National Library of Energy BETA

Sample records for home security systems

  1. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    SciTech Connect (OSTI)

    Burns, Ashley V.

    2014-05-30

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successive iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.

  2. Home construction | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home construction Home construction Family members inspect construction of their future home.

  3. PIA - Northeast Home Heating Oil Reserve System (Heating Oil) | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil) PDF icon PIA - Northeast Home Heating Oil Reserve System (Heating Oil) More Documents & Publications PIA - WEB Physical Security Major Application PIA - GovTrip (DOE data) PIA - WEB Unclassified Business Operations General Support

  4. Early Oak Ridge Trailer Home | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Early Oak Ridge Trailer Home A typical trailer home

  5. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L. (Idaho Falls, ID)

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  6. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized ...

  7. Using Home Energy Scoring Systems

    Broader source: Energy.gov [DOE]

    Better Buildings Neighborhood Program Data and Evaluation Peer Exchange Call: Using Home Energy Scoring Systems, call slides and discussion summary, March 28, 2013.

  8. Early Oak Ridge Home | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Early Oak Ridge Home A typical dwelling predating the Manhattan Project homes

  9. Cyber Securing Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Industrial Control Systems Integration into the DoD Networks A Briefing in Response to House Report 113-102, Accompanying the FY14 National Defense Authorization Act Unclassified - Distribution Statement A August, 2015 Cyber Securing Control Systems Acquisition, Technology and Logistics 2 DoD Scope of Platform IT & Control Systems * Acquisitions / Weapon Systems - H,M & E (ships / subs, missiles, UVs, etc.) - Training Simulators, 3D printing, etc. * EI&E - Buildings & linear

  10. Securing Control Systems Modems

    Energy Savers [EERE]

    Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate

  11. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  12. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Physical Security Systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working

  13. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  14. Situated Usability Testing for Security Systems

    SciTech Connect (OSTI)

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

  15. Early Oak Ridge Trailer Homes | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Early Oak Ridge Trailer Homes A row of trailer homes used

  16. Trailer homes in Oak Ridge | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Trailer homes in Oak Ridge Trailer homes in Oak Ridge An aerial of Oak Ridge showing the extensive use of trailer homes

  17. emergency management systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  18. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture PDF icon ...

  19. Control Systems Security Standards: Accomplishments And Impacts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Standards: Accomplishments And Impacts Control Systems Security Standards: ... strategies defined in the DOEDHS Roadmap to Secure Control Systems in the Energy Sector. ...

  20. Home Heating Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Heat & Cool » Home Heating Systems Home Heating Systems Home heating accounts for about 30 percent of the energy used in the home. | Photo courtesy iStockphoto.com Home heating accounts for about 30 percent of the energy used in the home. | Photo courtesy iStockphoto.com A variety of technologies are available for heating your house. In addition to heat pumps, which are discussed separately, many homes use the following approaches: Active Solar Heating Uses the sun to heat either air or

  1. T-592: Cisco Security Advisory: Cisco Secure Access Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unauthorized Password Change Vulnerability | Department of Energy 92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch

  2. Center for Control System Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Control System Security Critical Infrastructure is at Risk As America's infrastructures have become more complex and interconnected, their operation and control has become more...

  3. PIA - Northeast Home Heating Oil Reserve System (Heating Oil...

    Energy Savers [EERE]

    Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil)...

  4. Planning a Home Solar Electric System | Department of Energy

    Office of Environmental Management (EM)

    Planning a Home Solar Electric System Planning a Home Solar Electric System Whether a home solar electric system will work for you depends on the available sun (resource),...

  5. Combi Systems for Low Load homes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Context Technical Approach * A condensing water heater and hydronic air handler will used to provide space and water heating loads in almost 300 weatherized homes. * System ...

  6. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  7. Evaluating Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, Robb; Arena, Lois

    2013-02-01

    In an effort to improve housing options near Las Vegas, Nevada, the Clark County Community Resources Division (CCCRD) performs substantial renovations to foreclosed homes. After dramatic energy, aesthetic, and health and safety improvements are made, homes are rented or sold to qualified residents. This report describes the evaluation and selection of ventilation systems for these homes, including key considerations when selecting an ideal system. The report then describes CCCRD’s decision process with respect to ventilation.

  8. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  9. Webinar: ENERGY STAR Hot Water Systems for High Performance Homes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Water Systems for High Performance Homes Webinar: ENERGY STAR Hot Water Systems for High Performance Homes This presentation is from the Building America research team BA-PIRC ...

  10. Home Cooling Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Cooling Systems Home Cooling Systems When it comes to cooling your house, there are a number of options beyond air conditioning. | Photo courtesy of ©iStockphoto/chrisgramly. When it comes to cooling your house, there are a number of options beyond air conditioning. | Photo courtesy of ©iStockphoto/chrisgramly. Although your first thought for cooling may be air conditioning, there are many alternatives that provide cooling with less energy use. A combination of proper insulation,

  11. T-592: Cisco Security Advisory: Cisco Secure Access Control System

    Broader source: Energy.gov (indexed) [DOE]

    Unauthorized Password Change Vulnerability | Department of Energy PROBLEM: A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication, user and administrator device access control, and policy control into a centralized identity

  12. Planning a Home Solar Electric System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Solar Electric System Planning a Home Solar Electric System Whether a home solar electric system will work for you depends on the available sun (resource), available space for the system size you need, the economics of the investment, and the local permits required. | Photo courtesy of Decker Homes. Whether a home solar electric system will work for you depends on the available sun (resource), available space for the system size you need, the economics of the investment, and the local

  13. Roadmap to Secure Control Systems in the Energy Sector - January...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy Sector - January 2006 Roadmap to Secure Control Systems in the Energy Sector - January 2006 This document, the Roadmap to Secure...

  14. Pantex Occupational Health System (OHS), National Nuclear Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security ...

  15. Pantex Occupational Health System (OHS), National Nuclear Security...

    Energy Savers [EERE]

    Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

  16. Cyberspace Security Econometrics System (CSES)

    Energy Science and Technology Software Center (OSTI)

    2012-07-27

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing complance pressures require careful consideration and adaption. The CSES provides a measure (i.e. a quantitative indication) of reliability, performance, and/or safety of a system that accounts for themore » criticality of each requirement as a function of one or more stakeholders' interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement.« less

  17. Developing Secure Power Systems Professional Competence: Alignment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    resources that can aid in the accelerating need for Secure Power Systems Professionals, ... and competencies along with assessing the need and qualifications for a certification ...

  18. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  19. NNSA sites take home 15 R&D Awards | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration take home 15 R&D Awards | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our

  20. Planning a Home Solar Electric System | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Whether a home solar electric system will work for you depends on the available sun (resource), available space for the system size you need, the economics of the investment, and the local permits required. | Photo courtesy of Decker Homes. Whether a home solar electric system will work for you depends on the available sun (resource), available space for the system size you need, the economics of the investment, and the local permits required. | Photo courtesy of Decker Homes. To help evaluate

  1. Planning for Home Renewable Energy Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electricity & Fuel » Buying & Making Electricity » Planning for Home Renewable Energy Systems Planning for Home Renewable Energy Systems Planning for a home renewable energy system is a process that includes analyzing your existing electricity use, looking at local codes and requirements, deciding if you want to operate your system on or off of the electric grid, and understanding technology options you have for your site. | Photo by Francis Fine Art Photography. Planning for a home

  2. Secure videoconferencing equipment switching system and method

    DOE Patents [OSTI]

    Hansen, Michael E. (Livermore, CA)

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  3. ETTP Security Access Control System (ESACS) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) PDF icon ETTP Security Access Control System (ESACS) More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL PeopleSoft - Human Resource System PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory

  4. DOE Zero Energy Ready Home Case Study, Weiss Building & Development, LLC., System Home, River Forest, Illinois

    SciTech Connect (OSTI)

    none,

    2013-09-01

    The Passive House Challenge Home located in River Forest, Illinois, is a 5-bedroom, 4.5-bath, 3,600 ft2 two-story home (plus basement) that costs about $237 less per month to operate than a similar sized home built to the 2009 IECC. For a home with no solar photovoltaic panels installed, it scored an amazingly low 27 on the Home Energy Rating System (HERS) score.An ENERGY STAR-rated dishwasher, clothes washer, and refrigerator; an induction cooktop, condensing clothes dryer, and LED lighting are among the energy-saving devices inside the home. All plumbing fixtures comply with EPA WaterSense criteria. The home was awarded a 2013 Housing Innovation Award in the "systems builder" category.

  5. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  6. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Delivery Systems Cybersecurity Control Systems Security News Archive DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and ...

  7. Recommended Practice for Securing Control System Modems

    SciTech Connect (OSTI)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  8. DOE Zero Energy Ready Home Case Study: 2013 Weiss Building & Development, LLC., System Home, River Forest, IL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LLC System Home River Forest, IL BUILDING TECHNOLOGIES OFFICE The U.S. Department of Energy invites home builders across the country to meet the extraordinary levels of excellence and quality specified in DOE's Zero Energy Ready Home program (formerly known as Challenge Home). Every DOE Zero Energy Ready Home starts with ENERGY STAR for Homes Version 3 for an energy-efficient home built on a solid foundation of building science research. Advanced technologies are designed in to give you superior

  9. Secure videoconferencing equipment switching system and method

    DOE Patents [OSTI]

    Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A

    2013-04-30

    Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.

  10. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector ...

  11. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  12. Zicom Electronic Security Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Security Systems Ltd. Place: Mumbai, Maharashtra, India Zip: 400093 Sector: Solar, Wind energy Product: Mumbai-based electronic security systems integrator. The firm plans to...

  13. Roadmap to Secure Control Systems in the Energy: Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to...

  14. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  15. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies Control Systems Cyber Security: Defense in ... strategies for organizations that use control system networks while maintaining a ...

  16. Home Cooling Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fans In many climates, you can use a whole-house fan to meet all or most of your home cooling needs. Evaporative Cooling For homes in dry climates, evaporative cooling or...

  17. Measure Guideline: Selecting Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, R.

    2014-02-01

    This document addresses adding -or improving - mechanical ventilation systems to existing homes. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including some discussion of relevant codes and standards. Advantages, disadvantages, and approximate costs of various system types are presented along with general guidelines for implementing the systems in homes. CARB intends for this document to be useful to decision makers and contractors implementing ventilation systems in homes. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors. It is the intent of this document to assist contractors in making more informed decisions when selecting systems. Ventilation is an integral part of a high-performance home. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability.

  18. Control Systems Security Standards: Accomplishments & Impacts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited.

  19. Control Systems Security Standards: Accomplishments & Impacts

    Office of Environmental Management (EM)

    019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited.

  20. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PDF icon PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE More Documents & Publications PIA - INL Education Programs Business Enclave Manchester Software 1099 Reporting PIA, Idaho National Laboratory PIA - INL PeopleSoft - Human Resource System

  1. Installing and Maintaining a Home Solar Electric System | Department...

    Energy Savers [EERE]

    | Photo courtesy of Dennis Schroeder, NREL. Making sure your home solar electric or photovoltaic (PV) system is sized, sited, installed, and maintained correctly is essential for...

  2. Effects of Home Energy Management Systems on Distribution Utilities...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Effects of Home Energy Management Systems on Distribution Utilities and Feeders under Various Market Structures Preprint Mark Ruth, Annabelle Pratt, Monte Lunacek, Saurabh Mittal,...

  3. Installing and Maintaining a Home Solar Electric System | Department...

    Energy Savers [EERE]

    Making sure your home solar electric or photovoltaic (PV) system is sized, sited, installed, and maintained correctly is essential for maximizing its energy performance. When...

  4. Design tools for complex dynamic security systems.

    SciTech Connect (OSTI)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III; Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  5. Selecting RMF Controls for National Security Systems

    SciTech Connect (OSTI)

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  6. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  7. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  8. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  9. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  10. Mitigations for Security Vulnerabilities Found in Control System Networks |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the

  11. Pantex Occupational Health System (OHS), National Nuclear Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Administration Pantex Site Office | Department of Energy Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office PDF icon Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office More Documents &

  12. Home Heating Systems | Department of Energy

    Office of Environmental Management (EM)

    separately, many homes use the following approaches: Active Solar Heating Uses the sun to heat either air or liquid and can serve as a supplemental heat source. Electric...

  13. A Summary of Control System Security Standards Activities in...

    Broader source: Energy.gov (indexed) [DOE]

    document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication...

  14. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  15. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  16. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  17. Home Energy Management Systems and Reduced Consumption

    Office of Energy Efficiency and Renewable Energy (EERE)

    This presentation was given at the Summer 2012 DOE Building America meeting on July 25, 2012, and addressed the question "What emerging innovations are the key to future homes?"

  18. ORO Office Safeguards and Security Clearance Tracking System and Visitor

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Control System PIA, Oak Ridge Operations Office | Department of Energy Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office PDF icon ORO Office Safeguards and Security Clearance Tracking

  19. Security Profile Inspector for UNIX Systems

    Energy Science and Technology Software Center (OSTI)

    1995-04-01

    SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configurationmore » Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less

  20. System and method for key generation in security tokens

    DOE Patents [OSTI]

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.; Pooser, Raphael C.; Prowell, Stacy J.

    2015-10-27

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  1. System and method for key generation in security tokens

    DOE Patents [OSTI]

    Evans, Philip G; Humble, Travis S; Paul, Nathanael R; Pooser, Raphael C; Prowell, Stacy J

    2015-11-05

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  2. Liability aspects of home energy-rating systems

    SciTech Connect (OSTI)

    Hendrickson, P.L.

    1983-10-01

    Liability aspects of home energy rating systems are discussed. An introduction to the rating system concept, including types of rating systems, implementation efforts to date, and possible groups to conduct ratings, is also included. The home energy rating system concept involves the periodic rating of the energy efficiency of residential buildings. The rating can provide a relative indication of a home's energy efficiency and also a quantitative estimate of consumption, fuel cost, or both. Primary attention is given to liability issues associated with developing and performing ratings. Secondary attention is given to possible liability associated with misuse of a rating once it has been performed.

