Sample records for defense threat reduction

  1. DEFENSE THREAT REDUCTION AGENCY 8725 JOHN J . KINGMAN ROAD, STOP 620 1

    E-Print Network [OSTI]

    Spence, Harlan Ernest

    DEFENSE THREAT REDUCTION AGENCY 8725 JOHN J . KINGMAN ROAD, STOP 620 1 FORT BELVOIR, VA 22060-6201 February 28, 2013 Industry and Academia Partners of the Defense Threat Reduction Agency and U.S. Strategic of unceltainty for the entire Department of Defense. The Def1 ns Threat Reduction Agency and U. S. Strategic

  2. Radiological Threat Reduction | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Radiation Protection Regulations:Radiological Threat Reduction SHARE

  3. Metamaterials for threat reduction applications: imaging, signal processing, and cloaking

    E-Print Network [OSTI]

    Metamaterials for threat reduction applications: imaging, signal processing, and cloaking R. D effort is underway to fill this "THz gap" in view of potential threat reduction applications) and Theoretical Divisions, are exploring metamaterials-based de- vices operating at THz frequencies for threat

  4. Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems

    E-Print Network [OSTI]

    Menascé, Daniel A.

    Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

  5. NNSA's Global Threat Reduction Initiative launches mobile app...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog NNSA's Global Threat Reduction Initiative launches mobile app...

  6. NNSA's Global Threat Reduction Initiative Removes More Than One...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog NNSA's Global Threat Reduction Initiative Removes More ......

  7. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    SciTech Connect (OSTI)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24T23:59:59.000Z

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  8. Global threat reduction initiative Russian nuclear material removal progress

    SciTech Connect (OSTI)

    Cummins, Kelly [DOE/NNSA (United States); Bolshinsky, Igor [INL/NNSA (United States)

    2008-07-15T23:59:59.000Z

    In December 1999 representatives from the United States, the Russian Federation, and the International Atomic Energy Agency (IAEA) started discussing a program to return to Russia Soviet- or Russian-supplied highly enriched uranium (HEU) fuel stored at the Russian-designed research reactors outside Russia. Trilateral discussions among the United States, Russian Federation, and the International Atomic Energy Agency (IAEA) have identified more than 20 research reactors in 17 countries that have Soviet- or Russian-supplied HEU fuel. The Global Threat Reduction Initiative's Russian Research Reactor Fuel Return Program is an important aspect of the U.S. Government's commitment to cooperate with the other nations to prevent the proliferation of nuclear weapons and weapons-usable proliferation-attractive nuclear materials. To date, 496 kilograms of Russian-origin HEU have been shipped to Russia from Serbia, Latvia, Libya, Uzbekistan, Romania, Bulgaria, Poland, Germany, and the Czech Republic. The pilot spent fuel shipment from Uzbekistan to Russia was completed in April 2006. (author)

  9. AMBASSADOR BONNIE D. JENKINS Coordinator, Threat Reduction Programs,

    E-Print Network [OSTI]

    to address these challenges? How can PNNL's capabilities--from basic science through technology development, deployment, and training--address emerging threats? For more information, please contact PNNL's Center for Global Security. Jana Fankhauser, Director, jana.fankhauser@pnl.gov · http://cgs.pnnl.gov PNNL-SA-78562

  10. Economic evaluation of volume reduction for Defense transuranic waste

    SciTech Connect (OSTI)

    Brown, C.M.

    1981-07-01T23:59:59.000Z

    This study evaluates the economics of volume reduction of retrievably stored and newly generated DOE transuranic waste by comparing the costs of reduction of the waste with the savings possible in transportation and disposal of the waste. The report develops a general approach to the comparison of TRU waste volume reduction costs and cost savings, establishes an initial set of cost data, and develops conclusions to support selecting technologies and facilities for the disposal of DOE transuranic waste. Section I outlines the analysis which considers seven types of volume reduction from incineration and compaction of combustibles to compaction, size reduction, shredding, melting, and decontamination of metals. The study considers the volume reduction of contact-handled newly generated, and retrievably stored DOE transuranic waste. Section II of this report describes the analytical approach, assumptions, and flow of waste material through sites. Section III presents the waste inventories, disposal, and transportation savings with volume reduction and the volume reduction techniques and savings.

  11. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01T23:59:59.000Z

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  12. The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation

    SciTech Connect (OSTI)

    Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

    2012-06-04T23:59:59.000Z

    After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

  13. Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan

    SciTech Connect (OSTI)

    Pereira, Mario M.; Slonecker, Bruce D.

    2012-06-01T23:59:59.000Z

    The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNL’s support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

  14. An overview of the global threat reduction initiative's physical protection work in Tanzania.

    SciTech Connect (OSTI)

    Banzi, Firmi Paul (Tanzania Atomic Energy Commission Arusha, United Republic of Tanzania); Itamura, Michael Takeshi (U.S. Department of Energy National Nuclear Security Administration, Washington, DC); Robinson, Phillip W. (U.S. Department of Energy National Nuclear Security Administration, Washington, DC); Strosinski, Micheal Vernon

    2010-06-01T23:59:59.000Z

    The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) established the Global Threat Reduction Initiative's (GTRI) mission to reduce and protect nuclear and radiological materials located at civilian sites worldwide. Internationally, over 80 countries are cooperating with GTRI to enhance security of facilities with these materials. In 2004, a GTRI delegation began working with the Tanzania Atomic Energy Commission, (TAEC). The team conducted site assessments for the physical protection of radiological materials in Tanzania. Today, GTRI and the Government of Tanzania continue cooperative efforts to enhance physical security at several radiological sites, including a central sealed-source storage facility, and sites in the cities of Arusha, Dar Es Salaam, and Tanga. This paper describes the scope of physical protection work, lessons learned, and plans for future cooperation between the GTRI program and the TAEC. Additionally the paper will review the cooperative efforts between TAEC and the International Atomic Energy Agency (IAEA) with regards to a remote monitoring system at a storage facility and to the repackaging of radioactive sources.

  15. Global Threat Reduction Initiative Fuel Thermo-Physical Characterization Project: Sample Management Plan

    SciTech Connect (OSTI)

    Casella, Amanda J.; Pereira, Mario M.; Steen, Franciska H.

    2013-01-01T23:59:59.000Z

    This sample management plan provides guidelines for sectioning, preparation, acceptance criteria, analytical path, and end-of-life disposal for the fuel element segments utilized in the Global Threat Reduction Initiative (GTRI), Fuel Thermo-Physical Characterization Project. The Fuel Thermo-Physical Characterization Project is tasked with analysis of irradiated Low Enriched Uranium (LEU) Molybdenum (U-Mo) fuel element samples to support the GTRI conversion program. Sample analysis may include optical microscopy (OM), scanning electron microscopy (SEM) fuel-surface interface analysis, gas pycnometry (density) measurements, laser flash analysis (LFA), differential scanning calorimetry (DSC), thermogravimetry and differential thermal analysis with mass spectroscopy (TG /DTA-MS), Inductively Coupled Plasma Spectrophotometry (ICP), alpha spectroscopy, and Thermal Ionization Mass Spectroscopy (TIMS). The project will utilize existing Radiochemical Processing Laboratory (RPL) operating, technical, and administrative procedures for sample receipt, processing, and analyses. Test instructions (TIs), which are documents used to provide specific details regarding the implementation of an existing RPL approved technical or operational procedure, will also be used to communicate to staff project specific parameters requested by the Principal Investigator (PI). TIs will be developed, reviewed, and issued in accordance with the latest revision of the RPL-PLN-700, RPL Operations Plan. Additionally, the PI must approve all project test instructions and red-line changes to test instructions.

  16. Cyber Defense Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    infrastructure. New threats demand new defenses Page-3 SPIDERS Program Summary CAMP SMITH ENERGY ISLAND * Entire Installation Smart Microgrid * Islanded Installation * High...

  17. IMPACTS OF ANTIFOAM ADDITIONS AND ARGON BUBBLING ON DEFENSE WASTE PROCESSING FACILITY REDUCTION/OXIDATION

    SciTech Connect (OSTI)

    Jantzen, C.; Johnson, F.

    2012-06-05T23:59:59.000Z

    During melting of HLW glass, the REDOX of the melt pool cannot be measured. Therefore, the Fe{sup +2}/{Sigma}Fe ratio in the glass poured from the melter must be related to melter feed organic and oxidant concentrations to ensure production of a high quality glass without impacting production rate (e.g., foaming) or melter life (e.g., metal formation and accumulation). A production facility such as the Defense Waste Processing Facility (DWPF) cannot wait until the melt or waste glass has been made to assess its acceptability, since by then no further changes to the glass composition and acceptability are possible. therefore, the acceptability decision is made on the upstream process, rather than on the downstream melt or glass product. That is, it is based on 'feed foward' statistical process control (SPC) rather than statistical quality control (SQC). In SPC, the feed composition to the melter is controlled prior to vitrification. Use of the DWPF REDOX model has controlled the balanjce of feed reductants and oxidants in the Sludge Receipt and Adjustment Tank (SRAT). Once the alkali/alkaline earth salts (both reduced and oxidized) are formed during reflux in the SRAT, the REDOX can only change if (1) additional reductants or oxidants are added to the SRAT, the Slurry Mix Evaporator (SME), or the Melter Feed Tank (MFT) or (2) if the melt pool is bubble dwith an oxidizing gas or sparging gas that imposes a different REDOX target than the chemical balance set during reflux in the SRAT.

  18. ANION ANALYSES BY ION CHROMATOGRAPHY FOR THE ALTERNATE REDUCTANT DEMONSTRATION FOR THE DEFENSE WASTE PROCESSING FACILITY

    SciTech Connect (OSTI)

    Best, D.

    2010-08-04T23:59:59.000Z

    The Process Science Analytical Laboratory (PSAL) at the Savannah River National Laboratory was requested by the Defense Waste Processing Facility (DWPF) to develop and demonstrate an Ion Chromatography (IC) method for the analysis of glycolate, in addition to eight other anions (fluoride, formate, chloride, nitrite, nitrate, sulfate, oxalate and phosphate) in Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) samples. The method will be used to analyze anions for samples generated from the Alternate Reductant Demonstrations to be performed for the DWPF at the Aiken County Technology Laboratory (ACTL). The method is specific to the characterization of anions in the simulant flowsheet work. Additional work will be needed for the analyses of anions in radiological samples by Analytical Development (AD) and DWPF. The documentation of the development and demonstration of the method fulfills the third requirement in the TTQAP, SRNL-RP-2010-00105, 'Task Technical and Quality Assurance Plan for Glycolic-Formic Acid Flowsheet Development, Definition and Demonstrations Tasks 1-3'.

  19. The same, only different: Threat management systems as homologues in the tree of life

    E-Print Network [OSTI]

    Holbrook, Colin; Fessler, Daniel M.T.

    2015-01-01T23:59:59.000Z

    T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

  20. Mercury Reduction and Removal from High Level Waste at the Defense Waste Processing Facility - 12511

    SciTech Connect (OSTI)

    Behrouzi, Aria [Savannah River Remediation, LLC (United States); Zamecnik, Jack [Savannah River National Laboratory, Aiken, South Carolina, 29808 (United States)

    2012-07-01T23:59:59.000Z

    The Defense Waste Processing Facility processes legacy nuclear waste generated at the Savannah River Site during production of enriched uranium and plutonium required by the Cold War. The nuclear waste is first treated via a complex sequence of controlled chemical reactions and then vitrified into a borosilicate glass form and poured into stainless steel canisters. Converting the nuclear waste into borosilicate glass is a safe, effective way to reduce the volume of the waste and stabilize the radionuclides. One of the constituents in the nuclear waste is mercury, which is present because it served as a catalyst in the dissolution of uranium-aluminum alloy fuel rods. At high temperatures mercury is corrosive to off-gas equipment, this poses a major challenge to the overall vitrification process in separating mercury from the waste stream prior to feeding the high temperature melter. Mercury is currently removed during the chemical process via formic acid reduction followed by steam stripping, which allows elemental mercury to be evaporated with the water vapor generated during boiling. The vapors are then condensed and sent to a hold tank where mercury coalesces and is recovered in the tank's sump via gravity settling. Next, mercury is transferred from the tank sump to a purification cell where it is washed with water and nitric acid and removed from the facility. Throughout the chemical processing cell, compounds of mercury exist in the sludge, condensate, and off-gas; all of which present unique challenges. Mercury removal from sludge waste being fed to the DWPF melter is required to avoid exhausting it to the environment or any negative impacts to the Melter Off-Gas system. The mercury concentration must be reduced to a level of 0.8 wt% or less before being introduced to the melter. Even though this is being successfully accomplished, the material balances accounting for incoming and collected mercury are not equal. In addition, mercury has not been effectively purified and collected in the Mercury Purification Cell (MPC) since 2008. A significant cleaning campaign aims to bring the MPC back up to facility housekeeping standards. Two significant investigations are being undertaken to restore mercury collection. The SMECT mercury pump has been removed from the tank and will be functionally tested. Also, research is being conducted by the Savannah River National Laboratory to determine the effects of antifoam addition on the behavior of mercury. These path forward items will help us better understand what is occurring in the mercury collection system and ultimately lead to an improved DWPF production rate and mercury recovery rate. (authors)

  1. Global Threat Reduction Initiative

    E-Print Network [OSTI]

    Kemner, Ken

    the dual application of splitting the atom, U.S. policy towards civilian use of highly enriched uranium and test reactors fueled first with low enriched uranium (LEU) and then later with HEU. By the early 1970s as the nuclear material protection and removal programs. Since 1978, under RERTR and more recently under GTRI

  2. Global Threat Reduction Initiative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To: CongestionDevelopment of a downholeReactors |Department ofGraphic

  3. Global Threat Reduction Initiative

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOE FY 2011Talley,GENIIFY14 BudgetHollettGive UsDepartment ofGlobal

  4. Contemporary Terrorist Organizations and the Threat to Michael Walzer’s Defense of a Supreme Emergency Exemption from Jus in Bello

    E-Print Network [OSTI]

    Ellis, Thomas H.

    2010-10-12T23:59:59.000Z

    to present two cases for the adoption of his "supreme emergency" defense by the terrorist organizations Al Qaeda and Hamas. I will show that both of these cases may ultimately fail under closer scrutiny, but will conclude that the ability for two such cases...

  5. Defensive Investments and the Demand for Air Quality: Evidence from the NOx Budget Program and Ozone Reductions

    E-Print Network [OSTI]

    Deschênes, Olivier

    Willingness to pay for air quality is a function of health and the costly defensive investments that contribute to health, but there is little research assessing the empirical importance of defensive investments. The setting ...

  6. Defense Gallery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Defense Gallery Inside the Museum Exhibitions Norris Bradbury Museum Lobby Defense Gallery Research Gallery History Gallery TechLab Virtual Exhibits invisible utility element...

  7. BOMB THREAT CALL PROCEDURES

    E-Print Network [OSTI]

    Guo, Ting

    THREAT CALL PROCEDURES BOMB THREAT CHECKLIST Date: Time: Time Caller Phone Number Where Hung Up: Call Received:Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act threat is received by phone: 1. Remain calm. Keep the caller on the line for as long as possible. DO

  8. Vacuoles: a hollow threat?

    E-Print Network [OSTI]

    Yaksh, Tony L.

    2010-01-01T23:59:59.000Z

    2 EDITORIALS Vacuoles: a hollow threat? Tony L. Yaksh, PhDthat Vacuoles: a hollow threat? provided by procaine anda l’esprit : Vacuoles: a hollow threat? Ces vacuoles acides

  9. Research Article Signaling Threat

    E-Print Network [OSTI]

    Gross, James J.

    Research Article Signaling Threat How Situational Cues Affect Women in Math, Science and organization,canmake potentialtargetsvulnerabletosocial identity threat.Objective and subjective measuresofidentity threat were collected from male and female math, science, and engineering (MSE) majors who watched

  10. Inhabiting cycles of maritime obsolescence : redirecting the National Defense Reserve Fleet

    E-Print Network [OSTI]

    Polansky, Nicholas W. (Nicholas Wilkes)

    2014-01-01T23:59:59.000Z

    Defense is in a state of obsolescence. The metrics of risk have changed from threat of military invasion to that of weather. Infrastructure is in a state of transition. The Maritime Administration's National Defense Reserve ...

  11. Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-06-02T23:59:59.000Z

    To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

  12. Cyber threat metrics.

    SciTech Connect (OSTI)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01T23:59:59.000Z

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  13. BOMB THREAT CALL PROCEDURES

    E-Print Network [OSTI]

    Boyce, Richard L.

    BOMB THREAT CALL PROCEDURES WHO TO CONTACT (select one) · Follow your local guidelines · Federal Protective Service (FPS) Police 1-877-4-FPS-411 (1-877-437-7411) · 911 Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain

  14. Reduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection RadiationRecord-SettingHead of ContractingofReducing WasteReduction

  15. Dynamic defense workshop : from research to practice.

    SciTech Connect (OSTI)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason J.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01T23:59:59.000Z

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  16. Bomb threat There are two types of Bomb Threats

    E-Print Network [OSTI]

    Hickman, Mark

    v Bomb threat There are two types of Bomb Threats: 1. Specific Information/location will be given about the device, or a suspicious item and/or location. Specific Threat - On a landline Dial 6111, state you have received a "SPecific BOmB threat". If possible recall exact wording of threat. 2. Non

  17. WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS

    E-Print Network [OSTI]

    Edinburgh, University of

    WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS: The UK Threat Level is decided by the Government's Joint Terrorism Analysis Centre (JTAC). It is the system to assess the threat to the UK from Threat Levels: Low - an attack is unlikely Moderate - an attack is possible, but not likely Substantial

  18. BomB ThreaT Assume threat is real

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Call 911 BomB ThreaT · Assume threat is real · Evacuate area explosion/ Fire · Activate fire alarm or office, do not let the person in · Do not block person's access to an exit · Move away from the threat

  19. Homeland Security and Defense Applications

    SciTech Connect (OSTI)

    None

    2014-11-06T23:59:59.000Z

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  20. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09T23:59:59.000Z

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  1. Radiological Threat Reduction | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    safely packaging and transporting those materials to a more stable state; and Protecting radiological materials at facilities that use or process such materials through facility...

  2. Manager, International Chemical Threat Reduction Department, Sandia

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining the Stockpile Maintaining the

  3. Global Threat Reduction Initiative | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAMGeneral Guidance onGlenn Podonsky

  4. Global Threat Reduction Initiative | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAMGeneral Guidance onGlenn PodonskyAn overview of the

  5. Cyber Threat Trees for Large System Threat Cataloging and Analysis*

    E-Print Network [OSTI]

    Thornton, Mitchell

    Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

  6. Threat Insight Quarterly Wireless Technology

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Wireless Technology April 2006 #12;X - F O R C E T H R E A T I N the Wireless Threat ..................................................3 Wireless Threats-Force Catastrophic Risk Index...................................... 13 Future X-Force Threat Insight Quarterly Topics

  7. Nuclear threats from small states

    SciTech Connect (OSTI)

    Kahan, J.H.

    1994-06-13T23:59:59.000Z

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  8. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL; Roche, Charles T [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.

  9. Airborne Particulate Threat Assessment

    SciTech Connect (OSTI)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31T23:59:59.000Z

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

  10. RateGuard: A Robust Distributed Denial of Service (DDoS) Defense System

    E-Print Network [OSTI]

    Chao, Jonathan

    , USA chao@poly.edu Abstract--One of the major threats to cyber security is the Distributed Denial-Rate TCP Attacks. I. INTRODUCTION One of the major threats to cyber security is the Distributed DenialRateGuard: A Robust Distributed Denial of Service (DDoS) Defense System Huizhong Sun ECE

  11. Overlooked? The Growing Threat of Desertification

    E-Print Network [OSTI]

    Zhu, Julian

    2012-01-01T23:59:59.000Z

    Overlooked? The Growing Threat of Desertification Julian Zhuovergrazing directly threat- ens the natural resilience ofspite the fact that the threat of desertification is both

  12. Proliferation: Threat and response

    SciTech Connect (OSTI)

    NONE

    1996-04-01T23:59:59.000Z

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  13. Threat Insight Quarterly Regulatory Compliance

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Regulatory Compliance www.iss.netwww.iss.net October 2006 #12 Risk Index ..............................................11 Future X-Force Threat Insight Quarterly Internet Security Systems X-Force® Threat Insight Quarterly > October 2006 ©2006 Internet Security Systems

  14. BOMB THREAT CHECKLIST Telephone Procedures

    E-Print Network [OSTI]

    Derisi, Joseph

    BOMB THREAT CHECKLIST Telephone Procedures DATE: / / TIME RECEIVED: : AM/PM CONCLUDED: : AM - GIVE NOTE SAYING "CALL UC POLICE - BOMB THREAT" 9-911 IF YOUR PHONE HAS CALLER ID DISPLAY, RECORD NUMBER OF INCOMING CALL __________________________ WRITE DOWN EXACT WORDS OF THE CALLER AND THREAT DON

  15. Threat Insight Quarterly Browser Exploitation

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

  16. Threat Insight Quarterly Vulnerability Management

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

  17. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    SciTech Connect (OSTI)

    Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

    2010-01-01T23:59:59.000Z

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  18. Emerging Threats and Opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasRelease Date:researchEmerging Threats and Opportunities

  19. Addressing the insider threat

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01T23:59:59.000Z

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  20. Addressing the insider threat

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01T23:59:59.000Z

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  1. Threat Characterization: Trajectory Dynamics

    E-Print Network [OSTI]

    Russell Schweickart; Clark Chapman; Dan Durda; Bill Bottke; David Nesvorny; Piet Hut

    2006-08-15T23:59:59.000Z

    Given a primary interest in "mitigation of the potential hazard" of near-Earth objects impacting the Earth, the subject of characterization takes on an aspect not normally present when considering asteroids as abstract bodies. Many deflection concepts are interested in the classic geophysical characteristics of asteroids when considering the physical challenge of modifying their orbits in order to cause them to subsequently miss an impact with Earth. Yet for all deflection concepts there are characteristics of the threat which overwhelm these traditional factors. For example, a close gravitational encounter with Earth some years or decades prior to impact can reduce the velocity change necessary for deflection by several orders of magnitude if the deflection precedes the close encounter (or encounters). Conversely this "benefit" comes at a "price"; a corresponding increase in the accuracy of tracking required to determine the probability of impact. Societal issues, both national and international, also characterize the NEO deflection process and these may strongly contend with the purely technical issues normally considered. Therefore critical factors not normally considered must be brought into play as one characterizes the threat of NEO impacts.

