Powered by Deep Web Technologies
Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

2

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry |...

3

IT issues on homeland security and defense  

Science Conference Proceedings (OSTI)

This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defense of the US government. ... Keywords: and cyber threats, emergency readiness, homeland defense, homeland security, terror and disaster control

Kangbin Yim; Ilsun You

2011-08-01T23:59:59.000Z

4

Defense Programs | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Defense Programs Home > About Us > Our Programs > Defense Programs Defense Programs One of the primary missions of NNSA is to maintain and enhance the safety, security and reliability of the U.S. nuclear weapons stockpile. NNSA,

5

Defense Programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Defense Programs Home > About Us > Our Programs > Defense Programs Defense Programs One of the primary...

6

Poland and the European Union's security and defense policy .  

E-Print Network (OSTI)

??This thesis analyzes key factors in Poland's decision-making concerning the European Union's European Security and Defense Policy (ESDP). It reviews the development of Polish policy… (more)

Falecki, Tomasz.

2004-01-01T23:59:59.000Z

7

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

8

Counterintelligence and operations security-support program for the Defense Nuclear Agency. Directive  

Science Conference Proceedings (OSTI)

The Directive establishes the counterintelligence (CI) and operations security (OPSEC) support program for the Defense Nuclear Agency which includes activities designed to protect classified and operationally sensitive unclassified information and material. Included are CI investigations, counterespionage and countersabotage operations, OPSEC analyses, technical surveillance countermeasures services, CI security education, and CI security assistance.

Nelson, L.

1983-01-25T23:59:59.000Z

9

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2006 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/13/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4455 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2006

10

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

3 3 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2003 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/10/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4452 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2003

11

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

8 8 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2008 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/15/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4457 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2008

12

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

10 10 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2010 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/17/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4459 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2010

13

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

2 2 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2002 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/09/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4451 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2002

14

2013 NNSA Defense Programs Science Council | National Nuclear Security  

National Nuclear Security Administration (NNSA)

3 NNSA Defense Programs Science Council | National Nuclear Security 3 NNSA Defense Programs Science Council | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > 2013 NNSA Defense Programs Science Council 2013 NNSA Defense Programs Science Council Posted By Office of Public Affairs 2013 NNSA Defense Programs Science Council Members of the 2013 NNSA Defense Programs Science Council include, from

15

Defense Nuclear Security Safeguards and Security Evaluation and Performance Assurance Program  

E-Print Network (OSTI)

for Defense Nuclear Security (DNS) is issuing this document to promulgate the DNS Evaluation and Performance Assurance Program of the NNSA safeguards and security functional area. Suggestions for improving this document are welcome and should be sent in writing to:

Bradley A. Peterson

2009-01-01T23:59:59.000Z

16

Sandia National Laboratories: National Security Missions: Defense...  

NLE Websites -- All DOE Office Websites (Extended Search)

Cybersecurity Delivering experience & expertise Training the next generation of cyber defenders Cybersecurity computing Defending national security Applying science and engineering...

17

Second Line of Defense Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Line of Defense Program | National Nuclear Security Administration Line of Defense Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Second Line of Defense Program Home > About Us > Our Programs > Nonproliferation > International Materials Protection and Cooperation > Second Line of Defense Program Second Line of Defense Program In April 2009, President Obama called the danger of a terrorist acquiring

18

Second Line of Defense Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Line of Defense Program | National Nuclear Security Administration Line of Defense Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Second Line of Defense Program Home > About Us > Our Programs > Nonproliferation > International Materials Protection and Cooperation > Second Line of Defense Program Second Line of Defense Program In April 2009, President Obama called the danger of a terrorist acquiring

19

ASD(NII)/DoD CIO SUBJECT: Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Activities  

E-Print Network (OSTI)

directing the conduct of DIB CS/IA activities to protect unclassified DoD information, as defined in the Glossary, that transits or resides on unclassified DIB information systems and networks. 2. APPLICABILITY. This Instruction applies to OSD, the Military Departments, the Office of

unknown authors

2010-01-01T23:59:59.000Z

20

Defense Nuclear Facilities Safety Board Review at the Nevada National Security Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSS-2011-001 NNSS-2011-001 Site: Nevada National Security Site Subject: Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Defense Nuclear Facilities Safety Board Review at the Nevada National Security Site Dates of Activity 02/14/2011 - 02/17/2011 Report Preparer William Macon Activity Description/Purpose: The U.S. Department of Energy Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), visited the Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from February 14-17, 2011. The purpose of the visit was to observe the Defense Nuclear Facilities Safety Board (DNFSB) review and maintain operational awareness of NNSS activities. Result:

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Statement on Defense Nuclear Nonproliferation and Naval Reactors Activities  

National Nuclear Security Administration (NNSA)

Defense Nuclear Nonproliferation and Naval Reactors Activities Defense Nuclear Nonproliferation and Naval Reactors Activities before the House Committee on Appropriations Subcommittee on Energy & Water Development | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Congressional Testimony > Statement on Defense Nuclear

22

Statement on Defense Nuclear Nonproliferation and Naval Reactors Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Defense Nuclear Nonproliferation and Naval Reactors Activities Defense Nuclear Nonproliferation and Naval Reactors Activities before the House Committee on Appropriations Subcommittee on Energy & Water Development | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Congressional Testimony > Statement on Defense Nuclear

23

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

24

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

25

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

26

Program Activities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Activities | National Nuclear Security Administration Activities | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Program Activities Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Program Activities

27

Independent Activity Report, Nevada National Security Site - February 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 2011 Independent Activity Report, Nevada National Security Site - February 2011 February 2011 Nevada National Security Site Defense Nuclear Facility Safety Board Review [ARPT-NNSS-2011-001] The U.S. Department of Energy Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), visited the Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from February 14-17, 2011. The purpose of the visit was to observe the Defense Nuclear Facilities Safety Board (DNFSB) review and maintain operational awareness of NNSS activities. Independent Activity Report, Nevada National Security Site - February 2011 More Documents & Publications Independent Activity Report, Nevada National Security Site - July 2011 Independent Activity Report, Nevada National Security Site - August 2010

28

Enhanced Secure DNS:  A Defense Against DDOS Attacks  

E-Print Network (OSTI)

The success of distributed denial of service (DDOS)  attacks carried out against ebusiness websites in February 2000 pointed out the deficiencies of an Internet where millions of dollars are transacted daily. Many experts call for the cooperation of the Internet community as a whole to follow safe network administation practices in order to foil the DDOS threat,  but such advice mostly goes unheeded. A novel strategy to fight DDOS attacks,  called intrusion tolerance,  argues that such attacks are impossible to stop,  so it is better to find a way to successfully tolerate them. One such proposal,  termed the Secure Collective Defense (SCOLD),  uses nextgeneration domain name system (DNS)  Berkeley Internet Name Domain (BIND)  software to enable preferred clients to communicate with computers on a network that is being attacked. The features of this new BIND code include a program,  nsreroute,  that securely installs an authoritative zone for the victim domain onto a client DNS server. This BIND software sets up an IP tunnel that forces queries from the client DNS server to the victim DNS server to traverse a SCOLDaware proxy server,  which forwards the query through a secret alternate gateway. This thesis chronicles the addition of code made to the latest version of BIND to satisfy the requirements of SCOLD. The results of experiments using the enhanced DNS BIND in the SCOLD architecture is detailed. This paper ends with the many lessons I have learned from this project. iii

David Boyd Wilkinson; David B. Wilkinson; C. Edward Chow; David Boyd (m. S; Computer Science; C. Edward Chow

2003-01-01T23:59:59.000Z

29

Control Systems Cyber Security: Defense in Depth Strategies ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and direction for developing 'defense-in-depth' strategies for organizations that use control system networks while maintaining a multi-tier information architecture. Control...

30

NPO recognized by Defense Programs | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

vice President for Production. NPO recognized by Defense Programs Posted on October 24, 2013 at 1:00 pm ET Printer-friendly version Printer-friendly version Facebook Twitter...

31

Independent Activity Report, Y-12 National Security Complex - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex - June Y-12 National Security Complex - June 2011 Independent Activity Report, Y-12 National Security Complex - June 2011 June 2011 Site Lead Orientation Visit to the Y-12 Site Office and Y-12 National Security Complex [HIAR-Y-12-2011-06-23] The purposes of the visit were to discuss the nuclear safety oversight strategy, initiate the site lead program, increase operational awareness of the site's activities, and discuss methods the Office of Health, Safety and Security (HSS) uses to carry out its independent oversight responsibilities. Independent Activity Report, Y-12 National Security Complex - June 2011 More Documents & Publications Independent Activity Report, Oak Ridge Office - June 2011 Independent Activity Report, Defense Nuclear Facilities Safety Board Public

32

Analytical Chemistry for Homeland Defense and National Security  

SciTech Connect

The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

2002-08-18T23:59:59.000Z

33

Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses  

E-Print Network (OSTI)

Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adversary's territory enables the detection and tracking of enemy soldiers and vehicles. For home/office environments, indoor sensor networks offer the ability to monitor the health of the elderly and to detect intruders via a wireless home security system. In each of these scenarios, lives and livelihoods may depend on the timeliness and correctness of the sensor data obtained from dispersed sensor nodes. As a result, such WSNs must be secured to prevent an intruder from obstructing the delivery of correct sensor data and from forging sensor data. To address the latter problem, end-to-end data integrity checksums and pos...

Sen, Jaydip

2011-01-01T23:59:59.000Z

34

Risk Analysis & Security Rule Compliance Activities  

Science Conference Proceedings (OSTI)

... Risk Analysis & Security Rule Compliance Activities Marissa Gordon- Nguyen, JD, MPH Health Information Privacy Specialist ...

2010-05-13T23:59:59.000Z

35

Active, Non-Intrusive Inspection Technologies for Homeland Defense  

SciTech Connect

Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

James L. Jones

2003-06-01T23:59:59.000Z

36

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

37

Office of Secure Transportation Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16th, 2012 16th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct other missions supporting the national security of the United States of America. 3 5 OST's Commitment to Transportation Safety and Security Over three decades of safe, secure transport of nuclear weapons and special nuclear material to and from military locations and DOE facilities More than 140 million miles traveled Over three decades and 240,000 flight hours of accident-free flying Professionalism We conduct ourselves and our operations with the highest standards of professionalism and integrity.

38

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

39

Transportation Security Rulemaking Activities at the U.S. Nuclear...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Activities at the U.S. Nuclear Regulatory Commission Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission Transportation Security Rulemaking...

40

A Summary of Control System Security Standards Activities in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Defense Nuclear Facilitiets Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HSS Independent Activity Report - HSS Independent Activity Report - Rev. 1 Report Number: HIAR LANL-2012-08-16 Site: Los Alamos National Laboratory (LANL) Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory Dates of Activity : 08/14/2012 - 08/16/2012 Report Preparer: Robert Freeman Activity Description/Purpose: The purpose of this Office of Health, Safety and Security (HSS) activity was to maintain site operational awareness of key nuclear safety performance areas of interest to the Defense Nuclear Facilities Safety Board (DNFSB), monitor ongoing site oversight and planning activities for Los Alamos National Laboratory (LANL) nuclear facilities, and identify and initiate

42

Defense Nuclear Facilitiets Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Independent Activity Report - HSS Independent Activity Report - Rev. 1 Report Number: HIAR LANL-2012-08-16 Site: Los Alamos National Laboratory (LANL) Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory Dates of Activity : 08/14/2012 - 08/16/2012 Report Preparer: Robert Freeman Activity Description/Purpose: The purpose of this Office of Health, Safety and Security (HSS) activity was to maintain site operational awareness of key nuclear safety performance areas of interest to the Defense Nuclear Facilities Safety Board (DNFSB), monitor ongoing site oversight and planning activities for Los Alamos National Laboratory (LANL) nuclear facilities, and identify and initiate

43

Independent Activity Report, Nevada National Security Site - December 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit [HIAR NNSS-2012-12-03] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit to observe Subcritical Experiment (SCE) activities at the U1a Complex, discuss ongoing activities at the National Criticality Experiment Research Center (NCERC), and monitor the status of other ongoing site activities at the Nevada National Security Site (NNSS) operated by National Security Technologies, LLC (NSTec). Independent Activity Report, Nevada National Security Site - December 2012 More Documents & Publications Independent Activity Report, Nevada National Security Site - August 2012

44

Independent Activity Report, Nevada National Security Site - August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August August 2012 Independent Activity Report, Nevada National Security Site - August 2012 August 2012 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2012-08-16] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit to observe Subcritical Experiment (SCE) activities at the U1a Complex, discuss ongoing activities at the Device Assembly Facility (DAF) and the National Criticality Experiment Research Center (NCERC), and monitor the status of other ongoing site activities at the Nevada National Security Site (NNSS) operated by National Security Technologies, LLC (NSTec). Independent Activity Report, Nevada National Security Site - August 2012 More Documents & Publications

45

Case study: Securing knowledge in organizations: lessons from the defense and intelligence sectors  

Science Conference Proceedings (OSTI)

The interest in the field of knowledge management continues to grow at an astounding rate. An organization must leverage its core competencies, which are mostly knowledge-based resources, in order to survive and thrive in the current marketplace. While ... Keywords: Knowledge management, National security, Security

Kevin C. Desouza; Ganesh K. Vanapalli

2005-02-01T23:59:59.000Z

46

In defense of the realm: understanding the threats to information security  

Science Conference Proceedings (OSTI)

The popular press is replete with information about attacks on information systems. Viruses, worms, hackers, and employee abuse and misuse have created a dramatic need for understanding and implementing quality information security. In order to accomplish ...

Michael E. Whitman

2004-02-01T23:59:59.000Z

47

September 10, 2010 HSS Briefing to the Defense Nuclear Facilities Safety Board (DNFSB) on Union Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Labor Union and Stakeholder Labor Union and Stakeholder Outreach and Collaboration Office of Health, Safety and Security Briefing to the Defense Nuclear Facilities Safety Board Briefing to the Defense Nuclear Facilities Safety Board Leadership Commitment Leadership Commitment " h "It is imperative that we communicate and establish relationships with those elements that train manage and elements that train, manage and represent our workforce to improve the safety culture at DOE sites." safety culture at DOE sites. Glenn S. Podonsky Chief Health, Safety and Security Officer 2 History History History History October 2006: Formation of HSS to provide an integrated DOE HQ-level function for health, safety, environment, and security into one unified office. February 2007: Established HSS Focus Group -

48

May 2012, Department of Energy Activities Relating to the Defense...  

NLE Websites -- All DOE Office Websites (Extended Search)

throughout the Department. Safety and Security Reform Initiative The goal of the directives reform initiative is to ensure that the Department has a comprehensive set of...

