Powered by Deep Web Technologies
Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Global Threat Reduction Initiative  

Broader source: Energy.gov (indexed) [DOE]

Nonproliferation Nonproliferation U.S. DEPARTMENT OF ENERGY 1 The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011 Jeff Galan, Deputy Project Manager U.S.-Origin Nuclear Remove Program National Nuclear Security Administration Global Threat Reduction Initiative Defense Nuclear Nonproliferation U.S. DEPARTMENT OF ENERGY 2 GTRI Mission and Goals GTRI is: A part of President Obama's comprehensive strategy to prevent nuclear terrorism; and The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other

2

Global Threat Reduction Initiative  

Broader source: Energy.gov (indexed) [DOE]

comprehensive comprehensive strategy to prevent nuclear terrorism; and  The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other acts of terrorism Protect high priority nuclear and radiological materials from theft and sabotage These efforts result in threat reduction by improving security on the bomb material remaining at civilian sites - each vulnerable building that is protected reduces the risk until a permanent threat reduction solution can be implemented.

3

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

Office of Scientific and Technical Information (OSTI)

Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

4

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Reduction Initiative An overview of the Global Threat Reduction Initiative, U.S.-Origin Nuclear Fuel Removals. Global Threat Reduction Initiative More Documents &...

5

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Initiative Global Threat Reduction Initiative The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011. Global Threat Reduction Initiative More Documents &...

6

Global Threat Reduction Initiative | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

7

Global Threat Reduction Initiative | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

8

Manager, International Chemical Threat Reduction Department, Sandia  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

9

Manager, International Chemical Threat Reduction Department, Sandia  

National Nuclear Security Administration (NNSA)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

10

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

11

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

National Nuclear Security Administration (NNSA)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

12

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking  

E-Print Network [OSTI]

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking R. D effort is underway to fill this "THz gap" in view of potential threat reduction applications) and Theoretical Divisions, are exploring metamaterials-based de- vices operating at THz frequencies for threat

13

The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01  

Broader source: Energy.gov (indexed) [DOE]

Audit and Inspections Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration" BACKGROUND The National Nuclear Security Administration's (NNSA) Office of Defense Nuclear Nonproliferation established the Global Threat Reduction Initiative (GTRI) in May 2004, as a vital part of the efforts to combat nuclear and radiological terrorism. GTRI's mission is to reduce

14

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems  

E-Print Network [OSTI]

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

Menascé, Daniel A.

15

NNSA Supports Permanent Threat Reduction in Ukraine through Alternativ...  

National Nuclear Security Administration (NNSA)

terrorism around the world. Converting or replacing isotopic devices with non-isotopic alternative technology achieves permanent threat reduction by decreasing the availability...

16

Global Threat Reduction Initiative | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Threat Reduction Global Threat Reduction ... Global Threat Reduction Initiative The Global Threat Reduction Initiative's Alarm Response Training provides training in the area of response for radiological events and provides an opportunity for the security forces, health and safety personnel, and other responsible parties such as the supporting local law enforcement to develop, discuss, and exercise their own tactics, techniques, procedures, and protocols when responding to a theft and/or sabotage event involving radioactive materials of significance. This voluntary program is free, and all expenses (travel, meals, etc.), other than the trainee's training time, will be paid by the GTRI Domestic Threat Reduction Program. Facilities participating in the Domestic Security Program are scheduled for

17

NNSA's Global Threat Reduction Initiative launches mobile app | National  

National Nuclear Security Administration (NNSA)

launches mobile app | National launches mobile app | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative launches mobile app NNSA's Global Threat Reduction Initiative launches mobile app Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative (GTRI) recently launched a

18

NNSA's Global Threat Reduction Initiative food face-off | National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

food face-off | National food face-off | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative food face-off NNSA's Global Threat Reduction Initiative food face-off Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative holds a Feds Feeds Family face-off

19

NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Receives 2010 Distinguished Receives 2010 Distinguished Project Award from PMI | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Press Releases > NNSA's Global Threat Reduction Initiative Receives 2010 ... Press Release NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished

20

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

National Nuclear Security Administration (NNSA)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

22

2014 Annual Planning Summary for the NNSA Global Threat Reduction Initiative Office  

Broader source: Energy.gov [DOE]

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2014 and 2015 within the NNSA Global Threat Reduction Initiative Office.

23

The Global Threat Reduction Initiative's Molybdenum-99 Program, OAS-L-12-07  

Broader source: Energy.gov (indexed) [DOE]

Global Threat Reduction Global Threat Reduction Initiative's Molybdenum-99 Program OAS-L-12-07 July 2012 Department of Energy Washington, DC 20585 July 20, 2012 MEMORANDUM FOR THE ASSISTANT DEPUTY ADMINISTRATOR FOR GLOBAL THREAT REDUCTION, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: David Sedillo, Director Western Audits Division Office of Inspector General SUBJECT: INFORMATION: Audit Report on "The Global Threat Reduction Initiative's Molybdenum-99 Program" BACKGROUND Molybdenum-99 (Mo-99) is used in the production of technetium-99m (Tc-99m), the most commonly used medical radioisotope in the world. The United States accounts for approximately half of the global demand for Mo-99 at approximately 6,000 units per week. Because Mo-99's short half-life of 66 hours prevents it from being stockpiled, consistent

24

NNSA's Global Threat Reduction Initiative Removes More Than One Ton of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Removes More Than One Ton of Removes More Than One Ton of Food | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Removes More ... NNSA's Global Threat Reduction Initiative Removes More Than One Ton of Food Posted By Office of Public Affairs Contributing to DOE/NNSA's efforts to support the Office of Personnel

25

Assessing homeland chemical hazards outside the military gates: industrial hazard threat assessments for department of defense installations  

Science Journals Connector (OSTI)

As part of comprehensive joint medical surveillance measures outlined by the Department of Defense, the US Army Center for Health Promotion and Preventive Medicine (USACHPPM) is beginning to assess environmental health threats to continental US military installations. A common theme in comprehensive joint medical surveillance, in support of Force Health Protection, is the identification and assessment of potential environmental health hazards, and the evaluation and documentation of actual exposures in both a continental US and outside a continental US setting. For the continental US assessments, the USACHPPM has utilized the US Environmental Protection Agency (EPA) database for risk management plans in accordance with Public Law 106-40, and the toxic release inventory database, in a state-of the art geographic information systems based program, termed the Consequence Assessment and Management Tool Set, or CATS, for assessing homeland industrial chemical hazards outside the military gates. As an example, the US EPA toxic release inventory and risk management plans databases are queried to determine the types and locations of industries surrounding a continental US military installation. Contaminants of concern are then ranked with respect to known toxicological and physical hazards, where they are then subject to applicable downwind hazard simulations using applicable meteorological and climatological data sets. The composite downwind hazard areas are mapped in relation to emergency response planning guidelines (ERPG), which were developed by the American Industrial Hygiene Association to assist emergency response personnel planning for catastrophic chemical releases. In addition, other geographic referenced data such as transportation routes, satellite imagery and population data are included in the operational, equipment, and morale risk assessment and management process. These techniques have been developed to assist military medical planners and operations personnel in determining the industrial hazards, vulnerability assessments and health risk assessments to continental United States military installations. These techniques and procedures support the Department of Defense Force Protection measures, which provides awareness of a terrorism threat, appropriate measures to prevent terrorist attacks and mitigate terrorism's effects in the event that preventive measures are ineffective.

Jeffrey S Kirkpatrick; Jacqueline M Howard; David A Reed

2002-01-01T23:59:59.000Z

26

GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS  

SciTech Connect (OSTI)

The U.S. Department of Energys National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

2009-10-07T23:59:59.000Z

27

The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation  

SciTech Connect (OSTI)

After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a dirty bomb. In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRIs Russia Orphan Source Recovery Project, managed at the Nevada National Security Sites North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company Isotope has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

2012-06-04T23:59:59.000Z

28

Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan  

SciTech Connect (OSTI)

The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNLs support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

Pereira, Mario M.; Slonecker, Bruce D.

2012-06-01T23:59:59.000Z

29

Categorizing Threat Building and Using a Generic Threat Matrix | Department  

Broader source: Energy.gov (indexed) [DOE]

Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general

30

Cyber Defense Overview  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

infrastructure. New threats demand new defenses Page-3 SPIDERS Program Summary CAMP SMITH ENERGY ISLAND * Entire Installation Smart Microgrid * Islanded Installation * High...

31

IMPACTS OF ANTIFOAM ADDITIONS AND ARGON BUBBLING ON DEFENSE WASTE PROCESSING FACILITY REDUCTION/OXIDATION  

SciTech Connect (OSTI)

During melting of HLW glass, the REDOX of the melt pool cannot be measured. Therefore, the Fe{sup +2}/{Sigma}Fe ratio in the glass poured from the melter must be related to melter feed organic and oxidant concentrations to ensure production of a high quality glass without impacting production rate (e.g., foaming) or melter life (e.g., metal formation and accumulation). A production facility such as the Defense Waste Processing Facility (DWPF) cannot wait until the melt or waste glass has been made to assess its acceptability, since by then no further changes to the glass composition and acceptability are possible. therefore, the acceptability decision is made on the upstream process, rather than on the downstream melt or glass product. That is, it is based on 'feed foward' statistical process control (SPC) rather than statistical quality control (SQC). In SPC, the feed composition to the melter is controlled prior to vitrification. Use of the DWPF REDOX model has controlled the balanjce of feed reductants and oxidants in the Sludge Receipt and Adjustment Tank (SRAT). Once the alkali/alkaline earth salts (both reduced and oxidized) are formed during reflux in the SRAT, the REDOX can only change if (1) additional reductants or oxidants are added to the SRAT, the Slurry Mix Evaporator (SME), or the Melter Feed Tank (MFT) or (2) if the melt pool is bubble dwith an oxidizing gas or sparging gas that imposes a different REDOX target than the chemical balance set during reflux in the SRAT.

Jantzen, C.; Johnson, F.

2012-06-05T23:59:59.000Z

32

The same, only different: Threat management systems as homologues in the tree of life  

E-Print Network [OSTI]

T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

Holbrook, Colin; Fessler, Daniel M.T.

2015-01-01T23:59:59.000Z

33

GTRI: Reducing Nuclear Threats | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reducing Nuclear Threats | National Nuclear Security Administration Reducing Nuclear Threats | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > GTRI: Reducing Nuclear Threats Fact Sheet GTRI: Reducing Nuclear Threats Apr 12, 2013 Mission In 2004, NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible,

34

Homicidal Threats  

Science Journals Connector (OSTI)

Every day in the media we hear about death threats. Death threats are often made against individuals, i.e ... e. Death to America. Often these threats are accompanied by shouts, specific gestures,...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

35

Categorizing threat : building and using a generic threat matrix.  

SciTech Connect (OSTI)

The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

2007-09-01T23:59:59.000Z

36

2014 Threats  

Science Journals Connector (OSTI)

......Society Winter 2013 research-article Information Security 2014 Threats Gareth Niblett Gareth Niblett, Chairman of the BCS Information...www.bcs.org/securitycommunity FURTHERINFORMATION 2014 THREATS doi:10.1093/itnow/bwt073 2013 The British Computer......

Gareth Niblett

2013-01-01T23:59:59.000Z

37

Defensive Investments and the Demand for Air Quality: Evidence from the NOx Budget Program and Ozone Reductions  

E-Print Network [OSTI]

Willingness to pay for air quality is a function of health and the costly defensive investments that contribute to health, but there is little research assessing the empirical importance of defensive investments. The setting ...

Deschnes, Olivier

38

Contemporary Terrorist Organizations and the Threat to Michael Walzers Defense of a Supreme Emergency Exemption from Jus in Bello  

E-Print Network [OSTI]

are usually defined as those institutions of government which are put in place to protect the rights of a people in a given territory, and political realism denies the claim that the 6 actions of states are analogous to the actions of persons, and thus.... With this foundation, Walzer then goes on to articulate a defense for each of the categories and proscriptions of the just war framework in relation to this claim. The Bellum Justum has traditionally been divided into two broad areas of concern: Jus ad Bellum...

Ellis, Thomas H.

2010-10-12T23:59:59.000Z

39

Threat Characterization  

Broader source: Energy.gov (indexed) [DOE]

Michalski Michalski SNL Department 5621 Threat Characterization Summary Slide: Threat Characterization Outcomes: Develop a network analysis toolset to allow an analyst to efficiently "crawl" large data sets to discover relevant threat information. Road Map Challenges:"The ability to discover & understand emerging threats and vulnerabilities is a prerequisite to developing effective countermeasures" Major Successes: * Implemented prototype front end crawler and semantic analysis engine (Sandia National Labs). * Transition Development work to the Institute for Complex Additive System Analysis (ICASA) Center (NMTech) * Quarterly threat reports being produced  Schedule: Improvements to both the analyst process and GUI Interface, 4Q 2009; Transition maintenance and development to

40

Cybersecurity Your Best Defense Against  

E-Print Network [OSTI]

Online Corporate Cybersecurity Awareness Program Your Best Defense Against Cybersecurity Threats created a new, cutting edge Cybersecurity Awareness Training program to address these concerns. Our online and intelligence, and leading Fortune 500 information security functions. Center for Cybersecurity Training

Maryland, Baltimore County, University of

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Notices DEPARTMENT OF DEFENSE Defense Acquisition Regulations  

Broader source: Energy.gov (indexed) [DOE]

2 Federal Register 2 Federal Register / Vol. 78, No. 184 / Monday, September 23, 2013 / Notices DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [Docket No. 2011-0052] Submission for OMB Review; Comment Request ACTION: Notice. The Defense Acquisition Regulations System has submitted to OMB for clearance, the following proposal for collection of information under the provisions of the Paperwork Reduction Act (44 U.S.C. chapter 35). DATES: Consideration will be given to all comments received by October 23, 2013. Title, Associated Form, and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS), Part 204 and related clause at 252.204-7012, Safeguarding Unclassified Controlled Technical Information. Type of Request: New collection. Number of Respondents: 6,555.

42

BOMB THREAT CALL PROCEDURES  

E-Print Network [OSTI]

THREAT CALL PROCEDURES BOMB THREAT CHECKLIST Date: Time: Time Caller Phone Number Where Hung Up: Call Received:Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act threat is received by phone: 1. Remain calm. Keep the caller on the line for as long as possible. DO

Guo, Ting

43

Research Article Signaling Threat  

E-Print Network [OSTI]

Research Article Signaling Threat How Situational Cues Affect Women in Math, Science and organization,canmake potentialtargetsvulnerabletosocial identity threat.Objective and subjective measuresofidentity threat were collected from male and female math, science, and engineering (MSE) majors who watched

Gross, James J.

44

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett Gareth...Specialist Group, takes a look at upcoming threats and countermeasures. Follow @bcsbooks...for the user's email account. This threat is not going to recede, so everyone should......

Gareth Niblett

2012-01-01T23:59:59.000Z

45

Vacuoles: a hollow threat?  

E-Print Network [OSTI]

2 EDITORIALS Vacuoles: a hollow threat? Tony L. Yaksh, PhDthat Vacuoles: a hollow threat? provided by procaine anda lesprit : Vacuoles: a hollow threat? Ces vacuoles acides

Yaksh, Tony L.

2010-01-01T23:59:59.000Z

46

Insider Threat Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

2014-06-02T23:59:59.000Z

47

Working to keep us safe: Sara Brambilla, Postdoc creates threat...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to keep us safe: Sara Brambilla, Postdoc creates threat reduction tools Chemical engineer postdoc experiences a foreign culture while working on resources that respond to...

48

Military Expenditure, Threats, and Growth  

E-Print Network [OSTI]

a country's external military threat; lgdp is the log ofMilitary Expenditure, Threats, and Growth * September 2003expenditure, external threats, corruption, and other

Aizenman, Joshua; Glick, Reuven

2003-01-01T23:59:59.000Z

49

BOMB THREAT CALL PROCEDURES  

E-Print Network [OSTI]

BOMB THREAT CALL PROCEDURES WHO TO CONTACT (select one) · Follow your local guidelines · Federal Protective Service (FPS) Police 1-877-4-FPS-411 (1-877-437-7411) · 911 Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain

Boyce, Richard L.

50

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett *Risk...into the future* to see what emerging threats we might have to contend with. doi...into the future* to see what emerging threats we might have to contend with. *Risk......

Gareth Niblett

2012-01-01T23:59:59.000Z

51

Five of the Threats  

Science Journals Connector (OSTI)

......research-article Information Security Five of the Threats Graeme Nash Today, social networking...Here are the top five social networking threats to which organisations may be exposed...probably infected themselves). Whilst the threat from this particular malware has now FIVE......

Graeme Nash

2013-01-01T23:59:59.000Z

52

Combating Future Threats  

Science Journals Connector (OSTI)

......research-article Future Combating Future Threats Andy Clark On 21 September BCS, The Chartered...leadership debate about future security threats. Andy Clark, Head of Forensics at Detica...and where are they? These are different threats. Smartphones are powerful, connected......

Andy Clark

2011-01-01T23:59:59.000Z

53

Systematic Analysis of Defenses against Return-Oriented Programming  

E-Print Network [OSTI]

Since the introduction of return-oriented programming, increasingly complex defenses and subtle attacks that bypass them have been proposed. Unfortunately the lack of a unifying threat model among code reuse security papers ...

Skowyra, Richard

2013-01-01T23:59:59.000Z

54

An Overview of Non-traditional Nuclear Threats  

SciTech Connect (OSTI)

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

55

An Overview of Non-Traditional Nuclear Threats  

SciTech Connect (OSTI)

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or dirty bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders is considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

56

BOMB THREATS What should I know about bomb threats?  

E-Print Network [OSTI]

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal to warn of the threat to minimize personal injuries or property damage. The caller may be the person

Fernandez, Eduardo

57

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS  

E-Print Network [OSTI]

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS: The UK Threat Level is decided by the Government's Joint Terrorism Analysis Centre (JTAC). It is the system to assess the threat to the UK from Threat Levels: Low - an attack is unlikely Moderate - an attack is possible, but not likely Substantial

Edinburgh, University of

58

Bomb threat There are two types of Bomb Threats  

E-Print Network [OSTI]

v Bomb threat There are two types of Bomb Threats: 1. Specific Information/location will be given about the device, or a suspicious item and/or location. Specific Threat - On a landline Dial 6111, state you have received a "SPecific BOmB threat". If possible recall exact wording of threat. 2. Non

Hickman, Mark

59

BOMB THREATS What should I know about bomb threats?  

E-Print Network [OSTI]

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal of the threat to minimize personal injuries or property damage. The caller may be the person placing the bomb

Fernandez, Eduardo

60

BOMB THREATS What should I know about bomb threats?  

E-Print Network [OSTI]

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat · The Hoax Caller and goals for making a bomb threat usually comes from one of two goals: · The Credible Caller: The caller or she wants to warn of the threat to minimize personal injuries or property damage. The caller may

Fernandez, Eduardo

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

COUNTERING MICROBIAL THREATS  

Science Journals Connector (OSTI)

COUNTERING MICROBIAL THREATS ... The highly contagious disease dubbed severe acute respiratory syndrome, first seen in Asia but now diagnosed in several other countries, underscores the report's key point: More must be done to improve the public health and medical communities' ability to prevent, detect, and control emerging and resurging health threats posed by wily microbes. ... Because we all live on the same global microbial real estate, "one nation's problem soon can become every nation's problem," warns Margaret A. Hamburg, cochair of the panel that produced the report, "Microbial Threats to Health: Emergence, Detection & Response." ...

LOIS EMBER

2003-03-24T23:59:59.000Z

62

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

63

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

64

Cyber Threat Trees for Large System Threat Cataloging and Analysis*  

E-Print Network [OSTI]

Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

Thornton, Mitchell

65

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Content: Close Send 0 pages in this document matching the terms "" Search For Terms: Enter terms in the toolbar above to search the full text of this document for pages...

66

Threat Insight Quarterly Wireless Technology  

E-Print Network [OSTI]

X-Force ® Threat Insight Quarterly Wireless Technology April 2006 #12;X - F O R C E T H R E A T I N the Wireless Threat ..................................................3 Wireless Threats-Force Catastrophic Risk Index...................................... 13 Future X-Force Threat Insight Quarterly Topics

67

BIODIVERSITY Geographical linkages between threats  

E-Print Network [OSTI]

BIODIVERSITY RESEARCH Geographical linkages between threats and imperilment in freshwater fish and species declines can be the result of different threats or combinations of threats, such as habitat, deter- mining whether the effects of any specific threat is related to the level of imperilment

Kark, Salit

68

Insider Threat.pptx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mitigating the Insider Threat Mitigating the Insider Threat (and Other Security Issues) Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory http://www.ne.anl.gov/capabilities/vat Argonne National Laboratory ~$738 million annual budget 1500 acres, 3400 employees, 4400 facility users, 1500 students R&D and technical assistance for government & industry Sponsors * DHS * DoD * DOS * IAEA * Euratom * DOE/NNSA * private companies * intelligence agencies * public interest organizations The VAT has done detailed vulnerability assessments on hundreds of different security devices, systems, & programs. Vulnerability Assessment Team (VAT) The greatest of faults, I should say, is to be conscious of none.

69

Defense and nuclear technologies  

SciTech Connect (OSTI)

Fulfilling our national security and stockpile stewardship responsibilities requires tremendous scientific and technical breadth: from esoteric theoretical physics and computational modeling to materials science and precision engineering. Because there exists no broad industrial or university base from which to draw expertise in nuclear weapon science and technology, we rely heavily on formal peer reviews and informal exchanges with our sister laboratory at Los Alamos. LLNL has an important, long-term role in the nation`s nuclear weapons program. We are responsible for four of the ten weapon systems in the enduring US stockpile (three of nine after 2002), including the only systems that incorporate all modern safety features. For years to come, we will be responsible for these weapons and for the problems that will inevitably arise. Our nuclear expertise will also play a crucial role as the US attempts to deal effectively with the threat of nuclear proliferation. This past year brought the culmination of our response to profound changes in the nation`s defense needs as we restructured and refocused our activities to address the Administration`s goal of reducing global nuclear danger. We made major contributions to important national security issues in spite of severe fiscal constraints.

NONE

1995-01-01T23:59:59.000Z

70

BomB ThreaT Assume threat is real  

E-Print Network [OSTI]

Call 911 BomB ThreaT · Assume threat is real · Evacuate area explosion/ Fire · Activate fire alarm or office, do not let the person in · Do not block person's access to an exit · Move away from the threat

Alpay, S. Pamir

71

Threat Analysis Framework | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Threat Analysis Framework The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be...

72

Threat Insight Quarterly Vulnerability Management  

E-Print Network [OSTI]

X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

73

Threat Insight Quarterly Regulatory Compliance  

E-Print Network [OSTI]

X-Force ® Threat Insight Quarterly Regulatory Compliance www.iss.netwww.iss.net October 2006 #12 Risk Index ..............................................11 Future X-Force Threat Insight Quarterly Internet Security Systems X-Force® Threat Insight Quarterly > October 2006 ©2006 Internet Security Systems

74

Threat Insight Quarterly Browser Exploitation  

E-Print Network [OSTI]

X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

75

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats  

Science Journals Connector (OSTI)

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats ...