  2. A Comparison Study of Collaborative Strategies for Distributed Defense against Internet Worms based on Small-World Modeling

    E-Print Network [OSTI]

    Chen, Yu

    based on Small-World Modeling Hao Chen, Yu Chen* Dept. of Electrical & Computer Engineering, SUNY threats to the network infrastructure. Distributed defense collaborating with single- point.0 vulnerability, mobile malware, industrial espionage, and attacks from organized crime. Malicious activities

  3. The science, technology, and politics of ballistic missile defense

    SciTech Connect (OSTI)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09T23:59:59.000Z

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  4. UNCLASSIFIHED DEFENSE DOCUMENTATION CENTER

    E-Print Network [OSTI]

    Block, Marco

    UNCLASSIFIHED AD 463473 DEFENSE DOCUMENTATION CENTER FOR SCIENTIFIC AND TECHNICAL INFORMATION .... John Barton Head OR Analysis Group R. H. Krolick Manager Applied Science Laboratory Prepared for the .J

  5. PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS

    E-Print Network [OSTI]

    Jiang, Huiqiang

    AND COMMUNITIES PITTSBURGH, PA. | AUGUST 2013 #12;PRETA AIR: HAZARDOUS AIR POLLUTANTS 32 PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS REPORT PRETA AIR: HAZARDOUS AIR POLLUTANTS (HAPs)/AIR TOXICS PREPARED BY AUTHORSPITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS (PRETA) REPORT PRETA AIR: HAZARDOUS AIR

  6. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald

    2014-09-16T23:59:59.000Z

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  7. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald N

    2012-10-23T23:59:59.000Z

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  8. Low level optical detection of nanoparticles in blood

    E-Print Network [OSTI]

    McCanna, James Patrick

    2011-01-01T23:59:59.000Z

    graduation. Thanks to the Defense Threat Reduction Agency (DTRA) for providing support on a related project

  9. Department of Defense INSTRUCTION

    E-Print Network [OSTI]

    Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense (IG DoD automated export license system. 2. APPLICABILITY. This Instruction: a. Applies to Office of the Secretary of Defense, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff and the Joint

  10. The New Nuclear Threat John Deutch

    E-Print Network [OSTI]

    Deutch, John

    The New Nuclear Threat John Deutch FOREIGN AFFAIRS Volume 71 · Number 4 Foreign AffairsThe contents. Deutch THE NEW NUCLEAR THREAT he threat of nuclear weapons spread across the world has displaced the fear

  11. Network Television and the Digital Threat

    E-Print Network [OSTI]

    Lapan, Lisa

    2009-01-01T23:59:59.000Z

    NETWORK TV AND THE DIGITAL THREAT tertainment are availableNETWORK TV AND THE DIGITAL THREAT luring users to watch the91 Ryan Nakashima, Digital Threat Prompts Movie Industry

  12. Nuclear winter: the implications for civil defense

    SciTech Connect (OSTI)

    Chester, C.V.; Perry, A.M.; Hobbs, B.F.

    1987-01-01T23:59:59.000Z

    It is generally believed possible for some range of heavy nuclear attacks directed against cities that significant but not lethal climate alteration will ensue for at least a few weeks. Three-dimensional global circulation models being developed and used at Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory (LANL), and the National Center for Atmospheric Research for a reasonable attack size seem to be converging on a temperature depression of the order of 10 to 15/degree/C, averaged over all land areas of the temperate region of the northern hemisphere. Temperature depressions as large as 25/degree/C are predicted in the interiors of continents for attacks in the summertime. Winter wars produce temperature depressions of only a few degrees. The authors have drawn the following implications for civil defense of the possibility of nuclear winter: (1) Neither cold nor drought is likely to be a direct threat to human survival. (2) The principal threat of nuclear winter is to agriculture. (3) Nuclear winter does not present an entirely new threat from nuclear war to the United States or the Soviet Union. (4) The consequences of nuclear winter would fall more heavily on the Soviet Union.

  13. IBM Software Data Sheet IBM adaptive threat

    E-Print Network [OSTI]

    IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

  14. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net May 2007 #12 The Emerging Threat Landscape . . . . . . . . . . . . . . . . . . . . . . . . 2 Mobile Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly May

  15. Some Thoughts on Threat Modelling Peter Gutmann

    E-Print Network [OSTI]

    Gutmann, Peter

    Some Thoughts on Threat Modelling Peter Gutmann University of Auckland Traditional Threat Modelling Think up threats until you get bored, then declare victory Often leads to circular reasoning · "Our threat model is whatever our application defends against" Example: DNSSEC · The requirements document

  16. Chinese Workers: Under Threat or a Threat to American Workers?

    E-Print Network [OSTI]

    Harper Ho, Virginia E.; Zhang, Lu

    2010-07-01T23:59:59.000Z

    . At the same time, some employers have found ways to avoid following the spirit, if not the letter of the laws. The consequences for American workers are unclear, since their challenges are less about a direct threat from Chinese workers and more about...

  17. Cyber Threats to Nuclear Infrastructures

    SciTech Connect (OSTI)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01T23:59:59.000Z

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  18. China's Defense Electronics and Information Technology Industry

    E-Print Network [OSTI]

    RAGLAND, LeighAnn; MCREYNOLDS, Joe; GEARY, Debra

    2013-01-01T23:59:59.000Z

    2013 China’s Defense Electronics and Information Technologythe Chinese defense electronics and information technology (is moving the defense electronics and IT industry toward

  19. CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment

    E-Print Network [OSTI]

    Eustice, Ryan

    CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment Qi Chen, Wenmin Lin-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily, in this paper. Concretely speaking, the method is deployed by two periods, i.e., non-attack period and attack

  20. Android Keylogging Threat Fadi Mohsen, Mohammed Shehab

    E-Print Network [OSTI]

    Shehab, Mohamed

    Android Keylogging Threat Fadi Mohsen, Mohammed Shehab Department of Software and Information of keylogging attacks on Android. Which is a security threat pertaining to Android openness on specific feature

  1. Nuclear Radiological Threat Task Force Established | National...

    National Nuclear Security Administration (NNSA)

    Radiological Threat Task Force Established | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  2. Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

    E-Print Network [OSTI]

    Jones, Robert; Wills, Brandon; Kang, Christopher

    2010-01-01T23:59:59.000Z

    Chlorine Gas: An Evolving Hazardous Material Threat andChlorine gas represents a hazardous material threat fromrepresents a persistent hazardous material (HAZMAT) threat.

  3. Rethinking the Cyber Threat A Framework and Path Forward

    E-Print Network [OSTI]

    Bernstein, Phil

    Rethinking the Cyber Threat A Framework and Path Forward SCOTT CHARNEY Corporate Vice President ..................................................................................................................................................5 Understanding the Cyber Threat .................................................................................................................5 Rethinking the Cyber Threat

  4. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Paci?c Northwestbased model for analyzing threats that include those usually

  5. Collision Course: The Threat and Effects of an Asteroid Impact

    E-Print Network [OSTI]

    Reddy, Sharath

    2013-01-01T23:59:59.000Z

    reviewing asteroid impact threat. Retrieved from http://reviewing-asteroid-impact-threat/ Edwards, L. (2010, Octoberoccurring. Comparing the threat of an asteroid impact to the

  6. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Pacific Northwestbased model for analyzing threats that include those usually

  7. Defense on the Move: Ant-Based Cyber Defense

    SciTech Connect (OSTI)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15T23:59:59.000Z

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  8. Bayesian Discovery of Threat Networks

    E-Print Network [OSTI]

    Smith, Steven T; Senne, Kenneth D; Bernstein, Garrett; Philips, Scott

    2013-01-01T23:59:59.000Z

    A novel unified Bayesian framework for network detection is developed, under which a detection algorithm is derived based on random walks on graphs. The algorithm detects threat networks using partial observations of their activity, and is proved to be optimum in the Neyman-Pearson sense. The algorithm is defined by a graph, at least one observation, and a diffusion model for threat. A link to well-known spectral detection methods is provided, and the equivalence of the random walk and harmonic solutions to the Bayesian formulation is proven. A general diffusion model is introduced that utilizes spatio-temporal relationships between vertices, and is used for a specific space-time formulation that leads to significant performance improvements on coordinated covert networks. This performance is demonstrated using a new hybrid interaction model introduced to simulate random covert networks with realistic properties.

  9. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly February 2007 #12;X-Force® Threat Insight Monthly > February 2007 www.iss.netwww.iss.net About this report

  10. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net June 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly June 2007 #12;X-Force® Threat Insight Monthly > June 2007 www.iss.netwww.iss.net About this report

  11. BOMB THREAT CHECKLIST QUESTIONS TO ASK

    E-Print Network [OSTI]

    Cui, Yan

    BOMB THREAT CHECKLIST QUESTIONS TO ASK: 1. When is the bomb going to explode? 2. Where is it right ___Clearing Throat ___Laughter ___Deep Breathing __Crying ___Cracking voice __Normal ___Disguised THREAT __Foul ___Taped __Message read by threat maker __Irrational If voice is familiar, who did it sound like

  12. REVIEW/SYNTHSE Threat display in birds

    E-Print Network [OSTI]

    Hurd, Peter L.

    REVIEW/SYNTHÈSE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

  13. Neural Mechanisms Underlying Selective Attention to Threat

    E-Print Network [OSTI]

    Bishop, Sonia

    Neural Mechanisms Underlying Selective Attention to Threat SONIA J. BISHOP Behavioural and Clinical. This provides a framework for inves- tigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal

  14. Developmental Changes in Responsivity to Threat are

    E-Print Network [OSTI]

    Barr, Gordon A.

    Developmental Changes in Responsivity to Threat are Stimulus-Specific in Rats Christoph P 2000 ABSTRACT: During early ontogeny, stimuli that pose a threat to an animal change. Unrelated adult a threat only during a limited period of development, when the animal's particular developmental stage

  15. Deriving Security Requirements from Crosscutting Threat Descriptions

    E-Print Network [OSTI]

    Haley, Charles B.

    Deriving Security Requirements from Crosscutting Threat Descriptions Charles B. Haley, Robin C representing threats as crosscutting concerns aids in determining the effect of security requirements on the functional requirements. Assets (objects that have value in a system) are first enumerated, and then threats

  16. Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS Do Achievement Goals Mediate Stereotype Threat? An Investigation on Females' Soccer Performance Aïna Chalabaev Psycholoy 30 (2008) 143-158" #12;Stereotype threat in sports 2 Abstract This research investigated

  17. Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

  18. Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space

    E-Print Network [OSTI]

    Stanford University

    1 Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space Ming Luo, Sam and a threat space was extrapolated based on the 6 April 2000 ionospheric storm. It was showed that the impact of the ionospheric anomalies depends on the threat parameters, namely, the ionospheric gradient, the slope width

  19. Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection

    E-Print Network [OSTI]

    Sarinopoulos, Issidoros

    Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection the perception of threat. We here re- port that the neural circuitry known to be mobilized by many realistic instantiating detection of threat and negative affect, suggesting that recognition of potential danger may

  20. Toward a defense-dominated world

    SciTech Connect (OSTI)

    Wood, L.

    1993-08-01T23:59:59.000Z

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  1. NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished...

    National Nuclear Security Administration (NNSA)

    said Mark A. Langley, president and CEO of PMI. "Few organizational missions demand excellent project execution more than the NNSA G2 project. It is extremely...

  2. NNSA Supports Permanent Threat Reduction in Ukraine through Alternativ...

    National Nuclear Security Administration (NNSA)

    today announced the successful transfer of a linear accelerator (LINAC), used for cancer therapy treatment, from the University of Minnesota Masonic Children's Hospital to the...

  3. NNSA Launches Global Threat Reduction Initiative | National Nuclear

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintainingAdministrationAnnouncement of

  4. 2014 Annual Planning Summary for the NNSA Global Threat Reduction

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment ofCBFO-13-3322(EE) |2DepartmentNatural

  5. Global Threat Reduction Initiative | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal Heat Pump Basics31/2007 TeppeiProgramsGlobal

  6. A threat-based definition of IA- and IA-enabled products.

    SciTech Connect (OSTI)

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-07-01T23:59:59.000Z

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  7. A threat-based definition of IA and IA-enabled products.

    SciTech Connect (OSTI)

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-09-01T23:59:59.000Z

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  8. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    SciTech Connect (OSTI)

    Harris, S.; Dunn, D.

    2010-09-07T23:59:59.000Z

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  9. Sensor-guided threat countermeasure system

    DOE Patents [OSTI]

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25T23:59:59.000Z

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  10. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect (OSTI)

    INL

    2008-05-29T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  11. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema (OSTI)

    INL

    2009-09-01T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  12. Thesis / Dissertation Defense Announcement and Scheduling Form

    E-Print Network [OSTI]

    Hutcheon, James M.

    Thesis / Dissertation Defense Announcement and Scheduling Form Completed form must be received of the following: Thesis Defense Dissertation Defense Public Seminar Only Thesis/Dissertation Associate Dean Only Thesis/Dissertation/Seminar location and time listed above is: Confirmed

  13. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  14. The Nature of the Bioterrorism Threat

    SciTech Connect (OSTI)

    Regens, J. L.

    2003-02-25T23:59:59.000Z

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  15. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  16. Unmanned and Unattended Response Capability for Homeland Defense

    SciTech Connect (OSTI)

    BENNETT, PHIL C.

    2002-11-01T23:59:59.000Z

    An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologies supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.

  17. Technetium reduction in sediments of a shallow aquifer exhibiting dissimilatory iron reduction potential

    E-Print Network [OSTI]

    Roden, Eric E.

    mechanisms, constraints on Tc solubility, and the oxidation state, and speciation of sediment reduction of medical and defense nuclear waste. During spent nuclear fuel reprocessing, 99 Tc(IV)O2 is solubilized

  18. Abstract --Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely

    E-Print Network [OSTI]

    Lee, Ruby B.

    Abstract -- Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely on manual detection of DDoS attacks after which offline fine- grain traffic-evolving characteristics of the attacking packets. Recently, we have proposed a DDoS defense architecture that supports

  19. ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and

    E-Print Network [OSTI]

    Sen, Sevil

    ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

  20. Coping with stereotype threat: Denial as an impression management strategy

    E-Print Network [OSTI]

    Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

    2005-01-01T23:59:59.000Z

    , Ferguson, Brooks, & Hagadone, 2004), suggest- ing that one manner of coping with stereotype threat is by using humor to reinterpret the situation as a challenge rather than a threat (see Kuiper, Martin, & Olinger, 1993). Stereotype threat has also been...

  1. An Intelligent Threat Prevention Framework with Heterogeneous Information

    E-Print Network [OSTI]

    Liu, Weiru

    An Intelligent Threat Prevention Framework with Heterogeneous Information Wenjun Ma 1 and Weiru Liu 1 Abstract. Three issues usually are associated with threat prevention intelligent surveillance, the de- mand of effectively predicting suspects' intention and ranking the potential threats posed

  2. How to determine threat probabilities using ontologies and Bayesian networks

    E-Print Network [OSTI]

    How to determine threat probabilities using ontologies and Bayesian networks [Extended Abstract Business Austria Vienna, Austria neubauer@securityresearch.ac.at ABSTRACT The subjective threat probability- and Bayesian-based approach for determining asset-specific and comprehensible threat probabilities

  3. Constructing Ionospheric Irregularity Threat Model for Korean SBAS

    E-Print Network [OSTI]

    Stanford University

    Constructing Ionospheric Irregularity Threat Model for Korean SBAS Eugene Bang, Jinsil Lee Points (IGPs). Using an ionospheric irregularity undersampled threat model, the integrity bounds, called Grid Ionospheric Vertical Errors (GIVEs), must be augmented to bound ionospheric irregularity threats

  4. Toward directed energy planetary defense

    E-Print Network [OSTI]

    Lubin, Philip

    Asteroids and comets that cross Earth’s orbit pose a credible risk of impact, with potentially severe disturbances to Earth and society. We propose an orbital planetary defense system capable of heating the surface of ...

  5. Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found The item you requested, OSTISciTechEnergy,

  6. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  7. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  8. The rise of "china threat" arguments

    E-Print Network [OSTI]

    Ueki, Chikako

    2006-01-01T23:59:59.000Z

    The study seeks to explain the rise of "China threat" arguments in the United States and Japan in the 1990s by using three theories of states behavior- realism, organization theory, and democratic peace theory. The rise ...

  9. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect (OSTI)

    NOEL,WILLIAM P.

    2000-01-01T23:59:59.000Z

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  10. A cognitive and economic decision theory for examining cyber defense strategies.

    SciTech Connect (OSTI)

    Bier, Asmeret Brooke

    2014-01-01T23:59:59.000Z

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  11. An Information Fusion Framework for Threat Assessment

    SciTech Connect (OSTI)

    Beaver, Justin M [ORNL; Kerekes, Ryan A [ORNL; Treadwell, Jim N [ORNL

    2009-01-01T23:59:59.000Z

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  12. An Approach to Security Policy Configuration Using Semantic Threat Graphs

    E-Print Network [OSTI]

    Foley, Simon

    An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley, in turn, unnecessarily expose the enterprise to known threats. This paper pro- poses a threat management- nomic configuration of security mechanisms. This knowledge is mod- eled in terms of Semantic Threat

  13. Invited Paper New Frontiers of Network Security: The Threat Within

    E-Print Network [OSTI]

    Sanyal, Sugata

    Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

  14. Multi-threat Containment with Dynamic Wireless Neighborhood Networks

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    Multi-threat Containment with Dynamic Wireless Neighborhood Networks Nathan A. Ransoma teams to solve a multi-threat containment problem. The multi-threat containment problem has the robot teams surround a number of threats that may occur randomly. Approaches with and without utilizing

  15. Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, older adults' memory

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, and Rico Velasco for research assistance and to Dr. Tom Hess for providing us with the stereotype threat for publication. #12;STEREOTYPE THREAT IN OLDER ADULTS 2 Abstract (150) Negative stereotypes about aging can

  16. China’s Defense Electronics Industry: Innovation, Adaptation, and Espionage

    E-Print Network [OSTI]

    Mulvenon, James; Luce, Matthew

    2010-01-01T23:59:59.000Z

    2010 China’s Defense Electronics Industry: Innovation,of the Chinese defense electronics sector can be attributedAdvanced defense electronics components and systems play a

  17. Satellite Threat Warning and Attack Reporting

    SciTech Connect (OSTI)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31T23:59:59.000Z

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  18. Control Systems Cyber Security: Defense-in-Depth Strategies

    SciTech Connect (OSTI)

    Mark Fabro

    2007-10-01T23:59:59.000Z

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  19. Control Systems Cyber Security:Defense in Depth Strategies

    SciTech Connect (OSTI)

    David Kuipers; Mark Fabro

    2006-05-01T23:59:59.000Z

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  20. Unauthorized Collaboration on Facebook: Threats and Responses

    E-Print Network [OSTI]

    McQuade, D. Tyler

    Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered and collaboration. The Problem: When students, faculty, and staff join Facebook using a valid FSU email address this and believe it is affiliated with or endorsed by Florida State University. Facebook also allows students

  1. Global Warming: The Threat to the Planet*

    E-Print Network [OSTI]

    Hansen, James E.

    Global Warming: The Threat to the Planet* Jim Hansen 17 April 2007 2007 Leo Szilard Lecture. Graham Red Squirrel #12;Survival of Species 1. "Business-as-Usual" Scenario - Global Warming ~ 3ºC - Likely Extinctions ~ 50 percent 2. "Alternative" Scenario - Global Warming ~ 1ºC - Likely Extinctions

  2. Sandia National Laboratories: Defense Mission (S&T)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Tagged with: BATLab * batteries * Batteries & Energy Storage * Batteries and Energy Storage * Battery Abuse Testing Laboratory * Defense Mission * Department of Defense *...

  3. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect (OSTI)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01T23:59:59.000Z

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  4. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Insider Threat” [Gel05] Mike Gelles. Exploring the mind ofL. Krofcheck and Mike G. Gelles. Behavioral consultation in

  5. Reducing Stereotype Threat in Academically At-Risk African-Americans Students: A Self-

    E-Print Network [OSTI]

    Simmons, Crystal Marie

    2011-01-01T23:59:59.000Z

    the effects of stereotype threat on African American collegeThe role of stereotype threat. Psychological Science, 12,and  White:  Stereotype  threat and the  race  gap  on  

  6. The Chronicles of Grokster: Who is the Biggest Threat in the P2P Battle?

    E-Print Network [OSTI]

    Chan, Alvin

    2008-01-01T23:59:59.000Z

    Groksten Who is the Biggest Threat in the P2P Battle? Alvininvariably identify a different threat as marginalizing itsnently identifiable threats are perhaps not as hazardous as

  7. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    E-Print Network [OSTI]

    Kray, Laura J.; Shirako, Aiwa

    2009-01-01T23:59:59.000Z

    and social identity threat. Advances in Experimental Socialmen triggers social identity threat among female engineers.C. (2007). Stereotype threat at work. Academy of Management

  8. The Threat from Within: American Jews, the State of Israel, and Intermarriage

    E-Print Network [OSTI]

    Minkin, Sarah Anne

    2011-01-01T23:59:59.000Z

    and Nation. Sage Publications. Minkin, Threat from Within14, 2: 32-6. Minkin, Threat from Within Eisen, Arnold. 1986.Brandeis University Press. Minkin, Threat from Within Sarna,

  9. Minimizing the threat of pandemic emergence from avian influenza in poultry systems

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    Open Access Minimizing the threat of pandemic emergence fromY: The continued pandemic threat posed by avian influenzaet al. : Minimizing the threat of pandemic emergence from

  10. A Policy of Stereotype Threat: The Intergroup Impact of Policing Stereotypes

    E-Print Network [OSTI]

    Epstein, Liana Maris

    2012-01-01T23:59:59.000Z

    J. (1995). Stereotype threat and the intellectual testC. L. (2002). The role of threats in intergroup relations.factors in stereotype threat. Journal of Experimental Social

  11. EPR Severe Accident Threats and Mitigation

    SciTech Connect (OSTI)

    Azarian, G. [Framatome ANP SAS, Tour Areva, Place de la Coupole 92084 Paris la Defense (France); Kursawe, H.M.; Nie, M.; Fischer, M.; Eyink, J. [Framatome ANP GmbH, Freyeslebenstrasse, 1, D-91058 Erlangen (Germany); Stoudt, R.H. [Framatome ANP Inc. - 3315 Old Forest Rd, Lynchburgh, VA 24501 (United States)

    2004-07-01T23:59:59.000Z

    Despite the extremely low EPR core melt frequency, an improved defence-in-depth approach is applied in order to comply with the EPR safety target: no stringent countermeasures should be necessary outside the immediate plant vicinity like evacuation, relocation or food control other than the first harvest in case of a severe accident. Design provisions eliminate energetic events and maintain the containment integrity and leak-tightness during the entire course of the accident. Based on scenarios that cover a broad range of physical phenomena and which provide a sound envelope of boundary conditions associated with each containment challenge, a selection of representative loads has been done, for which mitigation measures have to cope with. This paper presents the main critical threats and the approach used to mitigate those threats. (authors)

  12. Securing Infrastructure from High Explosive Threats

    SciTech Connect (OSTI)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  13. Predictors of Threat and Error Management: Identification of Core

    E-Print Network [OSTI]

    Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

  14. INFLATABLE PLUG FOR THREAT MITIGATION IN TRANSPORTATION TUNNELS

    E-Print Network [OSTI]

    Barbero, Ever J.

    INFLATABLE PLUG FOR THREAT MITIGATION IN TRANSPORTATION TUNNELS Xavier Martinez1 , Julio Davalos2 and government entities. Fires, noxious fumes, deadly gasses, and flooding threats have occurred in major are of difficult and limited accessibility, but also because most of the potential threats, such as fires, flooding

  15. BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE

    E-Print Network [OSTI]

    Slatton, Clint

    BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE QUESTIONS TO ASK: 1. When is the bomb going? EXACT WORDING OF THE THREAT: Sex of caller: Race: Age: Number at which call received: Length of call: Check Caller ID - *69: Record caller's number: Time: Date: IMMEDIATELY REPORT BOMB THREATS TO

  16. THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS

    E-Print Network [OSTI]

    THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

  17. Insider Threat Detection using Stream Mining and Graph Mining

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Insider Threat Detection using Stream Mining and Graph Mining Pallabi Parveen, Jonathan Evans threats who attempt to conceal their activities by varying their behaviors over time. This paper applies of insider threat detection, demonstrating that the ensemble-based approach is significantly more effective

  18. FACTS about threat Possible INTERVENTIONS Strong domain identification

    E-Print Network [OSTI]

    Chisholm, Rex L.