49

Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms  

Science Conference Proceedings (OSTI)

Evolution in cloud services and infrastructure has been constantly reshaping the way we conduct business and provide services in our day to day lives. Tools and technologies created to improve such cloud services can also be used to impair them. By using ... Keywords: cloud computing infrastructure, cyber security, denial of service (DoS), game theory

Harkeerat Singh Bedi; Sajjan Shiva

2012-08-01T23:59:59.000Z

50

Independent Activity Report, Nevada National Security Site - July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent Activity Report, Nevada National Security Site - July Independent Activity Report, Nevada National Security Site - July 2011 Independent Activity Report, Nevada National Security Site - July 2011 July 2011 NNSS Operational Readiness Review of the Joint Actinide Shock Physics Experimental Research Facility [HIAR-NNSS-2011-07-28] At the request of the National Nuclear Security Administration (NNSA) Service Center, the U.S. Department of Energy (DOE) Office of Health, Safety and Security (HSS) site lead for the Nevada National Security Site (NNSS) participated in the NNSA Operational Readiness Review (ORR) of the Joint Actinide Shock Physics Experimental Research (JASPER) Facility Restart conducted on July 18-27, 2011. Independent Activity Report, Nevada National Security Site - July 2011 More Documents & Publications

51

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

52

Independent Activity Report, Nevada National Security Site - August 2010 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Activity Report, Nevada National Security Site - August Activity Report, Nevada National Security Site - August 2010 Independent Activity Report, Nevada National Security Site - August 2010 Nevada Critical Experiment Facility Tour and Attendance at the Nuclear Criticality Safety Program The U.S. Department of Energy (DOE), Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), participated in the DOE Criticality Safety Support Group's (CSSG) activities in/near Las Vegas, Nevada, including a tour of the Critical Experiment Facility (CEF) located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS). These activities support DOE's Nuclear Criticality Safety Program (NCSP). Independent Activity Report, Nevada National Security Site - August 2010 More Documents & Publications

53

Program Activities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

54

Independent Activity Report, Nevada National Security Site - January 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site - Nevada National Security Site - January 2011 Independent Activity Report, Nevada National Security Site - January 2011 January 2011 Nevada National Security Site Orientation Visit The U.S. Department of Energy (DOE) Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), conducted an orientation visit to the DOE Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from January 11-13, 2011. The purpose of the visit was to discuss the nuclear safety oversight strategy, initiate the site lead program, increase HSS personnel's operational awareness of the site's activities, and to determine how HSS can carry out its independent oversight and mission support responsibilities. Independent Activity Report, Nevada National Security Site - January 2011

55

Office of Secure Transportation Activities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Activities Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct...

56

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

57

Independent Activity Report, Office of Secure Transportation - March 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Activity Report, Office of Secure Transportation - Activity Report, Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the Emergency Planning Hazards Assessment and Protection Action Recommendation Cards for the Office of Secure Transportation [HIAR-OST-2011-03-04] The Office of Emergency Management Oversight (HS-63) conducted a review of a new revision of the Office of Secure Transportation (OST) emergency planning hazards assessment (EPHA) and protective action recommendation (PAR) cards. The review was conducted at the Headquarters OST Albuquerque Office. The purpose of the visit was to evaluate the appropriateness of OST's path forward in revising the EPHA and PAR cards. Independent Activity Report, Office of Secure Transportation - March 2011

58

Active Hardware Metering for Intellectual Property Protection and Security  

E-Print Network (OSTI)

1 Active Hardware Metering for Intellectual Property Protection and Security Farinaz Koushanfar $$$ #12;3 Hardware Metering · HW Metering is a system of security protocols that enable the design house active HW metering · Emerging applications · Metering can facilitate new business models Why

Mellor-Crummey, John

59

Best Practices Guide to Securing Wireless Substation Applications  

Science Conference Proceedings (OSTI)

The use of wireless communications in substations raises a number of security concerns. This report, an updated version of EPRI report 1013810) identifies wireless security best practices for electric substation applications, giving special consideration to a defense-in-depth approach to wireless security. The emphasis is on technical, administrative, and operational security controls. In addition to discussing the defense-in-depth concept, the report also examines training activities and rogue device de...

2009-02-18T23:59:59.000Z

60

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Independent Activity Report, Nevada National Security Site - July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July July 2011 Independent Activity Report, Nevada National Security Site - July 2011 July 2011 Review of Nevada National Security Site Device Assembly Facility Justification for Continued Operations for Inoperable HEPA-Filtered Ventilation System [HIAR-NNSS-2011-07-08] As an operational awareness activity, the Office of Health, Safety and Security (HSS) site lead reviewed a recent Justification for Continued Operations (JCO) for the Inoperable High Efficiency Particulate Air (HEPA)-Filtered Ventilation System at the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS). The JCO and SER adequately define specific operational restrictions and other compensatory measures supported by analysis in accordance with the guidance in DOE G 424.1-1.

62

NREL: Technology Transfer - Defense Department Announces ...  

Defense Department Announces Funding Opportunity for Energy Technology Demonstrations March 1, 2013. Through the Environmental Security Technology ...

63

Independent Activity Report, Los Alamos National Security - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security - June National Security - June 2011 Independent Activity Report, Los Alamos National Security - June 2011 June 2011 Review of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment Practices [HIAR-LANL-2011-06-08] This review evaluated the establishment and maintenance of specific elements of the ERO, including their responsibilities for initial and ongoing response to and mitigation of an emergency. Additionally, evaluation criteria addressed effective control at the event scene and integration of local agencies and organizations that provide onsite response services. The review also evaluated whether an adequate number of experienced and trained personnel, including designated alternates, are available on demand for timely and effective performance of assigned ERO

64

Independent Activity Report, Nevada National Security Site - April 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April April 2011 Independent Activity Report, Nevada National Security Site - April 2011 April 2011 Nevada National Security Site Operational Readiness Review for the Joint Actinide Shock Physics Experimental Research Facility Restart Pre-visit [HIAR-NNSS-2011-04-28] In coordination with the National Nuclear Security Administration (NNSA) Service Center, the Office of Health, Safety and Security (HSS) site lead participated in a pre-visit for the NNSA Operational Readiness Review (ORR) of the Joint Actinide Shock Physics Experimental Research (JASPER) facility restart conducted April 25-28, 2011. The results of the pre-visit were the completion of required site access training, coordination with Site Office and JASPER facility counterparts regarding the breadth and scope of the ORR and obtaining applicable

65

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

66

Photo Album Of FAPAC - NM Activities | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Photo Album Of FAPAC - NM Activities | National Nuclear Security Photo Album Of FAPAC - NM Activities | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Photo Album Of FAPAC - NM Activities Home > About Us > Our Locations > Albuquerque Complex > Federal Asian Pacific American Council - New Mexico Chapter Albuquerque, NM > Photo Album Of FAPAC - NM Activities

67

Implications of the Lisbon Treaty on the European Union's Common Security Defense Policy and the Emerging Strategic  

E-Print Network (OSTI)

, such as those involving Iran and North Korea; significant strengthening of the nuclear non-proliferation and nuclear security regimes, including bringing India, Israel and Pakistan into the Nuclear Non-Proliferation of states not conforming to international rules and norms. In the nuclear non-proliferation regime

68

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design Centers Supercomputing Top 500 List ASC at Supercomputing Conference Printer-friendly version Printer-friendly version Facebook

69

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

70

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

71

March 23, 1983: Strategic Defense Initiative (SDI)  

Energy.gov (U.S. Department of Energy (DOE))

March 23, 1983President Reagan addresses the nation on national security and announces the Strategic Defense Initiative (SDI), a satellite-based defense system that would destroy incoming missiles...

72

CMC Participation in the Regional Centre for Strategic Studies (RCSS) Workshop: Defense, Technology and Cooperative Security in South Asia  

Science Conference Proceedings (OSTI)

As an ongoing part of the collaborative efforts between the Cooperative Monitoring Center (CMC) at Sandia National Laboratories, the United States Arms Control and Disarmament Agency (ACDA), and U.S. Department of Energy (DOE), staff from the CMC served as faculty in conducting a workshop in Shanghai, China. Sponsor of the workshop was the Regional Centre for Strategic Studies (RCSS) based in Colombo, Sri Lanka. The workshop included participants from throughout South Asia and China. The CMC presented four sessions related to the role of monitoring technologies in promoting regional security and building confidence among nations. Participation in these workshops supports U.S. efforts to further regional cooperation and promote arms control, nonproliferation and other cooperative securily measures and supplements efforts funded by DOE and ACDA over the past four years. The RCSS Shanghai meeting permitted a continued CMC involvement in regionally conducted training for anew generation of leaders in government, the military, and academia throughout South Asia and China. Nuclear issues are clearly a dominant South Asian concern since the nuclear tests of May 1998. However, there remains a strong interest in identifying opportunities for increased trade and reduced tensions in other areas. The RCSS and other regional organizations are enthusiastic about continued CMC involvement in future regional courses.

Biringer, K.L.; Olsen, J.

1998-11-01T23:59:59.000Z

73

ARM - Defensive Shotgun - Remington 870 Operator's Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

AlaskaDefensive Shotgun - Remington 870 AlaskaDefensive Shotgun - Remington 870 Operator's Guide Page Contents Firearms Safety Nomenclature Disassembly Care and Cleaning Assembly Function Check Marksmanship Fundamentals Zeroing Loading Chamber Checking Unloading Condition-One Malfunction: Failure to Fire Condition-Two Malfunction: Failure to Eject Condition-Three Malfunction: Failure to Extract Ready Positions Carries Standing Kneeling Sitting Barricade Defensive Shotgun - Remington 870 Operator's Guide U.S. Department of Energy Safeguards and Security Central Training Academy FIREARMS SAFETY Firearms safety is as important during daily activities as during range and training activities. Observing a few precautions when handling firearms in the field can help ensure your safety and that of those around you. It will

74

NREL: Technology Transfer - Defense Department Announces Funding ...  

... 2013. Through the Environmental Security Technology Certification Program, the U.S. Department of Defense (DoD) seeks proposals for Fiscal Year 2014 projects that ...

75

Annual Planning Summaries: National Nuclear Security Administration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Science University Programs (NNSA-DSUP) Annual Planning Summaries: National Nuclear Security Administration-Defense Science University Programs (NNSA-DSUP...

76

A Summary of Control System Security Standards Activities in the Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Summary of Control System Security Standards Activities in the A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of several of the sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. Summary of CS Standards Activities in the Energy Sector.pdf More Documents & Publications

77

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

78

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

79

Activities to Secure Control Systems in the Energy Sector  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

sector sector NSTB November 2008 Hank Kenchington - Program Manager Office of Electricity of Delivery and Energy Reliability U.S. Department of Energy Activities to Secure Control Systems in the Energy Sector * 2,000,000 Miles of Oil Pipelines * 1,300,000 Miles of Gas Pipelines * 2,000 Petroleum Terminals * ~1,000,000 Wells * Extensive Ports, Refineries, Transportation, and LNG Facilities * 160,000 Miles of Electrical Transmission lines * ~17,000 Generators; 985,000 Megawatts (net summer capacity) * Over 3,100 Electric Utilities, with 131 million customers Refinery Locations, Crude and Product Pipelines Source: Energy Information Administration, Office of Oil & Gas LNG Import Facilities (Reactivation underway) Legend Interstate Pipelines Intrastate and Other Pipelines

80

Defense and nuclear technologies  

SciTech Connect

Fulfilling our national security and stockpile stewardship responsibilities requires tremendous scientific and technical breadth: from esoteric theoretical physics and computational modeling to materials science and precision engineering. Because there exists no broad industrial or university base from which to draw expertise in nuclear weapon science and technology, we rely heavily on formal peer reviews and informal exchanges with our sister laboratory at Los Alamos. LLNL has an important, long-term role in the nation`s nuclear weapons program. We are responsible for four of the ten weapon systems in the enduring US stockpile (three of nine after 2002), including the only systems that incorporate all modern safety features. For years to come, we will be responsible for these weapons and for the problems that will inevitably arise. Our nuclear expertise will also play a crucial role as the US attempts to deal effectively with the threat of nuclear proliferation. This past year brought the culmination of our response to profound changes in the nation`s defense needs as we restructured and refocused our activities to address the Administration`s goal of reducing global nuclear danger. We made major contributions to important national security issues in spite of severe fiscal constraints.

NONE

1995-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Oversight Reports - Y-12 National Security Complex | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Oversight Reports - Y-12 National Security Complex Independent Oversight Appraisal, Y-12 National Security Complex - May 2013 Appraisal of the Uranium Processing Facility Safety Basis Preliminary Safety Design Report Process at the Y-12 National Security Complex Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] Independent Oversight Assessment, Y-12 National Security Complex - June 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project Independent Oversight Review, Babcock & Wilcox Technical Services Y-12, LLC

82

NIST Activities in Support of the Energy Independence and Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the Energy Independence and Security Act (EISA) of 2007 Revitalizing the electric power grid has become one of our Nation's top priorities, promising to reduce our...

83

Recommended Practice: Defense-in-Depth  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report # INL/EXT-06-11478 Report # INL/EXT-06-11478 Control Systems Cyber Security: Defense in Depth Strategies May 2006 Prepared by Idaho National Laboratory Recommended Best Practice: Defense in Depth 2 Table of Contents Keywords............................................................................................................................. 3 Introduction......................................................................................................................... 3 Background ......................................................................................................................... 3 Overview of Contemporary Control System Architectures................................................. 4 Security Challenges in Control Systems .............................................................................

84

ARMY SUPPORT TO SECURITY COOPERATION  

E-Print Network (OSTI)

includes-- National Security Strategy. National Defense Strategy. Quadrennial Defense Review Report REVIEW REPORT 1-11. The quadrennial defense review (known as QDR) is a congressionally mandated DOD review of strategy, programs, and resources. The 2010 Quadrennial Defense Review Report states

US Army Corps of Engineers

85

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, Calendar Year 1999  

SciTech Connect

This is the tenth Annual Report to the Congress describing Department of Energy activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of Energy regarding public health and safety issues at the Department's defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. During 1999, Departmental activities resulted in the closure of nine Board recommendations. In addition, the Department has completed all implementation plan milestones associated with three Board recommendations. One new Board recommendation was received and accepted by the Department in 1999, and a new implementation plan is being developed to address this recommendation. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, opening of a repository for long-term storage of transuranic wastes, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2000-02-01T23:59:59.000Z

86

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998  

Science Conference Proceedings (OSTI)

This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

NONE

1999-02-01T23:59:59.000Z

87

NIST Activities in Support of the Energy Independence and Security Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NIST Activities in Support of the Energy Independence and Security NIST Activities in Support of the Energy Independence and Security Act (EISA) of 2007 NIST Activities in Support of the Energy Independence and Security Act (EISA) of 2007 Revitalizing the electric power grid has become one of our Nation's top priorities, promising to reduce our dependence on oil and to meet the anticipated 1.1% annual increase in demand for electricity1. In his New Energy for America plan, President-elect Obama calls for increased investment in the next generation power grid, referred to as the Smart Grid, to help reach the ambitious goals of ensuring that renewable sources provide 10% of our electricity by 2012 and 25% by 2025; and that 1 million Plug-In Hybrid cars are on the roads by 2015. NIST Activities in Support of the Energy Independence and Security Act

88

Deception used for Cyber Defense of Control Systems  

Science Conference Proceedings (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

89

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Test...

90

Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration Reports Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Test and...

91

National Nuclear Security Administration (NNSA)  

NLE Websites -- All DOE Office Websites (Extended Search)

Team Summary I. Background: Defense Programs (DP) provides the core of the NNSA National Security Enterprise through its preeminent nuclear weapons scientific, engineering, and...

92

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

93

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

94

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

95

NNSA's Second Line of Defense Program Receives Capability Award...  

National Nuclear Security Administration (NNSA)

Institute (UNICRI) and the U.S. Defense Threat Reduction Agency (DTRA). SLD's capacity-building work in the area of nuclear nonproliferation and nuclear security was...

96

Inconsistency in deception for defense  

Science Conference Proceedings (OSTI)

The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developing systematic methods of deception. The cornerstone of these methods is ... Keywords: deception, inconsistency, operating systems, security

Vicentiu Neagoe; Matt Bishop

2006-09-01T23:59:59.000Z

97

Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000  

Science Conference Proceedings (OSTI)

This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2001-03-01T23:59:59.000Z

98

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

99

Rock mechanics contributions from defense programs  

SciTech Connect

An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth`s interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges.

Heuze, F.E.

1992-02-01T23:59:59.000Z

100

NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2000 NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 An Act to authorize appropriations for fiscal year 2000 for military activities of the Department of Defense, for...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration Contact Us Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Test...

102

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

Science Conference Proceedings (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

103

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

104

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

105

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

106

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

107

Disposal Activities and the Unique Waste Streams at the Nevada National Security Site (NNSS)  

SciTech Connect

This slide show documents waste disposal at the Nevada National Security Site. Topics covered include: radionuclide requirements for waste disposal; approved performance assessment (PA) for depleted uranium disposal; requirements; program approval; the Waste Acceptance Review Panel (WARP); description of the Radioactive Waste Acceptance Program (RWAP); facility evaluation; recent program accomplishments, nuclear facility safety changes; higher-activity waste stream disposal; large volume bulk waste streams.