. U S D A

1954-01-01T23:59:59.000Z

76

A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations  

SciTech Connect (OSTI)

Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

2010-01-01T23:59:59.000Z

77

Threat Characterization: Trajectory Dynamics  

E-Print Network [OSTI]

Given a primary interest in "mitigation of the potential hazard" of near-Earth objects impacting the Earth, the subject of characterization takes on an aspect not normally present when considering asteroids as abstract bodies. Many deflection concepts are interested in the classic geophysical characteristics of asteroids when considering the physical challenge of modifying their orbits in order to cause them to subsequently miss an impact with Earth. Yet for all deflection concepts there are characteristics of the threat which overwhelm these traditional factors. For example, a close gravitational encounter with Earth some years or decades prior to impact can reduce the velocity change necessary for deflection by several orders of magnitude if the deflection precedes the close encounter (or encounters). Conversely this "benefit" comes at a "price"; a corresponding increase in the accuracy of tracking required to determine the probability of impact. Societal issues, both national and international, also characterize the NEO deflection process and these may strongly contend with the purely technical issues normally considered. Therefore critical factors not normally considered must be brought into play as one characterizes the threat of NEO impacts.

Russell Schweickart; Clark Chapman; Dan Durda; Bill Bottke; David Nesvorny; Piet Hut

2006-08-15T23:59:59.000Z

78

Risk Management for Trrorist Threats  

Science Journals Connector (OSTI)

Risk management for Homeland and National Security involves the calculus of funding preventative systems andd procedures based upon potential threat likelihood and consequences. ...

Zimet, Elihu

79

Bio-threat microparticle simulants  

SciTech Connect (OSTI)

A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

Farquar, George Roy; Leif, Roald

2014-09-16T23:59:59.000Z

80

The science, technology, and politics of ballistic missile defense  

SciTech Connect (OSTI)

America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

2014-05-09T23:59:59.000Z

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Impact of force withdrawal on options for conventional defenses  

SciTech Connect (OSTI)

Soviet withdrawal from the Warsaw Treaty Organization (WTO) could open new defensive options. This report gives some background on those options from post-war nuclear and conventional strategies and the quantitative Soviet threat tot he role of firepower, close air support, and battlefield attrition. Withdrawal under the Conventional Forces in Europe (CFE) Treaty could provide a buffer between opposing armies that aggressor armies drop the bridges and disrupt the roads and rails that would have to be used. If forces were brought into battle piecemeal, they would be annihilated. That would permit effective use of advanced and prepositioned weapons, which would favor the defense. 9 refs.

Canavan, G.H.

1991-04-01T23:59:59.000Z

82

IBM Software Data Sheet IBM adaptive threat  

E-Print Network [OSTI]

IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

83

Promises and Threats with Conditionals and Disjunctions  

E-Print Network [OSTI]

Promises and Threats with Conditionals and Disjunctions Robert van Rooij and Michael Franke Version promises and threats. But with a disjunction "You do . . . , or I'll do . . . " we can only make threats is trying to influence the behavior of the hearer by conditional promises and threats: whereas

van Rooij, Robert

84

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

85

Identifying Chemicals That Are Planetary Boundary Threats  

Science Journals Connector (OSTI)

Identifying Chemicals That Are Planetary Boundary Threats ... Our point of departure to develop profiles for chemicals that are potential planetary boundary threats is to identify scenarios in which a chemical could fulfill each of the three conditions for being a planetary boundary threat. ... Note that chemicals named as examples do not necessarily represent planetary boundary threats since at least one scenario from each of the three conditions must be fulfilled for a chemical to pose a planetary boundary threat. ...

Matthew MacLeod; Magnus Breitholtz; Ian T. Cousins; Cynthia A. de Wit; Linn M. Persson; Christina Rudn; Michael S. McLachlan

2014-09-02T23:59:59.000Z

86

Strategic Defense Initiative three reasons to stay the course. Individual study project  

SciTech Connect (OSTI)

President Reagan's Strategic Defense Initiative announced 23 March 1983 has had a profound effect on the shape the world has taken since that time. While there has been much talk that the system as envisioned by the president is impossible, this study examines three compelling reasons why we should continue forward with the research and development effort. The Strategic Defense Initiative has brought the Soviets to the bargaining table and made CFE a reality. The threat of nuclear and chemical proliferation makes the deployment of a defensive system a logical strategy. The cost of developing and deploying the Strategic Defense Initiative may not be as high as the critics propose if we can use SDI as the third leg of our strategic deterrent. The American people and the people of the rest of the world deserve better than living with the threat of extinction.

Bleeker, H.J.

1990-02-12T23:59:59.000Z

87

Chinese Workers: Under Threat or a Threat to American Workers?  

E-Print Network [OSTI]

. At the same time, some employers have found ways to avoid following the spirit, if not the letter of the laws. The consequences for American workers are unclear, since their challenges are less about a direct threat from Chinese workers and more about...

Harper Ho, Virginia E.; Zhang, Lu

2010-07-01T23:59:59.000Z

88

Managing America's Defense Nuclear Waste | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Managing America's Defense Nuclear Waste Managing America's Defense Nuclear Waste Managing America's Defense Nuclear Waste More Documents & Publications National Defense...

89

Department of Defense Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Department of Defense Programs Department of Defense Programs SHARE Department of Defense Programs image The Department of Defense Programs address the specifics challenges of the defense sector and have the widest application of ORNL capabilities. We support the military in a number of areas, including chem/bio defense and early warning; logistics and transportation management; hardened and other special materials; tagging, tracking, and locating; sensor miniaturization and communication; information management, synthesis and analysis; climate change modeling applications; structural amorphous materials for wear-resistant coatings; standoff acoustic laser detection system for detection of explosives; biometrics; cognitive radio systems; and power and energy applications for both mobile power and infrastructure requirements.

90

Electronic publishing: strengths, weaknesses and threats  

Science Journals Connector (OSTI)

...April 1998 news News Electronic publishing: strengths, weaknesses and threats Derek McNally Treasurer of the RAS 2.7 April 1998 Vol 39 NEWS Both Monthly...Treasurer of the RAS. Electronic publishing: strengths, weaknesses and threats...

Derek McNally

1998-04-01T23:59:59.000Z

91

Vetting Threats To Safe Drug Supplies  

Science Journals Connector (OSTI)

Vetting Threats To Safe Drug Supplies ... Representatives from government, drug companies, and national and international law enforcement agencies struggled to characterize what all agree is a large, growing, and frustratingly nebulous threat to public health and safety. ...

RICK MULLIN

2012-04-01T23:59:59.000Z

92

Nuclear Radiological Threat Task Force Established | National...  

National Nuclear Security Administration (NNSA)

Radiological Threat Task Force Established | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

93

Physical Degradation of Soils, Risks and Threats  

Science Journals Connector (OSTI)

Physical soil degradation...is one of the eight main risks and threats defined by the European Thematic Strategy for...

Winfried E. H. Blum

2014-08-01T23:59:59.000Z

94

nuclear threat science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

threat science | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

95

Responding to WMD Terrorism Threats: The Role of Insurance Markets  

E-Print Network [OSTI]

the Biological Weapons and Bioterrorism Threat SSI http://Responding to WMD Terrorism Threats: The Role of InsuranceNeed for Comprehensive Threat and Risk Assessments of

Jaffee, Dwight M.; Russell, Thomas

2007-01-01T23:59:59.000Z

96

A Risk Management Approach to the 'Insider Threat'  

E-Print Network [OSTI]

Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Paci?c Northwestbased model for analyzing threats that include those usually

2010-01-01T23:59:59.000Z

97

BOMB THREAT CHECKLIST QUESTIONS TO ASK  

E-Print Network [OSTI]

BOMB THREAT CHECKLIST QUESTIONS TO ASK: 1. When is the bomb going to explode? 2. Where is it right ___Clearing Throat ___Laughter ___Deep Breathing __Crying ___Cracking voice __Normal ___Disguised THREAT __Foul ___Taped __Message read by threat maker __Irrational If voice is familiar, who did it sound like

Cui, Yan

98

REVIEW/SYNTHSE Threat display in birds  

E-Print Network [OSTI]

REVIEW/SYNTH?SE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

Hurd, Peter L.

99

Unauthorized Collaboration on Facebook: Threats and Responses  

E-Print Network [OSTI]

Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered a threat to academic integrity that might be flying under the radar of most instructors. This resource can help you understand and respond to this threat, while providing positive forums for student interaction

McQuade, D. Tyler

100

Survey on Security Threats and Protection Mechanisms  

E-Print Network [OSTI]

Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Ivan Studnia1 and can be seen as entry points for cyber attacks. In this paper, we present a survey on security threats in the embedded networks of current vehicles, we then analyze the potential threats targeting these networks

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Developmental Changes in Responsivity to Threat are  

E-Print Network [OSTI]

Developmental Changes in Responsivity to Threat are Stimulus-Specific in Rats Christoph P 2000 ABSTRACT: During early ontogeny, stimuli that pose a threat to an animal change. Unrelated adult a threat only during a limited period of development, when the animal's particular developmental stage

Barr, Gordon A.

102

Neural Mechanisms Underlying Selective Attention to Threat  

E-Print Network [OSTI]

Neural Mechanisms Underlying Selective Attention to Threat SONIA J. BISHOP Behavioural and Clinical. This provides a framework for inves- tigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal

Bishop, Sonia

103

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors  

E-Print Network [OSTI]

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

Mather, Mara

104

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act  

E-Print Network [OSTI]

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain information with the checklist on this card. BOMB THREAT CALL PROCEDURE If a bomb threat is received by phone: Remain calm. Keep the caller on the line for as long

Slatton, Clint

105

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection  

E-Print Network [OSTI]

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection the perception of threat. We here re- port that the neural circuitry known to be mobilized by many realistic instantiating detection of threat and negative affect, suggesting that recognition of potential danger may

Sarinopoulos, Issidoros

106

Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space  

E-Print Network [OSTI]

1 Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space Ming Luo, Sam and a threat space was extrapolated based on the 6 April 2000 ionospheric storm. It was showed that the impact of the ionospheric anomalies depends on the threat parameters, namely, the ionospheric gradient, the slope width

Stanford University

107

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS  

E-Print Network [OSTI]

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS Do Achievement Goals Mediate Stereotype Threat? An Investigation on Females' Soccer Performance Aïna Chalabaev Psycholoy 30 (2008) 143-158" #12;Stereotype threat in sports 2 Abstract This research investigated

Paris-Sud XI, Université de

108

Nest Defense Behaviors of Native Cavity-Nesting Birds to European Starlings1  

E-Print Network [OSTI]

457 Nest Defense Behaviors of Native Cavity- Nesting Birds to European Starlings1 Rodney G. Olsen,2 for nest sites and the extent to which European Starlings (Sturnus vulgaris) are seen as a threat by native of aggressive behavior of four species of native cavity-nesting birds to starlings at active nests in trees

Standiford, Richard B.

109

Toward a defense-dominated world  

SciTech Connect (OSTI)

Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

Wood, L.

1993-08-01T23:59:59.000Z

110

A threat-based definition of IA and IA-enabled products.  

SciTech Connect (OSTI)

This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

2010-09-01T23:59:59.000Z

111

A threat-based definition of IA- and IA-enabled products.  

SciTech Connect (OSTI)

This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

2010-07-01T23:59:59.000Z

112

Threats and human influence on coastal ecosystem of Southern India  

Science Journals Connector (OSTI)

Populations of the majority of fish species showed drastic reduction over the past five decades in west coast of India. We conducted an intensive study of Aghanashini estuary for water quality and fish diversity in west coast of India. Coastal ecosystems are impacted by many stressors and are continually subjected to threats from multiple stresses imposed mostly by human activities predominantly as a result of increased population growth in India. The most significant categories of threats derive from water pollution from numerous sources including thermal effluents, heavy metals, oil, sewage, pesticides, pulp mills, habitat loss and degradation, overexploitation, eutrophication and misguided human perceptions. Wide array of prohibited fishing methods are rampant by using of insecticides as poisons, destruction and modification of habitats, dynamiting, using chemical and herbal poisons. Due to deteriorated water, quality from anthropogenic activities fish diversity has drastically reduced. In complex coastal ecosystems, strategies for restoration can become equally complicated.

D. Sannadurgappa

2010-01-01T23:59:59.000Z

113

Sensor-guided threat countermeasure system  

DOE Patents [OSTI]

A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

2012-12-25T23:59:59.000Z

114

Countering the Nuclear Terrorist Threat  

SciTech Connect (OSTI)

The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction.

Vantine, H C

2002-10-04T23:59:59.000Z

115

Autonomous Realtime Threat-Hunting Robot (ARTHR  

SciTech Connect (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2008-05-29T23:59:59.000Z

116

Autonomous Realtime Threat-Hunting Robot (ARTHR  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2009-09-01T23:59:59.000Z

117

design basis threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

design basis threat | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

118

CHEMICAL TERRORISM: THREATS TO WATER SUPPLIES  

Science Journals Connector (OSTI)

Although for practical reasons, terrorist attacks on water systems are considered less likely than on other targets, threats to drinking water cannot be ignored. A...

ALFRED BERNARD; CLAIRE DE BURBURE

2006-01-01T23:59:59.000Z

119

Addressing the cybersecurity Malicious Insider threat.  

E-Print Network [OSTI]

?? Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's (more)

Schluderberg, Larry E.

2015-01-01T23:59:59.000Z

120

Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear  

National Nuclear Security Administration (NNSA)

Congressional Testimony > Statement of Anne M. Congressional Testimony > Statement of Anne M. Harrington, Deputy Administrator ... Congressional Testimony Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear Nonproliferation to the Senate Armed Services Sub Committee On Emerging Threats and Capabilities May 10, 2011 Chairwoman Hagan, Ranking Member Portman, thank you for the opportunity to join you today to discuss the investments the President has requested for the National Nuclear Security Administration's Defense Nuclear Nonproliferation programs. But more importantly, thank you for your continued support of the National Nuclear Security Administration, and the 35,000 men and women working across the enterprise to keep our country safe, protect our allies, and enhance global security. We could not do

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear  

National Nuclear Security Administration (NNSA)

Speeches > Statement of Anne M. Harrington, Deputy Speeches > Statement of Anne M. Harrington, Deputy Administrator ... Speech Statement of Anne M. Harrington, Deputy Administrator for Defense Nuclear Nonproliferation to the Senate Armed Services Sub Committee On Emerging Threats and Capabilities May 10, 2011 Chairwoman Hagan, Ranking Member Portman, thank you for the opportunity to join you today to discuss the investments the President has requested for the National Nuclear Security Administration's Defense Nuclear Nonproliferation programs. But more importantly, thank you for your continued support of the National Nuclear Security Administration, and the 35,000 men and women working across the enterprise to keep our country safe, protect our allies, and enhance global security. We could not do this work without strong, bipartisan support and engaged leadership from

122

The Nature of the Bioterrorism Threat  

SciTech Connect (OSTI)

This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

Regens, J. L.

2003-02-25T23:59:59.000Z

123

Notices DEPARTMENT OF DEFENSE  

Broader source: Energy.gov (indexed) [DOE]

011 Federal Register 011 Federal Register / Vol. 78, No. 186 / Wednesday, September 25, 2013 / Notices DEPARTMENT OF DEFENSE Department of the Army Information on Surplus Land at a Military Installation Designated for Disposal: Ernest Veuve Hall USARC/ AMSA 75, T-25, Fort Missoula, Montana AGENCY: Department of the Army, DoD. ACTION: Notice. SUMMARY: This amended notice provides information on withdrawal of surplus property at the Ernest Veuve Hall USARC/AMSA 75, T-25, Fort Missoula, Montana. This notice amends the Notice published in the Federal Register on May 9, 2006 (71 FR 26930). DATES: Effective September 10, 2013 FOR FURTHER INFORMATION CONTACT: Headquarters, Department of the Army, Assistant Chief of Staff for Installation Management, Base Realignment and Closure (BRAC) Division, Attn: DAIM-

124

Notices DEPARTMENT OF DEFENSE  

Broader source: Energy.gov (indexed) [DOE]

2 Federal Register 2 Federal Register / Vol. 76, No. 217 / Wednesday, November 9, 2011 / Notices DEPARTMENT OF DEFENSE Department of the Air Force U.S. Air Force Scientific Advisory Board; Notice of Meeting AGENCY: Department of the Air Force, U.S. Air Force Scientific Advisory Board. ACTION: Meeting notice. SUMMARY: Due to difficulties, beyond the control of the U.S. Air Force Scientific Advisory Board (SAB) or its Designated Federal Officer, the Board must meet no later than November 2, 2011 to deliberate on recent events impacting upon one of the Board's current tasks from the Secretary of the Air Force. Since the Department of the Air Force is unable to file a Federal Register notice announcing the meeting within the 15-calendar day period the Advisory Committee Management Officer for the

125

Design Basis Threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Design Basis Threat | National Nuclear Security Administration Design Basis Threat | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Design Basis Threat Home > About Us > Our Programs > Nuclear Security > Design Basis Threat Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM)

126

Chapter 11 - Computer Network Defense  

Science Journals Connector (OSTI)

Abstract Computer Network Defense is the defensive and largely proactive component of Computer Network Operations, and is one of the few places where military and civilian approaches are similar. But how does Computer Network Defense fit into the category of defensive actions? To answer this question, one must understand what is being defended. This chapter explains what type of information should be protected from cyber attacks and highlights the key principles of securitynamely, the CIA triad of confidentiality, integrity, and availability, and AAA which covers authentication, authorization, and auditing. Of course, no attempt at defending information assets is complete if users security mindset is weak, so this chapter also discusses security awareness and the types of training available today, along with strategies for defending against attacks, such as surveillance tactics, data mining, pattern matching, intrusion detection and prevention, vulnerability assessment and penetration testing, disaster recovery planning, and defense in depth.

Jason Andress; Steve Winterfeld

2014-01-01T23:59:59.000Z

127

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and  

E-Print Network [OSTI]

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

Sen, Sevil

128

Independent Activity Report, Defense Nuclear Facilities Safety...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October...

129

Sandia National Laboratories: Defense Waste Management Programs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Programs provides scientific analyses and programmatic advice to the U.S. Department of Energy in support of defense waste management challenges. Defense waste encompasses...

130

The future of defense and technology  

SciTech Connect (OSTI)

This document provides an insight into the future of national defense and the impacts of utilizing technology for improved defensive postures. (FI)

Teller, E.

1991-01-10T23:59:59.000Z

131

The Law of Duress and the Economics of Credible Threats  

E-Print Network [OSTI]

seller has a credible threat, it is in the buyers interestand the more credible is the threat to breach it. C.existence of a credible threat, may be difficult to verify.

Bar-Gill, Oren; Ben-Shahar, Omri

2003-01-01T23:59:59.000Z

132

An Intelligent Threat Prevention Framework with Heterogeneous Information  

E-Print Network [OSTI]

An Intelligent Threat Prevention Framework with Heterogeneous Information Wenjun Ma 1 and Weiru Liu 1 Abstract. Three issues usually are associated with threat prevention intelligent surveillance, the de- mand of effectively predicting suspects' intention and ranking the potential threats posed

Liu, Weiru

133

Now or Later?--Endogenous Timing of Threats  

Science Journals Connector (OSTI)

Whereas early threats are chosen before bargaining, late threats are determined after bargaining ended in conflict. Instead of exogenously imposing the timing of threats, these are derived endogenously as in indi...

Siegfried K. Berninghaus; Werner Guth

2003-11-01T23:59:59.000Z

134

PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY  

E-Print Network [OSTI]

Page 1 PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY Policy, and prohibits the use of University Electronic Resources for threats, harassment, and pornography. Reason threats, engaging in harassing behavior, and viewing, downloading, or communicating pornography. Table

Shahriar, Selim

135

Insider threat to secure facilities: data analysis  

SciTech Connect (OSTI)

Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

Not Available

1980-05-09T23:59:59.000Z

136

Death Threats and Violence at Schools and Colleges  

Science Journals Connector (OSTI)

This chapter examines the nature of death threats and other violence against schools and universities. Death threats and violence against schools and universities reflect...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

137

Comprehensive Vulnerability and Threat Analysis | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Vulnerability and Threat Analysis Our world is characterized by ever-changing threats to critical facilities, national assets and international interests. Understanding...

138

Seeking out silent threats to simulation integrity | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Seeking out silent threats to simulation integrity Seeking out silent threats to simulation integrity Controlling the impact of soft errors on optimization algorithm results NULL A...

139

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

140

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2010-01-08T23:59:59.000Z

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

SciTech Connect (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2008-05-29T23:59:59.000Z

142

Source prestige and target reactions to threats  

Science Journals Connector (OSTI)

A 3 by 2 design was employed to study the effects of source capability and of punishment magnitude on the compliance of target individuals to contingent threats intermittently sent by a simulated source in...

Thomas V. Bonoma; Barry R. Schlenker; R. Bob Smith

1970-08-01T23:59:59.000Z

143

Non-Military Threats to the Alliance  

Science Journals Connector (OSTI)

I have been given the opportunity to say a few words on what could become a dialogue between the EU and the U.S. concerning the rather difficult questions of non-military threats, also called global or transnatio...

Eric Danon

2000-01-01T23:59:59.000Z

144

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

145

A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques  

E-Print Network [OSTI]

Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEWA systems cannot provide optimality because of different limitations e.g.surface to air missile (SAM) can fire from a distance of 5Km, but manual TEWA systems are constrained by human vision range and other constraints. Current TEWA systems usually work on target-by-target basis using some type of greedy algorithm thus affecting the optimality of the solution and failing in multi-target scenario. his paper relates to a novel two-staged flexible dynamic decision support based optimal threat evaluation and weapon assignment...

Naeem, Huma; Hussain, Mukhtar; Khan, Shoab A

2009-01-01T23:59:59.000Z

146

SUSTAINABILITY REPORTING NATURAL RESOURCES DEFENSE  

E-Print Network [OSTI]

SUSTAINABILITY REPORTING AND THE NATURAL RESOURCES DEFENSE COUNCIL AUGUST 2012 Capstone Team RELEVANCE/CONTEXT 4 HISTORY OF SUSTAINABILITY REPORTING 4 ORGANIZATIONAL PROFILE 7 METHODOLOGY 8 FINDINGS AND DISCUSSION 11 FINDINGS FROM INTERVIEWS 11 SUSTAINABILITY FRAMEWORK ASSESSMENT 12

Qian, Ning

147

E-Print Network 3.0 - agency dtra location Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Defense (DOD) Research Funding Summary: Administration) defensewide techno innovation oriented (6.1 - 6.3) DTRA (Defense Threat Reduction Agency... . Funding for basic...

148

Survey of Threats and Assaults by Patients on Psychiatry Residents  

Science Journals Connector (OSTI)

The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents,...

Yael Dvir M.D.; Emiko Moniwa M.D.; Holly Crisp-Han M.D.