    FACTS about threat Possible INTERVENTIONS Strong domain identification heightens the effect are able to self affirm in difficult situations can lessen the effects of threat. Encourage students to use to students not under threat. Educate students on self talk! Teach them to pay close attention

  19. Security Threat Mitigation Trends in Low-cost RFID Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security Threat Mitigation Trends in Low-cost RFID Systems Joaquin Garcia-Alfaro1,2 , Michel of security threat mitigation mecha- nisms in RFID systems, specially in low-cost RFID tags, are gaining great. Cryptography is a key tool to address these threats. Nevertheless, strong hardware constraints

  20. Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

  1. Pervasive competition between threat and reward in the brain

    E-Print Network [OSTI]

    Pessoa, Luiz

    Pervasive competition between threat and reward in the brain Jong Moon Choi, Srikanth Padmala, USA In the current functional MRI study, we investigated interactions between reward and threat to the salience hypothesis, in the condition involving both reward and threat, enhanced activation would

  2. Maritime Threat Detection using Plan Recognition Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

  3. Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations

    E-Print Network [OSTI]

    Stanford University

    1 Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations Ming Luo, Sam Pullen-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data from the 6 April 2000 ionospheric storm. User vertical error was estimated based on this threat model

  4. Decentralized Semantic Threat Graphs Simon N. Foley1

    E-Print Network [OSTI]

    Foley, Simon

    Decentralized Semantic Threat Graphs Simon N. Foley1 William M. Fitzgerald1 Cork Constraint.foley@cs.ucc.ie wfitzgerald@4c.ucc.ie Abstract. Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume

  5. Joshua Rosenthol, CISSP Trends in the Threat Landscape

    E-Print Network [OSTI]

    Joshua Rosenthol, CISSP Trends in the Threat Landscape #12;2 Year in Review Data Theft Targeted-virus, firewalls, and intrusion prevention) are only effective against 30-50% of current security threats. Moreover, customers expect the effectiveness of signature-based security to continue to decline rapidly. IDC Threat

  6. Internet Security Systems, an IBM Company Threat Insight Monthly

    E-Print Network [OSTI]

    Internet Security Systems, an IBM Company X-Force ® Threat Insight Monthly www . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net Internet Security Systems, an IBM Company X-Force Threat Insight Monthly April 2007 #12;X-Force® Threat Insight Monthly > April 2007 www.iss.netwww.iss.net About

  7. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect (OSTI)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12T23:59:59.000Z

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  8. Economics of Defense in a Globalized World

    E-Print Network [OSTI]

    MCGUIRE, MARTIN C

    2006-01-01T23:59:59.000Z

    Kahn, H. (1959), On Thermonuclear War (Princeton Universityless grave than thermonuclear annihilation. That is, anfrom the threat of thermonuclear war deserves emphasis. Even

  9. defense

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5 |0/%2A en6/%2A en2/%2A

  10. Meeting Department of Defense non-hazardous solid waste goals

    SciTech Connect (OSTI)

    Eakes, W.S.; Comstock, J.

    1999-07-01T23:59:59.000Z

    This paper will discuss the previous and present Department of Defense (DOD) non-hazardous solid waste goals and how Navy and Marine Corps installation collect solid waste data and measure the goals. The installation and central data collection systems used, data collection problems and solutions, data quality, and the yearly measure. The paper will also discuss the original solid waste reduction and diversion goal and how the Navy and Marine Corps performed. The new DOD landfill and incineration diversion goal will be discussed and some techniques the Navy will use to meet the new goals.

  11. Civil defense implications of nuclear winter

    SciTech Connect (OSTI)

    Chester, C.V.; Broyles, A.A.

    1984-01-01T23:59:59.000Z

    Possible effects of Nuclear Winter on the world's population are summarized. The implications of these effects for strategic weapons planning and civil defense measures are discussed. (ACR)

  12. Foundations of a defense digital platform : business systems governance in the Department of Defense

    E-Print Network [OSTI]

    Ziegler, Dustin P

    2012-01-01T23:59:59.000Z

    In 2010, the United States Department of Defense (DoD) spent more than $35 billion on information systems development and sustainment, with nearly $7 billion to defense business systems investments alone. It is not surprising ...

  13. Threat Analysis Framework | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2Uranium Transferon theTed Donat AboutTheDepartment ofEarlyThreat Analysis

  14. Research Associate Position Defense Analysis Department

    E-Print Network [OSTI]

    in analyzing social network data as well as geospatial, temporal, and standard statistical analysis of largeResearch Associate Position Defense Analysis Department Naval Postgraduate School, Monterey, CA Research Associate The Department of Defense Analysis is home to the CORE (Common Operational Research

  15. Deterring regional threats from nuclear proliferation

    SciTech Connect (OSTI)

    Spector, L.S.

    1992-03-12T23:59:59.000Z

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  16. Demand Reduction

    Broader source: Energy.gov [DOE]

    Grantees may use funds to coordinate with electricity supply companies and utilities to reduce energy demands on their power systems. These demand reduction programs are usually coordinated through...

  17. Mitigating the Insider Threat Using Behavioral Science Workshop

    SciTech Connect (OSTI)

    Landers, John; De Castro, Kara

    2012-11-26T23:59:59.000Z

    PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

  18. ORISE: Securing the Golden State from threats foreign and domestic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

  19. Linton Brooks Assumes Post as Deputy Administrator for NNSA Defense...

    National Nuclear Security Administration (NNSA)

    Administrator for NNSA Defense Nuclear Nonproliferation Office Press Release Oct 30, 2001 Linton Brooks Assumes Post as Deputy Administrator for NNSA Defense Nuclear...

  20. Departments of Energy, Defense Partner to Install Fuel Cell Backup...

    Office of Environmental Management (EM)

    Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at...

  1. Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan, Departmental Representative to the DNFSB Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan,...

  2. Defense-in-Depth, How Department of Energy Implements Radiation...

    Energy Savers [EERE]

    Defense-in-Depth, How Department of Energy Implements Radiation Protection in Low Level Waste Disposal Defense-in-Depth, How Department of Energy Implements Radiation Protection in...

  3. article defense department: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Description The Department of Defense (DoD) announces the Fiscal Year 2012 Defense University Research Office of Scientific Research (AFOSR). Funding Opportunity Title...

  4. Defense, Interior Departments Pursue Renewable Energy on Federal...

    Broader source: Energy.gov (indexed) [DOE]

    Defense, Interior Departments Pursue Renewable Energy on Federal Lands Defense, Interior Departments Pursue Renewable Energy on Federal Lands August 8, 2012 - 1:22pm Addthis Solar...

  5. Threats from space: 20 years of progress

    E-Print Network [OSTI]

    Remo, J L

    2014-01-01T23:59:59.000Z

    It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

  6. Doctoral Defense "Thermal-hydro-mechanical model

    E-Print Network [OSTI]

    Kamat, Vineet R.

    Doctoral Defense "Thermal-hydro-mechanical model for freezing and thawing soils" Yao Zhang Date been implemented in a finite element system, with a thermal-hydro- mechanical framework being used

  7. A Dynamic Defense Force for Japan

    E-Print Network [OSTI]

    TAKAHASHI, Sugio

    2012-01-01T23:59:59.000Z

    Japan Self-Defense Forces (SDF). Along with the new NDPG,set a direction for the SDF in the post-9/11 inter- nationalsituation also requires the SDF take on these “dynamic”

  8. Management of Security Policy Configuration using a Semantic Threat Graph Approach

    E-Print Network [OSTI]

    Foley, Simon

    Management of Security Policy Configuration using a Semantic Threat Graph Approach Simon N. Foley, in turn, unnec- essarily expose the enterprise to known threats. This paper proposes a threat management Threat Graphs, a variation of the tradi- tional Threat/Attack Tree, extended in order to relate semantic

  9. Defined: There is some credible general threat information that may affect the University. Examples include an FBI alert of a threat directed at a college

    E-Print Network [OSTI]

    Rose, Annkatrin

    Defined: There is some credible general threat information that may affect the University. Examples include an FBI alert of a threat directed at a college campus in North Carolina, or a hurricane warning information about a specific threat directed towards the University. May involve a man-made threat, or flash

  10. Superluminous supernovae: No threat from Eta Carinae

    E-Print Network [OSTI]

    Brian C. Thomas; Adrian L. Melott; Brian D. Fields; Barbara J. Anthony-Twarog

    2007-09-25T23:59:59.000Z

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of ~10^44 Joules. It was proposed that the progenitor may have been a massive evolved star similar to eta Carinae, which resides in our own galaxy at a distance of about 2.3 kpc. eta Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma-Ray Burst oriented toward the Earth, eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over ~10^4 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae, endocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous" for other reasons. However, due to reddening and extinction by the interstellar medium, eta Carinae is unlikely to trigger such effects to any significant degree.

  11. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect (OSTI)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23T23:59:59.000Z

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  12. THE VISUAL CUES USED BY THE LEMON PEEL ANGELFISH (CENTROPYGE FLAVISSIMA) TO DETERMINE THREAT

    E-Print Network [OSTI]

    Post, Jessica

    2012-01-01T23:59:59.000Z

    FLAVISSIMA) TO DETERMINE THREAT JESSICA   POST Integrative be used by fish to assess threat, and indicate when it is were  important in assessing threat.   Multiple cues were 

  13. Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security

    E-Print Network [OSTI]

    Abi-Antoun, Marwan

    Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 Center for Software Excellence Abstract Threat Foundation. #12;Keywords: Threat modeling, data flow diagrams, reflexion models, architecture-level security

  14. Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security

    E-Print Network [OSTI]

    Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 # Center for Software Excellence Abstract Threat Foundation. #12; Keywords: Threat modeling, data flow diagrams, reflexion models, architecture­level security

  15. Tilting at Modern: Elizabeth Gordon's "The Threat to the Next America"

    E-Print Network [OSTI]

    Corbett, Kathleen LaMoine

    2010-01-01T23:59:59.000Z

    philosophy Gordon, ?The Threat to the Next America,?129.Advertisement for “The Threat to the Next America,” Business121. Figure 27. “The Threat to the Next America” carried a

  16. Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

  17. Human Bed Nucleus of the Stria Terminalis Indexes Hypervigilant Threat Monitoring

    E-Print Network [OSTI]

    Whalen, Paul J.

    Human Bed Nucleus of the Stria Terminalis Indexes Hypervigilant Threat Monitoring Leah H disorders is hypervigilant threat monitoring, its biological bases in humans remain poorly understood. Animal models suggest that anxious processes such as hypervigilant threat monitoring are distinct from

  18. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Dir90] [DOD08] [FK92] A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  19. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    554–563, October 1992. A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  20. Additive Manufacturing in China: Threats, Opportunities, and Developments (Part I)

    E-Print Network [OSTI]

    ANDERSON, Eric

    2013-01-01T23:59:59.000Z

    application of additive manufacturing in China’s aviationAnalysis May 2013 Additive Manufacturing in China: Threats,an overview of China’s additive manufacturing industry is

  1. Threat assessment design for driver assistance system at intersections

    E-Print Network [OSTI]

    Aoude, Georges

    This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

  2. Threat-aware Path Planning in Uncertain Urban Environments

    E-Print Network [OSTI]

    Aoude, Georges

    This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

  3. Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.

    SciTech Connect (OSTI)

    Boslough, Mark B.; Crawford, David A.

    2007-12-01T23:59:59.000Z

    The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

  4. Global Security: Asymmetric Threats The modules in this class introduce transnational, asymmetric threats/warfare, from terror organizations

    E-Print Network [OSTI]

    Rhode Island, University of

    /Global Shipping) 5. Agriculture & Food 6. Water Supplies 7. Telecommunications 8. Chemicals & Hazardous Materials 9. Nuclear & Radiological Materials Module 2 Asymmetric Tactics to Combat Nation States 1, terrorist threats to America's agriculture and food supplies, water telecommunications, chemicals

  5. An alternative to present United States defense strategy

    E-Print Network [OSTI]

    Anthony, William Wallace

    1971-01-01T23:59:59.000Z

    - hower. Secretary of Defense McNamara adopted this strategio nuclear defense policy because the Dulles policy included brinkmanship, and did. not contain any flexibility in response. The McNamara plan was based on controlled escalation and response...

  6. Northwest Energy Coalition Renewable Northwest Project Natural Resources Defense Council

    E-Print Network [OSTI]

    Northwest Energy Coalition Renewable Northwest Project Natural Resources Defense Council December 9 Coalition [Nancy Hirsh] Renewable Northwest Project[Rachel Shimshak] Natural Resources Defense Council Power Administration in Power Supply The Northwest Energy Coalition, Renewable Northwest Project, Sierra

  7. Japan’s Approaches to DefenseTransparency: Perspectivesfrom the Japanese and Chinese Defense Establishments

    E-Print Network [OSTI]

    Fei, John

    2012-01-01T23:59:59.000Z

    Japanese Self Defense Forces (SDF). Features of the Japaneseissues arise—such as the deployment of the SDF forces toIraq or Maritime SDF to the In- dian Ocean—an ad hoc

  8. Japan’s Defense White Paper as a Tool for Promoting Defense Transparency

    E-Print Network [OSTI]

    SUKEGAWA, Yasushi

    2012-01-01T23:59:59.000Z

    and activities of the MOD/SDF (Part III). It is one of theof the Self-Defense Forces (SDF) came to be in- cluded inits coverage to include the SDF’s disaster respons- es and

  9. Global Threat Reduction Initiative Africa and Middle East Project Plan 2012

    SciTech Connect (OSTI)

    Jamison, Jeremy D.

    2012-02-01T23:59:59.000Z

    GTRI Africa and Middle East Project Plan submitted for school project to American Graduate University.

  10. NNSA's Global Threat Reduction Initiative Removes More Than One Ton of

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERAL EMPLOYEEAdministration takes part in

  11. U.S. Global Threat Reduction Initiative/U.S.-Origin Nuclear Fuel Removals |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3E Ambassadors and C3EDepartment3 AnnualANNOUNCEMENTofDepartment

  12. Working to keep us safe: Sara Brambilla, Postdoc creates threat reduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires may contribute more to &83 3.3At DOECareers

  13. The Global Threat Reduction Initiative's Molybdenum-99 Program, OAS-L-12-07

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon2001 PowerofUseResearch and TrainingAudit

  14. Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities

    E-Print Network [OSTI]

    Manikas, Theodore

    Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities Theodore W importance. To effectively address both natural and intentional threats to large systems, the threats must be cataloged and analyzed. Extremely large and complex systems can have an accordingly large number of threat

  15. Towards A Theory Of Insider Threat Assessment Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu Upadhyaya

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    Towards A Theory Of Insider Threat Assessment Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu}@cse.buffalo.edu Abstract Insider attacks are a well-known problem acknowl- edged as a threat as early as 1980s. The threat to the lack of tools and techniques, security analysts do not correctly perceive the threat, and hence

  16. Ionospheric Threat Model Methodology for Juan Blanch, Todd Walter, Per Enge. Stanford University

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Model Methodology for WAAS Juan Blanch, Todd Walter, Per Enge. Stanford of a threat model. The threat model is used to restrict the expected ionospheric behavior. It must not be too driving the ionosphere are not entirely known, a decision has been made to base the threat model

  17. Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina, M. Oxenham, L. Chisci

    E-Print Network [OSTI]

    Chisci, Luigi

    Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina§, M. Oxenham, L by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled by a network of entities

  18. Modeling System Threat Probabilities Using Mixed-Radix Multiple-Valued Logic Decision

    E-Print Network [OSTI]

    Thornton, Mitchell

    Modeling System Threat Probabilities Using Mixed-Radix Multiple-Valued Logic Decision Diagrams securing systems from both natural and intentional threats. Extremely large and complex systems can have an ac- cordingly large number of threat scenarios, thus simply listing the threats and devising

  19. Overview of Space Business Space & Integrated Defense Systems

    E-Print Network [OSTI]

    Overview of Space Business Space & Integrated Defense Systems Mitsubishi Corporation August 26 in Rio de Janeiro and Belo Horizonte #12;MC's Space Business Involved with aerospace business more than 40 years, covering civil/commercial space business, defense related space business and defense

  20. Matching and fairness in threat-based mobile sensor coverage

    SciTech Connect (OSTI)

    Ma, Cheng-Yu {Jan} L [ORNL; Yau, King Y [ORNL; Chin, Jren-Chit [ORNL; Rao, Nageswara S [ORNL; Shankar, Mallikarjun [ORNL

    2009-12-01T23:59:59.000Z

    Mobile sensors can be used to effect complete coverage of a surveillance area for a given threat over time, thereby reducing the number of sensors necessary. The surveillance area may have a given threat profile as determined by the kind of threat, and accompanying meteorological, environmental, and human factors. In planning the movement of sensors, areas that are deemed higher threat should receive proportionately higher coverage. We propose a coverage algorithm for mobile sensors to achieve a coverage that will match - over the long term and as quantified by an RMSE metric - a given threat profile. Moreover, the algorithm has the following desirable properties: (1) stochastic, so that it is robust to contingencies and makes it hard for an adversary to anticipate the sensor's movement, (2) efficient, and (3) practical, by avoiding movement over inaccessible areas. Further to matching, we argue that a fairness measure of performance over the shorter time scale is also important. We show that the RMSE and fairness are, in general, antagonistic, and argue for the need of a combined measure of performance, which we call efficacy. We show how a pause time parameter of the coverage algorithm can be used to control the trade-off between the RMSE and fairness, and present an efficient offline algorithm to determine the optimal pause time maximizing the efficacy. Finally, we discuss the effects of multiple sensors, under both independent and coordinated operation. Extensive simulation results - under realistic coverage scenarios - are presented for performance evaluation.

  1. 2010 U.S.-India Strategic S. Paul Kapur

    E-Print Network [OSTI]

    2010 U.S.-India Strategic Engagement S. Paul Kapur Naval Postgraduate School THE DEFENSE THREAT REPORT #12;#12;2010 U.S.-India Strategic Engagement STRATEGIC ENGAGEMENT REPORT S. Paul Kapur Naval reflect the official policy or position of the Defense Threat Reduction Agency, the Department of Defense

  2. Out-of-Semester Dissertation Defenses In order for a student to have a dissertation defense between semesters (or when

    E-Print Network [OSTI]

    Rock, Chris

    Out-of-Semester Dissertation Defenses In order for a student to have a dissertation defense between semesters (or when the University is not in session), the student who is defending the dissertation must certain that all of the members on the dissertation committee agree to attend the defense on the agreed

  3. LALP-07-085 Fall 2007 Nanowire technologies for radiation detection applications

    E-Print Network [OSTI]

    -Directed Research and Development program, National Nuclear Security Administration, Department of Energy Office of Basic Energy Sciences program Principal customers: National Nuclear Security Administration, Department of Homeland Security, Defense Advanced Research Projects Administration, Defense Threat Reduction Agency

  4. Sorghum Ergot: New Disease Threat to the Sorghum Industry

    E-Print Network [OSTI]

    Krausz, Joseph P.; Isakeit, Thomas

    1998-07-20T23:59:59.000Z

    of the sorghum ergot pathogen and likely serves as an overwintering source of ergot inoculum in south Texas. E-461 6-98 Sorghum Ergot New Disease Threat to the Sorghum Industry *Extension Plant Pathologists, The Texas A&M University System. Newly formed honeydew... dripping from an infected panicle. Joseph Krausz and Thomas Isakeit* Ho w is it a Threat to Texas? Each f_lo wer infected with ergot represents a direct loss of one seed. Additional losses occur because the stickiness of infected panicles inter- feres...

  5. Waste reduction at the Savannah River Site

    SciTech Connect (OSTI)

    Stevens, W.E.; Lee, R.A.; Reynolds, R.W.

    1990-01-01T23:59:59.000Z

    The Savannah River Site (SRS) is a key installation for the production and research of nuclear materials for national defense and peace time applications and has been operating a full nuclear fuel cycle since the early 1950s. Wastes generated include high level radioactive, transuranic, low level radioactive, hazardous, mixed, sanitary, and aqueous wastes. Much progress has been made during the last several years to reduce these wastes including management systems, characterization, and technology programs. The reduction of wastes generated and the proper handling of the wastes have always been a part of the Site's operation. This paper summarizes the current status and future plans with respect to waste reduction to waste reduction and reviews some specific examples of successful activities.

  6. Waste reduction at the Savannah River Site

    SciTech Connect (OSTI)

    Stevens, W.E.; Lee, R.A.; Reynolds, R.W.

    1990-12-31T23:59:59.000Z

    The Savannah River Site (SRS) is a key installation for the production and research of nuclear materials for national defense and peace time applications and has been operating a full nuclear fuel cycle since the early 1950s. Wastes generated include high level radioactive, transuranic, low level radioactive, hazardous, mixed, sanitary, and aqueous wastes. Much progress has been made during the last several years to reduce these wastes including management systems, characterization, and technology programs. The reduction of wastes generated and the proper handling of the wastes have always been a part of the Site`s operation. This paper summarizes the current status and future plans with respect to waste reduction to waste reduction and reviews some specific examples of successful activities.

  7. WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President

    E-Print Network [OSTI]

    WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

  8. Climate Threat to the Planet* Implications for Energy Policy

    E-Print Network [OSTI]

    Hansen, James E.

    Climate Threat to the Planet* Implications for Energy Policy Jim Hansen 4 July 2008 United Nations's Paleoclimate History 2. On-Going Climate Changes 3. Climate Models #12;#12;Green Triangle = Volcano; Red Box;#12;Observations: Domingues, C.M. et al., Nature 453, 1090-1093, 2008. Model: Hansen, J. et al., Science 308, 1431

  9. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28T23:59:59.000Z

    This order establishes the Secretarial Order of Succession in the Department of Energy pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establish a mechanism for tracking the locations of successors at the various threat levels. Admin Chg, dated 9-13-2013, cancels DOE O 100.1E.

  10. Secretarial Succession, Threat Level Notification and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28T23:59:59.000Z

    The Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1D.

  11. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-04-20T23:59:59.000Z

    This Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1C. Canceled by DOE O 100.1E

  12. Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe

    E-Print Network [OSTI]

    Zimmermann, Niklaus E.

    Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe Luigi Maiorano1 to extreme climates. Our results outline that the Mediterranean basin represents both an important hotspot change projected to occur over the coming decades, especially in the Mediterranean bioregion, posing

  13. The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance?

    E-Print Network [OSTI]

    New Hampshire, University of

    The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance? Anna BrownAnna Brown #12;Maps courtesy of Google Maps. #12;Is the SCO a Military Threat?Is the SCO a Military Threat?Is the SCO a Military Threat

  14. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    SciTech Connect (OSTI)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01T23:59:59.000Z

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  15. Nuclear Winter: Implications for civil defense

    SciTech Connect (OSTI)

    Chester, C.V.; Perry, A.M.; Hobbs, B.F.

    1988-05-01T23:59:59.000Z

    ''Nuclear Winter'' is the term given to the cooling hypothesized to occur in the Northern Hemisphere following a nuclear war as the result of the injection of smoke from burning cities into the atmosphere. The voluminous literature on this subject produced since the paper was published in 1983 by Turco, Toon, Ackerman, Pollack, and Sagen (TTAPS) has been reviewed. Three-dimensional global circulation models have resulted in reduced estimates of cooling---15 to 25/degree/C for a summer war and a few degrees for a winter war. More serious may be the possibility of suppression of convective precipitation by the altered temperature profiles in the atmosphere. However, very large uncertainties remain in input parameters, the models, and the results of calculations. We believe the state of knowledge about nuclear winter is sufficiently developed to conclude: Neither cold nor drought is likely to be a direct threat to human survival for populations with the wherewithal to survive normal January temperatures. The principal threat from nuclear winter is to food production, and this could present problems to third parties who are without food reserves. Loss of a crop year is neither a new nor an unexpected threat from nuclear war to the United States and the Soviet Union. Both have at least a year's food reserve at all times. Both face formidable organizational problems in distributing their reserves in a war-damaged environment. The consequences of nuclear winter could be expected to fall more heavily on the Soviet Union than the United States due to its higher latitude and less productive agriculture. This may be especially true if disturbances of rainfall amounts and distribution persist for more than a year.

  16. Nuclear Winter: The implications for civil defense

    SciTech Connect (OSTI)

    Chester, C.V.; Perry, A.M.; Hobbs, B.F.

