continuity and sustainability for demonstration and validation (DEMVAL) assets at the National Security Technology Incubator (NSTI). The DEMVAL asset program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The mission of the NSTI program is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. Part of this support is envisioned to be research and development of companies’ technology initiatives, at the same time providing robust test and evaluation of actual development activities. This program assists companies in developing technologies under the NSTI program through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. Development of the commercial potential for national security technologies is a significant NSTI focus. As part of the process of commercialization, a comprehensive DEMVAL program has been recognized as an essential part of the overall incubator mission. A number of resources have been integrated into the NSTI program to support such a DEMVAL program.

  20.  A Civilian Perspective on DefenseTransparency in the Republic of Korea: The More, the Better?

    E-Print Network [OSTI]

    Choi, Kang

    2011-01-01

    and thus undermining the national security of South Korea by1960s to 1980s), these national security considerations wereoften suppressed on national security grounds and almost

  1. Good Things in Small Packages: Micro Worlds and Cyber Security

    SciTech Connect (OSTI)

    David I Gertman

    2013-11-01

    Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

  2. China’s Defense High-Tech Leadership: Implications for S&T Innovation

    E-Print Network [OSTI]

    Hagt, Eric

    2011-01-01

    2011 China’s Defense High-Tech Leadership: Implications foran effective defense high-tech innovation system. Thein the PLA and advises on high-tech and strategic platforms.

  3. EIS-0347: Long-Term Management of the National Defense Stockpile Inventory of Excess Mercury

    Broader source: Energy.gov [DOE]

    This Defense Logistics Agency EIS evaluated alternatives for managing the Defense National Stockpile Center inventory of excess mercury. DOE was a cooperating agency for preparation of the draft EIS.

  4. China’s Defense High-Tech Leadership: Implications for S&T Innovation

    E-Print Network [OSTI]

    Hagt, Eric

    2011-01-01

    Implications for S&T Innovation Eric Hagt Summary O ver theeffective defense high-tech innovation system. The Sciencevision for future defense innovation that the PLA needs. The

  5. Practical matters for defense contractors converting DoD technology to commercial markets

    E-Print Network [OSTI]

    Ting, Carina Maria

    2012-01-01

    This thesis asks if and how the defense contractor can profitably transfer the technology and institutional learning obtained from DoD funded R&D to commercial markets. There are numerous examples of very successful defense ...

  6. Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets

    E-Print Network [OSTI]

    Chuah, Mooi-Choo "Mooi"

    Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets X dual defense protection framework that allows Official and Alternative Android Markets to detect malware applications. If suspicious network traffic is observed, the relevant Android markets

  7. Inhabiting cycles of maritime obsolescence : redirecting the National Defense Reserve Fleet

    E-Print Network [OSTI]

    Polansky, Nicholas W. (Nicholas Wilkes)

    2014-01-01

    Defense is in a state of obsolescence. The metrics of risk have changed from threat of military invasion to that of weather. Infrastructure is in a state of transition. The Maritime Administration's National Defense Reserve ...

  8. Department of Energy: National Security Campus Technical Manager -Materials Engineering (Polymers)

    E-Print Network [OSTI]

    Alpay, S. Pamir

    ) Description The National Security Campus (NSC) is a U.S. Department of Energy (DOE), National Nuclear SecurityDepartment of Energy: National Security Campus Technical Manager - Materials Engineering (Polymers technology maturation at FM&T and works to mitigate those risks. · Conducts activities in a safe and health

  9. Security Automation Considered Harmful? W. Keith Edwards Erika Shehan Poole Jennifer Stoll

    E-Print Network [OSTI]

    Edwards, Keith

    Security Automation Considered Harmful? W. Keith Edwards Erika Shehan Poole Jennifer Stoll School activity is focused on automated approaches to security. With these approaches, security decisions automation is potentially beneficial in theory, in practice it is not a panacea for end-user information

  10. Ontogeny of Defense : Does Life History Affect Predator Response Behavior in the Pygmy Octopus, Octopus Bocki?

    E-Print Network [OSTI]

    Himes, Julie E.

    2006-01-01

    ONTOGENY OF DEFENSE: DOES LIFE HISTORY AFFECT PREDATORdoes seem to be a shift toward communication over the life history

  11. The calcification of Staphylococcus aureus bacteria : a potential defense mechanism against infections

    E-Print Network [OSTI]

    Arellano, Catherine Krystle

    2010-01-01

    in Serum: A Possible Mechanism for Biomineralization. J.Bacteria: A Potential Defense Mechanism Against Infections Amechanism

  12. Comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

  13. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  14. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  15. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  16. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  17. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  18. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  19. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  20. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  1. Notice of Intent to Revise DOE Order 470.3B, Graded Security Protection (GSP) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-11-23

    Request approval to revise the subject Order to make significant changes which are required for the Order to be consistent with threat information received from the intelligence community. Information provided by the joint DOE/IN and Defense Intelligence Agency, Nuclear Security Threat Capabilities Assessment, revealed the need to adjust adversary numbers and capabilities to reflect the intent of the policy and the inherent risk management considerations.