2012-01-01T23:59:59.000Z

149

Invited Paper New Frontiers of Network Security: The Threat Within  

E-Print Network [OSTI]

Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

Sanyal, Sugata

150

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007  

E-Print Network [OSTI]

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007 FUTURE THREATS John.maurushat@unsw.edu.au ABSTRACT `Aren't you just giving the virus writers ideas?' Research into future security threats begin to examine how far security research can go in terms of looking at future threats, particularly

Aycock, John

151

An Approach to Security Policy Configuration Using Semantic Threat Graphs  

E-Print Network [OSTI]

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley, in turn, unnecessarily expose the enterprise to known threats. This paper pro- poses a threat management- nomic configuration of security mechanisms. This knowledge is mod- eled in terms of Semantic Threat

Foley, Simon

152

Secretary Chu Visits Russian Seaport, Checks Out Second Line of Defense  

Broader source: Energy.gov (indexed) [DOE]

Russian Seaport, Checks Out Second Line of Russian Seaport, Checks Out Second Line of Defense Nuclear Detection System Secretary Chu Visits Russian Seaport, Checks Out Second Line of Defense Nuclear Detection System June 7, 2011 - 8:59am Addthis John Gerrard What does this mean for me? The Second Line of Defense program cracks down on nuclear smuggling by installing radiation detection equipment at ports, border crossings and airports around the world. We've all seen the movies where errant nuclear material makes its way into the hands of terrorists, who then plan an attack on U.S. soil. It's pretty safe to say that this is a scenario no one wants to see play out in real life. In fact, in his first foreign policy speech, President Obama called it the "most immediate and extreme threat to global security."

153

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, older adults' memory  

E-Print Network [OSTI]

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, and Rico Velasco for research assistance and to Dr. Tom Hess for providing us with the stereotype threat for publication. #12;STEREOTYPE THREAT IN OLDER ADULTS 2 Abstract (150) Negative stereotypes about aging can

Mather, Mara

154

Japans Defense White Paper as a Toolfor Promoting Defense Transparency  

E-Print Network [OSTI]

the official lines of Japans defense policy. Furthermore,Brief 2012-2 March 2012 Japans Defense White Paper as apolicy brief explains how Japan produces its annual defense

SUKEGAWA, Yasushi

2012-01-01T23:59:59.000Z

155

Left-Wing Extremism: The Current Threat  

SciTech Connect (OSTI)

Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

Karl A. Seger

2001-04-30T23:59:59.000Z

156

Environmental Defense Fund | Open Energy Information  

Open Energy Info (EERE)

Defense Fund Defense Fund Jump to: navigation, search Name Environmental Defense Fund Place New York, New York Zip 10010 Product Environmental Defense is a leading national nonprofit organization representing more than 500,000 members. Environmental Defense is dedicated to protecting the environmental rights of all people, including future generations. References Environmental Defense Fund[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Environmental Defense Fund is a company located in New York, New York . References ↑ "Environmental Defense Fund" Retrieved from "http://en.openei.org/w/index.php?title=Environmental_Defense_Fund&oldid=345028" Categories:

157

Mobile Malware Attacks and Defense  

Science Journals Connector (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

158

Doctoral Defense "Sustainable Wastewater Management  

E-Print Network [OSTI]

Doctoral Defense "Sustainable Wastewater Management: Modeling and Decision Strategies for Unused Medications and Wastewater Solids" Sherri Cook Date: May 22, 2014 Time: 11:00 AM Location: 2355 GGB Chair to help decision-makers evaluate new practices for sustainable wastewater management. To this end

Kamat, Vineet R.

159

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network [OSTI]

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

160

Bomb threats hit Texas petrochemical plants  

Science Journals Connector (OSTI)

A recent rash of bomb threats has plagued petrochemical plants and refineries in the Houston area.No real bombs have been found. But plant managers are concerned that if law enforcement officials do not soon find those involved and discourage others, ...

ANN THAYER

1996-04-29T23:59:59.000Z

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

162

5th Defense Renewable Energy Summit  

Office of Energy Efficiency and Renewable Energy (EERE)

The 5th Defense Renewable Energy Summit brings together U.S. Department of Defense (DOD) and military decision-makers with renewable energy developers, utilities, and leading financiers to...

163

March 23, 1983: Strategic Defense Initiative (SDI)  

Broader source: Energy.gov [DOE]

March 23, 1983President Reagan addresses the nation on national security and announces the Strategic Defense Initiative (SDI), a satellite-based defense system that would destroy incoming missiles...

164

A Dynamic Defense Force for Japan  

E-Print Network [OSTI]

A Dynamic Defense Force for Japan Sugio TAKAHASHI SUMMARY AGuidelines released by Japan in 2010, the most important isconcept, which will enable the Japan Self-Defense Forces to

TAKAHASHI, Sugio

2012-01-01T23:59:59.000Z

165

Boeing Defense, Space & Security 5301 Bolsa Avenue  

E-Print Network [OSTI]

Biography Boeing Defense, Space & Security 5301 Bolsa Avenue Huntington Beach, CA 92647 www.boeing.com Daryl G. Pelc Vice President Engineering & Technology Phantom Works Boeing Defense, Space & Security of Boeing Defense, Space & Security (BDS). In this position, Daryl is responsible for leading

El Zarki, Magda

166

Introduction to Administrative Programs that Mitigate the Insider Threat  

SciTech Connect (OSTI)

This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

2012-09-01T23:59:59.000Z

167

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

168

Environment-Driven Threats Elicitation for Web Applications  

Science Journals Connector (OSTI)

The popularity and complexity of web application present challenges to the security implementation for web engineering. Threat elicitation is an indispensable step for developers to identify the possible threats ...

Hui Guan; Weiru Chen; Lin Liu; Hongji Yang

2011-01-01T23:59:59.000Z

169

Classification of Threats Via a Multi-sensor Security Portal  

Science Journals Connector (OSTI)

Classification of threats has always been a major security decision ... walks through a security portal. To classify threat by combining data from multiple sensors like ... metal detectors. We wish to identify th...

Amar Singh; Lawrence Holder

2006-01-01T23:59:59.000Z

170

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats)  

Science Journals Connector (OSTI)

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats) ... An overall goal of environmental metabolomics is to understand what is metabolomically normal or adaptive and what constitutes a threat to human health and the environment. ...

Marion G. Miller

2007-01-04T23:59:59.000Z

171

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

172

Securing Infrastructure from High Explosive Threats  

SciTech Connect (OSTI)

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

173

Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions  

E-Print Network [OSTI]

and social identity threat. Advances in Experimental Socialmen triggers social identity threat among female engineers.C. (2007). Stereotype threat at work. Academy of Management

Kray, Laura J.; Shirako, Aiwa

2009-01-01T23:59:59.000Z

174

Rethinking the Threats to Scientific Balance in Contexts of Litigation and Regulation  

E-Print Network [OSTI]

Monograph Rethinking the Threats to Scienti?c Balance inc factors such as threats or dollars. Environmental Healthwatched for/resisted Threats; overt pressure to slant ?

Freudenburg, William R.

2008-01-01T23:59:59.000Z

175

Mobility changes anonymity: new passive threats in mobile ad hoc networks  

E-Print Network [OSTI]

Anonymity: New Passive Threats in Mobile Ad Hoc Networkson new anonymity threats and classify the correspondingagainst the new anonymity threats in mobile networks. The

Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario

2006-01-01T23:59:59.000Z

176

Confronting Ego Threats with Reappraisal versus Rumination  

E-Print Network [OSTI]

of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Brandon Schmeichel Committee Members, Eddie Harmon-Jones Jeffrey Ackerman Head of Department, Les Morey May 2009 Major Subject: Psychology iii ABSTRACT... Confronting Ego Threats with Reappraisal versus Rumination. (May 2009) Ryan Caskey, B.A., University of Arizona Chair of Advisory Committee: Dr. Brandon Schmeichel Two experiments compared the effects of two cognitive responses (i.e., rumination...

Caskey, Ryan

2010-01-16T23:59:59.000Z

177

Nonproliferation, Nuclear Security, and the Insider Threat  

SciTech Connect (OSTI)

Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

2012-07-12T23:59:59.000Z

178

Handsets Malware Threats and Facing Techniques  

E-Print Network [OSTI]

Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

Elfattah, Marwa M A; Sarhan, Ebada

2012-01-01T23:59:59.000Z

179

The multi-sensor nuclear threat detection Dorit S. Hochbaum  

E-Print Network [OSTI]

an efficient graph algorithm that solves the problem in polynomial time. Detecting nuclear threatsThe multi-sensor nuclear threat detection problem Dorit S. Hochbaum Abstract One way of reducing sources. We address here the problem of detecting nuclear threats by using multiple detectors mounted

Hochbaum, Dorit S.

180

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1  

E-Print Network [OSTI]

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

Gupta, Kalyan Moy

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Insider Threat Detection using Stream Mining and Graph Mining  

E-Print Network [OSTI]

Insider Threat Detection using Stream Mining and Graph Mining Pallabi Parveen, Jonathan Evans threats who attempt to conceal their activities by varying their behaviors over time. This paper applies of insider threat detection, demonstrating that the ensemble-based approach is significantly more effective

Hamlen, Kevin W.

182

Mitigating the Risk of Insider Threats When Sharing  

E-Print Network [OSTI]

Mitigating the Risk of Insider Threats When Sharing Credentials by Muntaha NourEddin Qasem Alawneh requirement. Achieving secure content sharing requires a deep analy- sis and understanding of security threats affecting such a fundamental requirement. We study and analyze one of the major threats which affect secure

Sheldon, Nathan D.

183

European Commission DG ENV Soil biodiversity: functions, threats and  

E-Print Network [OSTI]

European Commission DG ENV Soil biodiversity: functions, threats and tools for policy makers.turbe@biois.com In association with #12;2 European Commission - DG ENV Soil biodiversity: functions, threats and tools for policy Putten, Eric Labouze, and Shailendra Mudgal. Soil biodiversity: functions, threats and tools for policy

Paris-Sud XI, Université de

184

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network [OSTI]

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

185

Rapid evolutionary dynamics and disease threats to biodiversity  

E-Print Network [OSTI]

Rapid evolutionary dynamics and disease threats to biodiversity Sonia Altizer1 , Drew Harvell2 should enable hosts to respond better to future disease threats. Infectious diseases are recognized populations, or have been implicated as threats to already declining species [4­6]. Although infectious

186

Decentralized Semantic Threat Graphs Simon N. Foley1  

E-Print Network [OSTI]

Decentralized Semantic Threat Graphs Simon N. Foley1 William M. Fitzgerald1 Cork Constraint.foley@cs.ucc.ie wfitzgerald@4c.ucc.ie Abstract. Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume

Foley, Simon

187

Maritime Threat Detection using Plan Recognition Bryan Auslander1  

E-Print Network [OSTI]

Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

Gupta, Kalyan Moy

188

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE  

E-Print Network [OSTI]

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE QUESTIONS TO ASK: 1. When is the bomb going? EXACT WORDING OF THE THREAT: Sex of caller: Race: Age: Number at which call received: Length of call: Check Caller ID - *69: Record caller's number: Time: Date: IMMEDIATELY REPORT BOMB THREATS TO

Slatton, Clint

189

FACTS about threat Possible INTERVENTIONS Strong domain identification  

E-Print Network [OSTI]

FACTS about threat Possible INTERVENTIONS Strong domain identification heightens the effect are able to self affirm in difficult situations can lessen the effects of threat. Encourage students to use to students not under threat. Educate students on self talk! Teach them to pay close attention

Chisholm, Rex L.

190

Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations  

E-Print Network [OSTI]

1 Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations Ming Luo, Sam Pullen-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data from the 6 April 2000 ionospheric storm. User vertical error was estimated based on this threat model

Stanford University

191

Predictors of Threat and Error Management: Identification of Core  

E-Print Network [OSTI]

Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

192

Not All Threats are Created Equal: How Implicitness and Timing Affect the Effectiveness of Threats in Negotiations  

Science Journals Connector (OSTI)

The effectiveness of threats in negotiations was examined by exploring two ... implicitness, or the extent to which the threat mentions what action the perpetrator would take ... and timing, or the time when the

Marwan Sinaceur; Margaret A. Neale

2005-01-01T23:59:59.000Z

193

Economics of Defense in a Globalized World  

E-Print Network [OSTI]

Kahn, H. (1959), On Thermonuclear War (Princeton Universityless grave than thermonuclear annihilation. That is, anfrom the threat of thermonuclear war deserves emphasis. Even

MCGUIRE, MARTIN C

2006-01-01T23:59:59.000Z

194

Defense Programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

materials and weapons between facilities and military locations. NNSA also strives to conduct operations in ways that are safe for the environment and the public. As threats...

195

Office of Nuclear Threat Science | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Threat Science | National Nuclear Security Administration Nuclear Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

196

Office of Nuclear Threat Science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Threat Science | National Nuclear Security Administration Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

197

Defense Nuclear Facilities Safety Board's enabling legislation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ENABLING STATUTE OF THE ENABLING STATUTE OF THE DEFENSE NUCLEAR FACILITIES SAFETY BOARD 42 U.S.C. § 2286 et seq. NATIONAL DEFENSE AUTHORIZATION ACT, FISCAL YEAR 1989 (Pub. L. No. 100-456, September 29, 1988), AS AMENDED BY NATIONAL DEFENSE AUTHORIZATION ACT, FISCAL YEAR 1991 (Pub. L. No. 101-510, November 5, 1990), NATIONAL DEFENSE AUTHORIZATION ACT FISCAL YEARS 1992 AND 1993 (Pub. L. No. 102-190, December 5, 1991), ENERGY POLICY ACT OF 1992 (Pub. L. No. 102-486, October 24, 1992), NATIONAL DEFENSE AUTHORIZATION ACT FISCAL YEAR 1994 (Pub. L. No. 103-160, November 30, 1993), FEDERAL REPORTS ELIMINATION ACT OF 1998 (Pub. L. No. 105-362, November 10, 1998), NATIONAL DEFENSE AUTHORIZATION ACT FISCAL YEAR 2001 (Pub. L. No. 106-398, October 30, 2000), AND

198

September 2013 Most Viewed Documents for National Defense | OSTI, US Dept  

Office of Scientific and Technical Information (OSTI)

September 2013 Most Viewed Documents for National Defense September 2013 Most Viewed Documents for National Defense SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 34 Left-Wing Extremism: The Current Threat Karl A. Seger (2001) 28 The Elusive Coefficients of Thermal Expansion in PBX 9502 C.B. Skidmore; T.A. Butler; C.W. Sandoval (2003) 28 Background chemistry for chemical warfare agents and decontamination processes in support of delisting waste streams at the U.S. Army Dugway Proving Ground, Utah Rosenblatt, D.H.; Small, M.J.; Kimmell, T.A.; Anderson, A.W. (1996) 27 MineSeis -- A MATLAB{reg_sign} GUI program to calculate synthetic seismograms from a linear, multi-shot blast source model Yang, X. (1998) 26 Comments on TNT Equivalence

199

Natural Resources Defense Council Ex Parte Communication  

Broader source: Energy.gov [DOE]

On Tuesday, November 18, 2014, a representative of the Natural Resources Defense Council held a conference call with representatives of the Department of Energy, the Environmental Protection Agency...

200

Foundations of a defense digital platform : business systems governance in the Department of Defense  

E-Print Network [OSTI]

In 2010, the United States Department of Defense (DoD) spent more than $35 billion on information systems development and sustainment, with nearly $7 billion to defense business systems investments alone. It is not surprising ...

Ziegler, Dustin P

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Recommended Practice: Defense-in-Depth  

Broader source: Energy.gov (indexed) [DOE]

Report # INL/EXT-06-11478 Report # INL/EXT-06-11478 Control Systems Cyber Security: Defense in Depth Strategies May 2006 Prepared by Idaho National Laboratory Recommended Best Practice: Defense in Depth 2 Table of Contents Keywords............................................................................................................................. 3 Introduction......................................................................................................................... 3 Background ......................................................................................................................... 3 Overview of Contemporary Control System Architectures................................................. 4 Security Challenges in Control Systems .............................................................................

202

Summary-Invisible Networking: Techniques and Defenses  

E-Print Network [OSTI]

Summary-Invisible Networking: Techniques and Defenses Lei Wei, Michael K. Reiter, and Ketan Mayer explored. We investigate the combination of these ideas, which we term Summary-Invisible Networking (SIN #12;Summary-Invisible Networking: Techniques and Defenses 211 community of security analysts now holds

Reiter, Michael

203

Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon  

E-Print Network [OSTI]

biological, and chemical weapons of warfare and terrorism.Threat and Unconventional Weapon Robert Jones, MD Brandonand as a terrorist weapon. This review will summarize recent

Jones, Robert; Wills, Brandon; Kang, Christopher

2010-01-01T23:59:59.000Z

204

COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MBG Auditorium COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear Weapons Dr. Alan Robock Rutgers University A nuclear war between India and Pakistan, with...

205

Mitigating the Insider Threat Using Behavioral Science Workshop  

SciTech Connect (OSTI)

PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

Landers, John; De Castro, Kara

2012-11-26T23:59:59.000Z

206

ORISE: Securing the Golden State from threats foreign and domestic  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

207

OFFICE OF THE UNDER SECRETARY OF DEFENSE  

Broader source: Energy.gov (indexed) [DOE]

UNDER SECRETARY OF DEFENSE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301 -3000 ACQUISITION TECHNOLOGY AND LOGISTICS MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND TECHNOLOGY) ASSISTANT SECRETARY OF THE NAVY (RESEARCH, DEVELOPMENT AND ACQUISITION) ASSISTANT SECRETARY OF THE AIR FORCE (ACQUISITION) DIRECTORS OF DEFENSE AGENCIES SUBJECT: Use of Federal Supply Schedules and Market Research The Department of Defense utilizes the Federal Supply Schedules of the General Services Administration to meet a significant number of our requirements. The "Use of Federal Supply Schedules" is governed by the requirements in FAR 8.404. FAR 8.404 says in part, "by placing an order against a schedule contract using the procedures in FAR

208

Threats from space: 20 years of progress  

E-Print Network [OSTI]

It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

Remo, J L

2014-01-01T23:59:59.000Z

209

Y-12 Successfully Meets and Exceeds Defense Programs Goals During...  

National Nuclear Security Administration (NNSA)

News Releases Y-12 Successfully Meets and Exceeds Defense Programs ... Y-12 Successfully Meets and Exceeds Defense Programs Goals During FY 2010 applicationmsword icon NR-11-10...

210

NNSA Defense Programs Announces Quarterly Awards | National Nuclear...  

National Nuclear Security Administration (NNSA)

NNSA Production Office NPO News Releases NNSA Defense Programs Announces Quarterly Awards NNSA Defense Programs Announces Quarterly Awards applicationmsword icon NR-02-16.doc...

211

Natural Resources Defense Council NRDC | Open Energy Information  

Open Energy Info (EERE)

Resources Defense Council (NRDC) Place: New York, New York Zip: 10011 Product: Alliance for environmental protection. References: Natural Resources Defense Council (NRDC)1...

212

Demand Reduction  

Broader source: Energy.gov [DOE]

Grantees may use funds to coordinate with electricity supply companies and utilities to reduce energy demands on their power systems. These demand reduction programs are usually coordinated through...

213

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Broader source: Energy.gov (indexed) [DOE]

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

214

Nuclear Radiological Threat Task Force Established | National Nuclear  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Radiological Threat Task Force Established | National Nuclear Radiological Threat Task Force Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > Nuclear Radiological Threat Task Force Established Nuclear Radiological Threat Task Force Established November 03, 2003 Washington, DC Nuclear Radiological Threat Task Force Established

215

Defense Program Equivalencies for Technical Qualification Standard  

Broader source: Energy.gov (indexed) [DOE]

Defense Program Equivalencies for Technical Qualification Standard Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995 Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995 Defense Programs has undertaken an effort to compare the competencies in the General Technical Base Qualification Standard and the Functional Area Qualification Standards with various positions in the Naval Nuclear Propulsion Program and the commercial nuclear industry. The purpose of this effort is to determine if equivalencies can be granted for competencies based on previous training and experience in these areas. The equivalency crosswalk was developed by subject matter experts who held positions in the Navy and/or the commercial nuclear power program. To date, equivalencies have been

216

SQL Injection Attacks and Defense, 2 edition  

Science Journals Connector (OSTI)

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." Richard ...

Justin Clarke; Kevvie Fowler; Erlend Oftedal; Rodrigo Marcos Alvarez; Dave Hartley; Alexander Kornbrust; Gary O'Leary-Steele; Alberto Revelli; Sumit Siddharth; Marco Slaviero

2009-06-01T23:59:59.000Z

217

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive to the academic, research and operational functions of  

E-Print Network [OSTI]

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive. Policy Any bomb threat or incident of a suspected explosive device shall be considered as valid by all advised that the situation is no longer considered a threat. Every effort must be made to protect

Collins, Gary S.

218

Protection Programming Defensive Planning for Fixed Facilities  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE STD-1207-2012 December 2012 DOE STANDARD Protection Program Defensive Planning For Fixed Facilities U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE STD-1207-2012 This Page Intentionally Left Blank ii DOE STD-1207-2012 TABLE OF CONTENTS FOREWORD..................................................................................................................................v PROTECTION PROGRAM DEFENSIVE PLANNING ..........................................................1 1. SCOPE............................................................................................................................ 1 2. PURPOSE. ..................................................................................................................... 1

219

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect (OSTI)

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

220

Telescoping MATLAB for DSP Applications PhD Thesis Defense  

E-Print Network [OSTI]

Telescoping MATLAB for DSP Applications PhD Thesis Defense Arun Chauhan Computer Science, Rice University PhD Thesis Defense July 10, 2003 #12;Two True Stories PhD Thesis Defense: Telescoping MATLABD Thesis Defense: Telescoping MATLAB for DSP Applications July 10, 2003 #12;Two True Stories · the world

Chauhan, Arun

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 Rev.: 4  

E-Print Network [OSTI]

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 __________________________________________________________________________________ Subject: Response to Bomb Threats ............................................................................................................................................................1 3.1 Telephoned Threat

Virginia Tech

222

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network [OSTI]

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 Center for Software Excellence Abstract Threat Foundation. #12;Keywords: Threat modeling, data flow diagrams, reflexion models, architecture-level security

Abi-Antoun, Marwan

223

THE VISUAL CUES USED BY THE LEMON PEEL ANGELFISH (CENTROPYGE FLAVISSIMA) TO DETERMINE THREAT  

E-Print Network [OSTI]

FLAVISSIMA)TODETERMINETHREAT JESSICA POST Integrativebeusedbyfishtoassessthreat,andindicatewhenitiswere importantinassessingthreat. Multiplecueswere

Post, Jessica

2012-01-01T23:59:59.000Z

224

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk  

E-Print Network [OSTI]

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

Patel, Aniruddh D.

225

Data Reduction  

Science Journals Connector (OSTI)

Data reduction has two meanings. Firstly, in analysis, it is the process of reducing large masses of data to produce afew summary statistics. This process involves grouping data into tables, visualizing the...