    1987-01-01T23:59:59.000Z

    ''Nuclear Winter'' is the term given to hypothesized cooling in the northern hemisphere following a nuclear war due to injection of smoke from burning cities into the atmosphere. The voluminous literature on this subject produced since the original paper in 1983 by Turco, Toon, Ackerman, Pollack, and Sagen (TTAPS) has been reviewed. The widespread use of 3-dimensional global circulation models have resulted in reduced estimates of cooling; 15 to 25/sup 0/C for a summer war and a few degrees for a winter war. More serious may be the possibility of suppression of convective precipitation by the altered temperature profiles in the atmosphere. However, very large uncertainties remain in input parameters, the models, and the results of calculations. We believe the state of knowledge about nuclear winter is sufficiently developed to conclude: Neither cold nor drought are likely to be direct threats to human survival for populations with the wherewithal to survive normal January temperatures; The principal threat from nuclear winter is to food production, and could present problems to third parties without food reserves; and Loss of a crop year is neither a new nor unexpected threat from nuclear war to the US and the Soviet Union. Both have at least a year's food reserve at all times. Both face formidable organizational problems in distributing their reserves in a war-damaged environment. The consequences of nuclear winter could be expected to fall more heavily on the Soviet Union than the US due to its higher latitude and less productive agriculture. This may be especially true if disturbances of rainfall amounts and distribution persist for more than a year. 6 refs.

  17. In Defense of Realism In Defense of Realism: It Really Is

    E-Print Network [OSTI]

    Cobern, William W.

    is amused. Of course, Samuel Johnson's refutation of immaterialism was no philosophical threat to Berkeley constructivist ideas have proved impotent defenders of scientific realism. The good Dr. Johnson and James Boswell. Johnson, unconvinced by Berkeley's logic, said to Boswell, "I refute it thus!" Upon which he turned

  18. ARM - Defensive Shotgun - Remington 870 Operator's Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006Datastreamstwrcam40m Documentation DataDatastreamsxsaprhsrhi Documentation DataAlaskaDefensive Shotgun -

  19. Biofuels in Defense, Aviation, and Marine

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyandapproximately 10 wt%in Defense, Aviation, and

  20. Sandia Energy - Defense Waste Management Programs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press ReleasesInApplied &ClimateContact Us HomeDefense

  1. The Salt Defense Disposal Investigations (SDDI)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solidSynthesis of 2Dand WaterThe FutureRiskSalt Defense Disposal

  2. Notice of Intent to Develop DOE O 470.X, Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-10-17T23:59:59.000Z

    The Order establishes top-level responsibilities and requirements for DOE's Insider Threat Program, which is intended to deter, detect, and mitigate insider threat actions by all Federal and contractor employees.

  3. A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society

    E-Print Network [OSTI]

    A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and SocietyHealth technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies

  4. A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues

    E-Print Network [OSTI]

    Shapira, Yoav

    2006-01-01T23:59:59.000Z

    There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

  5. NA 10 - Deputy Administrator for Defense Programs | National...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 10 - Deputy Administrator for Defense Programs NA 10 - Deputy Administrator for...

  6. NA 70 - Associate Administrator for Defense Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 70 - Associate Administrator for Defense ... NA 70 - Associate Administrator...

  7. Legacy Management Work Progresses on Defense-Related Uranium...

    Office of Environmental Management (EM)

    LM visited 84 defense-related legacy uranium mine sites located within 11 uranium mining districts in 6 western states. At these sites, photographs and global positioning...

  8. Energy and Defense Departments Announce Agreement to Enhance...

    Office of Environmental Management (EM)

    Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and...

  9. air defense warfare: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for FORCEnet Cruise Missile Defense by Juan G. Camacho; Lawrence F. Guest; Belen M. Hernandez; Thomas M in Systems Engineering (MSSE) Cohort 5 from the Naval Surface Warfare...

  10. Y-12 Successfully Meets and Exceeds Defense Programs Goals During...

    National Nuclear Security Administration (NNSA)

    Home Field Offices Welcome to the NNSA Production Office NPO News Releases Y-12 Successfully Meets and Exceeds Defense Programs ... Y-12 Successfully Meets and Exceeds...

  11. DOE weapons laboratories' contributions to the nation's defense technology base

    SciTech Connect (OSTI)

    Hecker, S.S.

    1988-04-01T23:59:59.000Z

    The question of how the Department of Energy (DOE) weapons laboratories can contribute to a stronger defense technology base is addressed in testimony before the Subcommittee on Defense Industry and Technology of the Senate Armed Services Committee. The importance of the defense technology base is described, the DOE technology base is also described, and some technology base management and institutional issues are discussed. Suggestions are given for promoting a more stable, long-term relationship between the DOE weapons laboratories and the Department of Defense. 12 refs., 2 figs.

  12. antibacterial host defense: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and to sustain a healthy pregnancy 2. Recent of these defenses by pathogens can lead to pregnancy complications such as preterm labor or vertical transmission Bakardjiev,...

  13. antimicrobial host defense: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and to sustain a healthy pregnancy 2. Recent of these defenses by pathogens can lead to pregnancy complications such as preterm labor or vertical transmission Bakardjiev,...

  14. MultiMulti--threat Containment withthreat Containment with Cooperative Autonomous AgentsCooperative Autonomous Agents

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    as Newtonian particles Quadratic APF (QAPF) · Simple yet does the job Three QAPFs · Moving toward the threats

  15. Q&A with Steven Spencer: Speaker in the Women and STEM Series Talks About How He Became Interested in Studying Psychology, Dissonance, and Stereotype Threat

    E-Print Network [OSTI]

    Hooker, Courtney

    2011-01-01T23:59:59.000Z

    dissonance, and stereotype threat A Spencer’s talk, “Athe field of stereotype threat, I was impressed by his kindthink about contents stereotype threat. Therefore, I had the

  16. Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges;Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges Salim fulfillment of the requirements for the degree of Doctor of Philosophy Abstract This thesis develops threat

  17. Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial

    E-Print Network [OSTI]

    Wang, Hai

    Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P Security has determined that external weapon threats due to surface-air missiles, as well as some

  18. Threat to the point: improving the value of comparative extinction risk analysis for conservation action

    E-Print Network [OSTI]

    Davidson, Ana

    Threat to the point: improving the value of comparative extinction risk analysis for conservation of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats this problem by (i) reviewing the use of threats in this field and (ii) quanti- tatively investigating

  19. OPEN-FILE REPORT 2005-1164 An Assessment of Volcanic Threat and Monitoring

    E-Print Network [OSTI]

    OPEN-FILE REPORT 2005-1164 An Assessment of Volcanic Threat and Monitoring Capabilities Reawakens Volcanic Threat Assessment: Analysis of Hazard and Risk Factors......................... 14 · Table 2. List of hazard and exposure factors used in the NVEWS threat assessment · Figure 3

  20. Reducing the Wildland Fire Threat to Homes: Where and How Much?1

    E-Print Network [OSTI]

    Standiford, Richard B.

    Reducing the Wildland Fire Threat to Homes: Where and How Much?1 Jack D. Cohen2 Abstract. The threat of life and property losses during wildland fires is a significant issue for Federal, State such as hazard mapping and fuel management. The threat of life and property losses during wildland fires

  1. Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing Systems

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing of user separation. The method of data analysis that produced these results is described, and a threat space that parameterizes these possible threats to user integrity is defined. Certain configurations

  2. Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4

    E-Print Network [OSTI]

    Swaddle, John

    Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4 personal force or violence [and] threats of violence." The policy also fulfills the university's statutory obligations under Section 23-9.2:10 of the Code of Virginia, pursuant to which it has established a threat

  3. Journal of Experimental Psychology: Applied Seeing the Crowd for the Bomber: Spontaneous Threat

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Journal of Experimental Psychology: Applied Seeing the Crowd for the Bomber: Spontaneous Threat: Spontaneous Threat Perception From Static and Randomly Moving Crowd Simulations. Journal of Experimental for the Bomber: Spontaneous Threat Perception From Static and Randomly Moving Crowd Simulations Tad T. Brunyé U

  4. High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces

    E-Print Network [OSTI]

    Witkowski, Mark

    High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces Mark sharing and high-level information fusion to allow for the visualisation of highly anisotropic threat options. Keywords: Information Fusion, Threat Map, Tactical Planning. 1 Introduction We present a first

  5. Fast Threat Detection and Localization Using Super-Regenerative Transceiver in

    E-Print Network [OSTI]

    Zhang, Yan

    Fast Threat Detection and Localization Using Super-Regenerative Transceiver in Random Noise Radar-Regenerative (SRG) transceiver as a type of ultra-fast electronics platform for threat detection and localization the Angle-of-Arrival (AOA) information of the inbound threats. Simulations and detailed laboratory

  6. Behavioral/Systems/Cognitive Threat of Punishment Motivates Memory Encoding via

    E-Print Network [OSTI]

    Adcock, R. Alison

    Behavioral/Systems/Cognitive Threat of Punishment Motivates Memory Encoding via Amygdala circuits associated with motivated declarative encoding and active threat avoidance have both been an upcoming scene image. Items associated with the threat of shock were better recognized 24 h later

  7. Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems Jiyun Lee observed during severe ionospheric storms pose potential threats to the integrity of the Ground threats, because ionospheric gradients are not observable to the ground monitor if they impact

  8. On the Value of a Threat Advisory System for Managing Supply Chain Disruptions

    E-Print Network [OSTI]

    Snyder, Larry

    On the Value of a Threat Advisory System for Managing Supply Chain Disruptions Brian T. Tomlin "lean" otherwise. In this paper, we propose and investigate a threat advisory system in which the firm in the threat level. We consider a model in which the firm has a single unreliable supplier, for which inventory

  9. Moderate threat causes longer lasting disruption to processing in anxious individuals

    E-Print Network [OSTI]

    Bishop, Sonia

    Moderate threat causes longer lasting disruption to processing in anxious individuals Sophie: Forster S, Castle E, Nunez-elizalde AO and Bishop SJ(2014) Moderate threat causes longer lasting in anxiety1 Moderate threat causes longer lasting disruption to processing2 in anxious individuals.3 Sophie

  10. Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik

    E-Print Network [OSTI]

    Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik. Prior to claiming the security of a system, it is important to iden- tify the threats to the system in question. Enumerating the threats to a system helps system architects develop realis- tic and meaningful

  11. Subversion as a Threat in Information Warfare Emory A. Anderson1

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    Subversion as a Threat in Information Warfare Emory A. Anderson1 , Cynthia E. Irvine2 , and Roger R-mail: Roger.Schell@aesec.com; ABSTRACT As adversaries develop Information Warfare capabilities, the threat for subversion, that this threat is real, and that it represents a significant vulnerability. Mitigation

  12. The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change?

    E-Print Network [OSTI]

    Hansen, James E.

    The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change? Remarks of James E to describe the threat to our planet posed by unbridled consumption of fossil fuels. I recognize the debt owed to the threat of climate change has been sudden and profound. Only in recent years has the extent and immediacy

  13. LAAS Ionosphere Spatial Gradient Threat Model and Impact of LGF and Airborne Monitoring

    E-Print Network [OSTI]

    Stanford University

    LAAS Ionosphere Spatial Gradient Threat Model and Impact of LGF and Airborne Monitoring Ming Luo of users for the current Category I LAAS architecture. In the ionosphere threat model used by previous-case ionosphere conditions. In this paper, the ionosphere threat model is reexamined based on WAAS and IGS data

  14. Enabling Automated Threat Response through the Use of a Dynamic Security Policy

    E-Print Network [OSTI]

    Boyer, Edmond

    Enabling Automated Threat Response through the Use of a Dynamic Security Policy Herv´e Debar1: Intrusion Detection, Threat Response, Reaction, Access Control Abstract Information systems security issues to provide countermea- sures to threats compromising the security policy. The response process is far from

  15. 8. SYNTHESIS OF RISK ASSESSMENTS: TAXONOMIC, REGIONAL, AND THREAT-BASED PATTERNS

    E-Print Network [OSTI]

    457 8. SYNTHESIS OF RISK ASSESSMENTS: TAXONOMIC, REGIONAL, AND THREAT-BASED PATTERNS Estimated specific or generic information indicating relatively high susceptibility to certain threats (e susceptibility to threats and/or known occurrence in diverse or marginal habitats. Many, if not most, species

  16. TITLE: RELEASING PROTECTED HEALTH INFORMATION TO PREVENT A SERIOUS THREAT TO HEALTH OR SAFETY

    E-Print Network [OSTI]

    Grishok, Alla

    TITLE: RELEASING PROTECTED HEALTH INFORMATION TO PREVENT A SERIOUS THREAT TO HEALTH OR SAFETY the patient's authorization in order to prevent a serious threat to health or safety. PURPOSE The purpose will release a patient's PHI without the patient's authorization to prevent a serious threat to health

  17. Worry Is Associated With Impaired Gating of Threat From Working Memory

    E-Print Network [OSTI]

    Larson, Christine L.

    Emotion Worry Is Associated With Impaired Gating of Threat From Working Memory Daniel M. Stout, C. L. (2014, August 25). Worry Is Associated With Impaired Gating of Threat From Working Memory Is Associated With Impaired Gating of Threat From Working Memory Daniel M. Stout University of Wisconsin

  18. University of Newcastle upon Tyne Threat Analysis of Cryptographic Election Schemes

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    University of Newcastle upon Tyne COMPUTING SCIENCE Threat Analysis of Cryptographic Election IVERSITY OF #12;TECHNICAL REPORT SERIES No. CS-TR-971 June, 2006 Threat Analysis of Cryptographic Election Schemes P. Y. A. Ryan and T. Peacock. Abstract We discuss some vulnerabilities, threats and counter

  19. THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN

    E-Print Network [OSTI]

    Zhu, Chen

    THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN OPPORTuNITy? recently, I attended the 50th?" and "Is China a threat to the power of the United states?" We have known the host and his family for years). are they a welcome expansion or a threat to the quality of programs? In some years, conferencegoers have expressed

  20. Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat

    E-Print Network [OSTI]

    Toronto, University of

    Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat Facial Signals threat. Attention was focused on either scenes or faces presented in a single overlapping display. Facial. These results suggest that automaticity is not funda- mental to the processing of all facial signals of threat

  1. Factoring species, non-species values and threats into biodiversity prioritisation across the ecoregions

    E-Print Network [OSTI]

    Vermont, University of

    population density, and the extinction risk of species. This threat index is positively correlated with allFactoring species, non-species values and threats into biodiversity prioritisation across Biodiversity Species Non-species biological values Threat A B S T R A C T Biodiversity in Africa, Madagascar

  2. SmartNotes: Application of Crowdsourcing to the Detection of Web Threats

    E-Print Network [OSTI]

    Fink, Eugene

    --Crowdsourcing, Machine Learning, Web Security. I. INTRODUCTION Cybersecurity threats can be broadly divided to two high such security threats is still an ongoing battle, but there is another critical type of cybersecurity threats at al., 2009] and other similar scams have emerged due to the increased popularity of on-line banking

  3. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses

    E-Print Network [OSTI]

    Goldberg, Ian

    A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses Xiang Cai1 security, or both. This paper (1) systematically analyzes existing attacks and de- fenses to understand-based analysis provides clear directions to defense designers on which features need to be hidden. Our lower

  4. Deception used for Cyber Defense of Control Systems

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01T23:59:59.000Z

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  5. Defense of Trust Management Vulnerabilities in Distributed Networks

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun , Zhu Han into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five networks inherently rely on cooper- ation among distributed entities. However, coopera- tion is fragile

  6. EIS-0082: Defense Waste Processing Facility, Savannah River Plant

    Broader source: Energy.gov [DOE]

    The Office of Defense Waste and Byproducts Management developed this EIS to provide environmental input into both the selection of an appropriate strategy for the permanent disposal of the high-level radioactive waste currently stored at the Savannah River Plant (SRP) and the subsequent decision to construct and operate a Defense Waste Processing Facility at the SRP site.

  7. Second Line of Defense Spares Program Assessment

    SciTech Connect (OSTI)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20T23:59:59.000Z

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  8. History of Hanford Site Defense Production (Brief)

    SciTech Connect (OSTI)

    GERBER, M S

    2001-02-01T23:59:59.000Z

    This paper acquaints the audience with the history of the Hanford Site, America's first full-scale defense plutonium production site. The paper includes the founding and basic operating history of the Hanford Site, including World War II construction and operations, three major postwar expansions (1947-55), the peak years of production (1956-63), production phase downs (1964-the present), a brief production spurt from 1984-86, the end of the Cold War, and the beginning of the waste cleanup mission. The paper also delineates historical waste practices and policies as they changed over the years at the Hanford Site, past efforts to chemically treat, ''fractionate,'' and/or immobilize Hanford's wastes, and resulting major waste legacies that remain today. This paper presents original, primary-source research into the waste history of the Hanford Site. Finally, the paper places the current Hanford Site waste remediation endeavors in the broad context of American and world history.

  9. Building Stakeholder Trust: Defensible Government Decisions - 13110

    SciTech Connect (OSTI)

    Franklin, Victor A. [Savannah River Remediation LLC, Bldg. 705-1C, Aiken, SC 29808 (United States)] [Savannah River Remediation LLC, Bldg. 705-1C, Aiken, SC 29808 (United States)

    2013-07-01T23:59:59.000Z

    Administrative decisions must be grounded in reasonable expectations, founded on sound principles, and bounded by societal norms. Without these first principles, attaining and retaining public trust is a Herculean task. Decisions made by governmental administrators must be both transparent and defensible: without the former the agency will lose the public's trust and support (possibly prompting a legal challenge to the decision) and without the latter the decision may fail to withstand judicial scrutiny. This presentation and accompanying paper delves into the process by which governmental decisions can achieve both defensibility and openness through building stakeholder trust with transparency. Achieving and maintaining stakeholder trust is crucial, especially in the environs of nuclear waste management. Proving confidence, stability, and security to the surrounding citizenry as well as those throughout the country is the goal of governmental nuclear waste remediation. Guiding administrative decision-making processes and maintaining a broad bandwidth of communication are of incalculable importance to all those charged with serving the public, but are especially essential to those whose decisional impacts will be felt for millennia. A strong, clear, and concise administrative record documenting discrete decisions and overarching policy choices is the strongest defense to a decisional challenge. However, this can be accomplished using transparency as the fundamental building block. This documentation allows the decision-makers to demonstrate the synthesis of legal and technical challenges and fortifies the ground from which challenges will be defended when necessary. Further, administrative actions which capture the public's interest and captivate that interest throughout the process will result in a better-informed, more deeply-involved, and more heavily-invested group of interested parties. Management of information, involvement, and investment on the front-end of the process reaps rewards far more efficiently than attempts to assuage and mitigate the concerns of those parties after the fact and there are a number of tools Savannah River Remediation (SRR) has deployed that render transparency an ally in this context. The makers, applicators, and beneficiaries of policies and decisions will all benefit from strong administrative records which document decisional choices in an open and transparent manner and from timely, up-front management of concerns of interested parties. The strongest defense to decisional challenges is an ability to demonstrate the basis of the decision and the reason(s) that the decision was chosen over other alternatives. Providing a sound basis for defending challenges rather than avoiding or fighting over them allows the deciding entity the greatest opportunity to produce value for its customer. Often, a transparent process that invites public participation and is open for public review and comment will thwart challenge genesis. An entity that has to devote resources to defending its choices obviously cannot utilize those resources to further its mission. (authors)

  10. Next Generation Nuclear Plant Defense-in-Depth Approach

    SciTech Connect (OSTI)

    Edward G. Wallace; Karl N. Fleming; Edward M. Burns

    2009-12-01T23:59:59.000Z

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  11. Dissertation Defense Checklist Student: Schedule Prospectus Meeting. This should be done 4-6 months prior to defense.

    E-Print Network [OSTI]

    Michigan, University of

    Dissertation Defense Checklist Student: Schedule Prospectus Meeting. This should be done 4-6 months prior to defense. Take Approval of Dissertation Prospectus form to meeting. Date of meeting_____________ Student: Submit Approval of Dissertation Prospectus form to SAA Office. SAA Office submits Dissertation

  12. Identification of threats using linguistics-based knowledge extraction.

    SciTech Connect (OSTI)

    Chew, Peter A.

    2008-09-01T23:59:59.000Z

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

  13. RLJ/STAT/UPDATE 1-18-11 1 Situation Threat Assessment Policy and Protocol (Update 1/18/11)

    E-Print Network [OSTI]

    Rusu, Adrian

    RLJ/STAT/UPDATE 1-18-11 1 Situation Threat Assessment Policy and Protocol (Update 1/18/11) Rowan will use available resources within the Division of Student Affairs in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests

  14. Anomaly Detection in Multiple Scale for Insider Threat Analysis

    SciTech Connect (OSTI)

    Kim, Yoohwan [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hively, Lee M [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    We propose a method to quantify malicious insider activity with statistical and graph-based analysis aided with semantic scoring rules. Different types of personal activities or interactions are monitored to form a set of directed weighted graphs. The semantic scoring rules assign higher scores for the events more significant and suspicious. Then we build personal activity profiles in the form of score tables. Profiles are created in multiple scales where the low level profiles are aggregated toward more stable higherlevel profiles within the subject or object hierarchy. Further, the profiles are created in different time scales such as day, week, or month. During operation, the insider s current activity profile is compared to the historical profiles to produce an anomaly score. For each subject with a high anomaly score, a subgraph of connected subjects is extracted to look for any related score movement. Finally the subjects are ranked by their anomaly scores to help the analysts focus on high-scored subjects. The threat-ranking component supports the interaction between the User Dashboard and the Insider Threat Knowledge Base portal. The portal includes a repository for historical results, i.e., adjudicated cases containing all of the information first presented to the user and including any additional insights to help the analysts. In this paper we show the framework of the proposed system and the operational algorithms.

  15. Neutron Interrogation System For Underwater Threat Detection And Identification

    SciTech Connect (OSTI)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C. [Department of Physics and Astronomy, Western Kentucky University, 1906 College Heights Blvd, 11077 Bowling Green, KY 42101 (United States)

    2009-03-10T23:59:59.000Z

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  16. Social/Ethical Issues in Predictive Insider Threat Monitoring

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Frincke, Deborah A.; Zabriskie, Mariah

    2011-01-01T23:59:59.000Z

    Combining traditionally monitored cybersecurity data with other kinds of organizational data is one option for inferring the motivations of individuals, which may in turn allow early prediction and mitigation of insider threats. While unproven, some researchers believe that this combination of data may yield better results than either cybersecurity or organizational data would in isolation. However, this nontraditional approach creates a potential conflict between goals, such as conflicts between organizational security improvements and individual privacy considerations. There are many facets to debate. Should warning signs of a potential malicious insider be addressed before a malicious event has occurred to prevent harm to the organization and discourage the insider from violating the organization’s rules? Would intervention violate employee trust or legal guidelines? What about the possibilities of misuse? Predictive approaches cannot be validated a priori; false accusations can affect the career of the accused; and collection/monitoring of certain types of data may affect employee morale. In this chapter, we explore some of the social and ethical issues stemming from predictive insider threat monitoring and discuss ways that a predictive modeling approach brings to the forefront social and ethical issues that should be considered and resolved by stakeholders and communities of interest.

  17. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  18. Defense Special Case Transuranic Waste Implementation Plan

    SciTech Connect (OSTI)

    Pierce, G.D. (Rockwell International Corp., Albuquerque, NM (United States). Joint Integration Office) [Rockwell International Corp., Albuquerque, NM (United States). Joint Integration Office; Carson, P.H. (Stoller (S.M.) Corp., Boulder, CO (United States)) [Stoller (S.M.) Corp., Boulder, CO (United States)

    1987-06-01T23:59:59.000Z

    The purpose of the Special Case Implementation Plan (SCIP) is to establish a comprehensive plan for the efficient long-term management and disposal of defense special case (SC) transuranic (TRU) waste. To fulfill this purpose, a review of SC waste management strategies (at both the site-specific and TRU program levels), waste characteristics and inventories, processing and transportation options, and disposal requirements was made. This review provides a plan for implementing policy decisions and useful information for making those decisions. The SCIP is intended to provide a baseline plant to which alternate plans can be compared. General potential alternatives are provided for future consideration when data concerning facility availability and costs are better defined. Milestones for the SC Implementation Plan are included which summarize each SC waste site. The cost of implementing the SC program has an upper limit of $89 million for the worst case scenario. The actual cost of implementation could be dramatically lower than the worst case figure. 15 refs., 3 figs., 12 tabs.