Arnold, P.

2012-10-31T23:59:59.000Z

108

Office of the Assistant General Counsel for International and National Security Programs  

Energy.gov (U.S. Department of Energy (DOE))

The Office of the Assistant General Counsel for International and National Security Programs provides legal advice in support of DOE defense and national security programs, intelligence and counter...

109

Energy and Defense Departments Announce Agreement to Enhance Cooperation on  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Defense Departments Announce Agreement to Enhance and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security July 27, 2010 - 12:00am Addthis Washington, D.C. - At a White House Forum on Energy Security today, U.S. Deputy Secretary of Energy Daniel Poneman announced a Memorandum of Understanding (MOU) between the U.S. Department of Energy and the U.S. Department of Defense to accelerate clean energy innovation and enhance national energy security. America's military pays a high price in terms of added cost, risk of life, and lost operational flexibility in order to deliver fuel supplies to our forces in combat. Both agencies are committed to reducing these

110

NNSA Established | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Established | National Nuclear Security Administration Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Established NNSA Established March 01, 2000 Washington, DC NNSA Established The Department activates the National Nuclear Security Administration (NNSA), meeting the statutory deadline established by the FY 2000 defense

111

Sandia National Laboratories: National Security Missions: Defense...  

NLE Websites -- All DOE Office Websites (Extended Search)

that help protect U.S. government, military, and civilian computer networks from cyber threats; conduct threat assessments; and work nationally to increase public...

112

Sandia National Laboratories: National Security Missions: Defense...  

NLE Websites -- All DOE Office Websites (Extended Search)

strategic competitors developing increasingly advanced military capabilities; unstable powers seeking weapons of mass destruction; terrorists and insurgents wielding deceptively...

113

Expanding Malware Defense by Securing Software Installations  

E-Print Network (OSTI)

installations. Our technique can support a diversity of package managers and software installers. It is based of the files used by benign software packages, thus blocking the most common mechanism used by malware future runs of an untrusted package will take place within an administrator-specified sandbox. Our

Sekar, R.

114

Foundations of attack-defense trees  

Science Conference Proceedings (OSTI)

We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical ...

Barbara Kordy; Sjouke Mauw; Saša Radomirovi?; Patrick Schweitzer

2010-09-01T23:59:59.000Z

115

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

116

Improved security for commercial container transports using an innovative active RFID system  

Science Conference Proceedings (OSTI)

The huge number of containers daily involved in the global transportation system opens important logistic and security issues. The matter of improving the management of goods in the harbor and the serious vulnerability problem of containers are relevant ... Keywords: Electronic seals, RFID technology, Secure supply chain, Secure transport, Wireless communications

Francesco Rizzo; Marcello Barboni; Lorenzo Faggion; Graziano Azzalin; Marco Sironi

2011-05-01T23:59:59.000Z

117

ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks  

Science Conference Proceedings (OSTI)

Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical ... Keywords: Anonymity, MANET, Monitoring, Packet forwarding, Secure link layer acknowledgment, Secure reporting protocol, Security

Heesook Choi; William Enck; Jaesheung Shin; Patrick D. Mcdaniel; Thomas F. Porta

2009-05-01T23:59:59.000Z

118

NNSA honors Y-12 employees | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

of Nuclear Weapons Stockpile Director Joseph Oder recently visited the Y-12 National Security Complex to present Defense Programs Awards of Excellence. Fifteen teams consisting...

119

William Rees appointed to new Global Security leadership position...  

NLE Websites -- All DOE Office Websites (Extended Search)

the importance of the Lab's work in key program areas, including non-proliferation, intelligence support, defense, nuclear counterterrorism, and homeland security. June 16, 2009...

120

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

From Promoting Security to Enforcing It: The Integration of the European Security Strategy during the Solana Era.  

E-Print Network (OSTI)

??This dissertation seeks to assess the degree of integration in the sector of security and defense of the European Union. The emphasis is brought on… (more)

Larivé, Maxime H. A.

2012-01-01T23:59:59.000Z

122

A metadata calculus for secure information sharing  

Science Conference Proceedings (OSTI)

In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to information sharing that rely on security labels (e.g., Multi-Level Security (MLS)) ... Keywords: access control, information flow, risk management

Mudhakar Srivatsa; Dakshi Agrawal; Steffen Reidt

2009-11-01T23:59:59.000Z

123

No More Secrets: National Security S t r a t e g i e s  

E-Print Network (OSTI)

Macmillan series, Initiatives in Strategic Studies: Issues and Policies. He joined NPS in 1990 after, Contemporary Security Policy, Defense Analysis, Harvard International Review, Homeland Security Affairs, Intelligence and National Security, International Journal of Intelligence and Counterintelligence

Acton, Scott

124

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

125

US, UK, Russian Federation Hold Trilateral Nuclear Security Best...  

National Nuclear Security Administration (NNSA)

improve the security of nuclear materials around the world." The trilateral workshop was led by the NNSA Acting Chief of the Office of Defense Nuclear Security, the Rosatom Deputy...

126

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

127

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

128

Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AT THE AT THE U.S. NUCLEAR REGULATORY COMMISSION R. Clyde Ragland, P.E. Office of Nuclear Security and Incident Response 2011 DOE National Transportation Stakeholders Forum May 11, 2011 2 NRC Focus Prior to September 11, 2001 * Historically, NRC Transportation Security Regulations Focused on Highest Risk Radioactive Material, consisted of Special Nuclear Material (SNM) and Spent Nuclear Fuel (SNF) NRC Actions Since September 11, 2001 * Domestically, reviewed materials transported by NRC licensees and re- evaluated security requirements considering: - applicable threats to shipments - material considerations - magnitude of adverse consequences * Internationally, participated in the development of the IAEA Code of Conduct on the Safety and Security of Radioactive

129

Audit Report - Office of Secure Transportation Capabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Secure Transportation Office of Secure Transportation Capabilities OAS-M-12-05 June 2012 Department of Energy Washington, DC 20585 June 29, 2012 UN MEMORANDUM FOR THE ASSISTANT DEPUTY ADMINISTRATOR, OFFICE OF SECURE TRANSPORTATION FROM: George W. Collard Assistant Inspector General for Audits Office of Inspector General SUBJECT: INFORMATION: Audit Report on "Office of Secure Transportation Capabilities" BACKGROUND The National Nuclear Security Administration's Office of Secure Transportation (OST) is responsible for safely and securely transporting nuclear weapons, weapon components and special nuclear material for customers such as the Department of Energy, Department of Defense and the Nuclear Regulatory Commission. Specifically, OST shipments support the nuclear

130

Notices DEPARTMENT OF DEFENSE Defense Acquisition Regulations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Federal Register 2 Federal Register / Vol. 78, No. 184 / Monday, September 23, 2013 / Notices DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [Docket No. 2011-0052] Submission for OMB Review; Comment Request ACTION: Notice. The Defense Acquisition Regulations System has submitted to OMB for clearance, the following proposal for collection of information under the provisions of the Paperwork Reduction Act (44 U.S.C. chapter 35). DATES: Consideration will be given to all comments received by October 23, 2013. Title, Associated Form, and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS), Part 204 and related clause at 252.204-7012, Safeguarding Unclassified Controlled Technical Information. Type of Request: New collection. Number of Respondents: 6,555.

131

Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI  

E-Print Network (OSTI)

Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

Jurjens, Jan

132

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

133

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

134

Defense Nuclear Facilitiets Safety Board Visit and Site Lead...  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Safety and Emergency Management Evaluations Activity Report for the Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos...

135

NNSA's Military Academic Collaborations | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Military Academic Collaborations | National Nuclear Security Military Academic Collaborations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Video Gallery > NNSA's Military Academic Collaborations NNSA's Military Academic Collaborations NNSA's Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense Programs offers a suite of activities to enhance collaboration between NNSA's eight sites and the U.S. Military Academies and ROTC programs at other universities. These programs are administered at NNSA and executed at NNSA sites, including the labs, production facilities and the Nevada National Security Site. At each location, leading-edge research and development is carried out on key national security technologies critical to the United States and its allies.

136

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

137

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

138

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

139

defense authorization advances  

Science Conference Proceedings (OSTI)

This year, the appropriations bill for the Department of Defense (DOD) was passed and signed into law over the summer, while the authorization bill emerged ...

140

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A – Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

142

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

143

NNSA's Second Line of Defense Program Receives Capability Award |  

NLE Websites -- All DOE Office Websites (Extended Search)

Second Line of Defense Program Receives Capability Award | Second Line of Defense Program Receives Capability Award | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Second Line of Defense Program Receives ... NNSA's Second Line of Defense Program Receives Capability Award Posted By Office of Public Affairs NNSA's Second Line of Defense (SLD) was awarded the 2013 Non-Conventional

144

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific  

National Nuclear Security Administration (NNSA)

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Northwest National Laboratory | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Steve Mladineo Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific

145

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific  

NLE Websites -- All DOE Office Websites (Extended Search)

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Northwest National Laboratory | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Steve Mladineo Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific

146

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

147

National Security Technology Incubation Strategic Plan  

Science Conference Proceedings (OSTI)

This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.

None

2007-01-01T23:59:59.000Z

148

Survey of US Department of Defense Manufacturing Technology Program activities applicable to civilian manufacturing industries. Final report  

Science Conference Proceedings (OSTI)

Intent of the survey was to identify and characterize activities potentially applicable to improving energy efficiency and overall productivity in the civilian manufacturing industries. The civilian industries emphasized were the general manufacturing industries (including fabricated metals, glass, machinery, paper, plastic, textile, and transportation equipment manufacturing) and the primary metals industries (including primary aluminum, copper, steel, and zinc production). The principal steps in the survey were to: develop overview taxonomies of the general manufacturing and primary metals industries as well as specific industry taxonomies; identify needs and opportunities for improving process energy efficiency and productivity in the industries included; identify federal programs, capabilities, and special technical expertise that might be relevant to industry's needs and opportunities; contact federal laboratories/facilities, through visits and other forms of inquiry; prepare formatted profiles (descriptions) potentially applicable work efforts; review findings with industry; and compile and evaluate industry responses.

Azimi, S.A.; Conrad, J.L.; Reed, J.E.

1985-03-01T23:59:59.000Z

149

Military Academic Collaborations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Academic Collaborations | National Nuclear Security Administration Academic Collaborations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Military Academic Collaborations Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense

150

U.S. and Russia Sign Bratislava Accord | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

of Defense sites, and cooperation in the areas of nuclear regulatory development, sustainability, secure transportation, Materials Protection Control and Accounting (MPC&A)...

151

Russia Tri-Lab S&T Collaborations | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Our Jobs Working at NNSA Blog The National Nuclear Security Administration Russia Tri-Lab S&T Collaborations Home > About Us > Our Programs > Defense Programs > Future Science...

152

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

153

Supercomputers | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Supercomputers | National Nuclear Security Administration Supercomputers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Supercomputers Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Supercomputers

154

Organized Cyber Defense Competitions  

Science Conference Proceedings (OSTI)

The Cyber Defense Exercise (CDX), an annual competition between students at the five U.S. Service Academies has developed into an extraordinary educational experience for the participants. During the exercise students will design and implement a realistic ...

Ronald C. Dodge JR; Daniel J. Ragsdale

2004-08-01T23:59:59.000Z

155

Asian Defense Spending Trends  

E-Print Network (OSTI)

1, APRIL 2013 Asian Defense Spending Trends David J. BERTEAUT his brief summarizes key trends and findings of two recentin gen- eral permits better trend analysis and cross-country

BERTEAU, David; HOFBAUER, Joachim

2013-01-01T23:59:59.000Z

156

Strategic defense initiative  

DOE Green Energy (OSTI)

This collection of vugraphs states that space power reactors, neutral beams, and flywheel energy storage technologies are important areas to be investigated for application to the strategic defense initiative. (JDH)

Nichols, J.P.

1986-01-01T23:59:59.000Z

157

Update on Y-12 national security complex activities to recover enriched uranium in 2007  

SciTech Connect

During Calendar Year 2007, the Y-12 National Security Complex (Y-12) has completed recovery missions that resulted in the return of highly enriched uranium from Canada and several locations within the United States. These missions were performed in support of the National Nuclear Security Administration's Global Threat Reduction Initiative (GTRI) and the Department of Energy (DOE) Central Scrap Management Office for Uranium (U-CSMO). Additionally, Y-12 completed safety basis revisions for the ES-3100 shipping package which resulted in the issuance of a Certificate of Compliance (CoC) from the United States Nuclear Regulatory Commission and a Competent Authority Certificate (CAC) from the United States Department of Transportation for air transport of highly enriched uranium in the form of un- irradiated TRIGA pellets. This certification of the ES-3100 will now allow GTRI to perform recoveries of limited quantities of fresh HEU TRIGA that have been identified at several locations. (author)

Eddy, Becky; Andes, Trent; Dunavant, Randy [Y-12 National Security Complex, Oak Ridge, TN (United States)

2008-07-15T23:59:59.000Z

158

Headquarters Personnel Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Personnel Security Operations Headquarters Personnel Security Operations Headquarters Personnel Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems. Functions The primary function of the Office of Headquarters Personnel

159

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

160

Independent Activity Report, Los Alamos National Laboratory - August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Independent Activity Report, Los Alamos National Laboratory - August 2012 August 2012 Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory [HIAR LANL-2012-08-16] The purpose of this Office of Health, Safety and Security (HSS) activity was to maintain site operational awareness of key nuclear safety performance areas of interest to the Defense Nuclear Facilities Safety Board (DNFSB), monitor ongoing site oversight and planning activities for Los Alamos National Laboratory (LANL) nuclear facilities, and identify and initiate coordination of future HSS oversight activities at the site. Independent Activity Report, Los Alamos National Laboratory - August 2012 More Documents & Publications

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

162

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

163

Security and You, May 2013  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Incidents Headquarters Security Incidents The Department of Energy depends on its employees to protect sensitive and classified information. You are the first line of defense. Your failure to properly protect classified information and controlled unclassified information not only endangers our national security, it can also subject you to criminal, civil, or administrative penalties. Unfortunately, DOE Headquarters (HQ) had over fifty security incidents in 2012. The majority of Security Incidents are easily preventable. Let's take an actual case that happened at HQ. A new employee wrote down the combination to a classified container so that they could easily access the combination without having to memorize it. So it would be within reach, the person put the combination

164

MEASUREMENT AND CALCULATION OF RADIONUCLIDE ACTIVITIES IN SAVANNAH RIVER SITE HIGH LEVEL WASTE SLUDGE FOR ACCEPTANCE OF DEFENSE WASTE PROCESSING FACILITY GLASS IN A FEDERAL REPOSITORY  

SciTech Connect

This paper describes the results of the analyses of High Level Waste (HLW) sludge slurry samples and of the calculations necessary to decay the radionuclides to meet the reporting requirement in the Waste Acceptance Product Specifications (WAPS) [1]. The concentrations of 45 radionuclides were measured. The results of these analyses provide input for radioactive decay calculations used to project the radionuclide inventory at the specified index years, 2015 and 3115. This information is necessary to complete the Production Records at Savannah River Site's Defense Waste Processing Facility (DWPF) so that the final glass product resulting from Macrobatch 5 (MB5) can eventually be submitted to a Federal Repository. Five of the necessary input radionuclides for the decay calculations could not be measured directly due to their low concentrations and/or analytical interferences. These isotopes are Nb-93m, Pd-107, Cd-113m, Cs-135, and Cm-248. Methods for calculating these species from concentrations of appropriate other radionuclides will be discussed. Also the average age of the MB5 HLW had to be calculated from decay of Sr-90 in order to predict the initial concentration of Nb-93m. As a result of the measurements and calculations, thirty-one WAPS reportable radioactive isotopes were identified for MB5. The total activity of MB5 sludge solids will decrease from 1.6E+04 {micro}Ci (1 {micro}Ci = 3.7E+04 Bq) per gram of total solids in 2008 to 2.3E+01 {micro}Ci per gram of total solids in 3115, a decrease of approximately 700 fold. Finally, evidence will be given for the low observed concentrations of the radionuclides Tc-99, I-129, and Sm-151 in the HLW sludges. These radionuclides were reduced in the MB5 sludge slurry to a fraction of their expected production levels due to SRS processing conditions.