  2. Notice of Intent to Revise DOE Order 470.3B, Graded Security Protection (GSP) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    Request approval to revise the subject Order to make significant changes which are required for the Order to be consistent with threat information received from the intelligence community. Information provided by the joint DOE/IN and Defense Intelligence Agency, Nuclear Security Threat Capabilities Assessment, revealed the need to adjust adversary numbers and capabilities to reflect the intent of the policy and the inherent risk management considerations.

  3. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying. The defense taxonomy classifies the body of existing DDoS de- fenses based on their design decisions

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  5. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  6. DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER

    SciTech Connect (OSTI)

    G. Radulesscu; J.S. Tang

    2000-06-07

    The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M&O [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M&O 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M&Q 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M&O 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable canisters. The intended use of this analysis is to support Site Recommendation reports and to assist in the development of WPD drawings. Activities described in this analysis were conducted in accordance with the Development Plan ''Design Analysis for the Defense High-Level Waste Disposal Container'' (CRWMS M&O 2000c) with no deviations from the plan.

  7. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  8. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  11. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  12. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  13. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  14. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  15. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  16. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  17. Department of Defense Nuclear/Biological/Chemical (NBC) warfare defense. Annual report to Congress, June 1994. Final report, 1 October 1992-30 September 1993

    SciTech Connect (OSTI)

    Not Available

    1994-06-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law 103-160, Title XVII, Chemical and Biological Weapons Defense, section 1703, directed the Secretary of Defense to submit an assessment and a description of plans to improve readiness. The DoD objective is to enable our forces to survive, fight and win in NBC contaminated environments. Discussed are new management objectives impacted by declining resources and force structure versus an ever changing threat environment. Nuclear biological, Chemical, NBC, Defense, Logistics, Readiness, Training, Contamination avoidance, Protection, Decontamination.

  18. Defense, Interior Departments Pursue Renewable Energy on Federal Lands |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department8, 20153Daniel BoffDepartment of Energy Defense, Interior

  19. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  20. Energy and Defense Departments Announce New Steps to Enhance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    security. The joint efforts announced today plan to be initiated during the 2012 fiscal year. Media contact(s): (202) 586-4940 Addthis Related Articles White House Energy...

  1. Survivable, Real Time Network Services Defense Advanced Research Projects Agency

    E-Print Network [OSTI]

    Mills, David L.

    -98-1-0225, DARPA Order G409/J175 Quarterly Progress Report 1 April 2002 - 30 June 2002 David L. Mills Electrical security protocols which resist accidental or mali- cious attacks on the servers and clients in a sensor

  2. Survivable, Real Time Network Services Defense Advanced Research Projects Agency

    E-Print Network [OSTI]

    Mills, David L.

    David L. Mills Electrical Engineering Department University of Delaware 1. Introduction This report is to develop and test security protocols which resist accidental or mali- cious attacks on the servers and

  3. Survivable, Real Time Network Services Defense Advanced Research Projects Agency

    E-Print Network [OSTI]

    Mills, David L.

    ­98­1­0225, DARPA Order G409/J175 Quarterly Progress Report 1 April 2002 ­ 30 June 2002 David L. Mills Electrical security protocols which resist accidental or mali­ cious attacks on the servers and clients in a sensor

  4. A Novel Cyber-Insurance for Internet Security

    E-Print Network [OSTI]

    Pal, Ranjan; Psounis, Konstantinos

    2011-01-01

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

  5. Roundhouse: A Security Architecture for Active Networks

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    on these because they offer the greatest opportunity for cost reduction: · Maintenance and retooling costs. Our long-range goal is to permit an order of magnitude reduction in protection and retooling costs. DEPOT: Specification, design, and prototype implementation on a PC base of the framework and initial

  6. Program Activities | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

  7. Independent Oversight Activity Report, National Nuclear Security

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservation StandardsEnergy In CaseFebruaryFebruary 12, 2014

  8. Streamlined Approach for Environmental Restoration Plan for Corrective Action Unit 574: Neptune, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2011-08-31