  19. Second Line of Defense Spares Program

    SciTech Connect (OSTI)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

    2012-11-20T23:59:59.000Z

    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  20. Annual Report To Congress. Department of Energy Activities Relating to the Defense Nuclear Facilities Safety Board, Calendar Year 2003

    SciTech Connect (OSTI)

    none,

    2004-02-28T23:59:59.000Z

    The Department of Energy (Department) submits an Annual Report to Congress each year detailing the Department’s activities relating to the Defense Nuclear Facilities Safety Board (Board), which provides advice and recommendations to the Secretary of Energy (Secretary) regarding public health and safety issues at the Department’s defense nuclear facilities. In 2003, the Department continued ongoing activities to resolve issues identified by the Board in formal recommendations and correspondence, staff issue reports pertaining to Department facilities, and public meetings and briefings. Additionally, the Department is implementing several key safety initiatives to address and prevent safety issues: safety culture and review of the Columbia accident investigation; risk reduction through stabilization of excess nuclear materials; the Facility Representative Program; independent oversight and performance assurance; the Federal Technical Capability Program (FTCP); executive safety initiatives; and quality assurance activities. The following summarizes the key activities addressed in this Annual Report.

  1. Department of Defense Representatives Visit Hanford to Benchmark Safety

    Broader source: Energy.gov [DOE]

    RICHLAND, Wash., December 16, 2005, Representatives of the Department of Defense's (DoD's) Voluntary Protection Program Center of Excellence (VPP CX) working to reduce injuries at selected (DoD)...

  2. Nuclear Weapon Surety Interface with the Department of Defense

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-05-14T23:59:59.000Z

    This Order establishes Department of Energy and National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the Department of Defense. Cancels DOE O 452.6.

  3. National Defense Authorization Act for Fiscal Year 2005, Information...

    Office of Environmental Management (EM)

    Defense Authorization Act for Fiscal Year 2005" (Public Law 108-375 Oct. 28 2004) Transition20082009EMAdditionalMaterialMACopy.pdf PUBLIC LAW 108-375-OCT. 28, 2004...

  4. U.S. Department of Defense's Rebates and Incentives Regulations

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—covers the U.S. Department of Defense's (DoD's) statuatory authority and financial management regulation for rebates and incentives.

  5. Identifying Enterprise Leverage Points in Defense Acquisition Program Performance

    E-Print Network [OSTI]

    Wirthlin, Major Robb

    2009-01-21T23:59:59.000Z

    *The views expressed in this talk are those of the author and do not reflect the official policy or position of the United States Air Force, the Department of Defense (DoD), or the U.S. Government.

  6. Identifying enterprise leverage points in Defense Acquisition Program performance

    E-Print Network [OSTI]

    Wirthlin, Joseph Robert, 1970-

    2009-01-01T23:59:59.000Z

    Large, complex systems development programs in the Department of Defense are finding it more difficult to deliver desired capabilities to the end user on time and on budget than ever before. Evidence exists that almost all ...

  7. Defense Energy Support Center: Installation Energy Commodity Business Unit

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the Defense Energy Support Center's (DESC's) Installation Energy Commodity Business Unit (CBU) including its intent, commitment, pilot project, lessons learned, and impending barriers.

  8. Psillos and Laudan Psillos's Defense of Scientific Realism

    E-Print Network [OSTI]

    Fitelson, Branden

    defense of realism' (EDR), which argues that the best explanation of the empirical success of scientific theories is that they are approximately true. The EDR takes the NMA to represent an abductive inference

  9. Interface with the Defense Nuclear Facilities Safety Board

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-12-30T23:59:59.000Z

    The manual defines the process DOE will use to interface with the Defense Nuclear Facilities Safety Board and its staff. Canceled by DOE M 140.1-1A. Does not cancel other directives.

  10. Interface with the Defense Nuclear Facilities Safety Board

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-01-26T23:59:59.000Z

    This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Cancels DOE M 140.1-1.

  11. Interface with the Defense Nuclear Facilities Safety Board

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-30T23:59:59.000Z

    This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Cancels DOE M 140.1-1A.

  12. The Office of Environmental Management Non-Defense Environmental...

    Office of Environmental Management (EM)

    Microsoft Word - PSRP Updates 6-25-10v2 The Office of Environmental Management (EM) Defense Environmental Cleanup The Office of Environmental Management Uranium Enrichment D&D...

  13. Wilderness threats matrix: A framework for assessing impacts. Forest Service research paper

    SciTech Connect (OSTI)

    Cole, D.N.

    1994-04-01T23:59:59.000Z

    The report includes the framework represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential application of the matrix are described. An application of the matrix to the wildernesses in the Forest Service's Northern Region (northern Idaho and Montana) suggests that fire management is the most significant threat to those wildernesses and that aquatic systems are the most threatened wilderness attribute.

  14. Department of Defense Benchmarks VPP in Visit to Hanford

    Broader source: Energy.gov [DOE]

    Representatives of the Department of Defense's (DoD's) Voluntary Protection Program Center of Excellence (VPP-CX) are working to meet a safety and health goal established by Secretary of Defense Donald Rumsfeld to reduce injuries at DoD sites nationwide. In order to accomplish this goal, DoD visited the Department of Energy's (DOE's) Hanford Site in southeast Washington State on December 12, 2005, to learn about its exemplary safety programs and benchmark the site's VPP effort.

  15. Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction

    E-Print Network [OSTI]

    Kashtan, Aaron

    2009-01-01T23:59:59.000Z

    the Threat of Graphics in Interactive Fiction Aaron Kashtantwo contemporary works of interactive fiction (IF), NickHuman Factors Keywords Interactive fiction, ekphrasis, word-

  16. Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction

    E-Print Network [OSTI]

    Kashtan, Aaron

    2009-01-01T23:59:59.000Z

    of the power of computer graphics, text still has access tothat are unavailable in graphics – including visual effects.Visuality and the Threat of Graphics in Interactive Fiction

  17. Defense programs beryllium good practice guide

    SciTech Connect (OSTI)

    Herr, M.

    1997-07-01T23:59:59.000Z

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to generate dusts, mists, fumes, or small particulates. A beryllium exposure control program should minimize airborne concentrations, the potential for and spread of contamination, the number of times individuals are exposed to beryllium, and the number of employees who may be potentially exposed.

  18. GEOSPATIOTEMPORAL DATA MINING IN AN EARLY WARNING SYSTEM FOR FOREST THREATS IN THE UNITED STATES

    E-Print Network [OSTI]

    Mills, Richard

    GEOSPATIOTEMPORAL DATA MINING IN AN EARLY WARNING SYSTEM FOR FOREST THREATS IN THE UNITED STATES F) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster States (CONUS) as part of a two tier system: An early warning system that monitors continental-scale ar

  19. Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid

    E-Print Network [OSTI]

    Wang, Wenye

    Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

  20. Recommendations for the Next President Pacific Institute Fresh Water: Threats and Opportunities

    E-Print Network [OSTI]

    . Gleicki October 9, 2008 Lack of a National Water Policy As we enter the 21st century, pressures on waterRecommendations for the Next President Pacific Institute Fresh Water: Threats and Opportunities WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Background Material Dr. Peter H

  1. Climate change is one of the greatest threats facing us today. CICERO's mission

    E-Print Network [OSTI]

    Johansen, Tom Henning

    Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

  2. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    SciTech Connect (OSTI)

    George A. Beitel

    2004-02-01T23:59:59.000Z

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  3. Un-reduction

    E-Print Network [OSTI]

    Martins Bruveris; David C. P. Ellis; Francois Gay-Balmaz; Darryl D. Holm

    2015-04-08T23:59:59.000Z

    This paper provides a full geometric development of a new technique called un-reduction, for dealing with dynamics and optimal control problems posed on spaces that are unwieldy for numerical implementation. The technique, which was originally concieved for an application to image dynamics, uses Lagrangian reduction by symmetry in reverse. A deeper understanding of un-reduction leads to new developments in image matching which serve to illustrate the mathematical power of the technique.

  4. Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, Calendar Year 1999

    SciTech Connect (OSTI)

    None

    2000-02-01T23:59:59.000Z

    This is the tenth Annual Report to the Congress describing Department of Energy activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of Energy regarding public health and safety issues at the Department's defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. During 1999, Departmental activities resulted in the closure of nine Board recommendations. In addition, the Department has completed all implementation plan milestones associated with three Board recommendations. One new Board recommendation was received and accepted by the Department in 1999, and a new implementation plan is being developed to address this recommendation. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, opening of a repository for long-term storage of transuranic wastes, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

  5. Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998

    SciTech Connect (OSTI)

    NONE

    1999-02-01T23:59:59.000Z

    This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

  6. Insider Threat - Material Control and Accountability Mitigation (Presentation)

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    Why is the insider a concern? There are many documented cases of nuclear material available for sale - there are more insider diversions than outsider attacks and more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. Insider attributes are: have access, has authority, possesses knowledge, works with absence of timeline, can test system, and may act alone or support a team. Material control and accountability (MC&A) is an essential part of an integrated safeguards system. Objectives of MC&A are: (1) Ongoing confirmation of the presence of special nuclear material (SNM) in assigned locations; (2) Prompt investigation of anomalies that may indicate a loss of SNM; (3) Timely and localized detection of loss, diversion, or theft of a goal quantity; (4) Rapid assessment and response to detection alarms; and (5) Timely generation of information to aid in the recovery of SNM in the event of an actual loss, diversion, or theft from the purview of the MC&A system. Control and accountability of material, equipment, and data are essential to minimizing insider threats.

  7. The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon2001Competitiveness |The MakingThe

  8. 52293Federal Register / Vol. 79, No. 170 / Wednesday, September 3, 2014 / Proposed Rules that even if each threat individually

    E-Print Network [OSTI]

    if each threat individually does not result in population-level effects that may warrant protection). For the other six petitioned species, we have specifically considered whether two or more of the threats or in the foreseeable future. We have no information to suggest that the identified threats to the species will work

  9. 36284 Federal Register / Vol. 79, No. 123 / Thursday, June 26, 2014 / Proposed Rules threat (e.g., fishery interactions, ship

    E-Print Network [OSTI]

    36284 Federal Register / Vol. 79, No. 123 / Thursday, June 26, 2014 / Proposed Rules threat (e concludes that the recovering population in combination with the removal of previously identified threats- and long-term; (7) the effects of other threats, including whaling, disease and predation, contaminants

  10. Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance

    E-Print Network [OSTI]

    Parasuraman, Raja

    Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode to detect infrequent threat-related actions. Participants indicated detection of target actions either vigilance task. Irrespective of response mode, the detection rate of intentional threats declined over time

  11. Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 & 28,

    E-Print Network [OSTI]

    McMains, Sara

    Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 they call "stereotype threat": when black students are put into a situation where they are directly-- the resulting pressure causes their performance to suffer." "Steele and others have found stereotype threat

  12. Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd Maddox, and Grant C. Baldwin

    E-Print Network [OSTI]

    Maddox, W. Todd

    Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd of strands of work to identify causes of stereotype threat in a way that allows them to reverse the effects. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks

  13. Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth Padmala, and Luiz Pessoa

    E-Print Network [OSTI]

    Pessoa, Luiz

    Emotion Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth., Bauer, A., Padmala, S., & Pessoa, L. (2011, June 27). Threat of Bodily Harm Has Opposing Effects on Cognition. Emotion. Advance online publication. doi: 10.1037/a0024345 #12;Threat of Bodily Harm Has Opposing

  14. INFECTIOUS DISEASE OUTBREAKS Avian Flu, measles, Mumps, SARs, and other infectious diseases can pose a threat to the

    E-Print Network [OSTI]

    Meyers, Steven D.

    pose a threat to the University community as they do to communities worldwide. If there is an outbreak has extensive information on these and other health threats on their website (http are appropriate to the emerging threat and ready for implementation. Response team meets with increasing frequency

  15. 34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0.02 Bomb Threat Procedures Approved September 25, 2001 Revised April 30, 2010 Next scheduled review: April 4, 2016 Standard Administrative Procedure Statement Any and all bomb threats are regarded seriously

  16. DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information via

    E-Print Network [OSTI]

    Reber, Paul J.

    DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information University, Chicago, IL, USA Preferential processing of threat has been implicated in the development and perpetuation of anxiety. We investigated threat processing and anxiety using a subliminal priming paradigm

  17. Are three-dimensional spider webs defensive adaptations?

    E-Print Network [OSTI]

    Blackledge, Todd

    LETTER Are three-dimensional spider webs defensive adaptations? Todd A. Blackledge1 *, Jonathan A-mail: tab42@cornell.edu Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs have been primarily considered to be foraging adaptations, neglecting

  18. Doctoral Defense "Low-Temperature Anaerobic Membrane Bioreactor for

    E-Print Network [OSTI]

    Kamat, Vineet R.

    Doctoral Defense "Low-Temperature Anaerobic Membrane Bioreactor for Energy Recovery from Domestic such as anaerobic membrane bioreactors (AnMBRs) are emerging as one option to recover energy during domestic highlighting microbial community shifts in the bioreactor and biofilm during changes in membrane fouling

  19. School of Industrial Engineering and Management Doctoral Dissertation Defense

    E-Print Network [OSTI]

    Balasundaram, Balabhaskar "Baski"

    School of Industrial Engineering and Management Doctoral Dissertation Defense Objectives methodology and the results. · Provide the advisory committee with a means for assuring that the dissertation dissertation proposal. · Provide the advisory committee with a final data point for verification of the student

  20. BETAVOLTAIC BATTERIES Long-Life Power for Defense & Medical Markets

    E-Print Network [OSTI]

    BETAVOLTAIC BATTERIES Long-Life Power for Defense & Medical Markets NREL Industry Growth Forum Jonathan W. Greene, CEO November 2, 2009 #12;·! Patented Betavoltaics ­ tiny, long life batteries targeting electronic and isotope powered batteries MS - 14 yrs management and engineering ·!Expert in patent

  1. RISK MANAGEMENT AND TORT DEFENSE Sub-Chapter 2

    E-Print Network [OSTI]

    Dyer, Bill

    1 #12;2 RISK MANAGEMENT AND TORT DEFENSE 2.6.203 Sub-Chapter 2 State Vehicle Use 2.6.201 INTRODUCTION (1) The following rules define acceptable uses for state-owned or leased motor pool vehicles guidelines, policies, insurance coverage exclusions, or regulations for vehicle/equipment fleet operations

  2. analyses defense nuclear: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    analyses defense nuclear First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Global Analyses of Nuclear...

  3. Towards Attack-Agnostic Defenses David Brumley and Dawn Song

    E-Print Network [OSTI]

    Brumley, David

    Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract Internet attackers control hundreds of thousands to per- haps millions of computers, which they can use for a va- riety of different attacks. Common attacks include spam delivery, phishing, and DDo

  4. Embedded Electrical and Computer Engineering MASTER ORAL DEFENSE

    E-Print Network [OSTI]

    Mahmoodi, Hamid

    of this research is to design a low power integrated system that can be used in vivo for scanning the electrode. A model created in Python provides input vectors and output comparison for the verification processEmbedded Electrical and Computer Engineering MASTER ORAL DEFENSE TITLE: Low Power Scanner for High

  5. A Cooperative Cyber Defense for Securing Critical Infrastructures

    E-Print Network [OSTI]

    Fulp, Errin W.

    .g., the numerous private companies that make up North America's electrical power grids) that share computationalA Cooperative Cyber Defense for Securing Critical Infrastructures Glenn A. Fink glenn networked relationships. At electrical substations, it is common to find equipment from several companies

  6. On Clinical Trials in Psychiatry In Defense of the Traditional

    E-Print Network [OSTI]

    On Clinical Trials in Psychiatry In Defense of the Traditional EÆcacy Trial The randomized controlled clinical trial is still a relatively new technology for as- sessing the value of therapeutic interven- tions, yet innovations in the design and analysis of clinical trials in psychiatry have lagged

  7. Darwin's Pangenesis and the Problem of Unconceived Alternatives P. Kyle Stanford has argued that the most substantial threat to scientific realism

    E-Print Network [OSTI]

    Barrett, Jeffrey A.

    argued that the most substantial threat to scientific realism arises from the problem of unconceived significant threat to scientific realism derives neither from traditional underdetermination arguments nor

  8. Practical matters for defense contractors converting DoD technology to commercial markets

    E-Print Network [OSTI]

    Ting, Carina Maria

    2012-01-01T23:59:59.000Z

    This thesis asks if and how the defense contractor can profitably transfer the technology and institutional learning obtained from DoD funded R&D to commercial markets. There are numerous examples of very successful defense ...

  9. Study of Medical Students’ Malpractice Fear and Defensive Medicine: A “Hidden Curriculum?”

    E-Print Network [OSTI]

    Johnston, William; Rodriguez, Robert; Suarez, David; Fortman, Jonathan

    2014-01-01T23:59:59.000Z

    Journal of Emergency Medicine Volume XV, NO . 3 : May 2014WM, et al. Defensive medicine among high-risk specialist293:2609-2617. 3. Defensive Medicine and Medical Practice.

  10. Project Programming and Commissioning as a Risk Mitigation and Threat Analysis Tool

    E-Print Network [OSTI]

    Weiss, M. L.

    2006-01-01T23:59:59.000Z

    beyond traditional disciplines including risk/threat analysis and mitigation programs. This paper discusses the growing trend of using a commissioning approach as a documentation process for the validation requirements, which are documented in the study...

  11. Threat assessment for safe navigation in environments with uncertainty in predictability

    E-Print Network [OSTI]

    Aoudé, Georges Salim

    2011-01-01T23:59:59.000Z

    This thesis develops threat assessment algorithms to improve the safety of the decision making of autonomous and human-operated vehicles navigating in dynamic and uncertain environments, where the source of uncertainty is ...

  12. What Happens When Low Status Groups Start Moving Up? Prejudice and Threat to Group Position

    E-Print Network [OSTI]

    Nierman, Angela J.

    2007-11-20T23:59:59.000Z

    Does threat operate as a cause or a consequence of prejudice? Three studies investigated how high status groups respond to low status groups' advances. I hypothesized that gays' status gains are threatening to heterosexuals' privileged group...

  13. CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    district heating sector in 2007, confirms the theoretical predictions. Keywords: regulatory threat, district heating, Sweden JEL Classification: L12, L21, L51, L97 hal-00659458,version1-12Jan2012 #12;2 1

  14. A unified framework for trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles

    E-Print Network [OSTI]

    Anderson, Sterling J., Ph. D. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    This thesis describes the design of an active safety framework that performs trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation ...

  15. Tackling the Triple-Threat Genome of Miscanthus x giganteus (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Moose, Steve

    2011-04-25T23:59:59.000Z

    Steve Moose from the University of Illinois at Urbana-Champaign and the Energy Biosciences Institute on "Tackling the Triple-Threat Genome of Miscanthus x giganteus" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

  16. Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS)

    E-Print Network [OSTI]

    Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS) Mr. Jack Summe currently Psychological Operations Group (Airborne) from 2003-2005. A native of Warsaw, Indiana, he holds a bachelor

  17. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    SciTech Connect (OSTI)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01T23:59:59.000Z

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

  18. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31T23:59:59.000Z

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  19. US strategic nuclear forces in the post strategic arms reduction talk world: Is there a future for nuclear deterrence. Research report

    SciTech Connect (OSTI)

    Filler, R.J.

    1998-06-01T23:59:59.000Z

    Following victory in the Cold War, the Soviet threat that shaped United States` nuclear deterrent strategy for the past 40 years, is gone. That defined, monolithic threat has been replaced by a diverse array of new challenges including proliferation of nuclear, chemical and biological Weapons of Mass Destruction (WMD) among regional powers, rogue states and non-state actors. In the face of this emerging WMD threat, the United States is dismantling its chemical and biological weapons stockpile and remains committed to further reductions in its nuclear arsenal. Can a reduced U.S. nuclear weapons arsenal provide a credible deterrent to the growing threat posed by proliferation of WMD. Finally, in light of the current Revolution in Military Affairs (RMA), is it time to reduce our dependence on nuclear weapons and pursue other deterrent options.

  20. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem

  1. DEPARTMENT OF DEFENSE LUNG CANCER RESEARCH PROGRAM FISCAL YEAR 2013 STRATEGIC PLAN

    E-Print Network [OSTI]

    von der Heydt, Rüdiger

    DEPARTMENT OF DEFENSE LUNG CANCER RESEARCH PROGRAM FISCAL YEAR 2013 STRATEGIC PLAN The Fiscal Year 2013 (FY13) Defense Appropriations Act provides for $10.5 million to the Department of Defense Lung Cancer Research Program (LCRP) to support innovative, high- impact lung cancer research. This program

  2. MARQUETTE UNIVERSITY GRADUATE SCHOOL ANNOUNCEMENT OF PUBLIC DEFENSE OF THE DISSERTATION

    E-Print Network [OSTI]

    Sanders, Matthew

    MARQUETTE UNIVERSITY GRADUATE SCHOOL ANNOUNCEMENT OF PUBLIC DEFENSE OF THE DISSERTATION This form obligates you, your Dissertation Director, and your committee to a public defense of your dissertation community. The dissertation defense schedule is published on the Graduate School's Web site. You are solely

  3. Testing a Collaborative DDoS Defense in a Red Team/Blue Team Exercise

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Testing a Collaborative DDoS Defense in a Red Team/Blue Team Exercise Jelena Mirkovic, Member, IEEE, and performed October 2002 to May 2003. The goal of the exercise was to evaluate a collaborative DDoS defense in DDoS defense systems (e.g., avoiding reliance on timing mechanisms), and taught us many lessons about

  4. DISCLOSURE OF EDUCATION RECORDS IN HEALTH AND SAFETY EMERGENCIES If the university determines that there is an articulable and significant threat to the health or safety of a student or

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    If the university determines that there is an articulable and significant threat individuals. · ``Articulable and significant threat'' means that if a school reasonably believes that a student poses a significant threat, such as a threat

  5. CX-009618: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Defense Threat Reduction Agency (DTRA) Radar Testing CX(s) Applied: B3.1 Date: 11/07/2012 Location(s): South Carolina Offices(s): Savannah River Operations Office

  6. Materials evaluation programs at the Defense Waste Processing Facility

    SciTech Connect (OSTI)

    Gee, J.T.; Iverson, D.C.; Bickford, D.F.

    1992-12-31T23:59:59.000Z

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided.

  7. Materials evaluation programs at the Defense Waste Processing Facility

    SciTech Connect (OSTI)

    Gee, J.T.; Iverson, D.C.; Bickford, D.F.

    1992-01-01T23:59:59.000Z

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided.

  8. Sequential Defense Against Random and Intentional Attacks in Complex Networks

    E-Print Network [OSTI]

    Chen, Pin-Yu

    2015-01-01T23:59:59.000Z

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is firstly proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and valida...

  9. Nuclear Weapon Surety Interface with the Department of Defense

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-19T23:59:59.000Z

    The Order prescribes how the Department of Energy participates with the Department of Defense (DoD) to ensure the surety (safety, security and control) of military nuclear weapon systems deployed around the world. The Order establishes National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the DoD. Cancels DOE O 5610.13. Canceled by DOE O 452.6A.

  10. Defenses against Covert-Communications in Multimedia and Sensor Networks

    E-Print Network [OSTI]

    Jainsky, Julien Sebastien 1981-

    2012-11-29T23:59:59.000Z

    subversive communications to a much greater extent. 3 Furthermore, the acquisition of highly correlated multimedia provides fertile ground for advanced steganographic approaches. Covert communications in multimedia networks is of special concern...DEFENSES AGAINST COVERT-COMMUNICATIONS IN MULTIMEDIA AND SENSOR NETWORKS A Dissertation by JULIEN SEBASTIEN JAINSKY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements...