Bannochie, C; David Diprete, D; Ned Bibler, N

2008-12-31T23:59:59.000Z

165

Don Cook discusses NNSA's Defense Programs at Woodrow Wilson Center |  

National Nuclear Security Administration (NNSA)

discusses NNSA's Defense Programs at Woodrow Wilson Center | discusses NNSA's Defense Programs at Woodrow Wilson Center | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Don Cook discusses NNSA's Defense Programs at ... Don Cook discusses NNSA's Defense Programs at Woodrow Wilson Center Posted By Office of Public Affairs Cook at WW

166

Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Orientation Visit to the Nevada National Security Site - January 11-13, 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Orientation Visit to the Nevada National Orientation Visit to the Nevada National Security Site - January 11-13, 2011 The U.S. Department of Energy (DOE) Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), conducted an orientation visit to the DOE Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from January 11-13, 2011. The purpose of the visit was to discuss the nuclear safety oversight strategy, initiate the site lead program, increase HSS personnel's operational awareness of the site's activities, and to determine how HSS can carry out its independent oversight and mission support responsibilities. Staff from NSO, National Security Technologies, LLC (NSTec), Los Alamos National Laboratory, and Lawrence Livermore National Laboratory provided HSS personnel with detailed

167

Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear  

National Nuclear Security Administration (NNSA)

Congressional Testimony > Statement of Anne M. Congressional Testimony > Statement of Anne M. Harrington, Deputy Administrator ... Congressional Testimony Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear Nonproliferation to the Senate Armed Services Sub Committee On Emerging Threats and Capabilities May 10, 2011 Chairwoman Hagan, Ranking Member Portman, thank you for the opportunity to join you today to discuss the investments the President has requested for the National Nuclear Security Administration's Defense Nuclear Nonproliferation programs. But more importantly, thank you for your continued support of the National Nuclear Security Administration, and the 35,000 men and women working across the enterprise to keep our country safe, protect our allies, and enhance global security. We could not do

168

Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear  

National Nuclear Security Administration (NNSA)

Speeches > Statement of Anne M. Harrington, Deputy Speeches > Statement of Anne M. Harrington, Deputy Administrator ... Speech Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear Nonproliferation to the Senate Armed Services Sub Committee On Emerging Threats and Capabilities May 10, 2011 Chairwoman Hagan, Ranking Member Portman, thank you for the opportunity to join you today to discuss the investments the President has requested for the National Nuclear Security Administration's Defense Nuclear Nonproliferation programs. But more importantly, thank you for your continued support of the National Nuclear Security Administration, and the 35,000 men and women working across the enterprise to keep our country safe, protect our allies, and enhance global security. We could not do this work without strong, bipartisan support and engaged leadership from

169

Department of Defense Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Defense Programs Department of Defense Programs SHARE Department of Defense Programs image The Department of Defense Programs address the specifics challenges of the defense sector and have the widest application of ORNL capabilities. We support the military in a number of areas, including chem/bio defense and early warning; logistics and transportation management; hardened and other special materials; tagging, tracking, and locating; sensor miniaturization and communication; information management, synthesis and analysis; climate change modeling applications; structural amorphous materials for wear-resistant coatings; standoff acoustic laser detection system for detection of explosives; biometrics; cognitive radio systems; and power and energy applications for both mobile power and infrastructure requirements.

170

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

171

Second Line of Defense Spares Program Assessment  

SciTech Connect

The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

2012-11-20T23:59:59.000Z

172

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

173

Underground Facility at Nevada National Security Site | National...  

National Nuclear Security Administration (NNSA)

for Our Jobs Our Jobs Working at NNSA Blog U1A Underground Facility at Nevada National Security Site Home > About Us > Our Programs > Defense Programs > Office of Research,...

174

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

175

Office of Headquarters Personnel Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Personnel Headquarters Personnel Director's Perspective Welcome to the Office of Headquarters Personnel Security Operations Stephanie Scott Grimes, Director The Office of Headquarters Personnel Security Operations serves the Department by providing a comprehensive Personnel Security Program for the DOE Headquarters complex. Our goal is to ensure that DOE classified information and materials are safeguarded from compromise by assuring that only trustworthy individuals are granted security clearances. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes aimed at ensuring only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information and materials.

176

Energy and Defense Departments Announce New Steps to Enhance Cooperation on  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Departments Announce New Steps to Enhance Defense Departments Announce New Steps to Enhance Cooperation on Clean Energy and Energy Security Energy and Defense Departments Announce New Steps to Enhance Cooperation on Clean Energy and Energy Security March 2, 2011 - 12:00am Addthis Washington, D.C. - Building on already strong cooperation between the U.S. Department of Energy and the U.S. Department of Defense, U.S. Secretary of the Navy Ray Mabus announced today new steps between the Departments to strengthen national security through the continued development of advanced clean energy technologies. Furthering the Memorandum of Understanding (MOU) announced last summer the new steps being announced today strengthen coordination and better leverage the expertise and resources of both Departments to enhance our national

177

Administrator D'Agostino's Remarks at the National Defense University Forum  

National Nuclear Security Administration (NNSA)

National Defense University Forum National Defense University Forum Congressional Breakfast Seminar | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > Administrator D'Agostino's Remarks at the National Defense ... Speech Administrator D'Agostino's Remarks at the National Defense University Forum

178

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

179

SECURITY AND CONTROL OF NUCLEAR EXPLOSIVES AND NUCLEAR WEAPONS  

National Nuclear Security Administration (NNSA)

http://www.nnsa.energy.gov Office of Nuclear Weapon Surety and Quality http://www.nnsa.energy.gov Office of Nuclear Weapon Surety and Quality SUPPLEMENTAL DIRECTIVE Approved: 7-7-11 IMPLEMENTATION AND EVALUATION OF CONTROLS TO PREVENT DELIBERATE UNAUTHORIZED USE NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Defense Programs NA SD 452.4 NA SD 452.4 1 7-7-11 IMPLEMENTATION AND EVALUATION OF CONTROLS TO PREVENT DELIBERATE UNAUTHORIZED USE 1. PURPOSE. This NNSA Supplemental Directive (SD) supports the requirements of DOE O 452.4B, Security and Use Control of Nuclear Explosives and Nuclear Weapons. Specifically, this SD supports the Order's requirements to implement deliberate unauthorized use (DUU) preventive measures for nuclear explosive operations (NEO) and associated activities and to perform independent evaluations to determine if NEOs

180

Automating cyber-defense management  

Science Conference Proceedings (OSTI)

Last year, we reported [1] our success in setting a new high-water mark for intrusion tolerance. That success can largely be attributed to our use of a "survivability architecture", which refers to the organization of a set of concrete defense mechanisms ... Keywords: defense mechanisms, defense-enabling, intrusion-tolerance, survivability, survivability architecture

Partha Pal; Franklin Webber; Michael Atighetchi; Paul Rubel; Paul Benjamin

2008-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility, October 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HSS Independent Activity Report - HSS Independent Activity Report - Rev. 0 Report Number: HIAR-Y-12-2012-10-02 Site: Y-12 UPF Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Defense Nuclear Facilities Safety Board (DNFSB) Public Meeting on the Status of Integration of Safety into the Design of the Uranium Processing Facility (UPF) Dates of Activity: October 2, 2012 Report Preparer: Timothy Mengers Activity Description/Purpose: The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12

182

Oversight Reports - Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Oversight Reports - Nevada National Security Site May 22, 2013 Independent Oversight Review, Nevada National Security - May 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure December 18, 2012 Independent Activity Report, Nevada National Security Site - December 2012 Nevada National Security Site Operational Awareness Visit [HIAR NNSS-2012-12-03] October 3, 2012 Independent Activity Report, Nevada National Security Site - August 2012 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2012-08-16] April 2, 2012 Independent Oversight, Nevada National Security Site - March 2012 Review of the Nevada National Security Site Implementation Verification

183

Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Orientation Visit to the Nevada National Security Site - January 11-13, 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

SUBJECT: Office of Independent Oversight's Office of Environment, Safety and Health SUBJECT: Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Orientation Visit to the Nevada National Security Site - January 11-13, 2011 The U.S. Department of Energy (DOE) Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), conducted an orientation visit to the DOE Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from January 11-13, 2011. The purpose of the visit was to discuss the nuclear safety oversight strategy, initiate the site lead program, increase HSS personnel's operational awareness of the site's activities, and to determine how HSS can carry out its independent oversight and mission support responsibilities.

184

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

185

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

186

S. 1447: A Bill to authorize appropriations for the Department of Energy for national security programs for fiscal year 1990, and for other purposes. Introduced in the Senate of the United States, One Hundredth First Congress, First Session, July 31, 1989  

SciTech Connect

S. 1447 is a bill to authorize appropriations for the Department of Energy for national security programs for fiscal year 1990, and for other purposes. Funds are authorized for operating expenses incurred in carrying out national security programs, including scientific research and development in support of the Armed Forces, strategic and critical materials necessary for the common defense, and military applications of nuclear energy and related management and support activities.

1989-01-01T23:59:59.000Z

187

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

188

Overview | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Overview | National Nuclear Security Administration Overview | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Overview Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Overview Overview

189

Accomplishments | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Accomplishments | National Nuclear Security Administration Accomplishments | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Accomplishments Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Accomplishments

190

Accomplishments | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Accomplishments | National Nuclear Security Administration Accomplishments | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Accomplishments Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Accomplishments

191

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

and Procedures, dated January 11, 2013. PS-3 Board Oversight of Department of Energy Decommissioning Activities at Defense Nuclear Facilities, dated August 19, 1996. PS-2...

192

Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors  

E-Print Network (OSTI)

The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or ...

Schlesinger, Adam Ian

2005-01-01T23:59:59.000Z

193

Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Complex Y-12 National Security Complexs primary mission is to support of the DOE nuclear weapons stockpile maintenance program. Activities include assembly and disassembly...

194

Department of Defense INSTRUCTION  

E-Print Network (OSTI)

; (3) implementing policies and procedures to cost-effectively reduce risks to an acceptable level policies, guidelines, and standards for national security systems. The Director, Central Intelligence is responsible for policies relating to systems processing intelligence information. The Committee for National

195

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

196

SecureBox: National Security Through Secure Cargo – Team Members  

SecureBox: National Security Through Secure Cargo – Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

197

Microsoft Word - Defense Science Quarterly 08-08.doc  

National Nuclear Security Administration (NNSA)

August 2008 August 2008 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Derivative Applications of Pulsed Power Science and Technology 4 LANSCE-R Means More Beam for National Security Research 6 Dual Axis Radiographic Hydrodynamics Test (DARHT) 2 nd Axis Completed and Put into Operation 7 Annual Symposium of the Stewardship Science Graduate Fellowship Program 8 Publication Highlights 9 ICOPS 2008 9 Highlights and Awards Message from the Director Chris Deeney, Defense Science Division It's hard to believe it's been a year since we published our first issue of the Defense Science Quarterly. I would like to express my appreciation to all the authors who have submitted articles and to the production staff. If you are

198

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

199

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

200

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

202

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

203

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

204

White House Forum on Energy Security (Update) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

White House Forum on Energy Security (Update) White House Forum on Energy Security (Update) White House Forum on Energy Security (Update) July 27, 2010 - 4:48pm Addthis John Schueler John Schueler Former New Media Specialist, Office of Public Affairs What does this mean for me? The Department of Energy is partnering with the Department of Defense to accelerate clean energy innovation and enhance national energy security. Earlier this afternoon high ranking officials from the Departments of Energy and Defense came together with national security officials, business leaders, academics and other stakeholders for a discussion on the national security imperative of building a clean energy economy. Navy Secretary Ray Mabus and Deputy Energy Secretary Daniel Poneman kicked off the session by announcing a Memorandum of Understanding between

205

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

206

National Defense Authorization Act for Fiscal Year 2000 § 3164:  

NLE Websites -- All DOE Office Websites (Extended Search)

National Defense Authorization Act for Fiscal Year 2000 § 3164: National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program Stakeholders: DOE Employees and Contractors engaged in defense activities for the Department Scope: Section 3164 of the National Defense Authorization Act for Fiscal Year 2000 implements a whistleblower protection program to ensure that covered individuals may not be discharged, demoted, or otherwise discriminated against as a reprisal for making protected disclosures to a member of a committee of Congress having primary responsibility for oversight of the department, agency, or element of the Government to which the disclosed information relates; an employee of Congress who is a staff

207

Engineering | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Engineering | National Nuclear Security Administration Engineering | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Engineering Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Engineering Engineering NNSA uses modern tools and capabilities in the engineering sciences field which are needed to ensure the safety, security, reliability and

208

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

209

Collaboration Topics - System Software | National Nuclear Security  

National Nuclear Security Administration (NNSA)

System Software | National Nuclear Security System Software | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

210

Our Programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Our Programs Home > About Us > Our Programs Our Programs NNSA's program support is divided into several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and

211

Working with Interpreters | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Working with Interpreters | National Nuclear Security Administration Working with Interpreters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Working with Interpreters Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

212

Institutional Research & Development | National Nuclear Security  

National Nuclear Security Administration (NNSA)

| National Nuclear Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Institutional Research & Development Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

213

Production Technology | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Production Technology | National Nuclear Security Administration Production Technology | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Production Technology Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Production Technology Production Technology NNSA continues to assure the safety, security, and reliability of the

214

High Explosives Application Facility | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Explosives Application Facility | National Nuclear Security Explosives Application Facility | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration High Explosives Application Facility Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Research and Development >

215

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

216

Tom D'Agostino to Lead NNSA's Defense Programs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tom D'Agostino to Lead NNSA's Defense Programs Tom D'Agostino to Lead NNSA's Defense Programs Tom D'Agostino to Lead NNSA's Defense Programs March 1, 2006 - 12:26pm Addthis WASHINGTON , DC - Secretary of Energy Samuel W. Bodman today announced that Thomas P. D'Agostino has been sworn in as Deputy Administrator for Defense Programs in the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). Deputy Administrator D'Agostino will lead NNSA's weapons programs, which maintain the reliability of our nation's nuclear weapons stockpile. "Tom D'Agostino's highly valued experience and leadership will be critical assets as we continue to transform our nuclear weapons stockpile and respond to our national security needs," Secretary Bodman said. President Bush nominated Deputy Administrator D'Agostino on January 27,

217

Tom D'Agostino to Lead NNSA's Defense Programs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tom D'Agostino to Lead NNSA's Defense Programs Tom D'Agostino to Lead NNSA's Defense Programs Tom D'Agostino to Lead NNSA's Defense Programs March 1, 2006 - 12:26pm Addthis WASHINGTON , DC - Secretary of Energy Samuel W. Bodman today announced that Thomas P. D'Agostino has been sworn in as Deputy Administrator for Defense Programs in the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). Deputy Administrator D'Agostino will lead NNSA's weapons programs, which maintain the reliability of our nation's nuclear weapons stockpile. "Tom D'Agostino's highly valued experience and leadership will be critical assets as we continue to transform our nuclear weapons stockpile and respond to our national security needs," Secretary Bodman said. President Bush nominated Deputy Administrator D'Agostino on January 27,

218

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

219

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

220

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Notices DEPARTMENT OF DEFENSE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

011 Federal Register 011 Federal Register / Vol. 78, No. 186 / Wednesday, September 25, 2013 / Notices DEPARTMENT OF DEFENSE Department of the Army Information on Surplus Land at a Military Installation Designated for Disposal: Ernest Veuve Hall USARC/ AMSA 75, T-25, Fort Missoula, Montana AGENCY: Department of the Army, DoD. ACTION: Notice. SUMMARY: This amended notice provides information on withdrawal of surplus property at the Ernest Veuve Hall USARC/AMSA 75, T-25, Fort Missoula, Montana. This notice amends the Notice published in the Federal Register on May 9, 2006 (71 FR 26930). DATES: Effective September 10, 2013 FOR FURTHER INFORMATION CONTACT: Headquarters, Department of the Army, Assistant Chief of Staff for Installation Management, Base Realignment and Closure (BRAC) Division, Attn: DAIM-

222

Notices DEPARTMENT OF DEFENSE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Federal Register 2 Federal Register / Vol. 76, No. 217 / Wednesday, November 9, 2011 / Notices DEPARTMENT OF DEFENSE Department of the Air Force U.S. Air Force Scientific Advisory Board; Notice of Meeting AGENCY: Department of the Air Force, U.S. Air Force Scientific Advisory Board. ACTION: Meeting notice. SUMMARY: Due to difficulties, beyond the control of the U.S. Air Force Scientific Advisory Board (SAB) or its Designated Federal Officer, the Board must meet no later than November 2, 2011 to deliberate on recent events impacting upon one of the Board's current tasks from the Secretary of the Air Force. Since the Department of the Air Force is unable to file a Federal Register notice announcing the meeting within the 15-calendar day period the Advisory Committee Management Officer for the

223

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

224

Headquarters Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Security Operations Headquarters Security Operations Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process.