    This Streamlined Approach for Environmental Restoration (SAFER) Plan identifies the activities required for closure of Corrective Action Unit (CAU) 574, Neptune. CAU 574 is included in the Federal Facility Agreement and Consent Order (FFACO) (1996 [as amended March 2010]) and consists of the following two Corrective Action Sites (CASs) located in Area 12 of the Nevada National Security Site: (1) CAS 12-23-10, U12c.03 Crater (Neptune); (2) CAS 12-45-01, U12e.05 Crater (Blanca). This plan provides the methodology for the field activities that will be performed to gather the necessary information for closure of the two CASs. There is sufficient information and process knowledge regarding the expected nature and extent of potential contaminants to recommend closure of CAU 574 using the SAFER process. Based on historical documentation, personnel interviews, site process knowledge, site visits, photographs, field screening, analytical results, the results of the data quality objective (DQO) process (Section 3.0), and an evaluation of corrective action alternatives (Appendix B), closure in place with administrative controls is the expected closure strategy for CAU 574. Additional information will be obtained by conducting a field investigation to verify and support the expected closure strategy and provide a defensible recommendation that no further corrective action is necessary. This will be presented in a Closure Report that will be prepared and submitted to the Nevada Division of Environmental Protection (NDEP) for review and approval.

  9. Global climate change and international security.

    SciTech Connect (OSTI)

    Karas, Thomas H.

    2003-11-01

    This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national and international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.

  10. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  11. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  12. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  13. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  14. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  15. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  16. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  17. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  18. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  19. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  20. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  1. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  2. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  3. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  4. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  5. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  6. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  7. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  8. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  9. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  10. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  11. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  12. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  13. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  14. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  15. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  16. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  17. Administrator Highlights U.S.-Georgian Nuclear Security Cooperation in Tbilisi

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    NNSA Administrator Thomas D'Agostino highlighted the strong U.S.-Georgian cooperation on nuclear security issues during a day-long visit to the Republic of Georgia in mid-June. He briefed the media at availability at the Tbilisi airport. In April 2009, President Obama outlined an ambitious agenda to secure vulnerable nuclear material around the world within four years, calling the danger of a terrorist acquiring nuclear weapons "the most immediate and extreme threat to global security." In this year's State of the Union, he called the threat of nuclear weapons, "the greatest danger to the American people." In order to meet that challenge, the President's FY2011 Budget Request includes close to $2.7 billion for the National Nuclear Security Administration's Defense Nuclear Nonproliferation program -- an increase of 25.7 percent over FY2010. Included in that request is NNSA's Second Line of Defense (SLD) program, which works around the world to strengthen the capability of foreign governments to deter, detect, and interdict illicit trafficking in nuclear and other radioactive materials across international borders and through the global maritime shipping system.

  18. Closure Report for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2012-08-15

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 562, Waste Systems, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 562 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 562 consists of the following 13 Corrective Action Sites (CASs), located in Areas 2, 23, and 25 of the Nevada National Security Site: · CAS 02-26-11, Lead Shot · CAS 02-44-02, Paint Spills and French Drain · CAS 02-59-01, Septic System · CAS 02-60-01, Concrete Drain · CAS 02-60-02, French Drain · CAS 02-60-03, Steam Cleaning Drain · CAS 02-60-04, French Drain · CAS 02-60-05, French Drain · CAS 02-60-06, French Drain · CAS 02-60-07, French Drain · CAS 23-60-01, Mud Trap Drain and Outfall · CAS 23-99-06, Grease Trap · CAS 25-60-04, Building 3123 Outfalls Closure activities began in October 2011 and were completed in April 2012. Activities were conducted according to the Corrective Action Plan for CAU 562 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The corrective actions included No Further Action and Clean Closure. Closure activities generated sanitary waste and hazardous waste. Some wastes exceeded land disposal limits and required offsite treatment prior to disposal. Other wastes met land disposal restrictions and were disposed in appropriate onsite or offsite landfills. NNSA/NSO requests the following: · A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 562 · The transfer of CAU 562 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO

  19. Closure Report for Corrective Action Unit 547: Miscellaneous Contaminated Waste Sites, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2012-07-17

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 547, Miscellaneous Contaminated Waste Sites, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 547 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 547 consists of the following three Corrective Action Sites (CASs), located in Areas 2, 3, and 9 of the Nevada National Security Site: (1) CAS 02-37-02, Gas Sampling Assembly; (2) CAS 03-99-19, Gas Sampling Assembly; AND (3) CAS 09-99-06, Gas Sampling Assembly Closure activities began in August 2011 and were completed in June 2012. Activities were conducted according to the Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) for CAU 547 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The recommended corrective action for the three CASs in CAU 547 was closure in place with administrative controls. The following closure activities were performed: (1) Open holes were filled with concrete; (2) Steel casings were placed over vertical expansion joints and filled with cement; (3) Engineered soil covers were constructed over piping and exposed sections of the gas sampling system components; (4) Fencing, monuments, Jersey barriers, radiological postings, and use restriction (UR) warning signs were installed around the perimeters of the sites; (5) Housekeeping debris was picked up from around the sites and disposed; and (6) Radiological surveys were performed to confirm final radiological postings. UR documentation is included in Appendix D. The post-closure plan was presented in detail in the CADD/CAP for CAU 547 and is included as Appendix F of this report. The requirements are summarized in Section 5.2 of this report. The proposed post-closure requirements consist of visual inspections to determine the condition of postings and radiological surveys to verify contamination has not migrated. NNSA/NSO requests the following: (1) A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 547; and (2) The transfer of CAU 547 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO.