  11. Defense against common mode failures in protection system design

    SciTech Connect (OSTI)

    Wyman, R.H.; Johnson, G.L.

    1997-08-27T23:59:59.000Z

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods to cope with the concern. Common-mode failures have been a ``fact-of-life`` in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D&D)-coupled with the fact that hardware common-mode failures are often distributed in time-has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D&D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of conimon-mode failure analysis called ``defense-in-depth and diversity analysis`` has been developed to identify possible conimon-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided.

  12. Threat-aware Path Planning in Uncertain Urban Environments Georges S. Aoude, Brandon D. Luders, Daniel S. Levine, and Jonathan P. How

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat-aware Path Planning in Uncertain Urban Environments Georges S. Aoude, Brandon D. Luders intents. We propose a novel threat assessment module, consisting of an intention predictor and a threat assessor, which augments the host vehicle's path planner with a real-time threat value representing

  13. Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is

    E-Print Network [OSTI]

    Rusu, Adrian

    Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed resources within the Division of Student Life in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests intent to harm self

  14. REDUCTIONS WITHOUT REGRET: SUMMARY

    SciTech Connect (OSTI)

    Swegle, J.; Tincher, D.

    2013-09-16T23:59:59.000Z

    This paper briefly summarizes the series in which we consider the possibilities for losing, or compromising, key capabilities of the U.S. nuclear force in the face of modernization and reductions. The first of the three papers takes an historical perspective, considering capabilities that were eliminated in past force reductions. The second paper is our attempt to define the needed capabilities looking forward in the context of the current framework for force modernization and the current picture of the evolving challenges of deterrence and assurance. The third paper then provides an example for each of our undesirable outcomes: the creation of roach motels, box canyons, and wrong turns.

  15. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    SciTech Connect (OSTI)

    Draelos, T.J.; Craft, R.L.

    1996-03-01T23:59:59.000Z

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  16. Invasion of French Polynesia by the Glassy-Winged Sharpshooter, Homalodisca coagulata (Hemiptera: Cicadellidae): A New Threat

    E-Print Network [OSTI]

    Hoddle, Mark S.

    (Hemiptera: Cicadellidae): A New Threat to the South Pacific1 Julie Grandgirard,2,3 Mark S. Hoddle,4 George K

  17. Aluminum reduction cell electrode

    DOE Patents [OSTI]

    Goodnow, W.H.; Payne, J.R.

    1982-09-14T23:59:59.000Z

    The invention is directed to cathode modules comprised of refractory hard metal materials, such as TiB[sub 2], for an electrolytic cell for the reduction of alumina wherein the modules may be installed and replaced during operation of the cell and wherein the structure of the cathode modules is such that the refractory hard metal materials are not subjected to externally applied forces or rigid constraints. 9 figs.

  18. The Smith plan, Texas frontier defense in the 1850's

    E-Print Network [OSTI]

    Frysinger, Victor Francis

    1975-01-01T23:59:59.000Z

    - bat the Indians from the annexation of Texas in 1845 up until the departure of General Persifor F . Smith in April, 1856. The early years of statehood were filled with confusion, dis- organization, and disunity as far as frontier defense.... General Smith in Texas, 1851-1856 IV. Aftermath and Evaluation 24 85 Appendix: Status of Forces in Texas, 1851-1856 . 93 Bibliography 105 Vita 113 LIST OF MAPS Map 1 ACTIVE MILITARY POSTS IN TEXAS, 1849 2 THE SMITH PLAN COMPLETED& 1852 3 ACT1VE...

  19. Ike Skelton Defense Authorization Act | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtel JumpCounty, Texas:ITCSolidIdaho‎ |Idylwood,Ike Skelton Defense

  20. Defense Programs: the mission | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration wouldDECOMPOSITIONPortal Decision Support forDeep Insights from8,Defense

  1. National Defense University (NDU) Application | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin of Contamination in Many DevilsForum | Department of EnergyInnovationNational Defense

  2. THE DEVELOPMENT OF COAL-BASED TECHNOLOGIES FOR DEPARTMENT OF DEFENSE FACILITIES

    SciTech Connect (OSTI)

    Bruce G. Miller; Sharon Falcone Miller; Sarma V. Pisupati; Chunshan Song; Ronald S. Wasco; Ronald T. Wincek; Xiaochun Xu; Alan W. Scaroni; Richard Hogg; Subhash Chander; M. Thaddeus Ityokumbul; Mark S. Klima; Peter T. Luckie; Adam Rose; Richard L. Gordon; Jeffrey Lazo; A. Michael Schaal

    2004-01-30T23:59:59.000Z

    The third phase of a three-phase project investigating the development of coal-based technologies for US Department of Defense (DOD) facilities was completed. The objectives of the project were to: decrease DOD's dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase III activities were focused on evaluating deeply-cleaned coals as fuels for industrial boilers and investigating emissions control strategies for providing ultra-low emissions when firing coal-based fuels. This was addressed by performing coal beneficiation and preparation studies, and bench- to demonstration-scale emissions reduction studies. In addition, economic studies were conducted focused on determining cost and market penetration, selection of incentives, and regional economic impacts of coal-based technologies.

  3. Toward US-Russian strategic defense: Ban the ABM Treaty now

    SciTech Connect (OSTI)

    Savelyev, A.

    1992-11-12T23:59:59.000Z

    Boris Yeltsin and George Bush agreed on June 17 to develop and deploy a jointly controlled global protection system against ballistic missile strikes. Three teams of Russian and American experts now are studying the Bush-Yeltsin idea, called the Joint Defense Program (JDP). The drive to develop a U.S.-Russian defense system, however, faces a formidable obstacle-the 1972 Anti-Ballistic Missile (ABM) Treaty, which prohibits not only the deployment of territorial defenses against strategic missiles but the creation of an infrastructure (or `base`) for such a defense. If America and Russia hope to build a common defense against ballistic missiles, they first will have to remove ABM Treaty obstacles to expanded U.S.-Russian cooperation and missile defense.

  4. Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000

    SciTech Connect (OSTI)

    None

    2001-03-01T23:59:59.000Z

    This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

  5. Forest Fuels ReductionForest Fuels Reduction Department of

    E-Print Network [OSTI]

    Bolding, M. Chad

    the initial fuels reduction treatments leave the site with regard to long-term forest vegetation and soil are the productivity and cost rates for alternative choices of equipment for mechanical fuels reduction; what reduction operations for existing markets and new markets? (eg. biomass energy) Research Rationale

  6. Status of Environmental Management Initiatives to Accelerate the Reduction of Environmental Risks and Challenges Posed by the Legacy of the Cold War

    Broader source: Energy.gov [DOE]

    This Report to Congress was prepared pursuant to section 3130 of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2008, and summarized the EM program and initiatives to accelerate the reduction of environmental risks and challenges posed by the legacy of the Cold War.

  7. An army for the people : the self- defense forces and society in postwar Japan

    E-Print Network [OSTI]

    Sasaki, Tomoyuki

    2009-01-01T23:59:59.000Z

    saiban kankei shiry?. SDF-related Newspapers Akashiya.Containing Protest: Anti-SDF Litigation and the Defensethe Self-Defense Forces (SDF), established close ideological

  8. Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995

    Broader source: Energy.gov [DOE]

    Defense Programs has undertaken an effort to compare the competencies in the GeneralTechnical Base Qualification Standard and the Functional Area Qualification Standards withvarious positions in...

  9. Defense Science and Technology Innovation Teams: Mechanisms and Indicators for Indigenous Innovation in China

    E-Print Network [OSTI]

    WRIGHT, Darren J.

    2015-01-01T23:59:59.000Z

    STUDY OF INNOVATION AND TECHNOLOGY IN CHINA RESEARCH BRIEFThe Study of Innovation and Technology in China (SITC) is aDefense Science and Technology Innovation Teams: Mechanisms

  10. ALERTEES PAR LA MORT CELLULAIRE, NOS DEFENSES ANTIVIRALES METTENT LE TURBO

    E-Print Network [OSTI]

    Loewith, Robbie

    MORT CELLULAIRE, NOS DEFENSES ANTIVIRALES METTENT LE TURBO Genève, le 9 février 2012 SOUS EMBARGO JUSQU

  11. An army for the people : the self- defense forces and society in postwar Japan

    E-Print Network [OSTI]

    Sasaki, Tomoyuki

    2009-01-01T23:59:59.000Z

    purpose of defense. ” Judge Fukushima, however, stated thatof the base. Judge Fukushima Shigeo argued that tree fellingfiled their lawsuit. Judge Fukushima Shigeo, the same judge

  12. Tomato-Potato Aphid Interactions: Insights into Plant Defense and the Aphid Pest

    E-Print Network [OSTI]

    Atamian, Hagop Sarkis

    2012-01-01T23:59:59.000Z

    induced defenses in tomato on the potato aphid, Macrosiphumin arbuscular mycorrhizal potato root colonization. Funct.and behavior of the potato aphid, Macrosiphum euphorbiae.

  13. Defense High-Level Waste Leaching Mechanisms Program. Final report

    SciTech Connect (OSTI)

    Mendel, J.E. (compiler)

    1984-08-01T23:59:59.000Z

    The Defense High-Level Waste Leaching Mechanisms Program brought six major US laboratories together for three years of cooperative research. The participants reached a consensus that solubility of the leached glass species, particularly solubility in the altered surface layer, is the dominant factor controlling the leaching behavior of defense waste glass in a system in which the flow of leachant is constrained, as it will be in a deep geologic repository. Also, once the surface of waste glass is contacted by ground water, the kinetics of establishing solubility control are relatively rapid. The concentrations of leached species reach saturation, or steady-state concentrations, within a few months to a year at 70 to 90/sup 0/C. Thus, reaction kinetics, which were the main subject of earlier leaching mechanisms studies, are now shown to assume much less importance. The dominance of solubility means that the leach rate is, in fact, directly proportional to ground water flow rate. Doubling the flow rate doubles the effective leach rate. This relationship is expected to obtain in most, if not all, repository situations.

  14. Defense waste vitrification studies during FY-1981. Summary report

    SciTech Connect (OSTI)

    Bjorklund, W.J. (comp.)

    1982-09-01T23:59:59.000Z

    Both simulated alkaline defense wastes and simulated acidic defense wastes (formed by treating alkaline waste with formic acid) were successfully vitrified in direct liquid-fed melter experiments. The vitrification process was improved while using the formate-treated waste. Leach resistance was essentially the same. Off-gas entrainment was the primary mechanism for material exiting the melter. When formate waste was vitrified, the flow behavior of the off gas from the melter changed dramatically from an erratic surging behavior to a more quiet, even flow. Hydrogen and CO were detectable while processing formate feed; however, levels exceeding the flamability limits in air were never approached. Two types of melter operation were tested during the year, one involving boost power. Several boosting methods located within the melter plenum were tested. When lid heating was being used, water spray cooling in the off gas was required. Countercurrent spray cooling was more effective than cocurrent spray cooling. Materials of construction for the off-gas system were examined. Inconel-690 is preferred in the plenum area. Inspection of the pilot-scale melter found that corrosion of the K-3 refractory and Inconel-690 electrodes was minimal. An overheating incident occurred with the LFCM in which glass temperatures up to 1480/sup 0/C were experienced. Lab-scale vitrification tests to study mercury behavior were also completed this year. 53 figures, 63 tables.

  15. NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to

    E-Print Network [OSTI]

    human act¡v¡t¡es, such as dredging in the mar¡ne env¡ronment 0r the ¡ntakes of power plants, may ¡nc power plants often take in sea water to cool the reactors. Sea turtles may be trapped against intakeNOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to help conserve

  16. Modeling threat assessments of water supply systems using markov latent effects methodology.

    SciTech Connect (OSTI)

    Silva, Consuelo Juanita

    2006-12-01T23:59:59.000Z

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  17. Damage Threats and Response of Final Optics for Laser-Fusion Power Plants

    E-Print Network [OSTI]

    Tillack, Mark

    Damage Threats and Response of Final Optics for Laser-Fusion Power Plants M. S. Tillack1 , S. A-1597 The final optics for laser-IFE (inertial fusion energy) power plants will be exposed to a variety of damage to be the most serious concerns for a power plant. 1. Introduction Survival of the final optic is one of the most

  18. DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE

    E-Print Network [OSTI]

    DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE AND ENVIRONMENT? By Michael E. Mann I. Introduction The subjects of "global warming" and "climate change" have become parts of both the popular lexicon and the public discourse. Discussions of global warming often evoke passionate

  19. EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

  20. Toward a generic model of security in organizational context: exploring insider threats to information infrastructure.

    SciTech Connect (OSTI)

    Martinez-Moyano, I. J.; Samsa, M. E.; Burke, J. F.; Akcam, B. K.; Decision and Information Sciences; Rockefeller Coll. at the State Univ. of New York at Albany

    2008-01-01T23:59:59.000Z

    This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and attack analysis. This paper discusses the information security implementation case.

  1. The threat of terrorism and other attacks raises profound dilemmas for the electric power industry.

    E-Print Network [OSTI]

    Amin, S. Massoud

    &D) on infrastructure security at the Electric Power Research Institute (EPRI). At first, I was faced with many reports launched an Infrastructure Security Initiative (ISI), a two-year pro- gram funded by the electric powerThe threat of terrorism and other attacks raises profound dilemmas for the electric power industry

  2. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui infrastructure and begins to show its inability as the demand for power delivery and consumption boosts in recent power grid. This integration, however, brings a new host of vulnerabilities stem from Internet and opens

  3. ARTICLE doi:10.1038/nature09440 Global threats to human water security

    E-Print Network [OSTI]

    McIntyre, Peter

    ,20 . The success of integrated water management strategies depends on striking a balance between human resource use policy and management responses to this crisis, and underscores the necessity of limiting threats change, urb- anization, industrialization and engineering schemes like reservoirs, irrigation

  4. The Threat to the Planet* Dark & Bright Sides of Global Warming

    E-Print Network [OSTI]

    Hansen, James E.

    The Threat to the Planet* Dark & Bright Sides of Global Warming Jim Hansen 3 October 2007 presented provides most important information on global warming. Recorded human history occurs within the Holocene for these large climate change is perturbations of Earth's orbit. #12;Continental Drift Fig. 1 "Global Warming

  5. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    to be able to communicate with smart meters via a Home Area Network (HAN) facilitating efficient powerInternational Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid

  6. Risk Analysis of Phytophthora ramorum, a Newly Recognised Pathogen Threat to Europe

    E-Print Network [OSTI]

    Risk Analysis of Phytophthora ramorum, a Newly Recognised Pathogen Threat to Europe and the Cause; 23rd January 2009) Deliverable Report D28 Report on the risk of entry, establishment, spread OF TABLES LIST OF FIGURES LIST OF PARTICIPANTS AND CONTRIBUTORS 3 5 6 SUMMARY: PEST RISK ANALYSIS

  7. Defensive Investments and the Demand for Air Quality: Evidence from the NOx Budget Program and Ozone Reductions

    E-Print Network [OSTI]

    Deschênes, Olivier

    2012-07-15T23:59:59.000Z

    The economic costs of environmental regulations have been widely debated since the U.S. began to restrict pollution emissions more than four decades ago. Using detailed production data from nearly 1.2 million plant ...

  8. Development Of Ion Chromatography Methods To Support Testing Of The Glycolic Acid Reductant Flowsheet In The Defense Waste Processing Facility

    SciTech Connect (OSTI)

    Wiedenman, B. J.; White, T. L.; Mahannah, R. N.; Best, D. R.; Stone, M. E.; Click, D. R.; Lambert, D. P.; Coleman, C. J.

    2013-10-01T23:59:59.000Z

    Ion Chromatography (IC) is the principal analytical method used to support studies of Sludge Reciept and Adjustment Tank (SRAT) chemistry at DWPF. A series of prior analytical ''Round Robin'' (RR) studies included both supernate and sludge samples from SRAT simulant, previously reported as memos, are tabulated in this report.2,3 From these studies it was determined to standardize IC column size to 4 mm diameter, eliminating the capillary column from use. As a follow on test, the DWPF laboratory, the PSAL laboratory, and the AD laboratory participated in the current analytical RR to determine a suite of anions in SRAT simulant by IC, results also are tabulated in this report. The particular goal was to confirm the laboratories ability to measure and quantitate glycolate ion. The target was + or - 20% inter-lab agreement of the analyte averages for the RR. Each of the three laboratories analyzed a batch of 12 samples. For each laboratory, the percent relative standard deviation (%RSD) of the averages on nitrate, glycolate, and oxalate, was 10% or less. The three laboratories all met the goal of 20% relative agreement for nitrate and glycolate. For oxalate, the PSAL laboratory reported an average value that was 20% higher than the average values reported by the DWPF laboratory and the AD laboratory. Because of this wider window of agreement, it was concluded to continue the practice of an additional acid digestion for total oxalate measurement. It should also be noted that large amounts of glycolate in the SRAT samples will have an impact on detection limits of near eluting peaks, namely Fluoride and Formate. A suite of scoping experiments are presented in the report to identify and isolate other potential interlaboratory disceprancies. Specific ion chromatography inter-laboratory method conditions and differences are tabulated. Most differences were minor but there are some temperature control equipment differences that are significant leading to a recommendation of a heated jacket for analytical columns that are remoted for use in radiohoods. A suggested method improvement would be to implement column temperture control at a temperature slightly above ambient to avoid peak shifting due to temperature fluctuations. Temperature control in this manner would improve short and longer term peak retention time stability. An unknown peak was observed during the analysis of glycolic acid and SRAT simulant. The unknown peak was determined to best match diglycolic acid. The development of a method for acetate is summaraized, and no significant amount of acetate was observed in the SRAT products tested. In addition, an alternative Gas Chromatograph (GC) method for glycolate is summarized.

  9. An approach to determine a defensible spent fuel ratio.

    SciTech Connect (OSTI)

    Durbin, Samuel G.; Lindgren, Eric Richard

    2014-03-01T23:59:59.000Z

    Sabotage of spent nuclear fuel casks remains a concern nearly forty years after attacks against shipment casks were first analyzed and has a renewed relevance in the post-9/11 environment. A limited number of full-scale tests and supporting efforts using surrogate materials, typically depleted uranium dioxide (DUO2), have been conducted in the interim to more definitively determine the source term from these postulated events. In all the previous studies, the postulated attack of greatest interest was by a conical shape charge (CSC) that focuses the explosive energy much more efficiently than bulk explosives. However, the validity of these large-scale results remain in question due to the lack of a defensible Spent Fuel Ratio (SFR), defined as the amount of respirable aerosol generated by an attack on a mass of spent fuel compared to that of an otherwise identical DUO2 surrogate. Previous attempts to define the SFR have resulted in estimates ranging from 0.42 to 12 and include suboptimal experimental techniques and data comparisons. Different researchers have suggested using SFR values of 3 to 5.6. Sound technical arguments exist that the SFR does not exceed a value of unity. A defensible determination of the SFR in this lower range would greatly reduce the calculated risk associated with the transport and dry storage of spent nuclear fuel. Currently, Oak Ridge National Laboratory (ORNL) is in possession of several samples of spent nuclear fuel (SNF) that were used in the original SFR studies in the 1980's and were intended for use in a modern effort at Sandia National Laboratories (SNL) in the 2000's. A portion of these samples are being used for a variety of research efforts. However, the entirety of SNF samples at ORNL is scheduled for disposition at the Waste Isolation Pilot Plant (WIPP) by approximately the end of 2015. If a defensible SFR is to be determined for use in storage and transportation security analyses, the need to begin this effort is urgent in order to secure the only known available SNF samples with a clearly defined path to disposal.

  10. Comments of the Renewable Northwest Project And the Natural Resources Defense Council

    E-Print Network [OSTI]

    Comments of the Renewable Northwest Project And the Natural Resources Defense Council, 2004 The Renewable Northwest Project (RNP) and the Natural Resources Defense Council (NRDC) appreciate to the recommendations on renewable resources. We agree with many of the comments submitted by the NW Energy coalition

  11. Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun ECE research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries

  12. Defense programs industrial partnerships at Los Alamos National Laboratory

    SciTech Connect (OSTI)

    Freese, K.B. [Los Alamos National Lab., NM (United States). Industrial Partnership Office

    1996-10-01T23:59:59.000Z

    The US Department of Energy`s Defense Programs face unprecedented challenges of stewardship for an aging nuclear stockpile, cessation of nuclear testing, reduced federal budgets, and a smaller manufacturing complex. Partnerships with industry are essential in developing technology, modernizing the manufacturing complex, and maintaining the safety and reliability of the nation`s nuclear capability. The past decade of federal support for industrial partnerships has promoted benefits to US industrial competitiveness. Recent shifts in government policy have re-emphasized the importance of industrial partnerships in accomplishing agency missions. Nevertheless, abundant opportunities exist for dual-benefit, mission-driven partnerships between the national laboratories and industry. Experience at Los Alamos National Laboratory with this transition is presented.

  13. Vehicle Technologies Office: National Idling Reduction Network...

    Office of Environmental Management (EM)

    Idling Reduction Network News Archives Vehicle Technologies Office: National Idling Reduction Network News Archives The National Idling Reduction Network brings together trucking...

  14. Aluminum reduction cell electrode

    DOE Patents [OSTI]

    Payne, J.R.

    1983-09-20T23:59:59.000Z

    The invention is directed to an anode-cathode structure for an electrolytic cell for the reduction of alumina wherein the structure is comprised of a carbon anode assembly which straddles a wedge-shaped refractory hard metal cathode assembly having steeply sloped cathodic surfaces, each cathodic surface being paired in essentially parallel planar relationship with an anode surface. The anode-cathode structure not only takes into account the structural weakness of refractory hard metal materials but also permits the changing of the RHM assembly during operation of the cell. Further, the anode-cathode structure enhances the removal of anode gas from the interpolar gap between the anode and cathode surfaces. 10 figs.

  15. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01T23:59:59.000Z

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  16. Dose Reduction Techniques

    SciTech Connect (OSTI)

    WAGGONER, L.O.

    2000-05-16T23:59:59.000Z

    As radiation safety specialists, one of the things we are required to do is evaluate tools, equipment, materials and work practices and decide whether the use of these products or work practices will reduce radiation dose or risk to the environment. There is a tendency for many workers that work with radioactive material to accomplish radiological work the same way they have always done it rather than look for new technology or change their work practices. New technology is being developed all the time that can make radiological work easier and result in less radiation dose to the worker or reduce the possibility that contamination will be spread to the environment. As we discuss the various tools and techniques that reduce radiation dose, keep in mind that the radiological controls should be reasonable. We can not always get the dose to zero, so we must try to accomplish the work efficiently and cost-effectively. There are times we may have to accept there is only so much you can do. The goal is to do the smart things that protect the worker but do not hinder him while the task is being accomplished. In addition, we should not demand that large amounts of money be spent for equipment that has marginal value in order to save a few millirem. We have broken the handout into sections that should simplify the presentation. Time, distance, shielding, and source reduction are methods used to reduce dose and are covered in Part I on work execution. We then look at operational considerations, radiological design parameters, and discuss the characteristics of personnel who deal with ALARA. This handout should give you an overview of what it takes to have an effective dose reduction program.

  17. Ed. D Dissertation Defense Report Recommendation for Award of the Doctor of Education (Ed.D) Degree

    E-Print Network [OSTI]

    Hutcheon, James M.