225

Anne Harrington | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Anne Harrington | National Nuclear Security Administration Anne Harrington | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Leadership > Anne Harrington Anne Harrington Deputy Administrator for Defense Nuclear Nonproliferation Anne Harrington Anne Harrington was sworn in as Deputy Administrator for Defense Nuclear Nonproliferation for the National Nuclear Security Administration in

226

Defense Programs: the mission | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

2013 During the early days of World War II, fear that Germany would create and use an atomic bomb led the U.S. to secretly launch the Manhattan Project to build one first....

227

Second Line of Defense Program | National Nuclear Security Administrat...  

National Nuclear Security Administration (NNSA)

Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press...

228

This product created by the Defense Security Service (DSS)  

E-Print Network (OSTI)

- CONTRIBUTING TO counterterrorism, foreign counterintelligence, organized crime, public corruption, civil rights intelligence threats, and to enforce the criminal laws of the nation Relevant Work Experience All Engineering of cases as they progress in their career with the FBI. Counterterrorism, foreign counterintelligence

Alabama in Huntsville, University of

229

Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan Colon Container Terminal (CCT) Panama  

SciTech Connect

Report on the Operational Testing and Evaluation to validate and baseline an operable system that meets the Second Line of Defense (SLD) mission requirements. An SLD system is defined as the detection technology and associated equipment, the system operators from the host country, the standard operating procedures (SOPs), and other elements such as training and maintenance which support long-term system sustainment. To this end, the activities conducted during the OT&E phase must demonstrate that the Megaports System can be operated effectively in real-time by Panama Direccion General de Aduanas (DGA Panama Customs) personnel to the standards of the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA).

Newhouse, Robert N.

2010-01-01T23:59:59.000Z

230

THE DEPARTMENT OF DEFENSE INFORMATION ...  

Science Conference Proceedings (OSTI)

... TEMPEST and Red/Black Verification to validate that the equipment and site meet the applicable TEMPEST security requirements. ...

1996-10-28T23:59:59.000Z

231

Transportation Security Rulemaking Activities  

Energy.gov (U.S. Department of Energy (DOE))

Presentation made by R. Clyde Ragland for the NTSF annual meeting held from May 14-16, 2013 in Buffalo, NY.

232

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

233

Chapter_11_Incidents_of_Security_Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. HS-91 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect the safeguards and security program's capability to protect DOE safeguards and security interests * Indicate failure to adhere to security procedures * Reveal that the system is not functioning properly, by identifying and/or mitigating potential threats (e.g., detecting suspicious activity, hostile acts, etc.).

234

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

235

Defense Transportation - Center for Transportation Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Defense Transportation The Center for Transportation Analysis provides analytical, planning, and operational support to defense transportation related projects. This includes the...

236

Lighting Demonstrations in Defense Commissary Freezer Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

in Defense Commissary Freezer Systems New lighting technology reduces energy consumption while maintaining effective illumination The Defense Commissary Agency operates a...

237

Strategic defense initiative  

DOE Green Energy (OSTI)

The Engineering Technology Division has a leading role, including that of program management, in a major new programmatic thrust of the Oak Ridge National Laboratory that is in support of the national Strategic Defense Initiative (SDI). It is appropriate for the Laboratory to become significantly involved in the program because several of the most promising SDI technologies are in areas for which ORNL (together with Y-12 and K-25) have strong capabilities and significant resources. The initial ORNL work in support of the SDI program is focused on three technologies in which ORNL has extensive experience and traditionally strong research and development programs: (1) space nuclear power, (2) flywheel energy storage, and (3) neutral particle beams. The space nuclear program will utilize our capabilities in areas such as refractory materials, high-temperature alkali metal systems, shielding, and instrumentation. Space nuclear reactors capable of supplying multimegawatt levels of electrical power on a continuous and long-term basis are envisioned to be required for a variety of SDI surveillance satellites and space-borne weapons platforms. The feasibility of an alkali metal Rankine power conversion cycle, which has promise of providing high power with a very low system mass, is planned for study.

Nichols, J.P.

1985-01-01T23:59:59.000Z

238

Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.  

Science Conference Proceedings (OSTI)

The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

Pregenzer, Arian Leigh

2011-12-01T23:59:59.000Z

239

National Center for Nuclear Security: The Nuclear Forensics Project (F2012)  

Science Conference Proceedings (OSTI)

These presentation visuals introduce the National Center for Nuclear Security. Its chartered mission is to enhance the Nation’s verification and detection capabilities in support of nuclear arms control and nonproliferation through R&D activities at the NNSS. It has three focus areas: Treaty Verification Technologies, Nonproliferation Technologies, and Technical Nuclear Forensics. The objectives of nuclear forensics are to reduce uncertainty in the nuclear forensics process & improve the scientific defensibility of nuclear forensics conclusions when applied to nearsurface nuclear detonations. Research is in four key areas: Nuclear Physics, Debris collection and analysis, Prompt diagnostics, and Radiochemistry.

Klingensmith, A. L.

2012-03-21T23:59:59.000Z

240

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Activity Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 28, 2012 November 28, 2012 Independent Activity Report, Richland Operations Office - April 2011 Operational Awareness Review of the Hanford Sludge Treatment Project [HIAR-RL-2011-04-07] October 3, 2012 Independent Activity Report, Nevada National Security Site - August 2012 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2012-08-16] October 2, 2012 Independent Activity Report, Sandia National Laboratories - September 2012 Operational Awareness Oversight of Sandia National Laboratories [HIAR SNL-2012-09-13] October 2, 2012 Independent Activity Report, Los Alamos National Laboratory - August 2012 Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory [HIAR LANL-2012-08-16] August 24, 2012

242

The climate change and energy security nexus  

SciTech Connect

The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

King, Marcus Dubois [George Washington University; Gulledge, Jay [ORNL

2013-01-01T23:59:59.000Z

243

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

244

Nevada National Security Site Radiological Control Manual  

SciTech Connect

This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of low-level radioactive waste and the handling of radioactive sources. Remediation of contaminated land areas may also result in radiological exposures.

Radiological Control Managers’ Council

2012-03-26T23:59:59.000Z

245

Newsletters | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

246

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

247

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

248

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

249

SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices, 1st edition  

Science Conference Proceedings (OSTI)

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and ... Keywords: Security

Joey Hirao; Mimi Choi; Perry Cox; Steven Passer

2008-10-01T23:59:59.000Z

250

Law and Order, or Counterintelligence Activities  

E-Print Network (OSTI)

assign responsibilities for carrying of firearms and the use of force by DoD personnel engaged in security, law and order, or counterintelligence activities. b. Cancels Deputy Secretary of Defense Memorandum (Reference (b)). c. Implements section 1585 of title 10, United States Code (U.S.C.) (Reference (c)), which authorizes civilian officers and employees of the Department of Defense to carry firearms or other appropriate weapons while assigned investigative duties or such other duties as the Secretary of Defense may prescribe, under regulations to be prescribed by the Secretary. d. Provides requirements, authorizations, and restrictions for carrying firearms and the use of force to protect DoD installations, property, and personnel, and to enforce law and order in accordance with DoD Instruction (DoDI) 5200.08 and DoD 5200.08-R (References (d) and (e)). e. Provides overarching guidance for developing DoD Component policies, regulations, and procedures.

unknown authors

2011-01-01T23:59:59.000Z

251

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

252

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

253

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

254

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

255

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

256

Independent Oversight Evaluation, Office of Secure Transportation -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation, Office of Secure Transportation - Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office of Secure Transportation Emergency Management Program The Secretary of Energy's Office of Independent Oversight and Performance Assurance (OA) conducted an inspection of emergency management programs at the National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) in October 2003. Inspection activities included the observation of the OST annual emergency exercise and reviews of selected emergency management program elements. The exercise demonstrated that the OST emergency response organization could effectively provide for prompt event categorization, DOE and NNSA

257

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

FOREIGN OWNERSHIP, CONTROL OR INFLUENCE (FOCI) PROGRAM FOREIGN OWNERSHIP, CONTROL OR INFLUENCE (FOCI) PROGRAM It is DOE policy to obtain information that indicates whether a company that SNL will enter into a contract with is Owned, Controlled, or Influenced by a foreign person or entity and whether as a result, the potential for an undue risk to the common defense and national security may exist. Reference: Department of Energy Order (DOE O) 470.1, Safeguards and Security Program, Change 1, Chapter VI, Section 1 The DOE conducts a background check to determine FOCI, based on the information the company provides through the e-FOCI website: https://foci.td.anl.gov. Upon favorable FOCI certification by DOE, a facility clearance is granted. Facility cleareance is required in order to support personnel clearances needed to perform the work under contractual agreement with Sandia.

258

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

259

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

260

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

262

Office of Headquarters Personnel Security Operations: Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Office of Executive Protection Home Sub Offices › HQ Security Officers (HSO) Program › Office of Security Operations › Office of Information Security › Office of Headquarters Personnel › Office of Physical Protection › Office of Security Operations Mission & Functions › Security Operations › HQ Security Operations › HQ Personnel Security Op. › Special Operations HSO Program - 2010 Spotlights - 2009 Spotlights - Spotlights Archives (2008-2007) HSO Contacts Contact Us Headquarters Facilities Master Security Plan Security Reference Book HSS Logo Office of Headquarters Personnel Security Operations Reports to the Office of Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems.

263

Potential Collaborative Research topics with Korea’s Agency for Defense Development  

SciTech Connect

This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involved the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.

Farrar, Charles R. [Los Alamos National Laboratory; Todd, Michael D. [Univ. of California, San Diego

2012-08-23T23:59:59.000Z

264

Potential Collaborative Research topics with Korea’s Agency for Defense Development  

SciTech Connect

This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involved the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.

Farrar, Charles R. [Los Alamos National Laboratory; Todd, Michael D. [Univ. of California, San Diego

2012-08-23T23:59:59.000Z

265

NNSA Defense Programs Inertial Confinement Fusion Ignition and High Yield Campaign  

E-Print Network (OSTI)

and the NIF Project #12;2 Outline · National Nuclear Security Administration · ICF Campaign and Stewardship overview · NIF Use Plan ­ Defense Science Board review (Ignition 2010) · Recent progress ­ NIF, OMEGA, Z Confinement Fusion Acting Director Dr. Richard K. Thorpe NA-161 Office of the NIF Project Acting Director

266

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

267

Mobile Malware Attacks and Defense  

Science Conference Proceedings (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

268

ASC Publications | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications | National Nuclear Security Administration Publications | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog ASC Publications ASC Publications Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > ASC Publications

269

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contact Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Contact Information Contact Information At each of NNSA's eight sites, leading-edge research and development is

270

Russian Culture | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Culture | National Nuclear Security Administration Culture | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Russian Culture Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Russia Tri-Lab S&T Collaborations > Russian

271

Stewardship Science Academic Alliances | National Nuclear Security  

National Nuclear Security Administration (NNSA)

| National Nuclear Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Stewardship Science Academic Alliances Stewardship Science Academic Alliances Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > University Partnerships / Academic Alliances > Stewardship Science Academic Alliances

272

ASC Newsletter Subscription | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Newsletter Subscription | National Nuclear Security Administration Newsletter Subscription | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > ASC Newsletters > ASC Newsletter Subscription

273

Contained Firing Facility | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Contained Firing Facility | National Nuclear Security Administration Contained Firing Facility | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contained Firing Facility Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Research and Development > Facilities > Contained Firing Facility

274

ASC Newsletters | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog ASC Newsletters Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > ASC Newsletters ASC Newsletters

275

Current Events | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Events | National Nuclear Security Administration Events | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Current Events Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Current Events Current Events

276

Integrated Codes | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Codes | National Nuclear Security Administration Integrated Codes | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog IC Integrated Codes Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > ASC Program Elements > Integrated Codes

277

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

278

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

279

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

280

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

282

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

283

Environmental Defense Fund | Open Energy Information  

Open Energy Info (EERE)

Defense Fund Defense Fund Jump to: navigation, search Name Environmental Defense Fund Place New York, New York Zip 10010 Product Environmental Defense is a leading national nonprofit organization representing more than 500,000 members. Environmental Defense is dedicated to protecting the environmental rights of all people, including future generations. References Environmental Defense Fund[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Environmental Defense Fund is a company located in New York, New York . References ↑ "Environmental Defense Fund" Retrieved from "http://en.openei.org/w/index.php?title=Environmental_Defense_Fund&oldid=345028" Categories:

284

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

285

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

286

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

287

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

288

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

289

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

290

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

291

Departments of Energy, Defense Partner to Install Fuel Cell Backup Power  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Departments of Energy, Defense Partner to Install Fuel Cell Backup Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations July 19, 2011 - 4:56pm Addthis The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and develop new clean energy technologies, DOD will be installing and operating 18 fuel cell backup power systems at eight military installations across the country. The Departments will test how the fuel cells perform in real world operations, identify any technical improvements manufacturers could make to enhance performance, and highlight the benefits of fuel cells for emergency backup

292

Departments of Energy, Defense Partner to Install Fuel Cell Backup Power  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Departments of Energy, Defense Partner to Install Fuel Cell Backup Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations July 19, 2011 - 4:56pm Addthis The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and develop new clean energy technologies, DOD will be installing and operating 18 fuel cell backup power systems at eight military installations across the country. The Departments will test how the fuel cells perform in real world operations, identify any technical improvements manufacturers could make to enhance performance, and highlight the benefits of fuel cells for emergency backup

293

Departments of Energy, Defense Partner to Install Fuel Cell Backup Power  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Departments of Energy, Defense Partner to Install Fuel Cell Backup Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations July 19, 2011 - 11:46am Addthis Washington, D.C. - The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and develop new clean energy technologies, DOD will be installing and operating 18 fuel cell backup power systems at eight military installations across the country. The Departments will test how the fuel cells perform in real world operations, identify any technical improvements manufacturers could make to enhance

294

Departments of Energy, Defense Partner to Install Fuel Cell Backup Power  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy, Defense Partner to Install Fuel Cell Backup Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations July 19, 2011 - 11:46am Addthis Washington, D.C. - The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and develop new clean energy technologies, DOD will be installing and operating 18 fuel cell backup power systems at eight military installations across the country. The Departments will test how the fuel cells perform in real world operations, identify any technical improvements manufacturers could make to enhance performance, and highlight the benefits of fuel cells for emergency backup

295

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

296

Security Assessment Simulation Toolkit (SAST) Final Report  

Science Conference Proceedings (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

297

Innovations for a secure nation  

NLE Websites -- All DOE Office Websites (Extended Search)

Innovations for a Secure Nation Innovations for a Secure Nation /about/_assets/images/icon-70th.jpg Innovations for a Secure Nation LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. image description Plasma technology for textile finishing applications gets a boost from LANL APJeT received a $100,000 Venture Acceleration Fund award from LANS helping to complete design and engineering of a commercial-scale production unit. - 4/3/12 One of several active projects, LANL and Chevron co-developed INFICOMM(tm), a wireless technology used to collect real-time temperature and pressure information from sensors in oil and gas wells, including very deep wells already producing oil and gas and drilling operations for new wells.