2008-01-01T23:59:59.000Z

226

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

227

Coping with stereotype threat: Denial as an impression management strategy  

E-Print Network [OSTI]

Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype ...

Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

2005-01-01T23:59:59.000Z

228

Nuclear power's threat to health, safety, and freedom  

Science Journals Connector (OSTI)

Nuclear power's threat to health, safety, and freedom ... In particular, they may differ on whether the nuclear power plants that are the result of the 1953 Atoms for Peace movement help or hinder the control of nuclear weapons. ...

1980-10-13T23:59:59.000Z

229

A European vision for addressing global security threats  

Science Journals Connector (OSTI)

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EUs security. ... and instruments required to effectively respond to secu...

Gerhard Sabathil

2010-06-01T23:59:59.000Z

230

Chapter 2 - Threats and Hazards at Educational Institutions  

Science Journals Connector (OSTI)

Abstract This chapter describes the threats and hazards currently facing school administrators. It separately covers school districts (K-12) and higher education (colleges and universities), and includes information about legislation and protection measures.

Philip Purpura

2014-01-01T23:59:59.000Z

231

Threat assessment design for driver assistance system at intersections  

E-Print Network [OSTI]

This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

Aoude, Georges

232

EWAS: Modeling Application for Early Detection of Terrorist Threats  

Science Journals Connector (OSTI)

This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state ... of generation of early warnings to predict terrorist

Pir Abdul Rasool Qureshi; Nasrullah Memon

2010-01-01T23:59:59.000Z

233

Threat-aware Path Planning in Uncertain Urban Environments  

E-Print Network [OSTI]

This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

Aoude, Georges

234

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake  

E-Print Network [OSTI]

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake Sockeye MART R. GROSS of Economics, University of Toronto, 150 St. George Street, Toronto, Canada M5S 3G7. Email

Gross, Mart

235

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National  

National Nuclear Security Administration (NNSA)

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Insider Threat to Nuclear and Radiological Materials: ... Fact Sheet Insider Threat to Nuclear and Radiological Materials: Fact Sheet

236

Preliminary thoughts concerning potential US Army threats/roles  

SciTech Connect (OSTI)

The rate at which the current world military/political perspective is changing demands consideration of a broader spectrum of potential threats then has been the case for the past few decades--during which the Soviet Union was the preeminent threat. Seemingly overnight, the cold war ceased, the requirement for massive U.S. military counters to the Soviet Union forces faded, and an era of constant (obvious) military threat disappeared. This situation has in turn been revolutionized by the Iraq invasion of Kuwait and the U.S. response. The paper addresses part of the problem facing military planners by defining a spectrum of threats that typify those the U.S. Army might face over the next decade or two. The purpose of the threat set is to support the evaluation of the effectiveness and usefulness, to the U.S. Army, of advanced technologies. The set of threats is intended to provide a complete set of characteristics rather then to be a complete list of the possibilities; it is illustrative rather than exhaustive. Although largely completed before the war with Iraq started, its content is still valid in that its purpose is to provide a framework for thinking about future U.S. Army technology needs.

Greene, R.A.; Solomon, K.A.; Miles, J.T.

1991-06-01T23:59:59.000Z

237

Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.  

SciTech Connect (OSTI)

The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

Boslough, Mark B.; Crawford, David A.

2007-12-01T23:59:59.000Z

238

Natural Resources Defense Council | Open Energy Information  

Open Energy Info (EERE)

Natural Resources Defense Council Natural Resources Defense Council Jump to: navigation, search NRDC.gif NRDC is an environmental action organization headquartered in New York, New York, using law, science and the support of 1.3 million members and online activists to protect the planet's wildlife and wild places and to ensure a safe and healthy environment for all living things. NRDC was founded in 1970 by a group of law students and attorneys during the environmental movement. NRDC lawyers helped write some of America's environmental laws. Today, NRDC staff has more than 300 lawyers working out of offices in New York, Washington, D.C., Chicago, Illinois, Los Angeles, California, San Francisco, California and Beijing, China. Contact Natural Resources Defense Council 40 West 20th Street New York, NY 10011

239

ARM - Defensive Shotgun - Remington 870 Operator's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AlaskaDefensive Shotgun - Remington 870 AlaskaDefensive Shotgun - Remington 870 Operator's Guide Page Contents Firearms Safety Nomenclature Disassembly Care and Cleaning Assembly Function Check Marksmanship Fundamentals Zeroing Loading Chamber Checking Unloading Condition-One Malfunction: Failure to Fire Condition-Two Malfunction: Failure to Eject Condition-Three Malfunction: Failure to Extract Ready Positions Carries Standing Kneeling Sitting Barricade Defensive Shotgun - Remington 870 Operator's Guide U.S. Department of Energy Safeguards and Security Central Training Academy FIREARMS SAFETY Firearms safety is as important during daily activities as during range and training activities. Observing a few precautions when handling firearms in the field can help ensure your safety and that of those around you. It will

240

Defense Programs | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Defense Programs Home > About Us > Our Programs > Defense Programs Defense Programs One of the primary missions of NNSA is to maintain and enhance the safety, security and reliability of the U.S. nuclear weapons stockpile. NNSA,

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

National Defense University (NDU) Nomination Package Checklist  

Broader source: Energy.gov (indexed) [DOE]

- November 2012 - November 2012 National Defense University (NDU) Nomination Package Checklist SEND 2 COPIES OF THE NOMINATION PACKAGE TO THE NDU UNIVERSITY REGISTRAR'S OFFICE Each student nomination package must include the following items: NDU Student Nomination Form One official transcript (highest degree earned) One-page student biography or résumé (include education and career history) Two Letters of Recommendation World-Wide Travel Statement Statement of Purpose (No more than two pages) Signed National Defense University Privacy Act Statement Signed Education Release Form (if nominating agency requires copies of final student evaluation and/or transcript) SAC students must also include: Senior Acquisition Course Nomination Form

242

Cascade Control and Defense in Complex Networks  

Science Journals Connector (OSTI)

Complex networks with a heterogeneous distribution of loads may undergo a global cascade of overload failures when highly loaded nodes or edges are removed due to attacks or failures. Since a small attack or failure has the potential to trigger a global cascade, a fundamental question regards the possible strategies of defense to prevent the cascade from propagating through the entire network. Here we introduce and investigate a costless strategy of defense based on a selective further removal of nodes and edges, right after the initial attack or failure. This intentional removal of network elements is shown to drastically reduce the size of the cascade.

Adilson E. Motter

2004-08-26T23:59:59.000Z

243

NNSA: Securing Domestic Radioactive Material | National Nuclear...  

National Nuclear Security Administration (NNSA)

established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify, secure, remove andor...

244

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2  

E-Print Network [OSTI]

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2 , Feng Wu2 , Lincheng Shen1 information is distributed alongside threats. The informa- tion and threat at each location are respectively by an agent. While agents obtain information at a location, they may suffer attacks from the threat

Yeoh, William

245

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina, M. Oxenham, L. Chisci  

E-Print Network [OSTI]

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina§, M. Oxenham, L by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled by a network of entities

Chisci, Luigi

246

Ionospheric Threat Model Methodology for Juan Blanch, Todd Walter, Per Enge. Stanford University  

E-Print Network [OSTI]

Ionospheric Threat Model Methodology for WAAS Juan Blanch, Todd Walter, Per Enge. Stanford of a threat model. The threat model is used to restrict the expected ionospheric behavior. It must not be too driving the ionosphere are not entirely known, a decision has been made to base the threat model

Stanford University

247

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy  

E-Print Network [OSTI]

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy IBM Internet Security Systems #12;Table of Contents Threat Lifecycle 1 Malware Threat Lifecycle 2 Vulnerability Lifecycle 2 Conclusions 12 #12;Old Threats Never Die Page 1 With year-on-year increases in vulnerabilities, malware

248

U.S. Global Threat Reduction Initiative/U.S.-Origin Nuclear Fuel Removals  

Broader source: Energy.gov [DOE]

Presentation made by Chuck Messick for the NTSF annual meeting held from May 14-16, 2013 in Buffalo, NY.

249

On threats analysis approach applied to a Mediterranean remnant wetland: Is the assessment of human-induced threats related to different level of expertise of respondents?  

Science Journals Connector (OSTI)

Naming, listing and measuring human-induced threats in protected areas are crucial in conservation. ... , we defined a check-list of direct threats in a Mediterranean remnant wetland (central Italy ... students a...

Corrado Battisti; Luca Luiselli; Daniele Pantano

2008-06-01T23:59:59.000Z

250

Allocation Reductions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Allocation Allocation Reductions Quarterly Allocation Reductions MPP (or computational) repositories that haven't used significant amounts of time are adjusted at certain times by transferring a part of the unused balance to the corresponding DOE Office reserve. The following schedule will be used for allocation year 2014 (which runs 14 January 2014 through 132January 2015). On April 9: if usage is less than 10% remove 25% of the unused balance On July 9: if usage is less than 25% remove 25% of the unused balance if usage is less than 10% remove 50% of the unused balance On October 8: if usage is less than 50% remove 25% of the unused balance if usage is less than 25% remove 75% of the unused balance if usage is less than 10% remove 90% of the unused balance On November 5:

251

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication  

E-Print Network [OSTI]

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty #12;ABSTRACT Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho the true network identity of com- municating parties against eavesdropping adversaries. Tor, acronym

Keromytis, Angelos D.

252

Ike Skelton Defense Authorization Act | Open Energy Information  

Open Energy Info (EERE)

Defense Authorization Act Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Ike Skelton Defense Authorization ActLegal Published...

253

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF)  

E-Print Network [OSTI]

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF) L. Ertaul1 as its application in dealing with enterprise security planning related issues. Keywords: Enterprise Architecture Frameworks, DoDAF, Enterprise Security Planning 1 . Introduction The Department of Defense

Ertaull, Levent

254

Energy Department to Loan Emergency Fuel to Department of Defense...  

Energy Savers [EERE]

loan the Department of Defense ultra-low sulfur diesel from the Northeast Home Heating Oil Reserve. The Defense Logistics Agency (DLA) will begin drawing down stocks from the...

255

Nitrate reduction  

DOE Patents [OSTI]

Nitrates are reduced to nitrogen gas by contacting the nitrates with a metal to reduce the nitrates to nitrites which are then contacted with an amide to produce nitrogen and carbon dioxide or acid anions which can be released to the atmosphere. Minor amounts of metal catalysts can be useful in the reduction of the nitrates to nitrites. Metal salts which are formed can be treated electrochemically to recover the metals.

Dziewinski, Jacek J. (Los Alamos, NM); Marczak, Stanislaw (Los Alamos, NM)

2000-01-01T23:59:59.000Z

256

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Broader source: Energy.gov (indexed) [DOE]

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

257

Effects of intentional threats to power substation control systems  

Science Journals Connector (OSTI)

Power station control and management systems represent key elements for guaranteeing the security of the power grid infrastructure. Intrinsically conceived to support the continuous provision of power in secure conditions, those systems today make intensive use of information and communication systems and are therefore exposed to related accidental and intentional cyber threats. This paper describes a simulation of cyber attacks conducted in the CESI RICERCA laboratory testbed on a prototypical substation control infrastructure with the purpose of testing their feasibility and illustrating their impact on the control system services. A set of attack scenarios targeting several subsystems has been experimented, with different simulated threat motivations and different degrees of impact on the global substation service. The paper reports some considerations about the consequences of the implemented attacks, focusing on different facets of the problem, in an effort to elucidate the full significance of the potential cyber threats.

Giovanna Dondossola; Judit Szanto; Marcelo Masera; Igor Nai Fovino

2008-01-01T23:59:59.000Z

258

2011 Annual Planning Summary for Defense Nuclear Nonproliferation (NA-20)  

Broader source: Energy.gov [DOE]

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2011 and 2012 within Defense Nuclear Nonproliferation (NA-20).

259

David M. Cattler Director, Defense Combating Terrorism Center  

E-Print Network [OSTI]

David M. Cattler Director, Defense Combating Terrorism Center Directorate for Analysis The Nexus of Crime and Terrorism: New Security Challenges in the 21st Century David Cattler is the director of the Defense Combating Terrorism Center at the Defense Intelligence Agency, which is focused principally

260

Japans National Defense Planning forthe New Security Environment: The 2010National Defense Program Guidelines  

E-Print Network [OSTI]

at the Canon Insti- tute for Global Studies in Tokyo, Japan.Brief 2012-3 March 2012 Japans National Defense Planningis the primary document of Japans defense policy, setting

JIMBO, Ken

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

The Salt Defense Disposal Investigations (SDDI)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Salt Defense Disposal Investigations (SDDI) Salt Defense Disposal Investigations (SDDI) will utilize a newly mined Underground Research Lab (URL) in WIPP to perform a cost effective, proof-of-principle field test of the emplacement of heat-generating radioactive waste and validate modeling efforts. The goals of the SDDI Thermal Test are to: * Demonstrate a proof-of-principle concept for in-drift disposal in salt. * Investigate, in a specific emplacement concept, the response of the salt to heat. * Develop a full-scale response for run-of- mine (ROM) salt. * Develop a validated coupled process model for disposal of heat-generating wastes in salt. * Evaluate the environmental conditions of the

262

Cloud structures from defense meteorological satellite data  

E-Print Network [OSTI]

1979 Major Subject: Meteorology CLOUD STRUCTURES FRON DEFENSE &IETEOROLOGICAL SAT"LLIT DATA A Thesis by JOHN FREDERICK PHILLIPS Approved as to style and content by. (Cha an of Committee) (Head of Department (Me er) (Hencber) August 1975...-gray-level density wedge, provided by the Air Weather Service, enabled determinations of ap- proximate cloud heights A comparison was made between the DMSP imagery and the concurrent digital radar from the National Severe Storms Laboratory at Norman...

Phillips, John Frederick

2012-06-07T23:59:59.000Z

263

Threats and Challenges in Reconfigurable Hardware Security Ryan Kastner  

E-Print Network [OSTI]

Reconfigurable Hardware Life Cycle Before we discuss specific security problems, attacks and solutions, we: The life cycle of reconfigurable hardware, from manufacturing to application development to deploymentThreats and Challenges in Reconfigurable Hardware Security Ryan Kastner Dept. of Computer Science

264

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron  

E-Print Network [OSTI]

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron Kevin Wood Operations techniques for analyzing the security and resilience of electrical power grids against disruptions caused analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks

Baldick, Ross

265

How to determine threat probabilities using ontologies and Bayesian networks  

E-Print Network [OSTI]

are capable to reduce the risk to an acceptable level at the lowest possible costs. Risk is defined. The elaborated concepts enable risk managers to comprehensibly quantify the current security status Terms Security Keywords threat probability determination, risk management, infor- mation security 1

266

Constructing Ionospheric Irregularity Threat Model for Korean SBAS  

E-Print Network [OSTI]

GNSS augmentation system and space weather forecasting for GNSS application. Jiyun Lee is an Assistant metrics which measure the density and uniformity of IPP distribution in a region. Thus, the threat model metrics, which characterize threatening undersampled geometries including the density of IPP distribution

Stanford University

267

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President  

E-Print Network [OSTI]

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

268

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

269

Ecological factors and human threats both drive wildfowl population declines  

E-Print Network [OSTI]

; human population density. Correspondence Peter R. Long, Department of Biology and Biochemistry, Africa and Asia. Second, we use phylogenetic comparative analyses to test whether population size, globalEcological factors and human threats both drive wildfowl population declines P. R. Long1 , T. Sz

270

PERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION  

E-Print Network [OSTI]

-rated and IFE target supply processes and target related systems Electrically steer targets Making foam or fastPERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION Overview of the Fusion) for the Pedestal Developed and Tested · Formation of an edge barrier or "pedestal" allows high performance

271

Rock mechanics contributions from defense programs  

SciTech Connect (OSTI)

An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth`s interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges.

Heuze, F.E.

1992-02-01T23:59:59.000Z

272

The need for carbon dioxide disposal: A threat and an opportunity  

SciTech Connect (OSTI)

Ready energy is a cornerstone of modern society. The policies outlined at the recent Kyoto conference have put in question the largest, most readily available and most cost-effective energy resource available. Even if a doubling of atmospheric CO{sub 2} is deemed acceptable, emission reductions worldwide would have to be drastic. For 10 billion people to share equally into the 1990 emission level would allow a per capita emission of 10% of the current US level. Substantial reductions in CO{sub 2} emissions to the atmosphere are unavoidable. Uncertain is the time available to accomplish this reduction. There are also reasons to be optimistic about the future of coal and other fossil fuels. Barring a surprise technological breakthrough in alternative energies, fossil energy consumption is bound to grow. Political and economic drivers even stronger than the threat of climate change favor economic growth and therefore increased energy consumption. To resolve this apparent contradiction requires new technologies that prevent CO{sub 2} generated by combustion from entering the atmosphere. The authors will outline available technologies and show how the coal industry can adapt to them.

Lackner, K.S.; Butt, D.P.; Wendt, C.H.

1998-08-01T23:59:59.000Z

273

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network [OSTI]

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

274

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets  

Science Journals Connector (OSTI)

The number of threats from the Internet has been growing in ... the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective ... tools for obtaining deta...

Tomas Sochor; Matej Zuzcak

2014-01-01T23:59:59.000Z

275

A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues  

E-Print Network [OSTI]

There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

Shapira, Yoav

2006-01-01T23:59:59.000Z

276

Chapter 3 - Building Skills with Basics: Learning to Identify Threats  

Science Journals Connector (OSTI)

Abstract The karate student builds skills in a variety of ways, but one of the fundamental ways to practice is through repetition of the basics: blocks, punches, and kicks. A student learns to respond to real attacks from any direction, through continual training on the right way to defend and to eliminate an opponent. This is the starting point where a student develops proper techniques to attack and counterattack against a variety of violent threats. Organizations must recognize harmful hazards. Hazards may be obvious, such as risks from hurricanes, or may be less evident, such as the risks from a chemical spill on a nearby roadway. Threats to your organization can come in many formats, from natural to accidental to deliberate. To successfully prepare for problems, the next step in the assessment process calls for identifying potential risks and using available sources to identify what things you really should worry about.

Eric N. Smith

2014-01-01T23:59:59.000Z

277

Q&A with Steven Spencer: Speaker in the Women and STEM Series Talks About How He Became Interested in Studying Psychology, Dissonance, and Stereotype Threat  

E-Print Network [OSTI]

dissonance, and stereotype threat A Spencers talk, Athe field of stereotype threat, I was impressed by his kindthink about contents stereotype threat. Therefore, I had the

Hooker, Courtney

2011-01-01T23:59:59.000Z

278

Assets at Risk: Menstrual Cycle Variation in the Envisioned Formidability of a Potential Sexual Assailant Reveals a Component of Threat Assessment  

E-Print Network [OSTI]

M. T. (2013). Sizing up the threat: The envisioned physicalconceptual links between threat, social status, and physicalReveals a Component of Threat Assessment Daniel M.T.

Fessler, Daniel M.T.; Holbrook, Colin; Fleischman, Diana S.

2014-01-01T23:59:59.000Z

279

A Study on Biological Threats to Texas Freshwater Resources  

E-Print Network [OSTI]

A STUDY ON BIOLOGICAL THREATS TO TEXAS FRESHWATER RESOURCES A Thesis by MICHAEL TYLER NEISCH Submitted to the Office of Graduate and Professional Studies of Texas A&M University in partial fulfillment of the requirements.... Roelke and Dr. Masser, and my committee member, Dr. Rogers, for their guidance and support throughout the course of this research. Special thanks also to Dr. Gatlin, Brian Ray and all the Texas A&M Aquaculture and Research Facility staff, John Johnson...

Neisch, Michael

2014-01-15T23:59:59.000Z

280

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats Application of Machine Learning and Crowdsourcing  

E-Print Network [OSTI]

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats 1 Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats February 2011 Eugene of Cybersecurity Threats 2 Abstract We are applying machine learning and crowdsourcing to cybersecurity

Fink, Eugene

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Quantifying threats in a Mediterranean wetland: are there any changes in their evaluation during a training course?  

Science Journals Connector (OSTI)

Threats analysis is a conservation discipline directed to ... , quantify, rank, map the human-induced threats occurring in a specific study area, assessing ... of central Italy, where 15 human-induced threats w...

Corrado Battisti; Luca Luiselli; Corrado Teofili

2009-10-01T23:59:59.000Z

282

Countering Hybrid Eco-threats to Global Security Under International Law: The Need for an Comprehensive Legal Approach  

Science Journals Connector (OSTI)

Threats to environmental security (eco-threats) face not only shortcomings of environmental ... of Armed Conflict. Considering the new Hybrid Threat concept, which had recently been discussed ... for adopting...

Joachim Sanden; Sascha-Dominik Bachmann

2013-11-01T23:59:59.000Z

283

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION  

E-Print Network [OSTI]

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION SUBMITTED threats to user safety if left unmitigated. This work identifies when such disturbances may occur using indicates the need for a non-trivial threat model for the Federal Aviation Administration's Local Area

Stanford University

284

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability  

E-Print Network [OSTI]

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges;Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges Salim fulfillment of the requirements for the degree of Doctor of Philosophy Abstract This thesis develops threat

How, Jonathan P.