  3. Installing and Maintaining a Home Solar Electric System | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Home Solar Electric System Installing and Maintaining a Home Solar Electric System When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. Making sure your

  4. Quality Management Systems for Zero Energy Ready Home Webinar (Text

    Energy Savers [EERE]

    Version) | Department of Energy Quality Management Systems for Zero Energy Ready Home Webinar (Text Version) Quality Management Systems for Zero Energy Ready Home Webinar (Text Version) Below is the text version of the webinar, Quality Management Systems for Zero Energy Ready Home, presented in October 2014. Watch the presentation. GoToWebinar voice: The broadcast is now starting. All attendees are in listen-only mode. Lindsay Parker: Hi, everyone. We're really glad that you can make it here

  5. Planning for Home Renewable Energy Systems | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Planning for a home renewable energy system is a process that includes analyzing your existing electricity use, looking at local codes and requirements, deciding if you want to operate your system on or off of the electric grid, and understanding technology options you have for your site. | Photo by Francis Fine Art Photography. Planning for a home renewable energy system is a process that includes analyzing your existing electricity use, looking at local codes and requirements, deciding if you

  6. Information System Security Officer (ISSO) | Department of Energy

    Office of Environmental Management (EM)

    Officer (ISSO) Information System Security Officer (ISSO) digital-388075_960_720.jpg The Information System Security Officer (ISSO) is responsible to the Information System Security Manager (SSM), information owner, and system owner for ensuring a proper security posture is in place. PDF icon ISSO Core Competency Training Worksheet More Documents & Publications Cybersecurity Program Manager (CSPM) Authorizing Official Designated Representative (AODR) Information System Owner (ISO

  7. Information System Security Manager (ISSM) | Department of Energy

    Office of Environmental Management (EM)

    Manager (ISSM) Information System Security Manager (ISSM) macbook-925595_960_720.jpg The Information Security System Manager (ISSM) is designated by an operating unit's (DOE organization or site) Senior Manager to manage the unit's cyber security program. The ISSM establishes, documents, and monitors an operating unit's cyber security program implementation plan, and ensures compliance with DOE management policies. Candidates must possess a working knowledge of cyber security policies and

  8. PIA - Security Clearance Tracking System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tracking System PIA - Security Clearance Tracking System PIA - Security Clearance Tracking System PDF icon PIA - Security Clearance Tracking System More Documents & Publications Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory PIA - GovTrip (DOE data) PIA - Bonneville Power Adminstration Ethics Helpline

  9. PIA - Security Clearance Work Tracking and Budget System | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Work Tracking and Budget System PIA - Security Clearance Work Tracking and Budget System PIA - Security Clearance Work Tracking and Budget System PDF icon PIA - Security Clearance Work Tracking and Budget System More Documents & Publications Freedom of Information and Privacy Act Database PIA, Idaho Operations Office PIA - INL Education Programs Business Enclave Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory

  10. Aerial Measuring System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Aerial Measuring System | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  11. NNSA Policy System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Policy System | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  12. information systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    information systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  13. Collaboration Topics - System Software | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration System Software | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs

  14. Ultra Safe And Secure Blasting System

    SciTech Connect (OSTI)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  15. Meeting Minutes from Automated Home Energy Management System Expert Meeting

    Energy Savers [EERE]

    Automated Home Energy Management System Expert Meeting October 1-2, 2009 AGENDA - Day 1 8:30 - 8:45 Welcome and Debriefing of Building America and Home Energy Management Research- Lew Pratsch, DOE 8:45 - 9:15 Utilities Trends- Smart Grid Projects and Integration With Home Controls - Mike Keesee, SMUD 9:15 - 9:45 Thoughts on Controls System Performance Requirements - Rich Brown, LBL 9:45 - 10:15 Efficiency Trends in Consumer Electronics - Kurtis McKenney, TIAX 10:15 - 10:30 Session Break 10:30 -

  16. Northeast Home Heating Oil Reserve- Online Bidding System

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy has developed an on-line bidding system - an anonymous auction program - for the sale of product from the one million barrel Northeast Home Heating Oil Reserve.

  17. Installing and Maintaining a Home Solar Electric System | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Home Solar Electric System When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV...

  18. Measure Guideline: Selecting Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, R.

    2014-02-01

    This report, developed by Building America research team CARB, addresses adding or improving mechanical ventilation systems to existing homes. The goal of this report is to assist decision makers and contractors in making informed decisions when selecting ventilation systems for homes. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including examination of relevant codes and standards. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors.

  19. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language ... subway systems, dams, telecommunication systems, natural gas pipelines, and many others. ...

  20. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    which is free to browse our entire collection. Expect to go through something similar to airport security screening upon entry. Checking out materials: Borrowing may take place...

  1. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  2. Action Codes Table | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System NMMSS Information, Reports & Forms Code Tables Action...

  3. Roadmap to Secure Control Systems in the Energy Sector 2006 ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Presentation by Hank Kenchington on the 2006 roadmap to secure control ...

  4. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BUSINESS ENCLAVE PDF icon PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ... 1099 Reporting PIA, Idaho National Laboratory PIA - INL PeopleSoft - Human Resource System

  5. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  6. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sign In Honeywell Aero KCP NNSA NATIONAL SECURITY CAMPUS IN THE NEWS IN THE NEWS NSC reaches safety milestone with on-time, on-budget moveLEARN MORE LEARN MORE HEALTH, SAFETY & ENVIRONMENT HEALTH, SAFETY & ENVIRONMENT We are committed to health and safety of our employees, our communities...LEARN MORE LEARN MORE CAREERS CAREERS A career at the National Security Campus means rewarding work...LEARN MORE LEARN MORE

  7. Security Metricsfor Process Control Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Metricsfor Process Control Systems Security Metricsfor Process Control Systems This document describes the foundations of metrics, discusses application of these metrics to control system environments, introduces a metrics taxonomy, and suggests usage of metrics to achieve operational excellence. PDF icon Security Metrics for Process Control Systems More Documents & Publications Report of the Cyber Security Research Needs for Open Science Workshop Visualization & Controls Program Peer

  8. Prototype system brings advantages of wireless technology to secure

    National Nuclear Security Administration (NNSA)

    environment | National Nuclear Security Administration Prototype system brings advantages of wireless technology to secure environment | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios

  9. NREL: Energy Systems Integration Facility Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Systems Integration Facility Right Tool at the Right Time Photo of the Energy Systems Integration Facility at dusk. As energy efficiency and clean energy technologies become more common, system challenges are forcing us to rethink traditional paradigms of energy system planning and operation. The Energy System Integration Facility is the right tool for the challenge. More Energy Systems Integration Facility Designated U.S. Department of Energy User Facility Photo of three people

  10. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  11. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  12. Process Control Systems in the Chemical Industry: Safety vs. Security

    SciTech Connect (OSTI)

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  13. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  14. Securing Wide Area Measurement Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Wide Area Measurement Systems Securing Wide Area Measurement Systems This report documents an assessment of wide area measurement system (WAMS) security conducted by Pacific Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the Department of Energy's Transmission Reliability Program. With emphasis on cyber security, this report also addresses other categories of risk and vulnerability including equipment reliability, data quality

  15. Security Framework for Control System Data Classification and Protection |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Framework for Control System Data Classification and Protection Security Framework for Control System Data Classification and Protection This document presents a data classification process that gives utility administrators, control engineers, and IT personnel a cohesive approach to deploying efficient and effective process control security. PDF icon Security Framework for Control System Data Classification and Protection More Documents & Publications Essential Body

  16. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE

  17. List of Major Information Systems,National Nuclear Security Administration

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADaPT Networked: | Department of Energy List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear

  18. Electronic DOE Information Security System (eDISS) PIA, Office of Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety and Security | Department of Energy DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security PDF icon Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security More Documents & Publications Integrated Safety Management Workshop

  19. NREL: Wind Research - Systems Engineering Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems Engineering Wind Research The National Wind Technology Center (NWTC) wind energy systems engineering initiative has developed an analysis platform to leverage its research capabilities toward integrating wind energy engineering and cost models across wind plants. This platform captures the important interactions between various subsystems to achieve a better understanding of how to improve system-level performance and achieve system-level cost reductions. The initiative's goal is to

  20. Design of a physical security perimeter fencing system.

    SciTech Connect (OSTI)

    Mack, Thomas Kimball; Ross, Michael P.; Lin, Han Wei

    2010-10-01

    Design of a physical security perimeter fencing system requires that security designers provide effective detection, delay, and response functionalities with minimal nuisance alarms. In addition, the designers must take into considerations the security fence system life cycle cost (equipment and grounds maintenance), complexity of the terrain, safety, and environmental conditions (location of where the security fence will be installed). Often, these factors drive the security designers to design a perimeter intrusion detection and assessment system (PIDAS) that includes: (1) larger than desired footprint, (2) one or more animal control fences to minimize the nuisance alarm rate (NAR), and (3) clear zones and an isolation zone to facilitate intrusion detection and assessment by keeping the fence lines clear of vegetation, trash, and other objects that could impede the security system's performance. This paper presents a two-tier PIDAS design that focuses on effective performance specifically in high probability of detection and low NAR that minimizes cost and the footprint of the system.

  1. Project Management and Systems Support | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Project Management and Systems Support | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  2. Control Systems Security Publications Library | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transmission and Distribution World article: "DOE Focuses on Cyber Security" - March 2007 Back to Top ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION Roadmap to Achieve Energy ...

  3. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  4. Roadmap to Secure Control Systems in the Energy Sector

    Energy Savers [EERE]

    Roadmap to Secure Control Systems in the Energy Sector -  - Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improing cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and goernment to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors oer the next ten years. The Roadmap proides a strategic

  5. Roadmap to Secure Control Systems in the Energy: Executive Summary

    Energy Savers [EERE]

    Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision

  6. DOE and Industry Showcase New Control Systems Security Technologies at

    Office of Environmental Management (EM)

    DistribuTECH | Department of Energy and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH March 25, 2010 - 1:20pm Addthis DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy

  7. NREL: Energy Systems Integration Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Systems Integration Photo of the Energy Systems Integration facility.NREL Learn how NREL's ESI experts and facilities will play a leading role in DOE's Grid Modernization Lab Consortium. Photo of two men standing in front of a visualization screen modeling the electricity grid. Get the latest updates from NREL's ESI program in our monthly newsletter. Photo of photovoltaic panels installed on a rooftop in Hawaii. Learn how NREL is working with Hawaiian Electric and SolarCity to make

  8. Evaluating Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, R.; Arena, L.

    2013-02-01

    During the course of this project, an affordable and high performance ductwork system to directly address the problems of thermal losses, poor efficiency, and air leakage was designed. To save space and enable direct connections between different floors of the building, the ductwork system was designed in such a way that it occupied interior or exterior frame wall cavities. The ductwork system satisfied building regulations for structural support when bridging multiple floors, the spread of fire and smoke, and insulation to reduce the heat flow into or out of the building. Retrofits of urban residential buildings will be the main focus for the application of this ductwork system. Highly reflective foils and insulating materials were used to aid in the increase of the overall R-value of the ductwork itself and the wall assembly. It is expected that the proposed system will increase the efficiency of the HVAC system and the thermal resistance of the building envelope. The performance of the proposed ductwork design was numerically evaluated in a number of different ways. Our results indicate that the duct method is a very cost attractive alternative to the conventional method.

  9. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  10. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  11. Information security management system planning for CBRN facilities

    SciTech Connect (OSTI)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  12. Recommended Practice for Securing Control System Modems | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Practice for Securing Control System Modems Recommended Practice for Securing Control System Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader

  13. NREL: News - New Energy Systems Enhance National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy technologies that can be used to strengthen U.S. energy security. "Renewable energy technologies offer the nation powerful tools for enhancing homeland security," NREL Director Richard Truly said today at the National Press Club. More broadly, Truly said, the growing energy contributions

  14. 2006 NMMSS Users Training Meeting | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System Training Annual Users Training Meeting Archives 2006...

  15. 2009 NMMSS Users Training Meeting | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System Training Annual Users Training Meeting Archives 2009...

  16. 2010 NMMSS Users Training Meeting | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System Training Annual Users Training Meeting Archives 2010...

  17. Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices

    SciTech Connect (OSTI)

    Hoen, Ben; Wiser, Ryan; Thayer, Mark; Cappers, Peter

    2012-04-15

    Relatively little research exists estimating the marginal impacts of photovoltaic (PV) energy systems on home sale prices. Using a large dataset of California homes that sold from 2000 through mid-2009, we find strong evidence, despite a variety of robustness checks, that existing homes with PV systems sold for a premium over comparable homes without PV systems, implying a near full return on investment. Premiums for new homes are found to be considerably lower than those for existing homes, implying, potentially, a tradeoff between price and sales velocity. The results have significant implications for homeowners, builders, appraisers, lenders, and policymakers.

  18. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  19. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  20. Common Cyber Security Vulnerabilities Observed in Control System

    Energy Savers [EERE]

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  1. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Program Areas Defense Systems About Defense Systems & Assessments Program Areas Accomplishments Cybersecurity Programs Program Areas EOD security and defense photo Sandia's engineering, science, and technology expertise helps anticipate and solve the nation's toughest security challenges. Defense Systems & Assessments work is focused in seven main program areas: Information Operations: Information Operations develops technologies that help protect U.S. government,

  2. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E.; Duggan, David P.; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  3. HPXML: A Standardized Home Performance Data Sharing System -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Standard for Home Performance-Related Data Transfer (dubbed Home Performance XML, or HPXML) provides an extensible mark-up language (XML) protocol that can seamlessly transfer data ...

  4. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  5. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IQ Station Boise State University receives a portable 3D visualization system from CAES and INL More BSU Photo of the Week INL's Shane Grover drives the IQ Station...

  6. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    DOE Patents [OSTI]

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  7. Security Requirements for Classified Automatic Data Processing Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1985-07-10

    To establish and describe the computer security program for classified automatic data processing (ADP) systems at the Department of Energy (DOE) Headquarters. This directive does not cancel another directive. Canceled by DOE N 251.9.

  8. Developing Secure Power Systems Professional Competence: Alignment and Gaps

    Office of Environmental Management (EM)

    in Workforce Development Programs - Phase 2 (July/August 2013) | Department of Energy Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for

  9. Pressurized security barrier and alarm system

    DOE Patents [OSTI]

    Carver, D.W.

    1995-04-11

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

  10. Marine asset security and tracking (MAST) system

    DOE Patents [OSTI]

    Hanson, Gregory Richard; Smith, Stephen Fulton; Moore, Michael Roy; Dobson, Eric Lesley; Blair, Jeffrey Scott; Duncan, Christopher Allen; Lenarduzzi, Roberto

    2008-07-01

    Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

  11. Pressurized security barrier and alarm system

    DOE Patents [OSTI]

    Carver, Don W. (Knoxville, TN)

    1995-01-01

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder's making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed.

  12. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  13. Collaboration Topics - System Software | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Simulation and Computing and Institutional R&D Programs NNSACEA Cooperation in Computer Science Collaboration Topics - System Software Collaboration Topics - System...

  14. Aerial Measuring System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AMS Logo NNSA's Aerial Measuring System (AMS) provides specialized airborne radiation detection systems to provide real-time measurements of low levels of air and ground ...

  15. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  16. Building America Case Study: Selecting Ventilation Systems for Existing Homes (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-12-01

    This document addresses adding -or improving - mechanical ventilation systems to existing homes. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including some discussion of relevant codes and standards. Advantages, disadvantages, and approximate costs of various system types are presented along with general guidelines for implementing the systems in homes. CARB intends for this document to be useful to decision makers and contractors implementing ventilation systems in homes. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors. It is the intent of this document to assist contractors in making more informed decisions when selecting systems. Ventilation is an integral part of a high-performance home. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability.

  17. Using Multiple Unmanned Systems for a Site Security Task

    SciTech Connect (OSTI)

    Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

    2009-04-01

    Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

  18. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  19. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  20. Building America System Research Plan for Reduction of Miscellaneous Electrical Loads in Zero Energy Homes

    SciTech Connect (OSTI)

    Barley, C. D.; Haley, C.; Anderson, R.; Pratsch, L.

    2008-11-01

    This research plan describes the overall scope of system research that is needed to reduce miscellaneous electrical loads (MEL) in future net zero energy homes.