298

Safety and Security Directives Reform  

NLE Websites -- All DOE Office Websites (Extended Search)

Reforming a "Mountain" of Policy Reforming a "Mountain" of Policy Beginning with his confirmation hearings in January 2009, Energy Secretary Steven Chu challenged the Department of Energy to take a fresh look at how we conduct business. This challenge provided the opportunity for DOE to put in place the most effective and efficient strategies to accomplish the Department's missions safely and securely. In response to the Secretary's challenge and building on the results of Deputy Secretary Poneman's Safety and Security Reform studies, the Office of Health, Safety and Security (HSS) broadened its directives review activities during 2009. By November 2009 HSS had initiated a disciplined review of all health, safety, and security directives, which included a systematic review of the Department's safety and security regulatory model.

299

Designing System-level Defenses against Cellphone Malware  

E-Print Network (OSTI)

Abstract—Cellphones are increasingly becoming attractive targets of various malware, which not only cause privacy leakage, extra charges, and depletion of battery power, but also introduce malicious traffic into networks. In this work, we seek system-level solutions to handle these security threats. Specifically, we propose a mandatory access control–based defense to blocking malware that launch attacks through creating new processes for execution. To combat more elaborated malware which redirect program flows of normal applications to execute malicious code within a legitimate security domain, we further propose using artificial intelligence (AI) techniques such as Graphic Turing test. Through extensive experiments based on both Symbian and Linux smartphones, we show that both our system-level countermeasures effectively detect and block cellphone malware with low false positives, and can be easily deployed on existing smartphone hardware.

Liang Xie; Xinwen Zhang; Ashwin Chaugule; Trent Jaeger; Sencun Zhu

2009-01-01T23:59:59.000Z

300

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

The Y-12 Times 70th Anniversary, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

After meeting or exceeding several of its fiscal After meeting or exceeding several of its fiscal 2012 Defense Program goals, Y-12 is now engaged in activities to meet this year's life extension, surveillance and dismantle- ment goals. For fiscal 2013, the W78/88-1 Life Extension Program is funded at Y-12 for the first time. "The W78/88 1 LEP will secure work for the 2020s, so Y-12 can continue its major mission work after completion of the W76-1 and B61-12," said Tom Thrasher, program manager. Y-12 has begun working with Lawrence Livermore and Los Alamos national laboratories on the manufacturability of the units. The conceptual designs include reuse technologies geared toward reducing the cost of LEPs. Defense Program funding this year also supports a major phase in the B61-12 LEP. This phase involves establishing manufacturing processes for the evaluation hardware

302

Toward a defense-dominated world  

SciTech Connect

Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

Wood, L.

1993-08-01T23:59:59.000Z

303

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Office of Defense Science Office of Defense Science Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Research and Development > Facilities Facilities Office of Research and Development, Facilities The Office of Research and Development manages and oversees the operation of an exceptional suite of science, technology, and engineering facilities that support and further the national stockpile stewardship agenda. Of varying size, scope and capabilities, the facilities work in a concert to accomplish the following activities: Annual assessment of the stockpile in the face of increasing challenges due to aging or remanufacture, Reduced response times for resolving stockpile issues, Timely and certifiable completion of Life Extension Programs,

304

Coordination Meeting with National Nuclear Security Administration...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for Coordination Meeting with National Nuclear Security Administration Los Alamos...

305

Nevada National Security Site Operational Awareness Oversight...  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Independent Activity Report - Rev. 0 Report Number: HIAR NNSS-2012-12-03 Site: Nevada National Security Site Subject: Office of Enforcement and Oversight's Office of Safety...

306

Categorical Exclusion Determinations: NNSA-Defense Science University...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Science University Programs Categorical Exclusion Determinations: NNSA-Defense Science University Programs Categorical Exclusion Determinations issued by NNSA-Defense...

307

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

308

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

309

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

310

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

311

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

312

Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan - Kingston Container Terminal, Port of Kingston, Jamaica  

SciTech Connect

Operational Testing and Evaluation Plan - Kingston Container Terminal, Port of Kingston, Jamaica was written for the Second Line of Defense Megaports Initiative. The purpose of the Operational Testing and Evaluation (OT&E) phase of the project is to prepare for turnover of the Megaports system supplied by U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA) located at the Kingston Container Terminal (KCT) of the Port of Kingston, Jamaica to the Government of Jamaica (GOJ). Activities conducted during the OT&E phase must demonstrate that the Megaports system can be operated effectively in real time by Jamaica Customs and KCT personnel to the satisfaction of the DOE/NNSA. These activities will also determine if the Megaports system, as installed and accepted, is performing according to the Megaports Program objectives such that the system is capable of executing the mission of the Second Line of Defense Megaports Initiative. The OT&E phase of the project also provides an opportunity to consider potential improvements to the system and to take remedial action if performance deficiencies are identified during the course of evaluation. Changes to the system should be considered under an appropriate change-control process. DOE/NNSA will determine that OT&E is complete by examining whether the Megaports system is performing as intended and that the GOJ is fully capable of operating the system independently without continued onsite support from the U.S. team.

Deforest, Thomas J.; VanDyke, Damon S.

2012-03-01T23:59:59.000Z

313

Survival by defense-enabling  

Science Conference Proceedings (OSTI)

Attack survival, which means the ability to provide some level of service despite an ongoing attack by tolerating its impact, is an important objective of security research. In this paper we present a new approach to survivability and intrusion tolerance. ...

Partha Pal; Franklin Webber; Richard Schantz

2001-09-01T23:59:59.000Z

314

List of Major Information Systems,National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

315

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

316

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

317

Independent Activity Report, Los Alamos National Laboratory - August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Laboratory - Los Alamos National Laboratory - August 2012 Independent Activity Report, Los Alamos National Laboratory - August 2012 August 2012 Defense Nuclear Facilities Safety Board Visit and Site Lead Planning Activities at the Los Alamos National Laboratory [HIAR LANL-2012-08-16] The purpose of this Office of Health, Safety and Security (HSS) activity was to maintain site operational awareness of key nuclear safety performance areas of interest to the Defense Nuclear Facilities Safety Board (DNFSB), monitor ongoing site oversight and planning activities for Los Alamos National Laboratory (LANL) nuclear facilities, and identify and initiate coordination of future HSS oversight activities at the site. Independent Activity Report, Los Alamos National Laboratory - August 2012

318

Best Practices for the Security of Radioactive Materials  

Science Conference Proceedings (OSTI)

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

319

Legacy Management Work Progresses on Defense-Related Uranium Mines Report  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Legacy Management Work Progresses on Defense-Related Uranium Mines Legacy Management Work Progresses on Defense-Related Uranium Mines Report to Congress Legacy Management Work Progresses on Defense-Related Uranium Mines Report to Congress October 23, 2013 - 1:35pm Addthis What does this project do? Goal 4. Optimize the use of land and assets The U.S. Department of Energy Office of Legacy Management (LM) continues to work on a report to Congress regarding defense-related legacy uranium mines. LM was directed by the U.S. Congress in the National Defense Authorization Act for Fiscal Year 2013 to undertake a review of, and prepare a report on, abandoned uranium mines in the United States that provided uranium ore for atomic energy defense activities. The report is due to Congress by July 2014. LM is compiling uranium mine data from federal, state, and tribal agencies

320

A Tiered Security System for Mobile Devices  

E-Print Network (OSTI)

We have designed a tiered security system for mobile devices where each security tier holds user-defined security triggers and actions. It has a friendly interface that allows users to easily define and configure the different circumstances and actions they need according to context. The system can be set up and activated from any browser or directly on the mobile device itself. When the security system is operated from a Web site or server, its configuration can be readily shared across multiple devices. When operated directly from the mobile device, no server is needed for activation. Many different types of security circumstances and actions can be set up and employed from its tiers. Security circumstances can range from temporary misplacement of a mobile device at home to malicious theft in a hostile region. Security actions can range from ringing a simple alarm to automatically erasing, overwriting, and re-erasing drives.

Bardsley, Scott; Morris, R Paul

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

GFI Network Security and PCI Compliance Power Tools  

Science Conference Proceedings (OSTI)

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities. ... Keywords: Applied, Computer Science, Computers, Information Management, Security

Brien Posey

2008-09-01T23:59:59.000Z

322

Driving Secure Software Development Experience in a Diverse Product Environment  

Science Conference Proceedings (OSTI)

Siemens' central security team drives secure software development across a diverse product portfolio. From factory automation to wind turbines, Siemens builds security in by activities including standardizing roles and responsibilities, threat and risk ... Keywords: Siemens, secure software development, risk analysis, threat analysis, software engineering

Barbara Fichtinger; Frances Paulisch; Peter Panholzer

2012-03-01T23:59:59.000Z

323

Adversarial security: getting to the root of the problem  

Science Conference Proceedings (OSTI)

This paper revisits the conventional notion of security, and champions a paradigm shift in the way that security should be viewed: we argue that the fundamental notion of security should naturally be one that actively aims for the root of the security ...

Raphael C.-W. Phan; John N. Whitley; David J. Parish

2010-03-01T23:59:59.000Z

324

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

325

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

326

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

327

"Little Holes to Hide In": Civil Defense and the Public Backlash Against Home Fallout Shelters, 1957-1963.  

E-Print Network (OSTI)

?? Throughout the 1950s, U.S. policymakers actively encouraged Americans to participate in civil defense through a variety of policies. In 1958, amidst confusion concerning which… (more)

Whitehurst, John R

2012-01-01T23:59:59.000Z

328

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

329

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

330

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

331

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring … ...

2013-01-17T23:59:59.000Z

332

U.S. And Russia Complete Nuclear Security Upgrades Under Bratislava  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

And Russia Complete Nuclear Security Upgrades Under Bratislava And Russia Complete Nuclear Security Upgrades Under Bratislava Initiative U.S. And Russia Complete Nuclear Security Upgrades Under Bratislava Initiative December 23, 2008 - 9:18am Addthis WASHINGTON, DC -The U.S. Department of Energy today delivered the Bratislava Nuclear Security report to the White House, which detailed the status of work agreed to by Presidents Bush and Putin in Bratislava in 2005. U.S. and Russian officials from the U.S. Department of Energy's National Nuclear Security Administration (NNSA), the U.S. Department of Defense, the Russian Ministry of Defense and State Atomic Energy Corporation "Rosatom" reviewed work to complete nuclear security upgrades in Russia at meetings in Moscow last week. Building on this success, both

333

To appeared in "Securing Transportation Systems, Protecting Critical Infrastructures Series (Book)", 2012 On the Rationality and Optimality of Transportation  

E-Print Network (OSTI)

To appeared in "Securing Transportation Systems, Protecting Critical Infrastructures Series (Book)", 2012 On the Rationality and Optimality of Transportation Networks Defense -- a Network Centrality Eng., Ben-Gurion University {puzis,elovici}@bgu.ac.il 3 Transportation Research Institute, Technion

334

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

335

Los Alamos National Lab: National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

Content stc logo Content stc logo Best of Show Winner of STC's International Summit Awards Competition, 2013 Top Innovations of the Year Science and technology for a safe, secure nation Impenetrable encryption defends data from cyberterrorism keyboard with atrack button A hacker could crack a code, steal private information or shut down systems we rely on daily. Small enough to fit in a smart phone, our QkarD technology ("kee-u-kard") provides virtually impenetrable defense, using quantum cryptography to secure computers. This novel encryption generates security at the subatomic particle level. If someone tries to hack in, that particle is altered, and the owner quietly alerted. And it works-even against super-powerful quantum computers. Multipronged HIV vaccine shows promise in monkeys

336

Travel Resources | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Travel Resources | National Nuclear Security Administration Travel Resources | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Travel Resources Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Russia Tri-Lab S&T Collaborations > Travel

337

Site Information | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

338

Site Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

339

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

340

Russian Locations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Locations | National Nuclear Security Administration Locations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Russian Locations Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Russia Tri-Lab S&T Collaborations > Travel

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

342

Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies  

Science Conference Proceedings (OSTI)

This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.

Fink, Glenn A.; Oehmen, Christopher S.

2012-09-01T23:59:59.000Z

343

Institutional Research & Development Reports | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Reports | National Nuclear Security Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Institutional Research & Development Reports Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

344

US/Russian Collaborations | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

US/Russian Collaborations | National Nuclear Security Administration US/Russian Collaborations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration US/Russian Collaborations Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

345

Laboratory Directed Research & Development | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Laboratory Directed Research & Development | National Nuclear Security Laboratory Directed Research & Development | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Laboratory Directed Research & Development Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

346

US/Russian Collaborations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

US/Russian Collaborations | National Nuclear Security Administration US/Russian Collaborations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration US/Russian Collaborations Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

347

Transmission Line Security Monitor: Final Report  

SciTech Connect

The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

John Svoboda

2011-04-01T23:59:59.000Z

348

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing discl

2009-10-01T23:59:59.000Z

349

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

350

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

351

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

352

Control Systems Security Standards: Accomplishments And Impacts |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments & Impacts More Documents & Publications A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

353

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

354

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

355

Enforcement Documents - Nevada National Security Site | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Enforcement Documents - Nevada National Security Site November 13, 2007 Enforcement Letter, National Security Technologies LLC,- November 13, 2007 Enforcement Letter issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site May 21, 2007 Enforcement Letter, National Security Technologies, LLC - May 21, 2007 Enforcement Letter issued to National Security Technologies, LLC related to Nuclear Safety Quality Assurance Requirements Deficiencies at the Nevada Test Site April 1, 2004 Enforcement Letter, Bechtel Nevada - April 1, 2002 Enforcement Letter issued to Bechtel Nevada related to Noncompliances with Occupational Radiation Protection and Quality Assurance Requirements at the

356

Office of Headquarters Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Security Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process.

357

Dr. Donald L. Cook | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Donald L. Cook | National Nuclear Security Administration Donald L. Cook | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Leadership > Dr. Donald L. Cook Dr. Donald L. Cook Deputy Administrator for Defense Programs Dr. Donald L. Cook Dr. Donald L. Cook serves as the Deputy Administrator for Defense Programs at the National Nuclear Security Administration. Appointed to the position

358

Partnering with Utilities for Energy Efficiency & Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SPIDERS SPIDERS Energy Security JCTD Proposal Dr. George Ka'iliwai Mr. Wade Jost USPACOM J8, Director of OSD Power Surety y Task Force Resources and Assessment The RedGate Group This brief is: This brief is: UNCLASSIFIED 1 UNCLASS As of Nov 09 The Situation * "Critical national security y and homeland defense missions are at an unacceptably high risk of extended outage from failure of the electric grid." The Defense Science Board Task Force on DoD Energy Security, July 2008 UNCLASS 2 UNCLASS As of Nov 09 The Situation * "There have been numerous attacks on the operating systems of major critical infrastructure facilities, including power grids, around the world in recent years: Chinese and Russian spies have "penetrated the U S penetrated the U.S.

359

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

360

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

362

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

363

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

364

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

365

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

366

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

367

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

368

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

369

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

370

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

371

Department of Defense authorization for appropriations for fiscal year 1995 and the future years defense program. Hearings before the Committee on Armed Services, United States Senate, One Hundred Third Congress, Second Session on S. 2182, Part 7, April 21, 26, 28; May 3, 5, 11, 1994  

SciTech Connect

The report on S.2182 covers hearings to authorize appropriations for fiscal year 1995 for military activities of the Department of Defense and for defense activities of the Department of Energy. The programs for nuclear deterrence, arms control, and defense intelligence are examined. Statements and documents provided for the record are included.