    Ed. D Dissertation Defense Report And Recommendation for Award of the Doctor of Education (Ed: ______________________ Concentration (Check One): Ed.D ­ Curriculum Studies Ed.D ­ Educational Administration Dissertation Defense Date: _______________________________________ Members of the Dissertation Committee

  18. Exposure Levels for Chemical Threat Compounds; Information to Facilitate Chemical Incident Response

    SciTech Connect (OSTI)

    Hauschild, Veronique [U.S. Army Public Health Command] [U.S. Army Public Health Command; Watson, Annetta Paule [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Exposure Standards, Limits and Guidelines for Chemical Threat Compunds ABSTRACT Exposure criteria for chemical warfare (CW) agents and certain toxic industrial chemicals (TICs) used as CW agents (such as chlorine fill in an improvised explosive device) have been developed for protection of the civilian general public, civilian employees in chemical agent processing facilities and deployed military populations. In addition, compound-specific concentrations have been developed to serve as how clean is clean enough clearance criteria guiding facility recovery following chemical terrorist or other hazardous release events. Such criteria are also useful to verify compound absence, identify containment boundaries and expedite facility recovery following chemical threat release. There is no single right value or concentration appropriate for all chemical hazard control applications. It is acknowledged that locating and comparing the many sources of CW agent and TIC exposure criteria has not been previously well-defined. This paper summarizes many of these estimates and assembles critical documentation regarding their derivation and use.

  19. Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking

    E-Print Network [OSTI]

    Vahlenkamp, Matthias Wählisch Thomas C Schmidt Markus

    2012-01-01T23:59:59.000Z

    Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

  20. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    SciTech Connect (OSTI)

    Pederson, Ann C. [ORNL] [ORNL; Snow, Catherine L. [ORNL] [ORNL; Townsend, Jeremy [ORNL] [ORNL; Shannon, Michael [ORNL] [ORNL

    2013-11-01T23:59:59.000Z

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  1. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01T23:59:59.000Z

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  2. Chapter citation (as of Dec., 2012): Barber, S. J., & Mather, M. (in press). Stereotype threat in older adults: When and why

    E-Print Network [OSTI]

    Mather, Mara

    Chapter citation (as of Dec., 2012): Barber, S. J., & Mather, M. (in press). Stereotype threat threat in older adults: When and why does it occur and who is most affected? Author Names: Sarah J: barbersa@usc.edu Abstract: Stereotype threat occurs when people fear that poor performance on their part

  3. The threat of terrorism in our homeland became horrifically real on September 11, 2001. The shock was felt at home and around the world. The subsequent response

    E-Print Network [OSTI]

    #12;Preface The threat of terrorism in our homeland became horrifically real on September 11, 2001. The shock was felt at home and around the world. The subsequent response to this threat has taken many forms, and respond to threats. The US Department of Homeland Security (DHS) chartered the National Visu- alization

  4. The City University of New York Medical Withdrawal and Re-entry Policy and Procedures Governing Student Behavior that Presents a Direct Threat of

    E-Print Network [OSTI]

    Qiu, Weigang

    Student Behavior that Presents a Direct Threat of Harm to Self or Others or Substantially Disrupts of a medical condition, engage in behavior that presents a direct threat of harm to themselves or to others 911 or taking other immediate action in case of imminent threat to life or limb. In addition to taking

  5. Threat Assessment Design for Driver Assistance System at Intersections Georges S. Aoude, Brandon D. Luders, Kenneth K. H. Lee, Daniel S. Levine, and Jonathan P. How

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat Assessment Design for Driver Assistance System at Intersections Georges S. Aoude, Brandon D, potentially errant, drivers. Our approach relies on a novel threat assessment module, which combines an intention predictor based on support vector machines with an efficient threat assessor using rapidly

  6. The development of coal-based technologies for Department of Defense facilities. Technical progress report, September 1995 - March 1996

    SciTech Connect (OSTI)

    Miller, B.G.; Pisupati, S.V.; Scaroni, A.W. [and others

    1996-10-01T23:59:59.000Z

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, the Phase I final report was completed. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included completing a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work continued on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filtering device will be used to demonstrate a smaller and more efficient filtering device for retrofit applications. Work related to coal preparation and utilization, and the economic analysis was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  7. Before the deluge? Assessing the threat of nuclear leakage from the post-Soviet states

    SciTech Connect (OSTI)

    Potter, W.C.

    1995-10-01T23:59:59.000Z

    Most nuclear security problems are linked to the Russian Federation and the region`s troubled economic, political and social conditions. They are unlikely to be resolved without substantial progress in stabilizing the economy and renewing public trust in government institutions. The author makes a risk assessment of the threat and cites specific cases of theft and diversion of fissile materials and the need for action to control this activity. 17 refs.

  8. Worldwide threat assessment brief to the Senate Select Committee on intelligence statement for the record

    SciTech Connect (OSTI)

    Deutch, J.

    1996-02-22T23:59:59.000Z

    This report outlines the threats to the United States and its interests now and into the next century. We still call this the post-Cold War world. Among the opportunities and challenges of our time, there is not yet one dominant enough to define the era on its own terms and give it a name. Looking beyond our borders, we see much that is uncertain: The stability of many regions of the world is threatened by ethnic turmoil and humanitarian crises. Two great powers, Russia and China, are in the process of metamorphosis and their final shape is still very much in question.-Free nations of the world are threatened by rogue nations - - Iran, Iraq, North Korea, and Libya, that have built up significant military forces and seek to acquire weapons of mass destruction. The world community is under assault from those who deal in proliferation of weapons of mass destruction, terrorism, drugs and crime. And the interdependence of the world economy has made us more vulnerable to economic shocks beyond our borders. The strategic threat to our continent is reduced, but the potential for surprise is greater than it was in the days when we could focus our energies on the well-recognized instruments of Soviet power. No one challenge today is yet as formidable as the threat from the former Soviet Union. If nurtured by neglect on our part, these new challenges could expand to threaten the growth of democracy and free markets. All the tools of national security -- diplomacy, the military, and intelligence -- must remain sharp. It is the task of the Intelligence Community to provide policymakers and military commanders with early warning of emerging problems -- warning that can allow us to avoid crisis or military conflict. We must continuously monitor and assess the threats so that our leaders can manage these wisely.

  9. Large Wind Property Tax Reduction

    Broader source: Energy.gov [DOE]

    In 2001, North Dakota established property tax reductions for commercial wind turbines constructed before 2011. Originally, the law reduced the taxable value of centrally-assessed* wind turbines...

  10. Hydrogen Compression, Storage, and Dispensing Cost Reduction...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression, Storage, and Dispensing Cost Reduction Workshop Addendum Hydrogen Compression, Storage, and Dispensing Cost Reduction Workshop Addendum Document states additional...

  11. Contiguous Platinum Monolayer Oxygen Reduction Electrocatalysts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Contiguous Platinum Monolayer Oxygen Reduction Electrocatalysts on High-Stability-Low-Cost Supports Contiguous Platinum Monolayer Oxygen Reduction Electrocatalysts on...

  12. Waste Characterization, Reduction, and Repackaging Facility ...

    Office of Environmental Management (EM)

    Waste Characterization, Reduction, and Repackaging Facility (WCRRF) Waste Characterization Glovebox Operations Waste Characterization, Reduction, and Repackaging Facility (WCRRF)...

  13. Will Russian Scientists Go Rogue? A Survey on the Threat and the Impact of Western Assistance

    SciTech Connect (OSTI)

    Ball, D Y; Gerber, T P

    2004-12-27T23:59:59.000Z

    The collapse of the Soviet Union sparked fears throughout the world that rogue nations and terrorist organizations would gain access to weapons of mass destruction (WMD). One specific concern has been 'WMD brain drain.' Russians with knowledge about nuclear, chemical, and biological weapons could now depart to any country of their choice, including rogue nations seeking to produce WMD. Meanwhile, Russian science fell into a protracted crisis, with plummeting salaries, little funding for research, and few new recruits to science. These developments increased both the incentives and the opportunities for scientists to sell their knowledge to governments and terrorist organizations with hostile intentions toward the United States. Recognizing the threat of WMD brain drain from Russia, the United States, and other governments implemented a host of programs designed to reduce the risk. Despite, or perhaps partly because of, massive assistance from the West to prevent scientists with WMD knowledge from emigrating, the threat of Russian WMD brain drain has recently faded from view. Yet we have seen no evidence that these programs are effective and little systematic assessment of the current threat of WMD migration. Our data from an unprecedented survey of 602 Russian physicists, biologists, and chemists suggest that the threat of WMD brain drain from Russia should still be at the forefront of our attention. Roughly 20 percent of Russian physicists, biologists, and chemists say they would consider working in rogue nations such as North Korea, Iran, Syria, or Iraq (still considered a rogue state at the time of the survey). At the same time, the data reveal that U.S. and Western nonproliferation assistance programs work. They significantly reduce the likelihood that Russian scientists would consider working in these countries. Moreover, Russian grants do not reduce scientists' propensity to 'go rogue'. These survey findings have clear policy implications: the U.S. and its allies must continue to adequately fund nonproliferation assistance programs rather than hastily declare victory. The U.S. should remain engaged with former Soviet WMD scientists until they are willing and able to find support for their research from competitive, civilian-oriented, privately funded projects. Otherwise, we run a great risk that WMD expertise will migrate from the former Soviet Union to countries or organizations that harbor hostile intentions toward the U.S. Assistance programs work to reduce the threat of WMD brain drain, but their task is not complete. Now is not the time to pull back.

  14. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats

    SciTech Connect (OSTI)

    Nelson, K; Sokkappa, P

    2008-10-29T23:59:59.000Z

    This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the range of possibilities. Once an object is generated, its radiation signature is calculated using a 1-dimensional deterministic transport code. Objects that do not make sense based on physics principles or other constraints are rejected. Thus, the model can be used to generate a population of spectral signatures that spans a large space, including smuggled nuclear material and nuclear weapons.

  15. Ultrasonic, Non-Invasive Classification/Discrimination of Liquid Explosives (LEs) and Threat Liquids from Non-Threat Liquids in Sealed Containers

    SciTech Connect (OSTI)

    Diaz, Aaron A.; Cinson, Anthony D.; Tucker, Brian J.; Samuel, Todd J.; Morales, Romarie

    2009-07-20T23:59:59.000Z

    Government agencies and homeland security organizations are searching for more effective approaches for dealing with the increasing demand for inspections involving potential threat liquids and hazardous chemicals, including liquid explosives (LEs). The quantity and variability of hand-held and cargo-sized containers being shipped worldwide drives the need for rapid and effective ways for conducting non-intrusive inspections of liquid-filled containers of a diverse range of types, shapes and sizes. Such inspections need to quickly classify/discriminate between liquids within containers and also ascertain the presence of unexpected objects within a container. The science base, methodology and prototype device for classification/discrimination between classes of liquids has been developed. The Pacific Northwest National Laboratory (PNNL) has developed a methodology and prototype device for classification/discrimination of a wide variety of liquids (including threat liquids and their precursors), providing noninvasive liquid classification/discrimination capabilities using a nondestructive ultrasonic measurement approach for inspecting sealed containers. The Container Screening Device (CSD) employs frequency-modulated (FM) chirp excitation and pulse-compression signal processing techniques to measure ultrasonic velocity and a relative attenuation value for liquids within a container, and is capable of determining other acoustic properties from through-transmission, contact measurements over a wide frequency range. Recent algorithm developments are beginning to address the issues of container wall variations and thickness. A description of the basic science, measurement approach and sources of variability in the measurement will be presented and laboratory measurements acquired from a suite of commercial products and precursor liquids used in the manufacturing of Homemade Explosives (HMEs) will be given.

  16. Environmental Sustainability Paper Usage / Reduction

    E-Print Network [OSTI]

    ;carbon footprint and develop carbon reduction projects around IT and staff/student behaviour change is supported by the Environmental Sustainability Manager and is seen as a key link to the University's Carbon Management Programme (e.g. to produce a forecast of carbon reductions as required by the Carbon Trust

  17. Comprehensive Poverty Reduction Strategies in

    E-Print Network [OSTI]

    Peak, Derek

    Comprehensive Poverty Reduction Strategies in Canada: Policy or Window Dressing? Charles Plante, Upstream: Institute for a Healthy Society #12;Overview What is poverty? Current state of poverty in Saskatchewan What is a Comprehensive Poverty Reduction Strategy (CPRS)? Are CPRS effective at reducing

  18. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    SciTech Connect (OSTI)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01T23:59:59.000Z

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  19. Environmental management requirements/defensible costs project. Final report

    SciTech Connect (OSTI)

    NONE

    1996-02-01T23:59:59.000Z

    Lockheed Idaho Technologies Company (LITCO) used a systems engineering approach to develop the first formal requirements baseline for Idaho National Engineering Laboratory (INEL) Environmental Management (EM) Programs. The recently signed Settlement Agreement with the State of Idaho (Batt Agreement), along with dramatically reduced EM funding targets from Department of Energy (DOE) headquarters, drove the immediacy of this effort. Programs have linked top-level requirements to work scope to cost estimates. All EM work, grouped by decision units, was scrubbed by INEL EM programs and by an independent {open_quotes}Murder Board.{close_quotes} Direct participation of upper level management from LITCO and the DOE-Idaho Operations Office ensured best information and decisions. The result is a scrubbed down, defensible budget tied to top-level requirements for use in the upcoming DOE-Headquarters` budget workout, the Internal Review Board, the FY98 Activity Data Sheets submittal, and preparation of the FY97 control accounts and out-year plans. In addition to the remarkable accomplishments during the past eight weeks, major issues were identified and documented and follow-on tasks are underway which will lead to further improvements in INEL EM program management.

  20. China's Second Ballistic Missile Defense Test: A Search for Strategic Stability

    E-Print Network [OSTI]

    POLLPETER, Kevin

    2013-01-01T23:59:59.000Z

    of_Conduct.pdf. Study of Innovation and Technology in Chinabut preliminary step in China’s missile defense program.Warning Satellites. ” 18 “China Warns of Response to U.S.

  1. Demonstration of Natural Gas Engine Driven Air Compressor Technology at Department of Defense Industrial Facilities

    E-Print Network [OSTI]

    Lin, M.; Aylor, S. W.; Van Ormer, H.

    Recent downsizing and consolidation of Department of Defense (DOD) facilities provides an opportunity to upgrade remaining facilities with more efficient and less polluting equipment. Use of air compressors by the DOD is widespread and the variety...

  2. Rejuvenating the Chinese Defense Economy: Present Developments and Future Trends

    E-Print Network [OSTI]

    CHEUNG, Tai Ming

    2011-01-01T23:59:59.000Z

    The Study of Innovation and Technology in China (SITC) is aon the Study of Innovation and Technology in China (SITC),defense science, technology, and innovation system pursues a

  3. The J-20 Fighter Aircraft and the State of China's Defense Science, Technology, and Innovation Potential

    E-Print Network [OSTI]

    CHEUNG, Tai Ming

    2011-01-01T23:59:59.000Z

    on the Study of Innovation and Technology in China (SITC),The Study of Innovation and Technology in China (SITC) is as Defense Science, Technology, and Innovation Potential Tai

  4. The Chinese Defense Economy’s Long March from Imitation to Innovation

    E-Print Network [OSTI]

    Cheung, Tai Ming

    2010-01-01T23:59:59.000Z

    on the Study of Innovation and Technology in China (SITC),The Study of Innovation and Technology in China (SITC) is as defense science, technology, and innovation (DSTI) system

  5. Design for affordability in defense and aerospace systems using tradespace-based methods

    E-Print Network [OSTI]

    Wu, Marcus Shihong

    2014-01-01T23:59:59.000Z

    Program failures have plagued the defense and aerospace industry for decades, as unanticipated cost and schedule overruns have rendered the development of systems ineffective in terms of time and cost considerations. This ...

  6. Defense acquisition program manager as program leader : improving program outcomes through key competencies and relationship management

    E-Print Network [OSTI]

    Baumann, B. Marc

    2013-01-01T23:59:59.000Z

    The US defense acquisition system is a massive enterprise charged with developing and acquiring state-of-the-art military technology and systems. For the past 65 years, many broad-reaching studies and commissions have ...

  7. Methodology for technology selection for Department of Defense research and development programs

    E-Print Network [OSTI]

    Nair, Michael L. (Michael Lawrie), 1979-

    2011-01-01T23:59:59.000Z

    In recent years, many of the Department of Defense's major acquisition programs have experienced significant budget overruns and schedule delays. Closer examination of these programs reveals that in many cases, technologies ...

  8. Feasibility of very deep borehole disposal of US nuclear defense wastes

    E-Print Network [OSTI]

    Dozier, Frances Elizabeth

    2011-01-01T23:59:59.000Z

    This thesis analyzes the feasibility of emplacing DOE-owned defense nuclear waste from weapons production into a permanent borehole repository drilled ~4 km into granite basement rock. Two canister options were analyzed ...

  9. Mechanistic origins of bombardier beetle (Brachinini) explosion-induced defensive spray pulsation

    E-Print Network [OSTI]

    Arndt, Eric Michael

    Bombardier beetles (Brachinini) use a rapid series of discrete explosions inside their pygidial gland reaction chambers to produce a hot, pulsed, quinone-based defensive spray. The mechanism of brachinines’ spray pulsation ...

  10. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26T23:59:59.000Z

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  11. Radar-cross-section reduction of wind turbines. part 1.

    SciTech Connect (OSTI)

    Brock, Billy C.; Loui, Hung; McDonald, Jacob J.; Paquette, Joshua A.; Calkins, David A.; Miller, William K.; Allen, Steven E.; Clem, Paul Gilbert; Patitz, Ward E.

    2012-03-05T23:59:59.000Z

    In recent years, increasing deployment of large wind-turbine farms has become an issue of growing concern for the radar community. The large radar cross section (RCS) presented by wind turbines interferes with radar operation, and the Doppler shift caused by blade rotation causes problems identifying and tracking moving targets. Each new wind-turbine farm installation must be carefully evaluated for potential disruption of radar operation for air defense, air traffic control, weather sensing, and other applications. Several approaches currently exist to minimize conflict between wind-turbine farms and radar installations, including procedural adjustments, radar upgrades, and proper choice of low-impact wind-farm sites, but each has problems with limited effectiveness or prohibitive cost. An alternative approach, heretofore not technically feasible, is to reduce the RCS of wind turbines to the extent that they can be installed near existing radar installations. This report summarizes efforts to reduce wind-turbine RCS, with a particular emphasis on the blades. The report begins with a survey of the wind-turbine RCS-reduction literature to establish a baseline for comparison. The following topics are then addressed: electromagnetic model development and validation, novel material development, integration into wind-turbine fabrication processes, integrated-absorber design, and wind-turbine RCS modeling. Related topics of interest, including alternative mitigation techniques (procedural, at-the-radar, etc.), an introduction to RCS and electromagnetic scattering, and RCS-reduction modeling techniques, can be found in a previous report.

  12. Student attitudes toward the threat of nuclear war: Friends as influential reference persons

    SciTech Connect (OSTI)

    Marasch, M.J.

    1992-01-01T23:59:59.000Z

    A renewed interest in research into the psychology of the threat of nuclear war occurred in the past decade as national attention focused increasingly on the arms race between the US and the USSR. Some of this research began the task of exploring the social influences upon attitudes and responses to the nuclear threat. Research on friends as potential influences upon nuclear attitudes was minimal. The present study investigated the role of college friends as potential reference persons in the formation of nuclear attitudes. A battery of questionnaires addressing various nuclear war and non-nuclear war attitudes was completed by 200 student-friend dyads from introductory psychology and sociology courses at the University of North Dakota. Three hypotheses were presented in this study. One hypothesis was that students would perceive their friends as having similar attitudes toward the threat of nuclear war. A second hypothesis was that the actual attitudes between pairs of students and friends would be similar. The third hypothesis was that the attitudes would have become more similar over the course of the development of the friendship (as measured retrospectively). The first hypothesis was borne out by the data. The second and third hypotheses were not supported. There are several implications of the findings. One implication is that the nuclear issue may not be as salient to college students as other, more immediate, issues. Another implication is that a relative lack of communication between college students on political issues precludes more effective mutual influence upon the development and change of such attitudes. A false consensus bias appeared to be operative when the students perceived that their attitudes were similar. Further discussion is presented in regard to past and future psychological research upon nuclear war attitudes.

  13. Thermal phase stability of some simulated Defense waste glasses

    SciTech Connect (OSTI)

    May, R.P.

    1981-04-01T23:59:59.000Z

    Three simulated defense waste glass compositions developed by Savannah River Laboratories were studied to determine viscosity and compositional effects on the comparative thermal phase stabilities of these glasses. The glass compositions are similar except that the 411 glasses are high in lithium and low in sodium compared to the 211 glass, and the T glasses are high in iron and low in aluminum compared to the C glass. Specimens of these glasses were heat treated using isothermal anneals as short as 10 min and up to 15 days over the temperature range of 450/sup 0/C to 1100/sup 0/C. Additionally, a specimen of each glass was cooled at a constant cooling rate of 7/sup 0/C/hour from an 1100/sup 0/C melt down to 500/sup 0/C where it was removed from the furnace. The following were observed. The slow cooling rate of 7/sup 0/C/hour is possible as a canister centerline cooling rate for large canisters. Accordingly, it is important to note that a short range diffusion mechanism like cooperative growth phenomena can result in extensive devitrification at lower temperatures and higher yields than a long-range diffusion mechanism can; and can do it without the growth of large crystals that can fracture the glass. Refractory oxides like CeO/sub 2/ and (Ni, Mn, Fe)/sub 2/O/sub 4/ form very rapidly at higher temperatures than silicates and significant yields can be obtained at sufficiently high temperatures that settling of these dense phases becomes a major microstructural feature during slow cooling of some glasses. These annealing studies further show that below 500/sup 0/C there is but little devitrification occurring implying that glass canisters stored at 300/sup 0/C may be kinetically stable despite not being thermodynamically so.

  14. Defense Waste Processing Facility wasteform and canister description: Revision 2

    SciTech Connect (OSTI)

    Baxter, R.G.

    1988-12-01T23:59:59.000Z

    This document describes the reference wasteform and canister for the Defense Waste Processing Facility (DWPF). The principal changes include revised feed and glass product compositions, an estimate of glass product characteristics as a function of time after the start of vitrification, and additional data on glass leaching performance. The feed and glass product composition data are identical to that described in the DWPF Basic Data Report, Revision 90/91. The DWPF facility is located at the Savannah River Plant in Aiken, SC, and it is scheduled for construction completion during December 1989. The wasteform is borosilicate glass containing approximately 28 wt % sludge oxides, with the balance consisting of glass-forming chemicals, primarily glass frit. Borosilicate glass was chosen because of its stability toward reaction with potential repository groundwaters, its relatively high ability to incorporate nuclides found in the sludge into the solid matrix, and its reasonably low melting temperature. The glass frit contains approximately 71% SiO/sub 2/, 12% B/sub 2/O/sub 3/, and 10% Na/sub 2/O. Tests to quantify the stability of DWPF waste glass have been performed under a wide variety of conditions, including simulations of potential repository environments. Based on these tests, DWPF waste glass should easily meet repository criteria. The canister is filled with about 3700 lb of glass which occupies 85% of the free canister volume. The filled canister will generate approximately 690 watts when filled with oxides from 5-year-old sludge and precipitate from 15-year-old supernate. The radionuclide activity of the canister is about 233,000 curies, with an estimated radiation level of 5600 rad/hour at the canister surface. 14 figs., 28 tabs.

  15. Defense programs business practices re-engineering QFD exercise

    SciTech Connect (OSTI)

    Murray, C.; Halbleib, L.

    1996-03-01T23:59:59.000Z

    The end of the cold war has resulted in many changes for the Nuclear Weapons Complex (NWC). We now work in a smaller complex, with reduced resources, a smaller stockpile, and no new phase 3 weapons development programs. This new environment demands that we re-evaluate the way we design and produce nuclear weapons. The Defense Program (DP) Business Practices Re-engineering activity was initiated to improve the design and production efficiency of the DP Sector. The activity had six goals: (1) to identify DP business practices that are exercised by the Product Realization Process (PRP); (2) to determine the impact (positive, negative, or none) of these practices on defined, prioritized customer criteria; (3) to identify business practices that are candidates for elimination or re-engineering; (4) to select two or three business practices for re-engineering; (5) to re-engineer the selected business practices; and (6) to exercise the re-engineered practices on three pilot development projects. Business practices include technical and well as administrative procedures that are exercised by the PRP. A QFD exercise was performed to address (1)-(4). The customer that identified, defined, and prioritized the criteria to rate the business practices was the Block Change Advisory Group. Five criteria were identified: cycle time, flexibility, cost, product performance/quality, and best practices. Forty-nine business practices were identified and rated per the criteria. From this analysis, the group made preliminary recommendations as to which practices would be addressed in the re-engineering activity. Sixteen practices will be addressed in the re-engineering activity. These practices will then be piloted on three projects: (1) the Electronic Component Assembly (ECA)/Radar Project, (2) the B61 Mod 11, and (3) Warhead Protection Program (WPP).