  1. HPXML: A Standardized Home Performance Data Sharing System- Building America Top Innovation

    Broader source: Energy.gov [DOE]

    NREL’s Standard for Home Performance-Related Data Transfer (known as HPXML) facilitates smooth communication between program tracking systems and energy upgrade analysis software.

  2. Could Your Home Benefit from a Small Wind Electric System? | Department of

    Energy Savers [EERE]

    Energy Could Your Home Benefit from a Small Wind Electric System? Could Your Home Benefit from a Small Wind Electric System? August 8, 2013 - 2:31pm Addthis A small wind electric system can be a clean, affordable way to power your home. | Photo courtesy of Thomas Fleckenstein, NREL 26476 A small wind electric system can be a clean, affordable way to power your home. | Photo courtesy of Thomas Fleckenstein, NREL 26476 Erik Hyrkas Erik Hyrkas Media Relations Specialist, Office of Energy

  3. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  4. Container Security - part of the CORE system

    Energy Science and Technology Software Center (OSTI)

    2009-10-02

    A data integration system to support the US Customs and Border Protection Officers to supervise and make decisions for container inspections. CORE is designed to act as a framework to bridge the gaps between disparate data integration and delivery of disparate information visualization.

  5. Critical issues in process control system security : DHS spares project.

    SciTech Connect (OSTI)

    Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

    2010-10-01

    The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

  6. Using Home Energy Scoring Systems | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    More Documents & Publications Trends in Real Estate and Energy Efficiency -- Update on Program Experience Trends in Real Estate and Energy Efficiency Working with Real Estate Home ...

  7. Combi Systems for Low Load homes | Department of Energy

    Energy Savers [EERE]

    America Technology Solutions for New and Existing Homes: Retrofit Integrated Space and Water Heating-Field Assessment Building America Expert Meeting: Recommendations for...

  8. Secure Video Surveillance System Acquisition Software

    Energy Science and Technology Software Center (OSTI)

    2009-12-04

    The SVSS Acquisition Software collects and displays video images from two cameras through a VPN, and store the images onto a collection controller. The software is configured to allow a user to enter a time window to display up to 2 1/2, hours of video review. The software collects images from the cameras at a rate of 1 image per second and automatically deletes images older than 3 hours. The software code operates in amore » linux environment and can be run in a virtual machine on Windows XP. The Sandia software integrates the different COTS software together to build the video review system.« less

  9. Computational Systems & Software Environment | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Computational Systems & Software Environment | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery

  10. LANL installs high-performance computer system | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration installs high-performance computer system | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs

  11. Crops reap benefits of Pantex irrigation system | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Crops reap benefits of Pantex irrigation system | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery

  12. HOME INSECURITY: NO ALARMS, FALSE ALARMS, AND SIGINT

    SciTech Connect (OSTI)

    Lamb, Logan M [ORNL

    2014-01-01

    The market share of home security systems has substantially increased as vendors incorporate more desirable features: intrusion detection, automation, wireless, and LCD touch panel controls. Wireless connectivity allows vendors to manufacture cheaper, more featureful products that require little to no home modification to install. Consumer win, since adding devices is easier. The result: an ostensibly more secure, convenient, and connected home for a larger number of citizens. Sadly, this hypothesis is flawed; the idea of covering a home with more security sensors does not translate into a more secure home. Additionally, the number of homes using these vulnerable systems is large, and the growth rate is increasing producing a even larger problem. In this talk, I will demonstrate a generalized approach for compromising three systems: ADT, the largest home security dealer in North America; Honeywell, one of the largest manufacturers of security devices; and Vivint, a top 5 security dealer. We will suppress alarms, create false alarms, and collect artifacts that facilitate tracking the movements of individuals in their homes.

  13. AMI System Security Requirements - v1_01-1 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AMI System Security Requirements - v1_01-1 AMI System Security Requirements - v1_01-1 This document provides the utility industry and vendors with a set of security requirements for Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the procurement process, and represent a superset of requirements gathered from current cross industry accepted security standards and best practice guidance documents. PDF icon AMI System Security Requirements - v1_01-1 More

  14. DOE Zero Energy Ready Home Case Study: Weiss Building & Development LLC, System Home, River Forest, IL

    Broader source: Energy.gov [DOE]

    Case study of a DOE Zero Energy Ready Home in River Forest, IL, that scored HERS 17 without PV. This 4,763-square-foot custom passive house has R-54 ICF walls, a vented attic with R-100 blown fiberglass, plus R-40 rigid EPS under the slab, triple-pane windows, two ductless mini-split heat pumps, and redundant air sealing and flashing details.

  15. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  16. An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California

    SciTech Connect (OSTI)

    Hoen, Ben; Cappers, Peter; Wiser, Ryan; Thayer, Mark

    2011-04-19

    An increasing number of homes in the U.S. have sold with photovoltaic (PV) energy systems installed at the time of sale, yet relatively little research exists that estimates the marginal impacts of those PV systems on home sale prices. A clearer understanding of these possible impacts might influence the decisions of homeowners considering the installation of a PV system, homebuyers considering the purchase of a home with PV already installed, and new home builders considering including PV as an optional or standard product on their homes. This research analyzes a large dataset of California homes that sold from 2000 through mid-2009 with PV installed. It finds strong evidence that homes with PV systems sold for a premium over comparable homes without PV systems during this time frame. Estimates for this premium expressed in dollars per watt of installed PV range, on average, from roughly $4 to $5.5/watt across a large number of hedonic and repeat sales model specifications and robustness tests. When expressed as a ratio of the sales price premium of PV to estimated annual energy cost savings associated with PV, an average ratio of 14:1 to 19:1 can be calculated; these results are consistent with those of the more-extensive existing literature on the impact of energy efficiency on sales prices. When the data are split among new and existing homes, however, PV system premiums are markedly affected. New homes with PV show premiums of $2.3-2.6/watt, while existing homes with PV show premiums of more than $6/watt. Reasons for this discrepancy are suggested, yet further research is warranted. A number of other areas where future research would be useful are also highlighted.

  17. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Cybersecurity Programs Cybersecurity Delivering experience & expertise Training the next generation of cyber defenders Cybersecurity computing Defending national security Applying science and engineering to protect cyber systems from malicious attacks Cyber worker inspecting supercomputer Protecting cyberspace An expert team, passionate about defending the nation's critical infrastructure Computer Annex "The cyber threat to our nation is one of the most serious

  18. Small Business Sourcing System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Sourcing System | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  19. Control Systems Security Publications Library | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publications Library Control Systems Security Publications Library Publications Library Repository of documents, listed by topic. (Some of the documents in this section require Adobe Acrobat Reader. You can download a free copy of the Reader by visiting Adobe.) VULNERABILITY REPORTS PERIODICAL ARTICLES ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION DOE NSTB PROGRAM PLANNING AND RESOURCE DOCUMENTS PROJECT FACT SHEETS TRAINING MATERIALS AND RECOMMENDED PRACTICES ASSESSMENT AND TECHNICAL

  20. Measurement-Based Evaluation of Installed Filtration System Performance in Single-Family Homes

    SciTech Connect (OSTI)

    Chan, Wanyu Rengie; Singer, Brett C.

    2014-04-03

    This guide discusses important study design issues to consider when conducting an on-site evaluation of filtration system performance. The two most important dichotomies to consider in developing a study protocol are (1) whether systems are being evaluated in occupied or unoccupied homes and (2) whether different systems are being compared in the same homes or if the comparison is between systems installed in different homes. This document provides perspective and recommendations about a suite of implementation issues including the choice of particle measurement devices, selection of sampling locations, ways to control and/or monitor factors and processes that can impact particle concentrations, and data analysis approaches.

  1. Home Energy Score API User: CakeSystems | Department of Energy

    Energy Savers [EERE]

    CakeSystems Home Energy Score API User: CakeSystems CakeSystems is a platform that helps efficiency programs, professionals, and homeowners implement scoring tools to help move the market forward. CakeSystems uses a flexible data collection platform to gather the data necessary for a Home Energy Score and incorporates that into other workflows for creating proposals, program tracking, and homeowner engagement. The information also populates in an offline mobile app, available for Android and iOS

  2. Building America Best Practices Series, Volume 6: High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems

    SciTech Connect (OSTI)

    Baechler, Michael C.; Gilbride, Theresa L.; Ruiz, Kathleen A.; Steward, Heidi E.; Love, Pat M.

    2007-06-04

    This guide is was written by PNNL for the US Department of Energy's Building America program to provide information for residential production builders interested in building near zero energy homes. The guide provides indepth descriptions of various roof-top photovoltaic power generating systems for homes. The guide also provides extensive information on various designs of solar thermal water heating systems for homes. The guide also provides construction company owners and managers with an understanding of how solar technologies can be added to their homes in a way that is cost effective, practical, and marketable. Twelve case studies provide examples of production builders across the United States who are building energy-efficient homes with photovoltaic or solar water heating systems.

  3. High-end Home Firewalls CIAC-2326

    SciTech Connect (OSTI)

    Orvis, W

    2003-10-08

    Networking in most large organizations is protected with corporate firewalls and managed by seasoned security professionals. Attempts to break into systems at these organizations are extremely difficult to impossible for an external intruder. With the growth in networking and the options that it makes possible, new avenues of intrusion are opening up. Corporate machines exist that are completely unprotected against intrusions, that are not managed by a security professional, and that are regularly connected to the company network. People have the option of and are encouraged to work at home using a home computer linked to the company network. Managers have home computers linked to internal machines so they can keep an eye on internal processes while not physically at work. Researchers do research or writing at home and connect to the company network to download information and upload results. In most cases, these home computers are completely unprotected, except for any protection that the home user might have installed. Unfortunately, most home users are not security professionals and home computers are often used by other family members, such as children downloading music, who are completely unconcerned about security precautions. When these computers are connected to the company network, they can easily introduce viruses, worms, and other malicious code or open a channel behind the company firewall for an external intruder.

  4. A Summary of Control System Security Standards Activities in the Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sector (October 2005) | Department of Energy A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of

  5. July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and

    Office of Environmental Management (EM)

    Commercial Facilities | Department of Energy July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and Commercial Facilities July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and Commercial Facilities July 12, 2013 - 10:40am Addthis On Wednesday, July 17 from 2 - 3 p.m. ET, Clean Energy States Alliance will host a webinar on resilient solar-storage systems for homes and commercial facilities. The webinar will be introduced by Dr. Imre Gyuk, Energy Storage Program

  6. Capacity Utilization Study for Aviation Security Cargo Inspection Queuing System

    SciTech Connect (OSTI)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E; Brumback, Daryl L

    2010-01-01

    In this paper, we conduct performance evaluation study for an aviation security cargo inspection queuing system for material flow and accountability. The queuing model employed in our study is based on discrete-event simulation and processes various types of cargo simultaneously. Onsite measurements are collected in an airport facility to validate the queuing model. The overall performance of the aviation security cargo inspection system is computed, analyzed, and optimized for the different system dynamics. Various performance measures are considered such as system capacity, residual capacity, throughput, capacity utilization, subscribed capacity utilization, resources capacity utilization, subscribed resources capacity utilization, and number of cargo pieces (or pallets) in the different queues. These metrics are performance indicators of the system s ability to service current needs and response capacity to additional requests. We studied and analyzed different scenarios by changing various model parameters such as number of pieces per pallet, number of TSA inspectors and ATS personnel, number of forklifts, number of explosives trace detection (ETD) and explosives detection system (EDS) inspection machines, inspection modality distribution, alarm rate, and cargo closeout time. The increased physical understanding resulting from execution of the queuing model utilizing these vetted performance measures should reduce the overall cost and shipping delays associated with new inspection requirements.

  7. Starting Points | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Security Campus Management and Operating (M&O) Contract Competition / Starting Points Starting Points Kansas City Plant Related Web Pages Summary Kansas City Plant Home Page Kansas City Plant Contracts DOE Directives NNSA Policy System Kansas City Field Office (KCFO) Home Page List of Applicable Directives in the Current Contract

  8. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; leo, R.; Perman, K.

    2013-08-26

    This is the final report of Phase 2 of the Secure Power Systems Professional project, a 3 phase project. DOE will post to their website upon release.

  9. Roadmap to Secure Control Systems in the Energy Sector - January 2006 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Energy Sector - January 2006 Roadmap to Secure Control Systems in the Energy Sector - January 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years.

  10. Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten

  11. July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    July 12, 2013 - 10:40am Addthis On Wednesday, July 17 from 2 - 3 p.m. ET, Clean Energy States Alliance will host a webinar on resilient solar-storage systems for homes and ...

  12. Building America Top Innovations 2013 Profile – HPXML: A Standardized Home Performance Data Sharing System

    SciTech Connect (OSTI)

    none,

    2013-09-01

    This Top Innovation profile describes the Standard for Home Performance-Related Data Transfer (known as HPXML), developed by the National Renewable Energy Laboratory, which facilitates smooth communication between program tracking systems and energy upgrade analysis software,

  13. Building America Expert Meeting: Minutes from Automated Home Energy Management System

    Broader source: Energy.gov [DOE]

    These meeting minutes are from the U.S. Department of Energy Building America program expert meeting titled "Automated Home Energy Management System," held on October 1-2, 2010 in Denver, Colorado.

  14. SunShot Installs Solar Energy System on Local Habitat for Humanity Home

    Broader source: Energy.gov [DOE]

    Working with GRID Alternatives, the nation's largest solar non-profit, DOE's SunShot Initiative team enjoyed a day in the sun on a rooftop in Washington, D.C., where we volunteered to install a solar energy system on a Habitat for Humanity home. GRID installed solar electric systems on 10 affordable homes developed by Habitat for Humanity in the Ivy City neighborhood in Northeast D.C.

  15. Measured heating system efficiency retrofits in eight manufactured (HUD-code) homes

    SciTech Connect (OSTI)

    Siegel, J.; Davis, B.; Francisco, P.; Palmiter, L.

    1998-07-01

    This report presents the results of field measurements of heating efficiency performed on eight all-electric manufactured homes sited in the Pacific Northwest with forced-air distribution systems. These homes, like more than four million existing manufactured homes in the US, were constructed to thermal specifications that were mandated by the US Department of Housing and Urban Development in 1976. The test protocol compares real-time measurements of furnace energy usage with energy usage during periods when zonal heaters heat the homes to the same internal temperature. By alternating between the furnace and zonal heaters on 2 hour cycles, a short-term coheat test is performed. Additional measurements, including blower door and duct tightness tests, are conducted to measure and characterize the home's tightness and duct leakage so that coheat test results might be linked to other measures of building performance. The testing was done at each home before and after an extensive duct sealing retrofit was performed. The average pre-retrofit system efficiency for these homes was 69%. After the retrofit, the average system efficiency increased to 83%. The average simple payback period for the retrofits ranges from 1 to 5 years in Western Oregon and 1 to 3 years in colder Eastern Oregon.