1994-12-31T23:59:59.000Z

372

Watching the watchdogs : assessing a First Amendment claim against the government's use of national security letters to track journalists' newsgathering activities.  

E-Print Network (OSTI)

??The FBI's use of National Security Letters (NSLs) to secretly demand customer records from communications providers in terrorism-related investigations has been criticized as an intrusion… (more)

Hoppenjans, Lisa.

2010-01-01T23:59:59.000Z

373

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Links Home > Field Offices > Welcome to the NNSA Production Office > Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge Site Specific Advisory Board American Museum of Science and Energy City of Oak Ridge Plants Laboratories Bechtel Nevada Bettis Laboratory Kansas City Plant Knolls Atomic Power Laboratory Lawrence Livermore National Laboratory

374

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

375

FOILFEST :community enabled security.  

SciTech Connect

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

376

Interim Closure Activities at Corrective Action Unit 114: Area 25 EMAD Facility, Nevada National Security Site, Nevada  

SciTech Connect

This letter report documents interim activities that have been completed at CAU 114 to support ongoing access and generate information necessary to plan future closure activities. General housekeeping and cleanup of debris was conducted in the EMAD yard, cold bays, support areas of Building 3900, and postmortem cell tunnel area of the hot bay. All non-asbestos ceiling tiles and loose and broken non-friable asbestos floor tiles were removed from support galleries and office areas. Non-radiologically contaminated piping and equipment in the cold areas of the building and in the two 120-ton locomotives in the yard were tapped, characterized, drained, and verified free of contents.

Boehlecke, R. F.

2011-10-24T23:59:59.000Z

377

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

378

Defense Nuclear Facilities Safety Board's enabling legislation  

NLE Websites -- All DOE Office Websites (Extended Search)

ENABLING STATUTE OF THE ENABLING STATUTE OF THE DEFENSE NUCLEAR FACILITIES SAFETY BOARD 42 U.S.C. § 2286 et seq. NATIONAL DEFENSE AUTHORIZATION ACT, FISCAL YEAR 1989 (Pub. L. No. 100-456, September 29, 1988), AS AMENDED BY NATIONAL DEFENSE AUTHORIZATION ACT, FISCAL YEAR 1991 (Pub. L. No. 101-510, November 5, 1990), NATIONAL DEFENSE AUTHORIZATION ACT FISCAL YEARS 1992 AND 1993 (Pub. L. No. 102-190, December 5, 1991), ENERGY POLICY ACT OF 1992 (Pub. L. No. 102-486, October 24, 1992), NATIONAL DEFENSE AUTHORIZATION ACT FISCAL YEAR 1994 (Pub. L. No. 103-160, November 30, 1993), FEDERAL REPORTS ELIMINATION ACT OF 1998 (Pub. L. No. 105-362, November 10, 1998), NATIONAL DEFENSE AUTHORIZATION ACT FISCAL YEAR 2001 (Pub. L. No. 106-398, October 30, 2000), AND

379

Secretary Chu Visits Russian Seaport, Checks Out Second Line of Defense  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Russian Seaport, Checks Out Second Line of Russian Seaport, Checks Out Second Line of Defense Nuclear Detection System Secretary Chu Visits Russian Seaport, Checks Out Second Line of Defense Nuclear Detection System June 7, 2011 - 8:59am Addthis John Gerrard What does this mean for me? The Second Line of Defense program cracks down on nuclear smuggling by installing radiation detection equipment at ports, border crossings and airports around the world. We've all seen the movies where errant nuclear material makes its way into the hands of terrorists, who then plan an attack on U.S. soil. It's pretty safe to say that this is a scenario no one wants to see play out in real life. In fact, in his first foreign policy speech, President Obama called it the "most immediate and extreme threat to global security."

380

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

382

Security Policy  

Science Conference Proceedings (OSTI)

... of network activity and behavior, which can be drilled down to ... The module's physical and electrical characteristics, manual controls, and physical ...

2012-10-18T23:59:59.000Z

383

NREL: Department of Defense Energy Programs - Publications  

NLE Websites -- All DOE Office Websites (Extended Search)

for Department of Defense Installations (Report) Discusses geothermal, photovoltaic, microgrid, waste-to-energy, wind, and buildings technologies. DOE, NREL Help DOD Enhance...

384

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

385

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management • Architecture security focus • Physical interaction ... Cybersecurity • Cybersecurity Framework • Smart Grid Program ...

2013-06-05T23:59:59.000Z

386

Independent Activity Report, Sandia National Laboratories - September 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 2012 Independent Activity Report, Sandia National Laboratories - September 2012 September 2012 Operational Awareness Oversight of Sandia National Laboratories [HIAR SNL-2012-09-13] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit to the Sandia Site Office (SSO) and Sandia National Laboratories (SNL) operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, primarily to discuss the Annular Core Research Reactor Facility (ACRRF) improvement plan developed by SNL in response to recent safety basis and software quality assurance concerns raised by the Defense Nuclear Facilities Safety Board (DNFSB). Independent Activity Report, Sandia National Laboratories - September 2012

387

Foundations of a defense digital platform : business systems governance in the Department of Defense  

E-Print Network (OSTI)

In 2010, the United States Department of Defense (DoD) spent more than $35 billion on information systems development and sustainment, with nearly $7 billion to defense business systems investments alone. It is not surprising ...

Ziegler, Dustin P

2012-01-01T23:59:59.000Z

388

National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Defense Authorization Act for Fiscal Year 1993 (PL National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) Section 3162 of the National Defense Authorization Act for Fiscal Year 1993 (Public Law 102-484) called for the Secretary to establish and carry out a program for the identification and on-going medical evaluation of its former employees who are subject to significant health risks as a result of the exposure of such employees to hazardous or radioactie substances during such employment. National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities ATTACHMENTfLASH2011-6(2)-OPAM Searchable Electronic Department of Energy Acquisition Regulation

389

National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Defense Authorization Act for Fiscal Year 1993 (PL National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) Section 3162 of the National Defense Authorization Act for Fiscal Year 1993 (Public Law 102-484) called for the Secretary to establish and carry out a program for the identification and on-going medical evaluation of its former employees who are subject to significant health risks as a result of the exposure of such employees to hazardous or radioactie substances during such employment. National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities Full Text of Amended National Energy Conservation Policy Act (NECPA)

390

Optimal Resource Allocation in Electrical Network Defense  

Science Conference Proceedings (OSTI)

Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasures when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.

Yao, Y; Edmunds, T; Papageorgiou, D; Alvarez, R

2004-01-15T23:59:59.000Z

391

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

392

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Office of Defense Science Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test Capabilities and Evaluation > Office of Research and...

393

Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Office of Defense Science Reports Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test Capabilities and Evaluation > Office of Research and...

394

Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Office of Defense Science Reports Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Research and Development >...

395

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Office of Defense Science Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Research and Development...

396

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

397

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > Field Offices > Welcome to the Sandia Field Office > Contact Us Contact Us If you have questions about activities at the Sandia Field Office, please contact the SFO Public Affairs Director at (505) 845-5264. Our mailing address is: U. S. Department of Energy, National Nuclear Security Administration, Sandia Field Office, P.O. Box 5400, Albuquerque, NM 87185. Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About SFO Contact Us Contract Administration & Business Management Emergency Information Facilities & Projects Nuclear Operations Environment, Safety & Health Public Affairs Safeguards & Security Performance and Quality Assurance

398

Office of Security Operations: Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Mission and Functions Mission and Functions Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process. Functions

399

Computer Security Advisories  

Science Conference Proceedings (OSTI)

... 7090; Computer Incident Advisory Capability (CIAC) http://ciac.llnl.gov/ Email: ciac@llnl.gov or call +1 925 422-8193; Defense ...

400

Office of Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security and Emergency Management Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our activities. We hope you will find it useful. Much of this page's contents are oriented to reindustrialization and other managers of new DOE projects and programs. Feel free to contact the designated key personnel for assistance. Access Authorization Branch Using established guidelines and the "whole person concept," we evaluate and adjudicate informaton about those who need clearances which is developed during background investigations. The objective is to render access determinations that are in the best interest of national security. We also provide security education and awareness information, personnel security program support, and visitor control and foreign travel support to the Oak Ridge Office, the Paducah-Portsmouth Project Office, and the Thomas Jefferson National Accerelator Facility.

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Student Experiential Opportunities in National Security Careers  

Science Conference Proceedings (OSTI)

This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

None

2007-12-31T23:59:59.000Z

402

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

403

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

404

Sandia National Laboratories: National Security Missions: International  

NLE Websites -- All DOE Office Websites (Extended Search)

WMD Counterterrorism & Response WMD Counterterrorism & Response Airworthiness Weapons of Mass Destruction (WMD) Counterterrorism & Response provides operational planning assistance and training to counter domestic and international nuclear and radiological terrorism, including: Specialized training for nuclear and explosive threats for warfighters and law enforcement Technologies for evaluating airframe integrity and other critical structural integrity Our partners include National Nuclear Security Administration (NNSA), Department of Defense (DoD), and Federal Aviation Administration (FAA). Program Areas include: Airworthiness and Infrastructure Assurance Nuclear Incident Response Nuclear Counterterrorism Chemical, Biological, Radiological, Nuclear and Explosives Technology Development

405

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

406

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

407

Independent Activity Report, Livermore Site Office - January 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent Activity Report, Livermore Site Office - January 2011 Independent Activity Report, Livermore Site Office - January 2011 Independent Activity Report, Livermore Site Office - January 2011 January 2011 Livermore Site Office Facility Representative Program Assessment [ARPT-LSO-2011-001] This activity report documents the results of the Office of Health, Safety and Security's (HSS) review of and participation in the Livermore Site Office Self-Assessment of the Facility Representative (FR) Program. This self-assessment was led by the U.S. Department of Energy (DOE) Livermore Site Office (LSO) and conducted by LSO staff, HSS staff, National Nuclear Security Administration (NNSA) Office of the Chief of Defense Nuclear Safety (CDNS) staff, a peer from Los Alamos Site Office, and a FR subject matter expert from NNSA.

408

Independent Activity Report, Pantex Plant - July 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 2012 July 2012 Independent Activity Report, Pantex Plant - July 2012 July 2012 Operational Awareness Oversight of the Pantex Plant [HIAR PTX-2012-07-19] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit primarily to review the status of the Babcock & Wilcox Technical Services Pantex, LLC (B&W Pantex) Documented Safety Analysis Upgrade Initiative (DSAUGI) project and the National Nuclear Security Administration (NNSA) response to recent Defense Nuclear Facilities Safety Board (DNFSB) concerns regarding nuclear explosive safety (NES) issues at the Pantex Plant, but also to monitor other ongoing site activities. Independent Activity Report, Pantex Plant - July 2012 More Documents & Publications

409

OFFICE OF THE UNDER SECRETARY OF DEFENSE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UNDER SECRETARY OF DEFENSE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301 -3000 ACQUISITION TECHNOLOGY AND LOGISTICS MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND TECHNOLOGY) ASSISTANT SECRETARY OF THE NAVY (RESEARCH, DEVELOPMENT AND ACQUISITION) ASSISTANT SECRETARY OF THE AIR FORCE (ACQUISITION) DIRECTORS OF DEFENSE AGENCIES SUBJECT: Use of Federal Supply Schedules and Market Research The Department of Defense utilizes the Federal Supply Schedules of the General Services Administration to meet a significant number of our requirements. The "Use of Federal Supply Schedules" is governed by the requirements in FAR 8.404. FAR 8.404 says in part, "by placing an order against a schedule contract using the procedures in FAR

410

The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Inspections Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration" BACKGROUND The National Nuclear Security Administration's (NNSA) Office of Defense Nuclear Nonproliferation established the Global Threat Reduction Initiative (GTRI) in May 2004, as a vital part of the efforts to combat nuclear and radiological terrorism. GTRI's mission is to reduce

411

U.S. Department of Energy Strategic Plan 13 In 2000, the National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 3 In 2000, the National Nuclear Security Administration (NNSA) was established as a new element within the Department in response to a Congressional mandate to reinvigorate the security posture throughout the nuclear weapons program and to reaffirm the Nation's commitment to maintaining the nuclear deterrence capabilities of the United States. NNSA was chartered to better focus management attention on enhanced security, proactive management practices, and mission focus within the Department's national defense and nonproliferation programs. The Department performs its national security mission involving nuclear weapons and nuclear materials and technology through the NNSA. Over the next six years, the Department will apply

412

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

413

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

414

Savannah River Site | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Site | National Nuclear Security Administration Site | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Locations > Savannah River Site Savannah River Site http://www.srs.gov/general/srs-home.html Field Office: Located south of Aiken, South Carolina, the Savannah River Field Office (SRFO) is responsible for the NNSA Defense Program missions at

415

Savannah River Site | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Site | National Nuclear Security Administration Site | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Locations > Savannah River Site Savannah River Site http://www.srs.gov/general/srs-home.html Field Office: Located south of Aiken, South Carolina, the Savannah River Field Office (SRFO) is responsible for the NNSA Defense Program missions at

416

NNSA Policy System | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy System | National Nuclear Security Administration Policy System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NNSA Policy System Home > About Us > Our Operations > Management and Budget > NNSA Policy System NNSA Policy System The NNSA's Policy System is established under the authority of Section 3212(d) of Public Law 106-65, the National Defense Authorization Act for

417

Z Machine | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Z Machine | National Nuclear Security Administration Z Machine | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Z Machine Z Machine Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Inertial Confinement Fusion > Facilities > Z Machine Z Machine Z Machine Sandia National Laboratories

418

Don Nichols | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Don Nichols | National Nuclear Security Administration Don Nichols | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Leadership > Don Nichols Don Nichols Associate Administrator for Safety and Health Don Nichols On March 4, 2009, Dr. Nichols was appointed the Chief of Defense Nuclear Safety (CDNS), reporting to the Administrator of the National Nuclear

419

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Institutional Research & Development > Contact Us Contact Us Above Image: Fission neutrons can be distinguished from background radiation using a novel variation of a metal-organic framework (MOF) scintillator that was a new class of scintillator previously patented by Sandia: Crystals of a metal organic framework (left) emit light in the blue (middle) when exposed to ionizing radiation. Infiltrating them with an organometallic compound causes the crystals to emit red light as well (right), creating a new way to differentiate fission neutrons from

420

Memorandum, Safeguards & Security Policy Panels - February 15, 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Memorandum, Safeguards & Security Policy Panels - February 15, 2008 Memorandum, Safeguards & Security Policy Panels - February 15, 2008 Memorandum, Safeguards & Security Policy Panels - February 15, 2008 February 15, 2008 As outlined in the attached HSS memo, dated December 3,2007, subject: Safeguards and Security Policy Panels, the HSS Office of Security Policy is establishing several new policy panels that will create new opportunities for communication and will include those current active groups that are now effectively promoting cominunications in theirsafeguards and security topical areas. The Office of Health, Safety and Security (HSS) recognizes the importance of well conceived strategies and policies to support and communicate the security posture of the Department. In order for our security policies to

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

IT Security for Automation Systems – Motivations and Mechanisms  

E-Print Network (OSTI)

The protection of safety-critical and infrastructure systems (such as automation systems for utilities, but also for manufacturing plants) against electronic and communication network based attacks becomes more and more important. This paper examines how such safety-critical plants and automation systems can be secured against information system and network based attacks. Based on the defense-in-depth approach, a conceptional, generic security zone model for use in analysis and synthesis of a plant security architecture is proposed, and for each of its zones a survey of the available and appropriate security mechanisms for delay, detection, and reaction is given. Der Schutz von sicherheitskritischen Systemen und Infrastruktureinrichtungen (wie zum Beispiel der Automatisierungsanlagen von Versorgungsunternehmen, aber auch von Fabrikationsanlagen) gegen

Martin Naedele; Abb Schweiz Ag

2004-01-01T23:59:59.000Z

422

Oil's Impact on Our National Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oil's Impact on Our National Security Oil's Impact on Our National Security Oil's Impact on Our National Security April 25, 2011 - 6:12pm Addthis John Schueler John Schueler Former New Media Specialist, Office of Public Affairs Our dependence on foreign oil not only impacts hard working Americans at the pump, but it also compromises the security of our troops, as transporting large quantities of oil to our armed forces is often a dangerous and costly endeavor. The Department of Energy is committed to reducing our dependence on oil and supporting our armed forces, and that's why we've been collaborating with the Department of Defense throughout this administration to develop clean energy technologies and get them into the field. Tomorrow, Deputy Secretary Daniel Poneman will join Deputy Secretary of

423

White House Energy Security Stakeholders Forum | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Security Stakeholders Forum Energy Security Stakeholders Forum White House Energy Security Stakeholders Forum July 27, 2010 - 1:04pm Addthis Remarks as Prepared for Delivery U.S. Deputy Secretary of Energy Daniel Poneman White House Energy Security Stakeholders Forum Tuesday, July 27, 2010 Good afternoon. Thank you Secretary Mabus and Carol Browner for your leadership on these important issues. It's a pleasure to be here today with all of our distinguished panelists and guests. Before I begin my remarks, I want to take a moment to thank all the men and women here today who work day in and day out to keep our country safe. We greatly appreciate your sacrifice and service. It is fitting that today's forum includes representatives from both the energy and defense sectors, from academia and the business community. Our

424

White House Energy Security Stakeholders Forum | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

White House Energy Security Stakeholders Forum White House Energy Security Stakeholders Forum White House Energy Security Stakeholders Forum July 27, 2010 - 1:04pm Addthis Remarks as Prepared for Delivery U.S. Deputy Secretary of Energy Daniel Poneman White House Energy Security Stakeholders Forum Tuesday, July 27, 2010 Good afternoon. Thank you Secretary Mabus and Carol Browner for your leadership on these important issues. It's a pleasure to be here today with all of our distinguished panelists and guests. Before I begin my remarks, I want to take a moment to thank all the men and women here today who work day in and day out to keep our country safe. We greatly appreciate your sacrifice and service. It is fitting that today's forum includes representatives from both the energy and defense sectors, from academia and the business community. Our

425

SECURING HARDWARE, SOFTWARE AND DATA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the Cyber Security of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability i PNNL-16971 Report of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability iii Acknowledgements The workshop chairs wish to thank Joree O'Neal and Rachel Smith for all their help and support with organizing the logistics and registration activities for this workshop; Sue Chin, Ted Tanasse, Barbara Wilson, and Stacy Larsen for their expert help with the assembly, text editing, and graphics for this report; and Lance Baatz for his masterful

426

Programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Programs Home > Field Offices > Welcome to the Sandia Field Office > Programs Programs The SFO Programs office is responsible for direction, day-to-day oversight and contract administration activities in support of the technical

427

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

428

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in today’s software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

429

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

430

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

431

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

432

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

433

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

434

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

435

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

436

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

438

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

439

Departments of Energy, Defense Partner to Install Fuel Cell Backup...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at...

440

NNSA Defense Programs leadership meets with Sandia employees...  

NLE Websites -- All DOE Office Websites (Extended Search)

Media Room > Photo Gallery > NNSA Defense Programs leadership meets with Sandia employees NNSA Defense Programs leadership meets with Sandia employees NNSANews posted a photo: NNSA...

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

The Defense Nuclear Facilities Safety Board - Strategic Plan...  

NLE Websites -- All DOE Office Websites (Extended Search)

all of its defense nuclear facilities. Message from the Board Peter S. Winokur, Chariman Jessie H. Roberson, Vice Chariman John E. Mansfield Joseph F. Bader DEFENSE NUCLEAR...

442

Legacy Management Work Progresses on Defense-Related Uranium...  

NLE Websites -- All DOE Office Websites (Extended Search)

Legacy Management Work Progresses on Defense-Related Uranium Mines Report to Congress Legacy Management Work Progresses on Defense-Related Uranium Mines Report to Congress October...

443

The Office of Environmental Management (EM) Defense Environmental...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(EM) Defense Environmental Cleanup The Office of Environmental Management (EM) Defense Environmental Cleanup Microsoft Word - 271C2C7B.doc More Documents & Publications Microsoft...

444

Microsoft Word - defense_in_depth_fanning.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Engineering and Systems Analysis What is Defense in Depth? Defense in Depth is a safety philosophy that guides the design, construction, inspection, operation, and...

445

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

446

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

447

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

448

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

449

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

450

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

451

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

452

IT-Security for Safety-Critical Automation Systems  

E-Print Network (OSTI)

The protection of safety-critical and infrastructure systems (such as automation systems for utilities, but also for manufacturing plants) against electronic and communication network based attacks becomes more and more important. This paper investigates how such safety-critical plants and automation systems can be secured against information system and network based attacks. The two common approaches, hard perimeter, and defense-in-depth are discussed. Based on the defense-in-depth approach, a conceptional, generic security zone model for use in analysis and synthesis of a plant security architecture is proposed, and for each of its zones a survey of the available and appropriate security mechanisms is given. Using an example from the substation automation domain, it is shown how threats and counter-measures can be systematically derived and how the specific system and usage characteristics of automation systems (or at least their restricted safety critical sub-functions) can be exploited in a positive way to deploy security mechanisms that would in this form not be available and applicable to home or office information systems. 1.

Martin Naedele

2002-01-01T23:59:59.000Z

453

Nevada National Security Site Operational Awareness Oversight...  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Independent Activity Report - Rev. 0 Report Number: HIAR NNSS-2011-11-28 Site: Nevada National Security Site Subject: Office of Enforcement and Oversight's Office of Safety and...

454

Computational Systems & Software Environment | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Computational Systems & Software Environment | National Nuclear Security Computational Systems & Software Environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog CSSE Computational Systems & Software Environment Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

455

Office of Inertial Confinement Fusion | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Inertial Confinement Fusion | National Nuclear Security Inertial Confinement Fusion | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Inertial Confinement Fusion Office of Inertial Confinement Fusion Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Inertial Confinement Fusion

456

Predictive Science Academic Alliance Program | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Predictive Science Academic Alliance Program | National Nuclear Security Predictive Science Academic Alliance Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Predictive Science Academic Alliance Program Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

457

High Energy Density Laboratory Plasmas | National Nuclear Security  

National Nuclear Security Administration (NNSA)

| National Nuclear Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog HEDLP High Energy Density Laboratory Plasmas Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > University Partnerships / Academic Alliances > High Energy Density Laboratory Plasmas

458

University Program in Advanced Technology | National Nuclear Security  

National Nuclear Security Administration (NNSA)

University Program in Advanced Technology | National Nuclear Security University Program in Advanced Technology | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog University Program in Advanced Technology Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

459

Control Systems Security Test Center - FY 2004 Program Summary  

Science Conference Proceedings (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

460

National Nuclear Security Administration Supplemental Listing of Directives  

National Nuclear Security Administration (NNSA)

Updated 9/15/11 Updated 9/15/11 National Nuclear Security Administration Supplemental Listing of Directives Affecting Nuclear Safety Requirements Last Updated 09/15/11 U.S. DEPARTMENT OF ENERGY National Nuclear Security Administration Office of the Chief of Defense Nuclear Safety AVAILABLE ONLINE AT: http://hq.na.gov link to NNSA Policies/Supplemental Directives This Page Intentionally Blank. Concurrence on Exemptions or Exceptions Page 1 Updated 9/15/11 ADDITIONAL DIRECTIVES (LATEST VERSION) REQUIRING CENTRAL TECHNICAL AUTHORITY CONCURRENCE PRIOR TO GRANTING EXEMPTIONS, EQUIVALENCIES OR EXCEPTIONS This document is maintained by the NNSA Chief of Defense Nuclear Safety and lists any directives, including Supplemental Directives or other NNSA issuances, for which NNSA

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

462

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

463

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

464

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

465

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

466

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

467

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

468

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

469

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

470

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

471

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

472

Defense Program Equivalencies for Technical Qualification Standard  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Program Equivalencies for Technical Qualification Standard Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995 Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995 Defense Programs has undertaken an effort to compare the competencies in the General Technical Base Qualification Standard and the Functional Area Qualification Standards with various positions in the Naval Nuclear Propulsion Program and the commercial nuclear industry. The purpose of this effort is to determine if equivalencies can be granted for competencies based on previous training and experience in these areas. The equivalency crosswalk was developed by subject matter experts who held positions in the Navy and/or the commercial nuclear power program. To date, equivalencies have been

473

Y-12 National Security Complex | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Aerial View Y-12 National Security Complex Aerial View Y-12 National Security Complex's primary mission is to support of the DOE nuclear weapons stockpile maintenance program. Activities include assembly and disassembly of nuclear weapons components, secure storage of special nuclear material (SNM), and various other nuclear weapons-related activities. Other activities include various aspects of testing and development, nonproliferation, and technology transfer. Enforcement June 13, 2008 Preliminary Notice of Violation, Babcock & Wilcox Teclmical Services Y -12, LLC - NEA-2008-01 Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC, related to a Uranium Chip Fire at the Y-12 National

474

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

475

Protection Programming Defensive Planning for Fixed Facilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE STD-1207-2012 December 2012 DOE STANDARD Protection Program Defensive Planning For Fixed Facilities U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE STD-1207-2012 This Page Intentionally Left Blank ii DOE STD-1207-2012 TABLE OF CONTENTS FOREWORD..................................................................................................................................v PROTECTION PROGRAM DEFENSIVE PLANNING ..........................................................1 1. SCOPE............................................................................................................................ 1 2. PURPOSE. ..................................................................................................................... 1

476

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

477

Climate VISION: Security and Privacy Notices  

Office of Scientific and Technical Information (OSTI)

SECURITY AND PRIVACY NOTICES SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of

478

Privacy & Security Notice | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

479

Passive Neutron Detection in Ports for Homeland Security Applications  

E-Print Network (OSTI)

The smuggling of special nuclear material (SNM) has long been a concern. In April 2009, President Obama declared that a terrorist acquiring a nuclear weapon was the most immediate threat to global security. The Second Line of Defense (SLD) initiative was stood up by the National Nuclear Security Administration to deter, detect, and interdict illicit trafficking of nuclear and radioactive materials across international borders and maritime shipping. The SLD initiative does not provide for the detection of SNM being carried on small, personal watercraft. Previous work examined the possibility of using active neutron detectors to induce fission in SNM and detect the response. This thesis examines the possibility of detecting SNM using passive 3He neutron detectors. Monte Carlo N-Particle (MCNP) simulations were run to determine the best detector configuration. Detecting sources at increasing depths, detecting moving sources and the effects of waves were also simulated in MCNP. Comparisons with experimental measurements showed that detectors parallel to the surface of water were best at detecting neutron sources below the surface. Additionally, stacking detectors and placing a cadmium sheet between the polyethylene blocks resulted in a greater ability to determine the height of a source by taking the ratio of count rates in the lower and upper detectors. Using this configuration, a source of strength 3.39 x 10^5 n/s could be detected to a depth of 12.00 in below the water surface. Count rates in the presence of waves did not average out to count rates taken above a flat plane of water. Detectors closer to the water performed worse than above a flat plane while detectors placed higher recorded more counts than above a flat plane. Moving sources were also simulated; sources under water, 3.00 ft from the detectors, and moving at 5.8 kts could be detected above background.

Pedicini, Eowyn E

2013-05-01T23:59:59.000Z

480

FURTHER CONTINUING APPROPRIATIONS AMENDMENTS ...  

Science Conference Proceedings (OSTI)

... Atomic Energy Defense Activities— National Nuclear Security Administration ... to the 'Uranium Enrichment Decontamination and Decommissioning ...

2012-01-24T23:59:59.000Z

Note: This page contains sample records for the topic "defense activities security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Title XXXII, National Defense Autorization Act for Fiscal year...  

National Nuclear Security Administration (NNSA)

security threats posed to that site; (B) for each site and for the nuclear security enterprise , the methods used by the National Nuclear Security Administration to establish...

482

Operational Awareness Oversight of the Nevada National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Independent Activity Report - Rev. 0 Report Number: HIAR NNSS-2012-08-16 Site: Nevada National Security Site Subject: Office of Enforcement and Oversight's Office of Safety...

483

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

Science Conference Proceedings (OSTI)

Our reliance on the cyber infrastructure has further grown and the dependencies have become more complex. The infrastructure and applications running on it are not generally governed by the rules of bounded systems and inherit the properties of unbounded systems, such as the absence of global control, borders and barriers. Furthermore, the quest for increasing functionality and ease of operation is often at the cost of controllability, potentially opening up avenues for exploitation and failures. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. In the presence of information explosion, i.e., the pervasive abundance of (public/private) information and the effects of such, intelligence has the potential to shift the advantages in the dynamic game of defense and attacks in cyber space. Gathering, analyzing, and making use of information constitutes a business-/sociopolitical-/military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace. The goal of the workshop is to establish, debate and challenge the far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence that is founded on sound principles and technologies.

Sheldon, Frederick T [ORNL; Peterson, Greg D [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2009-01-01T23:59:59.000Z

484

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Inertial Confinement Fusion Inertial Confinement Fusion Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Inertial Confinement Fusion > Facilities Facilities Office of Inertial Confinement Fusion, Facilities ICF operates a set of world-class experimental facilities to create HEDP conditions and to obtain quantitative data in support of its numerous stockpile stewardship-related activities. To learn about three high energy experimental facilities and two small lasers that provide ICF capabilities, select the links below. National Ignition Facility, Lawrence Livermore National Laboratory OMEGA and OMEGA EP, University of Rochester Laboratory for Laser Energetics Z Machine, Sandia National Laboratories

485

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

486

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

487

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

488

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

489

Principal Deputy Administrator for Defense Nuclear Nonproliferation...  

NLE Websites -- All DOE Office Websites (Extended Search)

Enrichment for Research and Test Reactors in Lisbon, Portugal | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering...

490

Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

DOE Green Energy (OSTI)

For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

Durling, R L; Price, D E; Spero, K K

2005-06-06T23:59:59.000Z

491

Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

DOE Green Energy (OSTI)

For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented.

Durling, Jr., R L; Price, D E; Spero, K K

2005-01-03T23:59:59.000Z

492

2003 U.S. Department of Energy Strategic Plan: Protecting National, Energy, and Economic Security with Advanced Science and Technology and Ensuring Environmental Cleanup  

SciTech Connect

The Department of Energy contributes to the future of the Nation by ensuring energy security, maintaining the safety, security and reliability of the nuclear weapons stockpile, cleaning up the environment from the legacy of the Cold War, and developing innovations in science and technology. After 25 years in existence, the Department now operates 24 preeminent research laboratories and facilities and four power marketing administrations, and manages the environmental cleanup from 50 years of nuclear defense activities that impacted two million acres in communities across the country. The Department has an annual budget of about $23 billion and employs about 14,500 Federal and 100,000 contractor employees. The Department of Energy is principally a national security agency and all of its missions flow from this core mission to support national security. That is true not just today, but throughout the history of the agency. The origins of the Department can be traced to the Manhattan Project and the race to develop the atomic bomb during World War II. Following the war, Congress engaged in a vigorous and contentious debate over civilian versus military control of the atom. The Atomic Energy Act of 1946 settled the debate by creating the Atomic Energy Commission, which took over the Manhattan Project’s sprawling scientific and industrial complex.

None,

2003-09-30T23:59:59.000Z

493

Security Automation Considered Harmful? W. Keith Edwards Erika Shehan Poole Jennifer Stoll  

E-Print Network (OSTI)

Security Automation Considered Harmful? W. Keith Edwards Erika Shehan Poole Jennifer Stoll School link in information security. Because of this perception, a growing body of research and commercial activity is focused on automated approaches to security. With these approaches, security decisions

Edwards, Keith

494

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

495

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global