  16. The release of technetium from defense waste processing facility glasses

    SciTech Connect (OSTI)

    Ebert, W.L.; Wolf, S.F.; Bates, J.K.

    1995-12-31T23:59:59.000Z

    Laboratory tests are being, conducted using two radionuclide-doped Defense Waste Processing, Facility (DWPF) glasses (referred to as SRL 13IA and SRL 202A) to characterize the effects of the glass surface area/solution volume (SN) ratio on the release and disposition of {Tc} and several actinide elements. Tests are being conducted at 90{degrees}C in a tuff ground water solution at SN ratios of 10, 2000, and 20,000 m{sup {minus}1} and have been completed through 1822 days. The formation of certain alteration phases in tests at 2000 and 20,000 m{sup {minus}1} results in an increase in the dissolution rates of both classes. The release of {Tc} parallels that of B and Na under most test conditions and its release increases when alteration phases form. However, in tests with SRL 202A glass at 20,000 ,{sup {minus}1}, the {Tc} concentration in solution decreases coincidentally with an increase in the nitrite/nitrate ratio that indicates a decrease in the solution Eh. This may have occurred due to radiolysis, glass dissolution, the formation of alteration phases, or vessel interactions. Technetium that was reduced from {Tc}(VII) to {Tc}(IV) may have precipitated, thou-h the amount of {Tc} was too low to detect any {Tc}-bearing phases. These results show the importance of conducting long-term tests with radioactive glasses to characterize the behavior of radionuclides, rather than relying on the observed behavior of nonradioactive surrogates.

  17. Nevada State Energy Reduction Plan

    Broader source: Energy.gov [DOE]

    As mandated by the Nevada statutes, the Nevada Energy Office prepared a state energy reduction plan which requires state agencies, departments, and other entities in the Executive Branch to reduce...

  18. NOx Reduction through Efficiency Gain 

    E-Print Network [OSTI]

    Benz, R.; Thompson, R.; Staedter, M.

    2007-01-01T23:59:59.000Z

    with a novel control design to deliver a comprehensive boiler controls retrofit that provides reductions in emissions as well as substantial cost savings. Combining mechanical engineering expertise with substantial experience in control engineering...

  19. Economics of Steam Pressure Reduction

    E-Print Network [OSTI]

    Sylva, D. M.

    Economics of Steam Pressure Reduction is a technical paper that addresses the operating and economic advantages associated with the program to lower the steam operating pressure. Evaluation of a testing program will be discussed. The paper...

  20. Bifunctional Catalysts for the Selective Catalytic Reduction...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    as Reductants Bifunctional Catalysts for the Selective Catalytic Reduction of NO by Hydrocarbons Development of Optimal Catalyst Designs and Operating Strategies for Lean NOx...

  1. Bifunctional Catalysts for the Selective Catalytic Reduction...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publications Bifunctional Catalysts for the Selective Catalytic Reduction of NO by Hydrocarbons Selectlive Catalytic Reducution of NOx wilth Diesel-Based Fuels as Reductants...

  2. Facile and controllable electrochemical reduction of graphene...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and controllable electrochemical reduction of graphene oxide and its applications. Facile and controllable electrochemical reduction of graphene oxide and its applications....

  3. Characterizing Test Methods and Emissions Reduction Performance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Test Methods and Emissions Reduction Performance of In-Use Diesel Retrofit Technologies from the National Clean Diesel Campaign Characterizing Test Methods and Emissions Reduction...

  4. Plasma-assisted catalytic reduction system

    DOE Patents [OSTI]

    Vogtlin, G.E.; Merritt, B.T.; Hsiao, M.C.; Wallman, P.H.; Penetrante, B.M.

    1998-01-27T23:59:59.000Z

    Non-thermal plasma gas treatment is combined with selective catalytic reduction to enhance NO{sub x} reduction in oxygen-rich vehicle engine exhausts. 8 figs.

  5. Electrocatalytic Reactivity for Oxygen Reduction of Palladium...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reactivity for Oxygen Reduction of Palladium-Modified Carbon Nanotubes Synthesized in Supercritical Fluid. Electrocatalytic Reactivity for Oxygen Reduction of Palladium-Modified...

  6. Sequential high temperature reduction, low temperature hydrolysis...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    high temperature reduction, low temperature hydrolysis for the regeneration of sulfated NOx trap catalysts. Sequential high temperature reduction, low temperature hydrolysis for...

  7. Demonstrating Fuel Consumption and Emissions Reductions with...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Consumption and Emissions Reductions with Next Generation Model-Based Diesel Engine Control Demonstrating Fuel Consumption and Emissions Reductions with Next Generation...

  8. Microbial reduction of iron ore

    DOE Patents [OSTI]

    Hoffmann, Michael R. (Pasadena, CA); Arnold, Robert G. (Pasadena, CA); Stephanopoulos, Gregory (Pasadena, CA)

    1989-01-01T23:59:59.000Z

    A process is provided for reducing iron ore by treatment with microorganisms which comprises forming an aqueous mixture of iron ore, microorganisms operable for reducing the ferric iron of the iron ore to ferrous iron, and a substrate operable as an energy source for the microbial reduction; and maintaining the aqueous mixture for a period of time and under conditions operable to effect the reduction of the ore. Preferably the microorganism is Pseudomonas sp. 200 and the reduction conducted anaerobically with a domestic wastewater as the substrate. An aqueous solution containing soluble ferrous iron can be separated from the reacted mixture, treated with a base to precipitate ferrous hydroxide which can then be recovered as a concentrated slurry.

  9. Microbial reduction of iron ore

    DOE Patents [OSTI]

    Hoffmann, M.R.; Arnold, R.G.; Stephanopoulos, G.

    1989-11-14T23:59:59.000Z

    A process is provided for reducing iron ore by treatment with microorganisms which comprises forming an aqueous mixture of iron ore, microorganisms operable for reducing the ferric iron of the iron ore to ferrous iron, and a substrate operable as an energy source for the microbial reduction; and maintaining the aqueous mixture for a period of time and under conditions operable to effect the reduction of the ore. Preferably the microorganism is Pseudomonas sp. 200 and the reduction conducted anaerobically with a domestic wastewater as the substrate. An aqueous solution containing soluble ferrous iron can be separated from the reacted mixture, treated with a base to precipitate ferrous hydroxide which can then be recovered as a concentrated slurry. 11 figs.

  10. “If your vagina could speak, what would it say?”: Dangerous Femininity, Anxious Masculinity and the Threat of Female Desire in the 1975 Pornographic Movie "The Sex that Speaks"

    E-Print Network [OSTI]

    Garrigou-Kempton, Emilie

    2010-01-01T23:59:59.000Z

    speak, what would it say? ” Dangerous Femininity, Anxiouslies the threat of a dangerous feminine sexuality that needsthat women’s desire is dangerous without the implementation

  11. Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008

    E-Print Network [OSTI]

    Carle, Georg; Dressler, Falko; Kemmerer, Richard A.; Koenig, Hartmut; Kruegel, Christopher; Laskov, Pavel

    2009-01-01T23:59:59.000Z

    y REGULÄRE BEITRÄGE Network attack detection and defense –Perspective Workshop Network Attack Detection and Defensefor the detection of network attacks, should more strongly

  12. A systems-based approach to the design, management and integration of enterprise-level change in defense shipbuilding

    E-Print Network [OSTI]

    Bond, Andrew S., 1975-

    2005-01-01T23:59:59.000Z

    Continually declining Navy surface combatant acquisitions, the war on terror, shifting Congressional priorities and a consolidated shipbuilding industrial base are forcing fundamental changes in the defense shipbuilding ...

  13. Geospatiotemporal Data Mining in an Early Warning System for Forest Threats in the United States

    SciTech Connect (OSTI)

    Hoffman, Forrest M [ORNL; Mills, Richard T [ORNL; Kumar, Jitendra [ORNL; Vulli, Srinivasa S [ORNL; HargroveJr., William Walter [United States Department of Agriculture (USDA), United States Forest Service (USFS)

    2010-01-01T23:59:59.000Z

    We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250~m Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectroradiometer (MODIS) in this study) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster analysis of this massive data set, using high-performance computing, provides a basis for several possible approaches to defining the bounds of ``normal'' phenological patterns, indicating healthy vegetation in a given geographic location. We demonstrate the applicability of such an approach, using it to identify areas in Colorado, USA, where an ongoing mountain pine beetle outbreak has caused significant tree mortality.

  14. Combining Radiography and Passive Measurements for Radiological Threat Detection in Cargo

    SciTech Connect (OSTI)

    Miller, Erin A.; White, Timothy A.; Jarman, Kenneth D.; Kouzes, Richard T.; Kulisek, Jonathan A.; Robinson, Sean M.; Scherrer, Charles; Wittman, Richard S.

    2012-12-01T23:59:59.000Z

    Abstract Radiography is widely understood to provide information complimentary to passive detection: while not directly sensitive to radiological materials, radiography can reveal highly shielded regions which may mask a passive radiological signal. We present a method for combining radiographic and passive data which uses the radiograph to provide an estimate of scatter and attenuation for possible sources. This approach allows quantitative use of radiographic images without relying on image interpretation, and results in a probabilistic description of likely source locations and strengths. We present first results for this method for a simple modeled test case of a cargo container driving through a PVT portal. With this inversion approach, we address criteria for an integrated passive and radiographic screening system and how detection of SNM threats might be improved in such a system.

  15. Does nitrate deposition following astrophysical ionizing radiation events pose an additional threat to amphibians?

    E-Print Network [OSTI]

    Brian C. Thomas; Michelle D. Honeyman

    2008-06-27T23:59:59.000Z

    It is known that amphibians are especially susceptible to the combination of heightened UVB radiation and increased nitrate concentrations. Various astrophysical events have been suggested as sources of ionizing radiation that could pose a threat to life on Earth, through destruction of the ozone layer and subsequent increase in UVB, followed by deposition of nitrate. In this study, we investigate whether the nitrate deposition following an ionizing event is sufficiently large to cause an additional stress beyond that of the heightened UVB previously considered. We have converted predicted nitrate depositions to concentration values, utilizing data from the New York State Department of Environmental Conservation Acid Rain Monitoring Network web site. Our results show that the increase in nitrate concentration in bodies of water following the most intense ionization event likely in the last billion years would not be sufficient to cause a serious additional stress on amphibian populations and may actually provide some benefit by acting as fertilizer.

  16. Beta Reduction Constraints Manuel Bodirsky Katrin Erk

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Beta Reduction Constraints Manuel Bodirsky Katrin Erk Alexander Koller Joachim Niehren Programming partially. In this paper, we introduce beta reduction constraints to describe beta reduction steps between partially known lambda terms. We show that beta reduction constraints can be expressed in an extension

  17. Lead reduction in ambient air

    SciTech Connect (OSTI)

    Smith, R.D.; Kiehn, O.A.; Wilburn, D.R.; Bowyer, R.C.

    1987-01-01T23:59:59.000Z

    The Bureau of Mines evaluated the emission control methods, including the capital investments and operating cost, necessary for further reducing lead levels in ambient air at the Glover, Herculaneum, and Buick smelter-refineries in Missouri and the East Helena, MT, smelter. This report presents theoretically achievable lead emission reductions and estimated capital and operating costs.

  18. Dynamic reduction, Version 1. 0

    SciTech Connect (OSTI)

    Rogers, G.J.; Wong, D.Y.; Ottevangers, J.; Wang, L. (Ontario Hydro, Toronto, ON (Canada))

    1993-04-01T23:59:59.000Z

    This report describes the theoretical background of the EPRI Dynamic Reduction DYNRED V 1.0. EPRI initiated research under project RP763 to develop the original reduction program DYNEQU. This program was the first to be based on the concept of aggregating of coherent groups of synchronous generators into a single equivalent generator model. While technically advanced, DYNEQU proved difficult to use. Since then, the stability problems encountered in power system planning and operations have changed. The emphasis on first swing transient stability has been replaced by emphasis on inter-area oscillations and voltage stability. The method of identification of coherent generators used in DYNEQU is based on the comparison of rotor angle swings, in a linearized system model, following a fault. It has been shown that this method of coherency identification is good for first swing stability. For inter-area oscillation studies, this method of generator aggregation is less accurate. Far better, are identification methods based on the structure of the power system. Because of these changes in the requirements for reduced order power system models, a new dynamic reduction program (DYNRED) has been developed under EPRI project RP2447-1. It is coherency based, as is DYNEQU, but it has structurally based coherency identification methods in addition to the method used in DYNEQU. This report describes the techniques used in DYNRED, that is: Coherency Identification; Network Reduction; Method of Aggregation, Generator Aggregation, Excitation Aggregation, Primemover/Governor Aggregation. An example of the application of DYNRED to the reduction of a large interconnected power system model is also presented. DYNRED uses the special modeling and network solution techniques developed to enable systems having up to 12,000 bus to be studied. Dynamic data is completely compatible between MASS, PEALS, and the EPRI Extended Transient Midterm Stability Program (ETMSP).

  19. Unconventional Nuclear Warfare Defense (UNWD) containment and mitigation subtask.

    SciTech Connect (OSTI)

    Wente, William Baker

    2005-06-01T23:59:59.000Z

    The objective of this subtask of the Unconventional Nuclear Warfare Design project was to demonstrate mitigation technologies for radiological material dispersal and to assist planners with incorporation of the technologies into a concept of operations. The High Consequence Assessment and Technology department at Sandia National Laboratories (SNL) has studied aqueous foam's ability to mitigate the effects of an explosively disseminated radiological dispersal device (RDD). These benefits include particle capture of respirable radiological particles, attenuation of blast overpressure, and reduction of plume buoyancy. To better convey the aqueous foam attributes, SNL conducted a study using the Explosive Release Atmospheric Dispersion model, comparing the effects of a mitigated and unmitigated explosive RDD release. Results from this study compared health effects and land contamination between the two scenarios in terms of distances of effect, population exposure, and remediation costs. Incorporating aqueous foam technology, SNL created a conceptual design for a stationary containment area to be located at a facility entrance with equipment that could minimize the effects from the detonation of a vehicle transported RDD. The containment design was evaluated against several criteria, including mitigation ability (both respirable and large fragment particle capture as well as blast overpressure suppression), speed of implementation, cost, simplicity, and required space. A mock-up of the conceptual idea was constructed at SNL's 9920 explosive test site to demonstrate the containment design.

  20. Abstract--We identify the security threats facing a sensor network for wireless medical monitoring, and we propose a

    E-Print Network [OSTI]

    Wang, Lan

    1 Abstract--We identify the security threats facing a sensor network for wireless medical of medical sensors that convey information on his or her vital signs to a bedside monitoring device. However mobility, especially for long-term care. Recent advances in sensor technology have enabled the development

  1. CYBER THREAT ANALYSIS A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK INTRUSION DETECTION)

    E-Print Network [OSTI]

    Kumar, Vipin

    60000 90 91 92 93 94 95 96 97 98 99 00 01 Today computers control power, oil and gas deliveryCYBER THREAT ANALYSIS ­ A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK-of-systems technologies will enable decisive maneuver, both horizon- tal and vertical, during day and night, and in all

  2. Modest carbon price could save Borneo forests: study Reuters, 4 June 2009 -Tropical forests in Borneo under threat of conversion to palm oil

    E-Print Network [OSTI]

    in Borneo under threat of conversion to palm oil plantations could be more profitable left standing threat of being converted to oil palm plantations. "They are not meant to be clearing forest for palm oil development. It's pretty clear that forests are being felled for oil palm," said Venter, a conservation

  3. Stable reduction product of misonidazole

    SciTech Connect (OSTI)

    Panicucci, R.; McClelland, R.A.; Rauth, A.M.

    1986-07-01T23:59:59.000Z

    The predominant stable product (greater than 80%) of the anaerobic radiation chemical reduction (pH 7, formate, N/sub 2/O) of misonidazole (MISO) has been identified as the cyclic guanidinium ion MISO-DDI, a 4,5-dihydro-4,5-dihydroxyimidazolium ion. This cation was prepared as its sulfate salt by the reaction of glyoxal and the appropriate N-substituted guanidinium sulfate. Its formation during MISO reduction was established by NMR spectral comparison and by derivatization as glyoxal bis-oxime, which was formed in 86% yield in fully reduced systems. The toxicity of pure MISO-DDI X sulfate was examined in vivo (C/sub 3/H mice) and in vitro (CHO cells). This product is less toxic than the parent MISO and free glyoxal. A reactive, short-lived, intermediate is suggested as the agent responsible for the toxicity of MISO under hypoxic conditions.

  4. Emissions Reduction Impact of Renewables

    E-Print Network [OSTI]

    Haberl, J. S.; Yazdani, B.; Culp, C.

    2012-01-01T23:59:59.000Z

    p. 1 Energy Systems Laboratory ? 2012 EMISSIONS REDUCTION IMPACT OF RENEWABLES October 2012 Jeff Haberl, Bahman Yazdani, Charles Culp Energy Systems Laboratory Texas A&M University p. 2 Energy Systems Laboratory ? 2012... Do TCEQ: Vince Meiller, Bob Gifford ERCOT: Warren Lasher USEPA: Art Diem, Julie Rosenberg ACKNOWLEDGEMENTS p. 3 Energy Systems Laboratory ? 2012 RENEWABLES Solar PV Solar Thermal Hydro Biomass Landfill Gas Geothermal p. 4...

  5. Emissions Reduction Impact of Renewables 

    E-Print Network [OSTI]

    Haberl, J. S.; Yazdani, B.; Culp, C.

    2012-01-01T23:59:59.000Z

    Systems Laboratory ? 2012 p. 9 Energy Systems Laboratory ? 2012 p. 10 Energy Systems Laboratory ? 2012 WIND PROJECTS IN TEXAS Completed, Announced, and Retired Wind Projects in Texas, as of December 2011 p. 11 Energy Systems Laboratory ? 2012... Laboratory ? 2012 p. 24 Energy Systems Laboratory ? 2012 p. 25 Energy Systems Laboratory ? 2012 NOx REDUCTIONS FROM WIND POWER New 2010 Annual eGrid for NOx Emissions West Zone North Zone Houston Zone South Zone Unit: lbs of NOx/MWh Unit: lbs...

  6. Commercial nuclear fuel from U.S. and Russian surplus defense inventories: Materials, policies, and market effects

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    Nuclear materials declared by the US and Russian governments as surplus to defense programs are being converted into fuel for commercial nuclear reactors. This report presents the results of an analysis estimating the market effects that would likely result from current plans to commercialize surplus defense inventories. The analysis focuses on two key issues: (1) the extent by which traditional sources of supply, such as production from uranium mines and enrichment plants, would be displaced by the commercialization of surplus defense inventories or, conversely, would be required in the event of disruptions to planned commercialization, and (2) the future price of uranium considering the potential availability of surplus defense inventories. Finally, the report provides an estimate of the savings in uranium procurement costs that could be realized by US nuclear power generating companies with access to competitively priced uranium supplied from surplus defense inventories.

  7. TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

  8. Dissection of defense responses of skl, an ethylene insensitive mutant of Medicago truncatula

    E-Print Network [OSTI]

    Pedro, Uribe Mejia

    2004-11-15T23:59:59.000Z

    ..............................................................................................................................176 xi LIST OF FIGURES FIGURE 1 Ethylene signal transduction pathway................................................................16 2 Proposed plant defense responses to pathogens and insects .............................. 21 3... gene expression......................................................... 119 25 In silica analysis of Actin homologue TC85697. ............................................. 122 26 In silica analysis of His H3, TC85197...

  9. Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities

    SciTech Connect (OSTI)

    Not Available

    1984-02-01T23:59:59.000Z

    Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

  10. Doctoral Defense "Carbon Dioxide Capture on Elastic Layered Metal-Organic

    E-Print Network [OSTI]

    Kamat, Vineet R.

    Doctoral Defense "Carbon Dioxide Capture on Elastic Layered Metal-Organic Framework Adsorbents requires drastic modifications to the current energy infrastructure. Thus, carbon capture and sequestration for use as carbon capture adsorbents. Ideal adsorbed solution theory (IAST) estimates of CO2 selectivity

  11. SMASHUP: Secure Mashup for Defense Transformation and Net-Centric Systems

    E-Print Network [OSTI]

    Heileman, Gregory L.

    SMASHUP: Secure Mashup for Defense Transformation and Net- Centric Systems Mark D. Heileman., 709 S. Harbor City Blvd., Suite 400, Melbourne, FL 32901; b University of New Mexico, Dept. of Electrical & Computer Engineering, Albuquerque, NM 87131; c Air Force Research Laboratory, AFRL/RIEBB, Rome

  12. Ecology Letters, (2003) 6: 13-18 Are three-dimensional spider webs defensive

    E-Print Network [OSTI]

    Mathis, Wayne N.

    2003-01-01T23:59:59.000Z

    LETTER Ecology Letters, (2003) 6: 13-18 Are three-dimensional spider webs defensive adaptations? Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs risk in the evolution of web architecture. The ecological success of spiders has been attributed to key

  13. Adaptations of quaking aspen (Populus tremuloides Michx.) for defense against herbivores

    E-Print Network [OSTI]

    Scharer, John E.

    Adaptations of quaking aspen (Populus tremuloides Michx.) for defense against herbivores Richard L 2013 Keywords: Aspen decline Fire Herbivory Phytochemistry Plant­animal interactions Populus tremuloides a b s t r a c t Quaking aspen (Populus tremuloides) is a quintessential ``foundation species

  14. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  15. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Curtmola, Reza

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  16. Defense Transuranic Waste Program. Transuranic waste transportation assessment and guidance report

    SciTech Connect (OSTI)

    Not Available

    1985-08-01T23:59:59.000Z

    The Transportation Assessment and Guidance Report (TAGR) is designed to provide DOE-managed defense sites with guidance and citable analyses addressing National Environmental Policy Act (NEPA) requirements for qualifying and transporting transuranic (TRU) wastes to the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico.

  17. Inhibition of pulmonary antibacterial defense by interferon-g during recovery from influenza infection

    E-Print Network [OSTI]

    Inhibition of pulmonary antibacterial defense by interferon-g during recovery from influenza infection Keer Sun & Dennis W Metzger Secondary bacterial infection often occurs after pulmonary virus burden, and leads to enhanced susceptibility to secondary pneumococcal infection, which can be prevented

  18. Negative regulation of defense responses in plants by a conserved MAPKK kinase

    E-Print Network [OSTI]

    Innes, Roger

    for review August 22, 2000) The enhanced disease resistance 1 (edr1) mutation of Arabidopsis confers by the edr1 mutation is correlated with induction of several defense responses, including host cell death. Double mutant analysis revealed that all edr1-associated phenotypes are suppressed by mutations

  19. Implementation of Section 1072 of the National Defense Authorization Act for Fiscal Year 2008

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-12T23:59:59.000Z

    This Notice provides guidance for implementing the mandates of Section 1072 of the National Defense Authorization Act for Fiscal Year 2008, commonly referred to as the Bond Amendment. Extended until 9-28-11 by DOE N 251.90 dated 9-28-10. Canceled by DOE O 472.2. Does not cancel other directives.

  20. A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses

    E-Print Network [OSTI]

    Sundaram, Ravi

    , a common form of distributed denial of service (DDoS) attacks. In particular, our traffic injection game statistical methods for creating defense mechanisms that can detect a DDoS attack and that even when--changing the source address of IP packets-- has been used in DDoS attacks on popular websites (Ya- hoo!) and root DNS