  16. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    SciTech Connect (OSTI)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was selected from the list of standards identified in the identification effort. The requirements in these seven standards were then compared against the requirements given in the Framework. This comparison identified gaps (requirements not covered) in both the individual industry standards and in the Framework. In addition to the sector-specific standards reviewed, the team compared the requirements in the cross-sector Instrumentation, Systems, and Automation Society (ISA) Technical Reports (TR) 99 -1 and -2 to the Framework requirements. The Framework defines a set of security classes separated into families as functional requirements for control system security. Each standard reviewed was compared to this template of requirements to determine if the standard requirements closely or partially matched these Framework requirements. An analysis of each class of requirements pertaining to each standard reviewed can be found in the comparison results section of this report. Refer to Appendix A, ''Synopsis of Comparison Results'', for a complete graphical representation of the study's findings at a glance. Some of the requirements listed in the Framework are covered by many of the standards, while other requirements are addressed by only a few of the standards. In some cases, the scope of the requirements listed in the standard for a particular industry greatly exceeds the requirements given in the Framework. These additional families of requirements, identified by the various standards bodies, could potentially be added to the Framework. These findings are, in part, due to the maturity both of the security standards themselves and of the different industries current focus on security. In addition, there are differences in how communication and control is used in different industries and the consequences of disruptions via security breaches to each particular industry that could affect how security requirements are prioritized. The differences in the requirements listed in the Framework and in the various industry standards are due, in part, to differences in the level and purpose of the standards. While the requir

  17. Roadmap to Secure Control Systems in the Energy Sector- January 2006

    Broader source: Energy.gov [DOE]

    This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented...

  18. National SCADA Test Bed- Enhancing control systems security in the energy sector (September 2009)

    Broader source: Energy.gov [DOE]

    Improving the security of energy control systems has become a national priority. Since the mid-1990’s, security experts have become increasingly concerned about the threat of malicious cyber...

  19. Honoring Our Past, Securing Our Future | National Nuclear Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Library Fact Sheets Honoring Our Past, Securing Our Future Honoring Our Past, Securing Our Future Transforming a Cold War Nuclear Weapons Complex into a 21st Century ...

  20. Microsoft Word - AMI System Security Requirements - v1_01-1.doc

    Office of Environmental Management (EM)

    UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents.

  1. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  2. Privacy Act System Notices | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fact Sheets Newsletters Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Operations NNSA Office of...

  3. DOE Zero Energy Ready Home Case Study: Evolutionary Home Builders...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Case Study: Weiss Building & Development LLC, System Home, River Forest, IL DOE Zero Energy Ready Home Case Study: Weiss Building & Development LLC., Custom Home, Downers Grove, IL

  4. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Environmental Management (EM)

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  5. Modeling and simulation for cyber-physical system security research, development and applications.

    SciTech Connect (OSTI)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  6. Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to the 2008 ieRoadmap Workshop | Department of Energy Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Presentation by Hank Kenchington on the 2006 roadmap to secure control systems in the energy sector at the ieRoadmap Workshop in Chicago, May 28-29, 2008. PDF icon Roadmap to Secure Control Systems in the Energy Sector More

  7. List of Major Information Systems,National Nuclear Security Administra...

    Broader source: Energy.gov (indexed) [DOE]

    Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. ...

  8. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  9. Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation

    Energy Savers [EERE]

    to the 2008 ieRoadmap Workshop | Department of Energy 2006 - Presentation to the 2008 ieRoadmap Workshop Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Presentation by Hank Kenchington on the 2006 roadmap to secure control systems in the energy sector at the ieRoadmap Workshop in Chicago, May 28-29, 2008. PDF icon Roadmap to Secure Control Systems in the Energy Sector More Documents & Publications Security is Not an Option

  10. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Individual and Team Performance Guidelines

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.; Greitzer, Frank L.; Dalton, Angela C.; Pusey, Portia K.

    2015-03-01

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  11. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Job Profiles

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.; Greitzer, Frank L.; Dalton, Angela C.; Pusey, Portia K.

    2015-03-01

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  12. BETTER DUCT SYSTEMS FOR HOME HEATING AND COOLING.

    SciTech Connect (OSTI)

    ANDREWS,J.

    2001-01-01

    This is a series of six guides intended to provide a working knowledge of residential heating and cooling duct systems, an understanding of the major issues concerning efficiency, comfort, health, and safety, and practical tips on installation and repair of duct systems. These guides are intended for use by contractors, system designers, advanced technicians, and other HVAC professionals. The first two guides are also intended to be accessible to the general reader.

  13. A Fuzzy-Logic Subsumption Controller for Home Energy Management Systems

    SciTech Connect (OSTI)

    Ainstworth, Nathan; Johnson, Brian; Lundstrom, Blake

    2015-10-05

    Presentation for NAPS 2015 associated with conference publication CP-64392. Home Energy Management Systems (HEMS) are controllers that manage and coordinate the generation, storage, and loads in a home. These controllers are increasingly necessary to ensure that increasing penetrations of distributed energy resources are used effectively and do not disrupt the operation of the grid. In this paper, we propose a novel approach to HEMS design based on behavioral control methods, which do not require accurate models or predictions and are very responsive to changing conditions.

  14. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  15. Estimated costs of ventilation systems complying with the HUD ventilation standard for manufactured homes

    SciTech Connect (OSTI)

    Miller, J.D.; Conner, C.C.

    1993-11-01

    At the request of the US Department of Housing and Urban Development (HUD), the Pacific Northwest Laboratory estimated the material, labor, and operating costs for ventilation equipment needed for compliance with HUD`s proposed revision to the ventilation standard for manufactured housing. This was intended to bound the financial impacts of the ventilation standard revision. Researchers evaluated five possible prototype ventilation systems that met the proposed ventilation requirements. Of those five, two systems were determined to be the most likely used by housing manufacturers: System 1 combines a fresh air duct with the existing central forced-air system to supply and circulate fresh air to conditioned spaces. System 2 uses a separate exhaust fan to remove air from the manufactured home. The estimated material and labor costs for these two systems range from $200 to $300 per home. Annual operating costs for the two ventilation systems were estimated for 20 US cities. The estimated operating costs for System 1 ranged from $55/year in Las Vegas, Nevada, to $83/year in Bismarck, North Dakota. Operating costs for System 2 ranged from a low of $35/year in Las Vegas to $63/year in Bismarck. Thus, HUD`s proposed increase in ventilation requirements will add less than $100/year to the energy cost of a manufactured home.

  16. Webinar: ENERGY STAR Hot Water Systems for High Performance Homes

    Broader source: Energy.gov [DOE]

    This presentation is from the Building America research team BA-PIRC webinar on September 30, 2011 providing informationprovide information about how to achieve energy savings from solar water heating, electric dedicated heat pump water heating, and gas tankless systems.

  17. Energy Sector Security Appliances in a System for Intelligent Learning Network Configuration Management and Monitoring (Essence)

    Office of Environmental Management (EM)

    Sector Security Appliances in a System for Intelligent Learning Network Configuration Management and Monitoring (Essence) Software defined network to assist small electric cooperatives with limited resources for securing utility operational networks Background Utilities of all sizes are faced with the challenge of configuring, managing, monitoring, and securing their information technology and operational technology (IT and OT) networks; but the challenge is more acute for small utilities and

  18. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security Home/Water Security - Electricity use by water service sector and county. Shown are electricity use by (a) large-scale conveyance, (b) groundwater irrigation pumping, (c) surface water irrigation pumping, (d) drinking water, and (e) wastewater. Aggregate electricity use across these sectors (f) is also mapped. Permalink Gallery Sandians Recognized in Environmental Science & Technology's Best Paper Competition Analysis, Capabilities, Energy, Energy-Water Nexus, Global, Global,

  19. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security Home/Tag:Water Security - Electricity use by water service sector and county. Shown are electricity use by (a) large-scale conveyance, (b) groundwater irrigation pumping, (c) surface water irrigation pumping, (d) drinking water, and (e) wastewater. Aggregate electricity use across these sectors (f) is also mapped. Permalink Gallery Sandians Recognized in Environmental Science & Technology's Best Paper Competition Analysis,

  20. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  1. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  2. Risk assessment of climate systems for national security.

    SciTech Connect (OSTI)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  3. Technology Solutions Case Study: Selecting Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    2014-12-01

    In multifamily buildings, particularly in the Northeast, exhaust ventilation strategies are the norm as a means of meeting both local exhaust and whole-unit mechanical ventilation rates. The issue of where the "fresh" air is coming from is gaining significance as air-tightness standards for enclosures become more stringent, and the normal leakage paths through the building envelope disappear. Researchers from the Consortium for Advanced Residential Buildings (CARB) found that the majority of high performance, new construction, multifamily housing in the Northeast use one of four general strategies for ventilation: continuous exhaust only with no designated supply or make-up air source, continuous exhaust with ducted make-up air to apartments, continuous exhaust with supply through a make-up air device integral to the unit HVAC, and continuous exhaust with supply through a passive inlet device, such as a trickle vent. Insufficient information is available to designers on how these various systems are best applied. In this project, the CARB team evaluated the four different strategies for providing make-up air to multifamily residential buildings and developed guidelines to help contractors and building owners choose the best ventilation systems.

  4. DOE Zero Energy Ready Home Case Study: Clifton View Homes, Coupeville...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Coupeville, WA, Systems Home DOE Zero Energy Ready Home Case Study: Clifton View Homes, Coupeville, WA, Systems Home Case study of a DOE Zero Energy Ready Home on Whidbey Island, ...

  5. Linking home energy rating systems with energy efficiency financing: Progress on national and state programs

    SciTech Connect (OSTI)

    Farhar, B.C.; Collins, N.E.; Walsh, R.W.

    1996-10-01

    In 1991 and early 1992, the U.S. Department of Energy (DOE), in cooperation with the U.S. Department of Housing and Urban Development (HUD), established a National Collaborative on Home Energy Rating Systems (HERS) and Energy Efficient Mortgages (EEMs). The Collaborative's purpose was to involve stakeholders at a national policy level to develop a plan leading the nation toward a voluntary system linking HERS with EEMs. The National Renewable Energy Laboratory (NREL) coordinated the National Collaborative's meetings for DOE. Composed of representatives from 25 stakeholder organizations, the Collaborative, after some 14 meetings, reached consensus on two documents, both published by NREL in mg 1992: A National Program for Energy-Efficient Mortgages and Home Energy Rating Systems: A Blueprint for Action and Going National with HERS and EEMs: Issues and Impacts, The Collected Papers of the National Collaborative.

  6. security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  7. NREL Fills Key Leadership Role for Energy Systems Security and Resilience -

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    News Releases | NREL Fills Key Leadership Role for Energy Systems Security and Resilience April 6, 2015 Dr. Erfan Ibrahim has joined the Energy Department's National Renewable Energy Laboratory as director of Cyber Physical Systems Security and Resilience for NREL's Energy Systems Integration directorate. This critical area of research and development addresses the challenges of integrating clean energy sources into the national energy infrastructure. "Erfan's experience, creativity and

  8. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in ...

  9. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or...

  10. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs—Summary Report

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; Leo, R.; Perman, K.

    2013-07-01

    This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

  11. Tax Credits for Home Energy Improvements: If You Buy an Energy-Efficient Product or Renewable Energy System for Your Home, You May be Eligible for a Federal Tax Credit (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2010-05-01

    This two-page fact sheet provides an overview of 2010 federal tax credits for energy efficient products or renewable energy systems in the home.

  12. Chapter 3: Enabling Modernization of the Electric Power System Technology Assessment | Cyber and Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber and Physical Security Chapter 3: Technology Assessments Introduction As understanding of the threats facing the operation, components, and subsystems of the electric power system is gained, a need has emerged for improvements in grid security and resilience. The focus on resiliency implies that threats will not go away and that some attacks, in addition to natural events, will be carried out successfully. The objective is for the system and associated subsystems to be designed and operated

  13. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then...

  14. High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems; Volume 6 Building America Best Practices Series

    Energy Savers [EERE]

    by Pacific Northwest National Laboratory & Oak Ridge National Laboratory June 4, 2007 June 2007 * NREL/TP-550-41085 PNNL-16362 High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems Building America Best Practices Series Volume 6 High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems Building America Best Practices Series Prepared by Pacific Northwest National Laboratory, a DOE national laboratory Michael C. Baechler Theresa Gilbride, Kathi Ruiz,

  15. Home Energy Score graphic

    Energy Savers [EERE]

    12345 Honeysuckle Lane 1,800 square feet Smithville, AR 72466 1970 Yes Home Energy Score Recommendations Home Facts Score Address: Home size: Year built: Air conditioned: Your home's current score 3 Score with improvements 7 Estimated annual savings $411 Uses Uses more 10 less 1 2 3 4 5 6 7 8 9 energy energy homeenergyscore.gov The Home Energy Score is a national rating system developed by the U.S. Department of Energy. The Score reflects the energy efficiency of a home based on the home's

  16. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  17. Energy-efficient mortgages and home energy rating systems: A report on the nation`s progress

    SciTech Connect (OSTI)

    Farhar, B.C.; Eckert, J.

    1993-09-01

    This report summarizes progress throughout the nation in establishing voluntary programs linking home energy rating systems (HERS) and energy-efficient mortgages (EEMs). These programs use methods for rating the energy efficiency of new and existing homes and predicting energy cost savings so lenders can factor in energy cost savings when underwriting mortgages. The programs also encourage lenders to finance cost-effective energy-efficiency improvements to existing homes with low-interest mortgages or other instruments. The money saved on utility bills over the long term can more than offset the cost of such energy-efficiency improvements. The National Collaborative on HERS and EEMs recommended that this report be prepared.

  18. Challenge Home Student Design Competition

    Broader source: Energy.gov [DOE]

    Check out student designs of zero energy ready homes -- homes that are so efficient they can produce as much energy as the use with a renewable energy system.

  19. Tools and Methods for Hardening Communication Security of Energy Delivery Systems

    SciTech Connect (OSTI)

    Gadgil, Shrirang; Lin, Yow-Jian; Ghosh, Abhrajit; Samtani, Sunil; Kang, Jaewon; Siegell, Bruce; Kaul, Vikram; Unger, John; De Bruet, Andre; Martinez, Catherine; Vermeulen, Gerald; Rasche, Galen; Sternfeld, Scott; Berthier, Robin; Bobba, Rakesh; Campbell, Roy; Sanders, Williams; Lin, Yow-Jian

    2014-06-30

    This document summarizes the research and development work the TT Government Solutions (TTGS), d.b.a. Applied Communication Sciences (ACS), team performed for the Department of Energy Cybersecurity for Energy Delivery Systems (CEDS) program. It addresses the challenges in protecting critical grid control and data communication, including the identification of vulnerabilities and deficiencies of communication protocols commonly used in energy delivery systems (e.g., ICCP, DNP3, C37.118, C12.22), as well as the development of effective means to detect and prevent the exploitation of such vulnerabilities and deficiencies. The team consists of • TT Government Solutions (TTGS), a leading provider of communications solutions that has extensive experience in commercializing communications solutions. TTGS also has deep cyber security research and development expertise supporting a variety of customers. • University of Illinois at Urbana-Champaign (UIUC), a leader in the cyber security research for the power grid. UIUC brings unique experience in designing secure communication protocols to this project. • Electric Power Research Institute (EPRI), an independent nonprofit that conducts research and development relating to the generation, delivery and use of electricity for the benefit of the public. EPRI brings to this effort its extensive technical expertise and its utility connections, with members representing more than 90 percent of the electricity generated and delivered in the United States. • DTE Energy, the 10th largest electric utility in the US, which helps ensure that this project focuses on the needs of utilities and is rightly positioned to address the needs of the market place. We designed, developed, and demonstrated a modular and extensible ADEC-G (Agent-based, Distributed, Extensible Cybersecurity for the Grid) system for monitoring/detecting abnormal energy delivery systems (EDS) protocol usage and ensuring security coverage. Our approach consists of i. An online system with stateful model based checkers (SMBCs) that helps utilities monitor EDS protocol communication contexts and flag abnormal session behaviors; ii. An offline framework that security tool developers, operators, and auditors can use to verify security properties (leverages formal methods). The modular design of the ADEC-G online system enables its easy extension to cover added protocol features, to introduce new monitoring capabilities, and to apply to additional communication protocols. Its monitoring capabilities and user interface features also facilitate visibilities into ongoing communication patterns and quick grasps of suspicious communication activities. The offline framework provides a platform not only for rigorous validation of security coverage, but also for systematic refinement of checker design leveraging the counter traces generated by the model checking tool. The ADEC-G online monitoring/detection system and the offline validation framework are both operational and have been demonstrated in various settings. The ADEC-G online system has also been integrated into TTGS SecureSmart Managed Security Services offering and been employed to perform security assessment in a section of a utility’s operational network as well as in other Smart Grid security pilot project offerings. TTGS is also in discussions with several system integrators for incorporating the integrated SecureSmart Managed Security Services offering as the cyber security solution for the nce of Operations Technology (OT) and Information Technology (IT).