285

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision  

E-Print Network [OSTI]

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision system reliability has become an area of increasing importance. Medical system threats, which include system operation. To address these problems, we build upon our previous threat cataloging methodology

Thornton, Mitchell

286

Threat to the point: improving the value of comparative extinction risk analysis for conservation action  

E-Print Network [OSTI]

Threat to the point: improving the value of comparative extinction risk analysis for conservation of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats this problem by (i) reviewing the use of threats in this field and (ii) quanti- tatively investigating

Davidson, Ana

287

Moderate threat causes longer lasting disruption to processing in anxious individuals  

E-Print Network [OSTI]

Moderate threat causes longer lasting disruption to processing in anxious individuals Sophie: Forster S, Castle E, Nunez-elizalde AO and Bishop SJ(2014) Moderate threat causes longer lasting in anxiety1 Moderate threat causes longer lasting disruption to processing2 in anxious individuals.3 Sophie

Bishop, Sonia

288

umankind faces a wide range of threats to its security and safety, from ter-  

E-Print Network [OSTI]

H umankind faces a wide range of threats to its security and safety, from ter- rorist groups and cybercriminals to disease pandemics and climate change. All these threats share one characteristic threats. Two years ago we suggested in our book Natural Security: A Darwinian Approach to a Dangerous

Grether, Gregory

289

Responses to Ecological and Human Threats to a California Water Basin Governance System  

E-Print Network [OSTI]

W06-41 Responses to Ecological and Human Threats to a California Water Basin Governance System to the management regime as well. This paper describes the threats to water management arrangements in the San increasingly robust to certain disturbances (or threats), the complex social ecological system has remained

Janssen, Marco

290

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S. Rosenschein  

E-Print Network [OSTI]

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S systems work considered the notion of threats during negotiation, but in order to do so introduced additional assumptions on the domain. This paper presents a new model of threats among negotiating agents

Rosenschein, Jeff

291

Learning about social threats in RS Learning biases underlying individual differences in sensitivity to social rejection  

E-Print Network [OSTI]

Learning about social threats in RS 1 Learning biases underlying individual differences. Ochsner, Department of Psychology, Columbia University Running Head: Learning about social threats in RS University, Northwest Science Bldg 290, Cambridge, MA 0213. #12;Learning about social threats in RS 2

Ochsner, Kevin

292

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network [OSTI]

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 # Center for Software Excellence Abstract Threat Foundation. #12; Keywords: Threat modeling, data flow diagrams, reflexion models, architecture­level security

293

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems  

E-Print Network [OSTI]

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems Jiyun Lee observed during severe ionospheric storms pose potential threats to the integrity of the Ground threats, because ionospheric gradients are not observable to the ground monitor if they impact

Stanford University

294

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of  

E-Print Network [OSTI]

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat price homogeneity as a mechanism to reduce the threat of regulatory intervention in locally monopolistic to retaliations from local elected officials. When investor-owned monopolies are exposed to this threat

Paris-Sud XI, Université de

295

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta-Barua, and Juan Blanch  

E-Print Network [OSTI]

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta features. Therefore, it is essential to understand the magnitude of such threats given the gaps in our observations. The methodology used to study these features is to start with well-observed threats from previous

Stanford University

296

MTRG/Ascension Management Plan 2002 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT  

E-Print Network [OSTI]

MTRG/Ascension Management Plan 2002 14 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT and control of pet cats 8) Continuation of ban on harvest of turtle products We give an account of all threats.1 General Habitat Degradation 5.1.1. Mining of Beach Sand 5.1.2. Light Pollution 5.1.3 Threat of Fuel Spill

Exeter, University of

297

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF  

E-Print Network [OSTI]

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF MANPADS, OTHER BALLISTIC WEAPONS RISKS, FUTURE THREATS, AND POSSIBLE COUNTERMEASURES POLICIES O'Sullivan, T. CREATE REPORT Threats to Civilian Airliners: A Summary Risk Analysis of MANPADS, Other Ballistic Weapons Risks, Future

Wang, Hai

298

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing Systems  

E-Print Network [OSTI]

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing of user separation. The method of data analysis that produced these results is described, and a threat space that parameterizes these possible threats to user integrity is defined. Certain configurations

Stanford University

299

Validity Threats in Empirical Software Engineering Research -An Initial Survey Robert Feldt, Ana Magazinius  

E-Print Network [OSTI]

Validity Threats in Empirical Software Engineering Research - An Initial Survey Robert Feldt, Ana important to consider threats to the validity of the study and the results. This is particularly important for empirical research where there is often a multitude of possible threats. With a growing focus on empirical

Feldt, Robert

300

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in  

E-Print Network [OSTI]

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in Random Noise Radar-Regenerative (SRG) transceiver as a type of ultra-fast electronics platform for threat detection and localization the Angle-of-Arrival (AOA) information of the inbound threats. Simulations and detailed laboratory

Zhang, Yan

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

302

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN  

E-Print Network [OSTI]

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN OPPORTuNITy? recently, I attended the 50th?" and "Is China a threat to the power of the United states?" We have known the host and his family for years). are they a welcome expansion or a threat to the quality of programs? In some years, conferencegoers have expressed

Zhu, Chen

303

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik  

E-Print Network [OSTI]

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik. Prior to claiming the security of a system, it is important to iden- tify the threats to the system in question. Enumerating the threats to a system helps system architects develop realis- tic and meaningful

304

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces  

E-Print Network [OSTI]

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces Mark sharing and high-level information fusion to allow for the visualisation of highly anisotropic threat options. Keywords: Information Fusion, Threat Map, Tactical Planning. 1 Introduction We present a first

Witkowski, Mark

305

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat  

E-Print Network [OSTI]

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat Facial Signals threat. Attention was focused on either scenes or faces presented in a single overlapping display. Facial. These results suggest that automaticity is not funda- mental to the processing of all facial signals of threat

Toronto, University of

306

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous or emergency  

E-Print Network [OSTI]

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous and staff, employees, students and visitors. Violent behavior, threats of violence, or physical intimidation of threatening or violent conduct in the workplace, or who observes such behavior or believes a credible threat

Goldberg, Bennett

307

The Effects of Age and Experience on Drivers Ability to Identify Threats  

E-Print Network [OSTI]

The Effects of Age and Experience on Drivers Ability to Identify Threats Ethan Fisher Professor The purpose of this study was to determine how long it takes for a driver to identify if a threat exists and where the threat is located in a static image. It is known that both older experienced and younger

Mountziaris, T. J.

308

Threats, design limits and design windows for laser IFE dry wall chambers  

E-Print Network [OSTI]

Threats, design limits and design windows for laser IFE dry wall chambers A. Rene´ Raffray-drive targets and a dry wall chamber. The dry wall must accommodate the ion and photon threat spectra from. The neutron energy is deposited deeper in the first wall and blanket and does not represent a major threat

Raffray, A. René

309

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly  

E-Print Network [OSTI]

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly September 15, 2004 assume certainty regarding the likelihood of the regulatory threat. We examine industry voluntary self and credible regulatory threat is needed to induce industry to take voluntary self-regulatory actions. 1

Lyon, Thomas P.

310

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis  

E-Print Network [OSTI]

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis Abstract: We present an evaluation of threats on the Radio Frequency IDentification (RFID) system of the Electronic components due to the use of an insecure wireless channel. We analyze the threats according

Garcia-Alfaro, Joaquin

311

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau  

E-Print Network [OSTI]

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau School of Computer Science be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. We rank the identified threats

Barbeau, Michel

312

2013 NNSA Defense Programs Science Council | National Nuclear Security  

National Nuclear Security Administration (NNSA)

3 NNSA Defense Programs Science Council | National Nuclear Security 3 NNSA Defense Programs Science Council | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > 2013 NNSA Defense Programs Science Council 2013 NNSA Defense Programs Science Council Posted By Office of Public Affairs 2013 NNSA Defense Programs Science Council Members of the 2013 NNSA Defense Programs Science Council include, from

313

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

314

United States Department of Defense | Open Energy Information  

Open Energy Info (EERE)

Defense Defense Jump to: navigation, search Logo: United States Department of Defense Name United States Department of Defense Address 1000 Defense Pentagon Place Washington, District of Columbia Zip 20301-1000 Website http://www.defense.gov/ Coordinates 38.8706007°, -77.0557268° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.8706007,"lon":-77.0557268,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

315

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

316

November 8, 1983: Defense Waste Processing Facility | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983 The Department begins construction of the Defense Waste Processing Facility (DWPF) at the Savannah River Plant in South Carolina. DWPF is designed to make high-level nuclear waste into a glass-like substance, which will then be shipped to a repository. DWPF will mix borosilicate glass with the waste, heat it to 2000 degrees F, and pour the mixture into stainless steel canisters. The mixture will cool into solid glass that can be permanently stored. DWPF will immobilize the more than 34 million gallons of liquid high-level waste that have accumulated from producing defense-related nuclear materials

317

Polypeptide signaling for plant defensive genes exhibits analogies to defense signaling in animals  

Science Journals Connector (OSTI)

...cysteine and aspartyl proteinase inhibitors (2-4) and polyphenol oxidase...more recently, proteinase inhibitors in sedges and grasses have...of the defensive proteinase inhibitor genes in excised tomato leaves...Subsequently, chitin and chitosan oligomers derived from fungal...

D R Bergey; G A Howe; C A Ryan

1996-01-01T23:59:59.000Z

318

Comments of the Natural Resource Defense Council on Energy Efficiency...  

Broader source: Energy.gov (indexed) [DOE]

the Natural Resource Defense Council on Energy Efficiency and Sustainable Design Standards for New Federal Buildings; Notice of Proposed Rulemaking Comments of the Natural Resource...

319

Listing of Defense Nuclear Facilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1 - Listing of Defense Nuclear Facilities More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities Workforce Restructuring Policy The...

320

Department of Defense Representatives Visit Hanford to Benchmark...  

Office of Environmental Management (EM)

Representatives Visit Hanford to Benchmark Safety Department of Defense Representatives Visit Hanford to Benchmark Safety FLUOR News Release RICHLAND, Wash., December 16, 2005,...

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Legacy Management Work Progresses on Defense-Related Uranium...  

Broader source: Energy.gov (indexed) [DOE]

Most recently, LM visited 84 defense-related legacy uranium mine sites located within 11 uranium mining districts in 6 western states. At these sites, photographs and global...

322

Defense-in-Depth, How Department of Energy Implements Radiation...  

Office of Environmental Management (EM)

is implemented using a defense-in-depth approach taking into account the combination of natural and engineered barriers, performance objectives, long-term risk assessments,...

323

March 2014 Most Viewed Documents for National Defense | OSTI...  

Office of Scientific and Technical Information (OSTI)

2014 Most Viewed Documents for National Defense Science Subject Feed The Effects of Nuclear Weapons Glasstone, Samuel (1964) 72 SMART BRIDGE: A tool for estimating the military...

324

second line of defense | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

second line of defense | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

325

Energy and Defense Departments Announce Agreement to Enhance...  

Office of Environmental Management (EM)

Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and...

326

Control Systems Cyber Security: Defense in Depth Strategies ...  

Broader source: Energy.gov (indexed) [DOE]

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

327

Second Line of Defense Spares Program Assessment  

SciTech Connect (OSTI)

The Office of the Second Line of Defense (SLD) is part of the Department of Energys (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

2012-11-20T23:59:59.000Z

328

Strategic defense initiative and western security  

SciTech Connect (OSTI)

The technological and political aspects of the Strategic Defense Initiative (SDI) affect East-West relations and transatlantic interalliance relations as well as impinging on each other. The Soviets could elect to use other technology, develop a large number of smaller missiles, or provide their own SDI system in response. Because of the high cost in skilled manpower and technology resources and a crisis in the domestic economy, the Soviets prefer to avoid an intensified arms race. There is concern that new technology will further widen the perceived electronic gap between Europe, on the one hand, and the US and Japan, on the other. Strategists in Europe ask if SDI will decouple transatlantic links. Some Europeans see the need for a voice in the ultimate discussions over deployment as a compelling reason to participate actively in the SDI program. Patience and good will are essential to keep links open to both Europe and the Warsaw Pact.

Elliot, S.R.

1985-09-01T23:59:59.000Z

329

EIS-0082: Defense Waste Processing Facility, Savannah River Plant  

Broader source: Energy.gov [DOE]

The Office of Defense Waste and Byproducts Management developed this EIS to provide environmental input into both the selection of an appropriate strategy for the permanent disposal of the high-level radioactive waste currently stored at the Savannah River Plant (SRP) and the subsequent decision to construct and operate a Defense Waste Processing Facility at the SRP site.

330

Deception used for Cyber Defense of Control Systems  

SciTech Connect (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

331

Risks and threats to civilization, humankind, and the earth  

Science Journals Connector (OSTI)

This paper is a brief look at a wide range of risks that are said to present great threats to humankind. It was stimulated by several interacting factors. First, too many books and articles about astrophysical catastrophes, in the scientific and semi-scientific press, give relatively little attention to their timeframe or the measures to anticipate and prepare for them. Second, and most important, is that the overblown effects of 9/11 have distorted the United States of America's perspective and agenda on catastrophes. The result is that billions of dollars have been wasted and attention turned away from threats that could be truly catastrophic for the United States and, in many cases, for the rest of the world. Third, are books that have become popular by raising the threat that what will happen to us will be similar to what happened to earlier societies such as the Maya and the Easter Islanders. Most notably among these is Jared Diamond's Collapse [Jared Diamond, Collapse: How Societies Choose to Fail or Succeed, Penguin Group, 2005]. The failure in these doomsday arguments is to overlook the greater sophistication, knowledge, awareness, monitoring and preparation currently in the United States and in other parts of the globe. The institutional structure and scientific knowledge today would either prevent or deal with the kind of socio-economic decline anticipated by the collapse arguments. In contrast several geophysical and celestial risks do imply global catastrophe. The value of this paper is as broad background to the specific scenario papers that follow. While it leans heavily on the work of others, it offers three new features for the analysis of any extreme risk. First is a scale of devastation, based on deaths. Second is a comprehensive time framenow to the end of the Earth. Third is an outline of general questions that must be addressed for any risk, however large or small, if it is to provide insight into policy choices and promote systemic thinking.

Joseph F. Coates

2009-01-01T23:59:59.000Z

332

Identification of threats using linguistics-based knowledge extraction.  

SciTech Connect (OSTI)

One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

Chew, Peter A.

2008-09-01T23:59:59.000Z

333

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.

Kim-Kwang Raymond Choo

2011-01-01T23:59:59.000Z

334

National Defense Authorization Act for Fiscal Year 2000 § 3164:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Defense Authorization Act for Fiscal Year 2000 § 3164: National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program Stakeholders: DOE Employees and Contractors engaged in defense activities for the Department Scope: Section 3164 of the National Defense Authorization Act for Fiscal Year 2000 implements a whistleblower protection program to ensure that covered individuals may not be discharged, demoted, or otherwise discriminated against as a reprisal for making protected disclosures to a member of a committee of Congress having primary responsibility for oversight of the department, agency, or element of the Government to which the disclosed information relates; an employee of Congress who is a staff

335

NNSA's Second Line of Defense Program Receives Capability Award |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Second Line of Defense Program Receives Capability Award | Second Line of Defense Program Receives Capability Award | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Second Line of Defense Program Receives ... NNSA's Second Line of Defense Program Receives Capability Award Posted By Office of Public Affairs NNSA's Second Line of Defense (SLD) was awarded the 2013 Non-Conventional

336

Second Line of Defense Program | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Line of Defense Program | National Nuclear Security Administration Line of Defense Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Second Line of Defense Program Home > About Us > Our Programs > Nonproliferation > International Materials Protection and Cooperation > Second Line of Defense Program Second Line of Defense Program In April 2009, President Obama called the danger of a terrorist acquiring

337

Second Line of Defense Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Line of Defense Program | National Nuclear Security Administration Line of Defense Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Second Line of Defense Program Home > About Us > Our Programs > Nonproliferation > International Materials Protection and Cooperation > Second Line of Defense Program Second Line of Defense Program In April 2009, President Obama called the danger of a terrorist acquiring

338

Next Generation Nuclear Plant Defense-in-Depth Approach  

SciTech Connect (OSTI)

The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

Edward G. Wallace; Karl N. Fleming; Edward M. Burns

2009-12-01T23:59:59.000Z

339

Counterproliferation strategy: The influence of technology, budget, and arms control on theater missile defenses. Strategic research project  

SciTech Connect (OSTI)

This paper describes the historical evolution of the theater missile threat during World War II and the Persian Gulf War, and analyzes current technological challenges, budgetary pressures, and arms control restraints which constrain the development and deployment of effective theater missile defenses. The impact of these trends on strategic concepts as outlined in the National Military Strategy and their implications for attaining national policy objectives is assessed. A systems approach is used to described analyze, and evaluate the effectiveness of emerging counterproliferation strategy within the framework of an ends-ways-means strategy formulation paradigm. I conclude that current trends will lead to a self-deterring strategy: resources are inadequate to support the ways we intend to achieve our national objectives. Recommendations are made to eliminate unacceptable risk and enhance the concept of `extended conventional deterrence` consistent with U.S. national values and security interests for our role in a new world order.

Parlier, G.H.

1996-05-20T23:59:59.000Z

340

Thesis Defense: Faculty advisor The thesis defense is the culmination of completing course work, laboratory research and  

E-Print Network [OSTI]

1 Thesis Defense: Faculty advisor The thesis defense is the culmination of completing course work of the student and of the advisor in these steps. Below is a brief table of what we have seen commonly being/or clear communication between the student, faculty advisor, and thesis advisory committee about degree

Sheridan, Jennifer

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network [OSTI]

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Kranakis, Evangelos

342

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network [OSTI]

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Garcia-Alfaro, Joaquin

343

Environmental threats to children's health a global problem  

Science Journals Connector (OSTI)

Today's children are exposed to a wide range of environmental threats, whose consequences on health and development may appear early in life, throughout their youth and even later, in adulthood. Health problems linked to environmental hazards are multiplying and becoming more visible due to a rapidly changing environment, rapid population growth, overcrowding, fast industrialisation and uncontrolled pollution from many anthropogenic and also natural sources, and as a result of the effects of climate change. A World Health Organization report on the global burden of disease estimated that nearly a quarter of the global disease burden is related to environmental causes. These environmental-mediated diseases cause more than three million deaths in children under five every year. Such a large burden is unacceptable. Both industrialised and developing countries should reinforce their capacities to assess the environmental burden of paediatric diseases and characterise their impact on children's health. This will enable all responsible sectors to distinguish the main environmental threats affecting children's health and identify their specific roles in improving children's environments. Implementing these activities and turning efforts into prevention, education, policy-making and other actions will reduce the burden of disease affecting children globally, therefore contributing towards achieving the Millennium Development Goals (MDGs).

Maria Neira; Fiona Gore; Marie-Noel Brune; Tom Hudson; Jenny Pronczuk de Garbino

2008-01-01T23:59:59.000Z

344

A Risk Management Approach to the "Insider Threat"  

SciTech Connect (OSTI)

Abstract Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an insider; indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policy in a form that can be implemented on a computer system or network, creates gaps in enforcement. This paper defines insider precisely, in terms of these gaps, and explores an access-based model for analyzing threats that include those usually termed insider threats. This model enables an organization to order its resources based on the business value for that resource and of the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which users are at the greatest risk of acting inappropriately.We conclude by examining how to merge this model with one of forensic logging and auditing.

Bishop, Matt; Engle, Sophie J.; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

2010-09-01T23:59:59.000Z

345

Three Minutes to Midnight: Civil Defense in the Late Cold War Period.  

E-Print Network [OSTI]

??This thesis examines civil defense in the United States under the Nixon, Carter and Reagan administrations. Throughout the late Cold War period civil defense policy (more)

Donelson, Brendan

2014-01-01T23:59:59.000Z

346

Statement on Defense Nuclear Nonproliferation and Naval Reactors Activities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Defense Nuclear Nonproliferation and Naval Reactors Activities Defense Nuclear Nonproliferation and Naval Reactors Activities before the House Committee on Appropriations Subcommittee on Energy & Water Development | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Congressional Testimony > Statement on Defense Nuclear

347

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Northwest National Laboratory | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Steve Mladineo Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific

348

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

349

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific  

National Nuclear Security Administration (NNSA)

Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific Northwest National Laboratory | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Steve Mladineo Senior Adviser, Defense Nuclear Nonproliferation Programs Sector, Pacific

350

Statement on Defense Nuclear Nonproliferation and Naval Reactors Activities  

National Nuclear Security Administration (NNSA)

Defense Nuclear Nonproliferation and Naval Reactors Activities Defense Nuclear Nonproliferation and Naval Reactors Activities before the House Committee on Appropriations Subcommittee on Energy & Water Development | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Congressional Testimony > Statement on Defense Nuclear

351

Chapter 1 - Social engineering: The ultimate low tech hacking threat  

Science Journals Connector (OSTI)

Publisher Summary This chapter presents various social engineering topics, from understanding the minds of hackers and victims to methods for protecting personal, household and business information from theft and destruction. Social engineering has become the low tech hacker's most valuable and effective tool. The bad guys have continued to use the art of the con to gain access to intellectual property and if necessary the buildings that house that property. In this chapter, several examples illustrate how social engineering attacks happen in homes and businesses, and possible measures to prevent them. Today, every area of concern with security involves managing the risks associated with staying safe and secure. Most of the social engineering tools come from yard sales, thrift stores, flea markets, pawn shops, and Internet. This ranges from hats, jackets with corporate logos, tool belts, tools, listening devices, briefcases, spyware, and locks that can be used quite effectively for social engineering. The overall sneakiness of the threats associated with social engineering make it very easy for social engineers to catch anyone off guard. Several useful risk management countermeasures against social engineering are also described in the chapter. Social engineering is not a new phenomenon. Yet, it is still one of the most effective outsider-insider threats to any security plan. Despite valiant attempts by corporations to manage risk by not becoming victims of social engineering attacks, it is often far too easy for hackers to use the art of the con to gain access to intellectual property and to the buildings housing that property. This chapter explores the phenomenon of social engineering and explains why it is the ultimate low tech hacking threat. The chapter begins by explaining what social engineering is and how easy it is to pull off. Next, it digs into the minds of a social engineering attacker and a victim of an attack, and covers some of the more popular tools of the trade. The chapter also includes interviews with specialists in technical security issues, and closes with a few countermeasures associated with social engineering.

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2012-01-01T23:59:59.000Z

352

Game Theoretic Evaluation of Threat Detection Problems-The Central Role of the Adversary  

SciTech Connect (OSTI)

A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

Heasler, Patrick G.; Wood, Thomas W.; Reichmuth, Barbara A.

2007-01-01T23:59:59.000Z

353

How ORISE is Making a Difference: Preparing for the Threat of...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Amber Waves ORISE coordinates tabletop exercise to help agencies prepare for the threat of dirty bombs Radiological dispersion devices (RDDs), also known as dirty bombs, are...

354

Chapter Five - Hazards and Threats to a Pipeline System  

Science Journals Connector (OSTI)

Abstract It is important to understand what the threats are that raise the risk probability in a pipeline system and how to assess them. External corrosion on a pipeline could be from microbiological (MIC), galvanic action or electrochemical reaction, where the steel pipe becomes an anode in an electrochemical cell. External corrosion direct assessment (ECDA) is a structured process that is intended to improve safety by assessing and reducing the impact of external corrosion on a pipeline. Other tools for assessing external corrosion are direct current voltage gradient (DCVG), CIP, ILI using intelligent pigging, and pressure testing. Use of guided wave ultrasonic testing (GWUT) as an alternative tool for ECDA has been promoted and sometimes used.

Ramesh Singh

2014-01-01T23:59:59.000Z

355

High tech criminal threats to the national information infrastructure  

Science Journals Connector (OSTI)

National information infrastructure (NII), vital to the nation's security and economic stability, comprises both physical and electronic infrastructures. Information and communications technologies (ICT) form the backbone of many aspects of the NII and reliance on ICT has created many new risks. Cyberthreats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. This paper examines the technology-related risks associated with the NII and provides examples of existing incidents and areas in which new threats might emerge. To be able to mitigate these risks, it remains crucial to understand infrastructure interdependencies and to establish public-private partnerships to ensure that weaknesses in systems are not able to be exploited.