  20. United States Department of Defense | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al.,Turin, New York:Power Company Jump to: navigation,Defense Jump to:

  1. Meeting Department of Defense non-hazardous solid waste goals

    SciTech Connect (OSTI)

    Eakes, W.S.; Comstock, J.

    1999-07-01

    This paper will discuss the previous and present Department of Defense (DOD) non-hazardous solid waste goals and how Navy and Marine Corps installation collect solid waste data and measure the goals. The installation and central data collection systems used, data collection problems and solutions, data quality, and the yearly measure. The paper will also discuss the original solid waste reduction and diversion goal and how the Navy and Marine Corps performed. The new DOD landfill and incineration diversion goal will be discussed and some techniques the Navy will use to meet the new goals.

  2. Indiana Office of Energy Defense Development | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder at 8, 13 (Vt. Water Res.:01Energy Defense Development Jump to:

  3. On Security Notions for Verifiably Encrypted Signature

    E-Print Network [OSTI]

    1010 Leadership Laboratory IB .5 AEROS 1111 A AERO 1100 The Air Force Today 1 E AERO 1110 Aero Defense

  4. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Drollinger, Harold; Holz, Barbara A; Bullard, Thomas F; Goldenberg, Nancy G; Ashbaugh, Laurence J; Griffin, Wayne R

    2014-01-09

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the summer of 2011. It was discovered that major modifications to the terrain have resulted from four principal activities. These are road construction and maintenance, mining activities related to development of the tunnel complex, site preparation for activities related to the tests and experiments, and construction of drill pads and retention ponds. Six large trenches for exploring across the Boundary geologic fault are also present. The U15 Complex, designated historic district 143 and site 26NY15177, is eligible to the National Register of Historic Places under Criteria A, C, and D of 36 CFR Part 60.4. As a historic district and archaeological site eligible to the National Register of Historic Places, the Desert Research Institute recommends that the area defined for the U15 Complex, historic district 143 and site 26NY15117, be left in place in its current condition. The U15 Complex should also be included in the NNSS cultural resources monitoring program and monitored for disturbances or alterations.

  5. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  6. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  7. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  8. SEAB Memorandum on NAS Report, Aligning the Governance Structure of the NNSA Laboratories to Meet 21st Century National Security Challenges

    Broader source: Energy.gov [DOE]

    This memorandum transmits the comments of the SEAB Task Force on DOE National Laboratories on the recently released report of the Committee on Assessment of the Governance Structure of the NNSA National Security, entitled Aligning the Governance Structure of the NNSA Laboratories to Meet 21st Century National Security Challenges. That committee, chaired by Richard A. Meserve, was formed by the National Research Council in response to the FY2013 National Defense Authorization Act which directed the Administrator of the NNSA to “commission an independent assessment regarding the transition of the NNSA laboratories to multiagency, federally funded research and development centers (FFRDCs) with direct sustainment and sponsorship by multiple national security agencies.”

  9. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  10. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  11. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  12. Safeguards and Security progress report, January--December 1989

    SciTech Connect (OSTI)

    Smith, D.B.; Jaramillo, G.R. (comps.)

    1990-11-01

    From January to December 1989, the Los Alamos Safeguards and Security Research and Development (R D) program carried out the activities described in the first four parts of this report: Science and Technology Base Development, Basic Systems Design, Onsite Test and Evaluation and Facility Support, and International Safeguards. For the most part, these activities were sponsored by the Department of Energy's Office of Safeguards and Security. Part 1 covers development of the basic technology essential to continuing improvements in the practice of safeguards and security. It includes our computer security R D and the activities of the DOE Center for Computer Security, which provides the basis for encouraging and disseminating this important technology. Part 2 treats activities aimed at developing methods for designing and evaluating safeguards systems, with special emphasis on the integration of the several subsystems into a real safeguards system. Part 3 describes efforts of direct assistance to the DOE and its contractors and includes consultation on materials control and accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and demonstration of advanced safeguards systems. Part 3 also reports a series of training courses in various aspects of safeguards that makes the technology more accessible to those who must apply it. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Part 5 reports several safeguards-related activities that have sponsors other than the DOE/OSS. 87 refs., 52 figs.

  13. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  14. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  16. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  17. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  18. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  19. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  20. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.