  20. Access Rate Control System | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Access Rate Control System Access Rate Control System The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:03 min Developed to support...

  1. Electronic DOE Information Security System (eDISS) PIA, Office...

    Energy Savers [EERE]

    Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Occupational Injury & Illness System...

  2. New Home Rebate

    Broader source: Energy.gov [DOE]

    The Alaska Housing Finance Corporation (AFHC) provides rebates to Alaskans who purchase or build new, energy-efficient homes. AFHC uses the Home Energy Rating System index to determine the size of...

  3. ORO Office Safeguards and Security Clearance Tracking System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking System(VETS) PIA, Oak ridge Operations Office ...

  4. ORO Office Safeguards and Security Clearance Tracking System...

    Energy Savers [EERE]

    System PIA, Oak Ridge Operations Office More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking...

  5. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  6. GAO Challenges and Efforts to Secure Control Systems (March 2004)

    Broader source: Energy.gov [DOE]

    Computerized control systems perform vital functions across many of our nation’s critical infrastructures. For example, in natural gas distribution, they can monitor and control the pressure and...

  7. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments Programs Defense Systems & Assessments Accelerating Innovation for the Warfighter Accelerating Innovation into the Hands of the Warfighter Supporting Ballistic Missile Defense Supporting Ballistic Missile Defense Launching GPS Satellites Launch of GPS satellite About Defense Systems & Assessments Our engineering, science, and technology expertise supports soldiers on the battlefield. About Us Program Areas Our multi-faceted research detects and defends against threats

  8. Effects of Home Energy Management Systems on Distribution Utilities and Feeders Under Various Market Structures: Preprint

    SciTech Connect (OSTI)

    Ruth, Mark; Pratt, Annabelle; Lunacek, Monte; Mittal, Saurabh; Wu, Hongyu; Jones, Wesley

    2015-07-17

    The combination of distributed energy resources (DER) and retail tariff structures to provide benefits to both utility consumers and the utilities is poorly understood. To improve understanding, an Integrated Energy System Model (IESM) is being developed to simulate the physical and economic aspects of DER technologies, the buildings where they reside, and feeders servicing them. The IESM was used to simulate 20 houses with home energy management systems on a single feeder under a time of use tariff to estimate economic and physical impacts on both the households and the distribution utilities. HEMS reduce consumers’ electric bills by precooling houses in the hours before peak electricity pricing. Household savings are greater than the reduction utility net revenue indicating that HEMS can provide a societal benefit providing tariffs are structured so that utilities remain solvent. Utilization of HEMS reduce peak loads during high price hours but shifts it to hours with off-peak and shoulder prices and resulting in a higher peak load.

  9. Rapid Deployment Shelter System | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rapid Deployment Shelter ... Rapid Deployment Shelter System The mp4 video format is not supported by this browser. Download video Captions: On Time: 5:03 min. Originally designed as a mobile surgical suite, the RDSS can also be converted and used for a command, control, logisitics, or operations center

  10. Rapid Deployment Shelter System, Application | Y-12 National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Complex Rapid Deployment Shelter ... Rapid Deployment Shelter System, Application The mp4 video format is not supported by this browser. Download video Captions: On Time: 3:30 min. The RDSS provides humanitarian and disaster relief first responders with a versatile portable shelter that is rapidly deployed under adverse conditions

  11. MODELING AND PERFORMANCE EVALUATION FOR AVIATION SECURITY CARGO INSPECTION QUEUING SYSTEM

    SciTech Connect (OSTI)

    Allgood, Glenn O; Olama, Mohammed M; Rose, Terri A; Brumback, Daryl L

    2009-01-01

    Beginning in 2010, the U.S. will require that all cargo loaded in passenger aircraft be inspected. This will require more efficient processing of cargo and will have a significant impact on the inspection protocols and business practices of government agencies and the airlines. In this paper, we conduct performance evaluation study for an aviation security cargo inspection queuing system for material flow and accountability. The overall performance of the aviation security cargo inspection system is computed, analyzed, and optimized for the different system dynamics. Various performance measures are considered such as system capacity, residual capacity, and throughput. These metrics are performance indicators of the system s ability to service current needs and response capacity to additional requests. The increased physical understanding resulting from execution of the queuing model utilizing these vetted performance measures will reduce the overall cost and shipping delays associated with the new inspection requirements.

  12. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect (OSTI)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  13. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary

    SciTech Connect (OSTI)

    Hu, Tan Chang; Robinson, David G.

    2011-09-08

    As the national focus on cyber security increases, there is an evolving need for a capability to provide for high-speed sensing of events, correlation of events, and decision-making based on the adverse events seen across multiple independent large-scale network environments. The purpose of this Shared Vision project, Cyber Security Indications and Warning System, was to combine both Sandia's and LMC's expertise to discover new solutions to the challenge of protecting our nation's infrastructure assets. The objectives and scope of the proposal was limited to algorithm and High Performance Computing (HPC) model assessment in the unclassified environment within funding and schedule constraints. The interest is the identification, scalability assessment, and applicability of current utilized cyber security algorithms as applied in an HPC environment.

  14. DOE Undersecretary for Nuclear Security and NNSA Administrator...

    National Nuclear Security Administration (NNSA)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog DOE Undersecretary for Nuclear Security and NNSA ... DOE Undersecretary for Nuclear Security and NNSA ...

  15. The use of information technology security assessment criteria to protect specialized computer systems

    SciTech Connect (OSTI)

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  16. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R.; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C.; Allan, Benjamin A.; Pierson, Lyndon George

    2010-10-01

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  17. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Behavioral Interview Guidelines by Job Roles

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.; Greitzer, Frank L.; Dalton, Angela C.; Pusey, Portia K.

    2015-03-01

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  18. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  19. Effects of Home Energy Management Systems on Distribution Utilities and Feeders Under Various Market Structure; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    Ruth, M.; Pratt, A.; Lunacek, M.; Mittal, S.; Wu, H.; Jones, W.

    2015-06-15

    The combination of distributed energy resources (DER) and retail tariff structures to provide benefits to both utility consumers and the utilities is not well understood. To improve understanding, an Integrated Energy System Model (IESM) is being developed to simulate the physical and economic aspects of DER technologies, the buildings where they reside, and feeders servicing them. The IESM was used to simulate 20 houses with home energy management systems on a single feeder under a time-of-use (TOU) tariff to estimate economic and physical impacts on both the households and the distribution utilities. Home energy management systems (HEMS) reduce consumers’ electric bills by precooling houses in the hours before peak electricity pricing. Utilization of HEMS reduce peak loads during high price hours but shifts it to hours with off-peak and shoulder prices, resulting in a higher peak load. used to simulate 20 houses with home energy management systems on a single feeder under a time-of-use (TOU) tariff to estimate economic and physical impacts on both the households and the distribution utilities. Home energy management systems (HEMS) reduce consumers’ electric bills by precooling houses in the hours before peak electricity pricing. Utilization of HEMS reduce peak loads during high price hours but shifts it to hours with off-peak and shoulder prices, resulting in a higher peak load.

  20. An efficient wireless power transfer system with security considerations for electric vehicle applications

    SciTech Connect (OSTI)

    Zhang, Zhen; Chau, K. T. Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-07

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  1. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | DOE project could impact local traffic in coming weeks Facebook Twitter YouTube Flickr RSS Feature Stories CNS's Y-12 Community Investment Advisory Fund Applications for grants from Y-12's Community Investment Fund are being accepted through Jan. 8, 2016. Run VMC 5K Y-12's team for the Volunteer Ministry Center 5K. Y-12 employees

  2. Energy Secretary Bodman Kicks Off "Energizing America for Energy Security" Tour with Visit to Habitat for Humanity "Net-Zero Energy Home"

    Broader source: Energy.gov [DOE]

    WHEAT RIDGE, COLORADO - Secretary of Energy Samuel W. Bodman today kicked off the "Energizing America for Energy Security" Tour with a visit to Habitat for Humanity's first "true net-zero energy...

  3. Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  4. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  5. Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  6. Cyberspace Security Econometrics System (CSES) - U.S. Copyright TXu 1-901-039

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T; Lantz, Margaret W; Hauser, Katie R

    2014-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. The Cyberspace Security Econometrics System (CSES) provides a measure (i.e., a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement. The basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings contained in this copyright.

  7. CAES Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CAES Home Home About Us Contact Information Our CAES Building FAQs Affiliated Centers Research Core Capabilities Laboratories and Equipment Technology Transfer Visualization CAVE...

  8. CAES Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    View all events >> x CAES Home Home About Us Contact Information Our CAES Building FAQs Affiliated Centers Research Core Capabilities Laboratories and Equipment Technology Transfer...

  9. CAES Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User ID: Password: Log In Forgot your password? CAES Home Home About Us Contact Information Our CAES Building FAQs Affiliated Centers Research Core Capabilities Laboratories and...

  10. Defense Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  11. International Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  12. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  13. Sandia Energy - Price Premiums for Solar Home Sales

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Price Premiums for Solar Home Sales Home Renewable Energy Energy Partnership News News & Events Photovoltaic Solar Systems Analysis Price Premiums for Solar Home Sales Previous...

  14. DOE ZERH Webinar: Quality Management Systems for Zero Energy Ready Home

    Broader source: Energy.gov [DOE]

    The session will provide background and guidance for how Zero Energy Ready Home builders can integrate a quality management program in their business. The focus will be on facilitating builder...

  15. Integrated Heat Pump HVAC Systems for Near-Zero-Energy Homes - Business Case Assessment

    SciTech Connect (OSTI)

    Baxter, Van D

    2007-05-01

    The long range strategic goal of the Department of Energy's Building Technologies (DOE/BT) Program is to create, by 2020, technologies and design approaches that enable the construction of net-zero energy homes at low incremental cost (DOE/BT 2005). A net zero energy home (NZEH) is a residential building with greatly reduced needs for energy through efficiency gains, with the balance of energy needs supplied by renewable technologies. While initially focused on new construction, these technologies and design approaches are intended to have application to buildings constructed before 2020 as well resulting in substantial reduction in energy use for all building types and ages. DOE/BT's Emerging Technologies (ET) team is working to support this strategic goal by identifying and developing advanced heating, ventilating, air-conditioning, and water heating (HVAC/WH) technology options applicable to NZEHs. Although the energy efficiency of heating, ventilating, and air-conditioning (HVAC) equipment has increased substantially in recent years, new approaches are needed to continue this trend. Dramatic efficiency improvements are necessary to enable progress toward the NZEH goals, and will require a radical rethinking of opportunities to improve system performance. The large reductions in HVAC energy consumption necessary to support the NZEH goals require a systems-oriented analysis approach that characterizes each element of energy consumption, identifies alternatives, and determines the most cost-effective combination of options. In particular, HVAC equipment must be developed that addresses the range of special needs of NZEH applications in the areas of reduced HVAC and water heating energy use, humidity control, ventilation, uniform comfort, and ease of zoning. In FY05 ORNL conducted an initial Stage 1 (Applied Research) scoping assessment of HVAC/WH systems options for future NZEHs to help DOE/BT identify and prioritize alternative approaches for further development. Eleven system concepts with central air distribution ducting and nine multi-zone systems were selected and their annual and peak demand performance estimated for five locations: Atlanta (mixed-humid), Houston (hot-humid), Phoenix (hot-dry), San Francisco (marine), and Chicago (cold). Performance was estimated by simulating the systems using the TRNSYS simulation engine (Solar Energy Laboratory et al. 2006) in two 1800-ft{sup 2} houses--a Building America (BA) benchmark house and a prototype NZEH taken from BEopt results at the take-off (or crossover) point (i.e., a house incorporating those design features such that further progress towards ZEH is through the addition of photovoltaic power sources, as determined by current BEopt analyses conducted by NREL). Results were summarized in a project report, 'HVAC Equipment Design options for Near-Zero-Energy Homes--A Stage 2 Scoping Assessment', ORNL/TM-2005/194 (Baxter 2005). The 2005 study report describes the HVAC options considered, the ranking criteria used, and the system rankings by priority. Table 1 summarizes the energy savings potential of the highest scoring options from the 2005 study for all five locations. All system options were scored by the ORNL building equipment research team and by William Goetzler of Navigant Consulting. These scores were reviewed by DOE/BT's Residential Integration program leaders and Building America team members. Based on these results, the two centrally ducted integrated heat pump (IHP) systems (air source and ground source versions) were selected for advancement to Stage 2 (Exploratory Development) business case assessments in FY06. This report describes results of these business case assessments. It is a compilation of three separate reports describing the initial business case study (Baxter 2006a), an update to evaluate the impact of an economizer cooling option (Baxter 2006b), and a second update to evaluate the impact of a winter humidification option (Baxter 2007). In addition it reports some corrections made subsequent to release of the first two reports to correct some errors in the TRNSYS building model for Atlanta and in the refrigerant pressure drop calculation in the water-to-refrigerant evaporator module of the ORNL Heat Pump Design Model (HPDM) used for the IHP analyses. These changes resulted in some minor differences between IHP performance as reported in Baxter (2006a, b) and in this report.

  16. Building America Whole-House Solutions for New Homes: Winchester Homes and

    Energy Savers [EERE]

    Camberly Homes - Silver Spring, Maryland (Fact Sheet) | Department of Energy Winchester Homes and Camberly Homes - Silver Spring, Maryland (Fact Sheet) Building America Whole-House Solutions for New Homes: Winchester Homes and Camberly Homes - Silver Spring, Maryland (Fact Sheet) The Partnership for Home Innovation team worked with the builder to develop a new set of high performance home designs-including advanced wall and HVAC systems-that could be applicable on a production scale. PDF

  17. Starting Points | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Security Campus Management and Operating (M&O) Contract Competition Starting Points Starting Points Kansas City Plant Related Web Pages Summary Kansas City Plant Home ...