Kim-Kwang Raymond Choo

2010-01-01T23:59:59.000Z

356

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

10 10 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2010 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/17/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4459 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2010

357

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 2 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2002 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/09/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4451 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2002

358

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Broader source: Energy.gov (indexed) [DOE]

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

359

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 6 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2006 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/13/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4455 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2006

360

Energy and Defense Departments Announce Agreement to Enhance Cooperation on  

Broader source: Energy.gov (indexed) [DOE]

and Defense Departments Announce Agreement to Enhance and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security July 27, 2010 - 12:00am Addthis Washington, D.C. - At a White House Forum on Energy Security today, U.S. Deputy Secretary of Energy Daniel Poneman announced a Memorandum of Understanding (MOU) between the U.S. Department of Energy and the U.S. Department of Defense to accelerate clean energy innovation and enhance national energy security. America's military pays a high price in terms of added cost, risk of life, and lost operational flexibility in order to deliver fuel supplies to our forces in combat. Both agencies are committed to reducing these

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 3 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2003 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/10/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4452 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2003

362

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Broader source: Energy.gov (indexed) [DOE]

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

363

Don Cook discusses NNSA's Defense Programs at Woodrow Wilson Center |  

National Nuclear Security Administration (NNSA)

discusses NNSA's Defense Programs at Woodrow Wilson Center | discusses NNSA's Defense Programs at Woodrow Wilson Center | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Don Cook discusses NNSA's Defense Programs at ... Don Cook discusses NNSA's Defense Programs at Woodrow Wilson Center Posted By Office of Public Affairs Cook at WW

364

Microsoft Word - Defense Science Quarterly 05-08.doc  

National Nuclear Security Administration (NNSA)

Office of Defense Science May 2008 Office of Defense Science May 2008 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Advanced Certification 3 Delivering High Energy Density Physics Data on the National Ignition Facility to Validate Predictive Physics Models 5 Texas Petawatt Laser Achieves Power Milestone 6 Sandia Light Gas Gun Tests Demonstrate the Ability to Deliver an Engineered Shock Wave Using a Graded-Density Thermal Spray Coating 7 Stewardship Science Academic Alliances Symposium Highlights 9 Publication Highlights 10 Highlights and Awards Chris Deeney, Director, Office of Defense Science Greetings from a newly reorganized NNSA! As you know, the science campaign is always aiming towards the future and "Doing Tomorrow's Directed

365

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8 8 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2008 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/15/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4457 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2008

366

Weapon Scheduling Method for Cooperative Air-Defense Operation  

Science Journals Connector (OSTI)

By defining the weapon scheduling plan and weapon combat action, the mathematical formulation of weapon scheduling problem for cooperative air-defense operation ... the basis of discussing the primary constraints...

Liang Yu; Changfeng Xing

2012-01-01T23:59:59.000Z

367

Defense Energy Support Center: Installation Energy Commodity Business Unit  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetingdiscusses the Defense Energy Support Center's (DESC's) Installation Energy Commodity Business Unit (CBU) including its intent, commitment, pilot project, lessons learned, and impending barriers.

368

Doctoral Defense "CHARACTERIZATION OF THE CYCLIC BEHAVIOR OF CORRODED STEEL  

E-Print Network [OSTI]

Doctoral Defense "CHARACTERIZATION OF THE CYCLIC BEHAVIOR OF CORRODED STEEL BRIDGE BEARINGS Chair: Jason McCormick Professor, Civil & Environmental Engineering Steel bridge bearings are widely and accommodate movements between the superstructure and substructure. These bearings include steel rocker

Kamat, Vineet R.

369

Identifying enterprise leverage points in Defense Acquisition Program performance  

E-Print Network [OSTI]

Large, complex systems development programs in the Department of Defense are finding it more difficult to deliver desired capabilities to the end user on time and on budget than ever before. Evidence exists that almost all ...

Wirthlin, Joseph Robert, 1970-

2009-01-01T23:59:59.000Z

370

Nuclear Weapon Surety Interface with the Department of Defense  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order establishes Department of Energy and National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the Department of Defense. Cancels DOE O 452.6.

2009-05-14T23:59:59.000Z

371

A systematic analysis of defenses against code reuse attacks  

E-Print Network [OSTI]

In this thesis, we developed a systematic model of the code reuse attack space where facts about attacks and defenses were represented as propositional statements in boolean logic and the possibility of deploying malware ...

Casteel, Kelly (Kelly C.)

2013-01-01T23:59:59.000Z

372

Interface with the Defense Nuclear Facilities Safety Board  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Cancels DOE M 140.1-1A.

2001-03-30T23:59:59.000Z

373

Interface with the Defense Nuclear Facilities Safety Board  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual defines the process DOE will use to interface with the Defense Nuclear Facilities Safety Board and its staff. Canceled by DOE M 140.1-1A. Does not cancel other directives.

1996-12-30T23:59:59.000Z

374

Interface with the Defense Nuclear Facilities Safety Board  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Cancels DOE M 140.1-1.

1999-01-26T23:59:59.000Z

375

Microsoft Word - Defense Science Quarterly 02-08.doc  

National Nuclear Security Administration (NNSA)

year the team plans to complete up to 18 experiments. Monty Wood (LANL) and Don Smith (LLNL) discuss data during the alpha-can II exercise Page 4 NNSA Office of Defense...

376

Renewable Energy and Defense Geospatial Database | Open Energy...  

Open Energy Info (EERE)

Database Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Renewable Energy and Defense Geospatial Database Abstract This database provides GIS data to...

377

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Broader source: Energy.gov (indexed) [DOE]

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

378

Department of Defense Benchmarks VPP in Visit to Hanford  

Broader source: Energy.gov [DOE]

Representatives of the Department of Defense's (DoD's) Voluntary Protection Program Center of Excellence (VPP-CX) are working to meet a safety and health goal established by Secretary of Defense Donald Rumsfeld to reduce injuries at DoD sites nationwide. In order to accomplish this goal, DoD visited the Department of Energy's (DOE's) Hanford Site in southeast Washington State on December 12, 2005, to learn about its exemplary safety programs and benchmark the site's VPP effort.

379

Defense?Related Uranium Mines Report to Congress (August 2014)  

Broader source: Energy.gov [DOE]

Section 3151 of the National Defense Authorization Act for Fiscal Year 2013 directed the Secretary of Energy, in consultation with the Secretary of the Interior and the Administrator of the U.S. Environmental Protection Agency (EPA), to undertake a review of, and prepare a report on, abandoned uranium mines in the United States that provided uranium ore for atomic energy defense activities of the United States (the mines).

380

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid  

E-Print Network [OSTI]

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

Wang, Wenye

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Climate change is one of the greatest threats facing us today. CICERO's mission  

E-Print Network [OSTI]

Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

Johansen, Tom Henning

382

NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to  

E-Print Network [OSTI]

NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to help conserve threats to marine turtles, NMFS and the U.S. Fish and Wildlife Service have developed recovery plans you see turtles and/or jellyfish at the surface, slow down and ma¡nta¡n a ded¡cated lookout. 0 Wear

383

Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization, 1st edition  

Science Journals Connector (OSTI)

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue ...

Eric Cole

2012-12-01T23:59:59.000Z

384

A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society  

E-Print Network [OSTI]

A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and Society and to manage medical conditions. In this paper, we examine the privacy-related threats to these so-called mHealth that could support privacy-sensitive mHealth systems. We conclude with a brief summary of research challenges

385

An outcome-based learning model to identify emerging threats : experimental and simulation results.  

SciTech Connect (OSTI)

The authors present experimental and simulation results of an outcome-based learning model as it applies to the identification of emerging threats. This model integrates judgment, decision making, and learning theories to provide an integrated framework for the behavioral study of emerging threats.

Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F.; Decision and Information Sciences; SNL; Univ. at Albany

2007-01-01T23:59:59.000Z

386

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network [OSTI]

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

387

Report of the defense science board task force on defense nuclear agency. Final report  

SciTech Connect (OSTI)

The Task Force recommends that: (1) DNA continue to be the DoD focal point for nuclear expertise; (2) The DNA charter be modified to provide focus for non-nuclear activities of critical importance to the DoD. It gives DNA authority to conduct technology base development for advanced conventional munitions, and become a focal point for technologies related to non- and counter-proliteration of weapon systems of mass destruction and their infrastructure (WMD); and (3) Anticipating cessation of UGETs, DNA should aggressively pursue technology development for AGT, AGT/UGT correlation and advanced computations, with emphasis on new theater scenarios, but with the ability to reconstitute for UGT resumption or AGT for large strategic threats within a year or two.

Not Available

1993-04-01T23:59:59.000Z

388

The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance?  

E-Print Network [OSTI]

or Economic Alliance?Military Threat or Economic Alliance? Anna BrownAnna Brown #12;Maps courtesy of Google

New Hampshire, University of

389

Space-Based Chemical Lasers in strategic defense  

SciTech Connect (OSTI)

The Strategic Defense Initiative Organization (SDIO) has made significant progress in developing Space-Based chemical Laser (SBL) technologies and in studying the SBLs global defense capability. In this mission, a constellation of several orbiting laser platforms provides continuous global defense by intercepting threatening missiles in their boost phase, including short range ballistic missiles (SRBMs). An optional smaller constellation provides defense against launches from the low and midlatitude regions. In addition, SBLs have utility in other important related missions such as surveillance, air defense and discrimination. The hardware necessary to build such a system has been developed to the point where it is mature and ready for demonstration in space. Advances have been made in each of the following major areas of the SBL: laser device; optics/beam control; beam pointing; ATP (acquisition, tracking and pointing); uncooled optics; and laser lethality. Integration of the key laser and beam control technologies is now occurring in the ground-based ALI experiment, and a space demonstration experiment, Star LITE, is in the planning and concept development phase.

Wildt, D. (SDIO, Washington, DC (United States))

1992-07-01T23:59:59.000Z

390

Human-UAV Coordinated Flight Path Planning of UAV Low-Altitude Penetration on Pop-Up Threats  

Science Journals Connector (OSTI)

Human-UAV coordinated flight path planning of UAV low-altitude penetration on pop-up threats is a key technology achieving manned and ... of the flight path planning on pop-up threats. A lot of simulation studies...

Peng Ren; Xiao-guang Gao; Jun Chen

2014-01-01T23:59:59.000Z

391

Annex A -Potential threats in EU Organism(s) Means of spread Control measures Control approaches being used in  

E-Print Network [OSTI]

Annex A - Potential threats in EU Organism(s) Means of spread Control measures Control approaches options Potential threats in EU keep out, knowledge of trade routes, awareness on nurseries, foresters

392

DEFENSE HIGH LEVEL WASTE GLASS DEGRADATION  

SciTech Connect (OSTI)

The purpose of this Analysis/Model Report (AMR) is to document the analyses that were done to develop models for radionuclide release from high-level waste (HLW) glass dissolution that can be integrated into performance assessment (PA) calculations conducted to support site recommendation and license application for the Yucca Mountain site. This report was developed in accordance with the ''Technical Work Plan for Waste Form Degradation Process Model Report for SR'' (CRWMS M&O 2000a). It specifically addresses the item, ''Defense High Level Waste Glass Degradation'', of the product technical work plan. The AP-3.15Q Attachment 1 screening criteria determines the importance for its intended use of the HLW glass model derived herein to be in the category ''Other Factors for the Postclosure Safety Case-Waste Form Performance'', and thus indicates that this factor does not contribute significantly to the postclosure safety strategy. Because the release of radionuclides from the glass will depend on the prior dissolution of the glass, the dissolution rate of the glass imposes an upper bound on the radionuclide release rate. The approach taken to provide a bound for the radionuclide release is to develop models that can be used to calculate the dissolution rate of waste glass when contacted by water in the disposal site. The release rate of a particular radionuclide can then be calculated by multiplying the glass dissolution rate by the mass fraction of that radionuclide in the glass and by the surface area of glass contacted by water. The scope includes consideration of the three modes by which water may contact waste glass in the disposal system: contact by humid air, dripping water, and immersion. The models for glass dissolution under these contact modes are all based on the rate expression for aqueous dissolution of borosilicate glasses. The mechanism and rate expression for aqueous dissolution are adequately understood; the analyses in this AMR were conducted to provide models and parameter values that can be used to calculate the dissolution rates for the different modes of water contact. The analyses were conducted to identify key aspects of the mechanistic model for glass dissolution to be included in the abstracted models used for PA calculations, evaluate how the models can be used to calculate bounding values of the glass dissolution rates under anticipated water contact modes in the disposal. system, and determine model parameter values for the range of potential waste glass compositions and anticipated environmental conditions. The analysis of a bounding rate also considered the effects of the buildup of glass corrosion products in the solution contacting the glass and potential effects of alteration phase formation. Note that application of the models and model parameter values is constrained to the anticipated range of HLW glass compositions and environmental conditions. The effects of processes inherent to exposure to humid air and dripping water were not modeled explicitly. Instead, the impacts of these processes on the degradation rate were taken into account by using empirically measured parameter values. These include the rates at which water sorbs onto the glass, drips onto the glass, and drips off of the glass. The dissolution rates of glasses that were exposed to humid air and dripping water measured in laboratory tests are used to estimate model parameter values for contact by humid air and dripping water in the disposal system.

W. Ebert

2001-09-20T23:59:59.000Z

393

DNA Radiation Environments Program Spring 1991 2-meter box experiments and analyses. [DEfense Nuclear Agency (DNA)  

SciTech Connect (OSTI)

This report summarizes the Spring 1991 2-m Box experiments that were performed at the Army Pulse Radiation Facility (APRF) at Aberdeen Proving Ground. These studies were sponsored by the Defense Nuclear Agency (DNA) under the Radiation Environments Program to obtain measured data for benchmarking the Adjoint Monte Carlo Code System, MASH, Version 1.0. The MASH code system was developed for the Department of Defense and NATO for calculating neutron and gamma-ray radiation fields and shielding protection factors for armored vehicles and military structures against nuclear weapon radiation. In the 2-m Box experiments, neutron and gamma-ray dose rates and reduction factors were measured in the free-field and as a function of position on an anthropomorphic phantom that was placed outside and inside a borated polyethylene lined steel-walled 2-m box. The data were acquired at a distance of 400-m from the APRF reactor. The purpose of these experiments was to measure the neutron and gamma-ray dose rates as a function of detector location on the phantom for cases when the phantom was in the free-field and inside of the box. Neutron measurements were made using a BD-100R bubble detector and gamma-ray measurements were made using thermoluminescent detectors (TLD). Calculated and measured data were compared in terms of the C/M ratio. The calculated and measured neutron and gamma-ray dose rates and reduction factors agreed on the average within the [plus minus]20% limits mandated by DNA and demonstrate the capability of the MASH code system in reproducing measured data in nominally shielded assemblies.

Santoro, R.T. (Oak Ridge National Lab., TN (United States)); Whitaker, S.Y. (Clark Atlanta Univ., GA (United States))

1993-03-01T23:59:59.000Z

394

Open literature review of threats including sabotage and theft of fissile material transport in Japan.  

SciTech Connect (OSTI)

This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

2005-06-01T23:59:59.000Z

395

Ex Parte Memorandum - Natural Resources Defense Council | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

- Natural Resources Defense Council - Natural Resources Defense Council Ex Parte Memorandum - Natural Resources Defense Council On Friday, October 21, 2011, a group of non-profit and state energy efficiency advocates met with representatives of the Department of Energy to discuss the Direct Final Rule for Residential Furnaces, Heat Pumps and Central Air Conditioners (Energy Conservation Program: Energy Conservation Standards for Residential Furnaces and Residential Central Air Conditioners and Heat Pumps, Direct Final Rule, 76 Fed. Reg. 37,408(June 27, 2011); Energy Conservation Program: Energy Conservation Standards for Residential Furnaces and Residential Central Air Conditioners and Heat Pumps, Notice of Proposed Rulemaking, 76 Fed. Reg. 37,549 (June 27, 2011)). Memo_10_21_11_Meeting.pdf

396

DEPARTMENT OF DEFENSE GENERAL SERVICES ADMINISTRATION NATIONAL AERONAUTICS AND  

Broader source: Energy.gov (indexed) [DOE]

14 Federal Register / Vol. 75, No. 130 /Thursday, July 8, 2010 /Rules and Regulations 14 Federal Register / Vol. 75, No. 130 /Thursday, July 8, 2010 /Rules and Regulations DEPARTMENT OF DEFENSE GENERAL SERVICES ADMINISTRATION NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 48 CFR Chapter 1 [Docket FAR-20104076, Sequence 61 Federal Acquisition Regulation; Federal Acquisition Circular 2005-44; Introduction AGENCY: Department of Defense (DoD), General Services Administration (GSA), and National Aeronautics and Space DATES:, For effective date, see separate Administration INASAI. document, which follows. ACTION: Summary presentation of an interim rule. SUMMARY: This document summarizes the Federal Acquisition Regulation (FAR) rule agreed to by the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council in this Federal Acquisition

397

Microsoft Word - Defense Science Quarterly 08-08.doc  

National Nuclear Security Administration (NNSA)

August 2008 August 2008 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Derivative Applications of Pulsed Power Science and Technology 4 LANSCE-R Means More Beam for National Security Research 6 Dual Axis Radiographic Hydrodynamics Test (DARHT) 2 nd Axis Completed and Put into Operation 7 Annual Symposium of the Stewardship Science Graduate Fellowship Program 8 Publication Highlights 9 ICOPS 2008 9 Highlights and Awards Message from the Director Chris Deeney, Defense Science Division It's hard to believe it's been a year since we published our first issue of the Defense Science Quarterly. I would like to express my appreciation to all the authors who have submitted articles and to the production staff. If you are

398

Indiana Office of Energy Defense Development | Open Energy Information  

Open Energy Info (EERE)

Energy Defense Development Energy Defense Development Jump to: navigation, search Name Indiana Office of Energy & Defense Development Place Indianapolis, Indiana Zip 46204 Product String representation "The Indiana Off ... ity industries." is too long. Coordinates 39.76691°, -86.149964° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.76691,"lon":-86.149964,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

399

DOE Defense Nuclear Nonproliferation DNN | Open Energy Information  

Open Energy Info (EERE)

Defense Nuclear Nonproliferation DNN Defense Nuclear Nonproliferation DNN Jump to: navigation, search Name DOE Defense Nuclear Nonproliferation (DNN) Place Washington, Washington, DC Zip 20585 Product String representation "Washington D.C. ... ear operations." is too long. Coordinates 38.89037°, -77.031959° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.89037,"lon":-77.031959,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

400

INFECTIOUS DISEASE OUTBREAKS Avian Flu, measles, Mumps, SARs, and other infectious diseases can pose a threat to the  

E-Print Network [OSTI]

pose a threat to the University community as they do to communities worldwide. If there is an outbreak has extensive information on these and other health threats on their website (http are appropriate to the emerging threat and ready for implementation. Response team meets with increasing frequency

Meyers, Steven D.

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance  

E-Print Network [OSTI]

Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode to detect infrequent threat-related actions. Participants indicated detection of target actions either vigilance task. Irrespective of response mode, the detection rate of intentional threats declined over time

Parasuraman, Raja

402

The CSUF Center for Entrepreneurship and CSUF Center for Family Business present: "Patent Trolls and Other IP-Related Threats  

E-Print Network [OSTI]

and Other IP-Related Threats: How to Protect Your Business from a New Kind of Predator" Mihaylo College trolls, with threats of lawsuits and litigation. At this seminar, panelists Roger N. Behle (IP litigator Other intellectual property threats Current and pending legislation designed to address patent trolling

de Lijser, Peter

403

The nature of threat category changes in three Mediterranean biodiversity hotspots Felipe Domnguez Lozano a,e,  

E-Print Network [OSTI]

The nature of threat category changes in three Mediterranean biodiversity hotspots Felipe Domínguez Conservation assessments Red List Spain Threat analysis Threatened plants IUCN categories Western Australia a b s t r a c t Step changes in threat category can be quantified and analyzed in relation to reasons

Moreno Saiz, Juan Carlos

404

Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 & 28,  

E-Print Network [OSTI]

Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 they call "stereotype threat": when black students are put into a situation where they are directly-- the resulting pressure causes their performance to suffer." "Steele and others have found stereotype threat

McMains, Sara

405

Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth Padmala, and Luiz Pessoa  

E-Print Network [OSTI]

Emotion Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth., Bauer, A., Padmala, S., & Pessoa, L. (2011, June 27). Threat of Bodily Harm Has Opposing Effects on Cognition. Emotion. Advance online publication. doi: 10.1037/a0024345 #12;Threat of Bodily Harm Has Opposing

Pessoa, Luiz

406

Distributed Localization of Threats using Sensor PI: I. Schizas (schizas@uta.edu)/ 817 272-3467  

E-Print Network [OSTI]

Distributed Localization of Threats using Sensor Nets PI: I. Schizas (schizas@uta.edu)/ 817 272 AT ARLINGTON Technical barriers/problems: · Utilize sensor networks to locate threats · Develop distributed algorithms · Limited power resources in sensors · Threats unpredictable both spatially and temporally

Texas at Arlington, University of

407

The versatility of graded acoustic measures in classification of predation threats by the tufted titmouse Baeolophus bicolor  

E-Print Network [OSTI]

The versatility of graded acoustic measures in classification of predation threats by the tufted titmouse Baeolophus bicolor: exploring a mixed framework for threat communication Kathryn E. Sieving-based' alarms encode graded or ranked threat-levels by varying the production patterns of the same call types

Sieving, Kathryn E.

408

Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd Maddox, and Grant C. Baldwin  

E-Print Network [OSTI]

Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd of strands of work to identify causes of stereotype threat in a way that allows them to reverse the effects. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks

Maddox, W. Todd

409

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0 4, 2016 Standard Administrative Procedure Statement Any and all bomb threats are regarded seriously. 2. ADDITIONAL NOTIFICATION AND EVALUATION 2.1 Upon receipt of a bomb threat to a particular building

410

Defense Production Act of 1950 in U.S.C. | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Defense Production Act of 1950 in U.S.C. Defense Production Act of 1950 in U.S.C. Defense Production Act of 1950 in U.S.C. CITE: 50USC--App.2061 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2062 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2071 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2072 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2073 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2074 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2075 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2076 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2077 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2078 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2091 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE

411

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Broader source: Energy.gov (indexed) [DOE]

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

412

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats  

Science Journals Connector (OSTI)

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats ... Emerging environmental threats such as novel chemical compounds, biological agents, and nanomaterials present serious challenges to traditional models of risk analysis and regulatory risk management processes. ... The recent emergence of new materials, technologies, and other environmental stressors in both the marketplace and the public consciousness coincides with increased recognition of the importance of an integrated systems approach to environmental health and safety that includes life-cycle thinking, public participation, and adaptive management of risks associated with emerging threats. ...

Igor Linkov; Thomas P. Seager

2011-04-27T23:59:59.000Z

413

Microsoft Word - Defense Science Quarterly Nov 2007 final.doc  

National Nuclear Security Administration (NNSA)

November 2007 November 2007 Dr. Brad Wallin Dr. Robert Hanrahan Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Contributions of the Los Alamos Proton Radiography Program to the Nuclear Weapons Program 4 Contributions of the Los Alamos Weapons Neutron Research Facility Programs to the Nuclear Weapons Program 5 Cross-cutting Science: Materials in Extreme Environments 7 Academic Outreach: The Stewardship Science Academic Alliances Program 10 Z Refurbishment Project Wraps Up 11 Publication Highlights Chris Deeney, Director, Office of Defense Science Thank you for another exciting quarter in the Science Campaign. We recently visited Los Alamos and Sandia National Laboratories to conduct a technical review, and

414

An alternative to present United States defense strategy  

E-Print Network [OSTI]

J BSTRACT An Alternative to Present United States Defense Strategy. (Nay 1971) william 1:. 'allace Anthony, B. A. , Tarleton State College; Directed by: Dr. N. Z. Benton 'he purpose of tnis study is to explore the policy relative to a nuclear... strategic capability that wo ld enhance the defensive nuclear posture of tne United States and its allies in the North Atlantic Treaty Organization (NATO). The thesis postulates the employment of a land mass, that is a possession of a N"TO alliance...