  18. solar energy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    energy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS ... Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home solar energy solar energy

  19. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  20. DOE Zero Energy Ready Home Case Study: Dwell Development, Seattle...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Seattle, WA, Systems Home DOE Zero Energy Ready Home Case Study: Dwell Development, Seattle, WA, Systems Home Case study of a DOE Zero Energy Ready Home in Seattle, WA, that scored ...

  1. Home | DOEpatents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages

    DOEpatents Home DOEpatents FAQ About DOEpatents Site Map Contact Us DOE Home » DOE Patents Navigation Toggle Navigation DOEpatents Home DOEpatents FAQ About DOEpatents Site Map Contact Us OSTI Home DOE Home DOEpatents Database From the 1940s to today... A central collection of US Department of Energy patent information Find + Advanced Search × Advanced Search All Fields: Patent Title: Abstract: Assignee: Inventor(s): Name Name ORCID Patent Number: Patent Application Number: Contract Number:

  2. GAO-07-1036, CRITICAL INFRASTRUCTURE PROTECTION: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain

    Office of Environmental Management (EM)

    Congressional Requesters CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain September 2007 GAO-07-1036 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2007 CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain Highlights of GAO-07-1036, a report to congressional requesters

  3. Renovated Korean nuclear safety and security system: A review and suggestions to successful settlement

    SciTech Connect (OSTI)

    Chung, W. S.; Yun, S. W.; Lee, D. S.; Go, D. Y.

    2012-07-01

    Questions of whether past nuclear regulatory body of Korea is not a proper system to monitor and check the country's nuclear energy policy and utilization have been raised. Moreover, a feeling of insecurity regarding nuclear safety after the nuclear accident in Japan has spread across the public. This has stimulated a renovation of the nuclear safety regime in Korea. The Nuclear Safety and Security Commission (NSSC) was launched on October 26, 2011 as a regulatory body directly under the President in charge of strengthening independence and nuclear safety. This was a meaningful event as the NSSC it is a much more independent regulatory system for Korea. However, the NSSC itself does not guarantee an enhanced public acceptance of the nuclear policy and stable use nuclear energy. This study introduces the new NSSC system and its details in terms of organization structure, appropriateness of specialty, budget stability, and management system. (authors)

  4. Solar Energy Home | Open Energy Information

    Open Energy Info (EERE)

    Home Jump to: navigation, search Name: Solar Energy Home Address: 28 Church Road Place: London, United Kingdom Sector: Solar Product: Solar energy systems and equipment Phone...

  5. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  6. GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems

    Office of Environmental Management (EM)

    Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE

  7. Energy Savings Mortgage Incentive for New Homes

    Broader source: Energy.gov [DOE]

    The amount of the incentive depends on the energy efficiency of the new home, measured on the Home Energy Rating System (HERS) Index, and must include a non-state source match. (Homes with lower...

  8. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  9. DOE Zero Energy Ready Home Case Study: Clifton View Homes, Coupeville, Washington

    SciTech Connect (OSTI)

    none,

    2013-09-01

    Ted Clifton, founder of Clifton View Homes, achieved an impressive Home Energy Rating System (HERS) score of 34 (without solar panels) on a two-story home completed in July 2011 that also earned him his first Challenge Home certification from the U.S. Department of Energy (DOE). This home also garnered a 2013 Housing Innovation Award in the "systems builder" category.

  10. canning | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Our Jobs Our Jobs Working at NNSA Blog Home canning canning Y-12's uranium canning machine to save money During a recent visit to the Y-12 National Security Complex, NNSA...

  11. Building America Webinar: High Performance Enclosure Strategies: Part II, New Construction- August 13, 2014- Next Gen Advanced Framing for High Performance Homes Integrated System Solutions

    Broader source: Energy.gov [DOE]

    This presentation, Next Gen Advanced Framing for High Performance Homes - Integrated System Solutions, was delivered at the Building America webinar, High Performance Enclosure Strategies, Part II, on August 13, 2014.

  12. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    SciTech Connect (OSTI)

    Lagesse, Brent J

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources and issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.

  13. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the Cold War. Few people may be aware of the older important cultural resources that exist throughout the site as well. Artifacts ranging from hundreds to thousands of years old are part of the NNSS cultural inventory. The NNSS' Cultural Resources Management Program has documented tools and dwellings associated with

  14. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  15. Ultra-Efficient Home Design | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Kenneth Kelly, NREL. What does this mean for me? Lower energy bills and improved comfort Energy reliability and security Environmental sustainability < Ultra-efficient home design...

  16. DOE Zero Energy Ready Home Case Study, Nexus EnergyHomes, Frederick...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Study, Nexus EnergyHomes, Frederick, MD, Production DOE Zero Energy Ready Home Case Study, Nexus ... geothermal heat pumps, solar PV, and a proprietary energy management system. ...

  17. Home Heating | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Heating Home Heating Energy Saver 101 Infographic: Home Heating Energy Saver 101 Infographic: Home Heating Everything you need to know about home heating, including how heating systems work, the different types on the market and proper maintenance. Read more Thermostats Thermostats Save money on heating by automatically setting back your thermostat when you are asleep or away. Read more Wood and Pellet Heating Wood and Pellet Heating Wood and pellets are renewable fuel sources, and modern wood

  18. Strengthening Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector ...

  19. High Performance Builder Spotlight: Imagine Homes

    SciTech Connect (OSTI)

    2011-01-01

    Imagine Homes, working with the DOE's Building America research team member IBACOS, has developed a system that can be replicated by other contractors to build affordable, high-performance homes. Imagine Homes has used the system to produce more than 70 Builders Challenge-certified homes per year in San Antonio over the past five years.

  20. Lemnos Interoperable Security Program

    Office of Environmental Management (EM)

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  1. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification

  2. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    DOE Patents [OSTI]

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  3. Monitoring Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy

  4. systems analysis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    systems analysis - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear

  5. U.S. Patent Pending, Cyberspace Security System for Complex Systems, U.S. Patent Application No.: 14/134,949

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2013-01-01

    A computer implemented method monetizes the security of a cyber-system in terms of losses each stakeholder may expect to lose if a security break down occurs. A non-transitory media stores instructions for generating a stake structure that includes costs that each stakeholder of a system would lose if the system failed to meet security requirements and generating a requirement structure that includes probabilities of failing requirements when computer components fails. The system generates a vulnerability model that includes probabilities of a component failing given threats materializing and generates a perpetrator model that includes probabilities of threats materializing. The system generates a dot product of the stakes structure, the requirement structure, the vulnerability model and the perpetrator model. The system can further be used to compare, contrast and evaluate alternative courses of actions best suited for the stakeholders and their requirements.

  6. CAES Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User ID: Password: Log In Forgot your password? Working in CAES WIC Home Request Facility Use Conduct Research Flowchart Process Rad Info and Tools Chemical Requisition Guide...

  7. CAES Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Working in CAES WIC Home Request Facility Use Conduct Research Flowchart Process Rad Info and Tools Chemical Requisition Guide Chemical and Supply Order Form Training Access...

  8. Home Design & Remodeling | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Design & Remodeling Home Design & Remodeling Ultra-Efficient Home Design Ultra-Efficient Home Design An ultra-efficient home can be designed and built to produce as much energy as it uses -- or even more! Read more Passive Solar Home Design Passive Solar Home Design Passive solar design takes advantage of a building's site, climate, and materials to minimize energy use. Read more Whole-House Systems Approach Whole-House Systems Approach A whole-house systems approach considers the

  9. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  10. Home Energy Score Sample Report | Department of Energy

    Office of Environmental Management (EM)

    Home Energy Score Sample Report Home Energy Score Sample Report The Home Energy Score is a national rating system developed by the U.S. Department of Energy. The Score reflects the energy efficiency of a home based on the home's structure and heating, cooling, and hot water systems. The Home Facts provide details about the current structure and systems. Recommendations show how to improve the energy efficiency of the home to achieve a higher score and save money. PDF icon

  11. Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  12. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    SciTech Connect (OSTI)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, an established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.

  13. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, anmore » established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.« less

  14. Testing standards for physical security systems at Category 1 fuel cycle facilities

    SciTech Connect (OSTI)

    Dwyer, P.A.

    1991-10-01

    This NUREG is a compilation of physical security testing standards for use at fuel cycle facilities using or possessing formula quantities of strategic special nuclear material.

  15. National Security Campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  16. Nuclear Security 101 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    101 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  17. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  18. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    campus | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  19. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  20. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    policy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  1. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  2. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  3. Radiological Security Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  4. Security Forms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Forms | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  5. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessmentcwdd2015-05-04T21:05:48+00:00 security Water Treatment Facility Definition Security is assuring that water sources and water distribution systems are...

  6. DOE Zero Energy Ready Home Case Study: Clifton View Homes, Coupeville, WA,

    Energy Savers [EERE]

    Systems Home | Department of Energy Coupeville, WA, Systems Home DOE Zero Energy Ready Home Case Study: Clifton View Homes, Coupeville, WA, Systems Home Case study of a DOE Zero Energy Ready Home on Whidbey Island, WA, that scored HERS 45 without PV. This 2,908-square-foot custom/system home has a SIP roof and walls, R-20 rigid foam under slab, triple-pane windows, ground source heat pump for radiant floor heat, and a unique balanced ventilation system using separate exhaust fans to bring

  7. Building America Expert Meeting: Minutes from Automated Home...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Minutes from Automated Home Energy Management System Building America Expert Meeting: Minutes from Automated Home Energy Management System These meeting minutes are from the U.S....

  8. High-Performance Home Technologies: Solar Thermal & Photovoltaic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Technologies: Solar Thermal & Photovoltaic Systems; Volume 6 Building America Best Practices Series High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems; ...

  9. Closure Report for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2012-08-15

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 562, Waste Systems, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 562 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 562 consists of the following 13 Corrective Action Sites (CASs), located in Areas 2, 23, and 25 of the Nevada National Security Site: · CAS 02-26-11, Lead Shot · CAS 02-44-02, Paint Spills and French Drain · CAS 02-59-01, Septic System · CAS 02-60-01, Concrete Drain · CAS 02-60-02, French Drain · CAS 02-60-03, Steam Cleaning Drain · CAS 02-60-04, French Drain · CAS 02-60-05, French Drain · CAS 02-60-06, French Drain · CAS 02-60-07, French Drain · CAS 23-60-01, Mud Trap Drain and Outfall · CAS 23-99-06, Grease Trap · CAS 25-60-04, Building 3123 Outfalls Closure activities began in October 2011 and were completed in April 2012. Activities were conducted according to the Corrective Action Plan for CAU 562 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The corrective actions included No Further Action and Clean Closure. Closure activities generated sanitary waste and hazardous waste. Some wastes exceeded land disposal limits and required offsite treatment prior to disposal. Other wastes met land disposal restrictions and were disposed in appropriate onsite or offsite landfills. NNSA/NSO requests the following: · A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 562 · The transfer of CAU 562 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO

  10. Building America Whole-House Solutions for New Homes: Quadrant Homes, Kent,

    Energy Savers [EERE]

    Washington | Department of Energy Quadrant Homes, Kent, Washington Building America Whole-House Solutions for New Homes: Quadrant Homes, Kent, Washington Case study of Quadrant Homes, who worked with Building America partner WSU Energy Extension to design HERS-65 homes with ducts in conditioned space; 2x6 factory-built walls; and systems-engineered streamlined construction. PDF icon Quadrant Homes: Kentlake Highlands - Kent, WA More Documents & Publications Building America Whole-House

  11. Home Cooling | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Home Cooling Energy Saver 101 Energy Saver 101 We're covering everything you need to know about home cooling to help you save energy and money. Read more Ventilation Systems for Cooling Ventilation Systems for Cooling Learn how to avoid heat buildup and keep your home cool with ventilation. Read more Cooling with a Whole House Fan Cooling with a Whole House Fan A whole-house fan, in combination with other cooling systems, can meet all or most of your home cooling needs year round. Read

  12. Office of Test and Evaluation | National Nuclear Security Administrati...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test and Evaluation | National Nuclear Security Administration Facebook Twitter Youtube ... Home About Us Our Programs Defense Programs Research, Development, Test, and ...

  13. Comprehensive Nuclear Test-Ban Treaty | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Nuclear Test-Ban Treaty | National Nuclear Security Administration Facebook Twitter ... Apply for Our Jobs Our Jobs Working at NNSA Blog Home Comprehensive Nuclear Test-Ban ...

  14. Center for Frontiers of Subsurface Energy Security (CFSES) |...

    Office of Science (SC) Website

    Frontiers of Subsurface Energy Security (CFSES) Energy Frontier Research Centers (EFRCs) EFRCs Home Centers EFRC External Websites Research Science Highlights News & Events ...

  15. Building America Efficient Solutions for New Homes Case Study: Ravenwood Homes and Energy Smart Home Plans, Inc., Cape Coral, Florida

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ravenwood Homes achieved a HERS score of 15 on its high- performance home with design assistance from a Building America research team including Pacific Northwest National Laboratory, Energy Smart Home Plans, LLC, and Florida HERO. The home which is located in southwestern Florida, was completed in 2011 and includes a 6 KW rooftop photovoltaic system; without the PV, the home achieves a HERS rating of 65. Ceilings that provide a continuous air barrier can be a key energy-saving feature of a

  16. WIPP Home Page Search

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Page Search Enter word(s) to search for on the WIPP Home Page: Search

  17. Ota City : characterizing output variability from 553 homes with residential PV systems on a distribution feeder.

    SciTech Connect (OSTI)

    Stein, Joshua S.; Miyamoto, Yusuke; Nakashima, Eichi; Lave, Matthew

    2011-11-01

    This report describes in-depth analysis of photovoltaic (PV) output variability in a high-penetration residential PV installation in the Pal Town neighborhood of Ota City, Japan. Pal Town is a unique test bed of high-penetration PV deployment. A total of 553 homes (approximately 80% of the neighborhood) have grid-connected PV totaling over 2 MW, and all are on a common distribution line. Power output at each house and irradiance at several locations were measured once per second in 2006 and 2007. Analysis of the Ota City data allowed for detailed characterization of distributed PV output variability and a better understanding of how variability scales spatially and temporally. For a highly variable test day, extreme power ramp rates (defined as the 99th percentile) were found to initially decrease with an increase in the number of houses at all timescales, but the reduction became negligible after a certain number of houses. Wavelet analysis resolved the variability reduction due to geographic diversity at various timescales, and the effect of geographic smoothing was found to be much more significant at shorter timescales.

  18. Challenge Home

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Homes New CH logo is not recognized in market Original Builders Challenge label had no brand architecture Zero Net-Energy Ready is a heavy lift for housing industry Build strong ...

  19. DOE Zero Energy Ready Home Case Study: M Street Homes, Houston, TX |

    Energy Savers [EERE]

    Department of Energy M Street Homes, Houston, TX DOE Zero Energy Ready Home Case Study: M Street Homes, Houston, TX DOE Zero Energy Ready Home Case Study: M Street Homes, Houston, TX Case study of a DOE Zero Energy Ready home in Houston, TX, that achieves a HERS 45 without PV or HERS 32 with 1.2 kW PV. The three-story, 4,507-ft2 custom home is powered by a unique tri-generation system that supplies all of the home's electricity, heating, and cooling on site. The tri-generator is powered by a

  20. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  1. National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security LLNL's Terascale Simulation Facility houses the Department of Energy Advanced Scientific Computing (ASC) Program's Purple supercomputer, a 100-teraops (trillion operations per second) machine that is one of the fastest in the world. ASC Purple enables 3D simulations with high-fidelity physics models of the performance of a full nuclear weapon system. NIF can create conditions-temperatures of 100 million degrees and pressures 100 billion times that of the Earth's atmosphere-similar to

  2. Initial Business Case Analysis of Two Integrated Heat Pump HVAC Systems for Near-Zero-Energy Homes

    SciTech Connect (OSTI)

    Baxter, Van D

    2006-11-01

    The long range strategic goal of the Department of Energy's Building Technologies (DOE/BT) Program is to create, by 2020, technologies and design approaches that enable the construction of net-zero energy homes at low incremental cost (DOE/BT 2005). A net zero energy home (NZEH) is a residential building with greatly reduced needs for energy through efficiency gains, with the balance of energy needs supplied by renewable technologies. While initially focused on new construction, these technologies and design approaches are intended to have application to buildings constructed before 2020 as well resulting in substantial reduction in energy use for all building types and ages. DOE/BT's Emerging Technologies (ET) team is working to support this strategic goal by identifying and developing advanced heating, ventilating, air-conditioning, and water heating (HVAC/WH) technology options applicable to NZEHs. Although the energy efficiency of heating, ventilating, and air-conditioning (HVAC) equipment has increased substantially in recent years, new approaches are needed to continue this trend. Dramatic efficiency improvements are necessary to enable progress toward the NZEH goals, and will require a radical rethinking of opportunities to improve system performance. The large reductions in HVAC energy consumption necessary to support the NZEH goals require a systems-oriented analysis approach that characterizes each element of energy consumption, identifies alternatives, and determines the most cost-effective combination of options. In particular, HVAC equipment must be developed that addresses the range of special needs of NZEH applications in the areas of reduced HVAC and water heating energy use, humidity control, ventilation, uniform comfort, and ease of zoning. In FY05 ORNL conducted an initial Stage 1 (Applied Research) scoping assessment of HVAC/WH systems options for future NZEHs to help DOE/BT identify and prioritize alternative approaches for further development. Eleven system concepts with central air distribution ducting and nine multi-zone systems were selected and their annual and peak demand performance estimated for five locations: Atlanta (mixed-humid), Houston (hot-humid), Phoenix (hot-dry), San Francisco (marine), and Chicago (cold). Performance was estimated by simulating the systems using the TRNSYS simulation engine (Solar Energy Laboratory et al. 2006) in two 1800-ft{sup 2} houses--a Building America (BA) benchmark house and a prototype NZEH taken from BEopt results at the take-off (or crossover) point (i.e., a house incorporating those design features such that further progress towards ZEH is through the addition of photovoltaic power sources, as determined by current BEopt analyses conducted by NREL). Results were summarized in a project report, 'HVAC Equipment Design options for Near-Zero-Energy Homes--A Stage 2 Scoping Assessment,' ORNL/TM-2005/194 (Baxter 2005). The 2005 study report describes the HVAC options considered, the ranking criteria used, and the system rankings by priority. Table 1 summarizes the energy savings potential of the highest scoring options from the 2005 study for all five locations.

  3. DOE Zero Energy Ready Home Partner Central | Department of Energy

    Office of Environmental Management (EM)

    Partner Central DOE Zero Energy Ready Home Partner Central The DOE Zero Energy Ready Home offers leading builders and architects/designers a timely solution for differentiating their product from existing homes as well as minimum code new homes. The DOE Zero Energy Ready Home label - the home of the future today - makes it easy for consumers to identify high-performance homes that are so energy efficient a renewable energy system can offset most or all annual energy consumption. Zero Energy

  4. Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... security to House committees on two occasions.For more than 30 years, Sandia has applied performance-based methods for designing and evaluating physical protection systems (PPS). ...

  5. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  6. Building America Whole-House Solutions for Existing Homes: Multifamily Individual Heating and Ventilation Systems

    Broader source: Energy.gov [DOE]

    The conversion of an older Massachusetts building into condominiums illustrates a safe, durable, and cost-effective solution for heating and ventilation systems in multifamily buildings.

  7. Passive Solar Home Design | Department of Energy

    Energy Savers [EERE]

    Design » Design for Efficiency » Passive Solar Home Design Passive Solar Home Design This North Carolina home gets most of its space heating from the passive solar design, but the solar thermal system (top of roof) supplies both domestic hot water and a secondary radiant floor heating system. | Photo courtesy of Jim Schmid Photography. This North Carolina home gets most of its space heating from the passive solar design, but the solar thermal system (top of roof) supplies both domestic hot

  8. Passive Solar Home Design | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Design » Design for Efficiency » Passive Solar Home Design Passive Solar Home Design This North Carolina home gets most of its space heating from the passive solar design, but the solar thermal system (top of roof) supplies both domestic hot water and a secondary radiant floor heating system. | Photo courtesy of Jim Schmid Photography. This North Carolina home gets most of its space heating from the passive solar design, but the solar thermal system (top of roof) supplies both domestic hot

  9. Corrective Action Plan for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2011-04-30

    This Corrective Action Plan has been prepared for Corrective Action Unit (CAU) 562, Waste Systems, in accordance with the Federal Facility Agreement and Consent Order (1996; as amended March 2010). CAU 562 consists of 13 Corrective Action Sites (CASs) located in Areas 2, 23, and 25 of the Nevada National Security Site. Site characterization activities were performed in 2009 and 2010, and the results are presented in Appendix A of the Corrective Action Decision Document for CAU 562. The scope of work required to implement the recommended closure alternatives is summarized. (1) CAS 02-26-11, Lead Shot, will be clean closed by removing shot. (2) CAS 02-44-02, Paint Spills and French Drain, will be clean closed by removing paint and contaminated soil. As a best management practice (BMP), asbestos tile will be removed. (3) CAS 02-59-01, Septic System, will be clean closed by removing septic tank contents. As a BMP, the septic tank will be removed. (4) CAS 02-60-01, Concrete Drain, contains no contaminants of concern (COCs) above action levels. No further action is required; however, as a BMP, the concrete drain will be removed. (5) CAS 02-60-02, French Drain, was clean closed. Corrective actions were completed during corrective action investigation activities. As a BMP, the drain grates and drain pipe will be removed. (6) CAS 02-60-03, Steam Cleaning Drain, will be clean closed by removing contaminated soil. As a BMP, the steam cleaning sump grate and outfall pipe will be removed. (7) CAS 02-60-04, French Drain, was clean closed. Corrective actions were completed during corrective action investigation activities. (8) CAS 02-60-05, French Drain, will be clean closed by removing contaminated soil. (9) CAS 02-60-06, French Drain, contains no COCs above action levels. No further action is required. (10) CAS 02-60-07, French Drain, requires no further action. The french drain identified in historical documentation was not located during corrective action investigation activities. (11) CAS 23-60-01, Mud Trap Drain and Outfall, will be clean closed by removing sediment from the mud trap. As a BMP, the mud trap and outfall pipe will be removed. (12) CAS 23-99-06, Grease Trap, will be clean closed by removing sediment from the grease trap and backfilling the grease trap with grout. (13) CAS 25-60-04, Building 3123 Outfalls, will be clean closed by removing contaminated soil and the sludge-containing outfall pipe.

  10. Composite Data Products (CDPs) from the Hydrogen Secure Data Center (HSDC) at the Energy Systems Integration Facility (ESIF), NREL

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The Hydrogen Secure Data Center (HSDC) at NREL's Energy Systems Integration Facility (ESIF) plays a crucial role in NREL's independent, third-party analysis of hydrogen fuel cell technologies in real-world operation. NREL partners submit operational, maintenance, safety, and cost data to the HSDC on a regular basis. NREL's Technology Validation Team uses an internal network of servers, storage, computers, backup systems, and software to efficiently process raw data, complete quarterly analysis, and digest large amounts of time series data for data visualization. While the raw data are secured by NREL to protect commercially sensitive and proprietary information, individualized data analysis results are provided as detailed data products (DDPs) to the partners who supplied the data. Individual system, fleet, and site analysis results are aggregated into public results called composite data products (CDPs) that show the status and progress of the technology without identifying individual companies or revealing proprietary information. These CDPs are available from this NREL website: 1) Hydrogen Fuel Cell Vehicle and Infrastructure Learning Demonstration; 2) Early Fuel Cell Market Demonstrations; 3) Fuel Cell Technology Status [Edited from http://www.nrel.gov/hydrogen/facilities_secure_data_center.html].

  11. Well Logging Security Initiatives | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  12. Building America Whole-House Solutions for Existing Homes: Multifamily...

    Office of Environmental Management (EM)

    Existing Homes: Multifamily Individual Heating and Ventilation Systems Building America Whole-House Solutions for Existing Homes: Multifamily Individual Heating and Ventilation...

  13. NREL Innovates Today for the Homes of Tomorrow - News Feature...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    products, utilities working to understand the impacts of smart homes to the grid, or home energy management system manufacturers looking to bring everything together for the smart...

  14. DOE Zero Energy Ready Home Case Study: Southern Energy Homes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Southern Energy Homes, Russellville, AL DOE Zero Energy Ready Home Case Study: Southern Energy Homes, Russellville, AL DOE Zero Energy Ready Home Case Study: Southern Energy Homes, ...

  15. World War II | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    at NNSA Blog Home World War II World War II Keeping the "Spirit of '45 Alive" in Kansas City National Security Campus employees commemorated the 70th anniversary of the end...

  16. HOMEe | Open Energy Information

    Open Energy Info (EERE)

    navigation, search Name: HOMEe Place: Denmark Product: Denmark-based maker of home automation products, including devices to manage lighting and climate. References: HOMEe1...

  17. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  18. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  19. Reimagining What's Possible: How NREL's Energy Analysis and Decision Support Capabilities are Guiding Energy Systems Transformation at Home and Around the World; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    2015-03-01

    This engaging brochure shows examples of how NREL enables energy system transformation through robust capabilities in energy analysis and decision support. By reimagining what's possible for renewable energy, NREL contributes to the Department of Energy mission to create energy systems that are cleaner, more reliable, and more secure.

  20. Energy-Efficient Home Design | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Design » Energy-Efficient Home Design Energy-Efficient Home Design The Home Energy Score is a national rating system developed by the U.S. Department of Energy. The Score reflects the energy efficiency of a home based on the home's structure and heating, cooling, and hot water systems. The Home Facts provide details about the current structure and systems. Recommendations show how to improve the energy efficiency of the home to achieve a higher score and save money. The Home Energy Score is a

  1. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  2. Security Control Assessor | Department of Energy

    Energy Savers [EERE]

    Security Control Assessor Security Control Assessor Cyber-security-300x199.jpg The Security Control Assessor (SOA) is responsible for assessing the management, operational, assurance, and technical security controls implemented on an information system via security testing and evaluation (ST&E) methods. The SOA must be independent of system development, operation, and deficiency mitigation. PDF icon Security Control Assessor Core Competency Training Worksheet More Documents &

  3. Secure key storage and distribution

    DOE Patents [OSTI]

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  4. Home - Pantex Plant

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Alert » Fall 2015 issue » Blog » Learn More » Our History » PrevNext Securing America as the NNSA's production integrator and provider of the nuclear deterrent to the Department of Defense; serving the Nuclear Security Enterprise through our Highly Reliable people, processes, infrastructure, and business systems. Visitor Center Resources for Pantex visitors Emergency Information What to do in case of an emergency at Pantex Employee Information Resources for Pantex employees Retiree

  5. Building America DOE Challenge Home Case Study: e2 Homes - Winter Park,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Florida | Department of Energy DOE Challenge Home Case Study: e2 Homes - Winter Park, Florida Building America DOE Challenge Home Case Study: e2 Homes - Winter Park, Florida The first certified DOE Challenge Home in the United States-the Wilson Residence in Winter Park, Florida-produces more energy than it uses with construction costs one-third less than originally proposed. Without solar power, the home scores a HERS 57; with its photovoltaic system, the home produces better than zero

  6. Home Energy Assessments

    Broader source: Energy.gov [DOE]

    A home energy assessment, also known as a home energy audit, is the first step to assess how much energy your home consumes and to evaluate what measures you can take to make your home more energy...

  7. Transportation Energy Systems Analysis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems Analysis - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear

  8. Wake Imaging Measurement System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wake Imaging Measurement System - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  9. Climate & Earth Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    & Earth Systems - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  10. Helms Research Group - Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Helms Group Home Research Members Publications Collaborations Connect Physical Organic Materials Chemistry Our research is devoted to understanding transport phenomena in mesostructured systems assembled from organic, organometallic, polymeric and nanocrystalline components. Enhanced capabilities relevant to energy, health, water, and food quality are enabled by our unique approaches to the modular design of their architectures and interfaces.

  11. Zero Energy Ready Home | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Zero Energy Ready Home A DOE Zero Energy Ready Home is a high performance home which is so energy efficient, that a renewable energy system can offset all or most of its annual energy consumption. Since 2008, the U.S. De Zero_Home_MASTER_Mark ZERH site.jpg partment of Energy's (DOE) Builders Challenge program has recognized hundreds of leading builders for their achievements in energy efficiency-resulting in over 14,000 energy efficient homes and millions of dollars in energy savings. The

  12. A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance: Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP)

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Grimaila, Michael R

    2010-01-01

    In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we discuss how this infrastructure can be used in the subject domain of mission assurance as defined as the full life-cycle engineering process to identify and mitigate design, production, test, and field support deficiencies of mission success. We address the opportunity to apply the Cyberspace Security Econometrics System (CSES) to Carnegie Mellon University and Software Engineering Institute s Mission Assurance Analysis Protocol (MAAP) in this context.

  13. Framework for SCADA Security Policy

    Office of Environmental Management (EM)

    Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear

  14. Home Energy Score

    SciTech Connect (OSTI)

    2011-12-16

    The Home Energy Score allows a homeowner to compare her or his home's energy consumption to that of other homes, similar to a vehicle's mile-per-gallon rating. A home energy assessor will collect energy information during a brief home walk-through and then score that home on a scale of 1 to 10.

  15. SRNL Science and Innovation - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Tritium Stewardship Non-Proliferation Nuclear Materials Recovery Homeland Security Forensics/Law Enforcement Atmospheric Technologies SRNL Home Dopler Radar Science and Innovation National Security - Atmospheric Technologies The Atmospheric Technologies Group at the Savannah River National Laboratory provides expert meteorological and hydrological services and consultation in support of regulatory compliance, safety analysis, applied engineering, emergency preparedness and response, forest

  16. ENERGY STAR for Homes - Building America Top Innovation | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy ENERGY STAR for Homes - Building America Top Innovation ENERGY STAR for Homes - Building America Top Innovation Photo of a house with a "SOLD" sign in front yard. This Top Innovation highlights Building America's support of ENERGY STAR for Homes, which is leading the U.S. housing industry to high performance homes and driving the development of a national Home Energy Rating System (HERS) infrastructure. ENERGY STAR for Homes has profoundly impacted the nation's housing. In

  17. DOE Zero Energy Ready Home Case Study: TC Legend Homes, Seattle, Washington

    SciTech Connect (OSTI)

    none,

    2013-09-01

    This house incorporates slab-on-grade, EPS roof, and radiant heating with an air-to-water heat pump that also preheats domestic hot water. Without counting in the solar panels, the home earns a home energy rating system (HERS) score of 37, with projected utility bills of about $740 a year. With the 6.4-kW photovoltaic power system installed on the roof, the home’s HERS scores drops to -1 and utility bills for the all-electric home drop to zero. This home was awarded a 2013 Housing Innovation Award in the affordable builder category.