Anthony, William Wallace

2012-06-07T23:59:59.000Z

415

Defense Program Equivalencies for Technical Qualification Standard Competencies  

Broader source: Energy.gov (indexed) [DOE]

2, 1995 2, 1995 MEMORANDUM FOR Distribution FROM: Thomas W. Evans Technical Personnel Program Coordinator SUBJECT: Defense Program Equivalencies for Technical Qualification Standard Competencies Defense Programs has undertaken an effort to compare the competencies in the General Technical Base Qualification Standard and the Functional Area Qualification Standards with various positions in the Naval Nuclear Propulsion Program and the commercial nuclear industry. The purpose of this effort is to determine if equivalencies can be granted for competencies based on previous training and experience in these areas. The equivalency crosswalk was developed by subject matter experts who held positions in the Navy and/or the commercial nuclear power program. To date, equivalencies have been

416

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998  

SciTech Connect (OSTI)

This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

NONE

1999-02-01T23:59:59.000Z

417

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, Calendar Year 1999  

SciTech Connect (OSTI)

This is the tenth Annual Report to the Congress describing Department of Energy activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of Energy regarding public health and safety issues at the Department's defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. During 1999, Departmental activities resulted in the closure of nine Board recommendations. In addition, the Department has completed all implementation plan milestones associated with three Board recommendations. One new Board recommendation was received and accepted by the Department in 1999, and a new implementation plan is being developed to address this recommendation. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, opening of a repository for long-term storage of transuranic wastes, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2000-02-01T23:59:59.000Z

418

Detecting Nuclear Threats | U.S. DOE Office of Science (SC)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Detecting Nuclear Threats Detecting Nuclear Threats Stories of Discovery & Innovation Detecting Nuclear Threats Enlarge Photo Photo: Denise Applewhite The MINDS device was invented by a team of engineers at the Princeton Plasma Physics Laboratory, including, from left: Kenny Silber, Henry Carnevale, Charles Gentile, Dana Mastrovito, and Bill Davis. Enlarge Photo 03.28.11 Detecting Nuclear Threats Plasma physics challenge yields portable nuclear detector for homeland security. In 1999, faced with the task of decommissioning the legendary Tokamak Fusion Test Reactor (TFTR), officials at the U.S. Department of Energy's Princeton Plasma Physics Laboratory (PPPL) realized they needed something that didn't yet exist-a non-destructive, real time device to detect certain "hot" elements lacing the inner vessel of the doughnut-

419

Integrating species traits with extrinsic threats: closing the gap between predicting and preventing species declines  

Science Journals Connector (OSTI)

...Centre for Plant Biodiversity...the Amphibian Disease Ecology Group...this pandemic disease [13]. Nevertheless...key threats (disease, invasive...to powerful prediction of species...the field of machine learning [29], for...

2011-01-01T23:59:59.000Z

420

Natural and Human Threats to Biodiversity in the Marine Ecosystem of Coastal Pakistan  

Science Journals Connector (OSTI)

There exist several natural and made-made threats to biodiversity along the coast of Pakistan. Natural stresses include high wave action, high temperatures and salinity, and seasonal spread of oxygen-poor wate...

Muzammil Ahmad

1997-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Agriculture, Ecosystems and Environment 84 (2001) 120 Economic and environmental threats of alien plant,  

E-Print Network [OSTI]

Agriculture, Ecosystems and Environment 84 (2001) 1­20 Economic and environmental threats of alien. Precise economic costs associated with some of the most ecologically damaging alien species; Animals; Alien; Economic; Ecology; Environment; Agriculture; Non-indigenous 1. Introduction Quantifying

California at Berkeley, University of

422

Threats to observers, keepers, visitors, and others by zoo mangabeys (Cercocebus galeritus chrysogaster)  

Science Journals Connector (OSTI)

The facial threats of ten captive golden-bellied mangabeys (Cercocebus galeritus chrysogaster...) were categorized by object threatened. Adult males threatened more than did females except when the object was a n...

G. Mitchell; Stephanie D. Obradovich; Fred H. Herring; Brad Dowd

1991-10-01T23:59:59.000Z

423

Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats  

Science Journals Connector (OSTI)

...ePOOLICE aims at developing an efficient and effective strategic early warning system that utilises environmental scanning for the early warning and detection of current, emergent and future organised crime threats

Ben Brewster; Simon Andrews; Simon Polovina

2014-01-01T23:59:59.000Z

424

Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures  

Science Journals Connector (OSTI)

The large-scale cross border virtualization infrastructures can be seen as a federation of heterogeneous clouds. We present pragmatic analysis of the potential threats posed to the emerging large-scale cross...in...

Philippe Massonet; Syed Naqvi; Francesco Tusa; Massimo Villari

2010-01-01T23:59:59.000Z

425

Study on Threats to Security of Space TT&C Systems  

Science Journals Connector (OSTI)

A space Tracking, Telemetry and Command (TT&C) system is a spaceflight support system and its security is of great significance. A framework of space TT&C system security threat assessment is proposed and it comp...

Qi Wang; Bo Wang; Bin Wu

2013-01-01T23:59:59.000Z

426

Assessing security threat scenarios for utility-based reputation model in grids  

Science Journals Connector (OSTI)

Trust and reputation models play an important role in enabling trusted computations over large-scale distributed grids. Many models have been recently proposed and implemented within trust management systems. Nevertheless, the existing approaches usually assess performance of models in terms of resource management while less attention is paid to the analysis of security threat scenarios for such models. In this paper, we assess the most important and critical security threats for a utility-based reputation model in grids. The existing model is extended to address these threat scenarios. With simulations that were run using data collected from the EGEE Grid-Observatory project, we analyse efficiency of the utility-based reputation model against these threats.

Olga Kussul; Nataliia Kussul; Sergii Skakun

2013-01-01T23:59:59.000Z

427

Effects of Threats to Self-Esteem and Goal Orientation on Asking for Help.  

E-Print Network [OSTI]

??This paper studied whether threats to self-esteem and goal orientation affected an individual?s propensity to ask for help. Eighty-two undergraduate students from the University of (more)

Chung, Andrew

2006-01-01T23:59:59.000Z

428

Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.  

SciTech Connect (OSTI)

Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

Cohen, Israel Dov; Mengesha, Wondwosen

2011-09-01T23:59:59.000Z

429

Postural threat during walking: effects on energy cost and accompanying gait changes  

Science Journals Connector (OSTI)

Balance control during walking has been shown to involve a metabolic cost in healthy subjects, but it is unclear how this cost changes as a function of postural threat. ... determine the influence of postural thr...

Trienke IJmker; Claudine J Lamoth

2014-04-01T23:59:59.000Z

430

Sludge Mass Reduction Update  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Preparations Preparations within the Tank Farm D. Bumgardner Liquid Waste Engineering Washington Savannah River Company 12 May 2009 2 Agenda Liquid Waste System Overview Sludge Characteristics Sludge Batch Planning Sludge Batch Preparation Sequence - Aluminum Dissolution - Sludge Washing - Sludge Batch Qualification/Acceptance Questions 3 Liquid Waste Processing at SRS ARP - Actinide Removal Process AFP - Actinide Finishing Process ASP - Actinide Strike Process CSS - Clarified Salt Solution CSSX - Caustic-side Solvent Extraction DDA - Deliquification, Dissolution, and Adjustment DSS - Decontaminated Salt Solution DWPF - Defense Waste Processing Facility ETP - Effluent Treatment Project GWSB - Glass Waste Storage Building HLW - High-Level Waste LLW - Low-Level Waste MCU - Modular CSSX Unit

431

Defense Secretary Awards EM Idaho Contractor Freedom Award at Pentagon  

Broader source: Energy.gov [DOE]

IDAHO FALLS, Idaho CH2M-WG Idaho (CWI), the main cleanup contractor for the EM program at the Idaho Operations Office, received the Secretary of Defense Employer Support Freedom Award at the Pentagon for its support of National Guard and Reserve employees.

432

Overexpression of Pto Activates Defense Responses and Confers Broad Resistance  

Science Journals Connector (OSTI)

...Langebartels C. Sandermann H. Jr. Van Montagu M. Inze D. Van Camp W. Defense activation and enhanced pathogen tolerance induced...Cladosporium fulvum. Walbot V. Maize mutants for the 21st century Wolter M. Hollricher K. Salamini F. Schulze-Lefert P...

Xiaoyan Tang; Mingtang Xie; Young Jin Kim; Jianmin Zhou; Daniel F. Klessig; Gregory B. Martin

433

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

1 HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks Wei Yu, Yan Sun and K. J disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node AND BACKGROUND A mobile ad hoc network is a group of mobile nodes without requiring centralized administration

Sun, Yan Lindsay

434

Defense from a distance ORNL robotics sensors detect underwater  

E-Print Network [OSTI]

SCIENCE Defense from a distance ORNL robotics sensors detect underwater explosive ordnance Modern of the future are not human oriented, but robotics oriented. For robots to perform their mission of safety at the forefront of robotics design, these are the droids we are looking for. ­Dylan Platz Karnowski analyzes

Pennycook, Steve

435

Doctoral Dissertation Defense "Modeling Conversions in Online Advertising"  

E-Print Network [OSTI]

Doctoral Dissertation Defense "Modeling Conversions in Online Advertising" By John Chandler-Pepelnjak This work investigates people who purchase online and how to predict such sales. Advertising as a field has if that potential is not realized. Academic marketers look at advertising through a traditional lens, measuring

Bardsley, John

436

Are three-dimensional spider webs defensive adaptations?  

E-Print Network [OSTI]

LETTER Are three-dimensional spider webs defensive adaptations? Todd A. Blackledge1 *, Jonathan A-mail: tab42@cornell.edu Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs have been primarily considered to be foraging adaptations, neglecting

Blackledge, Todd

437

Tests of the coupled expression of latex and cardenolide plant defense in common milkweed (Asclepias syriaca)  

E-Print Network [OSTI]

Most plants have an incredible diversity of defensive traits (Duffey and Stout 1996, Agrawal and Fishbein 2006, Gaquerel et al. 2010). Hy- potheses for the expression of multiple defensive v www

Agrawal, Anurag

438

Comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program  

Broader source: Energy.gov [DOE]

This document is a comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

439

TEMPORARY INSANITY: THE STRANGE LIFE AND TIMES OF THE PERFECT DEFENSE  

E-Print Network [OSTI]

............................................................................................. 1598 I. THE MYTH AND THE REALITY OF THE PERFECT DEFENSE ................ 1603 A. Myth........................................................................................... 1603 B. Reality

Finzi, Adrien

440

E-Print Network 3.0 - activates defense responses Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

crafted defense... --responding to a possible strategic bomber and missile ... Source: Colorado Technical University, Computer Science Department Collection: Computer...

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

E-Print Network 3.0 - activate defense responses Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

crafted defense... --responding to a possible strategic bomber and missile ... Source: Colorado Technical University, Computer Science Department Collection: Computer...

442

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided in order to equip the reader with an understanding of the context for the remaining chapters. The motives for using botnets and the methods in which they are used are outlined. The methods of botnet attack are then analysed in terms of their potential impact on information security and a conclusion is drawn that botnets are indeed a threat to information security in general terms. Chapter 2 then goes on to examine the extent of the threat from the three different perspectives of governments, corporate and the general public. The threats from each perspective and their impacts are identified, and each threat type for each perspective is then categorised in terms of probability and potential impact. The extent of the threat of each botnet-related attack from each perspective is then assessed using a model recommended by ISO/IEC 27005:2008, and the conclusion is drawn that the extent of the threat that botnets pose to governments, corporates and the general public is High. In Chapter 3, we look at how law enforcement agencies investigate botnets and the criminals behind them, and establish the challenges they face in doing so. It is clear that law enforcement face an uphill struggle due to technical tricks employed by the botherders to remain untraceable, lack of resources with the necessary skillset, the legal complexity of working with multiple jurisdictions, and procedural delays working with foreign law enforcement agencies. The conclusion is drawn that botnets are here to stay and that for the time being the botherders will have the upper hand.

Claire Elliott

2010-01-01T23:59:59.000Z

443

Reduction of fuel consumption  

Science Journals Connector (OSTI)

Replacing standard oil pumps with bypass control by regulated oil pumps with variable oil pressure which adapt their variable oil pumping quantity to the engine oil pressure requirements promises reductions in fuel

Dieter Voigt

2003-12-01T23:59:59.000Z

444

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is  

E-Print Network [OSTI]

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed resources within the Division of Student Life in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests intent to harm self

Rusu, Adrian

445

Superfund Record of Decision (EPA Region 8): Ogden Defense Depot, Operable Unit 1, Weber County, UT. (Second remedial action), June 1992  

SciTech Connect (OSTI)

Since 1941, the 1,100-acre Ogden Defense Depot (DDOU) site, located in Ogden, Weber County, Utah, has been a key installation in the Department of Defense supply system. Operable Unit 1, which is located in the southwest part of the DDOU, is composed of the backfill material in the Plain City Canal, Burial Site 1, and Burial Site 3-B. Burial Site 1 was reported to have been used for the disposal of riot control agent (chloroacetophenone) and white smoke (hexachloroethane) containers in the 1940's. In the early 1960's, Burial Site 3-B was reportedly the burying ground for over 1,000 arctic-style rubber boots. The ROD addresses a final remedy for OU1 that will reduce the principal threats posed by contaminated soil and shallow ground water at the site. The primary contaminants of concern affecting the soil, debris, and ground water are VOCs, including TCE; other organics, including dioxins and pesticides; and metals, including arsenic and lead.

Not Available

1992-06-26T23:59:59.000Z

446

Defense Office of Hearings & Appeals Decisions-Transportation and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 6 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions-Transportation and Contractual Claim Decisions 1996 Dataset Summary Description decisions involve a carrier's dispute over whether it is liable for transit loss or damage. They also include all kinds of quasi-contractual disputes which are settled under Section 3702 of title 31 of the United States Code. Tags {military,contractors,claims,transportation,damage} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated V34 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4476 Public Access Level public

447

Defense Office of Hearings & Appeals Decisions-Transportation and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9 9 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions-Transportation and Contractual Claim Decisions 1999 Dataset Summary Description decisions involve a carrier's dispute over whether it is liable for transit loss or damage. They also include all kinds of quasi-contractual disputes which are settled under Section 3702 of title 31 of the United States Code. Tags {military,contractors,claims,transportation,damage} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated V37 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4479 Public Access Level public

448

Defense Office of Hearings & Appeals Decisions-Transportation and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8 8 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions-Transportation and Contractual Claim Decisions 1998 Dataset Summary Description decisions involve a carrier's dispute over whether it is liable for transit loss or damage. They also include all kinds of quasi-contractual disputes which are settled under Section 3702 of title 31 of the United States Code. Tags {military,contractors,claims,transportation,damage} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated V36 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4478 Public Access Level public

449

Defense Office of Hearings & Appeals Decisions- Military Personnel Claim  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 6 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Military Personnel Claim Decisions - 2006 Dataset Summary Description decisions involve claims related to uniformed service members' pay, allowances, travel, transportation, retired pay, and survivor benefits Tags {"military personnel","government claims",pay,"military benefits","uniformed services",overpayment} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/29/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4471 Public Access Level public

450

Defense Office of Hearings & Appeals Decisions- Military Personnel Claim  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Military Personnel Claim Military Personnel Claim Decisions - 2010 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Military Personnel Claim Decisions - 2010 Dataset Summary Description decisions involve claims related to uniformed service members' pay, allowances, travel, transportation, retired pay, and survivor benefits Tags {"military personnel","government claims",pay,"military benefits","uniformed services",overpayment} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated V33 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4475

451

Defense Office of Hearings & Appeals Decisions-Transportation and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation and Transportation and Contractual Claim Decisions 1997 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions-Transportation and Contractual Claim Decisions 1997 Dataset Summary Description decisions involve a carrier's dispute over whether it is liable for transit loss or damage. They also include all kinds of quasi-contractual disputes which are settled under Section 3702 of title 31 of the United States Code. Tags {military,contractors,claims,transportation,damage} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated V35 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil

452

Microsoft Word - Defense Science Quarterly 03-09.doc  

National Nuclear Security Administration (NNSA)

March 2009 March 2009 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Carnegie-DOE Alliance Center 3 Cornell Center for the Study of Pulsed Power Driven High Energy Density Plasmas 4 Center of Excellence for Radioactive Ion Beam Studies for Stewardship Science 5 The Texas Center for High Intensity Laser Science 6 The Institute for Shock Physics, Washington State University 7 The High Pressure Science and Engineering Center at the University of Nevada, Las Vegas 8 HEDP Research at the Nevada Terawatt Facility 9 Publication Highlights and Awards and Highlights Message from the Director Chris Deeney, Defense Science Division This quarterly newsletter was very therapeutic. We are embroiled in so much budget action that taking the time

453

Materials evaluation programs at the Defense Waste Processing Facility  

SciTech Connect (OSTI)

The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided.

Gee, J.T.; Iverson, D.C.; Bickford, D.F.

1992-01-01T23:59:59.000Z

454

Materials evaluation programs at the Defense Waste Processing Facility  

SciTech Connect (OSTI)

The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided.

Gee, J.T.; Iverson, D.C.; Bickford, D.F.

1992-12-31T23:59:59.000Z

455

The Defense Nuclear Facilities Safety Board's first decade  

Science Journals Connector (OSTI)

Concern over the safety of the United States' defense nuclear reactors in the late 1980s led to congressional creation of an independent oversight board. The Defense Nuclear Facility Safeties Board (DNFSB) is responsible for overseeing safety issues at the U.S. Department of Energy's nuclear facilities and issuing recommendations on operations and safety at these facilities, which include South Carolina's Savannah River Site, Texas' Pantex facility, Colorado's Rocky Flats Depot, and others. This article provides an historical overview of the DNFSB's first decade and discusses its relationship and interaction with the Department of Energy and congressional oversight committees as well as the recommendations it has issued on nuclear safety. An assessment of DNFSB's future prospects concludes the article.

Bert Chapman

2000-01-01T23:59:59.000Z

456

Defense Office of Hearings & Appeals Decisions- Military Personnel Claim  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9 9 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Military Personnel Claim Decisions - 2009 Dataset Summary Description decisions involve claims related to uniformed service members' pay, allowances, travel, transportation, retired pay, and survivor benefits Tags {"military personnel","government claims",pay,"military benefits","uniformed services",overpayment} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated V32 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4474 Public Access Level public

457

Sludge Mass Reduction Update  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Farm Mixing and Sampling to Support DWPF Operations Farm Mixing and Sampling to Support DWPF Operations David Larsen, PMP, PSP Hasmukh Shah Liquid Waste Engineering Washington Savannah River Company May 21, 2009 2 LWO-LWP-2009-00021 Overview Background Mixing - Historical - Criteria - Current Strategy Sampling Techniques and Procedure Defense Waste Processing Facility (DWPF) Requirements - Waste Acceptance Criteria - Tank Farm Compliance 3 LWO-LWP-2009-00021 Sludge Batch Preparation and Feed Tank 51 (Batch Tank) Sludge from one or more waste storage tanks *Mixing by Pumps *Wash *Settle *Decant *Sample Qualified Batch Transferred Forward *Mixing by Pumps *Sample Bulk Waste Removal Tank(s) Tank 40 (Blend Tank) *10,000 gal vessel *Mixing by Agitator *Sample *10,000 gal vessel *Mixing by Agitator *Sample *Wetting *Mixing by Pumps

458

Nuclear Weapon Surety Interface with the Department of Defense  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order prescribes how the Department of Energy participates with the Department of Defense (DoD) to ensure the surety (safety, security and control) of military nuclear weapon systems deployed around the world. The Order establishes National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the DoD. Cancels DOE O 5610.13. Canceled by DOE O 452.6A.

2006-10-19T23:59:59.000Z

459

Strategic defense initiatives at Los Alamos National Laboratory  

SciTech Connect (OSTI)

This presentation reviews the Strategic Defense Initiative (SDI) programs at Los Alamos National Laboratory, noting especially the needs for and applications of optics and optical technologies. Table I lists the various activities at Los Alamos contributing to SDI programs. The principal, nonnuclear SDI programs are: (1) the free-electron laser, and (2) neutral particle beams. Both should be considered as potential long-range-kill systems, but still in the futuristic category.

Rockwood, S.D.

1985-01-01T23:59:59.000Z

460

A Dictionary for Transparency  

SciTech Connect (OSTI)

There are many terms that are used in association with the U.S. Defense Threat Reduction Agency (DTRA) Transparency Project associated with the Mayak Fissile Materials Storage Facility. This is a collection of proposed definitions of these terms.

Kouzes, Richard T.

2001-11-15T23:59:59.000Z

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Assessing the integrity of local area network materials accountability systems against insider threats  

SciTech Connect (OSTI)

DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems.

Jones, E.; Sicherman, A.

1996-07-01T23:59:59.000Z

462

Comprehensive test ban treaty international monitoring system security threats and proposed security attributes  

SciTech Connect (OSTI)

To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

Draelos, T.J.; Craft, R.L.

1996-03-01T23:59:59.000Z

463

National Defense Industrial Association distributed netted anti?submarine warfare systems study  

Science Journals Connector (OSTI)

The NDIA Undersea Warfare Division was tasked by the US Navy Director Sea Shield OPNAV N87 to formulate new DNS concepts to hold enemy forces at risk to secure a friendly maneuver area and to assure access world?wide. The new DNS concepts are focused on the Port Egress and Sea Base scenarios end?points in the spectrum of ASW operations. The threat comprises a large number of widely dispersed quiet diesel?electric AIP and nuclear submarines in the year 2015. The study team established that new DNS concepts derive advanced capability from expansion of four critical DNS functions: Deployment sensing communications and C2. Seven Port Egress and five Sea Base concepts are each described including: An operating concept identification of critical components description of capabilities that each concept offers and a functional binning diagram. The new DNS concepts were ranked and scored on a set of ASW utility attributes specific to either the port egress or sea base scenario. Concepts were evaluated for potential reductions in the detect to engage sequence and enabling technologies were identified. The study summary conclusions and recommendations were presented to the Chairman ASW Cross?Functional Board RADM C. Van Mauney on 5 June 2007.

Thomas A. Casey

2007-01-01T23:59:59.000Z

464

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network [OSTI]

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures Federico Maggi, and to what extent these abuses can impact the end users. With these questions in mind, we first analyzed and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

California at Santa Barbara, University of

465

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network [OSTI]

DRAFT COPY Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures URLs, and to what extent these abuses can impact the end users. With these questions in mind, we first and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

Vigna, Giovanni

466

Analysis and Modelling of Fraud and Revenue Assurance Threats in Future Telecommunications Network and Service Environments  

E-Print Network [OSTI]

Analysis and Modelling of Fraud and Revenue Assurance Threats in Future Telecommunications Network and revenue assurance in future telecommunication network and service environments. 1. Introduction, usually, to obtain property or services from him or her unjustly [1]. The Telecommunications (Fraud) Act

Haddadi, Hamed

467

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats  

E-Print Network [OSTI]

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

Wang, Wenye

468

Evaluating and managing the integrity of computerized accountability systems against insider threats  

SciTech Connect (OSTI)

Accountability applications such as nuclear material accountability systems at Department of Energy (DOE) facilities provide for tracking inventories, documenting transactions, issuing periodic reports, and assisting in the detection of unauthorized system access and data falsification. Insider threats against the system represent the potential to degrade the integrity with which these functions are addressed. While preventing unauthorized access by external threats is vital, it is also critical to understand how application features affect the ability of insiders to impact the integrity of data in the system. Aspects of modern computing systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased software knowledge and skills help heighten the concern about insider threats. A question arises as follows. How can managers and policy makers logically and pragmatically analyze the myriad customization and design options for accountability applications with respect to the insider threat. In this paper, we describe a methodology for addressing this question, along with insights from its application to local area network (LAN) material accountability systems.

Jones, E.; Sicherman, A.

1996-06-01T23:59:59.000Z

469

What You Need to Know about the Threat to Forests in Colorado  

E-Print Network [OSTI]

locations throughout the western U.S., including Colorado. Detecting GM GM traps in a tree9 (leftGypsy Moth What You Need to Know about the Threat to Forests in Colorado Controlling GM Quarantines to become established in Colorado a response plan would be executed by state and federal agencies

470

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions  

E-Print Network [OSTI]

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions Dung V hack tools. However, beside U3 technology, attackers also have another more flexible alternative, portable application or application virtualization, which allows a wide range of hack tools to be compiled

Halgamuge, Malka N.

471

Marine biodiversity in the Caribbean UK overseas territories: Perceived threats and constraints to environmental management  

Science Journals Connector (OSTI)

Islands are often considered to be a priority for conservation, because of their relatively high levels of biodiversity and their vulnerability to a range of natural and anthropogenic threats. However, the capacity of islands to conserve and manage biodiversity may depend upon their governance structures. Many island states are affiliated to other countries through an overseas territory status, which may provide them with access to resources and support mechanisms, but which may also influence the capacity for local-scale management of environmental issues. The United Kingdom has 12 island Overseas Territories (UKOTs), most of which support biodiversity of high conservation concern. This study investigates perceptions of current and future threats to marine ecosystems and constraints to environmental protection on the six Caribbean UKOTs, through semi-structured interviews with officials from UK and UKOT government departments and non-governmental organisations. Coastal development, pollution and over-fishing were perceived as threats of most concern for the next decade, but climate change was perceived as by far the greatest future threat to the islands' marine ecosystems. However, a series of common institutional limitations that currently constrain mitigation and conservation efforts were also identified, including insufficient personnel and financial support, a lack of long-term, sustainable projects for persistent environmental problems and inadequate environmental legislation. These findings highlight the need for regional cooperation and capacity-building throughout the Caribbean and a more concerted approach to an UKOT environmental management by the UK and UKOTs' governments.

J. Forster; I.R. Lake; A.R. Watkinson; J.A. Gill

2011-01-01T23:59:59.000Z

472

Recent advances to address European Union Health Security from cross border chemical health threats  

Science Journals Connector (OSTI)

Abstract The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development.

R. Duarte-Davidson; R. Orford; S. Wyke; M. Griffiths; R. Amlt; R. Chilcott

2014-01-01T23:59:59.000Z

473

Reducing the Wildland Fire Threat to Homes: Where and How Much?1  

E-Print Network [OSTI]

Reducing the Wildland Fire Threat to Homes: Where and How Much?1 Jack D. Cohen2 Abstract Understanding how ignitions occur is critical for effectively mitigating home fire losses during wildland fires, and local agencies that have responsibilities involving homes within and adjacent to wildlands. Agencies

Standiford, Richard B.

474

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided ...

Claire Elliott

2010-08-01T23:59:59.000Z

475

Factoring species, non-species values and threats into biodiversity prioritisation across the ecoregions  

E-Print Network [OSTI]

population density, and the extinction risk of species. This threat index is positively correlated with all the ecoregions of Africa and its islands Neil D. Burgessa,b, *, Jennifer D'Amico Halesa , Taylor H. Rickettsa I N F O Article history: Received 3 September 2004 Available online 11 October 2005 Keywords: Africa

Vermont, University of

476

Threat-based evaluation for context-aware multimedia surveillance system  

Science Journals Connector (OSTI)

Multimedia surveillance has become commonplace and getting increasingly intelligent in recent years. The technological advances in computer-vision techniques help to detect suspicious movement and identify objects. Meanwhile, as surveillance system is ... Keywords: context-aware, cost, multimedia surveillance, privacy, security, threat evaluation

Yuan Tian; Biao Song; Mznah Al-Rodhaan; Abdullah Al-Dhelaan; Eui-Nam Huh

2014-01-01T23:59:59.000Z

477

Definitions for PADD: Petroleum Administration for Defense Districts  

Gasoline and Diesel Fuel Update (EIA)

PADD Definitions PADD Definitions PADD: Petroleum Administration for Defense Districts PAD District 1 (East Coast) is composed of the following three subdistricts: Subdistrict 1A (New England): Connecticut, Maine, Massachusetts, New Hampshire, Rhode Island, Vermont. Subdistrict 1B (Central Atlantic): Delaware, District of Columbia, Maryland, New Jersey, New York, Pennsylvania. Subdistrict 1C (Lower Atlantic): Florida, Georgia, North Carolina, South Carolina, Virginia, West Virginia. PAD District 2 (Midwest): Illinois, Indiana, Iowa, Kansas, Kentucky, Michigan, Minnesota, Missouri, Nebraska, North Dakota, South Dakota, Ohio, Oklahoma, Tennessee, Wisconsin. PAD District 3 (Gulf Coast): Alabama, Arkansas, Louisiana, Mississippi, New Mexico, Texas. PAD District 4 (Rocky Mountain): Colorado, Idaho, Montana, Utah, Wyoming.

478

Identification of Genomic Signatures for the Design of Assays for the Detection and Monitoring of Anthrax Threats  

E-Print Network [OSTI]

of Anthrax Threats S. Draghici, P. Khatri, Y. Liu, K.J. Chase, E.A. Bode, D.A. Kulesh, L.P. Wasieloski, D OF ASSAYS FOR THE DETECTION AND MONITORING OF ANTHRAX THREATS SORIN DRAGHICI1, , PURVESH KHATRI1

479

Comments of the Natural Resource Defense Council on DOE's Request for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of the Natural Resource Defense Council on DOE's Request of the Natural Resource Defense Council on DOE's Request for Information on Reducing Regulatory Burden Comments of the Natural Resource Defense Council on DOE's Request for Information on Reducing Regulatory Burden On behalf of the Natural Resources Defense Council and our more than 1.3 million members and online activists, we submit the following comments in response to the Department of Energy's (DOE) Request for Information on Reducing Regulatory Burden. Comments_of_the_NRD Council_RRB_RFI_June2012.pdf More Documents & Publications Natural Resources Defense Council Comments of the Natural Resource Defense Council on Energy Efficiency and Sustainable Design Standards for New Federal Buildings; Notice of Proposed Rulemaking DOE Preliminary Plan for Retrospective Analysis of Existing Rules

480

Legacy Management Work Progresses on Defense-Related Uranium Mines Report  

Broader source: Energy.gov (indexed) [DOE]

Legacy Management Work Progresses on Defense-Related Uranium Mines Legacy Management Work Progresses on Defense-Related Uranium Mines Report to Congress Legacy Management Work Progresses on Defense-Related Uranium Mines Report to Congress October 23, 2013 - 1:35pm Addthis What does this project do? Goal 4. Optimize the use of land and assets The U.S. Department of Energy Office of Legacy Management (LM) continues to work on a report to Congress regarding defense-related legacy uranium mines. LM was directed by the U.S. Congress in the National Defense Authorization Act for Fiscal Year 2013 to undertake a review of, and prepare a report on, abandoned uranium mines in the United States that provided uranium ore for atomic energy defense activities. The report is due to Congress by July 2014. LM is compiling uranium mine data from federal, state, and tribal agencies

Note: This page contains sample records for the topic "defense threat reduction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Inducible Defense against Pathogens and Parasites: Optimal Choice among Multiple Options  

Science Journals Connector (OSTI)

Defense against pathogen, parasites and herbivores is often enhanced after their invasion into the host's body. Sometimes different options are adopted depending on the identity and the quantity of the pathogen, exemplified by the switch between Th1 and Th2 systems in mammalian immunity. In this paper, we study the optimal defense of the host when two alternative responses are available, which differ in the effectiveness of suppressing the growth of pathogen (parasite, or herbivore), the damage to the host caused by the defense response, and the magnitude of time delay before the defense response becomes fully effective. The optimal defense is the one that minimizes the sum of the damages caused by the pathogen and the cost due to defense activities. The damage by pathogens increases in proportion to the time integral of the pathogen abundance, and the cost is proportional to the defense activity. We can prove that a single globally optimal combination of defense options always exists and there is no other local optimum. Depending on the parameters, the optimal is to adopt only the early response, only the late response, or both responses. The defense response with a shorter time delay is more heavily used when the pathogen grows fast, the initial pathogen abundance is large, and the difference in time delay is long. We also study the host's optimal choice between constitutive and inducible defenses. In the constitutive defense, the response to pathogen attack works without delay, but it causes the cost even when the pathogen attack does not occur. We discuss mammalian immunity and the plant chemical defense from the model's viewpoint.

EMI SHUDO; YOH IWASA

2001-01-01T23:59:59.000Z

482

TO: DOE Office of General Counsel, FROM: Robin Roy, Natural Resources Defense Council, rroy@nrdc.org  

Broader source: Energy.gov (indexed) [DOE]

DOE Office of General Counsel, DOE Office of General Counsel, FROM: Robin Roy, Natural Resources Defense Council, rroy@nrdc.org DATE: February 26, 2013 RE: Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 This memo provides an overview of communications made to DOE staff on the subject of the rulemaking referenced above. The communications occurred at a meeting held on February 13, 2013. Meeting attendees: DOE Kathleen Hogan (DOE/EERE) Chris Calamita (DOE/OGC) Timothy Unruh (DOE/EERE) Dan Cohen (DOE/OGC) John Cymbalsky (DOE/EERE) Ami Grace-Tardy (DOE/OGC) Alyssa Sullivan (DOE/EERE) Sarah Jensen (DOE/EERE Sarah Blackwood DOE EERE leg

483

Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000  

SciTech Connect (OSTI)

This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2001-03-01T23:59:59.000Z

484

Defense High-Level Waste Leaching Mechanisms Program. Final report  

SciTech Connect (OSTI)

The Defense High-Level Waste Leaching Mechanisms Program brought six major US laboratories together for three years of cooperative research. The participants reached a consensus that solubility of the leached glass species, particularly solubility in the altered surface layer, is the dominant factor controlling the leaching behavior of defense waste glass in a system in which the flow of leachant is constrained, as it will be in a deep geologic repository. Also, once the surface of waste glass is contacted by ground water, the kinetics of establishing solubility control are relatively rapid. The concentrations of leached species reach saturation, or steady-state concentrations, within a few months to a year at 70 to 90/sup 0/C. Thus, reaction kinetics, which were the main subject of earlier leaching mechanisms studies, are now shown to assume much less importance. The dominance of solubility means that the leach rate is, in fact, directly proportional to ground water flow rate. Doubling the flow rate doubles the effective leach rate. This relationship is expected to obtain in most, if not all, repository situations.

Mendel, J.E. (compiler)

1984-08-01T23:59:59.000Z

485

Administrator D'Agostino's Remarks at the National Defense University Forum  

National Nuclear Security Administration (NNSA)

National Defense University Forum National Defense University Forum Congressional Breakfast Seminar | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > Administrator D'Agostino's Remarks at the National Defense ... Speech Administrator D'Agostino's Remarks at the National Defense University Forum

486

Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995  

Broader source: Energy.gov [DOE]

Defense Programs has undertaken an effort to compare the competencies in the GeneralTechnical Base Qualification Standard and the Functional Area Qualification Standards withvarious positions in...

487

Feasibility of very deep borehole disposal of US nuclear defense wastes .  

E-Print Network [OSTI]

??This thesis analyzes the feasibility of emplacing DOE-owned defense nuclear waste from weapons production into a permanent borehole repository drilled ~4 km into granite basement (more)

Dozier, Frances Elizabeth

2011-01-01T23:59:59.000Z

488

Defense Attorneys' Perceptions of Competency to Stand Trial Evaluations in Oklahoma: A Second Look.  

E-Print Network [OSTI]

??The purpose of this study was to examine Oklahoma defense attorneys' perceptions of competency to stand trial evaluations. Participants in this study were 47 attorneys (more)

Graham, Angila

2007-01-01T23:59:59.000Z

489

2012 Annual Planning Summary for NNSA Defense Nuclear NonProliferation  

Broader source: Energy.gov [DOE]

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2012 and 2013 within the NNSA Defense Nuclear NonProliferation.

490

DOE Submits Its Defense-Related Uranium Mines Report to Congress...  

Broader source: Energy.gov (indexed) [DOE]

3151 of the National Defense Authorization Act for Fiscal Year 2013 mandated that DOE, "... undertake a review of, and prepare a report on, abandoned uranium mines in the...

491

Tomato-Potato Aphid Interactions: Insights into Plant Defense and the Aphid Pest  

E-Print Network [OSTI]

induced defenses in tomato on the potato aphid, Macrosiphumin arbuscular mycorrhizal potato root colonization. Funct.and behavior of the potato aphid, Macrosiphum euphorbiae.

Atamian, Hagop Sarkis

2012-01-01T23:59:59.000Z

492

Japans Defense Industry, Scienceand Technology in the NortheastAsia Strategic Landscape  

E-Print Network [OSTI]

supply chain structure, Japan can maintain its strategicindustries go abroad, Japans current strategic advantageDefense Studies in Tokyo, Japan. His areas of expertise are

TAKAHASHI, Sugio

2012-01-01T23:59:59.000Z

493

Development Of Ion Chromatography Methods To Support Testing Of The Glycolic Acid Reductant Flowsheet In The Defense Waste Processing Facility  

SciTech Connect (OSTI)

Ion Chromatography (IC) is the principal analytical method used to support studies of Sludge Reciept and Adjustment Tank (SRAT) chemistry at DWPF. A series of prior analytical ''Round Robin'' (RR) studies included both supernate and sludge samples from SRAT simulant, previously reported as memos, are tabulated in this report.2,3 From these studies it was determined to standardize IC column size to 4 mm diameter, eliminating the capillary column from use. As a follow on test, the DWPF laboratory, the PSAL laboratory, and the AD laboratory participated in the current analytical RR to determine a suite of anions in SRAT simulant by IC, results also are tabulated in this report. The particular goal was to confirm the laboratories ability to measure and quantitate glycolate ion. The target was + or - 20% inter-lab agreement of the analyte averages for the RR. Each of the three laboratories analyzed a batch of 12 samples. For each laboratory, the percent relative standard deviation (%RSD) of the averages on nitrate, glycolate, and oxalate, was 10% or less. The three laboratories all met the goal of 20% relative agreement for nitrate and glycolate. For oxalate, the PSAL laboratory reported an average value that was 20% higher than the average values reported by the DWPF laboratory and the AD laboratory. Because of this wider window of agreement, it was concluded to continue the practice of an additional acid digestion for total oxalate measurement. It should also be noted that large amounts of glycolate in the SRAT samples will have an impact on detection limits of near eluting peaks, namely Fluoride and Formate. A suite of scoping experiments are presented in the report to identify and isolate other potential interlaboratory disceprancies. Specific ion chromatography inter-laboratory method conditions and differences are tabulated. Most differences were minor but there are some temperature control equipment differences that are significant leading to a recommendation of a heated jacket for analytical columns that are remoted for use in radiohoods. A suggested method improvement would be to implement column temperture control at a temperature slightly above ambient to avoid peak shifting due to temperature fluctuations. Temperature control in this manner would improve short and longer term peak retention time stability. An unknown peak was observed during the analysis of glycolic acid and SRAT simulant. The unknown peak was determined to best match diglycolic acid. The development of a method for acetate is summaraized, and no significant amount of acetate was observed in the SRAT products tested. In addition, an alternative Gas Chromatograph (GC) method for glycolate is summarized.

Wiedenman, B. J.; White, T. L.; Mahannah, R. N.; Best, D. R.; Stone, M. E.; Click, D. R.; Lambert, D. P.; Coleman, C. J.

2013-10-01T23:59:59.000Z

494

Defensive Investments and the Demand for Air Quality: Evidence from the NOx Budget Program and Ozone Reductions  

E-Print Network [OSTI]

The economic costs of environmental regulations have been widely debated since the U.S. began to restrict pollution emissions more than four decades ago. Using detailed production data from nearly 1.2 million plant ...

Deschnes, Olivier

2012-07-15T23:59:59.000Z

495

SELECTION AND PRELIMINARY EVALUATION OF ALTERNATIVE REDUCTANTS FOR SRAT PROCESSING  

SciTech Connect (OSTI)

Defense Waste Processing Facility - Engineering (DWPF-E) has requested the Savannah River National Laboratory (SRNL) to perform scoping evaluations of alternative flowsheets with the primary focus on alternatives to formic acid during Chemical Process Cell (CPC) processing. The reductants shown below were selected for testing during the evaluation of alternative reductants for Sludge Receipt and Adjustment Tank (SRAT) processing. The reductants fall into two general categories: reducing acids and non-acidic reducing agents. Reducing acids were selected as direct replacements for formic acid to reduce mercury in the SRAT, to acidify the sludge, and to balance the melter REDuction/OXidation potential (REDOX). Non-acidic reductants were selected as melter reductants and would not be able to reduce mercury in the SRAT. Sugar was not tested during this scoping evaluation as previous work has already been conducted on the use of sugar with DWPF feeds. Based on the testing performed, the only viable short-term path to mitigating hydrogen generation in the CPC is replacement of formic acid with a mixture of glycolic and formic acids. An experiment using glycolic acid blended with formic on an 80:20 molar basis was able to reduce mercury, while also targeting a predicted REDuction/OXidation (REDOX) of 0.2 expressed as Fe{sup 2+}/{Sigma}Fe. Based on this result, SRNL recommends performing a complete CPC demonstration of the glycolic/formic acid flowsheet followed by a design basis development and documentation. Of the options tested recently and in the past, nitric/glycolic/formic blended acids has the potential for near term implementation in the existing CPC equipment providing rapid throughput improvement. Use of a non-acidic reductant is recommended only if the processing constraints to remove mercury and acidify the sludge acidification are eliminated. The non-acidic reductants (e.g. sugar) will not reduce mercury during CPC processing and sludge acidification would require large amounts of nitric acid (and subsequently larger reductant additions) unless a reducing acid is also used.

Stone, M.; Pickenheim, B.; Peeler, D.

2009-06-30T23:59:59.000Z

496

Status of Environmental Management Initiatives to Accelerate the Reduction of Environmental Risks and Challenges Posed by the Legacy of the Cold War  

Broader source: Energy.gov [DOE]

This Report to Congress was prepared pursuant to section 3130 of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2008, and summarized the EM program and initiatives to accelerate the reduction of environmental risks and challenges posed by the legacy of the Cold War.

497

An approach to determine a defensible spent fuel ratio.  

SciTech Connect (OSTI)

Sabotage of spent nuclear fuel casks remains a concern nearly forty years after attacks against shipment casks were first analyzed and has a renewed relevance in the post-9/11 environment. A limited number of full-scale tests and supporting efforts using surrogate materials, typically depleted uranium dioxide (DUO2), have been conducted in the interim to more definitively determine the source term from these postulated events. In all the previous studies, the postulated attack of greatest interest was by a conical shape charge (CSC) that focuses the explosive energy much more efficiently than bulk explosives. However, the validity of these large-scale results remain in question due to the lack of a defensible Spent Fuel Ratio (SFR), defined as the amount of respirable aerosol generated by an attack on a mass of spent fuel compared to that of an otherwise identical DUO2 surrogate. Previous attempts to define the SFR have resulted in estimates ranging from 0.42 to 12 and include suboptimal experimental techniques and data comparisons. Different researchers have suggested using SFR values of 3 to 5.6. Sound technical arguments exist that the SFR does not exceed a value of unity. A defensible determination of the SFR in this lower range would greatly reduce the calculated risk associated with the transport and dry storage of spent nuclear fuel. Currently, Oak Ridge National Laboratory (ORNL) is in possession of several samples of spent nuclear fuel (SNF) that were used in the original SFR studies in the 1980's and were intended for use in a modern effort at Sandia National Laboratories (SNL) in the 2000's. A portion of these samples are being used for a variety of research efforts. However, the entirety of SNF samples at ORNL is scheduled for disposition at the Waste Isolation Pilot Plant (WIPP) by approximately the end of 2015. If a defensible SFR is to be determined for use in storage and transportation security analyses, the need to begin this effort is urgent in order to secure the only known available SNF samples with a clearly defined path to disposal.

Durbin, Samuel G.; Lindgren, Eric Richard

2014-03-01T23:59:59.000Z

498

Economics of Grade Reduction  

E-Print Network [OSTI]

the following abbreviations are used:* C25 diameter in inches of high pressure cylinder. c= diameter in inches of low pressure cylinder. P= boiler pressure. R}= ratio of mean effective pressure to boiler pressure in low pressure cylinder, taken from Pig. E.... But the only error of moment in such case will be in the es- timated saving in train mileage, for the same degree of efficiency or inefficiency is to be expected after the reduction of grade as before. As the estimated saving per train mile as given...

Neff, Paul J.

1914-02-10T23:59:59.000Z

499

Microsoft Word - Threat Analysis Framework Sept07_comments-final.doc  

Broader source: Energy.gov (indexed) [DOE]

5792 5792 Unlimited Release September 2007 Threat Analysis Framework David P. Duggan and John T. Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Threat Analysis Framework 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

500

Hydrogen economy in China: Strengthsweaknessesopportunitiesthreats analysis and strategies prioritization  

Science Journals Connector (OSTI)

Abstract The objective of this paper is to analyze the internal and external environment of hydrogen economy in China using strengthsweaknessesopportunitiesthreats (SWOT) analytical method, and then to prioritize the strategies for promoting the development of hydrogen economy in China. After the key strengths, weaknesses, opportunities and threats of the hydrogen economy in China were identified and nine effective strategies were proposed, a multi-criteria decision-making method by integrating goal programming and fuzzy theory has been developed for prioritizing these strategies, which can help the stakeholders/decision-makers to implement these strategies appropriately, The proposed method is not limited to China, and it is a generic method that can also be used to study the hydrogen economy of other regions.

Jingzheng Ren; Suzhao Gao; Shiyu Tan; Lichun Dong

2015-01-01T23:59:59.000Z