  18. Building America Case Study: Raised Ceiling Interior Duct System, New Smyrna, Florida (Fact Sheet), Technology Solutions for New and Existing Homes, Energy Efficiency & Renewable Energy (EERE)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Raised Ceiling Interior Duct System New Smyrna, Florida PROJECT INFORMATION Project Name: S.E. Volusia County Habitat for Humanity Zero Energy Ready Home Location: New Smyrna, FL Partners: S. E. Volusia CO Habitat for Humanity Building America Partnership for Improved Residential Construction, ba-pirc.org Building Component: HVAC Application: New and/or retrofit; Single and/or multifamily Year Tested: 2013 Applicable Climate Zone(s): all PERFORMANCE DATA (of the measure alone, not whole house)

  19. Enterprise Assessments Targeted Review of the Safety System Management of the Secondary Confinement System and Power Distribution Safety System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility Â… December 2015

    Office of Environmental Management (EM)

    Targeted Review of the Safety System Management of the Secondary Confinement System and Safety Significant Power Distribution System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility December 2015 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms

  20. EM's Laboratory Supports Testing Wireless Technology in Secure

    Office of Environmental Management (EM)

    Environment | Department of Energy Laboratory Supports Testing Wireless Technology in Secure Environment EM's Laboratory Supports Testing Wireless Technology in Secure Environment January 29, 2014 - 12:00pm Addthis Joe Cordaro of SRNL observes the secure wireless TAM cart. Joe Cordaro of SRNL observes the secure wireless TAM cart. AIKEN, S.C. - Wireless networks have become commonplace in homes, restaurants and retail environments. But up to now, they have not been suitable for secure

  1. DOE Zero Energy Ready Home Case Study: Garbett Homes, Herriman...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Garbett Homes, Herriman, UT, Production Home DOE Zero Energy Ready Home Case Study: Garbett Homes, Herriman, UT, Production Home Case study of a DOE Zero Energy Ready Home in ...

  2. DOE Zero Energy Ready Home Case Study: Green Extreme Homes &...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Green Extreme Homes & Carl Franklin Homes, Garland, TX DOE Zero Energy Ready Home Case Study: Green Extreme Homes & Carl Franklin Homes, Garland, TX DOE Zero Energy Ready Home Case ...

  3. The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Center for SCADA Security Assets - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  4. Safety, Security & Resilience of Energy Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security & Resilience of Energy Infrastructure - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense

  5. Secure and Sustainable Energy Future Mission

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure and Sustainable Energy Future Mission - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  7. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  8. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that ...

  9. TRACC Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Access The TRACC cluster is served by high-bandwidth networks with connectivity to the main Argonne National Laboratory network. As part of the Argonne network, TRACC's networks are connected to the national and international research and education network infrastructure, and are protected by Argonne's cyber-security team. TRACC network ANL High-Performance Network ESnet ESnet provides the high-bandwidth, reliable connections that link scientists at national laboratories, universities

  10. DOE Zero Energy Ready Home Case Study: Mandalay Homes, Phoenix...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Phoenix, AZ, Affordable DOE Zero Energy Ready Home Case Study: Mandalay Homes, Phoenix, AZ, Affordable DOE Zero Energy Ready Home Case Study: Mandalay Homes, Phoenix, AZ, ...

  11. Masco Home Services/WellHome | Open Energy Information

    Open Energy Info (EERE)

    WellHome Jump to: navigation, search Name: Masco Home ServicesWellHome Place: Taylor, MI Website: www.mascohomeserviceswellhome. References: Masco Home Services...

  12. Using Operational Security (OPSEC) to Support a Cyber Security Culture in

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Control Systems Environments | Department of Energy Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments This document reviews several key operational cyber security elements that are important for control systems and industrial networks and how those elements can drive the creation of a cyber security-sensitive culture. PDF icon Using

  13. Powering a Home with Just 25 Watts of Solar PV. Super-Efficient Appliances Can Enable Expanded Off-Grid Energy Service Using Small Solar Power Systems

    SciTech Connect (OSTI)

    Phadke, Amol A.; Jacobson, Arne; Park, Won Young; Lee, Ga Rick; Alstone, Peter; Khare, Amit

    2015-04-01

    Highly efficient direct current (DC) appliances have the potential to dramatically increase the affordability of off-grid solar power systems used for rural electrification in developing countries by reducing the size of the systems required. For example, the combined power requirement of a highly efficient color TV, four DC light emitting diode (LED) lamps, a mobile phone charger, and a radio is approximately 18 watts and can be supported by a small solar power system (at 27 watts peak, Wp). Price declines and efficiency advances in LED technology are already enabling rapidly increased use of small off-grid lighting systems in Africa and Asia. Similar progress is also possible for larger household-scale solar home systems that power appliances such as lights, TVs, fans, radios, and mobile phones. When super-efficient appliances are used, the total cost of solar home systems and their associated appliances can be reduced by as much as 50%. The results vary according to the appliances used with the system. These findings have critical relevance for efforts to provide modern energy services to the 1.2 billion people worldwide without access to the electrical grid and one billion more with unreliable access. However, policy and market support are needed to realize rapid adoption of super-efficient appliances.

  14. Recent Sandia Secure, Scalable Microgrid Advanced Controls Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Accomplishments Secure, Scalable Microgrid Advanced Controls Research Accomplishments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery

  15. DOE Zero Energy Ready Home Case Study: Amerisips Homes, Charleston, SC |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Zero Energy Ready Home Case Study: Amerisips Homes, Charleston, SC DOE Zero Energy Ready Home Case Study: Amerisips Homes, Charleston, SC Case study of a DOE Zero Energy Ready home on Johns Island in Charleston, SC, that scored HERS 30 without PV, or HERS 1 with 6-kW of PV. This custom 2-story, 2,085 ft2, home is constructed of structural insulated panels, with 6.5-in. SIPs in the walls and 8.25-in. SIPs in the floor and roof. The HVAC system includes an air-to-water

  16. Systems Engineering

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water ...

  17. hydrogen-fueled transportation systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    fueled transportation systems - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  18. space exploration radioisotope power systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    space exploration radioisotope power systems - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste

  19. Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems.

    SciTech Connect (OSTI)

    Ruthruff, Joseph; Armstrong, Robert C.; Davis, Benjamin Garry; Mayo, Jackson; Punnoose, Ratish J.

    2012-09-01

    Formal methods describe a class of system analysis techniques that seek to prove specific propertiesabout analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest fromboth internal and external customersof Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquelypositioned to advance the state-of-the-art with respect toseveral research and application areaswithin formal methods. This research project was a one-yeareffort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research&Development program toinvestigate the opportunities for formal methods to impactSandia's present mission areas, morefully understand the needs of the research community in the area of formal methods and whereSandia can contribute, and clarify from those potential research paths those that would best advancethe mission-area interests of Sandia. The accomplishmentsfrom this project reinforce the utilityof formal methods in Sandia, particularly in areas relevantto Cyber Security, and set the stagefor continued Sandia investments to ensure this capabilityis utilized and advanced within thislaboratory to serve the national interest.4

  20. Home Solar Installations: Things to Consider | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Solar Installations: Things to Consider Home Solar Installations: Things to Consider May 29, 2013 - 3:18pm Addthis Home solar systems can save you energy and money. | Photo courtesy of Dennis Schroeder, NREL 22168. Home solar systems can save you energy and money. | Photo courtesy of Dennis Schroeder, NREL 22168. Erin Connealy Communications Specialist, Office of Energy Efficiency and Renewable Energy How can I participate? Read these considerations for installing a home solar electric

  1. Home Solar Installations: Things to Consider | Department of Energy

    Office of Environmental Management (EM)

    Home Solar Installations: Things to Consider Home Solar Installations: Things to Consider May 29, 2013 - 3:18pm Addthis Home solar systems can save you energy and money. | Photo courtesy of Dennis Schroeder, NREL 22168. Home solar systems can save you energy and money. | Photo courtesy of Dennis Schroeder, NREL 22168. Erin Connealy Communications Specialist, Office of Energy Efficiency and Renewable Energy How can I participate? Read these considerations for installing a home solar electric

  2. Headquarters Security Quick Reference Book Headquarters Security Quick Reference Book

    Office of Environmental Management (EM)

    Headquarters Security Quick Reference Book Headquarters Security Quick Reference Book ACRONYMS BAO Building Access Only CMPC Classified Matter Protection and Control CUI Controlled Unclassified Information FACTS Foreign Access Central Tracking System DOE Department of Energy E.O. Executive Order FOCI Foreign Ownership, Control or Influence FOIA Freedom of Information Act HSPD Homeland Security Presidential Directive HSS Office of Health, Safety and Security HQ Headquarters HQFMSP HQ Facilities

  3. Building America Efficient Solutions for New Homes Case Study: Tommy Williams Homes Initial Performance of Two Zero Energy Homes, Gainesville, Florida

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Description These high-performance homes in northern Florida are two that have achieved Home Energy Rating System (HERS) ratings of less than zero since Building America (BA) builders started building them in 2010. The homes (TW1 and TW2) were built in the Gainesville area by Tommy Williams Homes (TW), with technical assistance from Florida H.E.R.O. and energy-efficient home design input provided by Energy Smart Home Plans. The homes are being metered by the Florida Solar Energy Center

  4. Home Energy Solutions for Existing Homes

    Broader source: Energy.gov [DOE]

    The first step to participate in this program is to evaluate a home's energy use by using Energy Trust's online Home Energy Profile Tool or by calling 1-866-368-7878. Homeowners may also opt for a...

  5. Global Home Filesystem

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Global Home Filesystem Overview Global home directories (or "global homes") provide a convenient means for a user to have access to dotfiles, source files, input files, configuration files, etc., regardless of the platform the user is logged in to. Quotas, Performance, and Usage Default global home quotas are 40 GB and 1,000,000 inodes. Quota increases in global homes are approved only in extremely unusual circumstances; users are encouraged to use the various scratch, project,

  6. Nuclear Safeguards and Security Challenge:

    National Nuclear Security Administration (NNSA)

    Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards

  7. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  8. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    From a Department of Defense (DoD) perspective, SMrs offer great advantage for energy security with stable fuel cost profiles, a secure installation for meeting base-load power demands with a robust, secured reactor design (i.e., energy security), potential to provide potable water and synthetic fuels, and a means to exceed DoD greenhouse gases (GhG) reduction goals. While presently SMrs are being proposed based on various reactor technologies, SMrs based on light-water reactor (lWr)

  10. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  11. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  12. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    details, refer to the Map of Post 10 Truck Inspection Station (pdf). Resources Emergency Communication Vendor Security Requirements Material Frontiers in Science Lectures Mobile...

  13. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source.

    SciTech Connect (OSTI)

    Tsvetkov, Pavel Valeryevich; Rodriguez, Salvador B.; Ames, David E., II; Rochau, Gary Eugene

    2010-10-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  14. Department of Homeland Security | NISAC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NISACDepartment of Homeland Security

  15. TRAJECTORY SENSITIVITY ANALYSIS FOR DYNAMIC SECURITY ASSESSMENT AND OTHER APPLICATIONS IN POWER SYSTEMS

    SciTech Connect (OSTI)

    Nguyen, Tony B.; Pai, M. A.

    2014-07-10

    Real time stability evaluation and preventive scheduling in power systems offer many challenges in a stressed power system. Trajectory sensitivity analysis (TSA) is a useful tool for this and other applications in the emerging smart grid area. In this chapter we outline the basic approach of TSA, to extract suitable information from the data and develop reliable metrics or indices to evaluate proximity of the system to an unstable condition. Trajectory sensitivities can be used to compute critical parameters such as clearing time of circuit breakers, tie line flow, etc. in a power system by developing suitable norms for ease of interpretation. The TSA technique has the advantage that model complexity is not a limitation, and the sensitivities can be computed numerically. Suitable metrics are developed from these sensitivities. The TSA technique can be extended to do preventive rescheduling. A brief discussion of other applications of TSA in placement of distributed generation is indicated.

  16. Nevada National Security Site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  17. Nevada National Security Site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  18. Office of Secure Transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  19. Y-12 National Security Site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Site | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  20. Security and Privacy Notices | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory monitors this Web site for ...

  1. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  2. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security...

  3. SCMC | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCMC | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  4. albuquerque | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  5. lafo | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    lafo | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  6. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  7. Library | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Library | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  8. Awards | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Awards | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  9. Benefits | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Benefits | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  10. CTBT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CTBT | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  11. Contacts | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Contacts | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  12. FBI | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    FBI | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  13. Facilities | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  14. Features | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Features | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  15. Japan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Japan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  16. Leave | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Leave | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  17. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  18. Operations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  19. Overview | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Overview | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  20. Planning | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  1. Policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Policy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  2. Recovery | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  3. STEM | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    STEM | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  4. Texas | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Texas | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  5. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  6. Veterans | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Veterans | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  7. Weapons | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / Our

  8. ams | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ams | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  9. award | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    award | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  10. eeo | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    eeo | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  11. exercise | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  12. goals | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    goals | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  13. hr | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hr | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / hr

  14. jobs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    jobs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  15. kcp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    kcp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  16. lanl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    lanl | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  17. llnl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    llnl | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  18. missile | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    missile | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  19. navy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    navy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  20. nsc | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nsc | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  1. pantex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    pantex | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  2. people | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    people | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  3. radiation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  4. safety | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  5. snl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    snl | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  6. strategy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    strategy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  7. vision | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    vision | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  8. wildlife | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    wildlife | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  9. women | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    women | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  10. AMP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AMP | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  11. ARC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / ARC

  12. ASC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / ASC

  13. CFR | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CFR | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  14. CNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / CNS

  15. CTBTO | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CTBTO | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  16. Contact | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  17. DNDO | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    DNDO | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  18. FOIA | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / Field

  19. HSEMC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    HSEMC | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  20. IND | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IND | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  1. IT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IT | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / IT

  2. International | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  3. Jordan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Jordan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  4. Korea | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Korea | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  5. Labs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Labs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  6. MIS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    MIS | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  7. Mission | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / Field

  8. NIS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NIS | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  9. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NSDD | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  10. Nevada | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / Nevada

  11. OCPC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    OCPC | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  12. ODP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ODP | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  13. OSIO | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    OSIO | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  14. PANTHER | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    PANTHER | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  15. Pantex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  16. Plutonium | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  17. Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  18. SLD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    SLD | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  19. UPF | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    UPF | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  20. Utah | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Utah | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /